Header Ads

Hack Proof yourself : Your intelligence is your only Protection.

Before heading ahead and bombarding your head with Security tips to be protected from hack attacks, I would like to let you informed about the following:-
  • There can never be a word called complete protection.
  • When we are talking about cyber world you are always at risk to be hacked.
  • Whenever you find someone or any system guarantee you to provide complete security just keep in mind that's the biggest lie you will ever hear.







 " So There Exists Nothing called as complete Protection".

But As We Always Say:-

Your Intelligence And Your Attentiveness Is 
Your Only Protection

So today we are not here to introduce you with any system or any security software instead we are about to make you more intelligent to stand beyond Hackers,


We are here to provide you some best habits which are going to increase the intelligence of your brain.

So Lets go Ahead with a Tour of Intelligence 

And Defend Yourself.

  • Password And Password Protection:

    The first and the foremost step to protect your data is having a strong Password.
    and when I talk about password its not just about having alphanumeric character with some symbols.
    Like others today I wont suggest you to use Password Managers to generate password. but the best way I will tell you to use your intelligence.
    No No No...,,,, I am not against those systems providing Password managers but using a system to generate password for you is equal to trust a stranger for creating a password for you and to think that he/she wont remember it or to have faith that he/she may not use your property without your knowledge.

    And the next thing those system are always in the eye of Hackers.

    best way if to create your password by yourself, everyone is aware what are common passwords not to be kept so I wont go deep informing about unwanted passwords.

    I will tell you today good and secure ways to create your password.

    Surely you know password should be alphanumeric but even more better let it be of about
    20 characters.

    Listing bellow some secure passwords you never thought of:-

    MyFavourite@movie#ohhcomeonitsNotimportant989
    iAmtheonlyliving@genius#785
    oH@really#youarenotsointelligent125tohack

    and such passwords will never be hacked unless you leave your privacy.
  • Don't Use Same Passwords For Different Sites or service.

    This is the mistake most of people across internet are ignoring on the large scale.

    Just think its simply a site you don't always know whats going on behind it every time.

    where as it's not your personal created site you are just using your profile in there.

    what is site is being compressed you are going to provide access to all your Password protected services using such site.

    so best way to be safe is to have different Passwords.
  • Two-Factor Authentication.

  • Two-factor authentication acts as stop-gap when a new device tries to log into a service or site. For example, with Twitter’s two-factor authentication feature enabled, when you try to log into your account with a new device, it sends you a text message with a temporary password. In other words, you can’t log into an account without your phone and the temporary password sent to that phone.
  • You’ll be alerted when someone is trying to get into your account even if they have your password. Microsoft, GoogleTwitter, and Dropbox,  all use two-factor authentication. Set these up for extra security.


  • Security Questions.
    At some point these made sense. Probably before social networks had us sharing all our personal information with friends, family and then eventually the world. Now security questions like “What’s your mom’s maiden name?” and “What’s the name of your favorite movie?” are easy to answer by anyone that knows how to use Google, since we’ve shared most of that information online. Instead of answering truthfully, come up with unique answers that make zero sense in context. For example: “What’s your favorite food?” could be answered with Buster Table.

    Make sure it’s something memorable that has nothing to do with the actual question.

  • MisinformationSince you’re already going to start answering questions with lies, you might as well make your online persona a den of fabrications in the name of security. “A lot of times people are disillusioned and feel resistance is impossible and they just give up,” Sell said while talking about people already in the thick of social networking, “the most powerful tool going forward is misinformation.” She recommends changing all the key things that are used by companies as security questions. This includes your birthday, billing address, birth location, and family ties.

    Birthdates can prove to be a huge security risk. Just move your birthday on Facebook a few days forward or back and maybe even change the year or you can hide it. Most people won’t even notice and for those that do, just tell them why and suggest they do the same.

    Also, if you’re already friends on Facebook with family members, there’s really no need to advertise that you’re also family. A smart hacker can determine your mother’s maiden name via aunts, uncles, cousins, and grandparents. Your mom doesn’t even need to be on Facebook for her maiden name to be known.

  • Password Protect All Devices.

    This should be the first thing you do with a smartphone, tablet, or computer. Your computing devices are just giant bags of personal information. If any of them get stolen, why make it easier for the culprits to steal your identity? Plus, you’re not just saving yourself grief, but all of your contacts. Gathering email addresses is the first step in hacking into a person’s accounts.
  • Site Specific Credit Card Numbers.

    Many banks and credit cards offer single use and temporary credit card numbers. Use these to your advantage. A credit card number can be used to verify identification. In fact, when Mat Honan was hacked all the hackers needed was the last four digits of his credit card to establish identity. If you are using multiple cards (all tied to the same account so you get one bill) when one account is compromised, it doesn’t lead to a series of accounts being taken over by hackers.
  • Privatize Your Website.
    If you own a domain name, chances are your name, address and phone number are freely available to anyone that does a whois query. Fortunately, you can privatize your domain registration. Go to the domain registration site you use (the place where you purchased your domain name). Sign in and look for the option to privatize your information. If you can’t find the option, call the site and have them walk you through the procedure. It’ll probably cost you a few dollars a year, but it’s worth it.

    Once again, nothing is hacker-proof if you’re targeted by a very talented individual or state. And some of these precautions may seem like overkill and the ravings of a someone that’s paranoid. But, if you do everything right and it thwarts hackers before they even start, it’s worth it.
Theme images by rajareddychadive. Powered by Blogger.