Tor Browser Logo

Use Tor Browser to Surf the Web Anonymously

Recently many journalists wrote about the spying thing. How big companies like Google and Microsoft spy the user computers and smartphones. They even don't hide it from you. Usually you have to accept the Agreement you automatically accept that you will be spied by them. Also we know that using browser like Google Chrome, will...
folder password lock

5 Tools to Password Protect Your Folders in Windows

Unfortunately Microsoft did not integrate an option to password protect specific folders with sensitive data. There are many third-party tools that can help you to password protect your folders. Because there are many tools you can choose from, I searched and selected 5 best tools which will help you. Folder Protector (Free & Commercial) Folder Protector can lock any...
keyboard pc laptop login

Why You Should Use a Password Manager and How It Works

Most of people that use a smartphone or a PC use very weak passwords for their websites and other accounts. For the security reasons a good password should have letters, numbers and characters. Also the for you should change your password once in at least three months. Today we have accounts on different sites like: ebay,...
globe servers

Linux Server vs Windows Server

Institutions or individuals chose their servers depending on a variety of reasons.  Server users will value and rate the best with the fastest and reliable connection. How stable a server is determines how users will rate it. Linux being older than windows does not automatically make it better. They are both reliable servers and you...
Kiddle - search engine

Kiddle – Kid-Friendly Search Engine and Not Google

Today there are a lot of negative things when your kids use search engines. Even using Google.com is not safe at all for your kids. As a simple search of "hot girls" can have bad consequences on your kids. Now to make it safe, there is a new search engine that it is only for kids,...
security warning certificate

Fix security warning: “problems with the security certificate for this site”

Usually this security warning may occur on any devices, on any browser stating that: "There are problems with the security certificate for this site". And no matter what button you'll press the warning will appear again. How to fix it The solution is very simple, the "security certificate" of a website is limited in time and to verify whether it's...
computer-security-malware

How to Recover from a Virus Infection?

If your computer is infected with a malware, you should pay much attention what to do next, because every time the possibility to get infected with a strong malware is possible, considering to be removed it actually can work in the background and can happen one day to loose are your accounts, important data, or...
emet featured image on technozed.com

Secure Your Computer with Microsoft Enhanced Mitigation Experience Toolkit (EMET)

Microsoft is presenting Microsoft Enhanced Mitigation Experience Toolkit (EMET) as a very efficient additional security features. EMET is targeting for system administrators and any others Windows users, any one can use EMET as additional security features without knowing to much. EMET can also help to secure outdated Windows XP. What really is EMET ? Microsoft's Enhanced Mitigation Experience Toolkit...
malware keyboard

How To Fully Remove Suspicious.cloud From Your PC?

An anti-malware technology that started in the year of 2010, made to discover malware without it existing on the user PC has been raising concerns, security investigators claim. This particular type of rogue antivirus program goes by the name of Suspicious.Cloud and it has several variants. Security investigators regard it as a possible entry to...
Antivirus - Windows Defender

Windows Defender Can Now Scan for Malware on Startup

There are different opinions about Windows Defender. Many says that Windows Defender is not enough good and its better to change it. Actually Windows Defender is not bad at all, with some tweaks you can set it to work even better than most popular anti-virus programs. Earlier we showed you How to Make Windows Defender to...

Most Praised 5 Free Antivirus for 2015

For basic computer protection, everybody should run at least an antivirus and a firewall. There are integrated security suite or you can choose separate components. Someone is willing to pay to be sure it's secured, but someone else feels good with one or two free programs, which combined together provide the same value as one purchased. So...

How To Find Out If Your Email Account Was Hacked?

4.5 million Mail.ru accounts, 5 million Gmail accounts and over 1.5 million Yandex accounts where the target of a big security breach. A look through investigation, based on the security and strength of the leaked passwords shows that the combination "123456" is mostly found in the list for about 37,821 times, and followed by security...

Free SSL for Your WordPress

CloudFlare is a free global CDN and DNS provider that can speedup and protect your website, not only Wordpress websites. To get Free SSL for your Wordpress you will have to configure it, and it's not hard to do it, continue with following tutorial. Step 1. You will have to sign up to CloudFlare, once you...
ultra secure blackphone

Ultra Secure BlackPhone Hacked only with Silent Circle ID or Phone Number

The Ultra Secure BlackPhone actually was not so secure as it was presented by Mark Dowd. Hackers found a vulnerability in the BlackPhone's instant messaging application, which gave attackers the ability to decrypt messages, steal contacts, record encrypted calls and remote control the phones vital functions. The attacker needed just the users ID from Silent...
gmail multiple addresses inbox

5 Effective Ways to Secure Your Gmail Account

Many people have been victims of scammers that are found online especially those targeting emails. Even though Google has invested a lot at ensuring that email account holders are well protected, there is need for you as an email account holder to take some steps to protect yourself. There are always people who want to...

Do I Need A Third Party Firewall?

