www.sucidehacker.blogspot.com

Showing posts with label tricks. Show all posts
Showing posts with label tricks. Show all posts

Sunday, 8 January 2017

Hacking : Information on proxy servers

Server Proxies : Servers are a basic device in computer networks area and as the name indicate it serve the user in order to access the internet web pages or other functions on the net. The servers are the devices controlling the whole function related to uploading and downloading process. The proxy servers are not the same as those of the servers in normal function .These are the servers or the software that are created to mediate between the user and the actual server to which the request is to be sent. 

proxy servers

The proxy servers are mediatory in function in an internet function. While connecting to internet via a proxy server the user send request to the proxy server then the proxy server initiates the process to connect to the desired site or server to download or connect to the server.

Types of proxies

Proxies implemented in computer networks setting can be of following different types based upon the type of internet service to function in the required way. 
Forward proxy is the type of proxy that takes request from the client and then forward to the required server to which the request is to be given and data is taken. Forward proxies are available from a wide range of sources available. 
Open proxy is the server setting that mediates in such a way that it can be accessed from any where and is open to every body from any where. 
Reverse proxy is the type of proxy server setting that takes the information from the internet and send it to the internal network and the client may not be aware of the proxy present between the net connect. 
In this way the response to client appears to be directly given by the actual server instead of proxy server.

proxy servers

Purposes of proxy servers

The main purpose behind a proxy server setting can be based upon many different requirements that can include following conditions. The server proxies are implemented where there is filtering of data needed. In this condition the proxy server only allows those internet access or access to those internet servers that are made available and others are blocked to be viewed or being accessed. Such a proxy is applied to the internet usage of users in different commercial and non commercial organizations in order to keep a check on the website content. In filtering content proxy server act to block URL by applying URL rejex filtering or DNS black list. 
Another purpose of using a proxy server condition is the caching of the most visited sites. In this a cache proxy is implemented that creates a local copy of the most visited web page and accelerates the process of downloading by simply displaying the page from the local copy and hence saving time and effort to access certain site that is most frequently visited by a user. In some cases the proxy server helps to hide IPs of the user in order to use or access the web anonymously. Such proxy settings are displayed in Tor browsers using onion proxy settings and I2p using Garlic proxy server settings. These two provide the best IP hiding techniques for its users. Performance enhancing proxies are also very much beneficial in which the proxy help to speed up the data download and decreases the packet loss during wireless data transfer.

Detecting Proxy server information

Proxy servers can be detecting by simply tapping into the external IP address and IP addresses shown by the external pages. Proxy settings can be detected by comparing the hop sequence that are reported via a trace route, The proxy detection can also be made by connecting to a site where no server is present. All these ways are some of many that can be used to detect any proxy server presence in the internet route.

How to Increase Traffic and Page Views in Blogger?

Decent amount of traffic to a blog is the dream of every blogger. All hard working and work addicted bloggers do a lot of things to gain massive amount of traffic to their blog because without it, we are not able to success in our blogging career. Here at Hackers Store, I have shared a lot of tips and tricks to increase blog traffic and page views. Today, I’ll provide the compilation of all those methods and ideas so that you can learn about the strategies that work awesomely to maximize the traffic to a blog.
I have divided this post into two sections of Tips and Tricks that really works to increase traffic to blog. Doing so will help you to understand what tips and tricks we can apply to our blog to increase its popularity. Let first start with the tips which are necessary for every blog in any niche.
Tips to Increase Blog Traffic:-

When you first create a blog on blogger, then definitely you search on Google that how to increase traffic to blogger. And this is the most common question asked by newbie bloggers. That's why I published a post so that they can also know the ways that can help them to improve traffic to their blog. I have short listed all those working tips in below post. 
1). Fast Loading Template:-
You must need to make your blog looks professional. Always try to make your blog's look nifty. Visitors first look at the blog design and if they don't like the design then they will never come back. Try to get a fast loading template for your blog. Visitors love to read fast loading blogs.
2). Use Share Buttons:-
Social share buttons really works to get new visitors to your blog. If your readers like your post content then surely they will share it with their friends. This will invite new readers to your blog to read the story. Beside this share buttons also help to increase your blog backlinks and search engines loves these backlinks. It will help your posts to rank in search engines and your traffic will increase.
3). Keyword Research:-
Keyword research is an interesting and enjoyable task. Before publishing any article always do some research on your keywords you are going to use into your post. Choose best keywords for your posts to target the audience. Always use Long Term Keywords (Long Tail Keywords) because they are easy to rank as compare to short term keywords. Google also show accurate result while somebody search for any information if the user query contains more than 5 words. 
4). Blog Commenting:-
This is what I like most to increase blog traffic. Make it your habit to post comments on other popular blogs of same niche regularly. It is the best way to increase your blog readers. If possible then try to leave the first comment with link back to your sites. Because readers also read comments and first comment attract the readers and if your comment is interesting for readers then they will surely click on your link to know about your blog. It will increase your blog readership and hence more traffic to your blog.
Note: Don't put spam comments. First read the post and then leave a valuable comment that add some value to the conversation. Don't comment like 'nice post', 'helpful article' etc. These types of comments not attract the readers.
5). Reply to Comments:-
Reply to your reader's comments. Solve their queries and doubt about the topic you are posting. It will help you to build better relationships with your blog visitors. They will like to visit your blog again and again to get something new. Returning visitors are really important for success of a blog.
Tips to Increase Blog Page Views:-

