Showing posts with label security. Show all posts
Showing posts with label security. Show all posts

Tuesday, August 18, 2015

Capture Picture Who Tries To Unlock Your Phone

How To Capture Picture Who Tries To Unlock Your Phone



Android is a very smart device which provides lots of feature for its user. An Android operating system is most widely used in the world. And there are lots of app that is being developed to run on this OS that makes it more user friendly. And today we will be discussing on a cool app of android that will help you to capture the person tries to unlock your android device in your absence. So we are here with the method for How To Capture Someone’s Picture Who Tries To Unlock Your Phone. The android app will let you to set up this security in your android device. Just read out the below to proceed.

Capture Someone’s Picture Who Tries To Unlock Your Phone

You may not want to endangers your privacy by giving your phone with other so better is to implement this and shock your friend by showing them your captured pictures while they was trying to unlock your android. Just read out the below steps to proceed.

Steps To Capture Someone’s Picture Who Tries To Unlock Your Phone :-

  1. First of all you need to download and install the app Hidden Eye.
  2. Now open the app in your android and you will see the three check box.
  3. Now tick on the second option there and then click on ok button.1
  4. You can also check other option too according to your wish.
  5. Make sure that the app gets activated after selecting all the options.
  6. Now this app will work for you and when your friends try to unlock your android then this app will captures its pictures in  your record.
  7. In your free time you can check your records and can check that who tries to unlock your android in your absence.
  8. Thats it you are done, now your android will caught your friends in your absence.
So above is all about How To Capture Someone’s Picture Who Tries To Unlock Your Phone. Now android will take care of itself in your absence and will tell you about the person’s who tries to unlock your android. Also this thing can resolve out big cases too. So must implement this in your android. Hope you like the discussion, don’t forget to share this cool trick with others too. leave a comment below if you have any related query with this.

Saturday, May 9, 2015

Disable USB ports on Windows PC via Registry

With this trick, you can disable access to your USB(Universal Serial Bus) ports on your Windows based PC to prevent people from taking out data without permission or spreading viruses through the use of USB (pen and flash) drives. 

To use this trick to disable USB ports, follow the steps given below:-

  1. Click on Start.
  2. Click on Run. If you cannot find RUN, type it in the search box.
  3. Type "regedit" without quotes. This will launch the Registry Editor.
  4. Navigate to  HKEY_LOCAL_MACHINE\SYSTEM\CurrentControlSet\Services\usbstor.
  5. In the work area, double click on Start.
  6. In the Value Data box, enter 4.
  7. Click on OK.
  8. Close Registry Editor and refresh your desktop.
  9. To re-enable access to your USB ports, enter 3 in the Value Data box in Step 6.

Disable access to USB ports on your PC using Registry Editor

Try it yourself to make your PC invulnerable from data theft and malware which spread through USB ports. This works on Windows XP, Windows Vista, Windows 7 and Windows 8.

Note: This trick also disables access to your USB connected peripheral devices. So, do not use it if you have USB connected keyboard and mouse.

Thursday, December 25, 2014

How to Remove shortcut Virus from USB, Memory Card and Harddisk

I have seen many people asking me questions like how to remove shortcut virus from pendrive?, or how to fix shortcut virus? how to clean shortcut virus?, how to delete shortcut virus? and so on for that greedy shortcut virus.This problem is generally found in Windows Xp or 7 . This problems also comes in PC with antivirus installed.So antivirus can't help us in this issue. This virus creates a shortcut folder inside your USB Pendrive, Hard disk, PC, Memory Cards. Here I am going to explain two methods to remove shortcut virus from pendrive and other USB devices.
How To Remove Shortcut Virus From Pendrive

Method 1 

Check if  the files of the USB are not in hidden mode.
Now let's start ,Follow the following steps.
Step 1:
Autorun Exterminator
  • First , Connect your pendrive/USB/Memory Card to your PC.
  • Click on the given link and download the file “AutorunExterminator” Download AutorunExterminator.
  • Extract it –> and Double-click on “AutorunExterminator”.
  • It works in background so you will see a cross icon in notification bar as shown below.notoications bar
  • This process will help us remove the autorun.inf files from USB/Memory Card.
Method 2:
  • In this step you have to remove shortcut virus using CMD.
  • Click on “Start” –>Run –> type cmd and click on OK.
  • let me consider your drive letter as G:
  • Enter the this  command:

attrib -h -r -s /s /d g:\*.*

or

attrib G:\*.* /d /s -h -r -s

  • You can also copy the above command –> Right-click in the Command Prompt and paste it. 
cmd windows

P.S: Please Don’t forget to replace the "letter G" with your drive letter. Give a look to your files.
Step 3:
Malwarebytes

Note: Default option is “Quick Scan” change it to “Full Scan” and select your drive of which you want to full scan.

