Are you over 18 and want to see adult content?
More Annotations
![A complete backup of www.ambito.com/deportes/diego-schwartzman/el-argentina-open-tuvo-un-sabado-negro-el-retiro-schwartzman-y-la](https://www.archivebay.com/archive2/bc6ef006-de0e-4698-a1f2-a96167c52b81.png)
A complete backup of www.ambito.com/deportes/diego-schwartzman/el-argentina-open-tuvo-un-sabado-negro-el-retiro-schwartzman-y-la
Are you over 18 and want to see adult content?
![A complete backup of web.gekisaka.jp/news/detail/?297935-297935-fl](https://www.archivebay.com/archive2/ec3d78c2-d20d-45e4-a20d-56e91608a2b1.png)
A complete backup of web.gekisaka.jp/news/detail/?297935-297935-fl
Are you over 18 and want to see adult content?
![A complete backup of www.augsburger-allgemeine.de/sport/Fortuna-Duesseldorf-Gladbach-heute-im-Live-TV-Stream-Ticker-Uebertragung](https://www.archivebay.com/archive2/ee6636c5-8c69-4fe1-9943-9cccad9ea5fd.png)
A complete backup of www.augsburger-allgemeine.de/sport/Fortuna-Duesseldorf-Gladbach-heute-im-Live-TV-Stream-Ticker-Uebertragung
Are you over 18 and want to see adult content?
Favourite Annotations
![A complete backup of https://esquerra.cat](https://www.archivebay.com/archive6/images/401039d1-55da-4fd4-8a5b-97f62d8874fc.png)
A complete backup of https://esquerra.cat
Are you over 18 and want to see adult content?
![A complete backup of https://pilkey.com](https://www.archivebay.com/archive6/images/2af466d0-abc8-4888-9759-c22af71708e7.png)
A complete backup of https://pilkey.com
Are you over 18 and want to see adult content?
![A complete backup of https://academia.cat](https://www.archivebay.com/archive6/images/a5efbde6-dee3-4ebb-bd65-ed41c6218bfd.png)
A complete backup of https://academia.cat
Are you over 18 and want to see adult content?
![A complete backup of https://shavei.org](https://www.archivebay.com/archive6/images/18e14c35-32a2-4bee-a74d-7d038726b95a.png)
A complete backup of https://shavei.org
Are you over 18 and want to see adult content?
![A complete backup of https://500amoxicillin.com](https://www.archivebay.com/archive6/images/87130b78-2ced-4751-9614-55f95b89079a.png)
A complete backup of https://500amoxicillin.com
Are you over 18 and want to see adult content?
![A complete backup of https://horizon.eu](https://www.archivebay.com/archive6/images/be2d53c4-d7cf-4448-8c93-4821ca8e3b55.png)
A complete backup of https://horizon.eu
Are you over 18 and want to see adult content?
![A complete backup of https://offersfan.com](https://www.archivebay.com/archive6/images/b87a2363-9867-413e-b573-62be8347a307.png)
A complete backup of https://offersfan.com
Are you over 18 and want to see adult content?
![A complete backup of https://inchcape.co.uk](https://www.archivebay.com/archive6/images/5ad637a7-f542-4eab-851b-7a10c552639a.png)
A complete backup of https://inchcape.co.uk
Are you over 18 and want to see adult content?
![A complete backup of https://midatlanticmarketinggroup.com](https://www.archivebay.com/archive6/images/3ce0e239-48b3-4145-9879-bfd76db2470b.png)
A complete backup of https://midatlanticmarketinggroup.com
Are you over 18 and want to see adult content?
![A complete backup of https://rusjurist.ru](https://www.archivebay.com/archive6/images/f624edc0-3245-4642-bf94-f1569f3a86f4.png)
A complete backup of https://rusjurist.ru
Are you over 18 and want to see adult content?
![A complete backup of https://titleist.co.uk](https://www.archivebay.com/archive6/images/c1c20b03-6d6e-43a8-9483-e1706da56347.png)
A complete backup of https://titleist.co.uk
Are you over 18 and want to see adult content?
Text
LAKKIREDDYMADHU
A Remote Access Trojan ( RAT) is a type of malware that allows covert surveillance, a backdoor for administrative control and unfettered and unauthorized remote access to a victim’s machine. The RAT is extremely dangerous because it enables intruders to get remote control of the compromised computer. Once the host system is compromised, the FREE NETWORK DIAGRAM TOOLS CADE is a compact but powerful 2D vector editor for Windows. It includes basic Visio functionality and could be used to create diagrams, network diagrams, flowcharts, schemas, maps and so much more. Free sample diagrams are available to help you get started. CADEis
SECURITY ISSUES CAUSED BY THE WEBRTC FEATURE IN CHROME What is WebRTC? Web Real-Time Communication (WebRTC) is a collection of communications protocols and APIs originally developed by Google that enables real-time voice and video communication over peer-to-peer connections. WebRTC is a set of protocols and APIs that allow web browsers to request real-time information from the browsers of other users, enabling real-time HOW TO FIND HIDDEN & SAVED PASSWORDS IN WINDOWS 10 For years users have wanted to save time and effort when accessing servers on the network, Web sites requiring credentials, etc. So, there have been options in AUTHENTICATING SSL VPN USERS USING LDAP This example illustrates how to configure a FortiGate to use LDAP authentication to authenticate remote SSL VPN users. With a properly configured LDAP server, user and authentication data can be maintained independently of the FortiGate, accessed only when a remote user attempts to connect through the SSL VPN tunnel. Downloading and installing FSSO agent in FORTIGATE FIREWALL CONFIGURATION BACKUP AND RESTORE FortiGate Firewall Configuration Backup and Restore procedure Firmware V4.0: Do the following tasks to take FortiGate firewall backup. Steps: Connect the firewall through browser. 2. Login to the firewall (Enter User name & Password) (see Figure-4). 3. After logging in, click on System -->Dashboard --> Dashboard on the left hand side of the window(see Figure-5) 4.
HOW TO FIND ALL THE SAVED WI-FI PASSWORDS IN WINDOWS 10 In my previous blog post, I had posted a detailed explanation on how to view the currently connected network Wi-Fi password saved in Windows 10 PC. On this post, we are going to see ALL the Wi-Fi passwords (currently connected and previously connected networks, even if you’re not connected to them anymore) saved in the MCAFEE AGENT CANNOT BE REMOVED WHILE IT IS IN MANAGED MODE Problem: The following message displays when select Remove for the McAfee Agent through Add \ Remove Programs or Programs and Features on client computers: " McAfee Agent cannot be removed while it is in managed mode" Solution: The computer must be removed from Managed Mode Steps: 1- Open Command Prompt 2- Go to the folder" C:\Program Files(x86)\McAfee\Common
ENABLE MULTIPLE CONCURRENT REMOTE DESKTOP CONNECTIONS-OR Enable multiple concurrent remote desktop connections-or-sessions in Windows Xp: Windows XP Professional and Windows XP Media Center Edition (MCE) have Remote Desktop (RDP) service that allows the computer to be remotely connected, accessed and controlled from another computer or host. However, Windows XP machine only allows one concurrent remote desktop MCAFEE EPO ADMIN PASSWORD LOST McAfee ePO Admin password lost: Some time ago I started attending trainings and discussions with industry experts, on McAfee ePO and started learning many things from them. During these sessions I came across some issues with McAfee 4.x and 5.x installation. I have uploaded solutions to some of these issues on my blog, pleaseLAKKIREDDYMADHU
A Remote Access Trojan ( RAT) is a type of malware that allows covert surveillance, a backdoor for administrative control and unfettered and unauthorized remote access to a victim’s machine. The RAT is extremely dangerous because it enables intruders to get remote control of the compromised computer. Once the host system is compromised, the FREE NETWORK DIAGRAM TOOLS CADE is a compact but powerful 2D vector editor for Windows. It includes basic Visio functionality and could be used to create diagrams, network diagrams, flowcharts, schemas, maps and so much more. Free sample diagrams are available to help you get started. CADEis
SECURITY ISSUES CAUSED BY THE WEBRTC FEATURE IN CHROME What is WebRTC? Web Real-Time Communication (WebRTC) is a collection of communications protocols and APIs originally developed by Google that enables real-time voice and video communication over peer-to-peer connections. WebRTC is a set of protocols and APIs that allow web browsers to request real-time information from the browsers of other users, enabling real-time HOW TO FIND HIDDEN & SAVED PASSWORDS IN WINDOWS 10 For years users have wanted to save time and effort when accessing servers on the network, Web sites requiring credentials, etc. So, there have been options in AUTHENTICATING SSL VPN USERS USING LDAP This example illustrates how to configure a FortiGate to use LDAP authentication to authenticate remote SSL VPN users. With a properly configured LDAP server, user and authentication data can be maintained independently of the FortiGate, accessed only when a remote user attempts to connect through the SSL VPN tunnel. Downloading and installing FSSO agent in FORTIGATE FIREWALL CONFIGURATION BACKUP AND RESTORE FortiGate Firewall Configuration Backup and Restore procedure Firmware V4.0: Do the following tasks to take FortiGate firewall backup. Steps: Connect the firewall through browser. 2. Login to the firewall (Enter User name & Password) (see Figure-4). 3. After logging in, click on System -->Dashboard --> Dashboard on the left hand side of the window(see Figure-5) 4.
