7 Ways To Outsmart Hackers

0
759

Here are 7 ways to outsmart hackers. Please comment below to let us know what you think.

dailydot.com
dailydot.com

Deciding what operating system (OS) will keep your computer running smoothly. “With the highest level of security” is a controversial yet frequent question. Many business owners, government officials, and ordinary Joes and Janes ask that same question.

Whatever OS you use—and many users are very loyal to their operating system of choice and will argue that their’s is the best—it’s not entirely secure or private. Hackers are still infiltrating systems every day. They can easily target victims with malware to spy on users. Also disable their operating system altogether.

Because of this, choosing a secure system is essential to staying secure online. Below are the top secure operating systems. They will help users take the next step to ensure proper cyber and hardware security.

Linux offers a stable system largely free of

viruses,OpenBSD is focused on security

Linux

Linux is an open-source operating system that has been around since the mid-1990’s and can be modified and customized to fit your security needs. The operating system is known for its great ability to let developers patch up any loopholes that hackers may be able to get through, offering a stable system that is largely free of viruses, virtually eliminating the fear of having to reinstall yearly due to a malware-caused malfunction.

OpenBSD

OpenBSD prides itself on portability, standardization, correctness, proactive security, and integrated cryptography. The operating system has a full-disclosure policy, meaning its developers will be completely transparent with any security flaws they find, when they occur.

Tails OS

Tails—The Amnesiac Incognito Live System—is specifically designed to take up little space and erase any trace of its use across the Internet. As such, it can be downloaded to and run from an SD card or USB stick.

Qubes OS

Qubes is an absurdly secure operating simple that lives by a simple—yet paranoid—assumption. It acts as if your system has already been breached and keeps everything compartmentalized to protect the system as a whole. Each program you run is created in its virtual machine, called qubes, cut off from the rest of the system. So a piece of malware opened in your email client can’t find its way into your database. It’s locked in the email browser.

techworld.com
techworld.com

What does the idea of a secure browser mean? The world is now more complex than it was in 2010 when we last looked at the contenders. People are more oriented to mobile devices running under very different conditions while a range of security features such as URL filtering, download protection and do not track have transformed mainstream desktop browsers such as Chrome, IE and Firefox. In a sense all browsers could now plausibly claim to be ‘secure’ browsers.

Our top picks are:

Epic Privacy Browser

Based on Chromium, Epic is the perfect example of a browser that strips out every conceivable feature to maximise privacy. It’s rather like using a minimalist Google Chrome with the Google. Cookies and trackers are eliminated after each session, all searches are proxied through the firm’s own servers (which means there is no way to connect an IP address to a search), and it attempts to prioritise SSL connections wherever possible., useful for open Wi-Fi connections. It does not collect data about its users and comes with excellent built-in ad blocking.

Comodo Dragon/Ice Dragon

Comodo offers two browsers, one based on Chromium (Dragon) and the other on Firefox (Ice Dragon). Which one you choose would depend on your current investment in either Chrome or Firefox because each aims to maintain compatibility with thing like plug-ins, stored passwords, and favourites if desired.

Brave Browser

Announced by Brendan Eich, co-founder of the Mozilla Project, Brave is an open source browser that offers a respectable Chrome and Safari alternative, even in its early stages.

Brave offers great speeds and advanced ad-tracking controls, ideal for the privacy conscious who are also after a lightweight browser.

Tor Browser

The Tor browser has become the watchword for the anti-surveillance because it is built on an entire infrastructure of ‘hidden’ relay servers. Built atop a modified Firefox, it can be installed on a Windows, Mac or Linux PC but also on a USB stick if that’s preferable.

Dooble Browser

Dooble is a lean Chromium-based multi-platform (Windows, Linux, OS X) browser that won’t be for everyone despite its privacy features. In its default state it disables insecure interfaces such as Flash and Javascript which will make it difficult to use with a lot of sites but might be worth it for its stripped-down approach. The browser assumes the user wants to travel incognito from the off, while HTTPS can be enforced and third-party session cookies in iFrames blocked. The handling of cookies is unusually granular.

Choose A Secure Web Browser

Maxthon Cloud Browser

Maxthon is not so much a secure browser as a totally new type of HTML5-compatible browser that wants to act as a straight replacement.  With origins in China, and designed around synchronization between PC and mobile and builds in features often enabled in other browsers using plug-ins.

HTTPS Everywhere

A browser plug-in rather than a browser as such, HTTPS Everywhere is an EFF/Tor project that enforces SSL security wherever that’s possible in Chrome, Firefox and Opera. Its promise is to make what would otherwise be a complex and uncertain process much simpler because it is easy to start out using HTTPS on a website and be sent back to non-HTTPS pages without realising it.

Cocoon Browsing

When we first looked at Cocoon in 2014 we were put off by the fact that it didn’t seem to have been much recommended since its first appearance around 2011-2012. Last year, the firm seems to have re-launched itself as an ad-supported free product and a “military-grade” product offering a range of alluring security features –anonymous browsing, anti-Facebook tracking, better Wi-Fi security on open hotspots, and an encrypted end-to-end connection.

