Archive for October 2014
What is keylogger? And how to be safe from Keylogger
WHAT IS KEYLOGGER? AND HOW TO BE SAFE FROM KEYLOGGERS
I am
going to talk about the most use piece of software besides from RAT by hackers
to observe your activities on your computer and that is keyloggers. A keylogger
is a software or hardware device which monitors each and every key typed by you
on your keyboard. I am going to talk about different types of keylogger and how
to be safe from keyloggers. So lets learn somthing about keyloggers.
1. What
is keylogger ?
You
might have heard about keyloggers but really dont know what they are reading
this article will clear your mind. A keylogger also know as keystroke logger is
software or hardware device which monitors each and every key typed by you on
your keyboard. You can not identify the presence of keylogger on your computer
since it runs in background and also it is not listed in task manager or
control panel. It can be used by parents to keep eye on their childrens or
company owner to spy on their employes.
2. How it can harm you ?
In
this section i will talk about how keylogger can harm you in different ways for
example It can be used by your enemy or friend to get sensitive information
such as your username and password, Bank credit card details, or any other
activities you do on your computer.
Example:
You login in to your Facebook account from a computer in which keylogger is
install then your username and password will be captured.
3. Types of
keyloggers
There
are two types of keylogger hardware keylogger and software keylogger. Software
keylogger is install in your computer where as a Hardware keylogger is attached
to your keyboard. Looking at below images will clear your mind.
4.
How to Protect yourself from keyloggers ?
Keylogger can be used by your enemy to get sensitive information such as your
Bank credit card details, or password of any social networking sites etc. In
order to be safe keep following points in your mind.
Never
use your online banking from cyber cafe. If you want to use then you can try
this method. open notepad and type anything Then copy and paste each word that
comes in your username or password.
You
can even use above method to protect your facebook profile, yahoo or gmail id.
When
you enter cyber cafe make sure that no hardware device is attached to keyboard
wire. Its look something similar to above image.
How to Recover Deleted Files on Pc
How to Recover Deleted Files on Pc
When
you delete any file in windows it goes to recycle bin where you can easily
restores it as it has restore option. But which method or hacks is used to
recover your files when you delete it permanently (In windows by pressing
Shift+DEL). Sometimes we accidently deletes images, videos and important
document files from your pc, Pen drive, SD card or anything else then how can
you recover it ? Well don’t worries about it there are many powerful file
recovery software available on the internet which let you to recover
permanently deleted files from your pc. As I told you that there are a lots of
hard drive recovery services. Now I’m going to tell you the top best data
recovery applications.
1. Recuva
Recuva is
one of the most popular and powerful file recovery tool for Windows. You will
find it very easy to navigate because of it’s clean interface user-friendly
options. It has following features :
• Undelete files on your computer
• Recover deleted emails
• Securely delete files you want to
erase forever
• Restore unsaved Word documents
Recovering
files vis Recuva is very easy you have
to simply download and install the Recuva then after opening it now select what
you want to restore. You can search for deleted Pictures, music, documents,
videos, compressed files or emails. If you’re not sure about file name, just
select ‘All Files’ option. Now select the file, either right-click on it press
Recover button to recover it.
2. Panda Recovery
Panda
recovery is the another best hard drive recovery service/tool for recovering
files. It helps to recover deleted files from hard drive, USB, Network drives
etc. It is best because of following features :
• Browse, Search, Preview and Recover
deleted files.
• Recover Archived, Hidden, Encrypted,
Compressed files.
• Recover Images, Documents, Movies, or
any other type of files.
• Recover to Local Hard Drive, Network
Drive, or Flash Drive.
The
process of recovering files from Panda recovery is very simply you have to just
follows wizard and its instructions.
3. Test Disk
This
is also the one of best hard drive recovery service providing software. It is a
powerful free data recovery software which helps to recover lost partitions
andor make non-booting disks bootable again when these symptoms are caused by
faulty software, certain types of viruses or human error (such as accidentally
deleting your partition table). TestDisk is available for lots of operating
systems, including Linux, Windows, and Mac OS, and supports lots of file systems.
