How to secure Internet Activity.
How to check if I am Hacked.
How to protect the PC.
Windows Forensics.
Malware analysis.
1.Hide your IP, encyrpt communication ,email.
Firefox add-ons
anonymoX
FoxyProxy
Enlocked encrypts email firefox addon.
Install TOR
ANONYMIZER is paid Software.
2.Securing the Hard disk
Zeroing the HD to format the hard disk throughly.
Partition Wizard. Hidden partitions and damaged sectors.
fixmbr fixboot commands recovery console to remove mbr rootkits.
Best new HD
3.Netstat TCPView
4.Autoruns.MSconfig
5. Registry --- run key
6.Check services.
7.Jotti, Virus Total.
8.Branded antivirus.
9.Keyloggers.Software Hardware and Wireless.
10. How a Hacker enters your PC and hacks your email.
11.Virtual Machines.
12.Router with firewall,Router logs.
13.Antivirus,Antirootkit,Antispyware.
14.How to Monitor traffic.IPS IDS ,Comodo sandboxing,Firewalls.
Firestarter Ubuntu.
15.Email don't download attachments,spear fishing.targetted attacks.
16.Tracing IP,link in Orkut Facebook.
How to check if I am Hacked.
How to protect the PC.
Windows Forensics.
Malware analysis.
1.Hide your IP, encyrpt communication ,email.
Firefox add-ons
anonymoX
FoxyProxy
Enlocked encrypts email firefox addon.
Install TOR
ANONYMIZER is paid Software.
2.Securing the Hard disk
Zeroing the HD to format the hard disk throughly.
Partition Wizard. Hidden partitions and damaged sectors.
fixmbr fixboot commands recovery console to remove mbr rootkits.
Best new HD
3.Netstat TCPView
4.Autoruns.MSconfig
5. Registry --- run key
6.Check services.
7.Jotti, Virus Total.
8.Branded antivirus.
9.Keyloggers.Software Hardware and Wireless.
10. How a Hacker enters your PC and hacks your email.
11.Virtual Machines.
12.Router with firewall,Router logs.
13.Antivirus,Antirootkit,Antispyware.
14.How to Monitor traffic.IPS IDS ,Comodo sandboxing,Firewalls.
Firestarter Ubuntu.
15.Email don't download attachments,spear fishing.targetted attacks.
16.Tracing IP,link in Orkut Facebook.
No comments:
Post a Comment