Saturday, 31 March 2012
How To Protect You And Your Family From Phishing
People everywhere have started to make themselves aware of one of the newest threats on the internet. If you have a personal computer and any members of your family are on the internet, it is something that you will want to be familiar with, too. The new practice is called phishing but is pronounced fishing. That comparison is also appropriate to make regarding the practice.
Basically, what a hacker will do if he is phishing on your computer is he will somehow break into your computer's console to have the ability to takes snapshots of your activity. This means that if your computer has been phished, they will be able to take and save snapshots of purchases you make, mortgages you are applying for, different types of auto loans and title loans. Once they have your social security number, checking account number, credit card number or worse, they will then take action.
There are a few different ways that these criminals can strike once they have your information. Either they can falsely use your checking account to make large purchases or run your credit card up in the same way. If they are more serious criminals, they might go so far as to steal your identity completely. If they do this, they might take out mortgages, auto loans or title loans out in your name and not pay on them.
The worst part about this experience would be the fact that when you finally do find out what's happened, it's often too late. Once credit history has been damaged, it is very difficult to repair. However, now that you are an informed consumer, you can avoid certain situations that can open your computer up to unwanted phishing. For instance, never open emails that are from an unknown recipient.
If by accident you do open one of the dreaded emails up, make sure you never click on any links, no matter how interesting they might sound. It is important to remember that often, these emails could come from companies you trust or other emails that have been phished already. Just remember that if you cousin starts sending you links about the Acai Berry Diet, it is probably not reputable. Other hackers might use credible names like federal financial institution or your bank name.
You should also make sure your entire family knows not to click on ads when surfing the web, no matter how interesting they are made to sound. Another phishing tactic is asking you to change your account or login information. Remember that most banks and other credible institutions will never send you an email asking you to do this. Therefore, if you get a request that seems a little suspicious, your best bet is to call first to find out whether or not the request is credible.
If it's not, your bank or financial institution might ask you to forward them the email so that they are able to press charges on the creator. Chances are, if the institution deals at all with mortgages, auto loans or title loans, they've seen this threat before. No matter what, make sure you surf safely on the internet at all times. The identity you save may be your own.
Friday, 2 March 2012
Resolve SQL Corruption Caused Due to Transaction Log Files Removal Interrupting Database Mirroring
Database Mirroring: In SQL Server 2008, you can use the feature of database mirroring between two databases. It can help in the data loss situations where a database damages for some reason; you can back up your database from the mirror database.
Transaction Log Files Removed Accidentally: If by chance, you remove the transaction log files; the database mirroring session can interrupt. This causes the Principal Server to fail and you will not be able to restore the data from mirror server. This can cause corruption damaging the database.
A Possible Scenario: Consider a practical scenario where you are using SQL Server 2008 SP1 (Service Pack 1) or MS SQL Server 2008. You configure mirroring between 2 databases.
Transaction Log Files Removed ? Errors Encountered: You run ALTER DATABASE command with REMOVE FILE clause for removing the transaction log files on the main SQL Server database. This can abort database mirroring session, which you cannot resume. You can also receive the following message: ?Location:" logmgr. cpp ": 3350
Expression: headLFCB-> lfcb_startOffset GetSize () * (ULONGLONG) PAGESIZE?
After that, you get the below error message in SQL Server event log logged:
?spid23s A system has failed. Check the SQL Server error log for more details. Typically, an assertion is by a software bug or data corruption. To check for any damage to the database, DBCC CHECKDB. If you send causes agreed to dumps to Microsoft during setup, a mini dump will be sent to Microsoft. An update is available from Microsoft in the latest service pack or in a QFE from Technical Support.?
Cause behind SQL MDF Corruption: The main cause behind problem can be the incorrect log on mirror-space tracking database or due to SQL database MDF file corruption.
How to Restore SQL Database? First check the cause of the problem and accordingly you can use the below mentioned resolutions methods.
1. Problem caused due to incorrect log space tracking: If the above mentioned problem has been caused due to incorrect log space tracking, then you can load the latest SQL Server update and then install it on your machine.
2. Problem caused due to MDF corruption: However, if there is MDF corruption issue, then you have to go for SQL Server database recovery. SQL recovery process can be performed using an advanced and effective third-party tool like SysTools SQL Recovery software. You can easily restore SQL master database using this simple and intuitive SQL Server disaster recovery (http://www.sqlrecovery.co.uk/how-to-restore-an-sql-database) tool. The application employs advanced scanning techniques to ensure accurate and rapid SQL recovery in almost all types of corruption cases. You can use this tool to restore SQL 2000 database also as it supports all major SQL versions.
Subscribe to:
Comments (Atom)