As same as blog traffic, increasing blog page views is also important. If you are not able to make your blog sticky for your readers then they will leave your blog without reading more posts. For a successful blog, page views are most important to increase. If you are thinking that how we can increase page views of our blog, then there is no need to worry. When you read below post then you will be amazed how easy that is. Don't miss to read it.
1). Show Related Posts:-
Whenever you write new post for your blog, always remember to tag it with a keyword rich label before publishing it. Then use related posts widget to show similar posts under that label below every post. It will not only increase your blog page views but also reduce your blog bounce rate.
2). Highlight Popular Posts:-
Put popular posts widget into blog sidebar to show most trendy posts of your blog. By doing so, you provide one more option to the visitors to click the link. Once they attract towards the popular posts they will surely keen to read them. Hence more blog page views that automatically increase your blog traffic.
3). Deep Linking:-
You may already know the benefits of internal linking and deep linking is same as internal linking but it has some more benefits then it. Suppose you have two posts in your blog Post A and Post B then you can interlink Post A with Post B. But in case of deep linking you need to link Post A with that post which is same with that topic means which covers topic of Post A in depth.
4). Split Lengthy Posts:-
Generating quality content for blog is must for success. You should make a plan to publish at least a post with details and well explanation in a week. For ex: 20 Tips to Increase Blog Traffic. Once you write a lengthy and detailed post, the tricky part comes in action. 

5). Use Search Box:-
If your readers finish reading the article and want more relevant information and don’t get it then surely they will go back to another blog for more information. To resolve this issue always add a search box in your blog like Google Custom Search Box. This is the best widget that shows more relevant posts than other search boxes.

Sunday, 1 January 2017

How to create Strong Passwords?|security Tips

What is your password ? is your password like 123456, 98654,
billgates,yourname,lovername,iloveyou,thankyou?  Then you will definitely  loose your account soon.  The hackers can easily hack your account with much effort.


Your password should be :
  •  
  • Above 10 letters
  • Both uppercase and lowercase letters
  • Should use special characters like '&'.
  • Should contain Numbers
  • Should not Use any names of your lover ,mother,father,etc.
  • Should not be usual words like iloveyou,ihateyou,ihateu.
  • Should not be your birthday like oct2010.


Consider this tips when you create a password. Secure your password.

Sunday, 25 December 2016

Create your own Cookie-logger to hack any account

Well, many of us are aware about phishing and many other different ways of hacking. Here, i am posting an interesting way to hack any. This is basically to aware you people so that you can save your account.

What do you mean by Cookies?

Cookies stores all the necessary Information about one’s account , using this information you can hack anybody’s account and change his password.
If you get the Cookies of the Victim you can Hack any account the Victim is Logged into i.e. you can hack Google, Yahoo, Orkut, Facebook, Flickr etc.

What is a Cookie-logger?

A Cookie-logger is a Script that is Used to Steal anybody’s Cookies and stores it into a Log File from where you can read the Cookies of the Victim.
Today i will show how to create your own cookie logger.
Hope you will enjoy reading this article.

Step 1:

Download the notepad file from the link provided below.


Now open the Downloaded Notepad file and change“http://www.hackers-store.blogspot.com” to your site.
And save it as fun.gif.

Step 2:

Download the Cookielogger.php Script File from the link below

Step 3:

Create a new Notepad File and Save it as logfile.txt

Step 4:

Now Upload all these three files to Your server .(i.e Your PHP Hosting Website ).

cookielogger.php -> http://www.yoursite.com/cookielogger.php

logfile.txt -> http://www.yoursite.com/logfile.txt

fun.gif -> http://www.yoursite.com/fun.gif

If you don’t own any website then you can follow the link below to create your own website for free which has php support.
www.000webhost.com/

Step 5:

Okk Now Your Cookie Stealing Website is ready.

Now Go to the victim forum and insert this code in the signature or a post :

[url=http://www.yoursite.com/fun.gif][img]http://yoursite.com/fun.jpg[/img][/url]

Step 6:

When the victim opens the post, he can see the image but when he clicks on the image he gets Temporary error and you will immediately get his cookie in you logfile.txt.

The Cookie would Look as Follows:
phpbb2mysql_data=a%3A2%3A%7Bs%3A11%3A%22autologinid%22%3Bs%3A0
%3A%22%22%3Bs%3A6%3A%22userid%22%3Bi%3A-1%3B%7D; phpbb2mysql_sid=3ed7bdcb4e9e41737ed6eb41c43a4ec9

Step 7:

To get the access to the Victim’s Account you need to replace your cookies with the Victim’s Cookie. Use COOKIE EDITOR for this. The string before “=” is the name of the cookie and the string after “=” is its value.

So Change the values of the cookies in the cookie Editor.

Step 8:

Now for the same purpose you will need a firefox addon named

Step 9:

ITS DONE..!

now go to the website or account you have just hacked ( i mean you have steal cookies) and You will find that you are logged in as the Victim and now you can change the victim’s account information.

Step 10:

GAME OVER

Note :Make Sure that Victim should be Online because you are actually Hijacking the Victim’s Session ( Also known as Session Highjacking) So if the Victim clicks on Logout you will also Logout automatically but once you have changed the password then you can again login with the new password and the victim would not be able to login.

Disclaimer:I don’t take Responsibility for what you do with this script, served for Educational purpose only.

