Friday, 4 November 2016

0

Simple Steps To Become A Hacker

  • Friday, 4 November 2016
  • PRABH KARAN SINGH
  • Hacking is an engaging field but it is surely not easy. To become a hacker one has to have an attitude and curiosity of learning and adapting new skills. You must have a deep knowledge of computer systems, programming languages, operating systems and the journey of learning goes on and on. Some people think that a hacker is always a criminal and do illegal activities but they are wrong. Actually many big companies hire hackers to protect their systems and information and are highly paid. We have prepared a list of 12 most important steps necessary to become a hacker, have a deeper look

    1. Learn UNIX/LINUX

    linux operating system
    UNIX/LINUX is an open source operating system which provides better security to computer systems. It was first developed by AT&T in Bell labs and contributed a lot in the world of security. You should install LINUX freely available open source versions on your desktops as without learning UNIX/LINUX, it is not possible to become a hacker.

    2. Code in C language 

    c programming
    C programming is the base of learning UNIX/LINUX as this operating system is coded in C programming which makes it the most powerful language as compared to other programming languages. C language was developed by Dennis Ritchie in late 1970’s. To become a hacker you should master C language.

    3. Learn to code in more than one Programming Language

    programming languages

    It is important for a person in the hacking field to learn more than one programming. There are many programming languages to learn such as Python, JAVA, C++. Free eBooks, tutorials are easily available online.

    4. Learn Networking Concepts

    computer networking
    Another important and essential step to become a hacker is to be good at networking concepts and understanding how the networks are created. You need to know the differences between different types of networks and must have a clear understanding of TCP/IP and UDP to exploit vulnerabilities (loop holes) in system.
    Understanding what LAN, WAN, VPN, Firewall is also important.
    You must have a clear understanding and use of network tools such as Wireshark, NMAP for packet analyzing, network scanning etc.

    5. Learn More Than One Operating Systems 

    operating system
    It is essential for a hacker to learn more than one operating system. There are many other Operating systems apart from Windows, UNIX/LINUX etc. Every system has a loop hole, hacker needs it to exploit it.

    6. Learn Cryptography

    cryptography encryption
    To become a successful hacker you need to master the art of cryptography. Encryption and Decryption are important skills in hacking. Encryption is widely done in several aspects of information system security in authentication, confidentiality and integrity of data. Information on a network is in encrypted form such as passwords. While hacking a system, these encrypted codes needs to be broken, which is called decryption.

    7. Learn more and more about hacking

    hacking or hackers
    Go through various tutorials, eBooks written by experts in the field of hacking. In the field of hacking, learning is never ending because security changes every day with new updates in systems.

    8. Experiment A Lot

    experiment
    After learning some concepts, sit and practice them. Setup your own lab for experimental purpose. You need a good computer system to start with as some tools may require powerful processor, RAM etc. Keep on Testing and learning until you breach a system.

    9. Write Vulnerability (Loop hole program)

    hacking vulnerability

    Vulnerability is the weakness, loop hole or open door through which you enter the system. Look for vulnerabilities by scanning the system, network etc. Try to write your own and exploit the system.

    10. Contribute To Open Source Security Projects

    open source software
    An open source computer security project helps you a lot in polishing and testing your hacking skills. It’s not a piece of cake to get it done. Some organizations such as MOZILLA, APACHE offer open source projects. Contribute and be a part of them even if your contribution is small, it will add a big value to your field.

    11. Continue never ending Learning 

    learning hacking
    Learning is the key to success in the world of hacking. Continuous learning and practicing will make you the best hacker. Keep yourself updated about security changes and learn about new ways to exploit systems

    12. Join Discussions and meet hackers 

    discussion
    Most important for a hacker is to make a community or join forums, discussions with other hackers worldwide, so that they can exchange and share their knowledge and work as a team. Join Facebook groups related to hacking where you can get more from experts.
    Read more...

    Wednesday, 20 January 2016

    0

    Interciew Questions of Windows DHCP Interview

  • Wednesday, 20 January 2016
  • PRABH KARAN SINGH
  • What is dhcp? 
    Dynamic Host Configuration Protocol (DHCP) is a network protocol that enables a server to automatically assign an IP address to a computer from a defined range of numbers (i.e., a scope) configured for a given network.
    What is the dhcp process for client machine?
     
    1. A user turns on a computer with a DHCP client.
    2. The client computer sends a broadcast request (called a DISCOVER or DHCPDISCOVER), looking for a DHCP server to answer.
    3. The router directs the DISCOVER packet to the correct DHCP server.
    4. The server receives the DISCOVER packet. Based on availability and usage policies set on the server, the server determines an appropriate address (if any) to give to the client. The server then temporarily reserves that address for the client and sends back to the client an OFFER (or DHCPOFFER) packet, with that address information. The server also configures the client's DNS servers, WINS servers, NTP servers, and sometimes other services as well.
    5. The client sends a REQUEST (or DHCPREQUEST) packet, letting the server know that it intends to use the address.
    6. The server sends an ACK (or DHCPACK) packet, confirming that the client has been given a lease on the address for a server-specified period of time.
    What is dhcp scope?
     
    DHCP scopes are used to define ranges of addresses from which a DHCP server can assign IP addresses to clients.
    Types of scopes in windows dhcp ?
     
    Normal Scope - Allows A, B and C Class IP address ranges to be specified including subnet masks, exclusions and reservations. Each normal scope defined must exist within its own subnet.
    Multicast Scope - Used to assign IP address ranges for Class D networks. Multicast scopes do not have subnet masks, reservation or other TCP/IP options.
    Multicast scope address ranges require that a Time To Live (TTL) value be specified (essentially the number of routers a packet can pass through on the way to its destination).
    Superscope - Essentially a collection of scopes grouped together such that they can be enabled and disabled as a single entity.
    What is Authorizing DHCP Servers in Active Directory?
     
