Security measures for Cyber Attack's (Mobiles & Tablets) & Personal Computers And Networking Device's
  • Unmanaged Port's / idle Open Port's like Bluetooth / Auto DHCP IP allotting And unmanaged IP alloting And MAC Addreess Filter Hack Loop Hole
  • Hello, Open Your Eye’s to Website Logo.
  • If you take such measure’s to secure your system any type, and don’t leak the password’s, then your system will be un-penetrable, but still it can be only be accessed by the computer company or the people developed it. The developer’s will be having the master access to maintain the system, and other purposes. The developer’s thinking should be Ethical that is harmless to customer’s and the client itself.
  • Unmanaged Port's / idle Open Port's like Bluetooth / Auto DHCP IP allotting And unmanaged IP alloting And MAC Addreess Filter Hack Loop Hole.

    First of all, we need to set up the network router's (LAN/WAN/WIFI/LIFI) to which all the computing device's connect's too. If any type of unmanaged IP allotement or any port is idle and open to connect by an alien device (outsider), the network is penetrable if they are open, so for this purpose we have to set the DHCP server IP allotement to manual, that is not on auto assign IP. make sure the number of registered device's on the network are the same as IP range to DHCP server IP allotement, that is registered in router or the router have a separate manually assigned DHCP IP address for the device to connect to the gateway that is the router or a smart swtich if on LAN.

    Then it is a must to set the MAC address filtering for a particular device in the security setting's for a router or even a modem with a builtin router and WIFI / LIFI. The MAC address should be added in the allowed device's for which any device with the same MAC address need's to connect to the router.

    The LAN Switche's port's can also be blocked by using the VLAN option in the router's, so any alien might use the router port physically by connecting a cable to the router or a network device. That is the port's can be enabled / disabled by using the gateway interface to the router itself.

    The bluetootth should alway's be ON, if it is available with the PC's or any type of computing device. ..
    The Bluetooth device still keep's the port open to itself even if the Bluetooth option in the device is disabled, so if you keep it ON alway's so it will not be open for connection if Bluetooth option is Enabled as the Bluetooth device will get occupied and the port will not remain idle and open for connection without the User granting access for connection to the device, that the user has to press either accept the connection or not to give access to the user's device which can be a mobile or a Tablet or a PC even. This way the user has full control of who can connect to their device's using Bluetooth. And one more thing will be the user will get to know if somebody is requesting access to the device and their is an option with Bluetooth to hide it and keep it on so this way normal Bluetooth device's will not be able to search the hidden Bluetooth device with standard or normal mobiles Tablet's or a PC with a Bluetooth device, a separate device come's to search hidden bluetooth device's and even the WIFI Network's which are hidden that is which do not braodcast their WIFI name's and needed to be manually setted up, and for the hidden WIFI network's, if you want to search them they can only be searched with a separate searching device for hidden Wireless Network's. Only the person who setted up the hidden Wireless network will be having the details of manaully connecting to the hidden WIFI or LIFI Network's. The reason to hide the wireless network can only be to escape bruteforcing that is program's which try all type's password's possiblities or combination for upto as many character's as possible. So, bruteforce program's just work like as if we type the password with a login to any router with a wireless network, and they keep logging in untill all the password combination's have been tried, so bruteforcing can only be the reason to hide the wireless network, but if you don't want to hide your wireless network, just set the wireless that is WIFI router using MAC Address filtering option so that only the known device's are able to connect even if the Wireless network doesn't have a password.
    And if the wireless connection device's like Bluetooth and WIFI adaptor's are kept ON that is alway's searching for the wireless network's or a Bluetooth enabled device, then there is a chance of longer battery life as Idle device's are open for unwanted connectio's to your device's and when these unwanted device's after connecting to your device's might use your internet connection, or download your data or temper it in any way, so, when the unwanted connection use your device's service's which are enabled, use up your battery so sometime's people think we just charged our device and so quickly the battery has been used up. So, if the device is ON and alway's on searching for a network or a bluetooth device even if not connected to any of the network or a bluetooth device, it can save you from the unwanted device's from connecting to your Network.