5 Ways To Prevent Your Facebook Account From Hackers

Facebook is the most popular social networking website which has more than 800million  users, more than 1million photos are updated every week by facebook users. So this is why facebook comes under the red list of hackers. Most of the users don't knows the close connection of entering personal information, like emails, making unknown friends and playing games on facebook. Today I will show you some of the quick steps on how to prevent your facebook account from hackers.




Following are the steps :-

1) Profile Privacy 



Profile Privacy is the first thing, for the protection of your private data like If you choose Customize, you could be more specific. Your Profile Should only be viewed by your friends. Basic Information like email, graduation, job, etc should not be shared by unknowns! Hide your photos too.

2) Search Visibility 

Click Privacy > Search It is when someone searches you on facebook by your name. This option is an important way to get protected your Facebook privacy. It should be to Everyone but don't cross the limits of sharing, share your friend list if you want, Add Friend, Someone message you!

3) Controlling Feed Post & Friend Posts

Our practice and actions in Facebook such as likes, comments, posts appear as friend feed on ALL your friends’ home wall. You can only turn this privacy on or off. Go to Privacy > News Feed and then Wall and choose whether you want your friend or ex-boyfriend/girlfriend to know that you’re in love or not.

4) Facebook Wall Privacy

Go to your profile wall, click Options > Settings under the option box. Here you can change the privacy whether your friends can post status or pictures on your Wall, and who can check the status made by your friends on your wall.

5) Protect Yourself From Unknown Applications


Go to Privacy > Applications, and click the Settings option check all the boxes should be unchecked. These settings share what information about you is visible to games/applications installed by your friends. It could be Facebook Virus, Trojans, Spywares made by your enemy friend. 
These were the all main tips to get safeguarded from hackers, Hope you enjoy it :) Good Luck!

Warning : Hackers Use Facebook Photo Email Notifications for Installing Malware

 
Cybercriminals have been sending new strain of malware via emails to Facebook users, encouraging them to view photos as an attachment. So for all Facebook users who totally rely on email alerts service to know when and what their friends do, are on risk of getting their computers infected with malware.

Scammers are sending out e-mails saying that someone has added a new photo of you to a Facebook album. The spam, which claims to come from the social networking giant, includes an attachment that installs malware on your computer. If you click on that attachment, It will downloads a ZIP file and if you open that ZIP file and click on files which are in that zip file, then that malware will get installed in you computer and it will enables hackers to gain control over Windows-operated PCs.


Facebook hacking


The e-mail subject is typically something along the lines of “Your friend added a new photo with you to the album” (though cybercriminals can easily alter it) and appears to come from an e-mail like “notification+kjdm-dj-hud_@facebookmail.com” (again, this can be changed). The attached file is named “New_Photo_With_You_on_Facebook_PHOTOID[random].zip” where “random” is a generated number.


Facebook hacking


Facebook hacking


Of course, above emails don't really come from Facebook team. Such emails are fake emails designed to trick or fool recipients into opening the attached file which contains a photo / image. But the attachment is not a image, its a malware which can hack you computer and allow hackers to gain control over your Windows computer. This malware was identified by security firm Sohpos as Troj/Agent-XNN.

But there are surely so many peoples in the world who could be duped into believing that they have been tagged by one of their friends in a photograph, and want to see if they look overweight, unattractive or simply fabulous.

So Facebook users should be aware by now that the social media site like facebook twitter never sends the pictures or files posted online as attachments via email. That’s why users are always advised to beware of such notifications.

HOW TO SPOOF YOUR MAC ADDRESS (ANONYMITY) 2016

 
 
 

SPOOFING YOUR MAC ADDRESS (ANONYMITY), how to spoof your mac address, spoofing your mac address,spoof your mac address, change your mac address.

MAC (Media Access Control) is a number that identifies your network adapter or adapters for connecting to the internet. To remain exceptionally anonymous you must change your MAC IP address. By changing your macintosh address you can:
  • Staying Anonymous 
  • Bypass Mac Filters 
  • Mac Authentication 
spoof your mac address, how to spoof your mac address, trick to spoof your mac address, how to change your mac address.

#1 Staying Anonymous :

The first and the chief thing by ridiculing your macintosh location is with the end goal of namelessness. Your macintosh location can be seen by any individual on your neighborhood (LAN) or besides in the event that you are associated with a WiFi system any individual can see your macintosh address by simply running a basic sweep either from windows or Linux. A basic sample of this is to simply utilize the order from Linux as

airodump-ng (mon0 = your wifi interface) 



The BSSID's recorded over allude's to the macintosh addresses for different systems accessible in your reach. By simply running a straightforward sweep we discover the different BSSID's accessible. Programmers may attempted to misuse your system in the event that they figured out your macintosh address and can utilize the web as being "you" That's the reason you have to change your MAC address.

#2 Bypassing MAC Filters :

If you ever need to unite with an open WiFi system with the end goal of staying unknown however things didn't turned out really well, may be the WiFi proprietor is utilizing a MAC channel. Macintosh channel implies just permitting those clients to interface which have a particular MAC address. By changing your MAC location to that particular location which is joined you can associate with a system yet first by de validating the present client.

#3 MAC Authentication : 

Some ISP (Internet Service Provide) might just permit you to interface with a MAC address in the event that you have a particular location. So changing your location dependably helps for this situation.

