20130807

What to Do After You’ve Been Hacked

Clique no link, check the first and leave music playing.
All best!
The sunrise is the most beautiful time of the day, but when he arrives, to discover most people durmindo "
 
The Times dreams built upon great people ...
Time goes by ...
and found That the dreams were big
and people too small to make them real!


R










This is one of those non-obvious but important steps. One of the first things you should probably do if you’ve had an account compromise is de-authorize all the associated apps that use that account for login or for its social graph. For example, Google, Twitter, Facebook, Dropbox and many others support OAuth, which enables third party apps to use account APIs without having to give them the account login information. But if a hacker has used it to authorize another device or service, and remains logged in there, simply changing your password won’t get them out. There could be a rogue client out there that you remain unaware of even after regaining access to your account. The best bet is to pull the plug on everything you’ve given access to are on GoogleFacebook and Twitter. It may be a pain to go back through and re-authorize them, but it’s less so than leaving a malicious individual lurking in your account. And in any case, doing so periodically is just good hygene.