lakkireddymadhu

WHAT WOULD YOU

DO IF YOU LOST

EVERYTHING?

 

Things to backup

There are many things that hold our data.

  • Computer
  • Laptop
  • Smartphone
  • IPod
  • Tablet
  • Other electronic devices
  • Photos and videos on social networks
  • And other online services.

 

How they can fail… and lose your data.

  • Theft
  • Hardware failure
  • Natural disaster
  • Alien invasion
  • Obsolete file formats
  • You forgot where you put it (really, it happens!)

 

World Backup Day checklist:

 

Here is a simple checklist to protect your data:

  • Find data that need to be backed up.
  • Identify data backup procedures.
  • Explore both hardware and software backup solutions.
  • Implement data backup procedures.
  • Save your backups in different physical locations.
  • Automate data backup workflow.
  • Backup procedures should be automatically working to archive your data continuously.
  • Check data restores to confirm they’re working properly!

Source: http://www.worldbackupday.com

 


How to permanently delete files from your computer:

 

Windows XP will end its 12-year successful run on April 8th and Microsoft wants the considerable number of users to shift over to more modern versions of its operating system. For full details regarding Windows XP support cycle,  please check my earlier blog article: It’s time to upgrade: Windows XP:

 

When you  delete any  file or folder  from your computer, it moves to the Windows Recycle Bin. This is easily  recoverable. If  you empty the Recycle Bin, the data still remain on your hard disk? In many cases, deleted files can be recovered with little effort because most computer operating systems will only delete links to the data so they no longer appear to you, but the actual data remains on the disk. Getting access to the deleted data is as simple as restoring the links.

032914_1155_Howtoperman1.png

 

When you delete files or folders, the data are not initially removed from the hard disk. Instead, the space on the disk that was occupied by the deleted data is “deallocated.” After it is deallocated, the space is available for use when new data is written to the disk. Until the space is overwritten, it is possible to recover the deleted data by using a low-level disk editor or data-recovery software.

 

SDelete:

To permanently erase files and prevent your confidential files from getting into the wrong hands, Microsoft offers a free command line utility – SDelete (Secure Delete) – that overwrites all the free space to prevent data recovery.
You can use SDelete both to securely delete existing files (replacement of delete), as well as to securely erase any file data that exists in the unallocated portions of a disk (including files that you have already deleted or encrypted).

032914_1155_Howtoperman2.png    SDelete implements the Department of Defense clearing and sanitizing standard DOD 5220.22-M, to give you confidence that once deleted with SDelete, your file data is gone forever. 

Step-by-Step: Using SDelete:

Download the Microsoft command-line tool SDelete. Here’s how to use this tool.

1. Click StartRun > ... , type cmd and press OK or Enter (Return). (Windows Vista and Windows 7 users can just click Start and type cmd in the Windows Search box.)
2. Navigate to where you have SDelete downloaded. For example, if it’s located at C:\cmdtools, type cd C:\cmdtools, and press Enter.
3. Now type sdelete <path to file or directory>, and press Enter, where <path to file or directory> is a standard Windows path. For example, to delete C:\mysecuredata.txt, you would type sdelete c:\mysecuredata.txt, and press Enter.
4. Once they’re deleted, you will receive confirmation that your files or folders have been permanently deleted, and you’re done!

032914_1155_Howtoperman3.jpg

CCleaner:

If you are already using CCleaner, you should know that it contains a Drive Wiper.

 Open CCleaner and go to Tools > Drive Wiper. You can wipe only free space or the entire drive, and you can choose up to 35 passes, meaning data will be overwritten with random strings of binary code 35 times. This very complex overwrite should make it impossible for anyone to restore the data originally saved in this space. When you’re happy with your settings, click >  Wipe and wait patiently.

 

032914_1155_Howtoperman4.png

 

 

Eraser:

 Eraser is a freeware and open source security tool to completely remove data from your hard drive. It can overwrite data several times using randomized patterns of binary code. It essentially is a file shredder.