Method 2

  • This tool actually is the official shortcut virus removal tool and it vaccinates your USB against further viruses attack and creating shortcuts. xD
  • First , Download “UsbFix” (developed by El Desaparecido) here [ Download Here]
  • If your antivirus not allowing this application to run, disable antivirus temporary from control panel.
  • Plug in your usb devices (USB Pendrive, Hard disk, PC, Memory Cards)
  • Double click on UsbFix.exe
  • Click on deletion and you are done! :)
tool to remove shortcut virus from pendrive

  • Note that it will restart your PC automatically. 
  • Access your deletion report at ( C:\UsbFix.txt )
  • This tool will help to remove shortcut virus from pendrive.
Still having any Doubts? Feel Free to ask in the comments Section! :)

Monday, December 1, 2014

How To Check Who Used Your PC In Your Absence!

These Days Generally Some People Log Into Our PC And Check Photos And Other Data Or Any Other Useful Information Without Our Permission, And We Always Don’t Want Anybody To Access Our PC Without Our Permission Which Most Of The People Like To Do . If You Want To Know The Details That When Was Your PC Accessed, Then I Am Here To Show You How Can You Check Who Logged On To Your PC.

Check Who Use Your PC In Your Absence? – Procedure

1)     First goto start and type Run > After that in run type 'cmd' (without inverted comas) and press Enter.

2) The command prompt window will open ,  Now type eventvwr.msc and press enter


3)     Wait for some time ,after that the Event viewer window will open.


4)   The event viewer window will show you the Detail logs of your PC, It stores Three types of log files
  • 1)     Application
  • 2)      Security,
  • 3)     System
All logs are Archived and Reviewed, We are using the System Log to fulfill our purpose 
5)     Click on Windows log and select System log

6)  This will show you all the detail of your PC which happened recently. That’s all after doing above steps you will get the detailed report of who logged in your PC. If you will find any problem on this post (Check who use your PC in your Absence?) then let me know in below commenting. 

Wednesday, November 26, 2014

HOW TO USE A PENDRIVE AS A KEY TO START YOUR COMPUTER!!

             Hello friends,i am back with a another cool trick to hide and securr your some importand and private file/picture.
                  

Follow step :-

STEP  1: GOTO START AND TYPE "DISK MANAGEMENT"

STEP  2: PRESS ENTER

STEP  3: WATCH OUT FOR YOUR PENDRIVE NAME 

STEP  4: RIGHT CLICK ON IT AND CLICK ON "CHANGE DRIVE LETTERS OR PATHS"

STEP  5: ASSIGN IT "A" ALPHABET

STEP  6: NOW GO TO RUN PROMPT (WIN+R) AND TYPE "syskey" 

STEP  7: CLICK "UPDATE"

STEP  8: NOW CLICK ON "STORE STARTUP KEY ON FLOPPY DISK"

STEP  9: CLICK OK 

STEP 10: TO UNDO IT DO SAME PROCEDURE AND CLICK ON "SAVE STARTUP KEY                          LOCALLY"  



Any que. Or dout then write in comment 
& if u want any trick then also you can ask me…

Feel free to write comment :)
           

Wednesday, November 12, 2014

What is RAT Or Remote Access Trojan ?

remote access trojan or rat
RAT stands for Remote Access Trojan orRemote Administration Tool. It is one of the most dangerous virus out their over the internet. Hacker can use RAT to get complete control to your computer. He can do basically anything with your computer. Using RAThacker can install keylogger and other malicious viruses remotely to your computer, infect files on your system and more. In this post i will tell you about what hacker can do with your computer using RAT and tell you about some commonly use RAT by hackers.

 What is RAT ?

As i have told you in my introduction paragraph RAT is Remote Access trojan. It is a peace of software or program which hacker uses to get complete control of your computer. It can be send to you in form of images, videos or any other files. Their are some RAT that even your antivirus software can not detect.  So always be sure about what you are downloading from the internet and never save or download files that anonymous user send you  over the mail or in chat room.

 What You Can do With RAT ?

Once a RAT is installed on any computer hacker can do almost anything with that computer. Some malicious task that you can do with RAT are listed below:
  • Infecting Files
  • Installing Keyloggers
  • Controlling Computer
  • Remotely start webcam, sounds, movies etc
  • Using your PC to attack Website (DDOS)
  • View Screen

 Harmless RAT or Good RAT

As you have seen how harmfull RAT are for your computer, but their are some good RAT which some of you might be using daily. You might have heard of TeamViewer, it is a software which you use to control some one's computer with his permission for file transfer, sharing your screen and more.

 Some Commonly Used RAT

  • ProRAT
  • CyberGate RAT
  • DarkComet RAT

Monday, November 10, 2014

6 Most Common Password Cracking Methods And Their Countermeasures

6 method used to crack passwords
There are number of methods out their used by hackers to hack your account or get your personal information. Today in this post i will share with you guys 6 Most commonly used method to crack password and their countermeasures. You must check out this article to be safe and to prevent your online accounts from hacking.

1. BruteForce Attack

brute force attack
Any password can be cracked using Brute-force attack. Brute-force attacks try every possible combinations of numbers, letters and special characters until the right password is match. Brute-force attacks can take very long time depending upon the complexity of the password. The cracking time is determined by the speed of computer and complexity of the password.

