Tuesday, June 18, 2013

Why Do You Get Spam Mail?? Want To Know Why??

Are you getting lot of spam mails to your inbox?  Do you know why it comes to your mail? The mistake is yours only.  Because of you only you are getting larger number of spam.

Spam Mail Definition:
Also known as junk mail.  Sending large number of identical message to numerous recipients .   Advertisers ,merchants sends large number of mail to recipients for advertising purpose using software and some websites.


How they get your email id?
They get your mail id because of your mistakes only.

Social Networking Sites:
Most of you use social networking sites daily.  I won't say using social networking sites is bad.  But sending request or accepting stranger is one of the major reason for getting spam mail.  Advertisers will gain your weakness.  If you are blindly accepting the request means, spam mail will be definitely in your mail. Sometimes they get your phone number and send advertisement to your mobile or some other communication sources.

What you have to do?
Apply privacy setting for your contact information.  Don't accept the request from strangers(in order to attract you they may send you request like a girl).

Online Games and contests:
Some websites tell you that they will give prize if you win in the online game.  This is also one of the reason for getting spam mail.

Job /Career websites:
Job offering websites is the major reason for getting spam mail.  But some website sell your mail to advertisers.  This will result in spam.

Forum:
Like i said for social networking site, in forum also you have to consider the privacy settings.
Select "Don't show mail and Don't receive mail from members" so that you can avoid of getting spam mails.

Mail Searching:
Advertisers(spammers) search for mail id in internet using some software(like @mail.com )
If you are webmaster ,you may give contact us link with
mailto:mailid@domain.com.
Spammers  can find your mail id if you give the mail id plainly like this.

Helpful Tips:
 
  • Use 123 contact forms for hiding your mail id.
  • or show mail id like this : mailid[at]domain[dot]com
  • Use mail Badge Image(i mean show your mail id as image).
  • Use two mail emails
  • One is for contributing online
  • Other is for personal

New Facebook Hacking Tool - For Educational Purposes Only

A new Facebook hacking tool was released

It can steal the information from victims like photos,friends list and other information.  Using that , an attacker is able to create fake profile page or they may get enough information to hack your accounts(security question).

Click Here For The "Facebook Profile Dumper"

If you get invitation from stranger in Facebook, don't accept it.  Even if you know the person, please verify whether profile is real or not.  A new hacking tool is available that will send friend request to you.  If you accept, it  can steal all info ,photos,friend list from you. Think twice before accepting invitation.

Example Of Tools Usage:
  A typical scenario is to gather the information from a user profile. The plugins are just a series of normal operations on FB, automated to increase the chance of you getting the info.

Typically, first you create a new blank account for the purpose of the test. Then, the friending plugin works first, by adding all the friends of the victim (to have some common friends). Then the clonning plugin asks you to choose one of the victims friends. The cloning plugin clones only the display picture and the display name of the chosen friend of victim and set it to the authenticated account. Afterwards, a friend request is sent to the victim's account. The dumper polls waiting for the friend to accept. As soon as the victim accepts the friend request, the dumper starts to save all accessable HTML pages (info, images, tags, ...etc) for offline examining. After a a few minutes, probably the victim will unfriend the fake account after he/she figures out it's a fake, but probably it's too late!

How To Enable 'Two-Factor Authentication" on Linkedin?

Linkedin now has a security boost with the new "Two-Factor Authentication". Linkedin is coping Twitter because a couple days back, Twitter enabled the two-step verification to thwart hackers.

What is Two-Step Verification??
A security feature that prompts you to enter a temporary secret number sent to your phone whenever you log into your account.

Why Should You Enable This Feature??
Why not, it helps keep bad hackers out. This second to best security feature available for social networks. Let us assume, someone has stolen your log-in User Name & Password via key-logger or phishing or any other method. If the hacker try to log into the website with your credentials, he will asked to provide the secret number sent to your Cell Phone/Smart Phone. But you have the cell phone with you. So hacker can't log in to your account.  Also you will come to know that someone is trying to gain access to your account.

