Friday, October 4, 2013

World’s Top 10 Most Expensive Domain Names

Enough with the preamble, though—check out the world’s top ten most expensive domain names:


1. Insure.com, sold to QuinStreet for $16 million in 2009.
2. Sex.com, sold for $12-$14 million in 2006.
3. Fund.com, sold for $9.99 million in 2008.
4. Porn.com, sold for $9.5 million in 2007.
5. Business.com, sold for $7.5 million in 1999.
6. Diamond.com, sold to Ice.com for $7.5 million in 2006.
7. Beer.com, sold for $7 million in 2004.
8. Israel.com, sold for $5.88 million in 2004.
9. Casino.com, sold for $5.5 million in 2003.
10. Toys.com, sold to Toys ‘R Us for $5.1 million in 2009.

Tuesday, September 3, 2013

Secure (hard-to-crack) Password Techniques

For almost every account that you make online, you are required to make a secure password. Here is a guide on to how-to make a hard-to-crack password :

Stretching Password is an advantage :
Create a password that has eight or more characters since this is usually the minimum for most password requirements. The longer the password the more secure it is likely to be.
 


Form a "random" sequence of words and/or letters :
Create a phrase or series of letter that is seemingly "random" but is easy to remember. Call this your "base-word."

 Add numbers to the base-word to make it more secure :
  • Example: Add the ages of the children to the end making it "jecamije22191612".
  • Example: Add the house number to the end of the base-word to create "houseonspooner1500". 

Use punctuation and symbols to "complicate" it further:
  • Example: Add random punctuation to create "jecamije_22191612".
  • Example: Add a symbol to the word to make "houseonspooner#1500". 
 Create complexity with upper and lowercase letters:
  • Example: Take advantage of adding capital letter to create "JeCaMiJe22191612".
  •  Example: Add the house number to the end of the base-word to create "houseonSpooner1500". 

Generate similar but altered passwords:
Use the same or similar base-words to help you remember your passwords easily without making them "too" easy to crack.

  • Example: "JeCaMiJe_22191612" can become "mykidsJeCaMiJe-90807060" or "12161922*JeCaMiJe".
  • Example: "HouseonSpooner#1500" can become "1500*myfirstHouseonSpooner" or "***15HouseonSpooner00". 
watch video secure password tips http://itsecurity-india.blogspot.in/p/security.html

article ref by: http://www.wikihow.com/Choose-a-Secure-Password

 

Monday, September 2, 2013

Protect Computer Against Virus and Worm Attacks

As the Internet becomes more and more integrated into everyday lives, we must learn how to protect  ourselves against new types of online attacks. 

What Can Malware Do to My PC?
Malware opens up backdoors on infected systems, giving hackers direct access to the hijacked PC. 

Don't open email messages from unfamiliar senders, or email attachments that you don't recognize
Many viruses are attached to email messages and will spread as soon as you open the email attachment. It's best not to open any attachment unless it is something you are expecting. 

know how to remove virus from your PC without using antivirus program : 

What About P2P?
Peer-to-peer (P2P) networking has become a launching pad for viruses. Attackers incorporate spyware, viruses, Trojan horses, and worms into their free downloads.  

Install an antivirus program. 
Some antivirus programs are sold with annual subscriptions that can be renewed as needed, but many are also available for free.

Use a pop-up blocker with your browser
Pop-up windows are small browser windows that appear on top of the website you're viewing. Although most are created by advertisers, they can also contain malicious or unsafe code. A pop-up blocker can prevent some or all of these windows from appearing.  


 


Wednesday, August 28, 2013

Secure Android Smart Phones

These are some simple steps to secure your smart phone

1. Protect your phone from suspicious apps 

2. Don't download any app directly from internet they might contain spyware(virus), trust only google play store to download applications. 

3. Locate, ring and wipe a misplaced device

For more advice on how to protect yourself and your family online, visit our videos section , and stay tuned for more posts in our security series. 

