How to use Canary Tokens to keep hackers from accessing your files
Are you worried about your personal files being stolen by hackers? Canary Tokens is a free and easy-to-use tool that you can quickly deploy to receive alerts when hackers open your files.
What are Canary Tokens?
Canary Tokens is a cybersecurity tool from Thinkst Canary that tracks hackers as they access your personal data. It works by embedding your file with a special tracking URL to notify you via email when it is opened. Similar to how a honeypot works, the idea is to place a tracker disguised as a regular file on your device. When the hacker opens the file, a hidden link opens, alerting you to the violation.
How to use Canary Tokens to protect your data
The article will show you how to embed the Canary Tokens tracking URL into the Windows folder. However, you can use Canary Tokens to protect all types of files and services, from Word and Excel documents to specific URLs, to online services like Azure and Microsoft SQL servers, etc. .
Let's start by visiting Canary Tokens.
When you visit the website, you will be greeted by the Canary Token generator. The generator requires you to set up three fields:
- The first is to choose the appropriate token for your file type.
- The second is for your email address.
- The last section is for anything you want to remind yourself of when the alert is triggered.
Because the article is embedding the token in a folder, the author has selected the Windows folder from the Select your token drop-down menu .
The author has also provided email to receive notifications and text notes to remind about the intended use of the token.
After you fill out the form, click Create my Canarytoken and download the ZIP file embedded with a special token.
Now, extract the ZIP file by right-clicking on the file and selecting Extract All , then enter the folder where you want to place the file. Ideally, it should be somewhere easy for hackers to find. For example, if you want the file on your desktop, you would enter C:UsersYourUserNameDesktop (remember to replace YourUserName). You can then add the file to the folder and rename it to a name that a potential hacker might want to open.
Now that our trap is set, let's try opening the folder and check if the warning has been triggered.
How to check if hackers have access to your files
Checking whether your special file has been opened is as simple as opening your email account (the one you linked previously) and checking the Canarytoken Mailer in your inbox.
Enabling email notifications on Chrome or your favorite web browser will help notify you immediately when the file is opened. You may also want to check your spam folder in case Canarytoken Mailer is identified as spam.
Token activation will notify you with an email that looks like this:
As you can see, it contains information such as date and time, text note reminder, and source IP, which can be used for various purposes. You can use an IP tracker to find the general location where your files are opened. Additionally, select More info on this token here to see the location of the problem.
The location specificity that Canary Tokens provide will vary depending on how the file opener's ISP operates and whether they are using a VPN to protect their location data.
You should read it
- How to read PDF files aloud on Microsoft Edge Canary
- How to unlock SURF game on Edge Chromium Canary
- What is NFT? Why do people spend $ 1,000 to buy NFT?
- How to get Legend Tokens in Apex Legends
- What is the token on Lotus, how to use it, how to use it, and how to earn it?
- Detecting a new strain of malicious code that abuses Windows Installer to deploy infection activities
- Microsoft Edge Canary can pronounce PDF document content
- Instructions and things to know when using the latest version of all browsers
May be interested
- How to use Nightshade to protect your artwork from Generative AIthat all changed with the introduction of nightshade, a free ai tool designed to poison the output of generative ai tools - and finally let artists take back some power.
- How to check QR code safety before scanningqr codes are not necessarily safe for you to scan content. therefore, we can check the safety of qr codes according to the instructions below, with a very simple implementation.
- 5 best ASUS ROG Ally docks in 2024not only does asus rog ally have its own official docking station, but many of the best steam deck docks also work well with asus handsets, making expanding its functionality really easy.
- How to convert virtual machines from VMware to VirtualBox and vice versatwo of the most popular virtual machine software are vmware and virtualbox. each has its own pros and cons, but the best thing is that you can easily convert vmware to virtualbox and vice versa.
- 5 free AI chatbots for your websiteimagine answering customer questions even while you sleep. here's what free ai chatbots can do for your website.
- iPhone forgot screen and iCloud password, how to get it back quicklyiphone forgot screen and icloud password so apple doesn't know how to access the phone? tipsmake has a way to help you!