It has following features :
• Fix partition table, recover deleted
partition.
• Rebuild NTFS boot sector.
• Undelete files from FAT, exFAT, NTFS
and ext2 file system.
• Recover NTFS boot sector.
You need
to be careful for using this and better to use on screen instructions while
using it.
4. Reclai Me
This is
another data recovering software. It is simple tom use because if it’s user
friendly interface more ever it can recover files under Windows (FAT16, FAT32,
exFAT, NTFS, ReFS file systems), Linux (EXT2, EXT3, EXT4 and XFS file systems),
Mac(HFS, HFS+ and UFS file systems). It has following features :
• Undelete a single file or multiple
files.
• Unformat a hard drive (desktop and
laptop).
• Recover RAW file system drive.
• Recover data in case of boot failure.
Just
simply follow on screen instruction to recover data using ReclaiMe.
5. Restoration
Last but
not least, this one very simple to use. Restoration works with FAT and NTFS as
well as digital cameras cards. It is also powerful tool for recovering
lost/deleted data. It has following features:
• Recover deleted files.
• Undelete files.
• Unformat a hard drive.
• Photo recovery.
Just as
others to use it simply follows the on screen instructions.
So, in
this way you recover deleted files on pc and this is all about hard drive
recovery service/tools. I hope this helped you a lot.
About 5 million Gmail IDs and passwords leaked
About
5 million Gmail IDs and passwords leaked
Is
Google got hacked?
No, the leak was not the result of a security
breach of Google systems. The dump is
said to have been obtained from other websites.
So, if you have used the same password used
anywhere else, your Gmail account could be compromised.
"We
found that less than 2% of the username and password combinations might have
worked, and our automated anti-hijacking systems would have blocked many of
those login attempts. We’ve protected the affected accounts and have required
those users to reset their passwords." Google wrote.
What
you should do?
• There are few websites available
online to check whether your Gmail ID have been compromised or not. My suggestion is don't use them. I suggest everyone to change the password. (I
believe most of the people keep the same password for years, so it's better to
change now).
• If you have not enabled 2-step-factor
feature, it is good to enable it.
• Never use the Gmail password in any
other websites.
Security Encryption Systems
Computer encryption is based on the science of cryptography, which has been
used as long as humans have wanted to keep information secret. Before the
digital age, the biggest users of cryptography were governments, particularly
for military purposes.
The Greek historian Plutarch wrote, for example, about Spartan generals who sent and received sensitive messages using a scytale, a thin cylinder made out of wood. The general would wrap a piece of parchment around the scytale and write his message along its length. When someone removed the paper from the cylinder, the writing appeared to be a jumble of nonsense. But if the other general receiving the parchment had a scytale of similar size, he could wrap the paper around it and easily read the intended message.
The Greeks were also the first to use ciphers, specific codes that involve
substitutions or transpositions of letters and numbers.
As long as both generals had the correct cipher, they could decode any message the other sent. To make the message more difficult to decipher, they could arrange the letters inside the grid in any combination.
Most forms of cryptography in use these days rely on computers, simply because a human-based code is too easy for a computer to crack. Ciphers are also better known today as algorithms, which are the guides for encryption -- they provide a way in which to craft a message and give a certain range of possible combinations.
Computer encryption systems generally belong in one of two categories:
Symmetric-key encryption
Public-key encryption
As long as both generals had the correct cipher, they could decode any message the other sent. To make the message more difficult to decipher, they could arrange the letters inside the grid in any combination.
Most forms of cryptography in use these days rely on computers, simply because a human-based code is too easy for a computer to crack. Ciphers are also better known today as algorithms, which are the guides for encryption -- they provide a way in which to craft a message and give a certain range of possible combinations.
Computer encryption systems generally belong in one of two categories:
Symmetric-key encryption
Public-key encryption