    If a DHCP server is to operate within an Active Directory domain (and is not running on a domain controller) it must first be authorized.
    This can be achieved either as part of the DHCP Server role installation, or subsequently using either DHCP console or at the command prompt using the netsh tool.
    If the DHCP server was not authorized during installation, invoke the DHCP console (Start - All Programs - Administrative Tools - DHCP),
    right click on the DHCP to be authorized and select Authorize. To achieve the same result from the command prompt, enter the following command:
    netsh dhcp server serverID initiate auth
    In the above command syntax, serverID is replaced by the IP address or full UNC name of system on which the DHCP server is installed.
    What ports are used by DHCP and the DHCP clients ?
     
    Requests are on UDP port 68, Server replies on UDP 67 .
    Benefits of using DHCP
     
    DHCP provides the following benefits for administering your TCP/IP-based network:
    Safe and reliable configuration. DHCP avoids configuration errors caused by the need to manually type in values at each computer. Also, DHCP helps prevent address conflicts caused by a previously assigned IP address being reused to configure a new computer on the network.
    Reduces configuration management.
    Using DHCP servers can greatly decrease time spent to configuring and reconfiguring computers on your network. Servers can be configured to supply a full range of additional configuration values when assigning address leases. These values are assigned using DHCP options. Also, the DHCP lease renewal process helps assure that where client configurations need to be updated often (such as users with mobile or portable computers who change locations frequently), these changes can be made efficiently and automatically by clients communicating directly with DHCP servers.
    The following section covers issues that affect the use of the DHCP Server service with other services or network configurations. Using DNS servers with DHCP Using Routing and Remote Access servers with DHCP Multihomed DHCP servers.
    Describe the process of installing a DHCP server in an AD infrastructure?
     
    Open Windows Components Wizard. Under Components , scroll to and click Networking Services. Click Details . Under Subcomponents of Networking Services , click Dynamic Host Configuration Protocol (DHCP) and then click OK .
    Click Next . If prompted, type the full path to the Windows Server 2003 distribution files, and then click Next. Required files are copied to your hard disk.

    How to authorize a DHCP server in Active Directory Open DHCP?
     
    In the console tree, click DHCP
    . On the Action menu, click Manage authorized servers.
    . The Manage Authorized Servers dialog box appears. Click Authorize.
    . When prompted, type the name or IP address of the DHCP server to be authorized, and then click OK.
    What is DHCPINFORM?
     
    DHCPInform is a DHCP message used by DHCP clients to obtain DHCP options. While PPP remote access clients do not use DHCP to obtain IP addresses for the remote access connection, Windows 2000 and Windows 98 remote access clients use the DHCPInform message to obtain DNS server IP addresses, WINS server IP addresses, and a DNS domain name.
    The DHCPInform message is sent after the IPCP negotiation is concluded. The DHCPInform message received by the remote access server is then forwarded to a DHCP server. The remote access server forwards DHCPInform messages only if it has been configured with the DHCP Relay Agent.
    Describe the integration between DHCP and DNS?
     
    Traditionally, DNS and DHCP servers have been configured and managed one at a time. Similarly, changing authorization rights for a particular user on a group of devices has meant visiting each one and making configuration changes.
    DHCP integration with DNS allows the aggregation of these tasks across devices, enabling a company's network services to scale in step with the growth of network users, devices, and policies, while reducing administrative operations and costs. This integration provides practical operational efficiencies that lower total cost of ownership.
    Creating a DHCP network automatically creates an associated DNS zone, for example, reducing the number of tasks required of network administrators. And integration of DNS and DHCP in the same database instance provides unmatched consistency between service and management views of IP address-centric network services data.
    Read more...

    Thursday, 19 March 2015

    0

    Computer Hacking , All you Need to Know about Hacking

  • Thursday, 19 March 2015
  • PRABH KARAN SINGH
  •  Computer Hacking , All you Need to Know about Hacking
    Every human discovery has pros and cons, so is the computer which has pervaded all our lives. The modern humanity is increasingly dependent on computer for various day-to-day activities. Computers do us a whole lot of good things, but it is not without some pitfalls. With the extensive use of internet for hundreds of our needs, computer opens a vicious cycle of hackers. Computer hacking is a term which refers to an individual’s illegal and unauthorized access to the data which are stored in a user’s system. This is done to disturb the confidentiality and security of the user’s computer.

    Full Version


    The hackers focus on individuals’ computer system when they are online. As long as you are not connected to internet you are less prone to hacking. The access to internet has actually made computer hacking easy. You must protect your computer with strong antivirus and firewall programs to keep hackers away. Hackers are known for creating problems which are difficult to solve. This gives a good business to computer investigators and technicians. Hacking can be done in lots of ways. Few of them are given below:
    • Worms: These are the programs which propagate through networks.
    • Trojans: These are hidden in websites, attached files and emails.
    • Viruses: These attach themselves to various kinds of files. They can damage certain functions of your computer.
    Hackers also crash on wireless networks which do not have firewall installed and enabled. They can also send email attachments with malicious software which get embedded on the victim’s computer. Hackers attack accounts which have weak passwords. All these are done to get access to confidential and sensitive information of the users. Whatever is the method of hacking, the effect is harmful for the user. Your system will be flooded with viruses, malwares which steal your information. In order to avoid hacking one has to make sure that the systems at home or office have the latest anti-virus program and firewall installed and enabled. These programs need to be regularly updated. Use the latest browser and scan your computer on a regular basis.

    New Age...

    The New Age of internet has brought with it many risk factors along with umpteen advantages. The New Age is the time where our personal lives are no longer very personal, but people are able to access personal information of internet users from various sources in the virtual world. We need to be careful about usernames and passwords, else it will lead to dangerous consequences. Universities, large companies and government agencies are mostly targeted by hackers simply because of the bulk of information they handle. The great newspapers like The Wall Street Journal and The New York Times were also targeted by hackers.

    Computer hackers are people who gain remote access to information stored in a system elsewhere. During the 1950s and 60s hackers were more drawn towards learning the operations of a computer rather than stealing confidential information of a remote user. Unlike the olden days, now computer hacking has become more sophisticated and organized. In the late 1990s hackers tried to get access to files in the network of Pentagon. Some more expert hackers gained access to the patent files at the Indiana University School of Medicine in February 2003. Many hackers were sentenced in the history since hacking represents a potential national security threat.

