Gadget Miracles, Tracfone LG Smartphone Comparison, Android Jelly Bean, Flash tool, Avengers Box, Ulefone, samsung, iphone, Infinix and stock firmware

Selasa, 29 November 2011

What is phishing and how to be safe from phishing ?

What is phishing and how to be safe from phishing ? - I made this blog Gadget Miracles already a few years ago, although I am busy working in my office still build this blog for you who need information about gadgets, has very much information that we provide about the What is phishing and how to be safe from phishing ? which you are looking for at this time, please refer to the information we provide in full guarantee because I have collected a lot of information from the source of the richest:

Articles : What is phishing and how to be safe from phishing ?
full Link : What is phishing and how to be safe from phishing ?
Article Hacking, Article PHISHING,

You can also see our article on:


What is phishing and how to be safe from phishing ?


    What is Phishing ?

                    Phishing is one of the type of hacking . It is a method of acquiring sensitive information such as username, password, bank information etc. Phishing page could be saif as an duplicate page of real one. Its look exactly similar as the real page.But when user enter sensitive information on such phishing page his information is send to the E-mail address provided in the phishing page or you can say the one who created that phishing page. Phishing page is mostly send via mail. Target of phishing are mostly social networking sites like facebook, orkut etc. Also Banks website to acquire credit card details,website like yahoo, gmail are also target of phishing.



    Example of Phishing scams:
  • Email asking you to login to your locked account to unlock it.
  • Email carrying a Link to sites like Facebook,yahoo etc and asking you to Login.
  • Emails containing some Information of your Interest and asking you to Login to Your Account.
   
     How to be safe from phishing ?
  • Never login to any of your account through link provided in the Email.
  • Go to real website dont click on any link posted anywhere. such as link posted on your facebook wall by friend or link provided in comments or link to ceratin website on any blog.
  • Check the URL of website before entering any sensitive information. Because the URL of phishing page is not same as the URL of  real one.
  • Real gmail page looks like gmail.com while phishing looks different somthing like gmail.anything.com



enough already information about What is phishing and how to be safe from phishing ?

hopefully the information What is phishing and how to be safe from phishing ? can give you answers to all your questions ayang is conveyed to google.

finished already information about What is phishing and how to be safe from phishing ? if you mers this information useful for you and want to bookmark or share please use link https://19miracles.blogspot.com/2011/11/what-is-phishing-and-how-to-be-safe.html

Tag : , ,
Share on Facebook
Share on Twitter
Share on Google+
Tags :

Related : What is phishing and how to be safe from phishing ?

  • How To Hack Saved Password In Firefox ?In my previous post i had posted two tutorials on How to hack google chrome saved password ? and More simple way to hack google chrome saved passworod. In this post ...
  • List Of Google Dorks For SQL InjectionI had previously share with you guys List of  good proxy sites to surf anonymously on the internet and today i am sharing with you a list of google dorks for sql in ...
  • Finding Ip Address Of A Website Using Command Prompt Or CMDIn this tutorial i will teach you to find Ip Address of any website using Command Prompt or in short CMD. Using IP Address you can find location of the website serv ...
  • List of some good proxy sites             Below is the list of some good proxy site which you can use to surf anoymously on the internet . Even you can use this pr ...
  • XPATH INJECTION TUTORIAL 2016XPath is a language that has been designed and developed to operate on data that is described with XML. The XPath injection allows an attacker to inject XPath elements i ...

0 komentar:

Posting Komentar