Useful Tech Tips, Tutorials and guides

Phishing Scams: How Phishing Scams Work

Phishing scams are just another attempt to get valuable information. Scammers send a mass email to every address they can find. Typically the message will appear to come from a legitimate institution or company. The email states that you should update or enter your information for one reason or another, and they usually provide a link that you can click to do so. This all sounds reasonable and it may look legitimate, but phishing scams are far form legitimate. The link provided takes you to a spoof website. Instead, you’ll be submitting your personal information to a website run by the scammers. Why Scammers Use Phishing Scams Why would

| Continue Reading the full article....

Generate QR code from RSA SDTID file

How to generate a QR code using TokenConverter.jar with a standards software Token in the .SDTID file format. Some android and iphone devices are unable to import a .sdtid file emailed to the users device. a quick workaround to this is to generate and scan a QR Code. Download the TokenConverter app from here Once downloaded browse to the download location Extract Zip file and open the TokenConverter folder. From the RSA Enterprise console, follow the standard Soft token process. Once you have generated and downloaded the .sdtid file from the RSA console Save the .sdtid file to the same folder as the TokenConverter.jar file. If not already

| Continue Reading the full article....

Steel Keylogger Record Computer Keystrokes

Steel Keylogger is a keylogger that is virtually invisible to all the common anti-virus software today, helping you keep it running stealthily. Also, it does not connect to the Internet so your data is safe. This program is a simple one and has no Web site, but the file is widely available on most torrent sites. Just search for Steel Keylogger and download the file. The downloaded program will include two files that are under 40 kilobytes, which makes the keylogger not only functional, safe but also small in size. There is no need to install Steel Keylogger onto your own system, thereby bypassing another concern most people have keyloggers: t

| Continue Reading the full article....