COMPUTER

Friday, July 25, 2014

SOME OF THE GOOGLE TRICKS

GOOGLE TRICKS :

GOOGLE SEARCH IN CHINA :


GOGLOGO :
Ever wanted your own google search page or google style logo.
Check above link.

MORDOR DIRECTIONS USING GOOGLE MAPS :
Now all LORDS OF RING fans can go to mordor from shire using google maps.
Check above link.

GOOGLE SPHERE :
The earth isn’t flat, so why does Google have to be? Google Sphere takes care of that for you. Instead of boring and even image search page, Google Sphere turns it into an interactive spinning orb.

GOOGLE SPACE :
From earth to the space, Google has got you covered. From the same team that brought us Google Sphere, Google Space is another interactive search page that mimics anti-gravity force, much like the exact opposite of Google Gravity.

GOOGLE GUITAR :
Now play guitar on google logo.

GOOGLE PACMAN :
For Pacman fans.

ONCE IN A BLUE :
shows a mathematical equation.

Sunday, July 20, 2014

PHISHING - a method of hacking email & other logins.

PHISHING :
Phishing is one of the type of hacking . It is a method of acquiring sensitive information such as username, password, bank information etc. Phishing page could be safe as an duplicate page of real one. It looks exactly similar as the real page.But when user enter sensitive information on such phishing page his information is send to the E-mail address provided in the phishing page or you can say the one who created that phishing page. Phishing page is mostly send via mail. Target of phishing are mostly social networking sites like facebook etc. Also Banks website to acquire credit card details,website like yahoo, gmail are also target of phishing.

Eg:
  • Email asking you to login to your locked account to unlock it.
  • Email carrying a Link to sites like Facebook,yahoo etc and asking you to Login.
  • Emails containing some Information of your Interest and asking you to Login to Your Account.
Above Image is a Eg of a Phishing Facebook Login Page.


 Precautions :
  • Never login to any of your account through link provided in the Email.
  • Go to real website don't click on any link posted anywhere. such as link posted on your facebook wall by friend or link provided in comments or link to certain website on any blog.
  • Check the URL of website before entering any sensitive information. Because the URL of phishing page is not same as the URL of  real one.
  • Real gmail page looks like gmail.com while phishing looks different something like gmail.anything.com
Tools for PHISHING :

1.  SpearPhisher 
2. PHISHER CREATOR

Thursday, July 17, 2014

KEYLOGGERS - A email hacking method

Keyloggers :

Keylogger is a software program or hardware device that is used to monitor and log each of the keys a user types into a computer keyboard. The user who installed the program or hardware device can then view all keys typed in by that user. Because these programs and hardware devices monitor the keys typed in a user can easily find user passwords and other information a user may not wish others to know about.
Keyloggers, as a surveillance tool, are often used by employers to ensure employees use work computers for business purposes only. Unfortunately, keyloggers can also be embedded in spyware allowing your information to be transmitted to an unknown third party.

  
About keyloggers
key loggersA keylogger is a program that runs in the background, recording all the keystrokes. Once keystrokes are logged, they are hidden in the machine for later retrieval, or shipped raw to the attacker. The attacker then peruses them carefully in the hopes of either finding passwords, or possibly other useful information that could be used to compromise the system or be used in a social engineering attack. For example, a keylogger will reveal the contents of all e-mail composed by the user. Keylogger is commonly included in rootkits.

A keylogger normally consists of two files: a DLL which does all the work and an EXE which loads the DLL and sets the hook. Therefore when you deploy the hooker on a system, two such files must be present in the same directory.

There are other approaches to capturing info about what you are doing.

    * Some keyloggers capture screens, rather than keystrokes.
    * Other keyloggers will secretly turn on video or audio recorders, and transmit what they capture over your internet connection.

A keyloggers might be as simple as an exe and a dll that are placed on a machine and invoked at boot via an entry in the registry. Or a keyloggers could be which boasts these features:

    * Stealth: invisible in process list
    * Includes kernel keylogger driver that captures keystrokes even when user is logged off (Windows 2000 / XP)
    * ProBot program files and registry entries are hidden (Windows 2000 / XP)
    * Includes Remote Deployment wizard
    * Active window titles and process names logging
    * Keystroke / password logging
    * Regional keyboard support
    * Keylogging in NT console windows
    * Launched applications list
    * Text snapshots of active applications.
    * Visited Internet URL logger
    * Capture HTTP POST data (including logins/passwords)
    * File and Folder creation/removal logging
    * Mouse activities
    * Workstation user and timestamp recording
    * Log file archiving, separate log files for each user
    * Log file secure encryption
    * Password authentication
    * Invisible operation
    * Native GUI session log presentation
    * Easy log file reports with Instant Viewer 2 Web interface
    * HTML and Text log file export
    * Automatic E-mail log file delivery
    * Easy setup & uninstall wizards
    * Support for Windows (R) 95/98/ME and Windows (R) NT/2000/XP

 Tools:   Ardamax Keylogger
 

Get USER info of any Prepaid Reliance No.