Step 1: 
Login to your account and go to the settings page:

Step 2:
Select the "Account" tab and click the " Manage security settings " option.

Step 3: 
Now Here , you can see the "Two-step verification for sign in " option and it displays the feature is currently "off".  To turn on the feature, they click the "Turn On" Link.

Step 4:
You will be asked to enter your phone number.

Step 5:
Once you enter your phone number,  you will receive a security code.  After entering the security code sent to your mobile number, the feature will be turned on.

Now Your Are Somewhat Hacker Free. You can never be totally hacker free. You will just make it harder for them to hack your account.

Apple, Google & Microsoft Released New Details on NSA Requests

Apple revealed on Monday that it received between 4,000 & 5,000 data requests in six months from U.S. Law Enforcement for user info. & affected accounts. Apple also revealed that the most common forms of requests involved investigating robberies & other misc. crimes. Between Dec. 1, 2012 & May 31, 2013, the federal, state & local law enforcement had requested customer information up to 5,000 times & up to 10,000 accounts or devices.

Google on Saturday said it already publishes that data, & is still awaiting permission to publish FISA Disclosures.

Microsoft released a statement on Friday saying that over a six month period, ending on December 31, 2012 received up to 7,000 criminal & national security warrants, subpoenas & affecting up to 32,000 customer accounts from local, state & federal government agencies.

All the companies have denied claims that the NSA Could directly access to their servers. Apple also said that it does not store data related to consumers location & Map searches or Siri requests in a way that they can be tracked back to an individual.


Friday, May 17, 2013

The Top Legal Hacking Tools

For The Top "Legal to Own" Hacking Tools, (Check Out This Website Here.) You can own Key-loggers, Forensic Tools, Password Crackers, Exploits, Penetration Testing Tools, Scanners, Linux Tools, Windows Tool, Network Tools, Scripts & Security Tools. All of Them are Free Downloads!!

Lulzsec Hackers to be Sentenced For Cyber-Crimes Against The CIA & Pentagon

Ryan Ackroyd, Jake Davis, Mustafa Al-Bassam & Ryan Cleary have all pleaded guilty to hacking offences. They appeared in a London Courtroom on Wednesday for Sentencing. The name Lulzsec means "Laughing At Your Security".

They also carried out Distributed Denial of Service (DDoS) attacks on many institutions & crashed their websites. Ryan Ackroyd, 26 years old & from Mexborough, South Yorkshire. He has admitted stealing data from Sony. They used Botnet to perform the attacks. The attacks led to sensitive personal information being leaking online, leaving victims open to fraud. Ryan Cleary alone has pleaded guilty of downloading pornographic images of babies & children.


Friday, May 10, 2013

Iron Man 3 - Movie Review

Very Good Movie & Special Effects, I can see that 185 of that 200 Million to make the movie when to Special Effects. A well-through out plot. The heat between Tony Stark's & Pepper Potts was on 1st degree of heat.

Tony Stark/Iron Man's enemy has no bounds. When Stark finds his personal world destroyed at his enemy's terrorist plot. He embarks on quest to find those responsible. Tony Stark is left to survive by his own devices, relying on his ingenuity and instincts to protect those closest to him. Soon After, Tony Stark discovers the answer to a question that has secretly haunted him: does the man make the suit or does the suit make the man?

 MPAA Rating: PG-13 (for sequences of intense sci-fi action and violence throughout, and brief suggestive content)
Genres: Action/Adventure, Sequel, Sci-Fi/Fantasy.
Run Time/Movie Time: 2 hours 10 minutes/130 Minutes
Distributors: Walt Disney Studio Motion Pictures
Produced In: United States (U.S.A.)
Filming Locations:
  • China
  • Miami, Florida, USA
  • Raleigh/Durham, North Carolina, USA
  • EUE/Screen Gems Studios, Wilmington, North Carolina, USA
  • Fort Lauderdale, Florida, USA
  • Cary, North Carolina, USA
  •  Grauman's Chinese Theatre, Hollywood, California, USA

I Rate This Movie 9 1/2 Stars out of 10 Stars.