    Viruses

    One major tool hackers use to steal information from computer systems is the use of viruses. Over the years the number of viruses has increased drastically. The virtual world now has above 100000 viruses and the number grows virtually every day. Apart from the threat the computer hackers pose, they also can be beneficial in one way. They can bring to light the flaws in a computer network. Hackers can help in redesigning the system and in making information inaccessible to illegal users and to unauthorized access.

    Getting Administrative Access

    Getting a log in password is one of the predominant ways to get access to a computer which is by the side of the hacker. Getting remote access to a computer is another way to hack a system. Managing to crack a Wi-Fi password is the third method of sneaking into someone else’s system. Hacking if done on a public or school computer will have serious consequences. The hacker will be put behind the bars for illegally accessing the computer which does not belong to him or her.
    ALSO LIKE ON FACEBOOK PAGE FOR DAILY UPDATE                                                                  https://www.facebook.com/hackingandtips  
    Read more...

    Tuesday, 17 March 2015

    0

    The SSL Certificate and Your Website’s Security

  • Tuesday, 17 March 2015
  • PRABH KARAN SINGH
  • The SSL Certificate and Your Website’s Security

     
    When you are surfing the internet, a lot of information is being exchanged between the web host and the device being used to surf the internet. This type of information can always be easily breached by hackers, especially if it involves online transactions and this has always been a major issue when dealing with the internet. Nowadays, cases of online theft are becoming increasingly popular. There is one way of determining whether a site is safe to use through an SSL Certificate which is powered by the beauty of cryptography.

    How SSL Cryptography Works?

    Cryptography ensures that data is transmitted in a means that only the intended party can access it. You can easily determine a site which has an SSL certificate by the padlock icon that is displayed beside the web address. So how do SSL certificates work? SSL in full is Secure Sockets Layer. An SSL certificate provides tight security during the exchange of data.
    PadLock Icon Showing SSL Security
    In SSL cryptography, encryption makes use of separate keys for the decryption and encryption of data. Encryption keys are public and anyone can use them. But the decryption keys (ones used to turn encrypted data into meaningful information) are private and are kept secret. The SSL certificate, on the other hand, can simply be described as a tiny data file that has the appropriate information about a certain website. The information can be quickly read by the host connection once the request for connection is received. It is through an SSL that a website can prove its authenticity to a web browser.

    How To Get SSL Certificate?

    ssl certificate
    An SSL certificate is not handed out like a college certificate. There are a number of companies called Certificate Authorities (CA)that authenticate that a site/server is legitimate and sign a resultant digital certificate which is then stored, just like a cookie is stored on your browser. The certificate will continuously alert all incoming connections and protocols that the connection is trustworthy.

    SSL Certificate Advantages

    SSL Certificate benefiets
    SSL certificates make online data-exchange, especially financial transactions, safer. It is a common rule of thumb not to trust any e-commerce site that does not have an SSL certificate. There is just too much information floating around online nowadays such as credit card info, banking information etc. The safety of all these vital information will be ensured by the SSL certificate, and every browser will accept the websites incoming connections. However, most small websites, such as blogs, don’t really need to supply an SSL certificate.


    ALSO LIKE ON FACEBOOK PAGE FOR DAILY UPDATE                                                                       https://www.facebook.com/hackingandtips  



    Steps to remove or detect keylogger from your computer - See more at: http://www.besthacking.in/2015/01/how-to-detect-keylogger-and-remove-it.html#sthash.e6CPW8NV.dpuf
    Steps to remove or detect keylogger from your computer - See more at: http://www.besthacking.in/2015/01/how-to-detect-keylogger-and-remove-it.html#sthash.e6CPW8NV.dpuf
    Steps to remove or detect keylogger from your computer - See more at: http://www.besthacking.in/2015/01/how-to-detect-keylogger-and-remove-it.html#sthash.e6CPW8NV.dpuf
    Steps to remove or detect keylogger from your computer - See more at: http://www.besthacking.in/2015/01/how-to-detect-keylogger-and-remove-it.html#sthash.e6CPW8NV.dpuf
    Steps to remove or detect keylogger from your computer - See more at: http://www.besthacking.in/2015/01/how-to-detect-keylogger-and-remove-it.html#sthash.e6CPW8NV.dpuf
    Steps to remove or detect keylogger from your computer - See more at: http://www.besthacking.in/2015/01/how-to-detect-keylogger-and-remove-it.html#sthash.e6CPW8NV.dpuf
    Steps to remove or detect keylogger from your computer - See more at: http://www.besthacking.in/2015/01/how-to-detect-keylogger-and-remove-it.html#sthash.e6CPW8NV.dpuf
    Steps to remove or detect keylogger from your computer
    1. You should trace the behavior of you PC in order to find the common virus symptoms because the keylogger symptoms have much in common with the symptoms of other computer infections. We can refer slow computer performance, new icons on your desktop or in tray, network activity and unexpected pop-ups to these symptoms. Also you can notice that the text that you type can appear with little delay – this is the direct symptom that will help you in keystroke logger detection.
    2. Open Task Manager in order to end the process of the installed keylogger. You should know that not every keylogger can be found in Task Manager. Many of them hide their traces. But you should still check the possibility to end its process:
      • Press CTRL+ALT+DELETE, then select Task Manager in the menu.
      • Select Processes tab, scroll the list. Find the process that is called winlogon.exe. One process with such a name is a normal thing, but if you have 2 processes with the same name, then you have a keylogger.
      • Highlight the second winlogon.exe and click End process (you should end only the second process with such a name)

      If there is just one process with such a name, then you should check all other processes, using the special services that contain information about most of the processes to detect the malicious one. You can use Liutilities, Neuber or any other service that you know. If you are an experienced user, then it will be much easier for you to check the processes, because you will not miss the system process with any malicious.
      If you end the process that belongs to keylogger, then the program is deactivated till the next reboot and the third party will not get your personal information.
    3. You should also look through the list of the installed programs. So, click Start menu, then All programs, try to find there the program that you did not install. Uninstall such programs.
    4. How to detect keylogger? You can also detect this malicious program with the help of Startup list. So, you should follow the instructions:
      • Press Windows+R buttons, then type msconfig in the line and press Enter
      • Select Startup tab and disable all the unknown programs
      • Then restart your computer.

