Search My Blog

Tuesday, May 28, 2013

Where do Computer Viruses Come From?



It seems like over half the time I am called out on a client site to remove a virus from someone's computer, I get asked the universal question, "Where do viruses come from?"  Or "Why do viruses even exist?"  I'll explain what I tell them.

Viruses don't occur in cyber space naturally like biological viruses do, of course.  A programmer has to create them.  So, we are at fault for all of the headaches we deal with when trying to prevent or remove viruses infected on our systems.  So why do we do it?  Or maybe I should say, "Why do THEY do it."  Here are a few reasons why:

-  Identity Theft/Restricted Data Theft

-  Bragging Rights

-  To Gain Remote Control of Your PC

-  To damage organizations or competing business entities

I'll explain a bit more in detail.

Identity Theft/Restricted Data Theft

How to Protect Yourself From Getting Hacked??

 



After writing somethings about hacking, i was thinking to let the innocent people know about hacking and how hackers perform their hacking operation to get your accounts. So that you can protect yourself from getting hacked!!!!!!


I am giving here tips that ' what you should not to do' with explanation that ' why not to do'.




Tip 1. Use strong passwords: 
  • Always use passwords that hard to guess (mix of digits + letters in upper case and lower case both) for your all accounts. the longer your password, the better.
  •  never use any common word, your name, spouse, parents, birthdate etc.

Explanation 1:
  • Week passwords and be easily  hacked using a brute force method which do combination of numbers and letters until the real password comes.
  • Common passwords containing name, birthdate can be easily guessed by your friends, any known to you.



Best Operating systems Of 2013


-->

 Operating system in simple language, is a program that helps you to communicate and use your computers Hardware in whichever way you want.

Operating system has a collection of software's that manages computer hardware. Operating system performs the vital tasks such as inputting text from user, displaying something on output screen . In this Technological world , we have less time & we need better performances . On the basis of this criterion , we have provided the list of best operating system of year 2013.
There are various types of operating system like Microsoft's Windows , Linux Distros , Apple Macintosh & Various other operating systems.

We have tested all of the operating system on our machine & concluded following rankings of the various operating systems .

Thursday, May 23, 2013

Different ways to hack Facebook!

-->





1. Facebook Phishing Attack:



I am explaining this method first because its the most easiest and also the most popular method for hacking Facebook password. You can also search on Google the various famous Facebook hacking methods and you will find Phishing technique on the top always. And I am explaining the methods according to their popularity.



Now you want to know which is my favorite method for Hacking Facebook account passwords and i will undoubtedly tell its simply phishing 

What Is Phishing???

Phishing is the most widely used hacking method for hacking Facebook passwords. The most widely used technique in phishing is the use of Fake Login Pages, also known as spoofed pages. These fake login pages resemble the original login pages of sites likeYahoo , Gmail, MySpace etc. The victim is fooled to believe the fake facebook page to be the real one and enter his/her password. But once the user attempts to login through these pages, his/her facebook login details are stolen away. However phishing requires specialized knowledge and high level skills to implement. So I recommend the use of Phishing to hack facebook account since it is the easiest one.









Here is a tutorial about phishing.>>



Step 1) 

First you must sign for a free webhosting service like www.byethost.com or www.t35.com  or www.000webhost.com  And register your subdomain.

after signing you will have a subdomain like www.yourname.byethost.com



Step 2) 

Now login to your account go to "control panel" then in site management option go to "online file manager" and open the folder "htdocs".



Step 3) 

Now Click Here to DOWNLOAD THIS FILE to your computer add extract the file. Inside the folder you will find three files index.php and hello.php and login_again.htm.



Step 4) 

Now replace the index.php file in the "htdocs" of the "online file manager" with the file index.php of the phisher folder in your computer and also upload hello.php and login_again.htm files in "htdocs" thats it! you are done.



Step 5) 

Now your homepage www.yourname.byethost.com has become a phisher. open it, you will see that your page www.yourname.byethost.com has become the login page of the site you want to hack.now all you have to do is send this link to the person whose account you want to hack.when he tries to login through it you will receive a file password.html in your "htdocs" folder of your phpnet.us account which contains the username and password of your victim.



Step 6)

Go to http://www.yourname.byethost.com/lol.htm for see the stored passwords !


Personal Note:- The attacker must have a very good convincing power to hack the facebook password with this method. Please try this method carefully as now it is widely known and the target may soon guess the attacker's intentions. The target may report the fake site and you may get in trouble.


The facebook not allow to share your fake facebooksite on facebook. You can use Domain hiding system to share your fake facebook site. (Eg: http://www.dot.tk/)

2. Hacking Facebook account password remotely using Keyloggers and RAT's:



Best method for advanced Hackers and my second favorite too. Its popularity is little but lower than Phishing only because it involves you to download hack tool and then create your keylogger and send it to victim which is a lengthy process and also unsecured too as you don't aware that the keylogger that you downloading is himself contain some spyware or simply a keylogger attached with it. Keylogging becomes more easy if you have physical access to victim computer as only thing you have to do is install a keylogger and direct it to your destination so that it will send all recorded keystrokes to pointed destination. What a keylogger does is it records the keystrokes into a log file and then you can use these logs to get required Facebook password and thus can hack Facebook password. 



3. Hacking the Primary Email address: 



If Facebook hacker or any specific Keylogger, by some means, hacks your primary Gmail or yahoo account which you are using as primary email address, then this information account can easily hack your Facebook password using "Forgot password" trick. The Hacker will simply ask Facebook to send password to the primary email address and ask Facebook administrators to send the reset email to your primary email address- which is already hacked. Thus, your Facebook account password will be reset and it will also be hacked. 

So, always remember to protect your primary email address that you have used to create Facebook account and try to keep unknown or useless mail id as your primary email address in Facebook.



4. Social Engineering or Guessing Passwords:



A social engineering attack is one in which the intended victim is somehow tricked into doing the attacker's bidding. An example would be responding to a phishing email, following the link and entering your banking credentials on a fraudulent website. The stolen credentials are then used for everything from finance fraud to outright identity theft. An old adage comes to mind here, "it pays to be suspicious". With socially engineered attacks, the opposite is also true - if you aren't suspicious, you likely will end up paying. In addition to phishing, social engineering attacks can come in many forms - email that masquerades as breaking news alerts, or greeting cards, or announcements of bogus lottery winnings. Pump and dump stock scams are also a form of social engineering, playing on the recipients' natural desire to take advantage of a good deal. It's important to remember that if something sounds too good to be true, it's probably a scam. Social engineering attacks are also often used to trick users into infecting their own systems - for example, by disguising the malware as a video codec or Flash update. An email is sent enticing the recipient to view a bogus video clip, the victim visits the link contained in the email and installs the "codec/update" which turns out to be a backdoor Trojan or keystroke logger.



Remember: with social engineering scams, the attacker is relying on you to make the wrong choice. Choose not to be a victim.



Some Common passwords that you can try on your friends are : 



1. Their mobile number or their girlfriend or boyfriend mobile number. 

 (always try his previous or old mobile number as they are not as much as fool that they appears)

2. Their Girlfriend or boyfriend names or their own names concatenating with their Girlfriend or boyfriend names.

3. Date of births

4. Their favorite movie names , cartoon character names or favorite music band names or simply the hero names like batman,dark knight, Superman,Godzilla, Spartacus and much more..

5. Most important now most website ask that password should be alphanumeric now what users do they just adds 1,2,3 in their normal passwords and some more smart guys adds !,@,# in their passwords and amazingly all in Sequence.


back to top