Thursday 30 May 2013

5 Tips to secure your facebook account

Never share your passwords with anyone including your friends and family.  Browsing through a secure connection is always advisable.


Don’t get your news feed flooded with suspicious links. Ensure that you don’t click on any links of games, apps, and others that you are not sure of. Avoid permitting third party apps accessing your information. If you are not using any apps, it’s better to disable or remove those apps






Add a secondary email ID to your account. In case your profile is hacked, Facebook will send account recovery information to the secondary email ID also. Before these steps, understand the privacy policy of Facebook.
 



Ensure that you accept only persons you know as your friends as when you accept strangers, you allow them to access your personal information. It’s always better to avoid posting any financial or personal details.
 



Change your passwords regularly and use unique passwords. Don’t forget to activate your login notifications.Use letters, special characters and number combinations to make a strong password.The more long your password, the more you secure...







                 

Wednesday 1 May 2013

Guidelines for securing mobile devices

Guidelines for securing mobile device:

                     1/ Avoid downloading the content into mobile phone or laptop from an untrusted source.

                     2/ Be careful while downloading while downloading applications through bluetooth or
                         as MMS attachments .They may contain some harmful software which will affect the
                         mobile phone.

                     3/ Keep the bluetooth connection in an invisible mode, unless you need somw user to
                         access your mobile phone or laptops. If an unknown user tries to access the mobile
                         phone or laptop through bluetooth, move away from the coverage area of bluetooth so
                         that  it automatically gets disconnected,

                     4/ Delete the MMS message received from an unknown user without opening it.

                     5/ Read the mobile phone's operating instructions carefully mainly regarding the
                         security settings, pin code settings, Bluetooth settings, Infrared settings and procedure
                         to download an application. This will help in making your mobile phone secure from
                         malicious programs.

                    6/ Activate the pin code request for mobile phone access. Choose a pin which is
                        unpredictable and easy to remember for you.

                    7/ Use the call barring and restriction services provided by operators, to prevent the
                        applications that are not used by you or by your family members.

                    8/ Don't make  your mobile phone as a source for your personal data, which is
                        dangerous if it falls in to the hands of strangers. It is advisable not to store important
                        information like credit card and bank card's passwords etc..in a mobile phone.

                    9/ Note the IMEI code of your cell phone and keep it in a safe place. This helps the
                        owner to prevent access to the stolen mobile. The operator can block a phone using
                        the IMEI code.

                  10/ Regularly backup important data in the mobile phone or laptop by following the
                        instructions in the manual.

                  11/ Define your own trusted devices that can be connected to mobile phone or laptop
                        through bluetooth.

                  12/ Use free cleaning tools which are available in the Internet to make your mobile work
                        normally, when ever it is affected by malicious softwares.
 

Sunday 21 April 2013

Risks and threats by using chatting applications..

Security risks by using chatting applications:

                      Crackers or blackhat hackers have consistently used IM networks as vectors for
             delivering phising attempts, poison URLs and virus-laden file attachments. For ex: IM used
             to infect computers with spyware,viruses,trojans and worms.
                      
                      In addition to the malicious code threats, the use of instant messaging at works also
             creates a risk of non-compliance to laws and regulations governing the use of electronic
             communications in business.

                     Organisations of all types must protect themselves from the liability of their employees
             inappropriate use of IM. The informal, immediate and ostensibly anonymous nature of  
             instant  messaging makes it a candidate for abuse in the workplace.
   
                     Cyber criminals hide their identity through false name and age. Even grown up people
             may pretend to be a child/teenager.

Tips for make yourself secure:
                      
         1/ Be care full before choosing an online friend. Try to not reveal all your personal details
             to whome you meet online. Use nickname for yourself and hide your personal details from
             stranger.

        2/  Take your time and make sure that you are sending it to right address. Also cross check
              if you are chatting with the right person who is responsible enough to access those details.

        3/  Do not open the spam messages as it might inject malicious code into your pc. Always use
             updated IM and firewall versions. Be conscious before clicking on the link because it may
             contain spyware.

Friday 19 April 2013

Identity theft: A serious issue.......

IDENTITY THEFT:

                        Identity theft occurs when someone, without your knowledge gain some of your
             personal information and use it to commit fraud. Identity theft is a crime used to refer to
             fraud  that involves someone pretending to be someone else in order to steal money or get
             other benefits.The victim of identity theft (The person whose identity has been assumed
             by the identity thief) can suffer adverse consequences if they are held accountable for the
             perpetrator's actions.

Identity theft can be divided in two categories:

            .Application fraud:  Application fraud happens when a criminal uses stolen or fake document
                                            to open an account in someone else's name. Criminal may try to steal
                                            documents such as utility bills and bank statements to build up useful
                                            personal information.

            Account takeover :  Account takeover happens when a criminal tries to take over another
                                            person's account first by gathering information about the intended victim,
                                            and then contacting their card issuer masquerading as  the genuine card
                                            holder, and asking for mail to be redirected to a new address. The
                                            criminal  then report the card lost and ask for a replacement to be sent.

How to avoid identity theft?????????????                                          
                                            
                 1/ Never provide personal or financial information including your passwords, credit card
                     information, account numbers to unknown persons.
                
                 2/ Never click web links in your mail, chat box. It may contain malicious code that can
                     enter into your computer and retrieve the valuable information.

                 3/ Shred any sensitive documents before you throw them in to trash.

                 4/ Review your credit card bill every month to make sure there has not been extra charges.

