Tuesday, 30 April 2013

How to Detect a Phishing Email: An Example


How to Detect a Phishing Email: An Example

Some of my important emails end up in the Spam folder due to incorrect filtering. So, I occasionally check the Spam folder to see if an email that was not spam ended up there. Today, while checking the Spam folder, I came across an email that was a classic example of a phishing message. Hence, I decided to share it here to point out some common tactics used in such messages.

Here is the email:-
Phishing Email
The phishing message.
One look at the from address should be enough for anyone to judge that this message is not genuine. Messages from most companies are through a no-reply address. Also, most companies contact you from an  email address that is on their main domain, not some random free email provider. Moreover, almost all email providers use an interstitial page in the situation described in this message. None of them sends an email asking for verification.

Another important thing to notice in this message is the Sent to: field. Notice how it mentions undisclosed recipients. This is common in such messages. They are sent to a lot of email ids in one go. Hence, hiding the recipients allows hackers to prevent their targets from knowing that this same message has been sent to a lot of users.

Phishing


The next thing to notice is that this message does not address me by name. This is uncommon for an email company that already has your name. Most companies add the user's name to add a personalized feeling to their messages. This is something that is quite difficult to manage if you are sending the same message to thousands of users.

One of the most common feature of phishing emails is their use of incorrect grammar. This message is no different. The inappropriate capitalization and spelling mistakes like writing the word 'loosing' in place of 'losing' leaves no doubt about its authenticity.

One more important thing to notice is that at the end of this message, there is no mention of the email provider's website. This is very uncommon considering that most email providers leave no stone unturned to brand their messages.

Detect Phishing Emails

Lastly, the email address to reply to is different from the one with which this message was sent. A proof that the sender of this message tried to spoof the sender id.

The techniques used in this email were typical and hence it should not be difficult for anyone to detect that it is a phishing message. However, cyber criminals are evolving and most of them don't make such common mistakes anymore. You should always use common sense in such situations and never click on suspicious links.

Tips to Protect Important Data against Online Attacks


Tips to Protect Important Data against Online Attacks

Whether you talk about private individual users or online business owners, both need to pay more attention to the safety and security of their data. The fact of the matter is that in the last few years, more than 350 million users have reported theft of their precious data. In such a scenario, entrepreneurs and corporate managers have to take meticulous precautions to make sure that unauthorized personnel do not access their valuable data. Security of personal and professional data is no longer an issue that can be brushed under the carpet; rather all stakeholders need to take corrective actions to put an end to this problem. Here are some handy tips in this regard:

Adopt Skepticism While Assessing Intentions of Strangers

The fact of the matter is that in a world where competitors will literally go to any lengths to outwit their professional rivals. So, you need to be more careful while disclosing vital personal or professional information in front of people you cannot trust. Hacking is no longer considered to be a dark art performed by only a handful of geeks; rather most people can do it nowadays. Therefore, you need to exercise more prudence while deciding whether sharing certain information with strangers is safe or not.

Strengthen Your Password by Using Different Characters 

Your password is a key that can unlock all passages for strangers to get access to your precious data; therefore, it is of paramount importance that you choose a password that is both complex and unpredictable. These days, experts advise users to pick passwords that contain alphabets, numbers and other characters. Also, the password should also be long enough. Passwords shorter than eight characters are considered unsafe and are very susceptible to getting cracked.

Use Encryption to Protect Your Data

Most people tend to underestimate the advantages of getting your data encrypted. Encryption involves a secret code that is used to switch your data into another format. There are various software programs that can be used to encrypt your data for extra protection.

Be Careful While Surfing

Being prudent while surfing the web is a precaution that should be adopted by users who are conscious about protecting their data. Unsafe browsing can help harmful malware and spyware to sneak into your computer system. Experts believe that confining your web surfing to protected websites becomes much easier if you start using https on the address bar of your browser.

Prefer Wi-Fi over Broadband Internet

Over the years, experts have concluded that wireless internet is much more convenient and reliable as compared to broadband internet connection in terms of data security. Before you pick an ISP for wireless connection, make sure that adequate firewalls and data security features are enabled.

