Facebook Privacy Guide

Facebook privacy e1320763375115 400x200 Facebook Privacy Guide

Sign up for the free tips on business and productivity today.
Receive email only when we have new content.

Facebook has already added some extraordinary updates for further improving its ever-changing privacy features. With these new additions, you now can take the advantage of fresh tools for securing your identity and privacy online. So, are you ready to explore these new features? Well, then log on to Facebook and navigate to Account > Privacy Settings where you will see three main privacy options namely, Public to share posts and photos with all, Friends to share the same details with friends only, and Custom to share with only a few selected friends. In other words, you need to choose Friends so that you can prevent unwanted people from viewing your posts and pictures. This is just one the new privacy settings. Let us check out the other options in this Facebook privacy guide.

Read more

Prevent MySQL sql injection attacks using GreenSQL database Firewall

greensql
SQL Injection, yes It’s often happens around the web. In fact in real life example a lot of Content Management systems were affected by this weakness. Technically there was no software to protect or check SQL queries for suspected activity. Recently an open source software called GreenSQL offers a firewall solution for MySQL queries. It’s an Open Source database firewall used to protect databases from SQL injection attacks. GreenSQL works as a proxy for SQL commands and has built in support for MySQL. The logic is based on evaluation of SQL commands using a risk scoring matrix as well as blocking known db administrative commands (DROP, CREATE, etc). GreenSQL is distributed under the GPL license.

Sign up for the free tips on business and productivity today.
Receive email only when we have new content.

How it works?
GreenSQL acts as a reverse proxy for MySQL connections. It means, that instead of MySQL server, your applications will connect to GreenSQL server. GreenSQL will analyze SQL queries and forward them to the back-end MySQL server. Maybe this diagram will help you to understand the concept of it

Read more

14 Effective Practical Security Tips for WordPress

wordpress tips tricks

WordPress is the most user-friendly expandable blog platform around. “With power comes more responsibilities”, says Spiderman’s uncle. So what if your valuable WordPress blog gets hacked? You will be literally devastated, violated, and humiliated. Now you need to know how an attacker or cracker hack or exploit your site.

Sign up for the free tips on business and productivity today.
Receive email only when we have new content.

  • They know about your security weakness points about your site
  • They know about the important directories are open and accessible
  • They know about the version of WordPress has security issues
  • They know what outdated unsecured plug-in you are using and they can take advantage of it
  • They will use brute force to attack your site login for random username and password
  • They know WordPress uses “Admin” as the administrator name, so they keep generating passwords and keep trying

So how do you overcome these situations? Well, you just need to tighten up the security principle to avoid these problems. These are very practical options to protect yourself from getting hacked. In truth, every protection can be broken but the point is not to cure but to prevent.

Read more

TrueCrypt create your own secure storage

Sometimes at office or even at home i don’t want certain part of my hard drive not accessible by anyone. Well you can hide your folders but is it giving you the optimal protection, i don’t think so. TrueCrypt is a open source software comes with a highly secured protection systems. The algorithms are so difficult to break that it might take a few billion years to break the password. TrueCrypt can be used on windows xp/vista or linux platforms. Actually what it do is to create a physical file on a hard disk and encrypt it with very strong protection and load that file as a virtual drive. TrueCrypt also can be used to protect your USB or Flash disks.