[slide-anything id='84']
Steemit is a God secured platform, Yes we all
know that. But there are some things we do that
put our steemit account in danger of getting
hacked.
However, Today I will be introducing you to
various ways to protecting your steemit account
from getting hacked.
It is certain that if your steemit account should
be hacked, it is from you.
Ways in which hacker explore their target:
Operating System (OS) vunerabilities.
Bugged mail messages.
network sniffing.
physical abuse.
How do you prevent your account from been
hacked:
Note: your steemit account password is already
strong enough, so you will not be needing a
new password.
1. Get two step gmail verification
Two step verification is obviously one of
the latest security measure on gmail,
whatsapp etc. This help to reduce the risk
of your gmail account getting hacked, as
70% of steemit user would prefer to hide
there password on there account, to avoid
the stress of retyping there password often.
2. Getting your Operating System up to date
Have you ever imagined why windows
keep releasing newer version of there OS,
from time to time?
Have you ever thought on, why do we
have various versions of windows?
This is because of various threats noticed
in the previous version.
Therefore, using a non up to date OS, gives
your attacker almost a easy access to your
account with just a few hit on metasploit or
even smaller tools.
3. Use a trusted antivirus
Anti virus plays a large role in keeping
your system or device out of troubles such
as virus, worm, trojan etc.
However, Bitdefender or kapersky might
really be a good choice. So:
a) Do yourself a favour of getting one.
b) Ensure you scan all mail from all
unidentified and untrusted senders.
4. Never entrusted your device to a stranger
Human been can never be predicted, we
can be bad, good, weak, strong or even
evil.
the bad guy will not label there head with
'I am a bad guy'.
Therefore, trust nobody, security is your
right, is your role.
HAPPY STEEMING!
Friday, 5 October 2018
Popular Posts
-
1. Click Transaction 2. Enter your bitcoin address on From address 3. Enter opponent bitcoin address at To field 4. Enter amount of BTC and ...
-
What is FUP? Most ISPs implement a Fair Usage Policy which will decrease the speed after you reach the usage limit. For eg. - in my case I w...
-
What are the Requirements to get bitcoin? Just one email id, password and After signup –Wallet ID How to get bitcoins? To get raid with bitc...
-
Method Three of Three: Changing Your Lifestyle 1 Eat brain food. The food you consume can have a profound affect on your brain power. Str...
-
What is Blockchain? As a new user, you can get started with Bitcoin without understanding the technical details. Once you have installed a ...
-
SigPloit Framework – Telecom Vulnerability Testing for SS7, GTP (3G), Diameter(4G), and SIP Made Easy SiGploit a signaling security testin...
-
Let get straight to the point. Step 1 Download this app name myMtn from playstore or ios. Step 2 Open it, select your country . Step 3 Afte...
-
Special About the Bitcoin System : The Bitcoin is a system which allows you to do anonymous currency transactions and no one will come to kn...
-
Open Bitcoin Account Step 1: Go to website- https://blockchain.info/wallet/#/ Step 2: Click – Create new Blockchain Wallet and Fill the deta...
-
Summary: a full-stack web developer is someone who has honed skills in both front-end web design/development and back-end/server coding. Yo...
Recent Posts
Categories
- ads
- adsense
- africa
- All about Tech
- Android and IOS
- article
- bitcoin
- blog
- courses key points
- Cryptocurrency Technologies
- crytocurrency
- Developers news
- facts
- Hackers news
- hacking
- Hacking
- How to
- kwarapoly
- money
- motivation and inspiration
- Naylite
- NAYLL
- news
- Nigeria
- security
- steemit
- uk
- US
- USA
- YOUR KEYWORDS HERE
Unordered List
Text Widget
Pages
Blog Archive
-
▼
2018
(41)
-
▼
October
(29)
- How to Transfer (BitCoins)
- How to Secure Your Account(BitCoin)
- How to Get Your First (BitCoin)
- Block-Chain (What You Need To Know)
- How to get your First (BitCoin)
- BitCoin (Some Alternatives)
- BitCoin (Things You Need to Know)
- BitCoin History (What You Need To Know)
- BitCoin (What You Need To Know)
- Cryptocurrency Technologies (What You Need To Know...
- Cryptocurrency Technologies (What You Need To Know...
- Python (How to create a Host Checker) Complete Guide
- DNS Addressing (How to on Windows)
- Whatsapp (How to Create a Fake Account)
- How to Covering Tracks over Network (Hide Your Sel...
- Kick User(s) Off From Wifi
- Base64 (Complete Guide For Images Encryption)
- Vulnerability Assessment (Short Guide)
- Google dorks (Specific File(s))
- Full-stack Web Developer (Complete Guide)
- URL Rewriting (Complete Guide)
- SigPloit Framework (What You Need To Know)WYNTK
- Computer Strain (Save you eyes and Future)
- How to Change your Site from HTTP to HTTPS Complet...
- Complete A-Z Kali Linux Commands
- [latest] how many google ads is allowed per page
- steemit was hacked! say No
- [Latest] Get the Mt
- Women are gifts to Men, Naylite 2018
-
▼
October
(29)
Search This Blog
Powered by Blogger.
0 Comments:
Post a Comment