Always Create Data Backup

The fact of the matter is that there are certain circumstances in which losing precious data becomes inevitable such as natural disasters. In such a scenario, it is better to create a backup copy of your hard disk either manually or by calling upon the services of professional data backup and recovery companies.

Use Anti-Virus Programs

No one can deny the fact that despite all precautionary measures, the possibility of virus and bugs entering your system cannot be ruled out. Therefore, the use of anti-virus programs, both free and paid, becomes very crucial. There are many top anti-virus programs that are downloadable from the web for free.

Disable USB ports on Windows PC via Registry


Disable USB ports on Windows PC via Registry

With this trick, you can disable access to your USB(Universal Serial Bus) ports in your Windows based PC to prevent people from taking out data from your personal computer without permission or spreading viruses through the use of USB(pen and flash) drives.

To use this trick to disable USB ports, follow the steps given below:-

  1. Click on Start.
  2. Click on Run. If you cannot find RUN, type it in the search box.
  3. Type "regedit" without quotes. This will launch the Registry Editor.
  4. Navigate to  HKEY_LOCAL_MACHINE\SYSTEM\CurrentControlSet\Services\usbstor.
  5. In the work area, double click on Start.
  6. In the Value Data box, enter 4.
  7. Click on OK.
  8. Close Registry Editor and refresh your desktop.
  9. To re-enable access to your USB ports, enter 3 in the Value Data box in Step 6.

Disable access to USB ports on your PC using Registry Editor

Try it yourself to make your PC invulnerable from data theft and malware which spread through USB ports. This works on Windows XP, Windows Vista, Windows 7 and Windows 8.

Note: This trick also disables access to your USB connected peripheral devices. So, do not use it if you have USB connected keyboard and mouse.

Monday, 29 April 2013

How to hide a files in a jpg image / file


How to hide a files in a jpg image / file


Hide files in a jpg

Set up:
1. Must have a .zip or .rar compressor.
2. Willingness to learn.

Steps:
1. Save the picture of choice to your desktop.
2. Make a new .rar or .zip folder on your desktop.
3. Add the files you want to hide into the .zip or .rar
4. Click start menu, run, cmd.
5. In Command Prompt type cd “desktop” with the quotation marks.
6. Now type in copy /b picturename.jpg + foldername.rar outputfilename.jpg
( If you use .zip then: copy /b picturename.jpg + foldername.zip outputfilename.jpg)
7. Now there should be the outputed file name with a .jpg extension on the desktop.
( Do not close Command Prompt just yet )
8. Double click it to open the picture and check it out.
9. When your done looking, and want to view the hidden files
Type: ren outputfilename.jpg outputfilename.rar or zip
Now you’re done!

How to Hack Samsung Phone Screen Lock


How to Hack Samsung Phone Screen Lock


I have discovered another security flaw in Samsung Android phones. It is possible to completely disable the lock screen and get access to any app - even when the phone is "securely" locked with a pattern, PIN, password, or face detection. Unlike another recently released flaw, this doesn't rely quite so heavily on ultra-precise timing.

Of course, if you are unable to download a screen unlocker, this security vulnerability still allows you to dial any phone number and run any app!

HOWTO

  1. From the lock screen, hit the emergency call button.
  2. Dial a non-existent emergency services number - e.g. 0.
  3. Press the green dial icon.
  4. Dismiss the error message.
  5. Press the phone's back button.
  6. The app's screen will be briefly displayed.
  7. This is just about long enough to interact with the app.
  8. Using this, you can run and interact with any app / widget / settings menu.
  9. You can also use this to launch the dialler.
  10. From there, you can dial any phone number (one digit at a time) and place a phone call.
  11. With Google Play, you can search for apps using the voice interface.
  12. You can download apps from the app store which will disable the screen lock.

Impact

This does not occur on stock Android from Google. This flaw only seems to be present on Samsung's version of Android. I have only tested it on a Galaxy Note II running 4.1.2 - I believe it should work on Samsung Galaxy SIII. It may work on other devices from Samsung.
My test phone was running 4.1.2 with the Touchwiz launcher from Samsung.

Defending Against This Attack

Until Samsung release a patch, the only way this can be defended against is by completely removing the Samsung firmware and replacing it with a 3rd party ROM.
This ROM for the Galaxy S III claims to have fixed the problem.
I'm sure there will be ROMs for other Galaxy devices in due course.

