Recover Deleted History on Google Chrome

Recover Deleted History on Google Chrome

It might happen some time that you loose your Chrome History by any reason.But after that you need to recover the same. 

Hence there are following Step which helps you to recover the same.

Method 1:  Recover Deleted History on Google Chrome from My Activity

If you have a Google account, you can recover Chrome history with the help of My Activity. Google History will show you all of your browsing histories stored in your Google Account. Let's see how to recover deleted Chrome history via Google History.

Step 1. Search Google History  > Click "Welcome to My Activity - Google".




Step 2. Sign into your Google account.

Step 3. Then all of your browser/internet history files will be displayed along with the date/time. Browse your history as needed. 


Method 2. Use DNS Cache to Recover Deleted History Chrome


Keep your computer connected to the internet and not shut down or restart your computer after losing your Chrome history. Follow the steps below to recover deleted Chrome browsing history by using DNS now.

Step 1. Press Windows + R, type cmd, and click "OK". Or, you can type cmd in the Windows search bar.

Step 2. Open Command Prompt, type ipconfig /displaydns, and press Enter.

Once you complete these steps, all your recently visited websites will be displayed. You can view all of your recent browsing histories on Chrome and copy & paste the important websites into Chrome, where they will be saved once more.





Natural Disaster and Your Data Backup


             Natural Disaster and Your Data Backup


 

As the things are not certain and there are rapid changes in the climate as well Hence in this scenario we can’t say about tomorrow Hence it becomes necessary to have disaster data plan in place against natural disaster.’

 

Are we still follows the traditional approach . As many research reveal that half of all organizations could not survive a disaster event. Research shows that many of the organization do not test the backup they have taken. We can not imagine the cost of loss of the data due to this type of care less.

 

What can be Done for the Protection of the Data

 

1.   Redundancy of Backup Data

2.   Having a Disaster recovery Site

3.   Keep the backup offsite also

 

Redundancy of Backup Data

We should always maintain the redundancy. We always  have more then one copy of the backup in different type of media . In case if one copy of backup get corrupted we can use the second copy of backup available.

Having a Disaster recovery Site

 

Most of the Companies are still not having the disaster recovery site. Disaster recovery site is a secondary location of a Company’s Network and server Setup same as Primary site and this can be used in case of any disaster happened to the Primary Site. Suppose in case of Natural Disaster , your Primary site fails to work then you have to wait till it get normal but if you have the Disaster Recovery Site then without any interruption you can start the work normally and meanwhile you can recover your primary site also. For the Disaster Recovery site Planning is necessary and  you should plan it by keep the need of organization in mind like time, budget, Location and  also must include the process of automatic schedule of sync between Primary and Disaster recovery site.

 

Type of Disaster Recovery Site: (source: http://www.nakavio.com)

 

There are three types of backup sites: cold sites, warm sites, and hot sites. Let’s look at what each of the sites represents and what differentiates them from one another.

 

Cold site

 

A cold site is a backup facility with little  or no hardware equipment installed. A cold site is essentially an office space with basic utilities such as power, cooling system, air conditioning, and communication equipment, etc. A cold site is the most cost-effective option among the three disaster recovery sites. However, due to the fact that a cold site doesn’t have any pre-installed equipment, it takes a lot of time to properly set it up so as to fully resume business operations. In case of a disaster, an organization would require help from IT personnel to migrate necessary servers and make them functional in order to take on the workload of the primary site.

 

Hot site

 

A hot site is a backup facility which represents a mirrored copy of the primary production center. A hot site is equipped with all the necessary hardware, software, and network connectivity, which allows you to perform near real-time backup or replication of the critical data. This way the production workload can be failed over to a DR site in a few minutes or hours, thus ensuring minimal downtime and zero data loss. A hot site is expected to be always online and running without disruption so as to ensure data synchronization between the sites.

A hot site is the most expensive option among the three. Thus, it is important to ensure that this type of a DR site is located far enough from the production center. This way you can decrease the possibility of a hot site being affected by the same disaster as the primary site.