Avira Scout

The philosophy behind Scout from German anti-virus firm Avira is to bundle a range of third-party security plug-ins inside a dedicated Chromium-based browser with a few additional tricks up its own sleeve.

Integrated security on offer includes Avira Safe Browsing (blocks known phishing websites), Avira Safe Search, Secure Wi-Fi, which enforces HTTPS (based on https Everywhere) when connecting to sites across insecure Wi-Fi, and anti-tracking (the excellent Privacy Badger plug-in).

Honorable Mention

Yandex Browser, Opera, SRWare Iron, Aviator

wikihow.com
wikihow.com

Install good antivirus software (particularly if you use P2P). Antivirus software is designed to deal with modern malware including viruses, trojans, keyloggers, rootkits, and worms. Find out if your antivirus offers real-time scanning, on-access or on-demand. Also find out if it is heuristic. Avast and AVG are very good free editions.

Download and install software to deal with spyware such as Spybot Search and Destroy, HijackThis or Ad-aware and scan regularly. I can’t state this enough – you need to run a good anti spyware and anti malware program like Spybot if you search the web at all. Many websites out there exploit weaknesses and holes in the security of Microsoft Explorer and will place malicious code on your computer without you knowing about it until its too late!

Download and install a firewall. Either ZoneAlarm or Comodo Firewall (Kerio, WinRoute or Linux comes with iptables). If you use a router, this gives an added layer of security by acting as a hardware firewall.

online-tech-tips.com
online-tech-tips.com

Most wireless routers are set to no security when you install them. Be sure to log into the router and at least set the basic security that requires a password. There are stronger encryption options. If you don’t understand those, then simply set a password on the router and the wireless network. Otherwise anyone can connect to your home network and change all the settings.

This means that you should already have a password to login to your computer. Not having a password at all is not a good idea. Create a password for all user accounts and make sure it’s complex. Complex means it should have numbers, upper case characters, lower case characters, and symbols. This makes it way more difficult for a hacker to get into your computer.

You can also use USB Fingerprint Reader to encrypt, lock your files in one easy step.
Fingerprint identification is a new technology that helps you secure your personal data without the need to remember different passwords.

zapier.com
zapier.com

Most of us carefully protect our most important objects. We lock our homes with a deadbolt, perhaps invest in a security system or store valuables in a safe with its own lock and key, and make sure our cars are locked with the alarm turned on. We might even be secretive about our address to keep our home location private or train a pet to scare off intruders.

Two-factor authentication—also known as 2FA or TOTP as an abbreviation for time-based one-time passcode, and often substituted with two-step verification—is an additional layer of security that requires at least two of the following: What you know, what you have, and who you are. Those three factors are the classic secure login ingredients—and the more of them you use to protect your assets, the better.

Traditional email and password logins, however, cover only the first—what you know. You know your email address and password, and often they’re easy enough for someone else to guess or crack. That’s what makes them so insecure. Two-factor authentication adds a second what you have layer to digital logins, using an app and your phone to generate a unique login code. It can even cover all three if your phone is secured with a fingerprint for who you are security.

lifehacker.com
lifehacker.com

If you’re smart and you’re connected to the net, you’re concerned about computer security. Open ports on your computers are invitations to criminal hackers and other evildoers to wreak havoc. If you don’t protect yourself, no one else will. Your ISP and the cops have better things to do than chase hackers from Belarus who deleted the cosplay photos of you in your beard and Sailor Moon schoolgirl outfit. (That’s right, I know about that whole sordid affair).

The good news is that much like home security, it’s quite easy to lock the door. Test out those locks with a port scanner utility, which probes your computers for security holes.

Originally a UNIX utility, the Nmap port scanner utility has been ported to most other operating systems. It’s available as a Windows .exe, and also runs on Macs. I run it on my linux and BSD machines because of the scripting features available there. But you can accomplish the same thing through Lifehacker favorite Cygwin.

Once Nmap’s installed, you’re ready to scan your network. Start up a Cygwin bash shell and type the following: nmap -v -A 192.168.1.1-255 This command will scan your entire subnet.

thewincentral.com
thewincentral.com

Ransomware WannaCry/Petya has been causing havoc with the unprecedented scale of attack. Now it has spread to many countries impacting over 10,000 organizations and 200,000 individuals. It can even get worse with news surfacing about its new variants with no Kill Switch.

We had earlier shared vital tips that can help in protecting your Windows PC from WannaCry/Petya infection. But now we have one more tip that helps in making your PC safe against not only this Ransomware but also many others. There is a legacy protocol SMB1 (SMB 1.0) still available in Windows that Microsoft should have removed or made disabled by default. But unfortunately, it is enabled by default even on Windows 10.

Disabling this SMB1 protocol doesn’t have any impact on consumers’ experience with Windows. It is aimed at a very small set of Enterprise features. So, you should go ahead and just disable it on your Windows PC, whatever Windows version it may be running.

Disclosure: This page includes links to sites we affiliate with. Purchasing through them will earn us a commission. Keep in mind that we only recommend the products and services that we believe in.

LEAVE A REPLY