H4hackers..
Saturday, 29 October 2011
Thursday, 27 October 2011
Are you a hacker..
Are you a hacker? If you are geek then chances are you have searched Google
for hacking tools. Chances are most geeks do not end up being Hackers
but only fantasizing about it. Code is very important to geeks who are
programmers and Google is full of them.
To show their appreciation for the Geek community Google has come up with a Google Search specially for hackers. Just visit http://www.google.com/webhp?hl=xx-hacker
To show their appreciation for the Geek community Google has come up with a Google Search specially for hackers. Just visit http://www.google.com/webhp?hl=xx-hacker
Are you safe from hacker..?
You may think hackers are only focused
on FBI break-ins and bank accounts, but nothing could be further from
the truth. According to a Ponemon Institute report published this June,
90 percent of surveyed businesses reported at least one IT security
breach in the past 12 months. Any breach compromises user data, which
means your online activity is always vulnerable to attacks. In fact,
many users are most at-risk when visiting their favorite sites. Here
you’ll find out where you’re most likely to get hacked, and how you can
safeguard your personal information.
Social Networking Sites
These sites are the most popular places
users can get hacked. We’ve seen well-publicized reports of
celebrities’ Twitter accounts being hacked, and Facebook also has its
share of troubles. Not only is your public reputation at stake, your
personal information can be lifted and used to access other accounts.
Phishing scams for these sites are common. These catch users by sending
a link that looks and seems like a social networking login page, but is
a fake (see image below).
These phony webpages record your
username and password, with the intent of using the information
elsewhere. In addition to your online reputation being compromised,
hackers may use the information to gain access to your bank accounts,
etc.
Stay safe tip: Don’t
post sensitive personal information on your profile: name, address,
phone number, or other identifiable information. Always login from the
actual site page. Create a separate password for each
account and avoid common or obvious names or patterns (the more
numbers, symbols, mixed case you use, the safer the password).
Online Banking
Although online banking sites generally
do all they can to protect their customers’ information, it is not a
hack-proof network. Phishing scams are one method, but keylogging is
another covert technique used to record your keystrokes and mouse
activity. This method targets your computer’s operating system by
installing a virus, which tracks your every move.
Stay safe tip: In
addition to password protection, use security software, such as
ZoneAlarm Extreme Security, which stops malicious software from
attacking your computer and bolsters your firewall. And always update
your operating system to deploy the latest security patches.
Your email account is highly
vulnerable. Hackers tend to target large providers like Gmail, which
has had several breaches in the last year. Some safeguards, like
password security questions, are easily answered thanks to the
information available from social networking profiles (another reason
not to post!). Another discreet way hackers monitor your email is
through email forwarding.
Stay safe tip: Do not
share information with unknown sources – no “company representative”
will ever request address or password via email. You should also verify
your settings to make sure your mail is not being forwarded to an
unknown account. Also, avoid accessing your email over an unsecured
network (free Wi-Fi at your local café, for instance). This only
increases your chances of being hacked.
Online Shopping
The ease and convenience of online
shopping has created a multi-billion dollar industry. And with all
those transactions, hackers are eager to intercept your communication –
and money.
Stay safe tip: Verify
that a business is reputable, and that you are shopping on the
appropriate site. Sites with user-rated sellers or that have been
verified by a third-party are more likely be accountable and have
better safeguards in place. When purchasing, double check that the URL
begins with the https:// protocol identifier. This means
you’re on a secure network that encrypts information being exchanged
between you and the site (instead of the unsecured http://).
You should also avoid leaving a digital
trail of transactions, in the form of individual credit card files and
accounts for each site. Use a digital wallet service, like PayPal, that
protects your payment information. Also keep your online browser
updated to offer more security measures.
Though there are many reputable sites
that put their users best interests at heart, it’s up to each user to
safeguard their online activity. Educating yourself, using common
sense, and taking precautions will minimize your chances of being
hacked.
Monday, 24 October 2011
Advantage of Jailbreaking iPhone
ilbreaking of iPhone is very popular since Apple
has launched iPhone devices, a mass community of iPhone Dev Team is
putting their effort in Jailbreaking of iPhone with every new iOS
releases by apple. Do you know the advantages of Jailbreaking an
iPhone? if not then you must have to read this post and know the advantage of jailbreaking iPhone.
iOS jailbreaking, or simply jailbreaking, is the process of removing the limitations imposed by Apple on devices running on the iOS operating system through use of custom kernels. Such devices include the iPhone, iPod Touch, iPad, and Apple TV 2G. Jailbreaking allows users to gain full access (or root access) to the operating system, allowing iOS users to download additional applications, extensions, and themes that are unavailable through the official Apple App Store, via installers such as Cydia. You can refer my post about Jailbreak iPhone 4 on iOS 4.3.3(8J2) using redsn0w_win_0.9.6rc17.