 

Warm site

 

A warm site is considered the middle ground between the cold site and the hot site. A warm site is a backup facility that has the network connectivity and the necessary hardware equipment already pre-installed. However, a warm site cannot perform on the same level as the  production center because they are not equipped in the same way. Therefore, a warm site has less operational capacity than the primary site. Moreover, data synchronization between the primary and the secondary sites is performed daily or weekly, which can result in minor data loss. A warm site is perfect for organizations which operate with less critical data and can tolerate a short period of downtime. This type of a DR site is the second most expensive option.

 

Having Original Software is an Investment Not Expenses

Hi! Are your Systems open for Hacking or Cyber Attacks? As all of  us are aware that no of system Hacking and cyber attacks are increasing day by day. 

Twitter says about 130 accounts were targeted in cyber attack this week-Source Economic Times

Read more at:

https://economictimes.indiatimes.com/tech/internet/twitter-says-about-130-accounts-were-targeted-in-cyber-attack-this-week/articleshow/77012608.cms?utm_source=contentofinterest&utm_medium=text&utm_campaign=cppst

Ransomware attacks against SMEs fall sharply in Southeast Asia.Source:https://portswigger.net

Read More at:

https://portswigger.net/daily-swig/ransomware-attacks-against-smes-fall-sharply-in-southeast-asia


DDoS Attacks That Employ TCP Amplification Cause Network Congestion, Secondary Outages

https://www.trendmicro.com/vinfo/us/security/news/cyber-attacks/ddos-attacks-that-employ-tcp-amplification-cause-network-congestion-secondary-outages

So this is very essential to us that we all should have Original Antivirus and other Software. As you are aware that Microsoft has stopped support for Windows XP and Windows 7 and still most of us are using the  Old Operating System Software. 

First of all, we need to understand the Benefit of Having Original Softwares

1. It is ethical to have the Genuine Software.

2. In case of any Technical Issue, We can take the support of the concerned Company without any hesitation.

3. Company issues the Patches and update time to time to protect the system whereas in case of Pirated  software we can not update the System. And It is necessary to update the System from the protection of new Threats.

4. In case company issues new version of the software, It always consider it's Existing Customer in terms of charges.

5. You and Your Employees have a Great Peace of Mind.

6. By using Genuine Software, you are avoiding external Threats

Now the second Case, You have all the Genuine Software but not updating them. But Why? We take the Example of SQL -Server. Most of the Company have the original Ms- Sql Server Software but they did not update the Same because the companies are using softwares like ERP, Stock -Trading and others from third Party and the vendor of these software do not update their software according to the latest patches Hence their software do not works properly with the new updates and they people recommend not to update Sql-Server. If you have doubt about this ask your vendor to update the Sql-Server. More then 50% of software vendor will recommend not to update the Software. Whereas this type of software which maintains company database must be update specially in this Pandemic time.

Please think of it.

Please be Careful and Be Safe

We always welcome to your Queries and Suggestion.

Thanks.

 

 

   

 


Hackers Ransomware Attack at Argentina Borders with $4 Million Bitcoin Ransom Demand

Firewall: Be Smart Enough To Choose Right One


Firewall is a gateway between the Organization and the outside Network. You can compare it as a Watchman at your gate. Your Watchman is the first level of the security of your Premises. Hence He must be equipped with Latest security gadget and same is applicable to the firewall. You should know everything about your firewall.

Types of Firewall

There are different Types of firewall as listed below

 1.       Proxy Firewall

It filter the messages at Apllication Layer. It works as an Intermediary between the Internal Client and the server hosted outside. It Filters the incoming traffic such as HTTP and FTP. In addition to determine which traffic to be allowed, a  proxy firewall uses stateful inspection technology and deep packet inspection to analyze incoming traffic for signs of attack. 

2. Stateful Inspection Firewall

It works on Session Level Protection. When any Internal device Establish a connection to the Device hosted at outside, a session Established between both . SI Firewalls track the state of sessions and dropping packets that are not part of a session allowed by a pre-defined security policy.

 3. Unified Threat Management (UTM) Firewall

It have the feature of traditional Firewall with other Security feature  such as gateway level antivirus, 

intrusion detection and prevention, Malware Protection, Web filtering  etc. It manage manage a wide 

range of security functions with a single management console Such firewall are Ideal for small to 

medium Sized Enterprises

4. Next-Generation Firewall (NGFW)

The Next generation Firewall as the name suggest is more Advanced Version of Traditional Firewall. In this era , having a Next Generation Firewall is most important.

