Categories
PC Hacks Security

Set-Up The Incognito Mode As Your Default Browsing Mode

Today we are going to explain you the way to setup incognito mode as your default browsing mode without pressing ” Ctrl + Shift + N “. If you are unaware of what is an incognito mode then you can check out this article where it was previously explained on OnlineCmag .

Steps To Setup The Incognito Mode As Your Default Browsing Mode :

Step 1: Create a Shortcut :

You need to create a shortcut of ” chrome.exe ” file. You can find this in your program files Or program files (x86). Use this path as reference ” C:\Program Files (x86)\Google\Chrome\Application ” ( Change the ” C ” to the drive on which all your program are being installed ).

Set-Up The Incognito Mode As Your Default Browsing Mode , Today we are going to explain you the way to setup incognito mode as your default browsing mode without pressing " Ctrl + Shift + N ". If you are unaware of what is an incognito mode then you can check out this article where it was previously explained on OnlineCmag .

Step 2: Move On To Properties :

Right-Click on the shortcut and select the properties option.

Set-Up The Incognito Mode As Your Default Browsing Mode , Today we are going to explain you the way to setup incognito mode as your default browsing mode without pressing " Ctrl + Shift + N ". If you are unaware of what is an incognito mode then you can check out this article where it was previously explained on OnlineCmag .

 

Step 3 : Change The Path :

Now add the text command ” -incognito ” to the path specified in the target text box as shown in the below image.

"C:\Program Files (x86)\Google\Chrome\Application\chrome.exe" -incognito

Set-Up The Incognito Mode As Your Default Browsing Mode

After this change, when ever you launch the application from this shortcut it will directly open the chrome’s incognito mode.

Share Your Views In Form Of Comments …

Categories
Security

Private Browsing: Surfing In Your Browser’s Incognito Mode

Surely more than once that you’ve finished browsing on your computer; for some reason, you had to delete browsing history so no one knew what you had visited . Whether it’s because you’re using a device that is not yours or you might be preparing a surprise for someone or whatever the reason maybe. There are times you are forced to do this, and if you don’t then you may even face some severe consequences.

Fortunately, there are some web browsers namely Google Chrome , which offer the incognito mode ( private browsing ) both in its desktop version for Windows, Linux or Mac and also for its mobile version .

Incognito Mode: Private Browsing in a simple way :

This mode is offered by the Google chrome, which gives you the opportunity to save your time by automatically deleting your browsing history.

The most positive aspect of this is that it is really simple . In Windows or Linux you can access it by using the keyboard shortcut ” Ctrl + Shift + N ” and for Mac system it is ” ⌘ + Shift + N “.

Private Browsing: Things About Your Browser's Incognito Mode

Once you finish your job, you only need to close all incognito windows or tabs, which are identified by a small doll incognito, the one shown on the picture that heads this article. Once you’ve closed all windows or tabs you have nothing to worry about because your navigation will be completely private to your computer.

What is saved and what is not ?

Moving on, we must notice a certain various aspects. The first of them is, do not leave any trace of what you have visited or downloaded . For instance if you have saved the files that you have downloaded to your computer , then there is no use of private browsing as you will be caught. This point is worth remembering.

Cookies aren’t saved while using incognito mode, because although they are available during the browsing session in this way, they are deleted after you close all windows or tabs in incognito mode. Conversely, if we have made ​​any changes to the settings or bookmarks then Google Chrome will save them , as it is not within private browsing ( incognito mode ) offering.

Finally, note that if you initiate a session with your Google account , or some other service that records your visits within the incognito mode, then the sites you visit will be reflected in your web history that will be stored in the cloud. So if you want to have a completely private browsing session then make sure you follow all the above mentioned precautions.

 

Categories
PC Hacks Security

Increase Your System Security By Using Facial Recognition

Here comes the ultimate solution for those who often forget their Window’s password. By using this application you can simply access your computer just by sitting in front of it. Today we are going to show you how this fantastic program works. By using this application, no one can access the computer without your permission, unless you have a twin brother / sister.

Luxand Blink! is an application of biometric access that allows the user to access Windows by facial recognition. The user’s face is captured via Webcam, and compared with previously registered profile. Thus, the application can allow or deny access to Windows.

Luxand Blink! makes it extremely easy to access the system without entering any name and password in the window’s login.

System Requirements To Run This Application :

  • Operating System : Any version of Microsoft Windows .
  • Webcam compatible with DirectShow.
  • Needs 18 Mb of free disk space on the hard disk.