HOW TO FIND ALL THE SAVED WI-FI PASSWORDS IN WINDOWS 10 In my previous blog post, I had posted a detailed explanation on how to view the currently connected network Wi-Fi password saved in Windows 10 PC. On this post, we are going to see ALL the Wi-Fi passwords (currently connected and previously connected networks, even if you’re not connected to them anymore) saved in the MCAFEE AGENT CANNOT BE REMOVED WHILE IT IS IN MANAGED MODE Problem: The following message displays when select Remove for the McAfee Agent through Add \ Remove Programs or Programs and Features on client computers: " McAfee Agent cannot be removed while it is in managed mode" Solution: The computer must be removed from Managed Mode Steps: 1- Open Command Prompt 2- Go to the folder" C:\Program Files(x86)\McAfee\Common
ENABLE MULTIPLE CONCURRENT REMOTE DESKTOP CONNECTIONS-OR Enable multiple concurrent remote desktop connections-or-sessions in Windows Xp: Windows XP Professional and Windows XP Media Center Edition (MCE) have Remote Desktop (RDP) service that allows the computer to be remotely connected, accessed and controlled from another computer or host. However, Windows XP machine only allows one concurrent remote desktop MCAFEE EPO ADMIN PASSWORD LOST McAfee ePO Admin password lost: Some time ago I started attending trainings and discussions with industry experts, on McAfee ePO and started learning many things from them. During these sessions I came across some issues with McAfee 4.x and 5.x installation. I have uploaded solutions to some of these issues on my blog, pleaseLAKKIREDDYMADHU
A Remote Access Trojan ( RAT) is a type of malware that allows covert surveillance, a backdoor for administrative control and unfettered and unauthorized remote access to a victim’s machine. The RAT is extremely dangerous because it enables intruders to get remote control of the compromised computer. Once the host system is compromised, the FREE NETWORK DIAGRAM TOOLS At some point, every administrator will need to diagram a network. For some, it's their primary duty — and they tend to rely on powerful, expensive tools like Microsoft Visio. But for those who need to use a diagramming tool only occasionally, a cheaper CISCO NETWORK TOPOLOGY ICONS A couple of popular ones are VRT Network Equipment and Cisco Network Topology Icons. To apply for the VRT Network Equipment icons, go to Tools > Extension Manager > Add > choose the extension file you downloaded and it will be added automatically to your extension list. Alternatively, if you have your own icons or images you wish to use inyour
STOP USING THE INSECURE SMBV1/SMB1 PROTOCOL The recent WannaCry ransomware outbreak spread because of a vulnerability in one of the internet's most ancient networking protocols, Server Message Block version 1 (aka SMBv1 / SMB 1). Barry Feigenbaum originally designed SMB at IBM. Microsoft has made considerable modifications to the most commonly used version. Microsoft merged the SMB protocol with the LAN Manager product. WHAT IS THAT POPUP ON WINDOWS 10 THAT DISAPPEARS AFTER A If you run Windows 10, you may have noticed a popup window being launched on the screen once a day, or even regularly. It is spawned and immediately closed again. This makes it difficult to understand what spawns it, why it is launched, and whether MCAFEE EPO ADMIN PASSWORD LOST McAfee ePO Admin password lost: Some time ago I started attending trainings and discussions with industry experts, on McAfee ePO and started learning many things from them. During these sessions I came across some issues with McAfee 4.x and 5.x installation. I have uploaded solutions to some of these issues on my blog, please SCHEDULING AUTOMATED BACKUP USING SQL SERVER 2008 Scheduling automated backup using SQL server 2008: It is very important to take backups for the database files on regular basis. Microsoft SQL server 2008 has made this task very easy. Users can schedule the backup to be taken at a particular interval Users can schedule the backup copies to be deleted at a particular MCAFEE EPO SQL CREDENTIALS LOST Expand Security, Logins and double-click the ‘sa’ account (or) right click on ‘sa’ click on ‘Properties (see Image-4) Image-4. Type and confirm a password in the General tab under Login name section. Click on ‘OK’. Open McAfee ePO web console window (see Image-2) Type ‘sa’ in the User name field. Click on the changepassword.
HOW TO ENABLE ADMINISTRATOR ACCOUNT IN WINDOWS 8.1 Use the following steps to active administrator account. Open the command prompt as Administrator Normally, the command prompt can be opened as a regular user to run commands that don’t require administrative rights. However, if you need to run a command that requires administrative rights, you must open the command prompt window as administrator. HOW TO REMOTELY ENABLE REMOTE DESKTOP (TERMINAL SERVICES Remote Desktop or RDP service is a free yet useful tool to remotely log on to remote computer and gain full access and privileges as if user is in front of local console. Remote Desktop is also known as Terminal Services. It’s useful if the server, or PC, is located miles away in remote location and frequent trips to the site to troubleshoot, configure or manage the system is not a viableLAKKIREDDYMADHU
A Remote Access Trojan ( RAT) is a type of malware that allows covert surveillance, a backdoor for administrative control and unfettered and unauthorized remote access to a victim’s machine. The RAT is extremely dangerous because it enables intruders to get remote control of the compromised computer. Once the host system is compromised, the HOW TO FIND HIDDEN & SAVED PASSWORDS IN WINDOWS 10 For years users have wanted to save time and effort when accessing servers on the network, Web sites requiring credentials, etc. So, there have been options in CISCO NETWORK TOPOLOGY ICONS A couple of popular ones are VRT Network Equipment and Cisco Network Topology Icons. To apply for the VRT Network Equipment icons, go to Tools > Extension Manager > Add > choose the extension file you downloaded and it will be added automatically to your extension list. Alternatively, if you have your own icons or images you wish to use inyour
FORTIGATE FIREWALL CONFIGURATION BACKUP AND RESTORE FortiGate Firewall Configuration Backup and Restore procedure Firmware V4.0: Do the following tasks to take FortiGate firewall backup. Steps: Connect the firewall through browser. 2. Login to the firewall (Enter User name & Password) (see Figure-4). 3. After logging in, click on System -->Dashboard --> Dashboard on the left hand side of the window(see Figure-5) 4.
SECURITY ISSUES CAUSED BY THE WEBRTC FEATURE IN CHROME What is WebRTC? Web Real-Time Communication (WebRTC) is a collection of communications protocols and APIs originally developed by Google that enables real-time voice and video communication over peer-to-peer connections. WebRTC is a set of protocols and APIs that allow web browsers to request real-time information from the browsers of other users, enabling real-time AUTHENTICATING SSL VPN USERS USING LDAP This example illustrates how to configure a FortiGate to use LDAP authentication to authenticate remote SSL VPN users. With a properly configured LDAP server, user and authentication data can be maintained independently of the FortiGate, accessed only when a remote user attempts to connect through the SSL VPN tunnel. Downloading and installing FSSO agent in HOW TO FIND ALL THE SAVED WI-FI PASSWORDS IN WINDOWS 10 In my previous blog post, I had posted a detailed explanation on how to view the currently connected network Wi-Fi password saved in Windows 10 PC. On this post, we are going to see ALL the Wi-Fi passwords (currently connected and previously connected networks, even if you’re not connected to them anymore) saved in the MCAFEE AGENT CANNOT BE REMOVED WHILE IT IS IN MANAGED MODE Problem: The following message displays when select Remove for the McAfee Agent through Add \ Remove Programs or Programs and Features on client computers: " McAfee Agent cannot be removed while it is in managed mode" Solution: The computer must be removed from Managed Mode Steps: 1- Open Command Prompt 2- Go to the folder" C:\Program Files(x86)\McAfee\Common
MCAFEE EPO ADMIN INTERVIEW QUESTIONS & ANSWERS Q.1 What is McAfee ePO ? McAfee ePolicy Orchestrator (McAfee ePO) is the most advanced, extensible, and scalable centralized security management software in the industry. A single console for all your security management. Get a unified view of your security posture with drag-and-drop dashboards that provide security intelligence across endpoints, data, mobile and networks. MCAFEE EPO ADMIN PASSWORD LOST McAfee ePO Admin password lost: Some time ago I started attending trainings and discussions with industry experts, on McAfee ePO and started learning many things from them. During these sessions I came across some issues with McAfee 4.x and 5.x installation. I have uploaded solutions to some of these issues on my blog, pleaseLAKKIREDDYMADHU
A Remote Access Trojan ( RAT) is a type of malware that allows covert surveillance, a backdoor for administrative control and unfettered and unauthorized remote access to a victim’s machine. The RAT is extremely dangerous because it enables intruders to get remote control of the compromised computer. Once the host system is compromised, the HOW TO FIND HIDDEN & SAVED PASSWORDS IN WINDOWS 10 For years users have wanted to save time and effort when accessing servers on the network, Web sites requiring credentials, etc. So, there have been options in CISCO NETWORK TOPOLOGY ICONS A couple of popular ones are VRT Network Equipment and Cisco Network Topology Icons. To apply for the VRT Network Equipment icons, go to Tools > Extension Manager > Add > choose the extension file you downloaded and it will be added automatically to your extension list. Alternatively, if you have your own icons or images you wish to use inyour
FORTIGATE FIREWALL CONFIGURATION BACKUP AND RESTORE FortiGate Firewall Configuration Backup and Restore procedure Firmware V4.0: Do the following tasks to take FortiGate firewall backup. Steps: Connect the firewall through browser. 2. Login to the firewall (Enter User name & Password) (see Figure-4). 3. After logging in, click on System -->Dashboard --> Dashboard on the left hand side of the window(see Figure-5) 4.