Responsible Disclosure

I reported this flaw to Samsung in late February. They are working on a patch which they assure me will be released shortly.
I have delayed public disclosure of this vulnerability. I also asked if they wanted me to delay publication until a patch was ready - however they declined this offer.
If you discover a security issue with Samsung's mobile products, I strongly encourage you to email m.security AT samsung.com
They will provide their PGP public key if you wish to ensure your communications with them are secure

Sunday, 28 April 2013

How to Use Your Android Device as a Mouse, Keyboard, Joystick and More


How to Use Your Android Device as a Mouse, Keyboard, Joystick and More

Using your Android to control your computer is a great way to interact with programs. Your phone can be used a trackpad, or could be used to use a media player using custom controls.Monect lets you take things further by turning your Android device into all manner of peripherals.

What Are the Options?

There are plenty of apps available in Google Player that let you use your phone or tablet as a wireless keyboard or mouse for a computer. Monect can be used in this way, but it also boasts a number of other options that cater to a variety of scenarios.
This free app can transform your phone into not only a mouse or keyboard, but also a joystick, gamepad, media controller and much more. It’s great for gamers, but options such as text transfer and presentation mode open up additional opportunities.
There are two components to the tool, the Android app and the desktop server. A package containing both pieces of software can be downloaded from its Hotfile hosting page.
There’s no need to sign up for an account, just click the Regular Download button, wait for the timer to count down and then click the download link. You may see a warning from your browser or AV tool that the file is potentially harmful, but this is simply a case of overzealousness in detecting a tool that is used for remote access.
You’ll need to extract the contents of the zip file and then launch the file named MonectHost. You’ll probably find that your firewall kicks in and you’ll need to allow the program to make use of your network in order to continue.

Getting Connected

Assuming your phone and computer are connected to the same wireless network, it will take a matter of seconds to establish a connection.
On your phone or tablet, install a copy of Monect from Google Play, launch the app and then either type in the IP address of your computer and tap Connect, or tap ‘Search host’ to scan for and connect to your machine.  If you find that you are unable to connect, trying restarting Windows to ensure that the installation is complete.
Once connected, you’ll see that are no less than 12 different modes to choose from; in most cases it is fairly obvious what each one does, and each can be used in different ways.

Controller Modes

Touchpad mode turns your phone into a laptop-style trackpad complete with a scroll bar to the right. In this mode you can also access 3D Mouse mode which enables you to move the cursor around by using your phone as a laser pointer.
Typewriter keys, Function keys and Numeric keypad are all modes in which you can use your phone as a keyboard. This can be handy if your keyboard is broken and you need a temporary replacement, or you are using a laptop or keyboard without a number pad.
In Text Transfer mode it is possible to type and prepare text on your phone and then send it to whatever application currently has focus on your computer.
Switch to My Computer mode and you can browse the contents of your hard drive from your Android device. Folders can be easily navigated, and files can be opened remotely, or downloaded to your phone – just tap and hold to bring up the option menu.
Things start to get particularly interesting for gamers in Race, Joystick and Shooter modes. The app takes advantage of your device’s built in gyroscope so that it can be used as a steering wheel, a more traditional joystick/gamepad or as a crosshair control for FPS games.
The remaining three modes, PowerPoint, Browser and Media mode are ideal for when your computer is connected to a larger screen, projector, or a TV. Each mode features the touchpad area and mouse buttons.
In each case there are task specific buttons at the top of the screen. So whether you are looking to control video playback from the comfort of your sofa, or you want to be able to browse the web on your TV without having to battle with a regular keyboard and mouse, Monect makes it easy.

How to change Logon Screen of Windows7.



Windows 7 Logon Screen


Windows7 wass the most popular Operating Syst.Today iam posting about Windows7 customization.Today,We can study how to change windows7 logon screen.

                             There are somany ways tochange logon screen.Here,Iam using a Third-party software.

First you want to install this third-party software,If we install this,We can change background image of start screen,Text,Button,Colour.

Click here to download this software



Some images to make logon screen.

1














2
















3



Thanks for reading my blog. Your feedbacks are my support. 