Steps To Setup The Facial Recognition :

The first thing is to install this application, during the installation process it will ask you to select the webcam that you want to use.

Increase Your System Security By Using Facial Recognition

Once installation is complete, start the assistant for face recognition by clicking on Next.

Increase Your System Security By Using Facial Recognition

Now it will show you how to stare for proper recognition. Click on Next to continue .

Increase Your System Security By Using Facial Recognition

In the next window facial recognition will be started. You just stare ahead and turn your head to the right and left until the recognition process is finished, it just takes a few seconds.

After registering your faces successfully, you will be asked to enter the system password. After entering the password just click on Finish.

Increase Your System Security By Using Facial Recognition

Test The Application :

To test its proper functioning, you can Logout and log back into your windows by using facial recognition . You can also enter windows by just typing the username and password as usual.

You can access the application settings by right-clicking on the Luxand Blink icon shown in the toolbar.

Application settings :

  • Face authentication login : Enable or disable the facial recognition.
  • Register my Face: Register a new face
  • Select camera: Choose a different camera.
  • Help file: Opens the web help.
  • The program runs at Windows startup: If this option is disabled the program does not start when Windows starts but will enable facial recognition.
  • View the login history: In this section we will have all the unsuccessful attempts to login by face recognition, for example if someone sits in front of the computer and tries to login , then this application will capture the image of the person and stores it a side. So you can also see who has tried to access your computer without your permission.
  • High security: By enabling this option,the application will learn something new whenever you log in with your face, like a haircut or a day without shaving etc.
  • High convenience: This is a training mode.

Our Team has tested this application and it works perfectlt fine, Eg: You can not use a photograph of the registered face to login into the system . So nobody except your twin brother/sister can login to the system. Also in case of failed login you can easy catch the intruder red-handedly .

Categories
Security Web Guides

How to Avoid Malicious Softwares Using Google Chrome

Internet is full of all kinds of software , and also a part of it are the malicious software. These software could be used against us and can help hackers steal our data, monitor our tasks, infect our devices, for the economic benefit of the creator, and many more.

It is impossible to find a method that works 100% to avoid this malware infection, but we always have some kind of protection if we have adequate security. Although as I have always said the best antivirus is common sense. Still, not everyone is ready to surf the Internet without any kind of ” shield ” .

How to Avoid Malicious Softwares Using Google Chrome , Avoid Malicious Softwares , Avoid Malicious Softwares

In recent years, Google has been developing a type of protection system that can notify us when potential threats are detected by the Google Chrome. It is useful for people who don’t use any protection. It is not foolproof, because no antivirus is 100% accurate but can definitely save us from some unexpected frights.

The project takes a long time in development by Google and the system is already well advanced. It warns you when the Google Chrome note that some malware can affect your computer . It is available for Windows, Android, Linux, and Mac OS. Probably we will see this option in the official versions of Google Chrome in 2016.

Steps To Activate The ” Avoid Malicious Software ” option :

To activate this option we should access the hidden browser options of Google Chrome. This page contains information about all the on  going projects which Chrome is undertaking and are not 100% completed. Now, just copy and paste the below Line to the address url bar of your Google Chrome and hit enter .

chrome://flags#malware-interstitial-version

Now the hidden browser feature page of Google chrome will be displayed.

In malware interstitial version select the ” New version ” option from the scroll down menu. After this you need to restart the browser and then it will automatically start its work.

It may not provide complete and highly efficient protection, but fine for people living idly surfing the Internet. In addition, it will help Google Chrome in testing one of their new projects which have good sense, which then lets you go faster.

Note :  1.) Don’t Try to change any other options in the hidden browser feature section as they are not yet tested and the consequences could be severe .

2.) If at all by the time you are trying this, if you can’t find this option on that page, it is to be understood that the feature is already added to your Chrome as an update.

Share Your Views In Form Of Comments…

Categories
PC Hacks Security System Performance

How To Detect Scams, Phishing, Bots, Spam, etc. ?

Commonly happens , You receive an email from a stranger, or forwarded from a friend. It seems too good to be true. But how you can be sure ? Is it really safe to ignore this great opportunity? . Follow the below given steps which helps you to detect the scams .

Steps To Detect Scams, phishing, bots, spam, etc. :

Step 1 : Copy a harmless line of text from the message to the clipboard.

How To Detect Scams, phishing, spam ,bots, etc. ? , Commonly happens , You receive an email from a stranger, or forwarded from a friend. It seems too good to be true. But how you can be sure ? Is it really safe to ignore this great opportunity? . Follow the below given steps which helps you to detect the scams .