 

Friday, August 16, 2013

OPST - Open Source Professional Security Tester Training

 OPST - Open Source Professional Security Tester Training
IT security holds top priority for some of the biggest organizations in the world. Since loss or theft of critical company information can make a firm lose millions, security of their systems is an area they wouldn't rather take chances. Therefore, OPST (Open Source Professional Security Tester) certification is one of the most lucrative qualifications immensely in demand today. OPST certification is worthwhile if your aim is to work in an IT department and handle networks and systems. Network administrators, system administrators, network engineers, network architects, security analysts, security auditors and developers and those who want to polish their technical security skills; have much to gain from this course. Accredited by ISECOM, this OPST course from Koenig offers you great learning opportunities that are beyond your expectations.

Course Objectives

The OPST course targets at providing sound knowledge to students about functioning of network protocols and several security programs and devices, user level expertise with a common OS and basic know-how of server operations/administration specifically to set up and run services and daemons. The course encompasses ethical hacking, web application and penetration testing and network auditing. Objectives of this course include -
  • Safe and legal execution of professional security testing
  • Maximizing precision
  • Learning information sources
  • Understanding information security testing principles with a formal methodology
  • Quantifying and measuring the threats appropriately
  • Deducing the common security tools output
OPST is an applied knowledge certification. It gives you the opportunity to showcase your ability as an expert security tester. Once you gain expertise to use scientific and OSSTMM approaches resourcefully, you can deftly put technical security to test in an ethical manner. So, if you want to be established as a professional who can conduct precise, safe and extensive security tests; this certification will prove to be of great value for you.

for more details visit : http://www.koenig-india.com/opst.aspx#

refer by: http://www.koenig-india.com/opst.aspx

Thursday, August 8, 2013

Hackers are ready. ARE YOU?

Certified Ethical Hacker (CEH) certification by exploring the analytical phase of ethical hacking. While CEH exposes the learner to hacking tools and technologies, ECSA takes it a step further by exploring how to analyze the outcome from these tools and technologies. Through groundbreaking penetration testing methods and techniques, ECSA class helps students perform the intensive assessments required to effectively identify and mitigate risks to the security of the infrastructure.
EC-Council Certified Security Analyst (ECSA) complements the
The objective of a Licensed Penetration Tester is to ensure that each professional licensed by EC-Council follows a strict code of ethics, is exposed to the best practices in the domain of penetration testing and aware of all compliance requirements required by the industry.

To obtain LPT a candidate must:
  1. Achieve the Certified Ethical Hacker (CEH) Certification.
  2. Achieve the EC-Council Certified Security Analyst (ECSA) certification.
  3. Fill up and submit the LPT Application form along with required documents and payment ($500) to EC-Council directly.
Koenig is an Accredited Training Partner of EC-Council and our courses are run using the Official Curriculum.

Who should attend:
  • System Administrators
  • Network Administrators
  • Firewall Administrators
  • Security Testers
  • Risk Assessment Professionals
For registration, visit at http://www.koenig-india.com/ecsa-lpt.aspx

ref by: http://www.koenig-india.com/
 


Friday, July 26, 2013

CISSP - Certified Information Systems Security Professional

Certified Information Systems Security Professional (CISSP) is an separate information security documentation controlled by the not-for-profit Worldwide Details Techniques Protection Certification Range, (ISC)2.

The CISSP was the first certification in the area of data security, accepted by the ANSI (American Nationwide Requirements Institute) to ISO (International Requirements Organization) Conventional 17024:2003. It is accepted by the U.S. Division of Protection (DoD) in both their Details Guarantee Specialized (IAT) and Managing (IAM) groups.

The CISSP has been implemented as a guideline for the U.S. Nationwide Protection Company's ISSEP program. CISSP documentation is not only an purpose evaluate of quality, but a worldwide identified standard of accomplishment.

CISSP training is conducted by Mr. Rahul Kokcha a well known expert in Information Security. In order to achieve CISSP you have to pass the exam and meet other prerequisites
Our pass rate is > 80%. 

Salient Features of CISSP training at Koenig:
  • The CISSP course at Koenig is conducted under the supervision of a CISSP instructor
  • Mock Test as per the pattern and difficulty level of real exam
  • The course has been designed to maximise success in the tough CISSP exam
 by ref : http://www.koenig-india.com/cissp.aspx