HOW TO CHANGE YOUR MAC ADDRESS

1. Smac ( For Windows) :- It is an effective MAC changer that has been around for a considerable length of time. It is anything but difficult to use with any equipment. You should be a "specialist" to utilize this. It totally parodies your Mac address. Rather than utilizing Smac there are numerous product's accessible which you can use to change your PC's macintosh location thus on stay unknown on the web.

You can download it by clicking Here



2. Macintosh Changer (Linux) :- Mac-changer is a free accessible apparatus which is utilized for changing the Mac address in a Linux machine. What you have to do is select your web interface and run the summon and its basically done.



The above screenshot is taken from Backtrack and it is unreservedly accessible in Backtrack and numerous other higher adaptations.

sudo well-suited get introduce macchanger-gtk 


Thanks for Reading :)
 

Friday, 23 December 2016

Huge List of Darknet (Deep Web) Hidden Websites 2016




Huge List of Darknet (Deep Web) Hidden Websites 2016: Hello! guys so today i will be sharing HUGE list of Darknet (Deep Web) hidden websites with you all! :)
NOTE: Some of them may not work because either the sites are expired or closed :) So you can infom me in comment section below so that i can remove them :))

Warning:(Please read First): Before you go to any of these, make sure you verify it's not a scam. And even if things are marked non-scams THEY MAY STILL BE SCAMS! 
Make sure to be secured after access.

I(sucidehacker.blogspot.com) is not bear the responsibility of any thing happened to you .. You are the only responsible to protect yourself.


Saturday, 17 December 2016

WHATSAPP MESSAGE BOMBER- CRASH FRIENDS WHATSAPP BY SENDING SMS WHATSAPP BOMBER APP

 
Whatsapp Message Bomber- Hey we are back with an Awesome Trick by which you can prank your friend whatsapp account by sending Spam Message to their Whatsapp account using Whatsapp Message Bomber App. This will hang and crash your Friend whatsapp account for some time. Whatsapp is one of the best Messenger people use by billions of people to chat with their Friends and relatives. People often try to find out ways to prank their Friends on whatsapp. So using this Whatsapp message bomber you can prank your Friends by hanging their whatsapp account for some time . Dont use this Whatsapp bomber for wrong activity. So use this whatsapp message bomber just for fun purpose only. Follow up instructions given below to Crash your Friend whatsapp using Whatsapp Bomber App ?
We post this for Educational purpose only. Dont use it for wrong purposes. Use it for fun purposes only. We are not responsible for any type of damage caused to you while using this trick

SOME REQUIREMENT

1) Any Android Phone (This will work on both Rooted or Unrooted phone . So it does not matter)
2) Whatsapp Message Bomber App
Download Direct Link
3) One Whatsapp account
4) Unknown Source enables. For enabling it go to Security from your mobile setting and Enable Unknown Sources
5) Internet connection . 2g , 3g , 4g or wifi any it not matter

STEPS TO PRANK YOUR FRIENDS BY CRASHING THEIR WHATSAPP USING WHATSAPP MESSAGE BOMBER APP

1) First Download and Install
in your Mobile Phone Whatsapp Message Bomber Apk
2) Open the App Now you will see homepage of Whatsapp bomber App like below

3) Here you will see Bombing Level 1 to Level 5 . Level 1 means low level bombing and level 5 means bombing at highest level. As per your wish choose any level from 1 to 5. My suggestion is o select level 2 or 3 if you dont use this before.
4) After Selecting Level , Click on Copy bomb to Clipboard. It will copy whole text which will bomb your Friend Whatsapp account when you send it to your whatsapp friend
5) Now open Whatsapp and select a friend whom Whatsapp account you want to hang and crash and send this copied text as message to him / her.
6) Boom! Once your Friends open his/her whatsapp and try to read that message . It whatsapp account will get hang and crash for some time

PREACAUTIONS TO KEPT IN MIND

1) If you have Low ram phone say less than 1 gb. Then Dont choose bombing level 4 or 5 to send because it will hang and crash your Whatsapp too
2) After Sending this Bombing text message clear your chat history with that friend to whom you send this bombing message else there is a chance that your whatsapp also get hang

4 Signs Your Phone is Hacked

4 Signs Your Mobile Phone is Hacked
Computer hacking is common, however can your phone get hacked? I have a lot of sensitive information on my smartphone and always get worried with this thought "can hackers hack my phone?".

Sometimes an android or iPhone starts acting weird and users fail to understand the root cause behind it as they are not using their phones any differently than usual. While some people still ignore it, if you find your phone behaving a little odd, then take some time out to figure out the problem and fix it instead of ignoring it.

The main reason why you should be alert about your phone’s behaviour is that your phone might be hacked and your phone’s privacy may be breached. Hence, the question arises that how do you find out if your phone is actually hacked or just showing some tantrums on its own.

While there are many other signs and symptoms, following are the most common ones that tell your phone may be hacked:

High Phone Bills

Sometimes the bills made on your behalf can be unnoticeable in the beginning but when you figure it out, it might be too late. So, it is a wise idea to develop a habit of constantly checking your phone bill at least once a week or a month and calculate how much you have spent.

Often malware are designed to send charity/donation type messages that get charged on users’ phones and the money sent is deposited in stealer’s accounts. If you often donate through phone for charities, then make sure to remember how much you donated or try to maintain a record for each donation to save yourself from being looted.