SECURITY ISSUES CAUSED BY THE WEBRTC FEATURE IN CHROME What is WebRTC? Web Real-Time Communication (WebRTC) is a collection of communications protocols and APIs originally developed by Google that enables real-time voice and video communication over peer-to-peer connections. WebRTC is a set of protocols and APIs that allow web browsers to request real-time information from the browsers of other users, enabling real-time AUTHENTICATING SSL VPN USERS USING LDAP This example illustrates how to configure a FortiGate to use LDAP authentication to authenticate remote SSL VPN users. With a properly configured LDAP server, user and authentication data can be maintained independently of the FortiGate, accessed only when a remote user attempts to connect through the SSL VPN tunnel. Downloading and installing FSSO agent in HOW TO FIND ALL THE SAVED WI-FI PASSWORDS IN WINDOWS 10 In my previous blog post, I had posted a detailed explanation on how to view the currently connected network Wi-Fi password saved in Windows 10 PC. On this post, we are going to see ALL the Wi-Fi passwords (currently connected and previously connected networks, even if you’re not connected to them anymore) saved in the MCAFEE AGENT CANNOT BE REMOVED WHILE IT IS IN MANAGED MODE Problem: The following message displays when select Remove for the McAfee Agent through Add \ Remove Programs or Programs and Features on client computers: " McAfee Agent cannot be removed while it is in managed mode" Solution: The computer must be removed from Managed Mode Steps: 1- Open Command Prompt 2- Go to the folder" C:\Program Files(x86)\McAfee\Common
MCAFEE EPO ADMIN INTERVIEW QUESTIONS & ANSWERS Q.1 What is McAfee ePO ? McAfee ePolicy Orchestrator (McAfee ePO) is the most advanced, extensible, and scalable centralized security management software in the industry. A single console for all your security management. Get a unified view of your security posture with drag-and-drop dashboards that provide security intelligence across endpoints, data, mobile and networks. MCAFEE EPO ADMIN PASSWORD LOST McAfee ePO Admin password lost: Some time ago I started attending trainings and discussions with industry experts, on McAfee ePO and started learning many things from them. During these sessions I came across some issues with McAfee 4.x and 5.x installation. I have uploaded solutions to some of these issues on my blog, pleaseLAKKIREDDYMADHU
A Remote Access Trojan ( RAT) is a type of malware that allows covert surveillance, a backdoor for administrative control and unfettered and unauthorized remote access to a victim’s machine. The RAT is extremely dangerous because it enables intruders to get remote control of the compromised computer. Once the host system is compromised, the ABOUT – LAKKIREDDYMADHU Hi! I am Madhusudhana Reddy, born and raised in India. Currently residing in New Jersey, USA. There are two types of companies in the world: Humanity-Plus companies and Humanity-Minus companies. Humanity-Plus companies are companies working on solutions or products that push the human race forward. Humanity-Minus companies are companies that are increasing shareholder value or making a FREE NETWORK DIAGRAM TOOLS At some point, every administrator will need to diagram a network. For some, it's their primary duty — and they tend to rely on powerful, expensive tools like Microsoft Visio. But for those who need to use a diagramming tool only occasionally, a cheaper HOW TO CHANGE IP ADDRESS USING A BATCH FILE SCRIPT ON How to change IP address using a Batch File: Starting with Windows 2000, Microsoft has provided a powerful utility, Netsh, which lets you display and modify the network configuration of Windows computers. You can use the Netsh on the command line or in a batch file. Here's an example of how you can create a STOP USING THE INSECURE SMBV1/SMB1 PROTOCOL The recent WannaCry ransomware outbreak spread because of a vulnerability in one of the internet's most ancient networking protocols, Server Message Block version 1 (aka SMBv1 / SMB 1). Barry Feigenbaum originally designed SMB at IBM. Microsoft has made considerable modifications to the most commonly used version. Microsoft merged the SMB protocol with the LAN Manager product. MCAFEE EPO SQL CREDENTIALS LOST Expand Security, Logins and double-click the ‘sa’ account (or) right click on ‘sa’ click on ‘Properties (see Image-4) Image-4. Type and confirm a password in the General tab under Login name section. Click on ‘OK’. Open McAfee ePO web console window (see Image-2) Type ‘sa’ in the User name field. Click on the changepassword.
HOW TO REMOTELY ENABLE REMOTE DESKTOP (TERMINAL SERVICES Remote Desktop or RDP service is a free yet useful tool to remotely log on to remote computer and gain full access and privileges as if user is in front of local console. Remote Desktop is also known as Terminal Services. It’s useful if the server, or PC, is located miles away in remote location and frequent trips to the site to troubleshoot, configure or manage the system is not a viable ENABLE MULTIPLE CONCURRENT REMOTE DESKTOP CONNECTIONS-OR Enable multiple concurrent remote desktop connections-or-sessions in Windows Xp: Windows XP Professional and Windows XP Media Center Edition (MCE) have Remote Desktop (RDP) service that allows the computer to be remotely connected, accessed and controlled from another computer or host. However, Windows XP machine only allows one concurrent remote desktop G SUITE (GOOGLE APPS): HOW TO SEND REPLY MAIL FROM ALIAS Every Google Apps user has a primary address for signing in to their account and receiving mail. If a user wants another address for receiving mail, you can give them an email alias. For example, if mail@lakkireddymadhu.com wants to also receive the email sent to sales@lakkireddymadhu.com, create the alias sales@lakkireddymadhu.com. Mail sent to either address then appears in mail HOW TO ENABLE ADMINISTRATOR ACCOUNT IN WINDOWS 8.1 Use the following steps to active administrator account. Open the command prompt as Administrator Normally, the command prompt can be opened as a regular user to run commands that don’t require administrative rights. However, if you need to run a command that requires administrative rights, you must open the command prompt window as administrator.LAKKIREDDYMADHU
What is RAT (Remote Access Trojan)? A Remote Access Trojan (RAT) is a type of malware that allows covert surveillance, a backdoor for administrative control and unfettered and unauthorized remote access to a victim’s machine.The RAT is extremely dangerous because it enables intruders to get remote control of the compromised computer. FREE NETWORK DIAGRAM TOOLS At some point, every administrator will need to diagram a network. For some, it's their primary duty — and they tend to rely on powerful, expensive tools like Microsoft Visio. But for those who need to use a diagramming tool only occasionally, a cheaper HOW TO FIND HIDDEN & SAVED PASSWORDS IN WINDOWS 10 For years users have wanted to save time and effort when accessing servers on the network, Web sites requiring credentials, etc. So, there have been options in CISCO NETWORK TOPOLOGY ICONS At some point, every administrator will need to diagram a network. For some, it’s their primary duty — and they tend to rely on powerful, expensive tools like Microsoft Visio. AUTHENTICATING SSL VPN USERS USING LDAP This example illustrates how to configure a FortiGate to use LDAP authentication to authenticate remote SSL VPN users. With a properly configured LDAP server, user and authentication data can be maintained independently of the FortiGate, accessed only when a remote user attempts to connect through the SSL VPN tunnel. Downloading and installing FSSO agent in SECURITY ISSUES CAUSED BY THE WEBRTC FEATURE IN CHROME What is WebRTC? Web Real-Time Communication (WebRTC) is a collection of communications protocols and APIs originally developed by Google that enables real-time voice and video communication over peer-to-peer connections. WebRTC is a set of protocols and APIs that allow web browsers to request real-time information from the browsers of other users, enabling real-time HOW TO FIND ALL THE SAVED WI-FI PASSWORDS IN WINDOWS 10 In my previous blog post, I had posted a detailed explanation on how to view the currently connected network Wi-Fi password saved in Windows 10 PC. On this post, we are going to see ALL the Wi-Fi passwords (currently connected and previously connected networks, even if you’re not connected to them anymore) saved in the FORTIGATE FIREWALL CONFIGURATION BACKUP AND RESTORE FortiGate Firewall Configuration Backup and Restore procedure Firmware V4.0: Do the following tasks to take FortiGate firewall backup. Steps: Connect the firewall through browser. 2. Login to the firewall (Enter User name & Password) (see Figure-4). 3. After logging in, click on System -->Dashboard --> Dashboard on the left hand side of the window(see Figure-5) 4.
MCAFEE AGENT CANNOT BE REMOVED WHILE IT IS IN MANAGED MODE Problem: The following message displays when select Remove for the McAfee Agent through Add \ Remove Programs or Programs and Features on client computers: " McAfee Agent cannot be removed while it is in managed mode" Solution: The computer must be removed from Managed Mode Steps: 1- Open Command Prompt 2- Go to the folder" C:\Program Files(x86)\McAfee\Common
MCAFEE EPO ADMIN PASSWORD LOST McAfee ePO Admin password lost: Some time ago I started attending trainings and discussions with industry experts, on McAfee ePO and started learning many things from them. During these sessions I came across some issues with McAfee 4.x and 5.x installation. I have uploaded solutions to some of these issues on my blog, pleaseLAKKIREDDYMADHU
What is RAT (Remote Access Trojan)? A Remote Access Trojan (RAT) is a type of malware that allows covert surveillance, a backdoor for administrative control and unfettered and unauthorized remote access to a victim’s machine.The RAT is extremely dangerous because it enables intruders to get remote control of the compromised computer. FREE NETWORK DIAGRAM TOOLS At some point, every administrator will need to diagram a network. For some, it's their primary duty — and they tend to rely on powerful, expensive tools like Microsoft Visio. But for those who need to use a diagramming tool only occasionally, a cheaper HOW TO FIND HIDDEN & SAVED PASSWORDS IN WINDOWS 10 For years users have wanted to save time and effort when accessing servers on the network, Web sites requiring credentials, etc. So, there have been options in CISCO NETWORK TOPOLOGY ICONS At some point, every administrator will need to diagram a network. For some, it’s their primary duty — and they tend to rely on powerful, expensive tools like Microsoft Visio. AUTHENTICATING SSL VPN USERS USING LDAP This example illustrates how to configure a FortiGate to use LDAP authentication to authenticate remote SSL VPN users. With a properly configured LDAP server, user and authentication data can be maintained independently of the FortiGate, accessed only when a remote user attempts to connect through the SSL VPN tunnel. Downloading and installing FSSO agent in SECURITY ISSUES CAUSED BY THE WEBRTC FEATURE IN CHROME What is WebRTC? Web Real-Time Communication (WebRTC) is a collection of communications protocols and APIs originally developed by Google that enables real-time voice and video communication over peer-to-peer connections. WebRTC is a set of protocols and APIs that allow web browsers to request real-time information from the browsers of other users, enabling real-time HOW TO FIND ALL THE SAVED WI-FI PASSWORDS IN WINDOWS 10 In my previous blog post, I had posted a detailed explanation on how to view the currently connected network Wi-Fi password saved in Windows 10 PC. On this post, we are going to see ALL the Wi-Fi passwords (currently connected and previously connected networks, even if you’re not connected to them anymore) saved in the FORTIGATE FIREWALL CONFIGURATION BACKUP AND RESTORE FortiGate Firewall Configuration Backup and Restore procedure Firmware V4.0: Do the following tasks to take FortiGate firewall backup. Steps: Connect the firewall through browser. 2. Login to the firewall (Enter User name & Password) (see Figure-4). 3. After logging in, click on System -->Dashboard --> Dashboard on the left hand side of the window(see Figure-5) 4.
