Thursday, 14 November 2013

HOW TO REMOVE GMAIL ACCOUNT FROM ANDROID



Thinking about removing your Gmail account from your Android Phone? Some Android Phone does not have the internal memory to efficiently carry the workload of a Gmail Account. Well then the solution is quite easy. All you have to do is remove the Gmail account from your Android phone. There are many reasons for wanting to have your Gmail account removed from your Android Phone. Maybe the syncing and the additional account details are not working out for you. Whatever is your reason if you follow the following simple steps you will be able to successfully remove your Gmail account from your Android phone.

Adding a Gmail account to your Android system is very easy. All you have to do is download the app, install it and then login into your account and sync your phone to the account. That is very easy. But a lot of people claim that removing a Gmail account from an Android system is much more difficult and typical than installing and syncing it. The following steps will help you to remove your Gmail account from your Android phone:

ENCRYPT AND PASSWORD PROTECT YOUR USB DRIVE WITHOUT ANY SOFTWARE





Hi Friends todday i will tell you how to ENCRYPT AND PASSWORD PROTECT YOUR USB DRIVE WITHOUT ANY SOFTWARE
Bitlocker is Not much known technology By Windows Which helps you to Password protect and Encrypt Your Content in Usb Drives.

Just Follow the below simple Steps :

Step 1 : Insert Pendrive which you want to password Protect.
Step 2: Open explorer and Right click on your Removable drive and Select “Turn On Bitlocker”

Step 3: After you click on Turn On bitlocker, Wizard will be open, Check “Use a password to Unlock the Drive”

Step 4 : Now type In the Password you want and Click Next.
Step 5: Now you will be asked “How Do You want to back up Recovery Keys “ Choose From the options

Step 6 : You then have to choose whether your drive is already in use or if it is new. Then click next.

Step 7 : Choose how much Of Your Drive to Encrypt, Entire drive or Just Used Disk Space.

HOW TO REMOVE PASSWORD FROM PDF



Password protected PDFs can be really inconvenient sometimes. Especially when you are thinking about sharing a PDF with other people you have to make sure that you remove the password. Now adding a password to a PDF file is very easy and can be done by almost everyone. The option is highly visible and the password setting procedure extremely easy. But on the other hand the process of removing a password from a PDF file is quite typical. A lot of people have claimed that they have successfully added a password to their PDF file but were unable to remove it with the same level of ease and convenience. For all those people out there who are unable to get rid of password protection of a PDF file, go through the following steps, they are easy and clear, and they will definitely help you to remove s password from a PDF file.

The steps for removing password from PDF files are as follows:
  • Step 1: The first step in order to remove password from a PDF file is to go to the “Batch PDF Documents Security” option. Once you find this option and select it you have to click on the “next button”.
  • Step 2: After clicking on the “next button” of the “Batch PDF Documents Security” option, a new window appears. Here you have to click on the “Add” button. The Add button will help you to add that particular encrypted PDF that you want to remove the password from. It is very convenient.
  • Step 3: The third step after addition of the encrypted PDF file to click on “Try Passwords” button. The try passwords button will begin to delete the PDF password. The Password pool will automatically try passwords under the surveillance of password security. This way the PDF password will very easily be removed.
  • Step 4: The fourth and the last step is to click on the “next button”. A Check Box for “Security level” will appear and you have to click on NONE.

How to remove malware from PC or laptop



The PC or the Laptop might be running slow and the peripheral devices are malfunctioning. If strange windows are popping up left right and center, it means that the computer is infected with virus or the malware. The spyware as it is called creates obstructions in performing normal functions and would go a long way in making the computer paralyzed. There are some advices which one can follow so that the PC is not infected by malicious programs.

As the first step, purchase an anti virus suite so that it is able to ward off the intruders from infecting the computer however it doesn’t guarantee safety from the malware. The security software should be regularly updated from the internet so that all the definitions of the virus are contained in the databases. It is important to note that no antivirus program can filter out all the malware which are being created in the virtual world.
It is important to enter the safe mode to eliminate the culprit but prior to that one should disconnect the PC from the internet and switch off the Wi-Fi mode. To boot into safe mode, shut down the PC and restart the computer. As soon as you see the information on the screen, keep on pressing the F8 button. One could find numerous options on the screen, wherein it is possible to select the advanced boot alternative. Choose the safe option with the networking mode and press the enter button.

