Showing posts with label data. Show all posts
Showing posts with label data. Show all posts

Friday, July 06, 2012

Easiest way to protect personal computer data from copying to external or removable device by unauthorized people.

Sometimes both in office or home computer we become victim of theft of our personal data. But we can’t even catch what the person near you have done on your computer in your absence. There are a lot of ways to protect personal data from being stolen by unauthorized people. But a few days ago I’ve found the easiest way to do this job.

It’s a little software but it is too much helpful to do this job.

The name of the software is PREVENT.

Use of Prevent:

  • At first simply install the program.
  • You’ll better delete the shortcut from desktop after installation is done.
  • Open Prevent from the folder you installed it
  • Then click active.

Capture

  • Then close the window and check that all your copy, cut, delete and send to option is hidden.
  • You can change the default hotkey, (Ctrl+P) by holding down the Ctrl button and then pressing any key from your keyboard’s first row.
  • To exit prevent, press the hotkey you’ve made on Prevent.

Download Prevent v1.0

 

 

N. B: Files can be copied by drag and drop.  Other tasks (Delete, cut, rename and send to buttons are disabled while running Prevent.)

Thanks for visiting my blog. Smile

English to Bengali Dictionary
Powered by Tamilcube.com

oDesk Certified English (Sentence Structure) Expert

oDesk Certified English Spelling (U.S. Version) Professional

oDesk Certified MS Word 2003 Expert

Wednesday, July 04, 2012

Advantages of using trusted application on mobile phone.

Now a day mobile phones has been made high end. We want to bring everything into our hand. So, mobile phones are no longer been used for making voice call or receiving it. Now we can surf Internet, send text messages, emails, capture images, record sound and video and much more. Even our modern phones are various application supported. We can download and install our necessary and emergency tools on our phones. A lot of application has been made and developed. But some of those are certified by trusted supplier or third party and those applications are safe to run on mobile phone.


There are some reasons for installing third party trusted application on mobile. Those are:


  • Keeping phone free from errors.
  • Preventing hackers to hack phone while using an un-trusted web application like opera mini, facebook etc.
  • Stopping permission for data access each time of running the application.

  • To install third party trusted software on mobile phone, the phone is to be checked that it is certificate supported or not. If yes, then you may freely install trusted applications. If not, you’ll not be allowed to install those on phone.

    Some phones automatically disable the permission for data access for the application that is from trusted supplier. If you find that your phone is asking for permission to access data each time you run the application though the application is trusted, you’ll need to change the permission setting manually. Go to phone’s application data access permission setting and enable ‘Always allow’ wherever the function is found. After doing this, the application will automatically access your phone’s data. Un-trusted application has no option to make it allowed to access data automatically.

    Which phones are certificate supported:

    Most of the Sony Ericsson phones are made with trusted certificates. You’ll find a lot of certificates preloaded into it. On the other hand, Some Nokia, Samsung and some other phones also support certificate.

    Some software and trusted application downloading sources:

    Here is some software those we use most of the time because those are essential.

  • Opera Mini: Opern your phone's default web browser and write 'm.opera.com/ on address box. Then click 'Other downloading options, then scroll down, you'll find 'Options for Opera mini (any of the compatible versioin) Click on 'Select code signing certificate' and than click any of the certificate and the download of the signed version opera mini will begin.

  • Facebook For Every phone:

  • UC Browser:

  • If you download the applications on your PC, you’ll need to transfer those to mobile using data cable, Bluetooth, card or any other possible way. After the transfer is complete, click on the .jad file, download of the software will be started. Download these popular software from the link given above and enjoy the application just like your phone function.

    English to Bengali Dictionary
    Powered by Tamilcube.com


    Monday, May 28, 2012

    Protecting Confidential Data from Unauthorized Access


    No matter whether you use computer in your home or office. Anytime and anyone can access your computer data if you don’t have password protection or if you leave your PC not shutting down. At that time anyone can steal your personal and sensitive data via pen drive or any other removable storage. You can’t understand that but this kind of act is not acceptable to anyone. You can protect your data from stealing in some easy methods. Below those methods' description is given in easy words and in a nut shell.
    1. By disabling your USB: To disable all your USB ports you’ll need to change USB registry. To make change to any of your computer registry at first go to ‘Run’ then write ‘regedit’ in empty box. Then hit ‘Enter’. After that you’ll see the registry page. In that page on right side you’ll find some menu. From those menu, expand ‘HKEY_LOCAL_MACHINE’. Then expand ‘system’. Then expand ‘CurrentControlSet’. Then ‘Services’ and then search for ‘USBSTOR’ menu. Don’t expand that menu. Just click on it. Then some writings will be found on left white page. In that page you’ll find ‘start’. Right click on that and then click modify. Then in ‘value data’ section, write ‘4’ in lue of ‘3’. This will disable all your USB. After this, none can access your computer data in your absence. When you want to re-enable your USB drives, in same way go to registry editing page and make the value data ‘3’ in lue of ’4’. This will enable your USB again.

    2. Using USB Disk Security software Using USB Disk Security is another easy way to protect personal data from stealing. Not all USB Disk Security software can protect data. Only USB Disk Security 6.0.0.126 can perform this. You can get this software with crack from here.

    If an error message comes,  click this link. After you click this link, a torrent file of this software will be downloaded. Click it. When windows prompt for option, click ‘Search the web for software that can open your file’. Then download ‘Final torrent software. After downloading and installing the software, open the torrent file that contains USB Disk Security software with final torrent. It will download the zip file that contains USB Disk Security with crack. Install the software and you’ll see that your software is a trial one. Exit the software. Then open the crack folder. There you’ll get an application named USBGuard. Copy it and paste it in the folder where you installed the main software. You can’t paste that at first. So rename that and paste. Now delete the previous USBGuard application again rename the crack USBGuard_1 to USBGuard. Now run it. Then you’ll find that your USBGuard software is fully activated. Now go to ‘Data protection’ and click ‘Lock’. To lock your USB you’ll need to run the software as administrator. By this way in anytime you can lock and unlock your usb drives without changing your registry.

    3. Changing the security status of your partitions. It is another easy way to protect sensitive files. Just right click on the partition that contains sensitive files or files those you don’t want to share with anyone. Then click ‘Properties’. Then click ‘Security’. Then click ‘Edit’. In full control function click ‘Deny’ and come out from there clicking OK. Then check that the partition is inaccessible. To access the partition again in same way go to ‘Properties’, then ‘Security’, then click ‘Advanced’ and then choose any administrative method and then click OK. After that click ‘Continue’ and then you’ll get the section from where put a tick to ‘deny’ option. Now click ‘Allow’ on full control function and then return from there clicking OK.

    These are all about data protecting. You can also use locker software. But here I’ve described the easiest methods of data protecting.

    English to Bengali Dictionary
    Powered by Tamilcube.com