Tuesday, 19 February 2013

small look at sniffer and protection.

sniffing:
- Generally, sniffing is computer network hacker term.On ethernet data is sent in data packets which includes the sending address(the data being sent) and the address it came from.


- Hackers can use sniffing program to intercept those packets of data and read them.



Sniffer:

- Packet sniffer programs are commonly used by network professionals to help diagnose network issues and also by hackers to capture unencrypted data like passwords and usernames in network traffic.




 Once this information is captured, the hacker can then gain access to the system or network.



Magic behind sniffer:

The sniffer program tells a computer, specifically its Network Interface Card (NIC), to stop ignoring all the traffic headed to other computers and pay attention to them.


 It does this by placing the NIC in a state known as promiscuous mode. Once a NIC is promiscuous, a status that requires administrative or root privileges, a machine can see all the data transmitted on its segment.



The program then begins a constant read of all information entering the PC via the network card.



How to protect yourself:

If you wish to keep information confidential(secure) or are concerned about packet sniffing, it is advised that you work on encrypted protocols and encrypt all sensitive data, such as e-mails, being sent over the Internet or network.


-When sending confidential information over internet such as usernames, passwords ,credit card numbers,etc verify small lock  in the bottom right corner of your browser window or in the address bar (as shown below).




- And also making sure the URL begins with https as shown above.


-Another method of protection involves tools, such as antisniffthat scan networks to determine if any NICs are running in promiscuous mode. These detection tools should run regularly, since they act as an alarm of sorts, triggered by evidence of a sniffer.





Wednesday, 13 February 2013

how to use Numpad as your mouse

If mouse is not attached to computer then you can use this trick.
steps:
1. press alt+shift+NumLock  or go to step 3 
  One mouse keys dialog box is open.


2. then click on "Go to the Ease of Access Center to disable the keyboard shortcut" or  "setting"(depend on windows version you are using)



3.  (control panel > Ease of Access > Ease of Access Center > Make the keyboard easier to use > set up Mouse Keys)



4. then Set up mouse keys dialog box is open as shown in below snapshot.




  choose the options as shown in snapshot with red marks.(use spacebar for tick mark the checkbox)

5.click on the "Apply" button and then "OK" button.


Now when your NumLock key is on you can use numpad as your mouse(for control use keys 2,4,6,8 on numpad, for move the mouse pointer continuously press this keys and for clicking use key 5)

protect your computer from spyware with spyware scanners


What is spyware ?
Spyware is a general term used to describe software that performs certain behaviors, generally without appropriately obtaining your consent first, such as:


- Advertising

- Collecting personal information
- Changing the configuration of your computer

What does spyware do ?
- Knowing what spyware does can be a very difficult process because most spyware is designed to be difficult to remove. Other kinds of spyware make changes to your computer that can be annoying and can cause your computer slow down or crash.

- These programs can change your web browser's home page or search page, or add additional components to your browser you don't need or want. They also make it very difficult for you to change your settings back to the way you had them.

How to identify spyware?
- Your computer slowing down to a crawl.
- Porn sites popping up in your browser when you are surfing the net
- Your computer mysteriously dials up phone numbers during the middle of the night, normally to expensive porn chat lines leaving you with a huge bill.
- When you enter a search into your search bar, a new and unfamiliar site handles the search.
- New sites are added to your favorites list without you adding them
- Your homepage has been hijacked and even though you remove the new site it keeps coming back.
- You get pop up adverts that address you by your name, even when your computer isn’t connected to the internet.
Best freeware (spyware)scanner:


Monday, 11 February 2013

Use Google's Advanced Search page.

* If want to fine-tune your search beyond the basic keyword query,then here’s a secret for you,almost all of this fine-tuning can be done from the simple pull-down menus and checkboxes on Google’s Advanced Search page.


 * You can access the Advanced Search page by clicking the Advanced Search link on Google’s home page or simply search "google advanced search" and for more quickly, click on "I'm Feeling Lucky" on google's home page.




* When you need to fine-tune the occasional search, this is the page to use!

Sunday, 10 February 2013

how to detect keyloggers.

- Antiloggers are programs which are specially used for detecting the presence of keylogger, One of the popular antilogger is a "zemana antilogger" which claims to detect almost any keylogger.


- Antliloggers can even detect the presence of keylogger even if your system is infected with a keylogger.

Hardware keyloggers...

* A hardware keylogger is device which monitors every keystroke, screen shots, chats etc typed on the computer.
* They can be implemented via BIOS-level firmware, or alternatively, via a device plugged inline between a computer keyboard and a computer.


* A hardware keyloggers are very harmful and store all the information that is typed through keyboard if they are connected.

*So be careful when you are operate computer from cyber cafe or using any other's computer.

Online virus scanners.

- Online file scanners have capabilities to scan the given file with many antivirus,online virus scanners is one of the best and effective way to detect suspicious virus files.
- Hackers also take advantage of these virus scanners and use it for scanning their virus files to check whether it’s fully undetectable or not.
- Some of the popular online virus scanners are as follows: