Tuesday, 19 February 2013

small look at sniffer and protection.

sniffing:
- Generally, sniffing is computer network hacker term.On ethernet data is sent in data packets which includes the sending address(the data being sent) and the address it came from.


- Hackers can use sniffing program to intercept those packets of data and read them.



Sniffer:

- Packet sniffer programs are commonly used by network professionals to help diagnose network issues and also by hackers to capture unencrypted data like passwords and usernames in network traffic.




 Once this information is captured, the hacker can then gain access to the system or network.



Magic behind sniffer:

The sniffer program tells a computer, specifically its Network Interface Card (NIC), to stop ignoring all the traffic headed to other computers and pay attention to them.


 It does this by placing the NIC in a state known as promiscuous mode. Once a NIC is promiscuous, a status that requires administrative or root privileges, a machine can see all the data transmitted on its segment.



The program then begins a constant read of all information entering the PC via the network card.



How to protect yourself:

If you wish to keep information confidential(secure) or are concerned about packet sniffing, it is advised that you work on encrypted protocols and encrypt all sensitive data, such as e-mails, being sent over the Internet or network.


-When sending confidential information over internet such as usernames, passwords ,credit card numbers,etc verify small lock  in the bottom right corner of your browser window or in the address bar (as shown below).




- And also making sure the URL begins with https as shown above.


-Another method of protection involves tools, such as antisniffthat scan networks to determine if any NICs are running in promiscuous mode. These detection tools should run regularly, since they act as an alarm of sorts, triggered by evidence of a sniffer.





Wednesday, 13 February 2013

how to use Numpad as your mouse

If mouse is not attached to computer then you can use this trick.
steps:
1. press alt+shift+NumLock  or go to step 3 
  One mouse keys dialog box is open.


2. then click on "Go to the Ease of Access Center to disable the keyboard shortcut" or  "setting"(depend on windows version you are using)



3.  (control panel > Ease of Access > Ease of Access Center > Make the keyboard easier to use > set up Mouse Keys)



4. then Set up mouse keys dialog box is open as shown in below snapshot.




  choose the options as shown in snapshot with red marks.(use spacebar for tick mark the checkbox)

5.click on the "Apply" button and then "OK" button.


Now when your NumLock key is on you can use numpad as your mouse(for control use keys 2,4,6,8 on numpad, for move the mouse pointer continuously press this keys and for clicking use key 5)

protect your computer from spyware with spyware scanners


What is spyware ?
Spyware is a general term used to describe software that performs certain behaviors, generally without appropriately obtaining your consent first, such as:


- Advertising

- Collecting personal information
- Changing the configuration of your computer

What does spyware do ?
- Knowing what spyware does can be a very difficult process because most spyware is designed to be difficult to remove. Other kinds of spyware make changes to your computer that can be annoying and can cause your computer slow down or crash.

- These programs can change your web browser's home page or search page, or add additional components to your browser you don't need or want. They also make it very difficult for you to change your settings back to the way you had them.

How to identify spyware?
- Your computer slowing down to a crawl.
- Porn sites popping up in your browser when you are surfing the net
- Your computer mysteriously dials up phone numbers during the middle of the night, normally to expensive porn chat lines leaving you with a huge bill.
- When you enter a search into your search bar, a new and unfamiliar site handles the search.
- New sites are added to your favorites list without you adding them
- Your homepage has been hijacked and even though you remove the new site it keeps coming back.
- You get pop up adverts that address you by your name, even when your computer isn’t connected to the internet.
Best freeware (spyware)scanner:


Monday, 11 February 2013

Use Google's Advanced Search page.

* If want to fine-tune your search beyond the basic keyword query,then here’s a secret for you,almost all of this fine-tuning can be done from the simple pull-down menus and checkboxes on Google’s Advanced Search page.


 * You can access the Advanced Search page by clicking the Advanced Search link on Google’s home page or simply search "google advanced search" and for more quickly, click on "I'm Feeling Lucky" on google's home page.




* When you need to fine-tune the occasional search, this is the page to use!

Sunday, 10 February 2013

how to detect keyloggers.

- Antiloggers are programs which are specially used for detecting the presence of keylogger, One of the popular antilogger is a "zemana antilogger" which claims to detect almost any keylogger.


- Antliloggers can even detect the presence of keylogger even if your system is infected with a keylogger.

Hardware keyloggers...

* A hardware keylogger is device which monitors every keystroke, screen shots, chats etc typed on the computer.
* They can be implemented via BIOS-level firmware, or alternatively, via a device plugged inline between a computer keyboard and a computer.


* A hardware keyloggers are very harmful and store all the information that is typed through keyboard if they are connected.

*So be careful when you are operate computer from cyber cafe or using any other's computer.

Online virus scanners.

- Online file scanners have capabilities to scan the given file with many antivirus,online virus scanners is one of the best and effective way to detect suspicious virus files.
- Hackers also take advantage of these virus scanners and use it for scanning their virus files to check whether it’s fully undetectable or not.
- Some of the popular online virus scanners are as follows:

how to hide secret text like password,phone number,etc.

* Make a text file name demo.txt and put a random text.For example"This blog is for various computer tricks and tips."
* Now open command prompt and go to the path of that file.
* Now type: type con > demo.txt:hidden.txt and hit enter
* Now type your secret text,and when finish press enter and close cmd.