Countermeasure: Use long and complex passwords. Try to use combination of upper and lowercase letters along with numbers. Brute-force attack will take hundreds or even thousands of years to crack such complex and long passwords.
Example: Passwords like "iloveu" or "password"can be cracked easily whereas computer will take years to crack passwords like "aN34lL00"


2. Social Engineering

Social engineering is process of manipulating someone to trust you and get information from them. For example, if the hacker was trying to get the password of a co-workers or friends computer, he could call him pretending to be from the IT department and simply ask for his login details. Sometime hackers call the victim pretending to be from bank and ask for their credit cards details. Social Engineering can be used to get someone password, to get bank credentials or any personal information.

Countermeasure: If someone tries to get your personal or bank details ask them few questions. Make sure the person calling you is legit. Never ever give your credit card details on phone.

3. Rats And Keyloggers

keylogger
In keylogging or RATing the hacker sends keylogger or rat to the victim. This allows hacker to monitor every thing victim do on his computer. Every keystroke is logged including passwords. Moreever hacker can even control the victims computer.

Countermeasure: Never login to your bank account from cyber cafe or someone else computer. If its important use on-screen or virtual keyboard while tying the login. Use latest anti-virus software and keep them updated. Check out below article to know more about Rats and Keyloggers.

4. Phishing

phishing hacking
Phishing is the most easiest and popular hacking method used by hackers to get someone account details. In Phishing attack hacker send fake page of real website like facebook, gmail to victim. When someone login through that fake page his details is send to the hacker. This fake pages can be easily created and hosted on free web-hosting sites.

Countermeasure: Phishing attacks are very easy to avoid. The url of this phishing pages are different from the real one. For example URL of phishing page of facebook might look like facbbook.com (As you can see There are two "b"). Always make sure that websites url is correct. Check out below article to know more about phishing.

5. Rainbow Table

A Rainbow table is a huge pre-computed list of hashes for every possible combination of characters. A password hash is a password that has gone through a mathematical algorithm such as md5 and is transformed into something which is not recognizable. A hash is a one way encryption so once a password is hashed there is no way to get the original string from the hashed string. A very commonly used hashing algorithm to store passwords in website databases is MD5. It is almost similar to dictionary attack, the only difference is, in rainbow tables attack hashed characters are used as passwords whereas in dictionary attack normal characters are used as passwords. 

Example: ‘hello’ in md5 is5d41402abc4b2a76b9719d911017c592 and zero length string ("") is d41d8cd98f00b204e9800998ecf8427e

Countermeasure: Make sure you choose password that is long and complex. Creating tables for long and complex password takes a very long time and a lot of resources

6. Guessing

password guessing
This seems silly but this can easily help you to get someones password within seconds. If hacker knows you, he can use information he knows about you to guess your password. Hacker can also use combination of Social Engineering and Guessing to acquire your password.

Countermeasure: Don't use your name, surname, phone number or birthdate as your password. Try to avoid creating password that relates to you. Create complex and long password with combination of letters and numbers.

Wednesday, April 30, 2014

PHISHING

What is PHISHING & How to AVOID it ?

                                                
What is Phishing ?
Phishing is when someone sends you an email that looks like it comes from someone else, in an attempt to get information from you. This is not the same as those ‘scam’ type emails we are all very familiar with. It is an email that may look very professional, that say came from your bank, Gmail, or even Windows. Usually, those attempting phishing will use a company that you know and trust very well. As you can see from the word, ‘phishing’ comes from the word, ‘fishing’. They are fishing for information. Phishing does not only take place on email, and sometimes it will happen on your phone.

What happens When You Click on the Link ? 
What normally happens in the fake email is you are asked to click on a link. After you click on the link you are taken to a website, that looks very much like the real website, asking you to enter in your normal account details. Such as your email, or your bank, or any other sensitive information that the attacker is looking for. These websites are constructed to look very much like the real thing. In reality, they are a bogus website, just collecting your information. Even if someone has access to one of your email accounts, they can start stealing your identity and learn a lot about you.

Cause of Phishing
Phishing (fishing) is on the increase because our computers are better protected with anti-virus software, we have better computer support and less need for computer repairs. Attackers trying to steal your information will try to fool you with bogus emails, pretending they are from a company you trust — a deeper look at phishing. It is on the increase. We all must be very wary.

While all of us have anti-virus software and check our computers for viruses regularly, ‘phishing’ attacks can get around any protection we have. If you don’t understand phishing, and you are not sure if you are a target, this article is for you. A perfect example recently was when a company was faking Windows computer support. They do this, to get you to give them information, so they can then steal your identity or access your email accounts. Here is a deeper look at this issue.

How to Avoid Phishing ?
The number one rule on how to beat any phishing attack is very simple. There is no company that you can trust that will ever ask you to give out your personal information. An email that is asking you to do that, is a phishing attack. The attackers send out these emails to many people at once, in the knowledge only a few people will fall victim. Even if they get the information from a small number of people, they can still get a lot of money. Any phone call, and any email where a company you use and trust, is asking you for sensitive information, is always a phishing attack. The only way you can protect yourself is to be vigilant with every phone call, and every emailail.