Saturday 30 April 2011

how to hack Email account using Cookie Stealing


If you are a newbie and don't know about cookie, then for your information, Cookie is a piece of text stored on user computer by websites visited by the user. This stored cookie is used by webserver to identify and authenticate the user. So, if you steal this cookie (which is stored in victim browser) and inject this stealed cookie in your browser, you can imitate victim identity to webserver and enter his Email account easily. This is called Session Hijacking. Thus, you can easily hack Email account using such Cookie stealing hacks.

Friday 29 April 2011

HONEYPOTS TUTORIAL

Introduction
For every consumer and business that is on the Internet, viruses, worms, and crackers are but a few security threats. There are the obvious tools that aid information security professionals against these problem such as anti-virus software, firewalls, and intrusion detection systems, but these systems can only react to or prevent attacks – they cannot give us information about the attacker, the tools used or even the methods employed. Given all of these security questions, honeypots are a novel approach to network security and security research alike.  This paper will first give an introduction to honeypots – the types and uses. We will then look at the nuts and bolts of honeypots and how to put them together. With a more advanced idea of how honeypots work, we will then investigate the research related to honeypots and look at the possible legal ramifications for the those who deploy them. Finally, we shall conclude by looking at what the future holds for honeypots and honeynets.

Thursday 28 April 2011

Automatic Screen Refresh



When you make changes to your file system and use Explorer, the changes are not usually displayed until you press the F5 key
To refresh automatically:
1. Open RegEdit
2. Go to
HKEY_LOCAL_MACHINE\System\CurrentControlSet\Control\Update
3. Set the value name "UpdateMode" to 1

Changing Exchange/Outlook Mailbox Location



To change the location of your mailbox for Exchange:
1. Open RegEdit
2. Go to
HKEY_CURRENT_USER\Software\ Microsoft\Windows Messaging Subsystem\ Profiles
3. Go to the profile you want to change
4. Go to the value name that has the file location for your mailbox (*.PST) file
5. Make the change to file location or name

To change the location of your mailbox for Outlook
1. Open RegEdit
2. Go to HKEY_CURRENT_USER\Software\Microsoft\Outlook (or Outlook Express if Outlook Express)
3. Go to the section "Store Root"

4. Make the change to file location.

HOW HACKERS USE KEYLOGGERS TO HACK PASSWORD ?

Keylogger is a hardware device or a software program that records the real time activity of a computer user including the keyboard keys they press,as i explain in my last artilce. These keyloggers allow not only keyboard keystrokes to be captured but also are often capable of collecting screen captures from the computer. The keys they press are programmed to automatically transmit data over the network to a remote computer or Web server.

Tuesday 26 April 2011

PHISHING EXPLAIN

WHAT IS PHISHING ?

Phishing is a fraudulent attempt, usually made through email, to steal your personal information. The best way to protect yourself from phishing is to learn how to recognize a phish.

Phishing emails usually appear to come from a well-known organization and ask for your personal information — such as credit card number, social security number, account number or password. Often times phishing attempts appear to come from sites, services and companies with which you do not even have an account.
In order for Internet criminals to successfully "phish" your personal information, they must get you to go from an email to a website. Phishing emails will almost always tell you to click a link that takes you to a site where your personal information is requested. Legitimate organizations would never request this information of you via email.

ENABLE NEW 2-STEP VERIFICATION SECURITY MECHANISM IN GMAIL ACCOUNTS




What is Gmail 2-Step Verification:


Gmail started 2-step verification which adds an extra layer of security to your Google account by requiring you have to access your phone as well as username and password.


These means that even if some steals or guess your password, then too the hackers still wont be able to access your account since they don't have your phone.


How you sign-in with 2 steps:





  • When you access any Google products, enter your username and password.
  • and then click setting.



How to Enable 2-Step Verification:
(1)  Open Google Account setting after open this page..

(2)  Click on "Using 2-step verification" link under "Personal Settings" section.

(3)  If you can't see the link, you can use following direct URL:

(4)  Follow the instructions and add your phone number to the extra security mechanism.

Monday 25 April 2011

SPEED AND BOOST YOUR XP PERFORMANCE


Since defragging the disk won't do much to improve Windows XP performance, here are 23 suggestions that will. Each can enhance the performance and reliability of your customers' PCs. Best of all, most of them will cost you nothing.

HOW TO ENABLE TASK MANAGER

Some Malware and Trojan often disable access to Windows Task Manager. Fortunately, a few quick Registry edits are usually all that are needed to regain control.

Keep Protect Your FaceBook and Twitter Privacy


Surfing the web no longer a solo activity. Facebook, Twitter, and other social networks have quickly become an integral part of the online culture, and with them comes an array of serious threats to your privacy. In this article, I’ll identify some of the key dangers of social networking and offer a few easy steps that you can take to stay safe online. Social networking is n           built on the idea of sharing information openly and fostering a sense of community. Unfortunately, an online network of individuals who actively share their experiences and seek connections with other like-minded people can be easy prey for hackers engaged in social engineering and phishing attacks. It’s important to be aware of the threats and to use discretion in all of your online interactions.