Step 2 : Open your favorite search engine in the Internet browser .

How To Detect Scams, phishing, spam ,bots, etc. ? , Commonly happens , You receive an email from a stranger, or forwarded from a friend. It seems too good to be true. But how you can be sure ? Is it really safe to ignore this great opportunity? . Follow the below given steps which helps you to detect the scams .

Step 3 : Paste the text into the search bar and search.

How To Detect Scams, phishing, spam ,bots, etc. ? , Commonly happens , You receive an email from a stranger, or forwarded from a friend. It seems too good to be true. But how you can be sure ? Is it really safe to ignore this great opportunity? . Follow the below given steps which helps you to detect the scams .

Step 4 : Review the search results.

How To Detect Scams, phishing, spam ,bots, etc. ? , Commonly happens , You receive an email from a stranger, or forwarded from a friend. It seems too good to be true. But how you can be sure ? Is it really safe to ignore this great opportunity? . Follow the below given steps which helps you to detect the scams .

Step 5 : You can see for yourself if its really true; if not you’ll surely find some article about it describing how that chain mail or scam started and how you are being tricked by such stories which hardly are real.

Advice :

  • If the first search was unsuccessful, please try to include your own names or locations, because these are changed often.

Note :

  • This is not a protection for ” new scams “. But fortunately, most of them are reused.
Categories
PC Guides Security Web Guides

Learn About Spyware In These 5 Simple Points And Stay Alert

Did your internet connection slow down suddenly? Is it accompanied with noticeable shrinking in your computer’s processing powers?

Well, then most probably you have downloaded some malicious software from one of those websites which inject spyware into your computer. Or it could even be due to hardware malfunctioning or some hard disk issue but let’s stick to one reason and the title of this article, spyware.

In this article, we walk you through what spyware is, the reason it slows everything down, how it could really be a pain and likewise much more. So let’s get started.

Spyware: The ‘What is’ part

In a nutshell, spyware is software for spying on someone’s computer. To expand it for clearer understanding, we can regard any software which assists in collecting information about an organization or individual without their knowledge as a spyware.

Once this piece of unwanted code enters into your system, it can put your entire private information at risk. Plus, drastically affects your computer’s performance.

 

Learn About Spyware In These 5 Simple PointsHow Spyware enters your computer?

In most cases, spyware enters your computers because of trickery. Who would like to put their computers at risk?

So, they are carefully constructed to deceive the target sometimes with downloads promising to offer extra functionality to your browser; or it could be via messages congratulating you over winning a contest, or simply by installing software from websites with malicious content.

On rare instances, it could also be because of simply clicking on a pop-up so watch out and from now on, do make sure you click the ‘X’ button exactly.

What all a Spyware is capable of doing?

Apart from transferring your private information to third party websites and businesses, like already mentioned, the first thing you will notice is deteriorating system performance.

This is because the Spyware will always be busy reading information from different locations, sometimes even taking screenshots without your consent, thus miss utilizing system resources.

In some cases, the internet connection is affected. Connecting and browsing gets really tough often with too many pop-ups and HTTP redirects.

There could even be instances where the Spyware can’t be found, and even if found cannot be completely removed from your computer.

The other main trouble with Spyware is, often they disable anti-virus software and firewalls thus, making your computer vulnerable to all sorts of attacks.

Now, what to do if you are targeted?

Just because your computer is taking longer to process stuff, doesn’t mean you have to give up on it. There are actually different solutions to this problem and we have dealt with each of them in detail in our previous article which gives you several Important tips to avoid getting targeted .

The Internet and Security

The Internet is truly a boon and perhaps one of the much-needed creations by man. But as long as there are people on the opposite side of good; Spyware and its associated programs keep troubling us and the only way to protect yourselves is ensuring you have a licensed and updated anti-virus software.

Because after all protecting your information is a basic thing and one can do it properly only once he understands what’s at stake.

Categories
Security

What To Do When Your Computer Gets Hacked ?

If you’re worried that someone has hacked your computer or electronic device, then take your gut-felt concerns seriously and act fast. This article will show you some quick measures to be taken when your computer gets hacked.

Steps To Follow If Your Computer Gets Hacked:

Step 1: Disconnect From The Internet Immediately:

The first and best thing to do is to disconnect your PC from the Internet. That way, if a hacker is still on your computer, you have removed his source connection.