Eraser is more convenient than CCleaner’s Drive Wiper because it can delete and shred single files, rather than just wiping all free space on a drive, and it is integrated with Windows Explorer (right-click menu). Moreover, Eraser provides you with a host of advanced settings, for example, different file and space erasure methods, the option to replace erased files with other files to allow plausible ‘deniability’, and schedule erasure of files, folders, recycle bin, or unused disk space.

 032914_1155_Howtoperman5.jpg

Whenever you want to securely erase your data, follow these steps.

  1.  Navigate to the files or folders that you want to securely erase.
  2.  Right-click on the files and/or folders and an Eraser menu will appear.
  3.  Highlight and click Erase in the Eraser menu.

 

Active@Kill Disk – Hard Drive Eraser:

 Active@ Kill Disk – Hard Drive Eraser is a free utility for securely erasing a hard drive. More importantly, this utility adheres to the United States Department of Defense standards (DoD 5220.22M) for hard disk data removal.

Active@killdisk

DBAN (Darik’s Boot And Nuke):

 DBAN, as it is shortened, is a nice little application that lets you completely erase your data.

Download the ISO for your system and burn it to a disk.  Next, pop the disk into your hard drive and boot from it.  This may require you to press F12 at the BIOS screen (the first screen you see when your computer boots up) and choose to boot from your CD/DVD drive.  

Press Enter to run DBAN in interactive mode.

1. Use up and down arrow keys to highlight the drive to wipe.
2. Press the space bar to select the drive.
3. Press M to select the wiping method.
4. Press F10 to begin the wipe process.

Note: if DBAN is unable to recognize your SATA hard disks, configure your system BIOS to use IDE mode rather than AHCI mode.

 Now that you have the right tools for the job, you can feel confident in knowing that your data has actually been removed from your hard disk and will no longer be recovered by anyone (not even by you).

Happy computing!! :-)

 

Source: labnol, makeuseof, mini tool-drive wipe, Gizmodo, PC world,

 

Love, Relationships & Technology: 

A study by McAfee shows a number of adults sharing private details about their lives, including those of an intimate nature, such as nude photos and sexts—all of this on unsecured digital devices. In a McAfee survey, which asked more than 9,000 adults worldwide, between the ages of 18-54, about their private data sharing habits and online behavior when it comes to matters of the heart.

27% still don’t secure their mobile devices with a basic personal identification number (PIN) or passcode. And 38% have shared PIN or passcode with others. This puts you at risk for cyber stalking, identity theft and leakage of their intimate data.

Love, Relationships & Technology

Love, Relationships & Technology

Bad technology habits are on the rise worldwide, but people are still not taking the steps to protect their information from prying eyes and angry exes.

Think twice before sharing private data, including intimate texts, passwords, photos and more. If you‘re not careful about what you share, it could land in the wrong hands.

Keep Your Personal Info Safe by Following These Simple Tips:

Lock Your Lips. Do not share passwords with anyone.

Lock Your Devices. Use password protection on your phone and other mobile devices.

Love the Delete Button. Take the time to delete personal or intimate text messages, emails and photos on your phone.

Share the Love, Not the Info. Once you share private information with those you love, that data is out of your hands, and out of your control.

Men are more likely to protect their devices than women.

Avoid bad buzz and keep your private life private.

LRT2014_Infographic-Global-FNL

The Futures Company and MSI conducted surveys in the US, UK, Australia, 
Canada, Germany, France, Spain, Italy, The Netherlands, Japan, Mexico, 
China, India, Singapore and Brazil among 9,337 men and women, 
ages 18 to 54. The survey was conducted in December 2013 – January 2014.

 Source: McAfee

McAfee ePO isn’t allowing administrator login after password change:

In our organization, McAfee EPO server has been running fine until a couple of days ago. We’ve experienced a turnover in IT personnel and I have been changing different administrator names\passwords as part of security practice. After required changes done, restarted all the servers. Everything was fine except McAfee ePO web portal; I was not able to login.

It’s throwing below given errors:

DataChannel – Dependency scheduler had initialization error

LYNXSHLD1510 – dependency EPOCore had initialization error

AvertAlerts – Dependency scheduler had initialization error

Image- 1

Image- 1

 

All the errors were initialization errors.

