Citibank on Phishing e-mails

DO’s and DONT’s IN MOBILE PHONE

Dont’s

•Please do not click photographs with your mobile phones without permission from the people or authorities concerned. You may be invading the privacy and possibly indulging in an illegal act.
•Do not send obscene / pornographic text / images using SMS.
•Do not send obscene / pornographic text / images using MMS (Multimedia Messaging Service)
•Do not receive from or reply to SMS / MMS of strangers.
•Do not transmit obscene/ pornographic material, as it is an offence under Information Technology Act –2000 which carries a punishment of 5 years of imprisonment and 1 lakh rupees fine.
•Do not make calls to the unknown phone / mobile numbers you get while chatting or which are exhibited on various profiles on the Internet. If you do, you may be causing harassment to the other person.
•Do not keep your Blue Tooth open at all times-you may receive obscene / pornographic text, images and viruses.
•Do not give your mobile numbers while chatting on INTERNET to avoid “STALKING”.
•DO not handover your mobile phone to unauthorised service centres, to avoid CLONING.
•It has been reported in the press that some unscrupulous elements may contact your mobile saying that they are from government agencies or Service Providers and request you to press #90 or #09. It is reported that doing so would transfer control of your SIM to the caller. SO DO NOT PRESS #90 or #09 when asked by unidentified persons.

DO’s

•Note down your IMEI number.
•Security pin code should be used to avoid misuse of your mobile phones.
•MMSs / SMSs received should be checked for their source before opening.
•Delete all obscene / pornographic text, images, SMS /MMS from your mobile phones which you might have received or stored. Otherwise this may land you in trouble and unwanted embarrassment.
•Anti-virus software should be loaded in the mobile phone.
•Mobile phone keypad should be locked after every use.
•Use your mobile phone only when necessary .

Coutsey: BSNL http://www.chennai.bsnl.co.in/

How to enable legacy for sata hard drive in HP?

To Enter the BIOS setup

Try any one of the following key’s on HP Server
Esc; DEL; F1; F2; F10; Ctrl +S

Go to Advance

Select on Harddisk Configuration

Click on Sata Mode Selection

Select AHCI

Be Aware / Stay Away from phishing emails

An email is enough to rob you of your hard-earned money !

Phishing email alert : Stay away from phishing emails claiming to be from Reserve Bank of India.

we thought to update you about the ongoing dangers lurking over your bank account. Reproduced here is a fake email supposedly sent by Reserve Bank of India (RBI), that is being circulated on the internet.

We understand that you need to be notified about any dangers lurking over your bank account. Reproduced here is a fake email supposedly sent by Reserve Bank of India (RBI), that is being circulated on the internet.We understand that you need to be notified about any dangers lurking over your bank account. Reproduced here is a fake email supposedly sent by Reserve Bank of India (RBI), that is being circulated on the internet.We understand that you need to be notified about any dangers lurking over your bank account. Reproduced here is a fake email supposedly sent by Reserve Bank of India (RBI), that is being circulated on the internet.We understand that you need to be notified about any dangers lurking over your bank account. Reproduced here is a fake email supposedly sent by Reserve Bank of India (RBI), that is being circulated on the internet.We understand that you need to be notified about any dangers lurking over your bank account. Reproduced here is a fake email supposedly sent by Reserve Bank of India (RBI), that is being circulated on the internet.We understand that you need to be notified about any dangers lurking over your bank account. Reproduced here is a fake email supposedly sent by Reserve Bank of India (RBI), that is being circulated on the internet.We understand that you need to be notified about any dangers lurking over your bank account. Reproduced here is a fake email supposedly sent by Reserve Bank of India (RBI), that is being circulated on the internet.We understand that you need to be notified about any dangers lurking over your bank account. Reproduced here is a fake email supposedly sent by Reserve Bank of India (RBI), that is being circulated on the internet.We understand that you need to be notified about any dangers lurking over your bank account. Reproduced here is a fake email supposedly sent by Reserve Bank of India (RBI), that is being circulated on the internet.


Phishing alerts

RBI Fake mailRBI fake loginfake RBI

Such mails are fradulent. Request you not to respond to such emails. Be aware and be alert. In case you have clicked on any links within such an email and /or shared any sensitive data, please contact your nearest Bank Bank branch or write to you bank support email id or call your bank customer care and inform them and take a next guidelines.