    There are all the manual instructions that will help you to find keylogger on your computer and deactivate it...
    - See more at: http://www.besthacking.in/2015/01/how-to-detect-keylogger-and-remove-it.html#sthash.e6CPW8NV.dpuf
    Steps to remove or detect keylogger from your computer
    1. You should trace the behavior of you PC in order to find the common virus symptoms because the keylogger symptoms have much in common with the symptoms of other computer infections. We can refer slow computer performance, new icons on your desktop or in tray, network activity and unexpected pop-ups to these symptoms. Also you can notice that the text that you type can appear with little delay – this is the direct symptom that will help you in keystroke logger detection.
    2. Open Task Manager in order to end the process of the installed keylogger. You should know that not every keylogger can be found in Task Manager. Many of them hide their traces. But you should still check the possibility to end its process:
      • Press CTRL+ALT+DELETE, then select Task Manager in the menu.
      • Select Processes tab, scroll the list. Find the process that is called winlogon.exe. One process with such a name is a normal thing, but if you have 2 processes with the same name, then you have a keylogger.
      • Highlight the second winlogon.exe and click End process (you should end only the second process with such a name)

      If there is just one process with such a name, then you should check all other processes, using the special services that contain information about most of the processes to detect the malicious one. You can use Liutilities, Neuber or any other service that you know. If you are an experienced user, then it will be much easier for you to check the processes, because you will not miss the system process with any malicious.
      If you end the process that belongs to keylogger, then the program is deactivated till the next reboot and the third party will not get your personal information.
    3. You should also look through the list of the installed programs. So, click Start menu, then All programs, try to find there the program that you did not install. Uninstall such programs.
    4. How to detect keylogger? You can also detect this malicious program with the help of Startup list. So, you should follow the instructions:
      • Press Windows+R buttons, then type msconfig in the line and press Enter
      • Select Startup tab and disable all the unknown programs
      • Then restart your computer.

    There are all the manual instructions that will help you to find keylogger on your computer and deactivate it...
    - See more at: http://www.besthacking.in/2015/01/how-to-detect-keylogger-and-remove-it.html#sthash.e6CPW8NV.dpuf
    Steps to remove or detect keylogger from your computer
    1. You should trace the behavior of you PC in order to find the common virus symptoms because the keylogger symptoms have much in common with the symptoms of other computer infections. We can refer slow computer performance, new icons on your desktop or in tray, network activity and unexpected pop-ups to these symptoms. Also you can notice that the text that you type can appear with little delay – this is the direct symptom that will help you in keystroke logger detection.
    2. Open Task Manager in order to end the process of the installed keylogger. You should know that not every keylogger can be found in Task Manager. Many of them hide their traces. But you should still check the possibility to end its process:
      • Press CTRL+ALT+DELETE, then select Task Manager in the menu.
      • Select Processes tab, scroll the list. Find the process that is called winlogon.exe. One process with such a name is a normal thing, but if you have 2 processes with the same name, then you have a keylogger.
      • Highlight the second winlogon.exe and click End process (you should end only the second process with such a name)

      If there is just one process with such a name, then you should check all other processes, using the special services that contain information about most of the processes to detect the malicious one. You can use Liutilities, Neuber or any other service that you know. If you are an experienced user, then it will be much easier for you to check the processes, because you will not miss the system process with any malicious.
      If you end the process that belongs to keylogger, then the program is deactivated till the next reboot and the third party will not get your personal information.
    3. You should also look through the list of the installed programs. So, click Start menu, then All programs, try to find there the program that you did not install. Uninstall such programs.
    4. How to detect keylogger? You can also detect this malicious program with the help of Startup list. So, you should follow the instructions:
      • Press Windows+R buttons, then type msconfig in the line and press Enter
      • Select Startup tab and disable all the unknown programs
      • Then restart your computer.

    There are all the manual instructions that will help you to find keylogger on your computer and deactivate it...
    - See more at: http://www.besthacking.in/2015/01/how-to-detect-keylogger-and-remove-it.html#sthash.e6CPW8NV.dpuf
    Steps to remove or detect keylogger from your computer
    1. You should trace the behavior of you PC in order to find the common virus symptoms because the keylogger symptoms have much in common with the symptoms of other computer infections. We can refer slow computer performance, new icons on your desktop or in tray, network activity and unexpected pop-ups to these symptoms. Also you can notice that the text that you type can appear with little delay – this is the direct symptom that will help you in keystroke logger detection.
    2. Open Task Manager in order to end the process of the installed keylogger. You should know that not every keylogger can be found in Task Manager. Many of them hide their traces. But you should still check the possibility to end its process:
      • Press CTRL+ALT+DELETE, then select Task Manager in the menu.
      • Select Processes tab, scroll the list. Find the process that is called winlogon.exe. One process with such a name is a normal thing, but if you have 2 processes with the same name, then you have a keylogger.
      • Highlight the second winlogon.exe and click End process (you should end only the second process with such a name)

      If there is just one process with such a name, then you should check all other processes, using the special services that contain information about most of the processes to detect the malicious one. You can use Liutilities, Neuber or any other service that you know. If you are an experienced user, then it will be much easier for you to check the processes, because you will not miss the system process with any malicious.
      If you end the process that belongs to keylogger, then the program is deactivated till the next reboot and the third party will not get your personal information.
    3. You should also look through the list of the installed programs. So, click Start menu, then All programs, try to find there the program that you did not install. Uninstall such programs.
    4. How to detect keylogger? You can also detect this malicious program with the help of Startup list. So, you should follow the instructions:
      • Press Windows+R buttons, then type msconfig in the line and press Enter
      • Select Startup tab and disable all the unknown programs
      • Then restart your computer.