  • ==================================================== Customized System’s Measure’s ====================================================
  • ==================================================== Devices Security Measure’s ==================================================== ==================================================== Bluetooth Devices Security Measure’s ==================================================== ==================================================== Saving Videos / Images Inside A Database ====================================================
  • ==================================================== • AL-Kahaf Technologies Inc. ! Company Web Page'sOn Social Networking Websites:-

    Company Projects And Other News Index Page ! You can add our news weblink to your favorites items in your browser.
    On www.facebook.com ! AL-Kahaf Technologies Inc.
    On www.facebook.com ! Vielless Packet Transmission (Mobile Communication) News Index Page
    On www.facebook.com ! AL-Kahaf Technologies Inc. ! Latest Electronics / Mobile / Computing Devices In The Market ! News
    On www.facebook.com ! AL-Kahaf Technologies Inc. ! Software's News Index Page
    On www.linkedin.com ! AL-Kahaf Technologies Inc. ! Our Company Page

    more on Tech... Media News Main Index Page

    ====================================================
  • ==================================================== Our company information / detailed services are given in the below listed pages, • Main Index Page • About Us • Main Services o Branded Systems o Windows o Detailed Services o Web Hosting/Add On's Home o Domain's Packages o Websites / Web Based Systems Packages o Domain TLD's Available o Mobile Web Shop  Bar Phone Available  Smart Phones Available • Customer Support • Payments • Contact Us • Mobile Web Shop AL-Kahaf Technologies Inc. ! Site Map ==================================================== ====================================================
  • I just newly opened my own business company virtually, so I thought of giving you all some system security measure’s to be taken while operating a computer system over the Internet or desktop based systems. Kindly do have a look at it, the information is very helpful and does protect from hacker’s of all type.
  • If you can get me any type of business I will be delightful.
  • We have more than 10 years of professional programming experience along with solid Hardware/software installation and troubleshooting knowledge. We have knowledge of SDLC and worked through end-to-end stages of SDLC, and have extensive knowledge and experience on UML, SSADM and OMT. We are skilled in software engineering management and method application together with experience in Management Information Systems (MIS), Decision Support Systems (DSS) & Artificial Intelligence Systems. We also have an awareness of ERP, e-business solutions. We are capable of managing and coordinating work in a team environment, as well as the ability to work autonomously. We possess competent business analysis with technical writing skills and we are always keen to learn the new trends in the market and adapting new techniques. Why Us? • We care about your business and your needs. • Low cost to satisfy the needs of small businesses to large businesses. • Customized software to meet your business requirements. • Friendly 24/7 customer support via phone and email for web and software. • Using latest tools for software design. • No hidden fees. • Reliable and fast service. • Accredited licensed registrar. • Fast domain approvals. • Your own control panel. • All web solutions under one roof.
  • One other cyber security measure is that you can make a firewall for yourself in C++ / C# / VB .NET or try taking full Microsoft Visual Studio, that is just check who ever ask to connect to a certain port on your PC or connection, just press yes or no to give the other connecting device or server or a website or a bot to connect to or to answer your query on a web browser or an app. One way is this or try all the other methods of securing your PC or other computing device. One another method is to make a proxy and bring all the connected device’s behind a proxy / firewall with controlled access to Internet.
  • Here is a just an Idea or a suggestion to upload install and run a personal antivirus / firewall on a modem or a WIFI router with Ethernet WAN & LAN Ports and SIM card option. But firewall’s do come built-in in Modem’s & Router’s these day’s, so do try enabling them on the device. But totally separate Firewall’s Computing Device’s do are available to be attached before to an internet connection directly and to the Server or a Wifi Router with Ethernet Port’s. These device’s can be updated and installed easily without the need to be monitored, as the manufacturing company update’s it automatically as they are attached in the middle of a Server / Router in a Network and an Internet connection, that is if you install such type of firewall devices with an Internet modem with an Ethernet port and connect all the other device’s which wants to use the internet, to this firewall device you connected to your modem, then your network can also be termed as a Network behind a firewall. Now network can be a home network with mobile phone’s, Tablet’s, PC’s and other device’s like Window’s Server serving a city which come’s in Metropolitan Area Network (MAN).
  • If you are planning to open up a new business or if you are already have a small or large business we can help you to secure your position on the World Wide Web. Give us a try and you will not be disappointed. Give us a call now +92 (0) 342 818 4057.
  • Thank You.
    Best Regards,
    Muhammad Mohsin Naeem
    Job Title: Director ! CEO ! Freelance Software Engineer
    Company Name: AL-Kahaf Technologies Inc.
    Mobile # +92 (0) 304 9266 409

Thanks goes to AL-Kahaf Technologies Inc. for the free giving free information to end-users all around the GLOBE.

  • Media News ! Customized Systems Measures ! Security Tips & News
  •