Security - 6 Security Tips

Person majority does not have exactly perception about how much it could be invasive technology, what it really means internet (*) and how much security perception is lower than how much it is dangerous and appliable to normal life activities.

Due to this reasons I am focusing, with this article, on some interesting aspects.

Consider that, in this article, there is a specific topic that explain effects that technology abuse might affects teenagers (italian language)

(*) World Wide WEB means that all devices are interconnected each other, through internet, it implies that all world devices are, theoretically, reachable from any users and from location. Security concerns should easily realized :-)

1) PASSWORD SHARING

This website permits to create weblinks containing PrivateText & Passwords (that could be securely shared with remote users).

https://privnote.com/

To strengten security there are furthers settings that we strongly suggest to use.

  • Password could be shown only "one time" (or extended up to 30 days deprecated)
  • You can add email address having real time notification (when weblink was effectively read)
  • You can create master password, about web link, that you should communicate, to end user, using different communication ways (SMS, by phone, by voice etc. etc.)

2) HAVE YOU POWNED

Here it is an old article that explains how to verify if, your email account, was  affected in any data breach (occurred on any websites where you registered)


3) VERIFY FILES/WEBLINKS/EMAIL/DOCUMENTS ON ALL ANTIVIRUS VENDORS

During these years I often had necessity to check files/emails/URLs understanding if they had any sort of infection (that was not yet discovered from latter antivirus definitions)

To get this result often I connect through this website that queries all majority AV versions and relative latter definitions.



4) PROXY BROWSER ON LINE

After virustotal checks if weblink is fine but you suspect that it could be a phishing targeted attack you might open weblink through a specific website (registration is for free for basic settings) and you might verify real contents and requests (withouth any risk on you pc/device):


5) PASSWORD TOOLS

Here they are some password tools from old blog article



6) HOW TO VIEW RDP HISTORY SCREENSHOTS

How to view RDP activities done on any Server/client


6.BIS) CYBERBULLISMO

Here it is an optional article that explain technology abuses that could occur on teenagers and persons (italian language only)



<============>

About other Security/Hacker articles please review below blog sections, there are several other aspects that are important to take awareness

https://www.alessandromazzanti.com/search/label/Hacker

https://www.alessandromazzanti.com/search/label/Security