MCAFEE AGENT CANNOT BE REMOVED WHILE IT IS IN MANAGED MODE Problem: The following message displays when select Remove for the McAfee Agent through Add \ Remove Programs or Programs and Features on client computers: " McAfee Agent cannot be removed while it is in managed mode" Solution: The computer must be removed from Managed Mode Steps: 1- Open Command Prompt 2- Go to the folder" C:\Program Files(x86)\McAfee\Common
MCAFEE EPO ADMIN PASSWORD LOST McAfee ePO Admin password lost: Some time ago I started attending trainings and discussions with industry experts, on McAfee ePO and started learning many things from them. During these sessions I came across some issues with McAfee 4.x and 5.x installation. I have uploaded solutions to some of these issues on my blog, pleaseLAKKIREDDYMADHU
What is RAT (Remote Access Trojan)? A Remote Access Trojan (RAT) is a type of malware that allows covert surveillance, a backdoor for administrative control and unfettered and unauthorized remote access to a victim’s machine.The RAT is extremely dangerous because it enables intruders to get remote control of the compromised computer. HOW TO CHANGE IP ADDRESS USING A BATCH FILE SCRIPT ON How to change IP address using a Batch File: Starting with Windows 2000, Microsoft has provided a powerful utility, Netsh, which lets you display and modify the network configuration of Windows computers. You can use the Netsh on the command line or in a batch file. Here's an example of how you can create a MCAFEE EPO ADMIN INTERVIEW QUESTIONS & ANSWERS Q.1 What is McAfee ePO ? McAfee ePolicy Orchestrator (McAfee ePO) is the most advanced, extensible, and scalable centralized security management software in the industry. THE END OF LIFE (EOL) FOR WINDOWS 7 A new reminder for those who are still holding on to the Windows 7 operating system, you have 9 months left until Microsoft ends support for its 9-year-old operating system, i.e. on January 14, 2020. This was actually supposed to have happened already, but due to many industries with applications that do not support anything STOP USING THE INSECURE SMBV1/SMB1 PROTOCOL The recent WannaCry ransomware outbreak spread because of a vulnerability in one of the internet's most ancient networking protocols, Server Message Block version 1 (aka SMBv1 / SMB 1). Barry Feigenbaum originally designed SMB at IBM. Microsoft has made considerable modifications to the most commonly used version. Microsoft merged the SMB protocol with the LAN Manager product. MCAFEE EPO – LAKKIREDDYMADHU McAfee ePO Admin password lost: . Some time ago I started attending trainings and discussions with industry experts, on McAfee ePO and started learning many things from them. During these sessions I came across some issues with McAfee 4. x and 5. x installation. I have uploaded solutions to some of these issues on my blog, please referthe following link:
HOW TO ENABLE ADMINISTRATOR ACCOUNT IN WINDOWS 8.1 Use the following steps to active administrator account. Open the command prompt as Administrator Normally, the command prompt can be opened as a regular user to run commands that don’t require administrative rights. However, if you need to run a command that requires administrative rights, you must open the command prompt window as administrator. FORTIGATE FIREWALL CONFIGURATION BACKUP AND RESTORE FortiGate Firewall Configuration Backup and Restore procedure Firmware V3.0: Do the following tasks to take FortiGate firewall backup. Steps: Connect the firewall through browser. Login to the firewall (Enter User name & Password) (see Figure-1) 3. After logging in, click on System -->Maintenance -->Backup & Restore on the left hand side of the window (see Figure-2). NETSH WLAN SHOW PROFILE “NETWORK NAME” KEY=CLEAR In my previous blog post, I had posted a detailed explanation on how to view the currently connected network Wi-Fi password saved inWindows 10 PC.
MCAFEE EPO SQL CREDENTIALS LOST McAfee ePO SQL credentials lost: While I was searching for the solution what if I lost McAfee ePO admin password and there were no additional accounts configured, some ofLAKKIREDDYMADHU
A Remote Access Trojan ( RAT) is a type of malware that allows covert surveillance, a backdoor for administrative control and unfettered and unauthorized remote access to a victim’s machine. The RAT is extremely dangerous because it enables intruders to get remote control of the compromised computer. Once the host system is compromised, the FREE NETWORK DIAGRAM TOOLS CADE is a compact but powerful 2D vector editor for Windows. It includes basic Visio functionality and could be used to create diagrams, network diagrams, flowcharts, schemas, maps and so much more. Free sample diagrams are available to help you get started. CADEis
CISCO NETWORK TOPOLOGY ICONS A couple of popular ones are VRT Network Equipment and Cisco Network Topology Icons. To apply for the VRT Network Equipment icons, go to Tools > Extension Manager > Add > choose the extension file you downloaded and it will be added automatically to your extension list. Alternatively, if you have your own icons or images you wish to use inyour
HOW TO FIND HIDDEN & SAVED PASSWORDS IN WINDOWS 10 For years users have wanted to save time and effort when accessing servers on the network, Web sites requiring credentials, etc. So, there have been options in AUTHENTICATING SSL VPN USERS USING LDAP This example illustrates how to configure a FortiGate to use LDAP authentication to authenticate remote SSL VPN users. With a properly configured LDAP server, user and authentication data can be maintained independently of the FortiGate, accessed only when a remote user attempts to connect through the SSL VPN tunnel. Downloading and installing FSSO agent in SECURITY ISSUES CAUSED BY THE WEBRTC FEATURE IN CHROME What is WebRTC? Web Real-Time Communication (WebRTC) is a collection of communications protocols and APIs originally developed by Google that enables real-time voice and video communication over peer-to-peer connections. WebRTC is a set of protocols and APIs that allow web browsers to request real-time information from the browsers of other users, enabling real-time MCAFEE AGENT CANNOT BE REMOVED WHILE IT IS IN MANAGED MODE Problem: The following message displays when select Remove for the McAfee Agent through Add \ Remove Programs or Programs and Features on client computers: " McAfee Agent cannot be removed while it is in managed mode" Solution: The computer must be removed from Managed Mode Steps: 1- Open Command Prompt 2- Go to the folder" C:\Program Files(x86)\McAfee\Common
FORTIGATE FIREWALL CONFIGURATION BACKUP AND RESTOREFORTIGATE AUTO BACKUP SCRIPTFORTIGATE BACKUP CONFIGFORTIGATE EXPORT CONFIGURATION FortiGate Firewall Configuration Backup and Restore procedure Firmware V4.0: Do the following tasks to take FortiGate firewall backup. Steps: Connect the firewall through browser. 2. Login to the firewall (Enter User name & Password) (see Figure-4). 3. After logging in, click on System -->Dashboard --> Dashboard on the left hand side of the window(see Figure-5) 4.
HOW TO FIND ALL THE SAVED WI-FI PASSWORDS IN WINDOWS 10 In my previous blog post, I had posted a detailed explanation on how to view the currently connected network Wi-Fi password saved in Windows 10 PC. On this post, we are going to see ALL the Wi-Fi passwords (currently connected and previously connected networks, even if you’re not connected to them anymore) saved in the MCAFEE EPO ADMIN PASSWORD LOST McAfee ePO Admin password lost: Some time ago I started attending trainings and discussions with industry experts, on McAfee ePO and started learning many things from them. During these sessions I came across some issues with McAfee 4.x and 5.x installation. I have uploaded solutions to some of these issues on my blog, pleaseLAKKIREDDYMADHU
A Remote Access Trojan ( RAT) is a type of malware that allows covert surveillance, a backdoor for administrative control and unfettered and unauthorized remote access to a victim’s machine. The RAT is extremely dangerous because it enables intruders to get remote control of the compromised computer. Once the host system is compromised, the FREE NETWORK DIAGRAM TOOLS CADE is a compact but powerful 2D vector editor for Windows. It includes basic Visio functionality and could be used to create diagrams, network diagrams, flowcharts, schemas, maps and so much more. Free sample diagrams are available to help you get started. CADEis
CISCO NETWORK TOPOLOGY ICONS A couple of popular ones are VRT Network Equipment and Cisco Network Topology Icons. To apply for the VRT Network Equipment icons, go to Tools > Extension Manager > Add > choose the extension file you downloaded and it will be added automatically to your extension list. Alternatively, if you have your own icons or images you wish to use inyour
HOW TO FIND HIDDEN & SAVED PASSWORDS IN WINDOWS 10 For years users have wanted to save time and effort when accessing servers on the network, Web sites requiring credentials, etc. So, there have been options in AUTHENTICATING SSL VPN USERS USING LDAP This example illustrates how to configure a FortiGate to use LDAP authentication to authenticate remote SSL VPN users. With a properly configured LDAP server, user and authentication data can be maintained independently of the FortiGate, accessed only when a remote user attempts to connect through the SSL VPN tunnel. Downloading and installing FSSO agent in SECURITY ISSUES CAUSED BY THE WEBRTC FEATURE IN CHROME What is WebRTC? Web Real-Time Communication (WebRTC) is a collection of communications protocols and APIs originally developed by Google that enables real-time voice and video communication over peer-to-peer connections. WebRTC is a set of protocols and APIs that allow web browsers to request real-time information from the browsers of other users, enabling real-time FORTIGATE FIREWALL CONFIGURATION BACKUP AND RESTOREFORTIGATE AUTO BACKUP SCRIPTFORTIGATE BACKUP CONFIGFORTIGATE EXPORT CONFIGURATION FortiGate Firewall Configuration Backup and Restore procedure Firmware V4.0: Do the following tasks to take FortiGate firewall backup. Steps: Connect the firewall through browser. 2. Login to the firewall (Enter User name & Password) (see Figure-4). 3. After logging in, click on System -->Dashboard --> Dashboard on the left hand side of the window(see Figure-5) 4.
