Techno Life, Micromax New Version Official Firmware, Winmax official firmware, Nokia Flash File, WhatsApp Messenger, Lenovo, huawei, xiaomi, samsung galaxy

Cari Blog Ini

Diberdayakan oleh Blogger.
Selasa, 29 November 2011

What is phishing and how to be safe from phishing ?

What is phishing and how to be safe from phishing ? - these days more and more blogs that talk about technology, including blogs Techno Life but we are very experienced in this case because we have been there from a few years ago always present information about techno for you, well now we are about What is phishing and how to be safe from phishing ? hopefully the information we will convey can answer your question to google, please see:

Articles : What is phishing and how to be safe from phishing ?
full Link : What is phishing and how to be safe from phishing ?
Article Hacking, Article PHISHING,

You can also see our article on:


What is phishing and how to be safe from phishing ?


    What is Phishing ?

                    Phishing is one of the type of hacking . It is a method of acquiring sensitive information such as username, password, bank information etc. Phishing page could be saif as an duplicate page of real one. Its look exactly similar as the real page.But when user enter sensitive information on such phishing page his information is send to the E-mail address provided in the phishing page or you can say the one who created that phishing page. Phishing page is mostly send via mail. Target of phishing are mostly social networking sites like facebook, orkut etc. Also Banks website to acquire credit card details,website like yahoo, gmail are also target of phishing.



    Example of Phishing scams:
  • Email asking you to login to your locked account to unlock it.
  • Email carrying a Link to sites like Facebook,yahoo etc and asking you to Login.
  • Emails containing some Information of your Interest and asking you to Login to Your Account.
   
     How to be safe from phishing ?
  • Never login to any of your account through link provided in the Email.
  • Go to real website dont click on any link posted anywhere. such as link posted on your facebook wall by friend or link provided in comments or link to ceratin website on any blog.
  • Check the URL of website before entering any sensitive information. Because the URL of phishing page is not same as the URL of  real one.
  • Real gmail page looks like gmail.com while phishing looks different somthing like gmail.anything.com



information What is phishing and how to be safe from phishing ? has been discussed

hopefully the meaning of What is phishing and how to be safe from phishing ? that we write can be useful for you in adding insight about gadgets.

you just finished reading the article titled What is phishing and how to be safe from phishing ? if you want to bookmark or share your links use the link https://lifeandeating.blogspot.com/2011/11/what-is-phishing-and-how-to-be-safe.html do not forget to go back to this blog if you want to get the latest information about gadgets.

Tag : , ,
Share on Facebook
Share on Twitter
Share on Google+
Tags :

Related : What is phishing and how to be safe from phishing ?

  • How to view saved password in google chrome ?Previously i had showed you how to view password behind asterisk. In this post i will show you a simple but very powerfull trick  to view or hack saved password in ...
  • How to change IP addressPeople want to change  IP address for a variety of reasons. The Internet Protocol (IP) address is popularly known as the IP address. This private address is used by ...
  • How to block unblock websites ?Go to Start and then Run.Type in this C:\WINDOWS\system32\drivers\etcNow you will see file name Host open that in Notepad. Below "127.0.0.1 localhost" add IP address of ...
  • List of some good proxy sites             Below is the list of some good proxy site which you can use to surf anoymously on the internet . Even you can use this pr ...
  • CEH v7 Instructor Slides     This package includes the following modules.Introduction to Ethical HackingFootprinting and ReconnaissanceScanning NetworksEnumerationSystem Hac ...

0 komentar:

Posting Komentar