Sunday, 28 June 2015

How to Use Pendrive as RAM memory in Windows 7?



Plug in your pendrive -> Format with NTFS or FAT32

Now go to properties ->Select ReadyBoost

Check Use this device ->Choose maximum space to reserve system speed

Click on Apply and OK.Your Readyboost PenDrive is ready Now to Use

Things you need to know to become a hacker:

1) Never trust sites that ask you for money in return of Hacking Softwares or who claim to Hack Email Id’s in return of money. All such things are Scam . Nothing Works.

2) There is NO DIRECT SOFTWARE to Hack Facebook , Google , Yahoo or any other big website. All the softwares that claim to do so are scam. They are just meant to take your money and in worse cases, those softwares have trojans or keyloggers in them. As a result your account gets hacked trying to hack others.

3) NEVER EVER use the keyloggers or trojans you find as freeware on internet. Hackers are not fools. They compile keyloggers and trojans almost with any such software and when you install them , you are already hacked before even trying to hack others.

4) You are never going to be a good hacker without the knowledge of programming and scripting languages. When you are going to use only ready made softwares and would depend on them for hacking anything then your functionality would be limited upto the functionality of the software. When you are not going to use your brain , just doing the copy paste thing, then how can you even think of being a good hacker.

5) If you are a good Hacker, you already become a good programmer , a good script writer , a good web developer and an excellent security expert. Well any good Hacker will/should have good knowledge of various aspects and programming languages. to do XSS (Cross Site Scripting ) , PHP INJECTION , SQL INJECTION , PHISHING , FOOTPRINTING etc… you will have to be good at programing and scripting. And when you know the Various loop holes , vulnerabilities and security tips, you already become a Computer Security Expert.

So Never Ever Under estimate the term Hacker. A Hacker Is Not a person who just hacks email id’s or servers but a True Hacker is a Computer Genius who the knowledge of computers more than anyone

What is Session Hijacking? Explained!


Session Hijacking is Stealing the
existing active Session. The main
purpose of Session Hijacking is to
bypass authentication process and
gain unauthorized access to the
computer or Website. In simple
words , hackers will login as some
other client using their Sessions.
TCP session hijacking is when a
hacker takes over a TCP session
between two machines. Since most
authentication only occurs at the
start of a TCP session, this allows
the hacker to gain access to a
machine
Different Session Hijacking methods:
Session stealing is achieved by
following methods
1. Session fixation: In this method,
the Hacker sets a user's session id
to known victim. For example,
Hacker will send email to known
victim with a link that contains a
particular session id. If the victim
followed that link, the hacker can
use that session and gain access.
2. Session SideJacking(session
Sniffing): In this method, the
attacker use packet sniffing to and
steal the Session cookie. In order to
prevent this, some websites use SSL
(encrypts the session). but do not
use encryption for the rest of the
site once authenticated. This allows
attackers that can read the network
traffic to intercept all the data that
is submitted to the server or web
pages viewed by the client.
Unsecured Hotspots are vulnerable
to this type of Session Hijacking.
3. Client-side attacks (XSS, Malicious
JavaScript Codes, Trojans, etc):
Hacker can steal the Session by
running the Malicious Javascript
codes in client system. Usually
hackers attack some websites using
XSS and insert their own Malicious
Javascript codes.
In client point view it is trusted
website, he will visit the website.
When victim visit the link ,
Malicious Javascript will executed. It
will steal the Session cookies and
other confidential data.
4. Physical access: If the hacker has
physical access, it is easy for him to
steal the Session. Usually this will
occur in public cafe. In public cafe ,
one use login to some websites
(facebook, gmail). A hacker come
after victim can steal the session
cookies

How to keep your PC secured? Few Tips that can help you all

Nowadays a lot of people tries to access your computer. There are many worms, Trojans, spywares which allow remote users to get access to your computer. There are some methods which you can implement to make your PC secure.

I. Update your OS.

Update your operating system regularly, automatic update is recommended. This helps to remove bugs and prevents viruses and bad guys from exploiting them. Every user must install updates, especially security updates.
If you don’t install latest updates then you are leaving your computer at risk.

