Archive for 2014
How to make a Shutdown Timer in Windows
There are so many
software available that can make your PC shut down at any pre-defined
time. But have you ever wonder you can
make your PC shut down timer easily without downloading any software. You may
laugh on it as it seems so simple trick but many people still needs it. So,
here I am going to tell you two simple methods to make a PC shutdown timer.
Method 1:
This method is very simple.
You can do this by creating a shortcut file and then enter the location of
shutdown timer. Here are the steps to follow:
Right click on your
desktop and choose “New=>shortcuts”.
In the box that says
“Type the location of the shortcut”, type in ‘shutdown -s -t 3600′ without the
quotation marks and click next. (Here 3600 are the amount of seconds before
your computer shuts down.)
Make up a name for the
shortcut and you’re done.
TO ABORT this:
Once you start shutdown timer,
you will need to create another shortcut as you created earlier but this time
you will have to provide another address.
To make an abort key to
stop the shutdown timer just create another shortcut and make the ‘location of
the shortcut to ‘shutdown -a without the quotes.
Method
2:
The above method is not
so much helpful when you want your PC to shut down on a specific time. Suppose
you want to listen songs at night and you want it to stop automatically at
11:59 PM. You can simply do this by following method
·
Click on Start-> Run or Press Win+R
·
Enter the code: at 23:59 shutdown -s
·
Make sure that you enter time in 24 hour
format.
TO ABORT this:
To abort this timer, follow the same process but this
time use shutdown -a code in run.
TOP 10 MYSTERIOUS WEB BROWSERS FOR WINDOWS
Top 10 mysterious web browsers for windows. Users who
use Windows operating system are more aware of well-known web browsers, like
Google Chrome, Internet Explorer, Mozilla Firefox, Opera etc. But there are
many other browsers are available in the market with unique features
BLACKHAWK BROWSER
BlackHawk is a user-friendly web browser with special
cookie handling feature, combines the running speed of Chrome with the useful
functionality of Firefox. BlackHawk provides exceptional cookie handling.
NETGROOVE BROWSER
NetGroove is a graceful, fast and tabbed web browser
can be access directly from your flash drive without install it, works on the
Internet Explorer Engine.
BEAMRISE BROWSER
It is a social web browser provides amazing
animations, graphic bookmarks and even free texts given by Android, joins
chatting and browsing with each other, facilitates you to chat using your
friendly social networks and video chat via the browser itself.
WYZO BROWSER
Wyzo is basically the Media Browser because it
enhances the online media skill of a user, supports all well-known and common
add-ons for Mozilla-based browsers. It permits users to download torrents in a
single click.
BROWZAR BROWSER
Browzar web browser privacy is awesome for cloud and
banking applications; it does not save browsing History, Cookies, Temp files,
Passwords, Cache etc. After closing work and browser nothing get saves in the
history.
QT WEB BROWSER
It is a fast and lightest open source web browser
with secure unique user interface, based on Nokia’s QT framework and Apple’s
Webkit.
EPIC BROWSER
A web browser powered by Mozilla. It provides Indians
latest films and songs, live cricket scores, news from multiple sources such as
regional and Hindi language sources. It provides safe surfing; while surfing no
one can track what you have browsed using it.
U BROWSER
U web browser developed by Conduit. It is a free easy
to use Chromium-based web browser with many social tools good for those who
want to be social. U browser makes easy connection between you, web, friend and
even mobile devices.
DOOBLE BROWSER
Dooble was released in September 2009; an open source
web browser works on multiple platforms, goals to offer better secrecy and
usability. Currently, it is supporting Windows, OS X, Linux and FreeBSD. Dooble
with many features supports built-in download manager and third party plugins
too.
COOWON BROWSER
Google Chrome based browser particularly made for
gamers because using it we can automate our tasks, Record and Play by one mouse
click, avail the Gamepad that controls the game speed during pay time.
Cybersecurity skills need boost in computer science degrees
University
computer science courses are failing to make clear the need to develop skills
in cybersecurity, leaving the UK with a shortage of experts
This
is according to a paper published jointly last week by the Council of
Professors and Heads of Computing and (ISC)2, the International Information
Systems Security Certification Consortium.
“Twenty
years ago very few courses paid any significant attention to security, and the
situation has started to change, albeit slowly,” says “Perspectives:
Integrating Cybersecurity into Computer Science Curricula”.
This
is despite “a growing voice from industry that cybersecurity knowledge should
be core to the disciplines of computing and information technology”, meaning
such skills should therefore be “a key element of the computing and computer
science curriculum, particularly at the undergraduate level”.
