[slide-anything id='84']
Steemit is a God secured platform, Yes we all
know that. But there are some things we do that
put our steemit account in danger of getting
hacked.
However, Today I will be introducing you to
various ways to protecting your steemit account
from getting hacked.
It is certain that if your steemit account should
be hacked, it is from you.
Ways in which hacker explore their target:
Operating System (OS) vunerabilities.
Bugged mail messages.
network sniffing.
physical abuse.
How do you prevent your account from been
hacked:
Note: your steemit account password is already
strong enough, so you will not be needing a
new password.
1. Get two step gmail verification
Two step verification is obviously one of
the latest security measure on gmail,
whatsapp etc. This help to reduce the risk
of your gmail account getting hacked, as
70% of steemit user would prefer to hide
there password on there account, to avoid
the stress of retyping there password often.
2. Getting your Operating System up to date
Have you ever imagined why windows
keep releasing newer version of there OS,
from time to time?
Have you ever thought on, why do we
have various versions of windows?
This is because of various threats noticed
in the previous version.
Therefore, using a non up to date OS, gives
your attacker almost a easy access to your
account with just a few hit on metasploit or
even smaller tools.
3. Use a trusted antivirus
Anti virus plays a large role in keeping
your system or device out of troubles such
as virus, worm, trojan etc.
However, Bitdefender or kapersky might
really be a good choice. So:
a) Do yourself a favour of getting one.
b) Ensure you scan all mail from all
unidentified and untrusted senders.
4. Never entrusted your device to a stranger
Human been can never be predicted, we
can be bad, good, weak, strong or even
evil.
the bad guy will not label there head with
'I am a bad guy'.
Therefore, trust nobody, security is your
right, is your role.
HAPPY STEEMING!
Friday, 5 October 2018
Popular Posts
-
There are primarily three varieties of penetration testing: white field, black field, and grey field. – White Box Testing White field testin...
-
Welcome to WordPress. This is your first post. Edit or delete it, then start writing!
-
Method Two of Three: Recognizing Irrationality 1 Recognize how you catastrophize. Many people, especially when in high-stress scenarios, ...
-
Vulnerability assessment is a methodology that acknowledges and classifies the security bugs in a pc, network, or infrastructure. Some type ...
-
As the word suggests, cryptocurrencies make heavy use of cryptography. Cryptography provides a mechanism for securely encoding the rules of ...
-
What is Blockchain? As a new user, you can get started with Bitcoin without understanding the technical details. Once you have installed a ...
-
He is said to be from Japan but his mail ID was from Germany, plus the bitcoin software was not available in Japanese. He developed the syst...
-
Special About the Bitcoin System : The Bitcoin is a system which allows you to do anonymous currency transactions and no one will come to kn...
-
Open Bitcoin Account Step 1: Go to website- https://blockchain.info/wallet/#/ Step 2: Click – Create new Blockchain Wallet and Fill the deta...
-
Summary: a full-stack web developer is someone who has honed skills in both front-end web design/development and back-end/server coding. Yo...
Recent Posts
Categories
- ads
- adsense
- africa
- All about Tech
- Android and IOS
- article
- bitcoin
- blog
- courses key points
- Cryptocurrency Technologies
- crytocurrency
- Developers news
- facts
- Hackers news
- hacking
- Hacking
- How to
- kwarapoly
- money
- motivation and inspiration
- Naylite
- NAYLL
- news
- Nigeria
- security
- steemit
- uk
- US
- USA
- YOUR KEYWORDS HERE
Unordered List
Text Widget
Pages
Blog Archive
-
▼
2018
(41)
-
▼
October
(29)
- How to Transfer (BitCoins)
- How to Secure Your Account(BitCoin)
- How to Get Your First (BitCoin)
- Block-Chain (What You Need To Know)
- How to get your First (BitCoin)
- BitCoin (Some Alternatives)
- BitCoin (Things You Need to Know)
- BitCoin History (What You Need To Know)
- BitCoin (What You Need To Know)
- Cryptocurrency Technologies (What You Need To Know...
- Cryptocurrency Technologies (What You Need To Know...
- Python (How to create a Host Checker) Complete Guide
- DNS Addressing (How to on Windows)
- Whatsapp (How to Create a Fake Account)
- How to Covering Tracks over Network (Hide Your Sel...
- Kick User(s) Off From Wifi
- Base64 (Complete Guide For Images Encryption)
- Vulnerability Assessment (Short Guide)
- Google dorks (Specific File(s))
- Full-stack Web Developer (Complete Guide)
- URL Rewriting (Complete Guide)
- SigPloit Framework (What You Need To Know)WYNTK
- Computer Strain (Save you eyes and Future)
- How to Change your Site from HTTP to HTTPS Complet...
- Complete A-Z Kali Linux Commands
- [latest] how many google ads is allowed per page
- steemit was hacked! say No
- [Latest] Get the Mt
- Women are gifts to Men, Naylite 2018
-
▼
October
(29)
Search This Blog
Powered by Blogger.

0 Comments:
Post a Comment