* Open demo.txt file you can see your random text ,here as example"This blog is for various computer tricks and tips."
* To view secret text open cmd and go to demo.txt file path and type: more < demo.txt:hidden.txt and hit enter.You can see your secret text...

use notepad as your notes diary

* Open a blank notepad file.
* write .LOG as the first line of the file, press enter.
* Save the file and close it.
* Double-click the file to open it and notice that Notepad appends the current date and time in the file.
* Type your notes then save and close the file.
* Every time when you are open that file, notepad will appens the current date and time in the file.Writes the notes then save and close the file each time. 
* This is your notepad diary.



Saturday, 9 February 2013

set the password for Microsoft Office 2007 files

- suppose there is a file currently open that you want to give the password for that file.
- Now click on office button placed at top-left side of window.
- Put your mouse point at "prepare" option from the list and select the "Encrypt Document" option from the list as shown in below snapshot.



- One "Encrypt Document" dialog box is  open.Type your password here for the file.
- Now Your file is protected and can't open without password.

how to make "con" folder in computer drive

There are two methods to make folder with name con in computer drive.Normally you can't create folder with name con in any drive.
Method 1:without using command prompt.
- Create a new folder in drive for example in c drive.
- Give name this folder to con and press alt+255.

Method 2:with using command prompt.
- Open the command prompt.
- reach the path for drive for example for c drive:
     c:\>
- Now type: "md\\.\\c:\\con" without quotation.and your folder will be created.

-If you are using windows XP then type:"mkdir md\\.\\c:\\con".
Note:To remove this folder type:"rd\\.\\c:\\con".

how to scan ports of your computer.

scanning of port means to see the list of open ports on your pc.
steps:
[1] Open the command prompt
[2]Type:
     netstat -a    or
     netstat -a -n (along with port number)   or
     netstat -ano (along with port number)  



Port numbers are divided into tree ranges:
1.well-known ports: (0-1023)
   This range or ports are bound to the service running on them means each port usually has a specific service running on it.For example or normally FTP runs on port 21 and default port for HTTP is 80.

2.Registered ports:(1024-49151)
   This range or ports are not bound to any specific service. Networking utilities like your browsers, Email Client, FTP software opens a random port within this range and start communication with  remote server.

3.Dynamic and/or Private ports:(49152-65535)
   This range is rarely used ,and is mostly used by trojans , however some application do tend to use such high range port numbers.

be aware when use proxy server

About Proxy Server:
A proxy server acts as the middleman between the Internet and a network.
- Its advantages include hiding the network from the Internet and storing information in a method called caching.
- No doubt caching will increase the data access speed but at the same time proxy server owner can keep a look on the cache and he/she can find many sensitive data like passwords,user name,web browsing history.


- It is advisable to use proxy server which has trusted and clear privacy policy and never use private data like user name and password through proxy even if it is encrypted also.



So be aware when you are using proxy server.

Friday, 8 February 2013

You have to just type and computer speaks that.

steps:
[1]Open the Notepad.
[2]Now type the following code:
    CreateObject("SAPI.SpVoice").Speak"Computer Master T&T"
    In double quotation type your word or sentence that you want to hear.


[3]Save this file with .vbs extension(for example abc.vbs)

[4]Just open the file(abc) and hear...

Click on Internet Explorer and computer is shutdown.

steps:
[1]On your computer desktop right click on window screen.
[2]Now select( New>Shortcut) option from list.
[3]You can see create shortcut dialog box is open.
    Type the following line in location or path for shortcut(Type the location of the item):
    "shutdown -s -t 00"


     and click on Next button.(as shown in above picture)
[4]Now change the name of shortcut to "Internet Explorer".click on Finish button.
    You can see that new icon name as Internet Explorer is created on desktop.
[5]Right click on created icon and select properties.click on Change Icon button and select the Enternet     Explorer Icon from the list and click on OK
[6]Click on Apply button in property window.You can see the same icon is created as Internet Explorer.
[7]Double click on that icon and computer is shutdown immediately.

Thursday, 7 February 2013

how to get ip and mac address on computer

IP address:
      "IP" stands for Internet Protocol, so an IP address is an Internet Protocol address.


how to see ip address of your computer:

[1].First open command prompt.
     (in RUN(window key+r) and type cmd)


[2].type "ipconfig" press Enter.



       In cmd window IPv4(IPv 6) shows your current ip address.(32-bit or 128-bit)



MAC address:

       A Media Access Control address (MAC address) is a unique identifier assigned to network interfaces for communications on the physical network segment.


how to see mac address of your computer:

[1].First open command prompt.
     (in RUN(window key+r) and type cmd)

[2].type "getmac" press Enter.


       You can see mac address for your computer which is unique.(48-bit or 64-bit)



The MAC address represents the physical address of a network device, while the IP address represents a logical address on Internet Protocol networks.

       

How to hide drives in computer?


[1].First open command prompt(in RUN(window key+r) type "cmd").


[2].type "diskpart" in command prompt window.(press Enter)

     A new diskpart window is opened.


[3].type "list volume" and press Enter.

    You get a list of volumes along with number as shown in below window...


[4].Now type "select volume 3" and press Enter.(Here 3 is for example you can type any number shown in window)
    You get message "volume 3 is the  selected volume."


[5].Now type "remove letter E" and press Enter.(type letter associated with number of drive.)

    You get message "Diskpart successfully removed the drive letter or mount point."
    You can see that your drive is hide from computer.


[6].to see your drive on computer follow the step 1 to 4 and then type "assign letter E"(press Enter).

     you get message "Diskpart successfully assigned the drive letter or mount point."
     Now your drive is visible in computer...