MCAFEE AGENT CANNOT BE REMOVED WHILE IT IS IN MANAGED MODE Problem: The following message displays when select Remove for the McAfee Agent through Add \ Remove Programs or Programs and Features on client computers: " McAfee Agent cannot be removed while it is in managed mode" Solution: The computer must be removed from Managed Mode Steps: 1- Open Command Prompt 2- Go to the folder" C:\Program Files(x86)\McAfee\Common
HOW TO FIND ALL THE SAVED WI-FI PASSWORDS IN WINDOWS 10 In my previous blog post, I had posted a detailed explanation on how to view the currently connected network Wi-Fi password saved in Windows 10 PC. On this post, we are going to see ALL the Wi-Fi passwords (currently connected and previously connected networks, even if you’re not connected to them anymore) saved in the MCAFEE EPO ADMIN PASSWORD LOST McAfee ePO Admin password lost: Some time ago I started attending trainings and discussions with industry experts, on McAfee ePO and started learning many things from them. During these sessions I came across some issues with McAfee 4.x and 5.x installation. I have uploaded solutions to some of these issues on my blog, pleaseLAKKIREDDYMADHU
A Remote Access Trojan ( RAT) is a type of malware that allows covert surveillance, a backdoor for administrative control and unfettered and unauthorized remote access to a victim’s machine. The RAT is extremely dangerous because it enables intruders to get remote control of the compromised computer. Once the host system is compromised, the ABOUT – LAKKIREDDYMADHU Hi! I am Madhusudhana Reddy, born and raised in India. Currently residing in New Jersey, USA. There are two types of companies in the world: Humanity-Plus companies and Humanity-Minus companies. Humanity-Plus companies are companies working on solutions or products that push the human race forward. Humanity-Minus companies are companies that are increasing shareholder value or making a FORTIGATE FIREWALL CONFIGURATION BACKUP AND RESTORE FortiGate Firewall Configuration Backup and Restore procedure Firmware V4.0: Do the following tasks to take FortiGate firewall backup. Steps: Connect the firewall through browser. 2. Login to the firewall (Enter User name & Password) (see Figure-4). 3. After logging in, click on System -->Dashboard --> Dashboard on the left hand side of the window(see Figure-5) 4.
COMPUTER SHORTCUT KEYS: Computer shortcut keys provide an easier and usually quicker method for navigating and using computer software programs. Shortcut keys usually consist of an Alt key, Ctrl, and/or Shift key in conjunction with a single letter. The de facto standard for listing a shortcut is listing the modifier key, a plus symbol, and the single character. MCAFEE EPO – LAKKIREDDYMADHU McAfee ePO Admin password lost: . Some time ago I started attending trainings and discussions with industry experts, on McAfee ePO and started learning many things from them. During these sessions I came across some issues with McAfee 4. x and 5. x installation. I have uploaded solutions to some of these issues on my blog, please referthe following link:
HOW TO CHANGE IP ADDRESS USING A BATCH FILE SCRIPT ON How to change IP address using a Batch File: Starting with Windows 2000, Microsoft has provided a powerful utility, Netsh, which lets you display and modify the network configuration of Windows computers. You can use the Netsh on the command line or in a batch file. Here's an example of how you can create a STOP USING THE INSECURE SMBV1/SMB1 PROTOCOL The recent WannaCry ransomware outbreak spread because of a vulnerability in one of the internet's most ancient networking protocols, Server Message Block version 1 (aka SMBv1 / SMB 1). Barry Feigenbaum originally designed SMB at IBM. Microsoft has made considerable modifications to the most commonly used version. Microsoft merged the SMB protocol with the LAN Manager product. THE END OF LIFE (EOL) FOR WINDOWS 7 The End Of Life (EOL) for Windows 7. A new reminder for those who are still holding on to the Windows 7 operating system, you have 9 months left until Microsoft ends support for its 9-year-old operating system, i.e. on January 14, 2020. This was actually supposed to have happened already, but due to many industries with applications that do not SCHEDULING AUTOMATED BACKUP USING SQL SERVER 2008 Scheduling automated backup using SQL server 2008: It is very important to take backups for the database files on regular basis. Microsoft SQL server 2008 has made this task very easy. Users can schedule the backup to be taken at a particular interval Users can schedule the backup copies to be deleted at a particular G SUITE (GOOGLE APPS): HOW TO SEND REPLY MAIL FROM ALIAS Every Google Apps user has a primary address for signing in to their account and receiving mail. If a user wants another address for receiving mail, you can give them an email alias. For example, if mail@lakkireddymadhu.com wants to also receive the email sent to sales@lakkireddymadhu.com, create the alias sales@lakkireddymadhu.com. Mail sent to either address then appears in mailLAKKIREDDYMADHU
A Remote Access Trojan ( RAT) is a type of malware that allows covert surveillance, a backdoor for administrative control and unfettered and unauthorized remote access to a victim’s machine. The RAT is extremely dangerous because it enables intruders to get remote control of the compromised computer. Once the host system is compromised, the FREE NETWORK DIAGRAM TOOLS CADE is a compact but powerful 2D vector editor for Windows. It includes basic Visio functionality and could be used to create diagrams, network diagrams, flowcharts, schemas, maps and so much more. Free sample diagrams are available to help you get started. CADEis
CISCO NETWORK TOPOLOGY ICONS A couple of popular ones are VRT Network Equipment and Cisco Network Topology Icons. To apply for the VRT Network Equipment icons, go to Tools > Extension Manager > Add > choose the extension file you downloaded and it will be added automatically to your extension list. Alternatively, if you have your own icons or images you wish to use inyour
HOW TO FIND HIDDEN & SAVED PASSWORDS IN WINDOWS 10 For years users have wanted to save time and effort when accessing servers on the network, Web sites requiring credentials, etc. So, there have been options in AUTHENTICATING SSL VPN USERS USING LDAP This example illustrates how to configure a FortiGate to use LDAP authentication to authenticate remote SSL VPN users. With a properly configured LDAP server, user and authentication data can be maintained independently of the FortiGate, accessed only when a remote user attempts to connect through the SSL VPN tunnel. Downloading and installing FSSO agent in SECURITY ISSUES CAUSED BY THE WEBRTC FEATURE IN CHROME What is WebRTC? Web Real-Time Communication (WebRTC) is a collection of communications protocols and APIs originally developed by Google that enables real-time voice and video communication over peer-to-peer connections. WebRTC is a set of protocols and APIs that allow web browsers to request real-time information from the browsers of other users, enabling real-time MCAFEE AGENT CANNOT BE REMOVED WHILE IT IS IN MANAGED MODE Problem: The following message displays when select Remove for the McAfee Agent through Add \ Remove Programs or Programs and Features on client computers: " McAfee Agent cannot be removed while it is in managed mode" Solution: The computer must be removed from Managed Mode Steps: 1- Open Command Prompt 2- Go to the folder" C:\Program Files(x86)\McAfee\Common
FORTIGATE FIREWALL CONFIGURATION BACKUP AND RESTOREFORTIGATE AUTO BACKUP SCRIPTFORTIGATE BACKUP CONFIGFORTIGATE EXPORT CONFIGURATION FortiGate Firewall Configuration Backup and Restore procedure Firmware V4.0: Do the following tasks to take FortiGate firewall backup. Steps: Connect the firewall through browser. 2. Login to the firewall (Enter User name & Password) (see Figure-4). 3. After logging in, click on System -->Dashboard --> Dashboard on the left hand side of the window(see Figure-5) 4.
