A Brand Name ||Official Url :: Software UI Designer| Contents Designer | OS | W€B | Server | Programming | Computing Technology ::


Pretty Good Privacy PGP

Pretty Good Privacy (PGP) is an e-mail encryption scheme that has become a de facto standard. Its Web site serves more than a million pages a month to users in 166 countries [PGPI 2012]. Versions of PGP are available in the public domain; for example, you can find the PGP software for your favorite platform as well as lots of interesting reading at the International PGP Home Page. 

When PGP is installed, the software creates a public key pair for the user. The public key can be posted on the user’s Web site or placed in a public key server. The private key is protected by the use of a password. The password has to be entered every time the user accesses the private key. PGP gives the user the option of digitally signing the message, encrypting the message, or both digitally signing and encrypting.



RANSOMWARE – A Type of Malicious Software and Malware

Ransomware is a type of malware that prevents or limits users from accessing their system, either by locking the system’s screen or by locking the users’ files unless a ransom is paid.

Ransomware stops you from using your PC. It holds your PC or files for “ransom”.

There are different types of ransomware. However, all of them will prevent you from using your PC normally, and they will all ask you to do something before you can use your PC.

They can target any PC users, whether it’s a home computer, endpoints in an enterprise network, or servers used by a government agency or healthcare provider.

ransomware-all-you-need-to-knowRansomware can:

  1. Prevent you from accessing Windows.
  2. Encrypt files so you can’t use them.
  3. Stop certain apps from running (like your web browser).
  4. The most  common format of the extensions that Ransomewares come in are – exe. , doc. , ppt., XLS., Java Script – JS. VB Script –  VBS. 

How Will Take Protection against this Ransomware:

  1. use a reliable, paid antivirus as well as free basis good security products that includes an automatic update module and a real-time scanner.
  2. don’t store important data only on my PC .
  3. using 2 backups tools for save data: on an external hard drive and in the cloud – Dropbox/Google Drive/etc.
  4. The Dropbox/Google Drive/OneDrive/etc. application on my computer are not turned on by default.
  5. The OS – Operating System and the software I use is up to date, including the latest security updates.
  6. don’t use an administrator account on my computer.
  7. turned off macros in the Microsoft Office suite – Word, Excel, PowerPoint, etc. in the browser.
  8. adjusted all browsers’ security and privacy settings for increased protection
  9. removed outdated plugins and add-ons from browser.
  10. use an ad blocker to avoid the threat of potentially malicious ads.



Ransomware (a.k.a. rogueware or scareware) restricts access to your computer system and demands that a ransom is paid in order for the restriction to be removed.

A decade-old form of malicious software known as ransomware has been making headlines after cybercriminals hijacked hundreds of thousands of computers worldwide.
Ransomware, which is often transmitted by email or web pop-ups, involves locking up people’s data and threatening to destroy it if a ransom is not paid.
businesses and individuals do to protect themselves from ransomware.
** Update your software
** Install antivirus software
** Create backups of your data
** Create a security plan for your business and Personal PC.

Microsoft Asia launched its Malware Infection Index 2016

Absolutely, it should make obstacle to develop digital Bangladesh, if the Government cannot maintain as well as develop the security system of the Internet Gateway System of Bangladesh. Then hackers should be easily hacked many websites.

13412948_1126320390761724_2472809649983622035_nOn the last June 7, 2016 Microsoft Asia launched its Malware Infection Index 2016, which has found that Bangladesh is among the top three vulnerable countries at risk of malware threats.

Out of the top five locations across the globe most at risk of infection, a total of four are from the Asia-Pacific — Pakistan, Indonesia, Bangladesh and Nepal, topping the rankings at first, second, third and fourth places respectively in terms of computers encountering malware.

These malware can steal users’ personal information, download more malware, or give a malicious hacker access to the PC. The findings are based on data from the Microsoft Malware Protection Center (MMPC) and the Microsoft Security Intelligence Report (SIRv20).