Running Out Of Battery Too Soon

Does a mobile phone battery run out too soon and too often due to presence of malware? Not necessarily, but often yes. If you notice that your phone’s battery is not lasting as much as it used to, take a while and look out for recently installed applications. Find out how much battery the new apps are consuming, and remove some apps to see if the battery is still draining out too fast.

If your phone has malware, it will accelerate speed of battery drainage to a point where it becomes impossible to ignore. Whereas Trojans are observed to be battery conscious as these are basically for financial reasons and therefore, they do not want the user to feel any difference in usage. So even if your phone’s battery is not running out too soon, you should keep your eyes open for other signs and symptoms.

Unusual Mobile Data Usage

To check if malicious applications are using your phone for sending and receiving data, audit your phone on regular basis. iPhone and Android phones are genuinely very user-friendly, and you can easily check mobile data usage in just a few clicks. Go to phone settings and check how much data has been used. If you find a big difference between the numbers actually used by you and those shown by the device, then you definitely have caught something that should be handled immediately.

You should also be aware of certain free applications that are malicious and consume significant amount of phone data. It is good to ask a few people and read reviews before downloading any free app, and also keep a check on data usage after you have started using any app.

Service Disruptions

Many times ticking and similar noises during a phone call are ignored by the users but they can be sign of a hacking attempt. If you are not sure whether to worry about such noises during calls, then run a check on your data usage, phone bills and battery usage for other signs of a hacking attempt.

While there is always a chance that there is a problem with your phone set, if your phone calls have started being dropped without any signal issue, consider hacking as a possible reason and act accordingly.

How To Save Your Phone

Once you know what signs to notice for finding out if your phone is hacked or not, take a look at these points for tips regarding what you should do for saving your phone from third-parties and malicious applications:

  • Install Security Apps

    All smartphones are available with plenty of security apps on app stores. Make sure you use these apps to keep your phone safe. Many of them are free to download and use. Here are some useful apps

  • Be Aware Of Spying Apps

    There are many well known spy apps in app store - e.g. checkout iPhone apps spying on you. Those apps are used for parental control and other better purposes. However there are many others that run in stealth mode and keep tracking user activity for unethical hacking. Make sure you are not having these apps on your phone.
  • How To Detect Your Phone Has A Malware or A Malicious Software

    If you have lately observed that your phone is behaving weirdly or your bills have started getting higher and higher without any apparent reason, then take your phone to a reliable service centre of phone retailer to run a diagnostic test for malware detection. Though the above listed signs are sufficient for any person to figure out presence of malicious applications, visiting an expert regarding this matter will not only help you detect the problem but also help you get rid of it.
  • Download Apps Only From App Stores

    Downloading apps from third-party stores has always been a risk which many mobile phone users ignore. If you really want to save your phone from malicious applications, download only those apps that are available on Apple store, Google Play Store or Amazon’s app store. There is always a possibility that certain malicious apps make their way to these stores too. So, while you are downloading apps from these stores only, make sure to get some user reviews from friends and family before using it.
Sometimes it becomes impossible to stay safe from malicious apps and malware. But, it is always a good idea to gather some knowledge, like given above, to safeguard your phone before you suffer any loss.

How To Create Most Secure Password?

Tips for creating most secure password
The internet and electronic world might have its advantages and convenience, but it doesn’t mean there are no loopholes in it. Every day we come across so many different and varied instances of theft and hacking from the most basic of platforms to the most popular and biggest social networks or banking systems.

This hacking is something which is only controllable by three simple ways. The first is to ensure a low profile on the electronic mediums and the internet so you do not catch the eyes of the hackers and thieves.

The second way is to ensure that your security systems are fool proof and there is no way your account can be accessed very easily, this means also keeping limited access from across devices. Many people use lots of different public and private devices to access their password protected portals and thus are at the biggest risk of getting hacked.

The third and the final way is to ensure that you do not become a victim of any scam or spam going on across the internet. The hackers entice you in a variety of ways which are impossible for you to know, so experience and safe browsing is something that can really help you in this regard.

passwords are like pants - funny picture to keep strong passwords
One of the security elements of any system or account is your password. Since the internet has modernized and there are new kinds of programming methods installed onto the websites, you have the liberty to choose a varied form of passwords from face scans to eye scans, finger prints or symbols.

Similarly, many internet websites now also guide you with a password strength meter to show you how vulnerable or strong your password is. Keeping a secure password is very important and critical element of your security measures.

No matter how strong firewalls you install or how secured your bank is, if you are accessing it through your online account with a weak password, then there are high chances your account will be hacked for sure. Even the best security experts who wrote information security books get hacked due to easy passwords.

The best way to avoid all this is to keep it secured with a password which is not easy to trace or hack. Today’s guest post blog is going to talk about different ways and approaches that can help you keep a very strong password.

Using Long Length Passwords


How do you balance the necessity of a difficult password with the ability to recall it easily? Well, one of the approaches you can take is to use a long length password. The idea of long length password should be something that you can easily relate to, but it is difficult for others to judge.

This can be the most common thing yet difficult or the most difficult thing yet coming easy to you.In order to give it more strength, you can also utilize the idea of a wrong spelling, for example, a lot of people spell their own names with a different first letter in their password.

Now the password is very common of using their first name, but the trick is that it is spelt with a secondary letter only they know. So such variations obviously will help you make sure your passwords are well managed and secured. 

Long length password settings are one of the most traditional and common ways of setting a password. However, due to the restrictions of length, this approach might be going towards becoming obsolete now.