II. Always use genuine software.

Not only using pirated software is illegal but all websites which provide these pirated software downloads are full of malwares and viruses.
More than 90 percent of pirated software’s contain worms in their crack file.
If you are really serious about security of your accounts and information then genuine software’s are recommended.

III. Update your software’s.

Similar to OS updates you must update your browsers, any any other software which connects to internet for whatever reason it may be.
Update other software’s like Microsoft Office, Adobe Reader, Adobe Flash, Adobe Shockwave, and Oracle Java. Adobe Flash player and java are the main target of the bad guys.The Tutorial is provided by Cyber Elite.
Cracked or pirated software’s contains viruses and worms, better use genuine.

IV. NO trial Antivirus.

Antivirus helps protect from viruses, worms, Trojans etc. But you should update it regularly to be safe from latest threats.
Never use trial, free or pirated antivirus programs, most of them are gateway for viruses and worms.
Haven’t you noticed your system hangs or reboots whenever you antivirus is about to expire.
Don’t buy security software in response to unexpected pop-up messages or emails, especially messages that claim to have scanned your computer and found malware.
Scammers send messages like these to try to get you to buy worthless software, or worse, to “break and enter” your computer.

V. Install a Firewall.

Firewall blocks the security holes in your OS or any other software. Some antivirus programs provide firewall with them. Better use total protection antivirus.

VI. Enable file extensions.

Sometimes viruses are hidden in images or document file.
File name displayed will be “abc.doc”, but the actual name of the file may be “abc.doc.exe”.
However, this is not a problem for win7 or win8 users.

VII. Be cafeful while using P2P software.

P2P software’s like torrent, bit torrent, etc.
Files downloaded through this type of software’s may contain worms, Trojans and viruses.

VIII. Use secure passwords.

Secure password helps unauthorized access.
Avoid common words like names, birthdays, etc
Use different passwords for all your accounts and connections, if you cant remember all of them then use a password manager.
A secure password consists of at least eight characters and contains a number, an uppercase letter and a special character. Read more about secure password here.

IX. Use a Router when you are online.

It prevents direct attack on your system. Nowadays ISP provides modem cum router.
Change router password from default to any other password, because everyone knows default password is "admin" for most routers.
Update firmware of router, this helps in closing security holes in the router.

X. Keep Administrator account different.

If you use an administrator account on your PC, malware may also execute as admin.
Vista, win7 and win8 provide User Account Control (UAC), still better is not to use an admin account.
Create a new user with required permission and then use it.

XI. Protect from physical threats.

Provide BIOS a password, most users do not do this.
Don’t use external HDD or USB from un-trusted sources.

Difference between a Virus, Worm, Trojan Horse and a Blended Threat!

What Is a Virus?

computer virus attaches itself to a program or file enabling it to spread from one computer to another, leaving infections as it travels. Like a human virus, a computer virus can range in severity: some may cause only mildly annoying effects while others can damage your hardwaresoftware or files. Almost all viruses are attached to anexecutable file, which means the virus may exist on your computer but it actually cannot infect your computer unless you run or open the malicious program. It is important to note that a virus cannot be spread without a human action, (such as running an infected program) to keep it going. Because a virus is spread by human action people will unknowingly continue the spread of a computer virus by sharing infecting files or sendingemails with viruses as attachments in the email.

What Is a Worm?

A worm is similar to a virus by design and is considered to be a sub-class of a virus. Worms spread from computer to computer, but unlike a virus, it has the capability to travel without any human action. A worm takes advantage of file or information transport features on your system, which is what allows it to travel unaided.
The biggest danger with a worm is its capability to replicate itself on your system, so rather than your computer sending out a single worm, it could send out hundreds or thousands of copies of itself, creating a huge devastating effect. One example would be for a worm to send a copy of itself to everyone listed in your e-mail address book. Then, the worm replicates and sends itself out to everyone listed in each of the receiver's address book, and the manifest continues on down the line. 
Due to the copying nature of a worm and its capability to travel across networks the end result in most cases is that the worm consumes too much system memory (or network bandwidth), causing Web servers, network servers and individual computers to stop responding. In recent worm attacks such as the much-talked-about Blaster Worm, the worm has been designed to tunnel into your system and allow malicious users to control your computer remotely.