Courtesy : got email from HDFC Bank Ltd.

In Linux system How to set date and time?

How to check date?

Type date command

#date

Thu May 12 15:43:04 IST 2011 (Shown on today date)

How to set date and time?

For example, set new data to 2 Oct 2006 18:00:00, type the following command as root user:

# date -s "2 OCT 2006 18:00:00"


OR

# date --set="2 OCT 2006 18:00:00"

You can also simplify format using following syntax:

# date +%Y%m%d -s "20081128"

Linux Set Time

To set time use the following syntax:

# date +%T -s "10:13:13"

Where,

  • 10: Hour (hh)
  • 13: Minute (mm)
  • 13: Second (ss)

Use %p locale’s equivalent of either AM or PM, enter:

# date +%T%p -s "6:10:30AM"

# date +%T%p -s “12:10:30PM”

Courtesy :-http://www.cyberciti.biz/

Strong Password Policy Tips

What is a Firewall?

A firewall is a part of a computer system or network that is designed to block unauthorized access while permitting authorized communications.

It is a device or set of devices that is configured to permit or deny network transmissions based upon a set of rules and other criteria.

Firewalls are thus a specialized type of router focusing on specific types of network security functions.

Firewalls can be implemented in either hardware or software, or a combination of both.

Firewalls are frequently used to prevent unauthorized Internet users from accessing private networks connected to the Internet, especially intranets.

All messages entering or leaving the intranet pass through the firewall, which inspects each message and blocks those that do not meet the specified security criteria.

Courtesy :- http://en.wikipedia.org/wiki/Firewall_(computing)

What is Trojan Horse?

A Trojan horse, or Trojan, is software that appears to perform a desirable function for the user prior to run or install, but steals information or harms the system

Trojan horses may allow a hacker remote access to a target computer system. Once a Trojan horse has been installed on a target computer system, a hacker may have access to the computer remotely and perform various operations, limited by user privileges on the target computer system and the design of the Trojan horse.

Courtesy :- http://en.wikipedia.org/wiki/Trojan_horse_(computing)

What is a Phishing?

What is a Phishing?

Phishing is an Internet scam where the user is convinced to give valuable information. Phishing will redirect the user to a different website through emails,instant messages, spywares etc.Phishers offer illegitimate website to user to fill personal information.The main purpose of phishing is to get access to the customer’s bank accounts,passwords and other security information. Phishing attacks can target the audience through mass-mailing millions of emai address aroung the world.
Phishers can fool user by convincing them to get into a fake website with the domain name slightly different from the orignal website which is difficult to notice.
They use the images of the legitimate hyperlink,which itself helps as a hyperlink to an unathorized website. Phishers track the users by using the images in the content  of a web page that looks like a browser window. Keeping an unathorized browser window on top of, or next to a legitimate window having same looks,
will make the user believe that they are from the same source. Setting the tone of the languages same as the original website.

Courtesy :-  http://www.eccouncil.org/

What is a Spyware Symptoms?

If your computer starts to behave strangely, you might have spyware or other unwanted software installed on your computer.
  • I see pop-up advertisements all the time.Some unwanted software will bombard you with pop-up ads that aren’t related to a particular Web site you’re visiting.These ads are often for adult or other Web sites you may find objectionable. If you see pop-up ads as soon as you turn on your computer or when you’re not even browsing the Web, you might have spyware or other unwanted software on your computer.
  • My settings have changed and I can’t change them back to the way they were.Some unwanted software can change your home page or search page settings. Even if you adjust these settings, you might find that they revert back every time you restart your computer.
  • My Web browser contains additional components that I don’t remember downloading.Spyware and other unwanted software can add toolbars to your Web browser that you don’t want or need. Even if you remove these toolbars, they might return each time you restart your computer.
  • My computer seems sluggish. Spyware and other unwanted software are not designed to be efficient. The resources these programs use to track your activities and deliver advertisements can slow down your computer and errors in the software can make your computer crash. If you notice a sudden increase in the number of times a certain program crashes, or if your computer is slower than normal at performing routine tasks, you may have spyware or other unwanted software on your machine.

 

Courtesy :- Microsoft Corporation
http://www.microsoft.com/security/spyware/indicators.aspx