The Bruce Schneier’s Way


Like we said earlier, there can be varied approaches in setting up your password in a secure way. One of the approaches was suggested by a famous analyst and scientist Bruce Schneier. He recommended a way to set a password in 2008, which is still very useful and relevant. 

Bruce said one should utilize their favorite phrase, acronym, sentence or line as their password. This can be something which is extremely personal or close to you and only you can figure that out. Now it can be a quote from your religious scholar, a line that your better half used to propose you, or the first letter your baby said from her mouth. 

Setting passwords like these is a great way to not only keep something which can be very easily recalled, but also it can be a very tricky password for the hackers. As usually the hackers go for simple letters or words while hacking the accounts on any website or banking portal.

A Pass Phrase

Have you ever registered on a website or installed software which gives out an automatic initial first password? See the way that the password is constructed using a combination of random numbers, letters, symbols and variations in spellings, such passwords are called pass phrase passwords. 

These passwords again are very difficult to hack, but the only problem is their recall level is too low. This is why even when setting such passwords, the internet recommends you quickly change it. One way to combat that is to write that password down somewhere only you have access to and then keep it as it is. 

The idea of a pass phrase comes from automated mechanical password setting machines used in vaults and banks. It is a very common method of keeping secured and strong passwords in highly classified places. Due to its recall level, it is not usually and commonly used by an average internet user.

Use The Password Generator


If you think that setting a password is not something that is your forte, then you have an option to download the password generator and use the memory muscle approach. This approach requires a user to install password generator and then generate at least 10 random passwords from it. Copy those passwords down and see which one is difficult to enter, but easily recalled. 

The password generator tool is also a very famous approach used by many people who are into research and scientific development. They want to increase the capacity of their memory by remembering or memorizing random letters and this is a one good and secure way to do that as well as setting a strong password.

Do Not Re-use Passwords


Do not rely on using your old passwords, as part of your cache they can be easily breached. Always work towards keeping a new and fresh password everytime you think of changing it. Revising a password is not a good policy to have, unless the password you are using is a few years old, then it may be fine. 

Do Not Keep It Too Short

Additionally, people rely on keeping short words as passwords which again is not the right thing to do. Too short a password can be easily hacked. Your ideal password should be at least between 10 to 15 characters.

Do Not Use Your Public Information As Password

Do not use your birthday, recent event date, marriage date or your first and last name. All these contribute to your basic credentials which are posted online in the form of your profiles and social media data. This means that information is already available for a smart hacker. Always refrain from using such credentials as your password for anything. You should not also use your current city or location as your password.

Refrain From Using Basic Words


Basic English words or your favorite sports team are also an easy breach in terms of your passwords, do not use them unless you are going for a combination of different teams and words.

Security Questions

When it comes to setting security questions for your passwords, you can use the wrong answer or a jumbled up answer for a simple security question in order to further strengthen your password.

Two Factor Identification

You can also set a complicated two factor identification settings, which will further improve your password security. Most email providers and banks support two factor authentication. However its always a optional thing that needs to be enabled by users. Here are some popular sites that support two factor authentication

What Is Domain Name Hijacking?

Domain Name Hijacking

How To Protect Yourself


What would you do if someone started going around with your name? If they passed themselves off as you – trading on your reputation? It wouldn’t be nice, would it? It might sound like the plot of a film or the stuff of nightmares, yet this can be a concern for businesses in the digital era.

Your domain name is the combination of words people type in to be able to access your website. To all intents and purpose, it IS your name. So it matters quite a lot to be able to keep hold of it.

Yet domain name hijacking is a very real risk. This is the process by which someone switches the registration of your domain, leaving you stripped of control of your name.

Clearly, that would cause you big problems, cutting the business you can do from your site and associated email addresses. So, what can you do to try to protect yourself against this scenario?


Choose Wisely

You need to consider your domain carefully. You need to select a web address that no-one else has, clearly, but during your domain registration process you can also snap up similar domain names to stop the potential for copycat sites. This won’t necessarily stop hijacking, but it might end any doubt over the ownership of your domain registration, which could help to stave off the possibility of issues here.

Take Security Seriously


Anything worth keeping hold of is worth protecting – and that stands for your domain name too. This means you need to call upon the services of some robust security software – and ensure that the hosting company that you use has the level of technical support that gives you confidence. Keep your security software up to date at all times and see if your registrar will allow you to ‘lock’ your domain.

Be Aware Of Scams

All businesses have to be aware of scam emails – and this is a particular problem when it comes to domain hijacking. Unscrupulous operators will try to trick you into getting access to your domain by posing as someone from your registrar – or might even approach you trying to sell you an extra domain registration that you don’t actually need. Learn more about the way these people operate and you’ll be able to avoid falling foul of their techniques. You also need to ensure other people in your business know about this. You only need one person to succumb and your defences might be compromised.

Don’t Be Bullied

Sometimes people will try to buy your domain from you if they want to take the registration, but other people might try to be more sly and force it from your grasp. The act of reverse domain name hijacking (RDNH) involves challenging someone’s ownership of a domain name by falsely claiming that it shouldn’t belong to them. When faced with such a challenge, many people feel intimidated into backing down and losing their registration.

How to Spot a Fake Website

Tips and guidelines to Spot a Fake and Phishing Website


Phishing or Spoofing is a common type of internet crime. Every year thousands of phishing emails are sent to drive people to fake websites. These fake or phishing websites try to trick users and extract secret and sensitive information from them including personal identification and financial details.