    There are all the manual instructions that will help you to find keylogger on your computer and deactivate it...
    - See more at: http://www.besthacking.in/2015/01/how-to-detect-keylogger-and-remove-it.html#sthash.e6CPW8NV.dpuf
    Steps to remove or detect keylogger from your computer
    1. You should trace the behavior of you PC in order to find the common virus symptoms because the keylogger symptoms have much in common with the symptoms of other computer infections. We can refer slow computer performance, new icons on your desktop or in tray, network activity and unexpected pop-ups to these symptoms. Also you can notice that the text that you type can appear with little delay – this is the direct symptom that will help you in keystroke logger detection.
    2. Open Task Manager in order to end the process of the installed keylogger. You should know that not every keylogger can be found in Task Manager. Many of them hide their traces. But you should still check the possibility to end its process:
      • Press CTRL+ALT+DELETE, then select Task Manager in the menu.
      • Select Processes tab, scroll the list. Find the process that is called winlogon.exe. One process with such a name is a normal thing, but if you have 2 processes with the same name, then you have a keylogger.
      • Highlight the second winlogon.exe and click End process (you should end only the second process with such a name)

      If there is just one process with such a name, then you should check all other processes, using the special services that contain information about most of the processes to detect the malicious one. You can use Liutilities, Neuber or any other service that you know. If you are an experienced user, then it will be much easier for you to check the processes, because you will not miss the system process with any malicious.
      If you end the process that belongs to keylogger, then the program is deactivated till the next reboot and the third party will not get your personal information.
    3. You should also look through the list of the installed programs. So, click Start menu, then All programs, try to find there the program that you did not install. Uninstall such programs.
    4. How to detect keylogger? You can also detect this malicious program with the help of Startup list. So, you should follow the instructions:
      • Press Windows+R buttons, then type msconfig in the line and press Enter
      • Select Startup tab and disable all the unknown programs
      • Then restart your computer.

    There are all the manual instructions that will help you to find keylogger on your computer and deactivate it...
    - See more at: http://www.besthacking.in/2015/01/how-to-detect-keylogger-and-remove-it.html#sthash.e6CPW8NV.dpuf
    Steps to remove or detect keylogger from your computer
    1. You should trace the behavior of you PC in order to find the common virus symptoms because the keylogger symptoms have much in common with the symptoms of other computer infections. We can refer slow computer performance, new icons on your desktop or in tray, network activity and unexpected pop-ups to these symptoms. Also you can notice that the text that you type can appear with little delay – this is the direct symptom that will help you in keystroke logger detection.
    2. Open Task Manager in order to end the process of the installed keylogger. You should know that not every keylogger can be found in Task Manager. Many of them hide their traces. But you should still check the possibility to end its process:
      • Press CTRL+ALT+DELETE, then select Task Manager in the menu.
      • Select Processes tab, scroll the list. Find the process that is called winlogon.exe. One process with such a name is a normal thing, but if you have 2 processes with the same name, then you have a keylogger.
      • Highlight the second winlogon.exe and click End process (you should end only the second process with such a name)

      If there is just one process with such a name, then you should check all other processes, using the special services that contain information about most of the processes to detect the malicious one. You can use Liutilities, Neuber or any other service that you know. If you are an experienced user, then it will be much easier for you to check the processes, because you will not miss the system process with any malicious.
      If you end the process that belongs to keylogger, then the program is deactivated till the next reboot and the third party will not get your personal information.
    3. You should also look through the list of the installed programs. So, click Start menu, then All programs, try to find there the program that you did not install. Uninstall such programs.
    4. How to detect keylogger? You can also detect this malicious program with the help of Startup list. So, you should follow the instructions:
      • Press Windows+R buttons, then type msconfig in the line and press Enter
      • Select Startup tab and disable all the unknown programs
      • Then restart your computer.

    There are all the manual instructions that will help you to find keylogger on your computer and deactivate it...
    - See more at: http://www.besthacking.in/2015/01/how-to-detect-keylogger-and-remove-it.html#sthash.e6CPW8NV.dpuf
    Steps to remove or detect keylogger from your computer
    1. You should trace the behavior of you PC in order to find the common virus symptoms because the keylogger symptoms have much in common with the symptoms of other computer infections. We can refer slow computer performance, new icons on your desktop or in tray, network activity and unexpected pop-ups to these symptoms. Also you can notice that the text that you type can appear with little delay – this is the direct symptom that will help you in keystroke logger detection.
    2. Open Task Manager in order to end the process of the installed keylogger. You should know that not every keylogger can be found in Task Manager. Many of them hide their traces. But you should still check the possibility to end its process:
      • Press CTRL+ALT+DELETE, then select Task Manager in the menu.
      • Select Processes tab, scroll the list. Find the process that is called winlogon.exe. One process with such a name is a normal thing, but if you have 2 processes with the same name, then you have a keylogger.
      • Highlight the second winlogon.exe and click End process (you should end only the second process with such a name)

      If there is just one process with such a name, then you should check all other processes, using the special services that contain information about most of the processes to detect the malicious one. You can use Liutilities, Neuber or any other service that you know. If you are an experienced user, then it will be much easier for you to check the processes, because you will not miss the system process with any malicious.
      If you end the process that belongs to keylogger, then the program is deactivated till the next reboot and the third party will not get your personal information.
    3. You should also look through the list of the installed programs. So, click Start menu, then All programs, try to find there the program that you did not install. Uninstall such programs.
    4. How to detect keylogger? You can also detect this malicious program with the help of Startup list. So, you should follow the instructions:
      • Press Windows+R buttons, then type msconfig in the line and press Enter
      • Select Startup tab and disable all the unknown programs
      • Then restart your computer.