As threats to personal devices and larger networks are changing every day. With the flexibility of a Next-Generation Firewall, it protects devices and companies from a much broader spectrum of intrusions. Although these firewalls are not the right solution for every business, security professionals should carefully consider the benefits that NGFWs can provide, as it has a very large upside.

5. Threat-Focused NGFW

This is the advanced version of Next Generation Firewall. It focused the advanced threat detection and remediation.  It also knows which assets are more prone to risk with a complete context awareness report. It can respond to attacks using intelligent security automation and is capable of handling various other security-related issues.

Why We need the firewall? 

This question should not arise here in today's scenario as all of us are aware about the need of it but again I am answering it as follows: 

 1.       To Prevent unauthorized outside Access

2.       Blocking unwanted Website

3.       Safe Banking Experience

4.       Filter out immoral content 

5.       Provide VPN connectivity at remote location

Hence it is necessary to know the feature of the Firewall and how many users it can handle. There are so many Company which provide the Firewall. Some of them are Listed below:

1. Check Point

2.  Fortinet

3.   Cisco

4. WatchGuard 

5. Sophos

6Juniper

7. SonicWALL

The above is the list of Some of Big Players but today there are so many small Companies which offer the Firewall. Hence before going to any firewall one have to go through the feature being provided.

 

Is it necessary to Update Licenses of firewall Every Year?

It has been found that some of the organization do not take the updated Licenses of the Firewall, due to the cost. But  it is recommended to get the Updated License when it expire otherwise Some of the Function being used for Protection will stop the Work and your network  can be compromised.

 

Note: In case if you want to consult anything regarding your Network/Firewall. You can mail me at singhalyogesh@gmail.com with the Details.

 

In my Next Blog: I am going to discuss about the Advantages of Having Original Software.

 

Keep Reading

 

-Thanks

Should all the Employee have the latest IT threats and Update Knowledge? We should start think on it

The year 2020 began with New Challenges and It starts a new era. It not only came up with the Covid-19 which enforce to rethink the World about the Medical Infrastructure but it affected every aspects of World Economy . When We talk about the Economy then It automatically cover Every Industry and Every Person of the World. Really this year change the way of our thinking

Everyone have to be updated about his/her own health about which all we are taking care of. But One point which click me is that Does  it become necessary to have the updated knowledge of the IT more then that before the Covid Period ? What do you think? Please reply me. But as an individual this is becoming necessary and need of the coming day.

Now it is not only the responsibility of IT head or department in the organization to protect and secure the organization data But this become a social/combined responsibility for all of us and I think Now not only IT Department is there to Implement IT related policy but now it should be HR+IT(HRIT) Policy.

Organization Should run the training/awareness Program to trained/update all Its Employee so that they should have enough knowledge to handle situation at the time of requirement.

 

What is your Opinion regarding this point? Please update by reply.     

 


Manage your Phone Calls and Much More From Your Laptop/PC

 

Hi Friends,

 Most of the time we are busy enough with our work on PC/Laptop we can not attend or make Call as the Phone is plugged into the charging Point or it is far from your seat.

But isn’t it helpful if we got the Call /make the call from the  Laptop itself without physically touching the Phone? Yes it will be very useful and not only you can manage your call . you can receive the notification/sms and see the Images on your PC.

 

So what we are waiting for. Let’s start with the following Process but make it sure that you should have windows 10 with latest update and your Phone Should have android 9.0 or above.

 

1.       Go to the search bar and type Your Phone, click on it.


 

2.       Now select Your Phone type and continue, In my case it is android


 

3.       In next screen it will instruct you to , open the website www.aka.ms/yourpc  on your phone and install the same. When you finished it click on yes , I finished Installing your Phone companion Open Qr Code


 

4.       Next Screen will appear as follows


 

 

Note: your phone and computer must be on the same Wi-Fi network for the feature to work

 

Click on Done. The next screen will appear as follows



 

And click on continue.

 

Now It’s ready to work. Now you can see the following screen on your Desktop

 


You can now use your phone with your laptop.

 

It’s amazing. Please try it.

 

 -Thanks

 

 

 

Recover Deleted History on Google Chrome

Recover Deleted History on Google Chrome It might happen some time that you loose your Chrome History by any reason.But after that you need ...