What Is a Trojan horse?

A Trojan Horse is full of as much trickery as the mythological Trojan Horse it was named after. The Trojan Horse, at first glance will appear to be useful software but will actually do damage once installed or run on your computer.  Those on the receiving end of a Trojan Horse are usually tricked into opening them because they appear to be receiving legitimate software or files from a legitimate source.  When a Trojan is activated on your computer, the results can vary. Some Trojans are designed to be more annoying than malicious (like changing your desktop, adding silly active desktop icons) or they can cause serious damage by deleting files and destroying information on your system. Trojans are also known to create a backdoor on your computer that gives malicious users access to your system, possibly allowing confidential or personal information to be compromised. Unlike viruses and worms, Trojans do not reproduce by infecting other files nor do they self-replicate.

What Are Blended Threats?

Added into the mix, we also have what is called a blended threat. A blended threat is a more sophisticated attack that bundles some of the worst aspects of viruses, worms, Trojan horses and malicious code into one single threat. Blended threats can use server and Internet vulnerabilities to initiate, then transmit and also spread an attack. Characteristics of blended threats are that they cause harm to the infected system or network, they propagates using multiple methods, the attack can come from multiple points, and blended threats also exploit vulnerabilities.
To be considered a blended thread, the attack would normally serve to transport multiple attacks in one payload. For example it wouldn't just launch a DoS attack — it would also, for example, install a backdoor and maybe even damage a local system in one shot. Additionally, blended threats are designed to use multiple modes of transport. So, while a worm may travel and spread through e-mail, a single blended threat could use multiple routes including e-mail, IRC and file-sharing sharing networks.
Lastly, rather than a specific attack on predetermined .exe files, a blended thread could do multiple malicious acts, like modify your exe files, HTML files and registry keys at the same time — basically it can cause damage within several areas of your network at one time.
Blended threats are considered to be the worst risk to security since the inception of viruses, as most blended threats also require no human intervention to propagate

Tips to Combat Viruses, Worms and Trojan Horses on Your Computer:

*Keep The Operating System Updated

*Use a Firewall

Explained! Pen Drive viruses!

If your Pen Drive is infected with any of the following viruses:
Autorun.inf
new folder.exe
Iexplorer.vbs
Bha.vbs
nfo.exe
New_Folder.exe
ravmon.exe
RVHost.exe or any other files with extension.
Actually this viruses are hidden and can't be seen even after you enable show hidden folders.Following simple dos command will change the attributes of these files ,there after you can remove it by pressing delete
key.
Follow these steps
:
1.:Type cmd in Run
2.: Switch to the drive on which pen drive is connected
(like C:\> h: enter)
3.: type exactly as attrib -s -h *.* /s /d and hit enter
(don't forget spaces).
Now you can see hidden virus files and you can delete them

AMAZING Google tricks!



1. GO on google and type in
Google Gothic and click on i m feeling lucky.

2. Go on google and type in
poopgle and click i m feeling lucky

3. Go on google and type in Google loco and click i m feeling lucky

4. Go on google and type in i33t and click i m feeling lucky

5. Type in ewmew fudd and click i m feeling lucky

6. Type in xx-klingon and click I m feeling lucky

7. Type in xx-piglating and click on i m feeling lucky

8. Type in google BSD and click i m feeling lucky

9. Type in Google Linux and click i m feeling lucky

10. Type in google easter egg and click i m feeling lucky

11. Type in Google Cheese and click i m feeling lucky

12. Type in Google Swedish and click i m feeling lucky!

13. Type in 2204355 and click i m feeling lucky 
(AND THIS ONE IS VERY
RARE AND ONE OF THE BEST!)

14. Type in Google chinese 
and click i m feeling lucky!!!

15. Type in Google latin and click i m feeling lucky