    There are all the manual instructions that will help you to find keylogger on your computer and deactivate it...
    - See more at: http://www.besthacking.in/2015/01/how-to-detect-keylogger-and-remove-it.html#sthash.e6CPW8NV.dpuf
    Steps to remove or detect keylogger from your computer
    1. You should trace the behavior of you PC in order to find the common virus symptoms because the keylogger symptoms have much in common with the symptoms of other computer infections. We can refer slow computer performance, new icons on your desktop or in tray, network activity and unexpected pop-ups to these symptoms. Also you can notice that the text that you type can appear with little delay – this is the direct symptom that will help you in keystroke logger detection.
    2. Open Task Manager in order to end the process of the installed keylogger. You should know that not every keylogger can be found in Task Manager. Many of them hide their traces. But you should still check the possibility to end its process:
      • Press CTRL+ALT+DELETE, then select Task Manager in the menu.
      • Select Processes tab, scroll the list. Find the process that is called winlogon.exe. One process with such a name is a normal thing, but if you have 2 processes with the same name, then you have a keylogger.
      • Highlight the second winlogon.exe and click End process (you should end only the second process with such a name)

      If there is just one process with such a name, then you should check all other processes, using the special services that contain information about most of the processes to detect the malicious one. You can use Liutilities, Neuber or any other service that you know. If you are an experienced user, then it will be much easier for you to check the processes, because you will not miss the system process with any malicious.
      If you end the process that belongs to keylogger, then the program is deactivated till the next reboot and the third party will not get your personal information.
    3. You should also look through the list of the installed programs. So, click Start menu, then All programs, try to find there the program that you did not install. Uninstall such programs.
    4. How to detect keylogger? You can also detect this malicious program with the help of Startup list. So, you should follow the instructions:
      • Press Windows+R buttons, then type msconfig in the line and press Enter
      • Select Startup tab and disable all the unknown programs
      • Then restart your computer.

    There are all the manual instructions that will help you to find keylogger on your computer and deactivate it...
    - See more at: http://www.besthacking.in/2015/01/how-to-detect-keylogger-and-remove-it.html#sthash.e6CPW8NV.dpuf
    Steps to remove or detect keylogger from your computer
    1. You should trace the behavior of you PC in order to find the common virus symptoms because the keylogger symptoms have much in common with the symptoms of other computer infections. We can refer slow computer performance, new icons on your desktop or in tray, network activity and unexpected pop-ups to these symptoms. Also you can notice that the text that you type can appear with little delay – this is the direct symptom that will help you in keystroke logger detection.
    2. Open Task Manager in order to end the process of the installed keylogger. You should know that not every keylogger can be found in Task Manager. Many of them hide their traces. But you should still check the possibility to end its process:
      • Press CTRL+ALT+DELETE, then select Task Manager in the menu.
      • Select Processes tab, scroll the list. Find the process that is called winlogon.exe. One process with such a name is a normal thing, but if you have 2 processes with the same name, then you have a keylogger.
      • Highlight the second winlogon.exe and click End process (you should end only the second process with such a name)

      If there is just one process with such a name, then you should check all other processes, using the special services that contain information about most of the processes to detect the malicious one. You can use Liutilities, Neuber or any other service that you know. If you are an experienced user, then it will be much easier for you to check the processes, because you will not miss the system process with any malicious.
      If you end the process that belongs to keylogger, then the program is deactivated till the next reboot and the third party will not get your personal information.
    3. You should also look through the list of the installed programs. So, click Start menu, then All programs, try to find there the program that you did not install. Uninstall such programs.
    4. How to detect keylogger? You can also detect this malicious program with the help of Startup list. So, you should follow the instructions:
      • Press Windows+R buttons, then type msconfig in the line and press Enter
      • Select Startup tab and disable all the unknown programs
      • Then restart your computer.

    There are all the manual instructions that will help you to find keylogger on your computer and deactivate it...
    - See more at: http://www.besthacking.in/2015/01/how-to-detect-keylogger-and-remove-it.html#sthash.e6CPW8NV.dpuf
    Steps to remove or detect keylogger from your computer
    1. You should trace the behavior of you PC in order to find the common virus symptoms because the keylogger symptoms have much in common with the symptoms of other computer infections. We can refer slow computer performance, new icons on your desktop or in tray, network activity and unexpected pop-ups to these symptoms. Also you can notice that the text that you type can appear with little delay – this is the direct symptom that will help you in keystroke logger detection.
    2. Open Task Manager in order to end the process of the installed keylogger. You should know that not every keylogger can be found in Task Manager. Many of them hide their traces. But you should still check the possibility to end its process:
      • Press CTRL+ALT+DELETE, then select Task Manager in the menu.
      • Select Processes tab, scroll the list. Find the process that is called winlogon.exe. One process with such a name is a normal thing, but if you have 2 processes with the same name, then you have a keylogger.
      • Highlight the second winlogon.exe and click End process (you should end only the second process with such a name)

      If there is just one process with such a name, then you should check all other processes, using the special services that contain information about most of the processes to detect the malicious one. You can use Liutilities, Neuber or any other service that you know. If you are an experienced user, then it will be much easier for you to check the processes, because you will not miss the system process with any malicious.
      If you end the process that belongs to keylogger, then the program is deactivated till the next reboot and the third party will not get your personal information.
    3. You should also look through the list of the installed programs. So, click Start menu, then All programs, try to find there the program that you did not install. Uninstall such programs.
    4. How to detect keylogger? You can also detect this malicious program with the help of Startup list. So, you should follow the instructions:
      • Press Windows+R buttons, then type msconfig in the line and press Enter
      • Select Startup tab and disable all the unknown programs
      • Then restart your computer.