                 5/ Review your credit card information regularly to  make sure there have not been new
                     issue cards or accounts.

                 6/ Don't participate in peer to peer networks if you are not familiar with this type of
                     networks.

What to do if it happens to you?????????????

                 1/ The first thing  to do is to report the crime to the police and get a copy of your report.

                 2/  Immediately contact your credit card issuing bank and close your existing account and
                     get replacements cards with new account numbers.

                 3/  Close any account which were opened without your awareness.

Follow steps when you online????

                 1/ Use phising filters in your Internet browser.

                 2/ Don't use passwords like name, date of birth , pet name etc...
            
                 3/ Look for digital certificates when you use credit card on Internet and also see that your
                     CVV number is typed in non clear text.
                

           


Tuesday 16 April 2013

Bypass Apple ios6 passcodes...

   Hacking apple ios 6...........
            
                     hello friends????? Today i ma going to tell you how to bypass apple iphone passcodes running ios6. By doing so, an unauthorized user can send mails, can edit contacts, make voice calls bla bla bla...It will provide you full access to the dialer, contact list, voicemails, call history and photos by editing a contact. An email or text message can be sent by sharing a contact.You can also be able to make a face Time call. FaceTime is accessible through the contacts.

Here are the steps to hack iphone ios 6......................

1/ From a locked iPhone running iOS 6, load the emergency dial screen.
2/ Press and hold the power button and then hit cancel.
3/ Make a fake emergency call — dialed 112.
4/ Hang up immediately.
5/ Hit the power button to put the phone back in standby.
6/ Hit the home button to bring up the lockscreen
7/ Hold down the power button and at the three-second mark, hit the Emergency Call button.
8/ Keep holding the power button until the Phone App comes up.
9/ Hit the Home Button and release as if you’re taking a screen shot.

Saturday 13 April 2013

How can you send messages in facebook though you are blocked by someone..................

Send messages though you are blocked....!

How you can send messages in facebook though you are blocked by someone???????
do you think it is possible friends????
  
Here below is the trick. Use today and enjoy sending uninterrupted messages to your love one who have blocked you.

 1>> Log into your email account.

 2>> Compose a new email

 3>> In "send to" enter   
         username@facebook.com.  (for example: john@facebook.com  replace username 
         with john so its look like john@facebook.com.)

4>> Send it.........and have fun...your message will directly reach in the inbox. 

 

Know more about CAPTCHAs...............Definition and Applications....

...??? What actually CAPTCHAs Are??????

A CAPTCHA is a program that can generate and grade tests that humans can pass but current computer programs cannot. For example, humans can read distorted text as the one shown below, but current computer programs can't:

CAPTCHA example
                           
The term CAPTCHA (for Completely Automated Public Turing Test To Tell Computers and Humans Apart) was coined in 2000 by Luis von Ahn, Manuel Blum, Nicholas Hopper and John Langford of Carnegie Mellon University. At the time, they developed the first CAPTCHA to be used by Yahoo.

In other words,  a CAPTCHA is a type of challenge-response test used in computing as an attempt to ensure that the response is generated by a human being. The process usually involves a computer asking a user to complete a simple test which the computer is able to grade. These tests are designed to be easy for a computer to generate but difficult for a computer to solve, but again easy for a human.


                                           Applications of CAPTCHAs

Protecting Website Registration:  Several companies (Yahoo!, Microsoft, etc.) offer free email services. Up until a few years ago, most of these services suffered from a specific type of attack: "bots" that would sign up for thousands of email accounts every minute. The solution to this problem was to use CAPTCHAs to ensure that only humans obtain free accounts. In general, free services should be protected with a CAPTCHA in order to prevent abuse by automated programs.

Preventing Comment Spam in Blogs: Most bloggers are familiar with programs that submit bogus comments, usually for the purpose of raising search engine ranks of some website (e.g., "buy penny stocks here"). This is called comment spam. By using a CAPTCHA, only humans can enter comments on a blog. There is no need to make users sign up before they enter a comment, and no legitimate comments are ever lost!

Preventing Dictionary Attacks: CAPTCHAs can also be used to prevent dictionary attacks in password systems. The idea is simple: prevent a computer from being able to iterate through the entire space of passwords by requiring it to solve a CAPTCHA after a certain number of unsuccessful logins.

Worms and Spam: CAPTCHAs also offer a plausible solution against email worms and spam: "I will only accept an email if I know there is a human behind the other computer." A few companies are already marketing this idea.

Search Engine Bots: It is sometimes desirable to keep webpages unindexed to prevent others from finding them easily. There is an html tag to prevent search engine bots from reading web pages. The tag, however, doesn't guarantee that bots won't read a web page; it only serves to say "no bots, please." Search engine bots, since they usually belong to large companies, respect web pages that don't want to allow them in. However, in order to truly guarantee that bots won't enter a web site, CAPTCHAs are needed.

Online Polls:  In November 1999, http://www.slashdot.org released an online poll asking which was the best graduate school in computer science (a dangerous question to ask over the web!). As is the case with most online polls, IP addresses of voters were recorded in order to prevent single users from voting more than once. However, students at Carnegie Mellon found a way to stuff the ballots using programs that voted for CMU thousands of times. CMU's score started growing rapidly. The next day, students at MIT wrote their own program and the poll became a contest between voting "bots." MIT finished with 21,156 votes, Carnegie Mellon with 21,032 and every other school with less than 1,000. Can the result of any online poll be trusted? Not unless the poll ensures that only humans can vote.