SOLUTION:

Check the SQL DB connectivity with McAfee ePO; open your browser and type https://ServerName:8443/core/config 

Log on with ePO credentials. (See Image-2)

epo-1

Image- 2

Type new user name and passwords, click “Test Connection”

Click Apply, if the test is successful.

Restart your ePO server, that’s it.

 Happy computing!!

Source: McAfee

 

Where You’ll Get Hacked [infographic]

People complain that they want privacy, and then they put all their information up on Facebook. Thus, hacking is ultra-easy. I have seen teenagers post pictures of their first credit card, then a month later their new college student I.D. These kids are so excited to have signs of growing up, but as we grow up our lives need to be more private to guard from hackers. Now I am a culprit of being very relaxed about my online privacy, meaning, I have the same password for multiple sites, I use my high school name as my clue, and the name of my high school is on Facebook somewhere. We may not worry about identity theft as much as physical property theft because it isn’t as scary and face to face as an actual robbery, but it is a digital robbery, identity theft can be life damaging. 

According to the  Global Security Report, cyber-security threats are increasing as quickly as we can implement measures against them. Hackers have lots of different ways to steal your private data and information. And the main reason why hackers go after your personal information is identity theft! Over the past year, there have been roughly 12.6 million victims of identity theft – or, to put it into perspective, one victim every three seconds.  No matter how safe you think you’re being online, chances are you’re making at least a few mistakes that compromise the integrity of your personal information.

To protect yourself, check out the “Where You’ll Get Hacked” infographic for more information on how hackers get a hold of your data, how you can detect their attempts and how to protect yourself and your financial future.

To see the enlarged version, click on the graphic.

where-you-will-get-hacked-infographic8001

Source: hotspotshielddailyinfographic

Safer Internet Day (SID):

Safer Internet Day (SID) is organized by Insafe in February of each year to promote safer and more responsible use of online technology and mobile phones, especially amongst children and young people across the world.

Safer Internet Day 2014 was celebrated on 11 February 2014, with the strapline of “Let’s create a better internet together”.  The day was a great success.

Like any observance day, Safer Internet Day also promises lot of opportunities to making the cyber space a very positive and creative tool for each Netizen.

Safer Internet Day was initiated by the European commission and in due time the whole world has embraced the concept and stated observing globally. DISC Foundation (Developing Internet Safe Community) is the formal committee to observe this event in India.

SID-2014

 

ABOUT SAFER INTERNET DAY:

Over the years, Safer Internet Day (SID) has become a landmark event in the online safety calendar. Starting as an initiative of the EU SafeBorders project in 2004 and taken up by the Insafe network (www.saferinternet.org) as one of its earliest actions in 2005, Safer Internet Day has grown beyond its traditional geographic zone and is now celebrated in more than 100 countries worldwide, and across all continents.

From cyber bullying to social networking, each year Insafe aims to be at the forefront of emerging online issues and chooses a topic reflecting current concerns. For SID 2013 we focused on online rights and responsibilities, as we encouraged users to ‘connect with respect’. For SID 2014, the focus will be on “Let’s create a better internet together“.

Insafe, a network set up within the Safer Internet Programme

In 1999, the European Commission (EC) created the Safer Internet Programme, with the aim of promoting safe, responsible use of the internet by children and young people, and protecting them from illegal and harmful content and conduct online. The programme is managed by the Directorate General for Information, Society and Media and highlights the shared responsibility of NGOs, educational establishments, law enforcement bodies, industry and families in online safety initiatives across the European Union member states. In 2004, the Insafe network was set up to spearhead awareness activities within the Safer Internet Programme.

