Spyware Information |
|
How To Manage Your Username And Password The Easy And Secure WayJerry Yu Have been an Internet user for more than 9 years, I have 100s of logins and passwords to keep. Im paranoid. Im now even more paranoid after I joined YMMSS because I use online payment systems on weekly basis if not daily. I used to use Microsoft Excel to manage my usernames, passwords, and other registration information, both online and offline. Excel is not safe because there are programs to crack password protected Excel workbooks and I even cracked the spreadsheet and VBA source code password for one of my old Excel financial models I developed. Today I still use Excel to store some personal information but I only save the Excel file on my another PC that is not connected to Internet. In my article "6 Essential Steps to Protect Your Computer On the Internet", I highly recommended the award winning RoboForm. Free version of RoboForm http://www.roboform.com does come with limitations such as 10 Passcards only. If you dont want to buy the Pro version costs $29.99 as of my writing, there is an easy-to-use freeware see below you can download right now and manage unlimited usernames and passwords. Download freeware Password Safe from SourceForge.net - the Open Source community. https://sourceforge.net/projects/passwordsafe/ Here are some great features of Password Safe:
Here are some tips of using Password Safe version 2.04 and managing password in general. Tip #1 - Always create a strong master password Safe Combination as used in the software. Strong password should meet the following criteria:
Tip #2 - Let PasswordSafe generate random password for you. To generate random password:
The generated random password is constructed according to the password policy defined in Password Safe. You can modify the default policy.
Some sites only allow alphanumeric passwords so make sure you select the appropriate check boxes when this is the case. Tip #3 - Very Important: Never type your master password when open PasswordSafe. Keylogger spyware can record keystrokes. How can you enter master password without typing I do this. Step 1: Open a Notepad file .txt. Step 2: Copy and paste an article from any Internet website to this .txt file. Step 3: Select characters from this article and copy, paste to form your master password. Tip #4 - Very Important: Never lose your master password. I memorize my master password. In addition, I also physically write it down to a hand written study material that has my previous uni works. Among the 1,000s of words, I placed my 22 characters master password in two different pages in encrypted format that can let me derive my master password. Tip #5 - Categorize username and password. When you add a new entry, you need to specify Group, Title, Username, Password, and Notes. The entries that share the same Group name will be gathered together automatically. One Group can contain another Group as its sub Group. For example, I have Email Address group which contains three sub-groups as Friend, Work, Family. Tip #6 - For security reasons, always use Copy Username to Clipboard and Copy Password to Clipboard. Remember, never type username and password on a web form. This is how to do it.
You can use mouse to do copy and paste. If you prefer short-cut keys, this is how. Copy: Ctrl+C Paste: Ctrl+V Tip #7 - Use "Browse to URL" rather than typing URL in browser address bar. When you enter a new entry or edit an existing one, you can enter a URL must start with http:// in the Notes field. You can save website login pages URL in this field. When you need to open a login page in browser, right click the entry and click Browse to URL in the pop-up menu. Then the login page will be opened in your default web browser automatically. Tip #8 - Dont forget to backup your password database file. Use the Make Backup menu item to save a second copy of your password file. Tip #9 - Store your backups in a different offline computer or location. This is a widely used backup strategy. If you dont have two computers, you need to use other storage media to save a second copy of your backup file and version them by date easy to track back. Other storage media can be zip drive, thumb drive, floppy disk, CD, etc. Off site backups are also important. Dont overlook this. You lose all your data if you lose both your computer and your other storage media all together for any reason. Many companies provide online storage services for a fee. You can store any digital files you should password protect these files first on their secure servers. Search Google and you will find a lot. I have two computers. One is used to surf net and it does not have any sensitive info stored on it. Another one is for my development work not connected to Internet and it has my backup files. I also store my backups in a thumb drive and CDs sometimes.
