| Safari for Mac and PC |
Wednesday, 28 December 2011
How to detect that a keylogger is installed on a computer or not
Posted by Unknown
On 06:30
| No comments
Keyloggers are software that traces the key strokes on your computer. It is done in such a way that a person using the computer is unaware of the fact that a key logger is installed on a particular PC.
How does keyloggers enters your computer ?
There are several ways in which a key logger can get into your computer either it is directly installed or it is indirectly transferred to your computer. Most of the time, this malicious file enters a computer when the user downloads an infected application like movies, music or other software applications.
So how to get rid of keyloggers that is installed on a computer
1. Use updated antivirus and anti spyware
Some of the good anti viruses have capability to detect key loggers. So you should update your antiviruses regularly so that it gets updated for new keyloggers.
2. Use Anti keyloggers
There are anti keyloggers available that will make the task easy for you in finding a keyloggers. Use these softwares if you think there is a high possibility of keyloggers on a computer. The anti keyloggers that i will suggest you is Cyberhawk. Even Kasperky does a good job in this area too. Also check anti-spy.info. More examples:
- http://www.microsoft.com/athome/security/spyware/software/default.mspx
- http://www.lavasoftusa.com/software/adaware/
- http://security.kolla.de/
- http://www.clamwin.com
3. Search for keyloggers yourself
Keyloggers have the capability that they hide them self from the user but are active in the background. There are some shortcuts that are used to see them live on screen
For example : Ctrl + Alt + X or Ctrl + Alt + Wondows Key + X or desktopshark etc.
4. Use special tools
KL-Detector
Freeware on demand keylogger scanner.
Freeware on demand keylogger scanner.
SnoopFree
Freeware antikeylogger that block hook based keyloggers as well as screen captures. For Windows XP.
Freeware antikeylogger that block hook based keyloggers as well as screen captures. For Windows XP.
PSMAntiKeyLogger
PSMAntiKeyLogger is a real-time protecting software which protects you against Keyloggers. No scanning is needed.
PSMAntiKeyLogger is a real-time protecting software which protects you against Keyloggers. No scanning is needed.
I Hate Keyloggers
Freeware antikeylogger that block hook based keyloggers. For Windows 2000 and XP.
Freeware antikeylogger that block hook based keyloggers. For Windows 2000 and XP.
See All Live Webcams with a Google Trick
Posted by Unknown
On 05:30
| No comments
Step 1: Log on google.com
Step 2: Type ‘inurl:/view.shtml’ as a query
Step 3: You may also try using intitle:”Live View / – AXIS” | inurl:view/view.shtml^ as a query.
Step 4: This would redirect you to a page with the home pages of these urls.
Step 5: The above query reveals the IP network webcams that have been indexed by Google. You can easily get access and locate those unprotected IP network cameras used that are released or leaked to the public internet insecure cameras by using Google.
The world today has millions and millions of webcams and still more are popping out each minute. It is true to be said as the big business for every business. Even ordinary home owners these days have switched to the application of webcams in their houses. So, if you are using a webcam, encrypt the signal and protect yourself.
How to Place Facebook Chat on Firefox Sidebar
Posted by Unknown
On 05:11
| No comments
The coolest feature of the Facebook which permits you to send live messages, or in internet word, ping your friends is the Facebook chat. As it is the most frequently used feature of this great social networking site, therefore it deserves to be at the top. The chat can be placed at the Mozilla Firefox sidebar by following these simple steps:
1). At the top-most navigation of your page, you will find an option by the name of “Bookmarks”. Select “Organize Bookmarks” from this menu.
2). There you will find the tab by the name of “New Bookmark”.
3). On clicking “New Bookmark” it will ask for some information. Fill it according to the following:
- Fill “Facebook Chat” in the space provided in front of the “Name” section.
- Type the URL “http://www.facebook.com/presence/popout.php” in the space provided in front of “Location” section.
- Also check the check box as shown
An Introduction To Keyloggers, RATS And Malware
Posted by Unknown
On 02:21
| No comments
Confucius, one of the greatest Chinese philosophers, said "I listen and I forget. I see and I remember. I do and I understand." And this is exactly the way how this book is presented.
And this is why this book is so unique. You can read, you can watch and you can practice every aspect you got to know.

- You can read the book and get to know the basics.
- You can watch step by step guides and get "inside it".
- You can practice everything you've learnt in the book and finally UNDERSTAND it.
And this is why this book is so unique. You can read, you can watch and you can practice every aspect you got to know.

"An Introduction To Keyloggers, RATS And Malware" by Rafay Baloch is completely dedicated to newbies who are looking forward to play with keyloggers, RATs and various other forms of malware, or are curious to know how they can protect their PC's from getting infected with Trojan, worms and other forms of viruses.
The book takes you right from the basics to some advanced types of attacks. In this book Rafay have also reviewed various types of best keyloggers out there so you can find it easier to choose the best one according to your needs.
By reading this e-book I am very confident that you will be able to protect your computer from most of these types of attacks.
SQLI Helper Tutorial - A Must Read Article
Posted by Unknown
On 01:53
| No comments
Today I am going to show you people how to use SQLi Helper to Hack a Website. The SQLi Helper is a tool used to do all the work automatically which a Hacker would Have to do manually. That make it a very popular tool among script-Kiddies as well as Pros.
You can download the SQLi Helper from Here.
It should look this this:

Now the First Step is to give the Target site like http://targethost.com/expoit.php?id=1 (Note: This is not the real site). After you give the target site click on the Inject button.