How To Change Facebook Theme

How To Change Facebook Theme


Stylish facebook f icon
Today we are sharing another latest facebook trickwith tricksmode readers on "How to change facebook theme". Peoples who are using facebook since long time often find the blue colored theme of facebookannoying but as like Myspace,Facebook implicitly doesn't provides a feature to change facebook theme. But you can change your facebook theme by using this facebook trick. Its very easy to change facebook theme and you don't need Expert level knowledge to do this.





How To change Facebook Theme?

Follow below steps to change facebook theme of any facebook profile.


Google Chrome Users Follow This:


1) Go to Chrome web store and install Stylish Add on To Chrome.

2)After installation, Login to your facebook Account and click on S icon on your address bar.

3)Then click on "Find more styles for this site".

4) Now user-styles site will open in new Tab will which consists over 1000 facebooktheams.

5) Click on your favorite theam. A preview of facebook theme will shown. Now click on "Install with Stylish" Button to install that facebook theme with your facebook profile.


6) New facebook theme will take 2-3 seconds in installation and after installation you will see the new facebook look like this.


7) For better results, Restart your browser after installation of facebook theam.

Mozilla Firefox Users Follow This:


1) Open Mozilla Firefox and Go to This Link To install Stylish Add on for Firefox. After clicking on above link, Mozilla Firefox will ask for permission to install script on it. Click on Allow to begin installation.


2) Now after installation, Restart Firefox.


3)Now Login to your facebook Account and click on 
S icon on your Firefox's status bar.

4)After that click on "
Find more styles for this site".
5) Now a new tab will open. Click on your favorite theme. A preview of facebook themewill shown. Now click on "Install with Stylish" Button to install that facebook theme with your facebook profile.

6) Installation will take 2-3 seconds. After installation restart your browser for better results.
 There are 1000's of facebook themes available on Stylish..Search for your favorite themes and install it with your facebook account.

What you think on this facebook trick,please leave your valuable comments in comment box below...

Send free unlimited sms from your Airtel Mobile



Here iam sharing you a 100% working Airtel hacking trick.This trick is not popular.So iam posting this trick to make this 100% working trick for airtel users.You can send unlimited sms from your Airtel mobile without paying charges.I think this trick working only some NOKIA phones.I tried this trick on NOKIA C1,NOKIA Express Music AND NOKIA C5.

Step 1:Create a new message center 
     Message Center Name: ANY
     Message Center Number (MOST Important):  +919810051905
Step 2:Select preferred connection -> Packet Data
Step 3:After creating a new message center, please manually select it from
     MESSAGE CENTER IN USE BOX.
Step 4:Now Go to setting -> Phone Setting -> Connection -> Packet Data
     Here change PACKET DATA CONNECTION -> when available
     and Access Point -> Airtel Live! ( Pls. Write as I have written here)

All setting has been DONE !!

Airtel increased their SMS Offer charge.So it will be a helpful trick for airtel users to send SMS and connect with your friends.

How To Convert Non Touch Screen Into Touch Screen


How To Convert Non Touch Screen Into Touch Screen

0 Comments and 0 Reactions
Friends I know  after reading title of this post you are thinking i am kidding, But friends i am very true with my post, now it is possible to convert non-touch screen into touch screen. Some days ago Jeswill HiTech Solutions Pvt. Ltd. introduced a new hardware kit to convert non-touch screen into touch screen.

Company is saying that they developed this product because recently Microsoft launched Windows 8 which got a very high popularity, But users can not enjoy the original  experience of windows 8 on their non-touch laptop or pc and if the user will go for new touch screen LCD for his pc then it is cost approximately Rs.10,000 more as compare to simple LCD and company is providing this kit at very low price i.e only @ Rs.4999/-


So lets discuss something about this product.

WHAT IS E-TOUCH PEN ?
E-Touch Pen is a device who uses Ultrasound and Infrared technologies, consists of ultrasonic digital stylus and a small receiving unit. This device is designed specially for Windows 8 and it
enables all non-touch Laptop screen with touch features.





WHAT ARE COMPONENTS OF E-TOUCH PEN ?
E-touch pen kit contains only three components which are giving below:-

o Cordless electronic pen (Including special refill and batteries)




o Detachable base unit,



o USB cable connection to PC




WATCH THIS VIDEO FOR MORE INFO