  1. Disconnect the cord from the router to ensure completely that there is no connection!
  2. Print this article or convert it to PDF before disconnecting the internet so you can continue to follow these instructions without being connected. Or you can even read it on a device that has not been hacked.

Step 2: Turn On The PC In Safe Mode:

What To Do When Your Computer Gets Hacked ?

Power off the computer and use safe mode to start. If you are not sure how to do this, check the operation manual of the computer.

Step 3: Identify Unknown Programs

Check if there are any ” new applications or programs ” (eg, antivirus, anti-malware, etc. ) installed on your computer. Note down the programs and files that do not work or open. If you find something strange, then just uninstall it. If you do not know how to, get help from someone or call some computer experts to do it for you.

Step 4: Scan Your Computer:

What To Do When Your Computer Gets Hacked ?

Clean your computer with a trusted virus or malware scanner (eg, Avast Home Edition, AVG Free Edition, Avira AntiVir, etc. ) and carefully locate all the threats.

Step 5: Backup Your Files

What To Do When Your Computer Gets Hacked ?

If nothing appears in the results, make a backup of your important files. Then, perform a full system restore and update the computer.

Step 6: Inform This To Bank Or Other Important Organisation:

Contact your bank and the accounts of stores that have to warn about the problem. Ask them to check if all your accounts are safe and request measures to protect your funds.

Step 7: Alert your friends

Alert your friends about who might have received infected emails from your mailbox. Ask them to delete them and do not access any link that has appeared in such emails.

Extra Tips :

1. Back up your important files such as family photos, documents, etc. and load them on a USB stick (encrypted).

2. The best method is to prevent beforehand so learn to identify such attacks at the earliest. Our article on How to know if your PC is hacked might be useful.

3. When you leave, turn off the Internet.

4. Use A backup program if you want to continue the same operating system that you had before you were hacked.

Categories
Security

Important Tips To Avoid Spyware From Disturbing You

Spyware refers to software that is installed on a computer without the user’s knowledge. It can be used to track and monitor the use of computers to send to third parties for marketing purposes.

Spyware programs are very dangerous because they can take part of the processing power of the computer, collect personal information and send pop-up ads without permission.

Through password recorder or by taking screenshots or by scanning hard drives, spyware can maliciously take your personal information for criminal gain. There are certain steps you can take to block spyware from your computer.

Be Very Careful While downloading

Knowing what you download and from which site, is an important step when it comes to blocking spyware. Many spyware programs get into your PC without your knowledge when you download other software.

Important Tips To Avoid Spyware , Important Tips To Avoid Spyware

You should always read the License Agreement End User as sometimes spyware programs are allowed access via third party ad when you click to accept the software you are downloading.

Avoid peer to peer file sharing

This is another common way for spyware to enter your computer. Sharing your files between ports is very risky. Particularly because the content coming from the other computer is unknown.

So, spyware and viruses can even enter in this way and the best way to block spyware is to prevent its entrance into your computer.

Add plugins in your web browser

Internet browsers such as Chrome, Firefox, Internet Explorer or Opera have add-ons that block pop-up ads to appear while browsing.

This is another important measure to prevent spyware. Because if you click on the pop-ups then it may inadvertently direct you to a scam page and trick you into downloading spyware on your computer.

Use anti-spyware software and mind these points

  1. Descriptions and user reviews are published in many consumer review sites. One of the things which you should consider in your anti-spyware software is scanning speed, which is how fast you can scan through your entire hard drive for spyware and viruses. That software should have high compare accuracy, which is the ability to distinguish legitimate software programs or spyware sites. You should also know how often the software updates their software when new spyware or virus attacks are known and also consider the technical support offered to the users.
  2. Find freeware or shareware. There are a number of freeware and shareware sites that offer free anti-spyware. These will be more limited than the programs offered commercially but can provide you with adequate protection from spyware. Make sure the website you are downloading from is reliable.
  3. Buy commercial software. Alternatively, you can opt for buying anti-spyware software. Most of the anti-spyware software come included with an anti-virus software.
  4. Check for updates often. Even with anti-spyware software installed on your computer, you should periodically check for updates from the software manufacturer as new spyware and viruses are developed. These updates protect you from the latest spyware programs.

Keep your operating system up to date

Keeping your operating system updated, is very important to prevent spyware and viruses from your computer.

Security patches are usually released by manufacturers that can fix holes in your system that can be accessed by hackers and spyware.

Make sure your operating system is the latest version released by the manufacturer. Most operating systems automatically check for updates periodically.