    There are all the manual instructions that will help you to find keylogger on your computer and deactivate it...
    - See more at: http://www.besthacking.in/2015/01/how-to-detect-keylogger-and-remove-it.html#sthash.e6CPW8NV.dpuf
    Steps to remove or detect keylogger from your computer
    1. You should trace the behavior of you PC in order to find the common virus symptoms because the keylogger symptoms have much in common with the symptoms of other computer infections. We can refer slow computer performance, new icons on your desktop or in tray, network activity and unexpected pop-ups to these symptoms. Also you can notice that the text that you type can appear with little delay – this is the direct symptom that will help you in keystroke logger detection.
    2. Open Task Manager in order to end the process of the installed keylogger. You should know that not every keylogger can be found in Task Manager. Many of them hide their traces. But you should still check the possibility to end its process:
      • Press CTRL+ALT+DELETE, then select Task Manager in the menu.
      • Select Processes tab, scroll the list. Find the process that is called winlogon.exe. One process with such a name is a normal thing, but if you have 2 processes with the same name, then you have a keylogger.
      • Highlight the second winlogon.exe and click End process (you should end only the second process with such a name)

      If there is just one process with such a name, then you should check all other processes, using the special services that contain information about most of the processes to detect the malicious one. You can use Liutilities, Neuber or any other service that you know. If you are an experienced user, then it will be much easier for you to check the processes, because you will not miss the system process with any malicious.
      If you end the process that belongs to keylogger, then the program is deactivated till the next reboot and the third party will not get your personal information.
    3. You should also look through the list of the installed programs. So, click Start menu, then All programs, try to find there the program that you did not install. Uninstall such programs.
    4. How to detect keylogger? You can also detect this malicious program with the help of Startup list. So, you should follow the instructions:
      • Press Windows+R buttons, then type msconfig in the line and press Enter
      • Select Startup tab and disable all the unknown programs
      • Then restart your computer.

    There are all the manual instructions that will help you to find keylogger on your computer and deactivate it...
    - See more at: http://www.besthacking.in/2015/01/how-to-detect-keylogger-and-remove-it.html#sthash.e6CPW8NV.dpuf
    Read more...

    Saturday, 14 March 2015

    0

    Android 5.0 Lollipop tips and tricks: Get to grips with a new Android

  • Saturday, 14 March 2015
  • PRABH KARAN SINGH



  • Android 5.0 Lollipop brings a range of changes to Google's OS. Available initially on the Nexus 9 and Nexus 6, but now rolling out to a wider collection of devices, there's plenty of new features to get to grips with.
    If you're feeling a little lost, or don't know where to find something, our Android 5.0 tips and tricks will get you started. We've even broken it down into sections to make it easier to find what you're looking for.
    Have fun exploring and be sure to let us know any hot tips of your own in the comments below. We will be adding to this list as we see more Android 5.0 Lollipop devices - but bear in mind that manufacturers like HTC and Samsung will change how Lollipop behaves on their devices.

    Android 5.0 general tips and tricks

    Play Flappy Android: Lollipop's Easter Egg is an Android take on Flappy Bird. Head into Settings > About phone/tablet > Android version. Then tap the Android version repeatedly until it changes to the Lollipop screen. Once you have the full Lollipop wording visible, press and hold. You'll flip into the Flappy Android game. Enjoy!
    Tap to wake: Don't reach for the power button, just double tap the display and it will wake up, so long as your device has the hardware to support it.
    Search settings: Rather than rooting through everything, you can search the settings. Just open up the Settings menu and hit the magnifying glass and type what you're looking for.
    Stop adding new app icons to homescreen: If you don't want new apps you install cluttering up your homescreen, head into Play Store > Settings and uncheck the box.
    Add Yahoo! Mail to Gmail: You can add Yahoo! or other mail services to Gmail. Tap the icon to open the sidebar, scroll all the way to the bottom and hit Settings > Add account. You have the option for Google, IMAP/POP3 services (like Yahoo, Outlook.com) and Exchange.
    Attach anything to Gmail: It's not new, but tap the attachment button and you can attach local files, things in Drive, Photos, Dropbox files, OneDrive box and so on. It's really flexible.
    Limit Drive-enabled apps to Wi-Fi sync only: To save yourself a data bill, head into the Google Settings app > Drive-enabled apps and turn on Wi-Fi only. Alternatively, if you need it to sync on a cellular connection, switch it off!
    Customise Google Now: Tap the settings icon that appears in the search bar. Here you can select the content you want to see, as well as change the settings, or place reminders.
    Set a metered Wi-Fi network: Head into Settings > Data usage and select Network restrictions from the menu. Here you can set a Wi-Fi as metered, so it will restrict background data and give warnings for large downloads, perfect for tethering or Mi-Fi hotspots.
    Turn off backgrounds in Calendar: Don't like the seasonal backdrop in your new calendar? Head into Settings and tap the slider to turn it off.
    Turn on 5.1 surround sound: Play Movies now supports 5.1 soundtracks. Head into Settings > Enable Surround Sound. There's even a demo clip so you can test it.

    Android 5.0 notifications tips and tricks

    Instant access to lock screen notifications: Just tap a notification twice and it will open up the app. Want to dismiss it? Just swipe it away.
    Pinch to expand: Got a stack of notifications? You can pinch to expand them, both on the lockscreen and in the notifications area.
    Hide sensitive information in lock screen notifications: You can have lockscreen notifications without to much information being revealed. Head to Settings > Sound & notification > App notifications, to manage apps with sensitive information.
    Then go to Settings > Sound & notification > When device is locked, to change the information revealed. This will then ensure that all apps you've marked up don't give anything away.
    To mark an app as a Priority app: Head into Settings > Sound & notification > App notifications and you can set and app as a priority so you always get notifications from that app.
    To turn off notifications on an app: Go to Settings > Sound & notification > App notifications. Here you can block all notifications for any app on your device.
    Silence notifications: Hit the volume button and then hit None, Priority or All. If you select Priority, only your Priority notifications will be served up.
    Suspend notifications: Hit the volume button, select None, then either Indefinitely, or select a time period - ideal to keep your device silent during meetings. You can also opt here to only have Priority notifications for a time period, before reverting back to all notifications.
    Quickly switch to vibrate alerts: If you want silence, but are after vibration alerts still, then push the volume button and tap the bell on the pop-up. This will switch to vibrate.