Currently
most institutions offer computer science courses in which there is one module
or unit – approximately 5 per cent of the total credits – dedicated to
cybersecurity in a three-year degree, the paper claims.
It
also notes that graduates find it difficult to enter the cybersecurity industry
because “the supervisory cost of placements is very high for companies to take
on many graduates of any kind in cybersecurity roles”.
“Academia
must look at its curricula and accreditation requirements,” said Liz Bacon,
president of the Chartered Institute for IT, adding it was also incumbent on
industry to accept more trainees and placement students.
She
said that more sandwich placements needed to be made available, and that
lecturers could not single-handedly boost interest in cybersecurity among
students, and that “talks from external speakers” and “war stories” from
industry were more likely to excite students.
“It
is not enough to integrate technical cybersecurity subjects into computing
degrees as cybersecurity is an increasingly a diverse discipline, requiring a
mix of business savvy, soft skills and technical skills for varied roles,”
added Adrian Davis, managing director (Europe, the Middle East and America) of
(ISC)2.
“Universities
have a real opportunity to include and make explicit reference to cybersecurity
topics within many degrees.”
In
August, the first GCHQ-certified master’s courses were unveiled, with Edinburgh
Napier University, Lancaster University, the University of Oxford and Royal
Holloway, University of London, among those accredited.
Making Malware Cleanup Easier
Making Malware cleanup easier
You'll
find a recommendation to install software to detect and clean up malware in
almost any security guide. Although a single product isn't sufficient to defend
against all modern security threats, the general recommendation persists
because the technology remains effective in blocking categories of known
threats and cleaning up malware infections if they find their way onto your
computer. Since resolving a malware problem is a little bit different each
time, we're committed to working with our partners to give people on Facebook
the help they need in keeping their information secure.
Our
goal is to make it easier for people to find and use the right technology to
better protect their devices. We've worked with F-Secure and Trend Micro to
incorporate free anti-malware software downloads directly into our existing
abuse detection and prevention systems. These are the same systems that help us
block malicious links and bad sites from among the trillions of clicks that
take place every day on Facebook.
How to Unlock Pattern Locks on Android Devices
How to Unlock Pattern Locks
on Android Devices
Nowadays many android phone users use the
inbuilt “pattern locks” as a security to their phones. But the main problem
with it is that, if you forget the pattern you used and you try out many wrong
attempts, it gets locked permanently. So, just follow these simple steps
to unlock pattern locks on your android device and use it again free
of cost.
Unlock using Google Account :
If you don’t have data connection or internet access or if you
don’t have your google account linked to your phone, then, you can skip this
step and refer the Additional TRICK.
When you try different patterns and unable to unlock your phone in five attempts. Then a message
pop-up and shows two buttons “next” and “try again”. Now click on “next” button
and you see two options for unlocking phone. One is answer the
security question and the second option is to provide Google account details.
Mostly people don’t set a security question. But if you set it
then simply answer the question and unlock your device
quickly. Otherwise check the Google account option and click “next”.Now provide
your Google account username and password attached with your device and click
on “sign in”. After that you are directed to choose new pattern and now you can
unlock with this pattern.
1) Switch off the phone.
2) Now hold these buttons all together at the same time
“Volume up +
Home Key + Power Button”
until the phone boots (if you device doesn’t have a home button
just hold together volume up key and power key)
3) Now a screen like DOS will come up with different options
4) Use the volume key to move up and down then scroll down to
“Restore Factory Defaults” or “Delete all User Data” depending on which is on
your device. Select this factory reset option and then press power button to
let the action begin.
Now it asks you for confirmation, select “yes”.
5) After clicking on the settings above, now scroll down to
“Reboot System Now” and wait for your phone to reboot (restart).
What is keylogger? And how to be safe from Keylogger
WHAT IS KEYLOGGER? AND HOW TO BE SAFE FROM KEYLOGGERS
I am
going to talk about the most use piece of software besides from RAT by hackers
to observe your activities on your computer and that is keyloggers. A keylogger
is a software or hardware device which monitors each and every key typed by you
on your keyboard. I am going to talk about different types of keylogger and how
to be safe from keyloggers. So lets learn somthing about keyloggers.
1. What
is keylogger ?
You
might have heard about keyloggers but really dont know what they are reading
this article will clear your mind. A keylogger also know as keystroke logger is
software or hardware device which monitors each and every key typed by you on
your keyboard. You can not identify the presence of keylogger on your computer
since it runs in background and also it is not listed in task manager or
control panel. It can be used by parents to keep eye on their childrens or
company owner to spy on their employes.