HOW TO FIND ALL THE SAVED WI-FI PASSWORDS IN WINDOWS 10 In my previous blog post, I had posted a detailed explanation on how to view the currently connected network Wi-Fi password saved in Windows 10 PC. On this post, we are going to see ALL the Wi-Fi passwords (currently connected and previously connected networks, even if you’re not connected to them anymore) saved in the MCAFEE EPO ADMIN PASSWORD LOST McAfee ePO Admin password lost: Some time ago I started attending trainings and discussions with industry experts, on McAfee ePO and started learning many things from them. During these sessions I came across some issues with McAfee 4.x and 5.x installation. I have uploaded solutions to some of these issues on my blog, pleaseLAKKIREDDYMADHU
A Remote Access Trojan ( RAT) is a type of malware that allows covert surveillance, a backdoor for administrative control and unfettered and unauthorized remote access to a victim’s machine. The RAT is extremely dangerous because it enables intruders to get remote control of the compromised computer. Once the host system is compromised, the FREE NETWORK DIAGRAM TOOLS CADE is a compact but powerful 2D vector editor for Windows. It includes basic Visio functionality and could be used to create diagrams, network diagrams, flowcharts, schemas, maps and so much more. Free sample diagrams are available to help you get started. CADEis
CISCO NETWORK TOPOLOGY ICONS A couple of popular ones are VRT Network Equipment and Cisco Network Topology Icons. To apply for the VRT Network Equipment icons, go to Tools > Extension Manager > Add > choose the extension file you downloaded and it will be added automatically to your extension list. Alternatively, if you have your own icons or images you wish to use inyour
HOW TO FIND HIDDEN & SAVED PASSWORDS IN WINDOWS 10 For years users have wanted to save time and effort when accessing servers on the network, Web sites requiring credentials, etc. So, there have been options in AUTHENTICATING SSL VPN USERS USING LDAP This example illustrates how to configure a FortiGate to use LDAP authentication to authenticate remote SSL VPN users. With a properly configured LDAP server, user and authentication data can be maintained independently of the FortiGate, accessed only when a remote user attempts to connect through the SSL VPN tunnel. Downloading and installing FSSO agent in SECURITY ISSUES CAUSED BY THE WEBRTC FEATURE IN CHROME What is WebRTC? Web Real-Time Communication (WebRTC) is a collection of communications protocols and APIs originally developed by Google that enables real-time voice and video communication over peer-to-peer connections. WebRTC is a set of protocols and APIs that allow web browsers to request real-time information from the browsers of other users, enabling real-time MCAFEE AGENT CANNOT BE REMOVED WHILE IT IS IN MANAGED MODE Problem: The following message displays when select Remove for the McAfee Agent through Add \ Remove Programs or Programs and Features on client computers: " McAfee Agent cannot be removed while it is in managed mode" Solution: The computer must be removed from Managed Mode Steps: 1- Open Command Prompt 2- Go to the folder" C:\Program Files(x86)\McAfee\Common
FORTIGATE FIREWALL CONFIGURATION BACKUP AND RESTOREFORTIGATE AUTO BACKUP SCRIPTFORTIGATE BACKUP CONFIGFORTIGATE EXPORT CONFIGURATION FortiGate Firewall Configuration Backup and Restore procedure Firmware V4.0: Do the following tasks to take FortiGate firewall backup. Steps: Connect the firewall through browser. 2. Login to the firewall (Enter User name & Password) (see Figure-4). 3. After logging in, click on System -->Dashboard --> Dashboard on the left hand side of the window(see Figure-5) 4.
HOW TO FIND ALL THE SAVED WI-FI PASSWORDS IN WINDOWS 10 In my previous blog post, I had posted a detailed explanation on how to view the currently connected network Wi-Fi password saved in Windows 10 PC. On this post, we are going to see ALL the Wi-Fi passwords (currently connected and previously connected networks, even if you’re not connected to them anymore) saved in the MCAFEE EPO ADMIN PASSWORD LOST McAfee ePO Admin password lost: Some time ago I started attending trainings and discussions with industry experts, on McAfee ePO and started learning many things from them. During these sessions I came across some issues with McAfee 4.x and 5.x installation. I have uploaded solutions to some of these issues on my blog, pleaseLAKKIREDDYMADHU
A Remote Access Trojan ( RAT) is a type of malware that allows covert surveillance, a backdoor for administrative control and unfettered and unauthorized remote access to a victim’s machine. The RAT is extremely dangerous because it enables intruders to get remote control of the compromised computer. Once the host system is compromised, the ABOUT – LAKKIREDDYMADHU Hi! I am Madhusudhana Reddy, born and raised in India. Currently residing in New Jersey, USA. There are two types of companies in the world: Humanity-Plus companies and Humanity-Minus companies. Humanity-Plus companies are companies working on solutions or products that push the human race forward. Humanity-Minus companies are companies that are increasing shareholder value or making a FORTIGATE FIREWALL CONFIGURATION BACKUP AND RESTORE FortiGate Firewall Configuration Backup and Restore procedure Firmware V4.0: Do the following tasks to take FortiGate firewall backup. Steps: Connect the firewall through browser. 2. Login to the firewall (Enter User name & Password) (see Figure-4). 3. After logging in, click on System -->Dashboard --> Dashboard on the left hand side of the window(see Figure-5) 4.
COMPUTER SHORTCUT KEYS: Computer shortcut keys provide an easier and usually quicker method for navigating and using computer software programs. Shortcut keys usually consist of an Alt key, Ctrl, and/or Shift key in conjunction with a single letter. The de facto standard for listing a shortcut is listing the modifier key, a plus symbol, and the single character. MCAFEE EPO – LAKKIREDDYMADHU McAfee ePO Admin password lost: . Some time ago I started attending trainings and discussions with industry experts, on McAfee ePO and started learning many things from them. During these sessions I came across some issues with McAfee 4. x and 5. x installation. I have uploaded solutions to some of these issues on my blog, please referthe following link:
HOW TO CHANGE IP ADDRESS USING A BATCH FILE SCRIPT ON How to change IP address using a Batch File: Starting with Windows 2000, Microsoft has provided a powerful utility, Netsh, which lets you display and modify the network configuration of Windows computers. You can use the Netsh on the command line or in a batch file. Here's an example of how you can create a STOP USING THE INSECURE SMBV1/SMB1 PROTOCOL The recent WannaCry ransomware outbreak spread because of a vulnerability in one of the internet's most ancient networking protocols, Server Message Block version 1 (aka SMBv1 / SMB 1). Barry Feigenbaum originally designed SMB at IBM. Microsoft has made considerable modifications to the most commonly used version. Microsoft merged the SMB protocol with the LAN Manager product. THE END OF LIFE (EOL) FOR WINDOWS 7 The End Of Life (EOL) for Windows 7. A new reminder for those who are still holding on to the Windows 7 operating system, you have 9 months left until Microsoft ends support for its 9-year-old operating system, i.e. on January 14, 2020. This was actually supposed to have happened already, but due to many industries with applications that do not SCHEDULING AUTOMATED BACKUP USING SQL SERVER 2008 Scheduling automated backup using SQL server 2008: It is very important to take backups for the database files on regular basis. Microsoft SQL server 2008 has made this task very easy. Users can schedule the backup to be taken at a particular interval Users can schedule the backup copies to be deleted at a particular G SUITE (GOOGLE APPS): HOW TO SEND REPLY MAIL FROM ALIAS Every Google Apps user has a primary address for signing in to their account and receiving mail. If a user wants another address for receiving mail, you can give them an email alias. For example, if mail@lakkireddymadhu.com wants to also receive the email sent to sales@lakkireddymadhu.com, create the alias sales@lakkireddymadhu.com. Mail sent to either address then appears in mailSkip to content
LAKKIREDDYMADHU
MAD'S WORLD
Menu
* About
Search for:
CATEGORIES
* Antivirus (17)
* Firewall (6)
* General IT (75)
* Google (9)
* Interview (2)
* Journal (53)
* Microsoft (37)
ARCHIVES
Archives Select Month March 2019 January 2019 December 2018 November 2018 October 2018 August 2018 July 2018 July 2017 June 2017 May 2017 April 2017 March 2017 October 2016 September 2016 August 2016 July 2016 June 2016 March 2016 December 2015 November 2015 October 2015 October 2014 September 2014 August 2014 July 2014 June 2014 March 2014 February 2014 January 2014 December 2013 August 2013 June 2013 March 2013 February 2013 December 2012 September 2012 August 2012 July 2012 June 2012 May 2012 April 2012 March 2012 February 2012 January 2012 December 2011 October 2011 August 2011 July 2011 June 2011 May 2011 April 2011 March 2011 February 2011 January 2011 December 2010 November 2010 October 2010BLOG STATS
* 392,675 hits
FOLLOW BLOG VIA EMAIL Enter your email address to follow this blog and receive notifications of new posts by email. Join 509 other followersFollow
THE END OF LIFE (EOL) FOR WINDOWS 7March 23, 2019
Leave a comment
A new reminder for those who are still holding on to the Windows 7 operating system, you have 9 months left until Microsoft ends support for its 9-year-old operating system, i.e. on January 14, 2020. This was actually supposed to have happened already, but due to many industries with applications that do not support anything above Windows 7, the EOL date was extended. However, as with everything, theend has come.
With the Windows 7 End of Life date now rapidly approaching, Microsoft is keen to make sure people know that support for the operating system is ending, and wants to encourage people to move from the operatingsystem.
So, the company is releasing an update to Windows 7 – KB4493132 – which will display notifications reminding Windows 7 users to upgrade to Windows 10 before the End of Life date. Microsoft actually ended mainstream support for Windows 7 on January 13, 2015, which meant new features stopped being added, and warranty claims were no longer valid. However, during the extended support phase, which Windows 7 entered after the end of its mainstream support, the operating system has still been patched and updated to make sure security issues and bugsare fixed.
Windows 7 End of Life: what happens next? When Windows 7 reaches its End of Life phase on January 14, 2020, Microsoft will stop releasing updates and patches for the operating system. It’s likely that it also won’t offer help and support if you encounter any problems. However, that doesn’t mean Windows 7 will stop working on January 14, 2020 – you’ll still be able to use Windows 7 for as long as you want. So the good news is that you’re not going to wake up on January 15 to find your Windows 7 PC no longer boots up. But just because you _can_ continue to use Windows 7 in its End of Life status, it doesn’t mean you _should_. The biggest issue with continuing to use Windows 7 is that it won’t be patched for any new viruses or security problems once it enters End of Life, and this leaves you extremely vulnerable to any emergingthreats.