Samsung Galaxy S4 and iPhone 5 zero-day exploits revealed at Pwn2Own 2013 Contest


At Information Security Conference PacSec 2013 in Tokyo, Apple’s Safari browser for the iPhone 5 and the Samsung Galaxy S4 have been exploited by two teams of Japanese and Chinese white hat hackers.
In HP's Pwn2Own 2013 contest, Japanese squad Team MBSD, of Mitsui Bussan Secure Directions won won $40,000 reward for zero day exploit for hacking Samsung Galaxy S4. The vulnerabilities allow the attacker to wholly compromise the device in several ways, such as using a drive-by download to install malware on the phone.

MacRumors forum hacked; more than 860,000 accounts compromised


Popular Mac news and information site MacRumors user forums have been breached by hackers on Monday this week.
More than 860,000 usernames, emails and hashed passwords were potentially compromised. Users are advised to users that they change their passwords on the forums, as well as any other sites or services where the same password has been used.

Bitcash.cz Bitcoin Exchange hacked; Money from 4000 Bitcoin wallets Stolen


Another Bitcoin Exchange hacked! Bitcash. CZ based out of the Czech Republic has been hacked and Money from 4000 Bitcoin wallets have been Stolen, value of over 2 million Czech Koruna i.e. Approx $100,000.

Bitcash.cz is currently down with a maintenance message that on the evening of November 11, their server was compromised by unknown Hackers and bitcoins from its clients were stolen.
Hackers appear to have sent emails from Bitcash.cz email accounts pretending to be members of staff. The emails claim the company had to use a US recovery company to get back the bitcoins that have been stolen and recipients are then apparently asked to send 2 BTC to a wallet address in order for their bitcoins to be returned.

"We are trying to resolve the situation, but we want to warn our users about fraudulent emails and scams [claiming to be from Bitcash]" site said on their Facebook page.

Federal Judge ruled at Child pornography case, 'Your Peer-to-Peer file sharing data is not a private matter '





Today computer telecommunications have become one of the most prevalent techniques used by pedophiles to share illegal photographic images of minors and to lure children into illicit sexual relationships. The Internet has dramatically increased the access of the preferential sex offenders to the population they seek to victimize and provides them greater access to a community of people who validate their sexual preferences.

The Fourth Amendment is the most implicated and litigated portion of the Constitution. Courts are increasingly confronting the problems associated with adapting Fourth Amendment principles to modern technology.
If you think that your peer-to-peer file sharing can be kept under wraps, then please think again. A federal judge 'Christina Reiss' in Vermont has ruled that there should be no expectation of privacy for data shared across peer-to-peer file-sharing services.

In a Child pornography case, three defendants argued that information gained from a P2P network had been illegally obtained by police without a search warrant.

Security updates for available for Adobe Flash Player and ColdFusion vulnerabilities

Security updates for available for Adobe Patches Flash and ColdFusion vulnerabilities Adobe released critical security patches for its ColdFusion web application server and Adobe Flash Player for Mac, Windows and Linux. Adobe AIR and the AIR SDK and Compiler are also being updated.

These updates address vulnerabilities that could cause a crash and potentially allow an attacker to take control of the affected system, dubbed as CVE-2013-5329, CVE-2013-5330.
The following software versions are affected and should be updated as soon as possible:

Singapore police arrested six men for allegedly hacking Prime Minister and President websites

A Singaporean hacker calling himself the "The Messiah" was arrested in Kuala Lumpur last Monday for hacking into a Singaporean government website over two weeks ago - from a Kuala Lumpur apartment.

James Raj (35) charged with hacking of Ang Mo Kio town council website and posting a symbol associated with international hacker group Anonymous.

He was charged under the Computer Misuse and Cybersecurity Act. If found guilty, he could be jailed for up to three years and fined S$10,000.
Police said Raj was also linked to a series of hacking incidents, including penetrating the website of a charity group related to the ruling People’s Action Party.