2. How it can harm you ?
In
this section i will talk about how keylogger can harm you in different ways for
example It can be used by your enemy or friend to get sensitive information
such as your username and password, Bank credit card details, or any other
activities you do on your computer.
Example:
You login in to your Facebook account from a computer in which keylogger is
install then your username and password will be captured.
3. Types of
keyloggers
There
are two types of keylogger hardware keylogger and software keylogger. Software
keylogger is install in your computer where as a Hardware keylogger is attached
to your keyboard. Looking at below images will clear your mind.
4.
How to Protect yourself from keyloggers ?
Keylogger can be used by your enemy to get sensitive information such as your
Bank credit card details, or password of any social networking sites etc. In
order to be safe keep following points in your mind.
Never
use your online banking from cyber cafe. If you want to use then you can try
this method. open notepad and type anything Then copy and paste each word that
comes in your username or password.
You
can even use above method to protect your facebook profile, yahoo or gmail id.
When
you enter cyber cafe make sure that no hardware device is attached to keyboard
wire. Its look something similar to above image.
How to Recover Deleted Files on Pc
How to Recover Deleted Files on Pc
When
you delete any file in windows it goes to recycle bin where you can easily
restores it as it has restore option. But which method or hacks is used to
recover your files when you delete it permanently (In windows by pressing
Shift+DEL). Sometimes we accidently deletes images, videos and important
document files from your pc, Pen drive, SD card or anything else then how can
you recover it ? Well don’t worries about it there are many powerful file
recovery software available on the internet which let you to recover
permanently deleted files from your pc. As I told you that there are a lots of
hard drive recovery services. Now I’m going to tell you the top best data
recovery applications.
1. Recuva
Recuva is
one of the most popular and powerful file recovery tool for Windows. You will
find it very easy to navigate because of it’s clean interface user-friendly
options. It has following features :
• Undelete files on your computer
• Recover deleted emails
• Securely delete files you want to
erase forever
• Restore unsaved Word documents
Recovering
files vis Recuva is very easy you have
to simply download and install the Recuva then after opening it now select what
you want to restore. You can search for deleted Pictures, music, documents,
videos, compressed files or emails. If you’re not sure about file name, just
select ‘All Files’ option. Now select the file, either right-click on it press
Recover button to recover it.
2. Panda Recovery
Panda
recovery is the another best hard drive recovery service/tool for recovering
files. It helps to recover deleted files from hard drive, USB, Network drives
etc. It is best because of following features :
• Browse, Search, Preview and Recover
deleted files.
• Recover Archived, Hidden, Encrypted,
Compressed files.
• Recover Images, Documents, Movies, or
any other type of files.
• Recover to Local Hard Drive, Network
Drive, or Flash Drive.
The
process of recovering files from Panda recovery is very simply you have to just
follows wizard and its instructions.
3. Test Disk
This
is also the one of best hard drive recovery service providing software. It is a
powerful free data recovery software which helps to recover lost partitions
andor make non-booting disks bootable again when these symptoms are caused by
faulty software, certain types of viruses or human error (such as accidentally
deleting your partition table). TestDisk is available for lots of operating
systems, including Linux, Windows, and Mac OS, and supports lots of file systems.
It has following features :
• Fix partition table, recover deleted
partition.
• Rebuild NTFS boot sector.
• Undelete files from FAT, exFAT, NTFS
and ext2 file system.
• Recover NTFS boot sector.
You need
to be careful for using this and better to use on screen instructions while
using it.
4. Reclai Me
This is
another data recovering software. It is simple tom use because if it’s user
friendly interface more ever it can recover files under Windows (FAT16, FAT32,
exFAT, NTFS, ReFS file systems), Linux (EXT2, EXT3, EXT4 and XFS file systems),
Mac(HFS, HFS+ and UFS file systems). It has following features :
• Undelete a single file or multiple
files.
• Unformat a hard drive (desktop and
laptop).
• Recover RAW file system drive.
• Recover data in case of boot failure.
Just
simply follow on screen instruction to recover data using ReclaiMe.
5. Restoration
Last but
not least, this one very simple to use. Restoration works with FAT and NTFS as
well as digital cameras cards. It is also powerful tool for recovering
lost/deleted data. It has following features:
• Recover deleted files.
• Undelete files.
• Unformat a hard drive.
• Photo recovery.
