[slide-anything id='84']
Steemit is a God secured platform, Yes we all
know that. But there are some things we do that
put our steemit account in danger of getting
hacked.
However, Today I will be introducing you to
various ways to protecting your steemit account
from getting hacked.
It is certain that if your steemit account should
be hacked, it is from you.
Ways in which hacker explore their target:
Operating System (OS) vunerabilities.
Bugged mail messages.
network sniffing.
physical abuse.
How do you prevent your account from been
hacked:
Note: your steemit account password is already
strong enough, so you will not be needing a
new password.
1. Get two step gmail verification
Two step verification is obviously one of
the latest security measure on gmail,
whatsapp etc. This help to reduce the risk
of your gmail account getting hacked, as
70% of steemit user would prefer to hide
there password on there account, to avoid
the stress of retyping there password often.
2. Getting your Operating System up to date
Have you ever imagined why windows
keep releasing newer version of there OS,
from time to time?
Have you ever thought on, why do we
have various versions of windows?
This is because of various threats noticed
in the previous version.
Therefore, using a non up to date OS, gives
your attacker almost a easy access to your
account with just a few hit on metasploit or
even smaller tools.
3. Use a trusted antivirus
Anti virus plays a large role in keeping
your system or device out of troubles such
as virus, worm, trojan etc.
However, Bitdefender or kapersky might
really be a good choice. So:
a) Do yourself a favour of getting one.
b) Ensure you scan all mail from all
unidentified and untrusted senders.
4. Never entrusted your device to a stranger
Human been can never be predicted, we
can be bad, good, weak, strong or even
evil.
the bad guy will not label there head with
'I am a bad guy'.
Therefore, trust nobody, security is your
right, is your role.
HAPPY STEEMING!
Friday, 5 October 2018
Popular Posts
-
Let get straight to the point. Step 1 Download this app name myMtn from playstore or ios. Step 2 Open it, select your country . Step 3 Afte...
-
Zoto, a cellular fee app utilized by over 1 million Nigerians, has introduced a new app design. according to agency officials, the new app i...
-
if you need an opportunity to Jetpack sharing buttons that consists of the facebook like button, you could strive the sassy social share plu...
-
What are the Requirements to get bitcoin? Just one email id, password and After signup –Wallet ID How to get bitcoins? To get raid with bitc...
-
Do you ever wish you had the ability to solve problems efficiently and easily? If so, you may want to improve your thinking patterns in orde...
-
Summary: a full-stack web developer is someone who has honed skills in both front-end web design/development and back-end/server coding. Yo...
-
Vulnerability assessment is a methodology that acknowledges and classifies the security bugs in a pc, network, or infrastructure. Some type ...
-
Ever since it was first released almost a decade ago, Google’s Chrome browser has been the most consistent piece of technology in my life. I...
-
facts coming from a very dependable source , Evan Blass aka evLeaks, will break the hearts of many who've been looking ahead...
-
venture permit Africa, a community improvement initiative that advocates for the rights and empowerment of people with disabilities in Afric...
Recent Posts
Categories
- ads
- adsense
- africa
- All about Tech
- Android and IOS
- article
- bitcoin
- blog
- courses key points
- Cryptocurrency Technologies
- crytocurrency
- Developers news
- facts
- Hackers news
- hacking
- Hacking
- How to
- kwarapoly
- money
- motivation and inspiration
- Naylite
- NAYLL
- news
- Nigeria
- security
- steemit
- uk
- US
- USA
- YOUR KEYWORDS HERE
Unordered List
Text Widget
Pages
Blog Archive
-
▼
2018
(41)
-
▼
October
(29)
- How to Transfer (BitCoins)
- How to Secure Your Account(BitCoin)
- How to Get Your First (BitCoin)
- Block-Chain (What You Need To Know)
- How to get your First (BitCoin)
- BitCoin (Some Alternatives)
- BitCoin (Things You Need to Know)
- BitCoin History (What You Need To Know)
- BitCoin (What You Need To Know)
- Cryptocurrency Technologies (What You Need To Know...
- Cryptocurrency Technologies (What You Need To Know...
- Python (How to create a Host Checker) Complete Guide
- DNS Addressing (How to on Windows)
- Whatsapp (How to Create a Fake Account)
- How to Covering Tracks over Network (Hide Your Sel...
- Kick User(s) Off From Wifi
- Base64 (Complete Guide For Images Encryption)
- Vulnerability Assessment (Short Guide)
- Google dorks (Specific File(s))
- Full-stack Web Developer (Complete Guide)
- URL Rewriting (Complete Guide)
- SigPloit Framework (What You Need To Know)WYNTK
- Computer Strain (Save you eyes and Future)
- How to Change your Site from HTTP to HTTPS Complet...
- Complete A-Z Kali Linux Commands
- [latest] how many google ads is allowed per page
- steemit was hacked! say No
- [Latest] Get the Mt
- Women are gifts to Men, Naylite 2018
-
▼
October
(29)
Search This Blog
Powered by Blogger.
0 Comments:
Post a Comment