Skip to main content

Posts

Featured post

5 ways you are being Hacked

    5 Ways You are Being Hacked W eb monitoring and mass surveillance has become a headache for most of us. Everyday some new malware makes its way into our lives through websites and applications that we use. It is important for you to know where the loopholes exist and eradicate them as soon as possible. So here are the top 5 ways people are getting hacked. 1> Password reuse It may not sound to be a serious issue but it is one of the main reason responsible for password. What people do is that they use same password for every account that exists and make it easy for an attacker to hack all of their data in one go.Make sure you have a unique and strong password for each log in. It makes it harder for us to remember each and every password ,thus password managers were created.   2>Malware downloads If you surf the web regularly and try new apps for your mobiles, chances are you already downloaded some malware or will invite them in the near future. 30,000 websites a
Recent posts

How to effectively deal with malware on the internet?

We all access internet in a never ending loop and in this loop what we find most annoying is the ads that we come across .We often deploy our best  fighters in the name of some extensions or addons to fight the cause. But what you dont know is that ads are just a dot of the bigger picture. Ads cant harm you directly unless you are dumb enough to click each and every adware that you come across. What can actually cause real harm is the malware with which the internet is filled and the trackers that follow you everywhere. So, how to get away from these malware and trackers without using any extensions or add-ons? The answer is HOSTS files. Now you must be wondering what this host file is, never heard of this genius. Well you are not alone but i am here to guide you through it. What is HOSTS file? What you see above is what a HOSTS file look like. When you try to access a previously unknown website on the internet, your web browser normally first checks the HO

7 Signs You Have Malware and How to Get Rid of It

7 Signs You Have Malware and How to Get Rid of It PC acting strange? These warning signs could mean that your PC's security has been compromised. Here's what to do. Computers are complicated devices. They don't always do precisely what you expect. Sometimes an unexpected behavior is just a glitch; other times, it's an outward and visible sign of an inward and terrible malware infestation. If you notice any of these seven warning signs, it could mean that malware has compromised your system's security. The fact that you've got malware protection installed doesn't mean you can ignore these warning signs. Software isn't perfect, and sometimes a brand-new malware attack can slip past your security. 1. Popup Ads Start Popping Up Everywhere While not as common as they used to be, adware programs bombard their victims with advertisements. Sometimes they're ads for legitimate products, netting an affiliate fee for the adware perpetrator. Oth

The Hacker's Dictionary

               ----- The Hacker's Dictionary----- Are you new to the realm of hacking? Do you feel dumb when you don't know the meaning of a certain term?Well, then this will certainly help you out! . If you are ever unsure about anything, simply scroll down and find that specific word, then read the definition. Anything includes: Abbreviations, Phrases, Words, and Techniques.The list is in alphabetical order for convenience!                                  -----Abbreviations----- DDoS  : Distributed Denial of Service DrDoS  : Distributed Reflected Denial of Service Attack, uses a list of reflection servers or other methods such as DNS to spoof an attack to look like it's coming from multiple IPS. Amplification of power in the attack could occur. FTP  : File Transfer Protocol. Used for transferring files over an FTP server. FUD  : Fully Undetectable Hex  : In computer science, hexadecimal refers to base-16 numbers. These are numbers that use d

How To Encrypt Keyboard To Avoid Keyloggers

How To Encrypt Keyboard To Avoid Keyloggers If we start encrypting keystrokes of a keyboard the value that keylogger will record will be different from the actual value, it means that they would only record random characters. We will be using Keyscrambler software to encrypt our keyboard. So have a look on simple steps below to implement this in your Windows PC. Steps To Encrypt Keystrokes To Avoid Keylogger Attacks :- Step 1 . First of all download and install the tool KeyScrambler. Step 2 . Now after downloading, install it and after complete installation, you have to reboot your system. Step 3 . Now when your computer boots up, right click on the icon of KeyScrambler in the system tray at the bottom of a screen. Step 4 . Now choose options from there and Keyscrambler will open and you will see the screen like below. Step 5 . Now you can alter settings in this according to your wish and after that simply click on ok. Now your key scrambler app is ready,

How to Move Emails from One Gmail Account to Another

How to Move Emails from One Gmail Account to Another The method is just simple and straight and you will use some of Gmail account settings that will allow you to transfer all the email to another account. And this is a feature of Gmail that probably no one of you was knowing before reading this guide. So follow up some simple steps below : Steps To Enable POP In Old Email Account To Import Mails To New Account: 1. First of all login into your Gmail account whose email you want to move to another account. 2. Now click on settings button there on below of your profile picture of your account.1 3. Now under settings click on Forwarding and POP/IMAP option and there enable Enable POP for all mail (even mail that’s already been downloaded). 4. At below select Mark Gmail Copy As Read in the drop down option and then simply click on save changes option. 5. Now visit your new Gmail account to which you want to get all your mails. 6. There click on Settings

Monitor secret connections that your computer makes.

How to see which websites your computer is secretly connecting to? Has your Internet connection become slower than it should be?  There may be a chance that you have some malware, spyware,  or adware that is using your Internet connection in the  background without your knowledge. Here’s how to see what’s  going on under the hood. It’s worth noting that most third-party firewalls will probably give you  this same type of information as well as block things that are trying to  connect… unless the applications managed to add an exclusion already.  Better check anyway. So, how do you find out what the problem is? There is an easy method using the netstat  command from a command prompt window. This works with Windows 10, 8, 7, Vista, and XP.  If you’re still using XP, make sure you are running at least Service Pack 2,  and just assume that somebody already hacked your computer because your operating  system is now a teenager. We will use the netstat command to generate

5 Common Mistakes That Fresh Hackers Make

5 Common Mistakes That Fresh Hackers Make Starting out as a beginner in hacking can be a lot of fun, but there are some common mistakes that most make. If you’re reading this, then you have the unique advantage of avoiding these mistakes when you’re still news. The following five points will tell you what not to do in your journey towards becoming a true hacker. 1. If you see a website offering hacking software or offering to hack email ids for money, avoid them. These websites are nothing but scams and won’t work. 2. A software that claims to hack giants like Google, Facebook, Yahoo and the like is a hoax. There are no such software available. You may get yourself hacked while trying to get these. 3. Don’t use keyloggers and Trojans found as freeware online. These software aren’t meant to be free and you will be giving access to your own computer to another hacker. 4. Programming and scripting languages are very important parts of any hacker’s arsenal. If you plan to u