Just as
others to use it simply follows the on screen instructions.
So, in
this way you recover deleted files on pc and this is all about hard drive
recovery service/tools. I hope this helped you a lot.
About 5 million Gmail IDs and passwords leaked
About
5 million Gmail IDs and passwords leaked
Is
Google got hacked?
No, the leak was not the result of a security
breach of Google systems. The dump is
said to have been obtained from other websites.
So, if you have used the same password used
anywhere else, your Gmail account could be compromised.
"We
found that less than 2% of the username and password combinations might have
worked, and our automated anti-hijacking systems would have blocked many of
those login attempts. We’ve protected the affected accounts and have required
those users to reset their passwords." Google wrote.
What
you should do?
• There are few websites available
online to check whether your Gmail ID have been compromised or not. My suggestion is don't use them. I suggest everyone to change the password. (I
believe most of the people keep the same password for years, so it's better to
change now).
• If you have not enabled 2-step-factor
feature, it is good to enable it.
• Never use the Gmail password in any
other websites.
Security Encryption Systems
Computer encryption is based on the science of cryptography, which has been
used as long as humans have wanted to keep information secret. Before the
digital age, the biggest users of cryptography were governments, particularly
for military purposes.
The Greek historian Plutarch wrote, for example, about Spartan generals who sent and received sensitive messages using a scytale, a thin cylinder made out of wood. The general would wrap a piece of parchment around the scytale and write his message along its length. When someone removed the paper from the cylinder, the writing appeared to be a jumble of nonsense. But if the other general receiving the parchment had a scytale of similar size, he could wrap the paper around it and easily read the intended message.
The Greeks were also the first to use ciphers, specific codes that involve
substitutions or transpositions of letters and numbers.
As long as both generals had the correct cipher, they could decode any message the other sent. To make the message more difficult to decipher, they could arrange the letters inside the grid in any combination.
Most forms of cryptography in use these days rely on computers, simply because a human-based code is too easy for a computer to crack. Ciphers are also better known today as algorithms, which are the guides for encryption -- they provide a way in which to craft a message and give a certain range of possible combinations.
Computer encryption systems generally belong in one of two categories:
Symmetric-key encryption
Public-key encryption
As long as both generals had the correct cipher, they could decode any message the other sent. To make the message more difficult to decipher, they could arrange the letters inside the grid in any combination.
Most forms of cryptography in use these days rely on computers, simply because a human-based code is too easy for a computer to crack. Ciphers are also better known today as algorithms, which are the guides for encryption -- they provide a way in which to craft a message and give a certain range of possible combinations.
Computer encryption systems generally belong in one of two categories:
Symmetric-key encryption
Public-key encryption
Password Cracking
There are a lot of tools with which we can
crack any OS password. Kon-Boot is one of the best tools with which you can log
in into Windows without password. It works by entering into the system BIOS and
temporarily changing the contents of the Windows kernel while booting. It then
allows you to enter anything (or You can leave it blank) as the password during
login. The next time you start the computer without Kon-Boot, the original
password will be back, the temporary changes will be discarded and the system
will behave as if nothing has happened.
And the technique can be taken as a remedy
for forgotten password.
With the help of kon boot U can login into
any OS without knowing the actual password. Kon boot simply byepass the
password by entering into the system BIOS and temporarily changing the contents
of the Windows kernel while booting and then we can access that computer.
To install and boot with kon boot just follow
the given steps::-
Step
1 : Extract the downloaded file anywhere on your
system.
Step
2 : Now
only insert a USB drive for Konboot (deattach all other USB drives ).
Step
3 : In
extracted files, find a file with name KonBootInstall.
Step
4: Open this
file as Run as administrator.
Step
5 : Select the
drive and chose Install to USB stick (with EFI support).
Step
6 : while
the process finishes and after this your USB stick is ready.
Step
7 : Now
Boot from this USB stick.
Step
8 : After
booting with this device, You will see the login screen as usual with a
password
box.
Step
9 : Type
anything there or leave blank and Just hit enter. And it's done.
Advantages of Rooting Android
Advantages of Rooting Android
Advantages of Rooting Android : These days android rooting is becoming a trend which every android user wants to follow but always has a sense of fear. Well rooting is important for the users because they love having the authority to customize their phone to the fullest and many other benefits. Rooting an Android Phone also gives a user faster performance with its device and also enables him to install custom ROMs.Firstly you should know what is Android rooting?