Cyber crime is one of the most prevalent and dangerous forms of crime in this modern era. With more and more people embracing e-commerce websites for shopping or banking through online, fraudsters are rampant to cheat people to make a quick buck.

To be guarded and attentive is very important to be safe. In the cyber world, phishing is the most commonly practiced type of fraudulent. Details of the same are elaborated in this article.

Beware Of Phishing!!

Scammers use a lot of ways to fraud innocent internet users. Phishing is one way where the scammer play as a genuine person or from a company and then sends emails to give away your financial or individual information like passwords or credit card number and social security number.

This is one of the most prevalent forms of scam and criminals are always changing their ways so as to make sure the email recipients trusts and gets cheated. Phishing is generally done by sending an email supposedly from a bank asking for few confirmations about your account. A link will also be provided and user believes the link will take to the account confirmation website.

However, when the link is clicked, malicious programs such as Trojan is launched that will immediately install a keystroke logger on the computer. The purpose of keystroke logger is to record whatever we type which also include passwords. The other thing that might happen by clicking the link is, you may enter into fraud website where you end up giving away your individual information.

The fake website may look exactly like your bank’s real website. This is due to the fact that scammers just copy the look and files of the real website. But once you try to log in, a lot of personal information is asked which you would never be asked on the real site. Details like account number, debit card number, even ATM PIN is asked.

One more way to trick people is creating websites with a name which can be a generally misspelled address. This is called as typosquatting and most of the people would have encountered these kinds of sites while surfing the web. The intent of the website is the same, faking and making money.

Recognizing A Phishing Website

Below are some tips to recognize fake and phishing websites on your own.

Check the URL 

The real bank website and the fake site will have different URL. Repeating checking the URL for the spelling is important. The check can start from the link provided in the email. Once you hover the pointer of the mouse on the link, the web address will be displayed. Fake can be identified right there. Also, ensure the address bar displays the “secured” symbol i.e. https.

Errors in Grammar or Spellings 

We can expect fake websites generally from countries non-English speaking or mother tongue is not English. If there are spelling mistakes or grammatical errors , then the phishing site can be easily identified.

Real organizations ensure that there are no such mistakes.  A lot of time will be invested in creating good websites. If any website looks cheap with spelling mistakes, poor images, and logo, it calls for suspicion.

Once you get a suspicion, check the websites for any other clues and do not provide any information.

Notice Padlock Symbol


Padlock symbol (shown in below snapshot) which appears adjacent to the main address bar is one way of knowing of site security. Website URL starting from https can be an additional security. These two signs are critical to ensuring security. Therefore all the main e-commerce retailers will have the measures in place.

 

Check The Images

Real websites have high-resolution images. Fake websites are usually done in a hurry and images will not be sharp.

Notice A Change 

Banks websites would ask you for username and passwords or pin numbers. If a bank is asking for personal information which they would never ask before, it is most likely fake.

Check Company Details

Observe the company name and the footer. Try to know the information of the website owner. See next few points on how to know more details about company.

Check The Credentials

Check the credentials of the websites. You can start by checking for the contact information, address. Additionally, you can even call the number. A web search can provide vital information. Numerous forums and blogs are available where other users would have recorded their issues and provided information.

Search On Web About The Site

A good web search on the site can yield more information and fewer chances of getting cheated. Using keywords in Google, you can research about the site. The name of the website with keywords such as customer complaints, fraud, feedback, review etc can be used.

Cross Verify Copyright Date With Domain Registration Date

More investigation can be done in terms of comparing the copyright date in the website and the creation date of the domain. The fake website will be created at a very later date.

Careful Shopping On New Sites

Be careful while online shopping from new websites – Whois lookup can help you know the creation date of the domain. If the domain is newly created and enough data is not available on the site, it is safe not to use the site till the legitimacy of the site is established.


Check Site Popularity In Search Engines

Research on site popularity also can provide vital leads about the website. A page authority score of higher than 50 indicates genuine site. The score  can be checked through opensiteexplorer.com

Site Must Have Contact Information

If the website does not have Contact information, then it’s most definitely fraud. If the contact info is given, you can send a mail or call to check.


Visa Card Holders Can Opt For Text Alerts

Visa text alert can be activated. Any fraudulent activity will be immediately notified to take action.

Unbelievable Deals Are Warning Sign

Too good deal may be a sign of fake or phishing website

If the information in the site is very good with unbelievable deals, better to trust instincts and leave the site. Do not provide any information about yourself.

New Look - Be Suspicious About Any Change

Be cautious about how the website looks. If it is too different from your previous visits and if the information asked is different what it used to be, there is good chance that you have landed on a fake site. Generally, website informs customers of changes in the look of the website.

Confirm Email Id Is Trusted

Checking the email id of the sender is also important. If it is a general account not specific to any company and asking for information which is sensitive, then do not divulge. Also, real bank emails address you by name. So make sure right name is used.


Ensure Your Transaction is Encrypted

E-commerce websites, to secure transactions use encryption. If the symbol of the lock is present in the browser, you can assure the site uses encryption. Security certificate can be checked by clicking on that symbol.

How To Protect Yourself From Scamsters

Even though the suggestions provided above can help in recognizing the fake sites, fraudsters are always finding new ways to make the site look original and convincing. So it is always better to take to assess if you are on the legitimate site. We give you a few pointers to help keep you away from getting cheated.