And then click on the Get Database Button.

Now the following Information will be available about the Host:

Now to take the attack forward choose a Database from the Database Name coulmn and click on the Get Table button.

Now we Have the names of the Tables. Now we need to know the Columns of the Tables which contain sensitive information. For that we will choose the Table admininfo to get columns.

To get Columns select the Table and click on the Get Column Button.

Now we have the Names of the Columns shown below:

Now select the one which seems important and click on the Dump NowButton.

And then a New window will open that will Dump the Data that is in those Columns. Like Show Below:

After we have got this Sensitive Information, we can use online MD5 cracker to crack the Password Hash and access the Website with Administrative Privilege.
You can download the SQLi Helper from Here.
It should look this this:
Now the First Step is to give the Target site like http://targethost.com/expoit.php?id=1 (Note: This is not the real site). After you give the target site click on the Inject button.
And then click on the Get Database Button.
Now the following Information will be available about the Host:
Now to take the attack forward choose a Database from the Database Name coulmn and click on the Get Table button.
Now we Have the names of the Tables. Now we need to know the Columns of the Tables which contain sensitive information. For that we will choose the Table admininfo to get columns.
To get Columns select the Table and click on the Get Column Button.
Now we have the Names of the Columns shown below:
Now select the one which seems important and click on the Dump NowButton.
And then a New window will open that will Dump the Data that is in those Columns. Like Show Below:
After we have got this Sensitive Information, we can use online MD5 cracker to crack the Password Hash and access the Website with Administrative Privilege.
3 Ways To Choose A WPA Key That’s Difficult To Hack
Posted by Unknown
On 01:43
| No comments
Wi-Fi is a great way to stay connected to the Internet all over your home without huge wires, and is the only way many devices like the IPad have access to the Internet. Too often users compromise security for convenience and either leave their network open or choose an easy password. Here are three tips to choosing a secure WPA key for your home WI FI Network.
1. Avoid Dictionary Words
Most Wi-Fi hackers get in with a brute force attack. A brute force attack tries random commonly used words and phrases together over and over until it finds the password. If you use simple dictionary words to secure your Wi-Fi than it isn’t a Question of if a hacker can get in but rather when.
2. Use Random Capitalization
Since most things are case sensitive getting into the habit of a capitalization pattern goes a long way to creating an unhackable network key. For example, On AnD oFf capitalization is one way to almost guarantee they wont be able to gain access without permission.
3. Double Up Numbers
Using numbers and letters is another great basic tip but a truly random string of numbers is hard to remember but using something like a birthday leaves you vulnerable to anyone who knows personal info about you. One happy medium is to double or triple up numbers. For example, if your birthday is 12/10/1980 than instead of using 12101980 as part of the password use 1212101019801980 it will be far harder to guess and super easy to remember.
1. Avoid Dictionary Words
Most Wi-Fi hackers get in with a brute force attack. A brute force attack tries random commonly used words and phrases together over and over until it finds the password. If you use simple dictionary words to secure your Wi-Fi than it isn’t a Question of if a hacker can get in but rather when.
2. Use Random Capitalization
Since most things are case sensitive getting into the habit of a capitalization pattern goes a long way to creating an unhackable network key. For example, On AnD oFf capitalization is one way to almost guarantee they wont be able to gain access without permission.
3. Double Up Numbers
Using numbers and letters is another great basic tip but a truly random string of numbers is hard to remember but using something like a birthday leaves you vulnerable to anyone who knows personal info about you. One happy medium is to double or triple up numbers. For example, if your birthday is 12/10/1980 than instead of using 12101980 as part of the password use 1212101019801980 it will be far harder to guess and super easy to remember.
Hack A Number And Call Any Person By Other Person Number
Posted by Unknown
On 01:36
| No comments
Ya! you read correct line, today i am going to tell you a hack trick by which you call a person with different number and fooling your friend without registation.
CrazyCall is the ultimate tool for making prank calls and fooling your friends.
You can change your CallerID, so when you call someone he sees on his Caller ID display the number you selected.
You can also change the pitch of your voice for deep and creepy or high and funny.
You can change your CallerID, so when you call someone he sees on his Caller ID display the number you selected.
You can also change the pitch of your voice for deep and creepy or high and funny.
- How is it done:
Select the country you are calling from, choose the CallerID you want to display and enter the number you want to call.
Press "Get me a code" and he will provide you with number to call and a code. - Call the number
- Enter the code and he will connect your call to your friend with the CallerID and voice you have selected.
Click here for open the Crazycall.
Subscribe to:
Posts (Atom)