    Quick Settings tips

    Quickly select a WI-Fi network: Swipe down for Quick Settings, then click the network name beneath the WI-Fi icon. This takes you through to the WI-Fi settings.
    Quickly manage Bluetooth: The same applies to Bluetooth. Click beneath the Bluetooth icon in Quick Settings and you'll head into settings to select your device.
    Turn on flashlight: There's no need for a separate app, just tap the button in Quick Settings to turn on your flash as a torch.
    Cast your screen: Want your Android device on your TV? Just swipe down and tap Cast screen and it will be sent to your Chromecast. Not all apps are supported though.

    Android 5.0 battery tips and tricks

    See your battery percentage: Open Quick Settings with a two-finger swipe. Your battery percentage is displayed here.
    Time till fully charged: Charge time is displayed when connected to a charger. Look at the bottom of the lock screen and in the battery status screen, but it takes a little while for Android to calculate how long charging will take.
    See what's eating battery: Swipe down Quick Settings, tap the battery icon. You'll go to the battery status page and see how long you have left and what apps are eating your battery.
    Turn on power saver: In the battery status page, tap the menu button, select power saver. You can elect to have to automatically switch on at 15 per cent or 5 per cent battery. The system bars turn orange when it is on.

    Multiple user tips

    Limit what users can see: Create a restricted profile by tapping Settings > Users > Restricted profile. You can then limit what your children can access, for example.
    Guest profile: In the same area (Settings > Users) you can create a Guest profile. While it is setup, you'll get the option to access as a guest from the lock screen.
    See how much storage they're using: If you want to know how much space is being used up by another profile, head into Settings > Storage. At the bottom of the list it says how much other profile and the guest is using.

    Security

    Instant lock: In Settings > Security there's the option to lock the device as soon as the screen goes to sleep. You'll find the option to lock as soon as you press the power button too. These are old settings, but really useful.
    Face unlock: Head to Settings > Security > Smart Lock. Here you can have the device register your face, so it will unlock when you look at it. This is in addition to a pattern or password. If it fails to recognise your face, you'll have to enter your password.
    Bluetooth unlock: Again in Security > Smart Lock, you have the option to nominate trusted devices, so your Android will unlock when connected to something else. You can nominate Bluetooth devices (like your smartwatch or car Bluetooth) or select an NFC tag.

     ALSO LIKE ON FACEBOOK PAGE FOR DAILY UPDATE                                                                  https://www.facebook.com/hackingandtips  
    Read more...
    0

    WE ARE BACK

  • PRABH KARAN SINGH
  •                                           
                                             WE ARE BACK WITH NEW TIPS AND TRICKS 
     
    ALSO LIKE ON FACEBOOK PAGE FOR DAILY UPDATE                                                                   https://www.facebook.com/hackingandtips 


    Read more...

    Friday, 11 April 2014

    0

    Protect Your Data From Heart Bleed Bug

  • Friday, 11 April 2014
  • PRABH KARAN SINGH
  • Protect Your Data From Heart Bleed Bug

    It's been a while since there was a computer security bug we all had to worry about.
    Unfortunately, it seems like we may all have been facing one for two years and not even realized it.

    The day before yesterday, security researchers announced a security flaw in OpenSSL, a popular data encryption standard, that gives hackers who know about it the ability to extract massive amount of data from the services that we use every day and assume are mostly secure.
    This isn't simply a bug in some app that can quickly be updated - the vulnerability is in on the machines that power services that transmit secure information, like Facebook and Gmail.

    We've put together the following guide to the "Heartbleed bug" for those who want to understand what all the fuss is about and how they can protect themselves.

    What is the Heartbleed bug?

    Heartbleed is a flaw in OpenSSL, the open-source encryption standard used by the majority of sites on the web that need to transmit data users want to keep secure. It basically gives you a "secure line" when you're sending an email or chatting on IM.
    Encryption works by making it so that data being sent looks like nonsense to anyone but the the intended recipient.

    Occasionally, one computer might want to check that there's still a computer at the end of its secure connection, so it will send out what's known as a "heartbeat," a small packet of data that asks for a response.
    Due to a programming error in the implementation of OpenSSL, the researchers found that it was possible to send a well-disguised packet of data that looked like one of these heartbeats to trick the computer at the other end of a connection into sending over data stored in its memory.

    The flaw was first reported to the team behind OpenSSL by Google Security researcher Neel Mehta, and independently found by security firm Codenomicon. According to the researchers who discovered the flaw, the code has been in OpenSSL for approximately two years, and utilizing it doesn't leave a trace.

    How bad is that?

    It's really bad. Web servers can keep a lot of information in their active memory, including user names, passwords, and even the content that user have uploaded to a service. According to Vox.com's Timothy Lee, even credit card numbers could be pulled out of the data sitting in memory on the servers that power some services.
    But worse even than that, the flaw has made it possible for hackers to steal encryption keys, the codes used to turn gibberish encrypted data into readable information.

    With encryption keys, hackers can intercept encrypted data moving to and from a site's servers and read it without establishing a secure connection. This means that unless the companies running vulnerable servers change their keys, even future traffic will be susceptible.

    Am I affected?

    Probably, though again, this isn't simply an issue on your computer or phone itself - it's in the software that powers the services you use. Security firm Codenomicon reports:

    You are likely to be affected either directly or indirectly. OpenSSL is the most popular open source cryptographic library and TLS (transport layer security) implementation used to encrypt traffic on the Internet. Your popular social site, your company's site, commercial site, hobby site, sites you install software from or even sites run by your government might be using vulnerable OpenSSL.

    According to a recent Netcraft web server survey that looked at nearly 959,000,000 web sites, 66% of sites are powered by technology built around SSL, and that doesn't include email services, chat services, and a wide number of apps available on every platform.

    So what can I do to protect myself?

    Since the vulnerability has been in OpenSSL for approximately two years and utilizing it leaves no trace, assume that your accounts may be compromised. You should change passwords immediately, especially for services where privacy or security are major concerns.

    Meanwhile, the researchers who discovered the flaw let the developers behind OpenSSL know several days before announcing the vulnerability, so it was fixed before word got out yesterday. Most major service providers should already be updating their sites, so the bug will be less prevalent over coming weeks.

    Read more...