What’s more, if a large number of people continue to use Windows 7 after the End of Life date, that could actually be a big incentive for malicious users to target viruses and other nasties at Windows 7. So, while Windows 7 will continue to work after January 14, 2020, you should start planning to upgrade to Windows 10, or an alternative operating system, as soon as possible. Windows 7 End of Life: what should you do? So, if you still use Windows 7, what should you do? There are a number of things I would recommend you do in preparation for Windows 7 End of Life, and the first is to consider upgrading to a newer operatingsystem.
While you have a number of choices when moving operating systems, for many people, the obvious and simplest option is to upgrade to Windows10.
WINDOWS 7 END OF LIFE: UPGRADING TO WINDOWS 10 Upgrading from Windows 7 to Windows 10 has a number of benefits. For a start, because both operating systems are made by Microsoft the upgrade process is relatively easy, and in many cases, you can keep your files on your PC. WINDOWS 7 END OF LIFE: MOVING TO LINUX The most cost-effective way of preparing for Windows 7 End of Life is to switch operating systems altogether and install Linux on yourmachine.
WINDOWS 7 END OF LIFE: SWITCH TO MAC Finally, you could use Windows 7’s End of Life as a reason to dip your toe into Apple’s ecosystem. Apple has a well-deserved reputation for building gorgeously-designed hardware that uses its macOS operating system, which is both easy to use and secure againstinternet threats.
WINDOWS 7 END OF LIFE: BACK UP YOUR DOCUMENTS No matter which route you take, you should make sure that your documents are safely backed up. If you’re upgrading to Windows 10 from Windows 7 on the same machine the transfer of your files is part of the process, but it’s best to back up just in case something goeswrong.
Source: irissol , the hackernews, techradar
HOW TO ENABLE 2-STEP VERIFICATION FOR GOOGLE APPS? January 28, 2019January 28, 2019Leave a comment
OVERVIEW
Google Apps (G Suite) provides the option of turning on two-step verification for your user accounts. This provides an extra layer of security to your user’s data by having them authenticate with a verification code as well as their password. I recommend that you enable this option to make your accounts more secure. The instructions below will lead you through enabling two-step verification as well as enforcing its use for your G Suite service.INSTRUCTIONS
Enabling Two-Step Verification These steps will guide you through enabling the_ option of using _two-step verification for your G Suite account users. This allows your users to choose to use the feature if they wish. It does not make two-step verification mandatory for your users. * Log into your G Suite Admin Console . * From the dashboard, select SECURITY. 3. Next, click on Basic Settings. 4. Scroll down to the Two-Step Verification setting and tick the checkbox to Allow users to turn on 2-step verification. This will enable the ability for the account user to utilize two-step authentication if they choose. 5. Click on the Save changes button that appears.NOTE:
If you wish to make it mandatory for your users to use two-step authentication, please continue on to the enforcing two-step verification instructions once the two-step verification option isenabled.
Source: Mediatemple
APIPA
January 10, 2019 ·Leave a comment
APIPA stands for Automatic Private Internet Protocol Addressing. APIPA is in every version of Windows since NT and all versions of MacOS X.
APIPA is a DHCP mechanism that provides DHCP clients with self-assigned IP addresses when DHCP servers are not available. When there isn’t a DHCP server available, APIPA assigns IPs from 169.254.0.1 to 169.254.255.254 with a default mask of 255.255.0.0. Clients leverage ARP ( Address Resolution Protocol )to verify their address doesn’t conflict with another on the network. APIPA is enabled on all interfaces of all DHCP clients in pretty much all modern operating systems. 10 CYBERSECURITY MYTHSDecember 20, 2018
Leave a comment
A new infographic by Varonis, titled “10 CYBER SECURITY MYTHS PUTTING YOUR BUSINESS AT RISK”
identifies what is the myth and what is the reality. If you are like most small business owners, you probably aren’t a digital security expert. So, having a look at this infographic may be the best way to identify weaknesses in your security protocol. With small businesses increasingly becoming TARGETS OF CYBER-ATTACKS,
it is extremely important for owners to stay abreast of the latest developments in digital security. On the official Varonis blog, Senior Director of Inbound Marketing RobSobers WRITES ,
“The proliferation of high-profile hacks in the news cycle often tricks small- and medium-sized businesses into thinking that they won’t be targets of attack.” But this may not be the case, Sobers warns. Staying in the know makes it much harder for you to fall victim to the relentless attacks bycybercriminals.
Sobers ads, “If you or your employees believe any of the myths below, you could be opening up your business to unknown risk.” The number one myth listed on the new infographic? ‘A strong password is enough to keep your business safe’. Although a strong password is important — and certainly better than ‘Admin1234′ — you need to do more. Having a two-factor authentication and data monitoring adds another level of protection. And adding this layer of protection is in many cases enough to drive the average hacker to look for easier targets. Another myth listed on the infographic? “Small and medium-size businesses aren’t targeted by hackers. This is obviously false because hackers are opportunists who will target anyone as long as they can benefit from it. And SMALL BUSINESSESare
not excluded from this. The 2018 Verizon Data Breach Investigations Report has revealed 58 PERCENT OF DATA BREACH VICTIMSare
small businesses, so the idea the size of your business might exclude you is definitely a myth. Cybercriminals hack computer systems for a variety of reasons. Once they breach your security, they could use it to launch a DDOS ATTACK, use
your IP address for other nefarious purposes and more. Much like some businesses believe they won’t be attacked because of their size, other businesses wrongly assume that they won’t be attacked because of the industry they’re in. This myth also goes hand-in-hand with the belief that some companies don’t have anything “worth” stealing. The reality is that any sensitive data, from credit card numbers to addresses and personal information, can make abusiness a target.
What’s more, even if the data being targeted doesn’t have resale value on the dark web, it may be imperative for the business to function. Ransomware, for example, can render data unusable unless you pay for a decryption key. This can make attacks very profitable for cybercriminals, even if the data is deemed “low value.” Anti-virus software is certainly an important part of keeping your organization safe — but it won’t protect you from everything. The software is just the beginning of a comprehensive cybersecurity plan. To truly protect your organization, you need a total solution that encompasses everything from employee training to insider threat detection and disaster protection. While outsider threats are certainly a concern and should be monitored extensively, insider threats are just as dangerous and should be watched just as closely. In fact, research suggests that insider threatscan account
for up to 75 percent of data breaches. These threats can come from anyone on the inside, from disgruntled employees looking for professional revenge to content employees without proper cybersecurity training, so it’s important to have a system in place to deter and monitor insider threats. While IT has a big responsibility when it comes to implementing and reviewing policies to keep companies cyber safe, true cybersecurity preparedness falls on the shoulders of every employee, not just those within the information technology department. For example, according to Verizon, 49
percent of malware is installed over email. If your employees aren’t trained on cybersecurity best practices, like how to spot phishingscams and avoid
unsafe links, they could be opening up your company to potentialthreats.
If your business has employees who travel often, work remotely or use shared workspaces, they may incorrectly assume that a password keeps a Wi-Fi network safe. In reality, Wi-Fi passwords primarily limit the number of users per network; other users using the same password can potentially view the sensitive data that’s being transmitted. These employees should invest in VPNs to keep their data moresecure.
A decade or so ago it may have been true that you could tell immediately if your computer was infected with a virus — tell-tale signs included pop-up ads, slow-to-load browsers and, in extreme cases, full-on system crashes. However, today’s modern malware is much more stealthy and hard to detect. Depending on the strain your computer or network is infected with, it’s quite possible that your compromised machine will continue running smoothly, allowing the virus to do damage for some time before detection. Employees often assume that their personal devices are immune to the security protocols the company’s computers are subjected to. As such, Bring Your Own Device (BYOD) policies have opened up companies to the cyber risk they may not be aware of. Employees who use their personal devices for work-related activities need to follow the same protocols put in place on all of the network’s computers. These rules aren’t limited to cell phones and laptops. BYOD policies should cover all devices that access the internet, including wearables and any IoT devices. Cybersecurity is an ongoing battle, not a task to be checked off and forgotten about. New malware and attack methods consistently put your system and data at risk. To truly keep yourself cyber safe, you have to continuously monitor your systems, conduct internal audits, and review, test, and evaluate contingency plans. Keeping a business cyber safe is a continuous effort and one that requires every employee’s participation. If anyone at your company has fallen victim to one of the myths above, it may be time to rethink your cybersecurity training and audit your company to assess yourrisk .
Source: Varonis , SmallbiztrendsFILTER BUBBLE
December 18, 2018
2 Comments
A filter bubble is an intellectual isolation that can occur when websites make use of algorithms to selectively assume the information a user would want to see, and then give information to the user according to this assumption. Websites make these assumptions based on the information related to the user, such as former click behavior, browsing history, search history, and location. For that reason, the websites are more likely to present only information that will abide by the user’s pastactivity.
A filter bubble, therefore, can cause users to get significantly less contact with contradicting viewpoints, causing the user to become intellectually isolated. Personalized search results from Google and personalized news stream from Facebook are two perfect examples of this phenomenon. WHAT ARE FILTERS AND WHERE EXACTLY IS THE “BUBBLE?” Language and location are the two most basic filters Google and other sites use to deliver personalized results. If you are searching Google for an electrician and you speak English and live in Ohio, Google knows there’s no need to show you the link to a bilingual electrician in Texas. There are many other factors that Google and others use to personalize results to you. All of these filters create a bubble around you. The information that filters deem important to you goes into the bubble; the rest stays outside of the bubble and does not show up in searchresults.
The term filter bubble was coined by internet activist Eli Pariser in his book, “THE FILTER BUBBLE: WHAT THE INTERNET IS HIDING FROMYOU” (2011).
