Deprecated: mysql_connect(): The mysql extension is deprecated and will be removed in the future: use mysqli or PDO instead in /home/a26f9f83/public_html/articles/includes/config.php on line 159
How To Avoid Hackers From Destroying Your Site? > NetSparsh - Viral Content you Love & Share

How To Avoid Hackers From Destroying Your Site?

Recently, my site and other internet accounts ( http://www.nabaza.com/sites.htm ) have been hacked maliciously for the purpose of getting all my online sales and transferring it to his/her account. I've learned a valuable lesson that I would like to share with you so as to avoid becoming the next victim for this hacker.

Steps to protect your web site:

1. Don't give out your username/password to anyone else.

Even if it's your own net/web/system admin. Chances are he/she already knows it for he/she can just login as admin to the control panel and look at your password.

2. Change your password once in a while.

It's better to write them down instead of saving them on a hard disk with insufficient firewall protection.

3. Don't use any word that can be found in dictionary or anything that signifies your birthdate, your street number to make it difficult for the hackers to guess.

4. Disable the "Forgot Password" utility on your site. This utility is very convenient to most end users, so fast that it gives out password so easy to for hackers to play with.

5. Make your password question / password answer (the one used to remind your forgotten password) difficult to guess. Treat it as a password. If anyone can just guess it, chances are hackers will start exploring with your account.

6. Make sure you are in constant contact with your web provider so they know your real identity and they can help you out as soon as there's hacking going on in your site.

7. Don't use any irc (internet relay chat) based chat system for it connects to ports 6660 to 6669. Hackers will exploit these ports and will upload trojan virus in your computer that can get your username/password on most of your accounts.

If you are going to use any irc chat system, don't even use it without the aid of psybnc or bnc. For more details and pricing of this tool, email: sales@nabaza.com with Subject: psybnc or go to http://www.nabaza.com/support.htm and post your request there.

8. Don't trust any email (even if it's an email message coming from your trusted friend) message that has .exe file attachment. Chances are it came from a malicious programmer and this .exe file already spreadand infected/duplicated in all email addresses in your addressbook including yours. For antivirus information, go to http://www.nabaza.com/antivirus.htm

Nabaza.comspecializes in building, designing, implementing, managing and maintaining corporate website to boost sales of your company. Email william@nabaza.com for information on functional, dynamic webpage designing with affordable packages. Subscribe for free! http://www.nabaza.com/subscribe.htm

Rebrandable ebooks, software for free
Free Advertising Space
Put Nabaza.com In your desktop

In The News:

This RSS feed URL is deprecated, please update. New URLs can be found in the footers at https://news.google.com/news

TechCrunch

Security, privacy experts weigh in on the ICE doxxing
TechCrunch
In what appears to be the latest salvo in a new, wired form of protest, developer Sam Lavigne posted code that scrapes LinkedIn to find Immigration and Customs Enforcement employee accounts. His code, which basically a Python-based tool that scans ...
Trump signs executive order on immigration, but says 'zero tolerance' will continueUSA TODAY
GitHub, Medium, and Twitter take down database of ICE employee LinkedIn accountsThe Verge
Federal agencies continue to advance capabilities with Azure Government – Azure Government CloudMSDN Blogs - Microsoft
GitHub
all 42 news articles »

EFF

Journalists and Digital Security: Some Thoughts on the NYT Leak Case
EFF
The leak investigation involving a Senate staffer and a New York Times reporter raises significant issues about journalists, digital security, and the ability of journalists to protect confidential sources. The New York Times recently revealed that the ...


BBC News

Venezuela crisis: UN says security forces killed hundreds
BBC News
Venezuelan security forces have carried out hundreds of arbitrary killings under the guise of fighting crime, the UN's human rights body says. In a report, it cites "shocking" accounts of young men being killed during operations, often in poor ...
Killings by security forces rife in Venezuela, rule of law 'virtually absent': UNReuters
Venezuelan security forces killed 'hundreds', rule of law 'virtually absent', UN saysTelegraph.co.uk

all 221 news articles »

Los Angeles Times

Protesters gather outside Homeland Security Secretary Kirstjen Nielsen's home
Los Angeles Times
About two dozen people gathered Friday morning outside the Virginia home of Homeland Security Secretary Kirstjen Nielsen in response to the Trump administration's policy on separating children from their parents at the border. According to an organizer ...
Homeland Security Secretary Kirstjen Nielsen heckled outside her homeKGO-TV
DHS Secretary Nielsen casts immigration crisis as 'a national security issue'ABC News
Shaheen calls for Homeland Security secretary's resignationConcord Monitor

all 1,741 news articles »

Security Intelligence (blog)

Why Security Skills Should Be Taught, Not Hired
Security Intelligence (blog)
Chief information security officers (CISOs) across the globe have long lamented the fact that so many job applicants lack the security skills they need to fill crucial security positions. Put bluntly: IT leaders have simply failed to create a pipeline ...


