About the site / Blog#0
Introduction
The internet is ever growing and you and I are truly pebbles
in a vast ocean of information. They say what you don’t
know can’t hurt you. When it comes to the Internet
believe quite the opposite. On the Internet there a millions and
millions of computer users logging on and off on a daily basis.
Information is transferred from one point to another in a heartbeat. Amongst those millions upon millions of users, there’s you.
against the sharks of the information super highway daily.
Problem with that is the stealth by which it happens. Currently
about 30-40% of all users are aware of the happenings on their
computer. The others simply either don’t care or don’t have the
proper “know how” to recognize if their system is under attack
and or being used.
You visited my blogging site because you are concerned about your
privacy on the Internet. As well you should be. On the Internet
nothing is quite what it appears to be. The uninformed will get
hurt in many ways.
By taking interest in your privacy and safety, you have proven
yourself to be above the rest. You can never have enough
information. Information is power and the more informed you as
a user become the less likely you are to fall prey to the sharks
of
the Internet.
In this site, I will cover with you things that may scare you.
Some things may even make you paranoid about having a
computer. Don’t be discouraged though, as I will also tell you
how to protect yourself. The reasons for telling you the “dirt” if
you will is that I feel it important for you to know what is at
risk.
I made this site as a guide. To show you how hackers gain
access to your system using security flaws and programs. The
theory goes that if you are aware of what they are doing and how
they are doing it you’ll be in a much better position to protect
yourself from these attacks.
(Through out this site you will see reference to the term
“Hacker.” This is a term I use very loosely for these
individuals.)
These are just a few of the topics that will be covered:
How “hackers” get into your system
What tools they use
How a hacker can effectively “Bug” your house via your
computer. (Don’t believe me, read on you’ll be very
surprised)
What information they have access to. And why you
should try to protect yourself. (You might be surprised to
find out what they know.)
Tips and tricks that hackers use
How your Antivirus software alone is not enough
What to look for if you suspect you’re being hacked
What the greatest flaw to all computers are
And more…
Website will protect you from everything. What I will say is that
by reading my blogs hopefully you will be in a better situation
to protect yourself from having your information compromised.
Did you know it doesn’t matter if you’re connected to the net
24hrs a day or 15 min’s a day your system is vulnerable. Not
only is it vulnerable in that 15 min’s you can possibly loose all
your data get locked out of your own system and have all your
confidential information like your “Bank Account Numbers”, “Your
Budget”, “Your personal home address” compromised.
Don’t give me wrong, I’m not trying to throw you into a state of
paranoia either. What I am saying is that if you’re not careful
you leave yourself open to a wide range of attacks.
Perhaps you’re skeptical and saying to yourself “Oh I don’t do
anything on the net except check my E-mail etc that sort of thing
can’t happen to me.”
Cheers!!
Udit Tech
(Dir/Founder@EH4ALL)
I would like to express my concerns about the misuse
of the information contained in this Website. By Reading My blogs
you
agree to the following stipulations. Any actions and or activities
related to the
material contained within this website is solely your
responsibility.
The misuse of the information in this website can result in
criminal charges brought against the persons in question. The
author will not be held responsible in the event any criminal
charges be brought against any individuals misusing the
information in this website to break the law.
(Note This
website was created for Information purposes only.)
Comments
Post a Comment