Pariser relates a case in which a user searches for “BP” on Google and gets investment news regarding British Petroleum as the search result, while another user receives details on the Deepwater Horizon oil spill for the same keyword. These two search results are noticeably different and could affect the searchers’ impression of the news surrounding the British Petroleum company. According to Pariser, this bubble impact could have adverse effects on social discourse. However, others say the impact is negligible. HOW ARE FILTER BUBBLES CREATED? Algorithmic websites, like many search engines and social media sites, show users content based on their past behavior. Depending on what you’ve clicked on in the past, the website shows you what it thinks you are most likely to engage with. Social Media companies, like Facebook, want you to keep using the product. So instead of being a feed of _all_ the information, Facebook is _selective _with what it puts in your feed. People often assume that the information they see is unbiased when it is actually skewed towards their beliefs. Here is what Mark Zuckerberg said emphasizing the importance of _news feed _in Facebook and how they need to customized from user to user: Rarely do we go past the page-1 of our _Google searches_? Highly filtered results (which most of us prefer – living in a bubble), meaning other stuff gets demoted. And the personalization increases as algorithm gets more training on your interests, and thus the wall of bubble goes thicker and thicker. WHY ARE FILTER BUBBLES BAD? After a while of only seeing results they agree with, people begin to believe that they are _more correct_ and then their views are strengthened and solidified. This means that when someone disagrees with them, both of their views are likely to be more polarized. As a result, these people are less likely to agree with each other, or eventalk to each other.
Filter bubbles are a kind of “intellectual isolation ”. This isolation creates ignorance to other perspectives and opinions. The negative of personalization and filter bubbles is that you will only see information that you like. Google is not going to challenge or disagree with you. (Its search results and what flows into your “bubble” are all based on algorithms.) It’s important to know, you’re only seeing one side of the story: Your side. When we are only surrounded by information and people we agree with, we miss opportunities to learn and grow. The other con associated with the bubble is Page Ranking. Search engines use this to categorize, and rank pages based on the number of hits or popularity of a given website or content. This doesn’t make the information accurate, but we tend to believe that because it ranks higher in the search than other websites it must be legit. This takes away our ability to dig deeper for relevant information. HOW CAN YOU BURST OUT OF IT? In order to burst the filter bubble following steps can be handy. * To get rid of your search history. * To turn off targeted ads using ad blocking software * Ensuring that you delete your browser cookies * Disabling tracking cookie features * Keeping your Facebook data private, altogether! * Going incognito or anonymous * Private search engines are a great way to avoid filter bubbles. WHAT IS THE DIFFERENCE BETWEEN THE FILTER BUBBLE AND PERSONALISATION? Personalisation is the process and filter bubble the result. Personalization makes you only see stuff in your feed that is supposed to be relevant to you. That creates a filter bubble in which everything else is filtered out. ADDITIONAL RESOURCES: Eli Pariser: Beware online “filter bubbles” – Watch the eight minute video of his speech at Ted 2011. I’d love to hear your comments. Do drop a comment below. Source: Techopedia , Search Encrypt, Blitzmediadesign
, Yingyingxia
HTTP/3
December 15, 2018December 15, 2018Leave a comment
The HTTP-over-QUIC experimental protocol will be renamed to HTTP/3 and is expected to become the third official version of the HTTP protocol, officials at the Internet Engineering Task Force (IETF) have revealed. This will become the second Google-developed experimental technology to become an official HTTP protocol upgrade after Google’s SPDY technology became the base of HTTP/2. HTTP-over-QUIC is a rewrite of the HTTP protocol that uses Google’s QUIC instead of TCP (Transmission Control Protocol) as its basetechnology.
QUIC stands for “Quick UDP Internet Connections” and is, itself, Google’s attempt at rewriting the TCP protocol as an improved technology that combines HTTP/2, TCP, UDP, and TLS (for encryption), among many other things. In a mailing list discussionlast
month, Mark Nottingham, Chair of the IETF HTTP and QUIC Working Group, made the official request to rename HTTP-over-QUIC as HTTP/3, and pass it’s a development from the QUIC Working Group to the HTTP WorkingGroup.
In the subsequent discussions that followed and stretched over several days, Nottingham’s proposal was accepted by fellow IETF members, who gave their official seal of approval that HTTP-over-QUIC becomes HTTP/3, the next major iteration of the HTTP protocol, the technology that underpins today’s World Wide Web. According to web statistics portal W3Techs, as of November 2018, 31.2 percent of the top 10 million websites support HTTP/2, while
only 1.2 percent support QUIC.
WHAT IS QUIC?
QUIC (Quick UDP Internet Connections) is a new transport protocol for the internet, developed by Google. QUIC solves a number of transport-layer and application-layer problems experienced by modern web applications while requiring little or no change from application writers. QUIC is very similar to TCP+TLS+HTTP2 but implemented on top of UDP. Having QUIC as a self-contained protocol allows innovations which aren’t possible with existing protocols as they are hampered by legacy clients and middleboxes. Key advantages of QUIC over TCP+TLS+HTTP2 include: * Connection establishment latency * Improved congestion control * Multiplexing without head-of-line blocking * Forward error correction * Connection migration CONNECTION ESTABLISHMENT QUIC handshakes frequently require zero roundtrips before sending a payload, as compared to 1-3 roundtrips for TCP+TLS. The first time a QUIC client connects to a server, the client must perform a 1-roundtrip handshake in order to acquire the necessary information to complete the handshake. The client sends an inchoate (empty) client hello (CHLO), the server sends a rejection (REJ) with the information the client needs to make forward progress, including the source address token and the server’s certificates. The next time the client sends a CHLO, it can use the cached credentials from the previous connection to immediately send encrypted requests to theserver.
CONGESTION CONTROL
QUIC has pluggable congestion control and provides richer information to the congestion control algorithm than TCP. Currently, Google’s implementation of QUIC uses a reimplementation of TCP Cubic and is experimenting with alternative approaches. One example of richer information is that each packet, both original and retransmitted, carries a new sequence number. This allows a QUIC sender to distinguish ACKs for retransmissions from ACKs for originals and avoids TCP’s retransmission ambiguity problem. QUIC ACKs also explicitly carry the delay between the receipt of a packet and its acknowledgment being sent, and together with the monotonically-increasing sequence numbers. This allows for precise roundtrip-time calculation. Finally, QUIC’s ACK frames support up to 256 NACK ranges, so QUIC is more resilient to reordering than TCP (with SACK), as well as able to keep more bytes on the wire when there is reordering or loss. Both client and server have a more accurate picture of which packets thepeer has received.
MULTIPLEXING
One of the larger issues with HTTP2 on top of TCP is the issue of head-of-line blocking. The application sees a TCP connection as a stream of bytes. When a TCP packet is lost, no streams on that HTTP2 connection can make forward progress until the packet is retransmitted and received by the far side – not even when the packets with data for these streams have arrived and are waiting in a buffer. Because QUIC is designed from the ground up for multiplexed operation, lost packets carrying data for an individual stream generally only impact that specific stream. Each stream frame can be immediately dispatched to that stream on arrival, so streams without loss can continue to be reassembled and make forward progress in theapplication.
FORWARD ERROR CORRECTION In order to recover from lost packets without waiting for a retransmission, QUIC can complement a group of packets with an FEC packet. Much like RAID-4, the FEC packet contains parity of the packets in the FEC group. If one of the packets in the group is lost, the contents of that packet can be recovered from the FEC packet and the remaining packets in the group. The sender may decide whether to send FEC packets to optimize specific scenarios (e.g., beginning andend of a request).
CONNECTION MIGRATION QUIC connections are identified by a 64-bit connection ID, randomly generated by the client. In contrast, TCP connections are identified by a 4-tuple of source address, source port, destination address, and destination port. This means that if a client changes IP addresses (for example, by moving out of Wi-Fi range and switching over to cellular) or ports (if a NAT box loses and rebinds the port association), any active TCP connections are no longer valid. When a QUIC client changes IP addresses, it can continue to use the old connection ID from the new IP address without interrupting anyin-flight requests.
For a detailed explanation, read the book: HTTP/3 Explained by DanielStenberg
HTTP/3 explained
is a
free and open booklet describing the HTTP/3 and QUIC protocols. Watch this Google Developers QUIC tech Talk: Do drop a comment below. Source: zdnet , Google, Chromium Blog ,
Chromium
HOW TO BE INVISIBLE ONLINE (WITHOUT GOING OFF THE GRID) December 6, 2018December 6, 2018Leave a comment
Are you concerned about your online security? With more data breaches occurring daily, it’s crucial to protect yourself with these simpletips.
This infographic is a comprehensive look at how you can reduce your online visibility to protect your privacy, but still be seen by your family and friends. From browsing the internet to safety on social media platforms, you don’t need to be a technical genius to lessenyour online risk.
You don’t have to leave the grid to disappear from hackers and unscrupulous businesses who exploit you and your information for their gain without your knowledge. However, it’s critical to protect yourdata
on
each platform you use. Unfortunately, these big corporations don’t always have our best interests at heart. As we’ve seen from the multiple data breaches, there are times that consumers aren’t told about the hack until it was too late. Repairing your credit and personal information after a data hack is scary. By locking down your data now, you’ll save yourself a bigger headache later. Source: Barbara Davidson, Robin
Page1 Page2 … Page29Next →
lakkireddymadhu
Post to
Cancel
* Follow
*
* lakkireddymadhu
* Customize
* Follow
* Sign up
* Log in
* Report this content * Manage subscriptions* Collapse this bar
Details
Copyright © 2024 ArchiveBay.com. All rights reserved. Terms of Use | Privacy Policy | DMCA | 2021 | Feedback | Advertising | RSS 2.0