Get The Latest Browser

The browser has to be up to date to identify fake sites. If the security options are ticked on then the browser will inform you before entering the site.


Awareness 

Knowing about the most recent scams and being aware of what a fake website would look like would take you long way to recognizing the tricks of a hacker.

Use Rational 

Checking the emails thoroughly, knowing the email sender and being careful about emails asking for any financial and personal information. Additionally, you have to ensure no to download any files and attachments from this kind of emails.


Intelligent Browsing

When surfing always ensure the website is secure, especially be cautious while entering important information. In the case of any suspicion, input a wrong password. Fake websites accept any password. One more way of entering the right website is through search engines. Tools like McAfee® SiteAdvisor®, can help you know if the site is safe.


Technology Can Help Defend

Complete pack of anti-phishing technology such as McAfee security center can effectively defend against such sites. They come preloaded on PCs from Dell. The software should always be updated with the latest by updating it in the control panel for software security. Automatic updates should also be enabled.

On Guard Always

On the offline front, you can keep a track of the bank account, transactions and credit card bills. The password should be changed on a regular basis. Passwords should be strong and can include letters, special characters, and numbers. General information about you like nicknames and birthdays should be best avoided in a password.


Avoid Saving Credit Card On Websites

Saving credit card information should be avoided.  It is always preferable to use services such as PayPal than using credit cards as they have good control on the transactions. In case the website is hacked also, it is safer with PayPal.


Report To FTC About Incidents

Report FTC about hackers. If you have noticed a fake website, it is best to forward such emails to FTC (Federal Trade commission). The email id is spam@uce.gov. There is another anti-phishing work group. The email id of the same is reportphishing@antiphishing.org


Phishing is the most prevalent form of cyber crime. Scamsters are always on the look out to fraud people and convince them in divulging information to make money. Therefore, it is always better to be safe than sorry. Practicing safe browsing is a great way to curb any phishing attempt.

Thursday, 15 December 2016

Make Birthday animation using command prompt

 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
Hello friends, today I am going to tell you a simple program that will make Birthday animation. I have gifted this animation to one of my friend, she became very happy as it was a technical gift. This trick does not require any technical skill in you.

Just follow the steps and you are done.

1. Open Notepad.
2. Copy and paste the following code in a notepad and save it as "Birthday.bat". In fact, you can give any name with extension *.bat.
Double click on this batch file and see the animation.
You can present it to your friend.
Codes are:
@echo off
echo H
ping localhost -n 2 >nul
cls

echo Ha
ping localhost -n 2 >nul
cls
echo Hap
ping localhost -n 2 >nul
cls
echo Happ
ping localhost -n 2 >nul
cls
echo Happy
ping localhost -n 2 >nul
cls
echo Happy
ping localhost -n 2 >nul
cls
echo Happy B
ping localhost -n 2 >nul
cls
echo Happy Bi
ping localhost -n 2 >nul
cls
echo Happy Bir
ping localhost -n 2 >nul
cls
echo Happy Birt
ping localhost -n 2 >nul
cls
echo Happy Birth
ping localhost -n 2 >nul
cls
echo Happy Birthd
ping localhost -n 2 >nul
cls
echo Happy Birthda
ping localhost -n 2 >nul
cls
echo Happy Birthday
ping localhost -n 2 >nul
cls
echo Happy Birthday
ping localhost -n 2 >nul
cls
echo Happy Birthday t
ping localhost -n 2 >nul
cls
echo Happy Birthday to
ping localhost -n 2 >nul
cls
echo Happy Birthday to
ping localhost -n 2 >nul
cls
echo Happy Birthday to y
ping localhost -n 2 >nul
cls
echo Happy Birthday to yo
ping localhost -n 2 >nul
cls
echo Happy Birthday to you
ping localhost -n 2 >nul
cls
echo Happy Birthday to you.
ping localhost -n 2 >nul
cls
echo Happy Birthday to you..
ping localhost -n 2 >nul
cls
echo Happy Birthday to you...
ping localhost -n 2 >nul
cls

echo Happy Birthday to you....
ping localhost -n 2 >nul
cls
echo Happy Birthday to you.....
ping localhost -n 2 >nul
cls

echo Happy Birthday to you......
ping localhost -n 2 >nul
cls
echo Happy Birthday to you.....
ping localhost -n 2 >nul
cls
echo Happy Birthday to you....
ping localhost -n 2 >nul
cls
echo Happy Birthday to you...
ping localhost -n 2 >nul
cls
echo Happy Birthday to you..
ping localhost -n 2 >nul
cls
echo Happy Birthday to you.
ping localhost -n 2 >nul
cls
echo Happy Birthday to you
ping localhost -n 2 >nul
cls

echo Happy Birthday to you
ping localhost -n 2 >nul
cls
echo Happy Birthday to you.
ping localhost -n 2 >nul
cls
echo Happy Birthday to you..
ping localhost -n 2 >nul
cls
echo Happy Birthday to you...
ping localhost -n 2 >nul
cls
echo Happy Birthday to you....
ping localhost -n 2 >nul
cls
echo Happy Birthday to you.....
ping localhost -n 2 >nul
cls
echo Happy Birthday to you......
ping localhost -n 2 >nul
cls
It will look like:
 Happy Birthday to you.....

 Happy Birthday to you.....

 Happy Birthday to you.....