Android rooting is the process of allowing users of Smartphone’s, tablets, and other devices running the Android mobile operating system to get the full control and authority within subsystem. When you root an Android phone it enables you to act as the administrator of the phone. Android rooting provides you the facility to completely remove and replace your device’s operating system, usually with a more recent release of its current operating system for example from ICS to JellyBean Though the rooting is very popular these days but many Android users are completely unaware how to root their Smartphone’s and tablets. Before, Rooting an device was cumbersome task and moreover rooting also removed the manufacturer’s warranty from the device. As a result, many users were frightened away from rooting their Android. But today users can root their devices in minutes. Thanks to new rooting software programs; any user can root the device easily and quickly.
- Plenty of Apps.
- Speed /Battery life Boosts.
- A Free Wi-Fi Hotspot.
- Better Backup.
- Latest Operating System (OS)Updates.
- Infinite Features.
- Increases Performance.
- Reversible.
- Access Blocked Features.
- Install Custom ROM’s.
- Full control over your system.
Android Hacking Tricks
Android Hacking Tricks: Today, The best
android hacking apps or Download Best Android Hacking Apps. As we all know
hacking and pen testing is only can be done on computers. But now the world is
changing now your mobile is small hacking toolkit using these apps.
Apart from the normal mobile user, techie
guys also like their flexible feature that allows them to do various new tasks.
As with this its security concerns also headed up. Recently we have noted that
many of the cyber hackers are targeting Android users. There are many techie
guys have also unrestricted the features that are restricted by its owners,
Google. So I think the below words are familiar to them but many of them have
not been aware. Here I am discussing some of the Apps that are meant for the
Security tester, Ethical hacker and for those guys who really explore the tech
world.
Best Android Hacking Apps
Let’s see 12 Android Hacking Apps that are
meant for hacking, hackers, security researchers;
1) Hackode
Hackode : The hacker’s Toolbox is an
application for penetration tester, Ethical hackers, IT administrator and Cyber
security professional to perform different tasks like reconnaissance, scanning
performing exploits etc.
2) Androrat
Remote Administration Tool for Android.
Androrat is a client/server application developed in Java Android for the
client side and in Java/Swing for the Server.
3) APKInspector
APKinspector is a powerful GUI tool for
analysts to analyze the Android applications. The goal of this project is to
aide analysts and reverse engineers to visualize compiled Android packages and
their corresponding DEX code.
4) DroidBox
Droid Box is developed to offer dynamic
analysis of Android applications.
5) Burp Suite
Burp Suite is an integrated platform for
performing security testing of web applications. Its various tools work
seamlessly together to support the entire testing process, from initial mapping
and analysis of an application’s attack surface, through to finding and
exploiting security vulnerabilities.
6) zANTI
zANTI is a comprehensive network diagnostics
toolkit that enables complex audits and penetration tests at the push of a
button. It provides cloud-based reporting that walks you through simple
guidelines to ensure network safety.
7) Droid Sheep
Droid Sheep can be easily used by anybody who
has an Android device and only the provider of the web service can protect the
users. So Anybody can test the security of his account by himself and can
decide whether to keep on using the web service.
8) dSploit
DSploit is an Android network analysis and
penetration suite which aims to offer to IT security experts/geeks the most
complete and advanced professional toolkit to perform network security
assessments on a mobile device.
9) AppUse
Android Pen test Platform Unified Standalone
Environment:- AppSec Labs recently developed the AppUse Virtual Machine. This
system is a unique, free, platform for mobile application security testing in
the android environment, and it includes unique custom-made tools created by AppSec
Labs.
10) Shark for Root
Traffic sniffer, works on 3G and Wi-Fi (works
on FroYo tethered mode too). To open dump use Wireshark or similar software,
for preview dump on phone use Shark Reader. Based on tcpdump.
11) Nmap for Android
Nmap (network mapper) is one the best among
different network scanner (port finder) tool, Nmap mainly developed for Unix OS
but now it is available on Windows and Android as well. Nmap for android is a
Nmap apps for your phone! Once your scan finishes you can e-mail the results.
This application is not a official apps but it looks good.
12) SSHDroid
Android Secure Shell: Secure shell or SSH is
the best protocol that provides an extra layer of security while you are
connecting with your remote machine.SSHDroid is a SSH server implementation for
Android. This application will let you to connect to your device from a PC and
execute commands (like “terminal” and “adb shell”).
In this way you able to Download Best Android
Hacking Apps or best android tools for hacking, As we all know hacking and pen
testing is only can be done on computers. But now the world is changing now
your mobile is small hacking toolkit using these apps.