All over, flooded a voice about the Security system of Banking System in Bangladesh.

All over, flooded a voice about the security system of Banking System in Bangladesh.

In Bangladesh, the state-owned banks, major security system is very poor and lots of lacking that easily break the encrypted system by using hackers personal virtual server’s encrypted keys file and replace hackers password – key into all pass-key of Account holder of the Central Bank of Bangladesh.

(To be Continue… )

Beware of Viruses and Security Threats !!!



Beware of Viruses & Security Threat!!!

Virus can do all sorts of nasty things, like stealing passwords, deleting files, or sending adverts from your account.

Web Criminals are just looking for a chance to take over your Facebook page, infect your smartphone with a virus, or steal account information. They really don’t care.

And No Age is Safe from Malware, when you’re on the Internet.

Make sure you have an Antivirus Software installed on your device & keep your Antivirus Software eyes Open that will protect you against most Internet threats.

Last time, our LAB does practical experience test on some antivirus product. Some of these major free Good Antivirus Softwares make you protect by using Less Memory, better Web Shield from threats, malware, spyware, email sacn (when read/write email, download file), web scam, block dangerous web site, web phishing, bot, pornography page, Social page link. like as a Firewall, etc.,

Some Good free Security suite you can use in your Notebook, Laptop, Desktop PC. Those are ..
:: AVAST free 5.0(http://avast.com),
:: PANDA (http://www.pandasecurity.com/),
:: AVG free (http://www.avg.com),
:: COMODO Antivirus, COMODO Internet Security,
:: Microsoft Essential Security,
:: forticlient Endpoint Security (http://www.fortinet.com/resource_cen…/product_downloads.html).

Web Shield::web shield01

Web shield is the new elements of the Antivirus software.  Some major antivirus software has web shield, which works like as a firewall. All outgoing and incoming data pass through the firewall. Similarly, web shield scans your network’s all incoming – outgoing data, also system file access, mail information.


Private Browsing and Securely Surfing Web World

Everyone wants to surfing internet securely.
And the Private Browsing is the best policy.

Private Browsing is greater for secure browsing that no one, even any security organization cannot track your browsing, your online activity. User can use Private Browsing mood web surfacing through Internet Explorer, Google Chrome, Firefox, and Safari.

‪#‎Internet_Explorer‬ ::
Start the Private Browsing by Internet Explorer, select ‘Tools’ option, then go to Safety Option, select “InPrivateBrowsing.
‪#‎Google_Chrome‬ :: Select ‘Menu’ button of Google Chrome, then select “New_Incognito_Window”.
‪#‎Mozilla_firefox :: Select the Mozilla firefox button, then select “ Start_Private_Browsing ”

Threats and Attack (RFC 2828) ∷

Threats and Attack (RFC 2828)

Threats A potential violation of security, which exists when there is a circumstance capability, action or event  that could break security and harm. A threat is a possible danger that might exploit vulunerability.

Attacks Attacks is an assault on system security, that devices form an intelligent threat, that is an intelligent attack that is a deliberate (planned) attempt to evade the security services and violate the security policy of the system.

OSI Security Architecture::

The OSI (Operating System Interface) Security Architecture provides a systematic framework for defining security attacks, mechanisms and services. Security attacks are classified as either passive attack, which include unauthorized reading of files and traffic analysis and active attacks, such as modification of messages or files and denial of service.

Security Mechanism :: Security Mechanism is any process (or a device incorporating such a process) that is designed to detect, present or recover from security attack. Examples, of mechanisms are encryption, algorithms, digital signatures and arithmetical protocols. Security services include the authentication, access control, data confidentiality, data integrity, non-repudiation  and availability.

OSI Security Architecture ::

The OSI security architecture is useful to managers as an away of organizing the task of providing security. Because, this security architecture was developed as an international standard, computer & communication vendors have developed the security features for their products and services that relate to this structured.