|
RELATED ARTICLES
Small Business Computer Security, the Basics Anyone in business today realizes both the natural dependency on computers in the workplace, and also the potential dangers associated with storing important data on them. Today’s business owners are constantly being reminded that their company’s data is at risk by the daily reports on various news stations, or even their favorite business-related website. But what can a typical small business owner do to protect their network from these threats that are broadcasted in so many ways Dangers lurk at every turn on the Internet. There are thousands of attacks or areas of security that could be discussed, but I am going to try and focus on three general nuisances associated with today’s computers: viruses, spy-ware, and traditional “hackers” that will intentionally try to exploit your computer systems for various reasons. All of these attacks, although different, serve a specific purpose for the attacker, yet basically translate into three things for a business: lost productivity, lost data, and the end result… lost money. Here is brief descriptions of what the aforementioned attacks are, consist of, and what a typical small business can do to protect their technology investments. The Dangers of Peer-to-Peer Systems Peer-to-Peer P2P systems do not operate on secure lines, thus providing a conduit for hackers to enter a network or computer, access personal and confidential information, as well as deploy viruses or worms. Users of P2P systems are prime targets and/or launching points for malicious hacker attacks simply because it requires downloading and sharing electronic files or programs, not to mention usage on publicly open and interpretable industry standard protocols and industry standard codec. The Identity Theft Epidemic : What The “Experts” Aren’t Telling You Picture yourself walking down the street, all alone. Its late at night. Its a bit brisk, and the wind is blowing through the tall buildings on both sides of you. Suddenly, from out of nowhere, someone runs by you, knocks you over, grabs your wallet, and takes off. How To Choose A Fire Wall Software Program In the real world a "fire wall" is a fireproof wall that is built to stop the spread of fire from one part of a building to others. In the Internet world a firewall has a similar purpose in that it stops the spread of harmful viruses and attacks from entering your home or office network. How to Backup Your Computer Files As I write this, it’s early December, and try as I might, I can’t remember what my new year’s resolution was last time around. One thing I can say with near hundred percent certainty is that whatever it was, I failed to keep it. Maybe you’re the same. Maybe you resolved to quit smoking, lose weight, or read more. We all make promises with ourselves, then fail to keep those promises. Worst of all, those promises might be exactly what we need most. Consider this: When was the last time you backed up your computer files Last month Last year Never Arm Yourself Against Snoops With Spyware Counterintelligence Spyware is the cyber-equivalent of a peeping Tom. No one would think of sitting by while someone hide in the bushes watching their every move, so why do so many allow spyware snoops to moniter them online In some cases the answer is simple. They may not even know that they are being watched. Is Your Web Browser Putting You At Risk Its free, it comes with Windows and its used by approximately 94% of the Internet population. It also poses an unacceptable security risk. What am I talking about If you guessed Internet Explorer, youre right on the money. So, is your web browser putting you at risk If youre one of the 94% using Internet Explorer, the answer is a definite *yes*. By my math, quite a few people require critical information for protection. The Year of Spyware In retrospect, the year 2004 made significant milestones that will forever change the future of internet spyware related issues. Various spyware issues were addressed and a fast growing market evolved around spyware. How To Stop Spyware From Infecting Your System Spyware is becoming more and more of a problem. When I visit a cusomters site and inspect the computers I always find some kind of spyware on the system. I know that many people have been unaware of spyware, but hopefully now that the word is spreading that people will be more aware of the problem and setup a good defense. I get a get calls or questions to the effect of "Why is my computer running so slow I just bought the computer recently". Most of the time this is because of spyware. Spyware programs will load on boot up and take up your computer memory that will reduce your performance. I will go over my typical setup to prevent and battle spyware. This system works if all of the current spyware has been removed properly. I will leave that to another article. The Dark Side of P2P File Sharing P2P file sharing programs are free. Period. But there are P2P scam sites out there that want you to pay them instead. P2P scam sites are rogue companies that have set up shop to fleece unsuspecting music downloaders looking for file sharing programs by charging a fee for an otherwise free service. Spy Scanners – Don’t Compromise your Privacy Spies, spyware, internet parasites are among what they are usually called. These are scouts that monitor your web activities. The work undercover to check on your surfing patterns, spending habits, items bought, they extract email addresses, hijack browsers, steal credit card information. These are just some of the things a spyware is capable of. How To Manage Your Username And Password The Easy And Secure Way Have been an Internet user for more than 9 years, I have 100s of logins and passwords to keep. Im paranoid. Im now even more paranoid after I joined YMMSS because I use online payment systems on weekly basis if not daily. Can You Really Make Money with Surf for Cash Programs This article will focus on the Spedia Surf for Cash Program. How To Stop Spam Special Report: How to Stop Spam Explore the Internet in a Whole New Way For a long time now Microsofts Internet Explorer has ruled as King of Internet browsers. Like most of Microsofts products an initially brutal marketing campaign pushed Internet Explorer into the mainstreams consciousness and from then on it was the logical, default choice. Its free with the operating system, works well, loads any page and is easy to use. Other web browsers soon faded into obscurity and sometimes even died in the shadow of the new king of the pack. Netscape Navigator, the former King of the browsers, has now ceased commercial operations and has been taken over by the fan base. Opera is fading into obscurity and Mozilla was facing a similar fate, until recently. The Cheapest Way To Speed Up Your PC Is your computer running slowly but dont have much cash Windows XP telling you that you have low memory Then dont panic, adding memory to your current computer is one of the cheapest, easiest upgrades that you can do yourself! Dont start ripping apart your PC just yet though. Avoid Internet Theft, Fraud and Phishing Since its birth, the Internet has grown and expanded to unprecedented, unmanageable proportions. Information, software, news, and much more flow freely through its twisted pathways. Online services such as Internet banking save time and money. However, from the depths of its vast expanse have come the dregs of society intent on preying on the new, the naïve, and the less informed. Protect Your System From the Internet Evils Ads, Spyware and Popups: the Internet is an aggressively commercial place. Internet marketing is hugely profitable; owners of frequently visited websites can make a reasonable living just off a few banner ads placed on their site. Software was quickly developed that would attempt to block these ads from loading and being displayed leaving the Internet free from irritants so the user could just view the information that they were after. Not surprisingly the Internet fought back with ads becoming more and more tricky in their execution. Spyware: What It Is and How to Combat It Spyware is software or hardware installed on a computer without the users knowledge which gathers information about that user for later retrieval by whomever controls the spyware. Is Your Computer Sick Viruses and spyware usually show up on your computer one of two ways. |
home | site map |
© 2005 |