A jailbroken iPhone, iPod Touch, or iPad running iOS can still use the App Store, iTunes, and other normal functions, such as making telephone calls. Unlike rooting an Android device, jailbreaking is necessary if the user intends to run software not authorized by Apple.
At its core, jailbreaking an Apple iOS device gives access to its root filesystem, allowing modification and installing third-party software components. This gives the user more control over the device and may enable features that were previously unavailable. In many cases, jailbreaking also voids the device’s warranty.
iOS jailbreaking, or simply jailbreaking, is the process of removing the limitations imposed by Apple on devices running on the iOS operating system through use of custom kernels. Such devices include the iPhone, iPod Touch, iPad, and Apple TV 2G. Jailbreaking allows users to gain full access (or root access) to the operating system, allowing iOS users to download additional applications, extensions, and themes that are unavailable through the official Apple App Store, via installers such as Cydia. You can refer my post about Jailbreak iPhone 4 on iOS 4.3.3(8J2) using redsn0w_win_0.9.6rc17.
A jailbroken iPhone, iPod Touch, or iPad running iOS can still use the App Store, iTunes, and other normal functions, such as making telephone calls. Unlike rooting an Android device, jailbreaking is necessary if the user intends to run software not authorized by Apple.
At its core, jailbreaking an Apple iOS device gives access to its root filesystem, allowing modification and installing third-party software components. This gives the user more control over the device and may enable features that were previously unavailable. In many cases, jailbreaking also voids the device’s warranty.
Advantage of Jailbreaking iPhone
- Under the DMCA of 2010, jailbreaking Apple iDevices is legal in the United States, although Apple has announced that the practice “can void the warranty.
- Cracked iPhone Games and Apps Installation – Jailbreaking is necessary if the user intends to run software not authorized by Apple.
- Gain deeper customization of device (e.g. theming, redesigned user interfaces and customize lock screens.)
- Jailbreaking also allows users to use paid apps from the App Store for free.
- It’s Fast and Easy – One of the best thing about jailbreaking an iPhone is you can easily jailbreak it within few minutes.
- Video chat over 3G Network – FaceTime video chat is a new feature of the iPhone 4, but it only works over a Wi-Fi network, which may be difficult to find in many situations. Jailbreaking the iPhone 4 allows for FaceTime video chat over a 3G connection.
Saturday, 22 October 2011
www.WDYL.com from GOOGLE
Google has also tried to allure users to use the services they might not have checked out earlier; say calling someone through Google Voice or promoting Google Chrome for faster web access.
The idea behind this is to find a way to connect the people to products that they might not be knowing about. As google calls it, it’s a ‘wonderful things dashboard‘ that you can even share with your friends through Gmail itself or share it on Google+ or Buzz, right there. It actually ‘awesomely awesome’ that there’s a lot you can do from a single search engine, WDYL.
Check out the website yourself at www.WDYL.com. But before that, go through the video and check the search engine in action:
How to Restore Contacts in Gmail
Just log-in to your Gmail account and head over to “Contacts” section (tab). Look for “More actions” menu and click “Restore contacts“.
Next, you’ll see a pop-up section which allows you to choose the duration upto which you wish to restore your contacts. Currently, 30 days is the maximum duration offered by Gmail, so choose accordingly.
In the next step, click “Restore” to revert back to the chosen time:
Wait a second, and you’re done! Depending on what duration you selected above, you’ll see the ‘success’ message as below:
Your contacts have been restored to the original state!
Even if you accidentally deleted your contacts while tweaking the contacts section or organising them or may be it happened while syncing it to some other device, you have a solution for it now!
Secure USB Drives with BitLocker
Secure your USB flash drives using BitLocker encryption. Right-click on your USB drive in My Computer, select Turn on BitLocker and follow the instructions to protect sensitive data on your thumb drives.
The next time you use your USB drive on another computer, it will prompt you for the password before allowing you read-only access to your flash drive. You can even use the drive on older computers running Windows XP/Vista.
The next time you use your USB drive on another computer, it will prompt you for the password before allowing you read-only access to your flash drive. You can even use the drive on older computers running Windows XP/Vista.
Subscribe to:
Posts (Atom)