Firewall is an important security software that protects your computer. Usually computer users install an antivirus software on their computer thinking that it is enough. So do you need a third party firewall? and when? Do I Need A Third Party Firewall? A firewall will block unrequested incoming connections. The firewall can allow access to network file...
computer-security-malware

How to Bypass Internet Censorship

The idea of being controlled by anyone is not one welcomed by most people. Blocking some websites, such as Facebook, during working hours is somewhat understandable. However, internet censorship that is based on morality, religious ideologies or political insecurity is inexcusable. Governments, especially in Asia countries censor the internet in their respective countries. Methods of Bypassing...

5 Millions Gmail accounts and passwords leaked

Not many days passed till passwords from "yandex mail" were hacked and leaked online, today seems that even google with its security missed something and about 5.000.000 gmail accounts and passwords were hacked and they now are available on internet. So this means that if your mail is in that list anyone can log into...
Google Chrome

How to Automatically Clear Data in Google Chrome

Usually web browsers store your browsing data and keeps it till you remove it manually. This data includes cookies, cache files, form data and other stuff. And it's useful if you revisit the sites that you have already visited. But if you share computer with others and you don't want others to find out which...
google now

6 Links to What Google Knows About You

Do you want to know what Google knows about you? Earlier we told you how to delete the personal data that Google collects from you. RECOMMENDED: Disconnect – The Most Hated App By Google Here are 6 links which will tell you some information that Google collects about you. 1. Your Profile in Google Google creates your profile with basic...
Antivirus - Windows Defender

Antivirus: How Frequent You Should Update It?

Today you do not have to worry about viruses that can harm your computer or any other gadget that you use to do your business online. The best security from cyber crime is a good updated antivirus. But, many people are deceived into thinking that updates are really not necessary. Skipping an update might be...
iphone siri

Hackers Can Use Radio Waves to Control Siri and Google Now

Hackers can control your iPhone or Android smartphone by just using radio waves. Radio waves can send commands to Siri and Google Now. French researchers found an interesting way to control your Apple and Android smartphones. Researchers working for French government agency ANSSI were able to hack, not really hack, but to control Apple devices with...

What is Shellshock and How to Protect your Server Against the Shellshock?

What is Shellshock "Bash Bug"? Shellshock is a Bash vulnerability also known as "Bash Bug". This bug allows remote attackers to execute arbitrary code with some conditions, which can pass strings of code following environment variable assignments. Shellshock was discovered September 24, 2014, as a GNU Bash vulnerability, and it affects Linux, BSD and Mac OS...
android security bug virus

Android Stagefright Exploit – What you need to know

In July 2015, a security company called Zimperium announced that it had discovered a a vulnerability inside the Android operating system. Possible there are nearly a billion Android devices that could potentially controlled without being noticed by their users. What is Stagefright? Stagefright exploit lives very deep in Android operating system and its called libStageFright librart which is...

Why graphical passwords are not safe?

This is a real example, recounted in details on a forum Intro: My wife constantly strives to make me screw up: set the alarm for 3:00 AM, change the ringtone, removed the sync settings, removed she's messages and then proves that she didn't wrote that. Joking aside, at some point i decided, "Enough!" - And put the graphical password...

Browser won’t load webpages – Untrusted connection error

You just switched on computer, connected to the internet, opened your Browser and.... websites don't load. Google Chrome says: Error 201 NET::ERR_CERT_DATE_INVALID This webpage is not available Mozilla Firefox says: Error code: sec_error_unknown_issuer This Connection is Untrusted. Internet Explorer says: Certificate Error: Navigation Blocked There is a problem with this website’s security certificate. How to get rid of this error? Check your computer's date and...
laptop webcamera

How and Why You Should Disable Your Webcam

Many PC users have reported that they somehow were spied through webcams. Let's put the question: Is this a problem today? Can be that easy to spy on someone using his webcam? Let's discuss why should we disable our webcams. There are many good hackers today, besides the hackers there are NSA, different agents, different groups that search...

How To Change WiFi Password & Name

A poorly secured Wi-Fi can put your personal information at risk, first thing you could loose is by sharing internet with your neighbors, this is not a bad thing for you of your internet connection will work good and you wont have problems, but the second thing, a bad one, can be that the person...
quick time logo

PC User Should Uninstall QuickTime As Fast As Possible

Most Windows users had probably forgot about back days popular QuickTime player from Apple. But if you are still using QuickTime player, you should take a look at this article and just after reading it to uninstall QuickTime player from your PC.  There are two security problem recently found in QuickTime player. This are not to...
disconnect-logo

Disconnect – The Most Hated App By Google

The Disconnect app is available for Desktop. Officially it was also available on Google Play Store. Unfortunately for users who loved it, Google decided to ban this privacy app. You cannot find it now on Play Store. Well, Disconnect is one of the most popular apps. It can shield users against invisible tracking tools. It increases...
0FansLike
24FollowersFollow
538FollowersFollow

MOST POPULAR