Digital Trends

Improving security means killing the password, but that battle has just begun
Digital Trends
(in)Secure is a weekly column that dives into the rapidly escalating topic of cybersecurity. Passwords are often cited as the biggest problem with modern digital security. They're supposed to be complicated, unique, and ever changing, and yet few ...

and more »

Tom's Guide

Millions of Baby Monitors, Security Cameras Easy to Hack
Tom's Guide
In a new report, information-security firm SEC Consult details a vulnerability the snoop might have exploited. If SEC Consult is right, many other baby monitors, security cameras and webcams made by the same manufacturer (hint: it isn't FREDI) might be ...


Wall Street Journal

EU Set to Impose Sanctions on Myanmar Security Officials
Wall Street Journal
The European Union is set to impose sanctions on seven Myanmar military and border guard police officials over the mass expulsion of ethnic Rohingya, according to diplomats, in a sign that EU leaders will go beyond words in punishing Myanmar security ...

and more »

Mac Rumors

Apple iOS Passcode Crack Revealed by Security Researcher. Watch the Exploit in Action
Fortune
An iPhone can be unlocked with a virtual keyboard pretending to type lots of passcodes, a security researcher revealed Friday. By sending all possible four-digit PIN combinations as if they came from a USB keyboard, the cracking method bypasses Apple's ...
Security Researcher Discovers Method for Brute Forcing iPhone Passcode in iOS 11Mac Rumors

all 74 news articles »

The National Security Law Podcast: It's a Girl!
Lawfare (blog)
A quick run-down of other DOJ national security developments this week includes new charges against a man allegedly responsible for leaking the CIA “Vault 7” materials to Wikileaks and also a Wisconsin woman who allegedly hacked the social media ...

Google News

The Saga of the Annoying Adware

When we think of adware, what comes to mind are... Read More

Be Alert! Others Can Catch Your Money Easily!

So called phishers try to catch the information about the... Read More

Is Your Music Player Spying On You?

In today's times spyware is a very serious issue and... Read More

Reporting Internet Scams

When it comes to reporting Internet scams most of us... Read More

Dont Allow Hackers to Take Out Money from Your Bank Account

If you know what is the 'Fishing' then it's very... Read More

Protection for Your PC - Painless and Free!

Viruses, Bugs, Worms, Dataminers, Spybots, and Trojan horses. The Internet... Read More

How To Prevent Spyware Attacking Your Computer

Spyware is software or hardware installed on a computer without... Read More

Ransom Trojan Uses Cryptography for Malicious Purpose

Every day millions of people go online to find information,... Read More

Don?t Become An Identity Fraud Statistic!

"You've just won a fabulous vacation or prize package! Now,... Read More

Online Shoppers, Beware of a New Scam

Beware of a New Scam Aimed at Bargain-HuntersTrying to buy... Read More

Click Here To Defeat Evil

Microsoft routinely releases new security updates, many of which are... Read More

Firewalls: What They Are And Why You MUST Have One!

A firewall is a system or gateway that prevents unauthorized... Read More

Burning Bridges is Bad, But Firewalls are Good

When you signed up for that ultra-fast DSL or Cable... Read More

Backup and Save your business!

There you are busily typing away on your PC or... Read More

Dont Get Hacked - A Guide to Protecting Your Business from Thieves

You've seen it in the news - 40 million credit... Read More

Top Five Online Scams

The top five online scams on the Internet hit nearly... Read More

Is Adware - Spyware Putting Your Privacy at Risk

Do you sometimes notice your computer running slower. Is your... Read More

8 Surefire Ways to Spot an E-Mail Identity Theft Scam!

The E-Mail Identity Theft Scam is running Rampant. These E-Mail... Read More

3 Things You Must Know About Spyware

1)Spyware is on your system. Like it or not, statistically... Read More

Free Ways to Tackle Threats to Your Computer

Protect Your PCHaving problems with your pc? Do your kids,... Read More

New CipherSend Online Security Service Thwarts Email Address Theft And Soothes Password Fatigue

In 1997, I decided after 15 years as a practicing... Read More

Top Spyware Removers Considerations

Only the top spyware removers are successful at detecting and... Read More

Arming Yourself Against Spyware

While clicking from site to site on the internet you... Read More

Spyware Attacks! Windows Safe Mode is No Longer Safe

Many of us have run into an annoying and time-consuming... Read More

How to Protect Your Child from the Internet

When the Internet first came about, it was realized it... Read More