View the 2014 SID video spot here…

To find out more about Safer Internet Day and how it started, watch this video: 

How to protect yourself:

  •        Don’t use your personal information like birth date as your password or user ID
  •        Don’t use, easy security question others can be guessed for password recovery option.
  •        Don’t leave passwords for plain view like notebooks, or on the desktop of your computer.
  •        Don’t use the same password for multiple sites.
  •        Do create a strong password which is more than 8 characters long with a mix of capital letters, numbers and signals.
  •        Do check for the address of the website before you enter your financial information. Often crooks use fake sites with a slightly different domain name to cheat people.
  •        Do stay away from illegal activities like watching pornography. Watching child pornography will invite swift action from the authorities that may land you in prison.
  •        Do not install free unknown software in your computer. The software may be useful for all the purposes it was intended, but it can be a spyware too. Your personal information and data can be sent to distant                  servers by this kind of spyware.
  •        Above all, be a responsible Netizen. Remember that all the laws which are applicable in the real world are applicable in the cyberspace too. There is no real anonymity for your actions in the internet.

And while SID 2014 have now passed, Safer Internet Day 2015 date is now set for Tuesday, 10 February 2015 - mark the date in your diaries, and keep checking for the latest information.

 Wish you all the best and hope

 Enjoy your life online, Stay safe, and Stay in control

Source: saferinternetdaysaferinternet, saferinternetday.indiscfoundation

The Pixel Painter:

I was shooting the breeze with my friend about the photography yesterday. While chatting, my friend told Photography is a costly hobby. I didn’t agree with that statement, because at present we can take photos with our smart phones itself, no need to buy a camera separately, no need to buy film, no need to pay film developing charges, no need to take prints. If our phone memory card is full, just we have to move the photos to our laptop or external HDD. We can share the photos with our family and friends directly by uploading to cloud storage or social networking sites.

Today morning while I was reading on the net, I read one article about 98-year-old Hal Lasko, “The Pixel Painter”, better known as Grandpa. An absolutely beautiful and inspirational story, involving a Microsoft product. This just proves that it’s not the software or hardware that makes a good artwork. It’s the artist and how he/she uses it. I believe below given sentence is hundred percent apt for him.

A great artist can make beauty out of any medium, no matter how limited. 

The-Pixel-Painter-1

Hal Lasko, better known as Grandpa, Born before the invention of broadcast radio, Lasko spent his career as a commercial graphic designer, working with his hands to create typography and design. Before retiring, Lasko spent 10 years working at American Greetings, styling the fonts and cards.

A little more than 10 years ago, Hal Lasko began to lose his eyesight. Things appeared blurry, reading on paper was nearly impossible and colours were washed out. A condition called wet macular degeneration was making it nearly impossible for the World War II veteran and retired designer to keep up with his oil painting.

On Lasko’s 85th birthday, his grandchildren gifted him a computer and introduced the artist to Microsoft Paint. The program allows Lasko to magnify the area large enough to draw pixel by pixel. 

hal-lasko

While most people have long since abandoned MS Paint as an outdated graphics application, Lasko has spent the last 13 years using the program to digitally create works of art, spending up to 10 hours a day on his work. Originally a traditional painter, he switched to MS Paint full-time in 2005 when his vision was impaired by wet macular degeneration, an eye disease that causes blindness in the center of his vision. He has since created more than 150 digital works, though his blindness means he will never be able to view them in their totality.

Paint -1

Paint-2

Those prints are available on his very own website  http://hallasko.com/collections/prints and sold for $98 each in honour of his 98th birthday. Because he is a veteran of World War II, 10% of all sales goes to the Veterans of Foreign Wars.

A short documentary showcases the art of Hal Lasko. In this short documentary, the artist’s grandson Ryan Lasko and co-director Josh Bogdan trace the story of Hal Lasko, from his beginnings as a “lettering man” up through his current projects on the computer. The film showcases his computer creations and includes interviews with Lasko about his family, his process, and his philosophies. 

Grandpa makes it into the Super Bowl!

Grandpa’s story was selected by Microsoft to be featured in their Super Bowl Commercial: Empowering Us All

See more work at hallasko.com

Source: hallasko, Gizmodo, the verge, The Atlantic, daily news, abc news, wired,vimeo

Categories

Blog Stats

  • 77,195 hits

Calendar

April 2014
M T W T F S S
« Mar    
 123456
78910111213
14151617181920
21222324252627
282930  

Enter your email address to subscribe to this blog and receive notifications of new posts by email.

Join 265 other followers

Follow

Get every new post delivered to your Inbox.

Join 265 other followers