Get USER info of any Prepaid Reliance No.

http://myservices.relianceada.com/captureInstantRecharge.do

1. Enter the number of whom u want details..

2. Enter any fake email id.

3. And then click Continue.

And now u will get a screen with the number and customer name.

Wednesday, July 16, 2014

Social Engineering Hacking Method

Social engineering :
Social engineering is process of manipulating someone to trust you and get information from them. For example, if the hacker was trying to get the password of a co-workers or friends computer, he could call him pretending to be from the IT department and simply ask for his login details. Sometime hackers call the victim pretending to be from bank and ask for their credit cards details. Social Engineering can be used to get someone password, to get bank credentials or any personal information.

 Countermeasure:
  If someone tries to get your personal or bank details ask them few questions. Make sure the person calling you is legit. Never ever give your credit card details on phone.

Brute Force Hacking Method ( BruteForce Attack )

BruteForce Attack :


Any password can be cracked using Brute-force attack. Brute-force attacks try every possible combinations of numbers, letters and special characters until the right password is match. Brute-force attacks can take very long time depending upon the complexity of the password. The cracking time is determined by the speed of computer and complexity of the password.

Countermeasure: 
Use long and complex passwords. Try to use combination of upper and lowercase letters along with numbers. Brute-force attack will take hundreds or even thousands of years to crack such complex and long passwords.
Example: Passwords like "iloveu" or "password" can be cracked easily whereas computer will take years to crack passwords like "aN34lL00"

Burn a CD on Windows XP without any software

Requirements: You need to enable the CD-R feature on Windows XP.
  1. Insert a Formated-ReWritable CD or a Recordable (CD-R) disc into the CD drive.
  2. From Desktop, double-click on "My Computer".
  3. Navigate to the files/folders you want to copy to CD. Select them and press "Ctrl-c" to copy.
  4. Browse back to the CD-ROM, and press "Ctrl-V" to paste. The files/folders will show up as temporary files/folders at this time.



  5. On the left panel, select "Write these files to CD".



  6. The window "CD Writing Wizard" appears with the default CD name. Change the CD name if you wish, then click "Next".



  7. The "CD Writing Wizard" starts to write files/folders to the CD:



  8. Once the writing process is complete, the wizard will disappear and the CD-Rom will be ejected.

Hide Files or Folders By Command Prompt

Trick to hide files and folders using Command Prompt

  1. Press windowkey+R: Run command dialog box appears.
  2. Now type "cmd" and hit enter. A command prompt window displays.
  3. Now type "attrib +s +h E:\collegephotos" and hit enter.
  4. The folder "collegephotos" will be hidden (Note: It cannot be viewed by any search options)

    (To view this folder again, use the same command but replace '+' with '-' on both flags 's' and 'h')

Earn Money from Promolta on Your WEBSITE

Earn Money from Promolta on Your WEBSITE :


Earn Money with Music Videos. Get started now!

 The internet is crowded.

A hundred hours of video are uploaded to YouTube every minute. How do you get your video seen by right new fans? That is the problem Promolta solves.

We have a large publisher network, who distribute your video on blogs, websites, and social networks. We dont just get you views, but show your video to the right people who are most likely to buy iTunes downloads, attend your show, follow you on social media and share your music with friends. We don’t have bots or spam but a real person must watch your video more than 30 seconds to count as a view.

With our powerful and easy to use platform, you will know who watch your video, where, how long they watch it, and if they share it with their friends.

Since we only focus on music, it allows us to show your video to the right people and make your campaign a success. We love musicians.


 https://www.promolta.com

Tuesday, July 15, 2014

Hide your IP address using Hide IP

Free Hide IP - The Best Free Privacy Protection Software
Hackers and identity thieves are becoming more and more rampant in today's society. They may break into anyone's computer and monitor one's activity or steal one's identity or other personal information.

To stay safe online, the best way is to keep your IP address from being shown to others.

Key Features

  • Surf Anonymously Online for FREE
    Change your IP address for free when you surf online and others will never know your real IP address.
  • Protect Your Privacy
    Surf anonymously and get protected from websites, hackers or identity thieves that want to monitor your online activities or steal your identity or other personal information.
  • Choose IP Country
    The Choose IP Country option enables you to select one country at your wish from the country list and then you are assigned fake IP addresses from the designated country.
  • Send Anonymous Emails
    Hide your real IP address in email headers and send anonymous emails through any web based mail system (e.g. Gmail, Hotmail).
  • Get Unbanned from Forums and Blocked Websites
    Hide your real IP address with Free Hide IP, which will un-ban you from any forums or other blocked websites that have ever banned you.

How It Works?

smallhowitworks.jpg 


Free Download 
UA-58893942-1