Tuesday 11 September 2012

What is Phishing ? | The Basics Course About Phishing


 hello to all my friendz .After my post How To Delete Anyone Profile From your Facebook Account Today I am learning you . what is phising ? it's basic course about phising . by this easy way you can hack any facebook account . i think mostly guys didn't about this . so don't worry . you can learn here about phising .

 
Phishing is an attempt to criminally and fraudulently acquire sensitive information, such as usernames, passwords and credit card details, by appearing as a trustworthy entity in an electronic communication. eBay, PayPal and other online banks are common targets. Phishing is typically carried out by email or instant messaging and often directs users to enter details at a website, although phone contact has also been used.



Phishing is an example of social engineering techniques used to fool users. Attempts to deal with the growing number of reported phishing incidents include legislation, user training, public awareness, and technical measures.
Recent phishing attempts have targeted the customers of banks and online payment services. Social networking sites such as Orkut are also a target of phishing.

Spoofed/Fraudulent e-mails are the most widely used tools to carry out the phishing attack. In most cases we get a fake e-mail that appears to have come from a Trusted Website . Here the hacker may request us to verify username & password by replaying to a given email address.

Techniques Behind A Phishing Attack

1. Link Manipulation

Most methods of phishing use some form of technical deception designed to make a link in an email appear to belong to some trusted organization or spoofed organization. Misspelled URLs or the use of subdomains are common tricks used by phishers, such as this example URL

2. Filter Evasion
Phishers have used images instead of text to make it harder for anti-phishing filters to detect text commonly used in phishing emails. This is the reason Gmail or Yahoo will disable the images by default for incoming mails.

How does a phishing attack/scam look like?

As scam artists become more sophisticated, so do their phishing e-mail messages and pop-up windows. They often include official-looking logos from real organizations and other identifying information taken directly from legitimate Web sites. Here is an example of how the phishing scam email looks like


Example of a phishing e-mail message, including a deceptive URL address linking to a scam Web site.

To make these phishing e-mail messages look even more legitimate, the scam artists may place a link in them that appears to go to the legitimate Web site (1), but it actually takes you to a phishing site (2) or possibly a pop-up window that looks exactly like the official site.

These copycat sites are also called “spoofed” Web sites. Once you’re at one of these spoofed sites, you may send personal information to the hackers.

How To Identify A Fraudulent E-mail?

Here are a few phrases to look for if you think an e-mail message is a phishing scam.
“Verify your account.”

Legitimate sites will never ask you to send passwords, login names, Social Security numbers, or any other personal information through e-mail. 
“If you don’t respond within 48 hours, your account will be closed.”

These messages convey a sense of urgency so that you’ll respond immediately without thinking. 
“Dear Valued Customer.”

Phishing e-mail messages are usually sent out in bulk andoften do not contain your first or last name. 
“Click the link below to gain access to your account.”

HTML-formatted messages can contain links or forms that you can fill out just as you’d fill out a form on a Web site. The links that you are urged to click may contain all or part of areal company’s name and are usually “masked,” meaning that the link you see does not take you to that address but somewhere different, usually a scam Web site.

So The Bottom Line To Defend From Phishing Attack Is

1. Never assume that an email is valid based on the sender’s email address.
2. A trusted bank/organization such as paypal will never ask you for your full name and password in a PayPal
    email.
3. An email from trusted organization will never contain attachments or software.
4. Clicking on a link in an email is the most insecure way to get to your account

What Is Ethical Hacking ? | The Basics Course About Ethical Hacking


Ethical hacking, often performed by white hats or skilled computer experts, is the use of programming skills to determine vulnerabilities in computer systems. While the non-ethical hacker or black hat exploits these vulnerabilities for mischief, personal gain or other reasons, the ethical hacker evaluates them, points them out, and may suggest changes to systems that make them less likely to be penetrated by black hats. White hats can work in a variety of ways. Many companies utilize ethical hacking services from consultants or full-time employees to keep their systems and information as secureas possible.


The work of ethical hacking is still considered hacking because it uses knowledge of computer systems in an attempt to in some way penetrate them or crash them. This work is ethical because it is performed to increase the safety of the computer systems. It’s reasoned that if a white hat can somehow break the security protocols of a system, so can a black hat. Thus, the goal of ethical hacking is to determine how to break in or create mischief with the present programs running, but only at the request of the company that owns the system and specifically to prevent others from attacking it. 

People enter the field of ethical hacking in a variety of ways. Many people are very computer savvy and many, but not all, have an educational background in computer science. In some instances, the white hat has gained his or her experience by first being a black hat. 

If black hat hacking was at a sufficiently criminal level, the black hat turned white hat may have served jail time before resuming a career in a more productive and positive way as an ethical hacker. The computer world is peopled with former black hats, who now hold ethical hacking jobs. Conversely, some white hats, such as Steve Wozniak, never committed any illegal acts, but simply possess the know-how and skills to analyze problems with any computer system.

With increasing use of the Internet and concerns about its security, especially when it comes to things like consumer information or private medical details, there is considerable need for computer experts to work in ethical hacking. Even sites owned by organizations like the US government have been hacked in the past, and concern about information theft remains incredibly high. Designing impenetrable systems or identifying the current weaknesses of a system are vital parts of keeping the Internet safe and information private, and even with the present legion of ethical hackers that perform this work, there is still more work to do. 

Those with interest in the field of ethical hacking often acquire a lot of their skills on their own, and many have particular talent with and affinity for computers. Some knowledge can also be acquired through formal education in computer programming. This work requires creativity, and the ethical hacker must be able to think outside of the box, coming up with as many possible ways as he or she can derive, a system might be encroached upon by black hats.

Best Tips To Secure Yourself From Hacking


you should know to Secure your computer from getting hacked by some.Remember if you follow these guidelines it will be extremely difficult for a hacker to enter into your pc and to hack your data.As today everything from banking,business,studies etc is online so the threat of being hacked is becoming more and more dangerous.Ok,so listed below are the steps you should follow


Do Not Disclose Your IP Address
This the biggest mistake you could ever do.Never Disclose your IP address to anybody because ip address is the address of your computer.Once the hacker knows the address of your computer it will be easy for him Enter into your home(computer) and steal your accessories ( data and passwords).

Do Not Download any Suspcious Software or Attachments
A lot of people search for cracks and keygens online.Remember this is most exploited method used by the hackers to hack into the pc(personal computer).They usually attach a keylogger or virus with the crack or the keygen.Once you download and install it then your data will be automatically sent to the hacker without your permission.And this might lead to a disaster if you are a online business man because your sensitive information such as paypal account information,e-mail account information can be sent to the hackers.

Use Good Antivirus And Firewall Program

Do not depend upon windows firewall to protect yourself from online hackers.It is always a wise decision to use a good firewall program and do install a good antivirus program.If you dont have enough money right now go for the free antivirus and firewall program but make sure that you have a updated antivirus and a firewall 
installed on your computer.

Use Secure Passwords (3D passwords)
Always use 3D passwords to protect your accounts from getting hacked.Your password must contain digits,special symbols like underscore( _ ) and characters.Do not use small passwords.Your password should be at least eight characters long in length.

Always logout From Your Accounts
You should always logout from your accounts instead of closing the browser window directly because whenever you login into your account a cookie is placed by the server into your account and when you logout this cookie is deleted.If you do not logout and the cookie is not deleted the hacker might gain access to this cookie and then he would be able to login into your account from his pc. 

Make backup Of Your Data
Some viruses are made to destory your data so it is always advisable to store your data in a backup file.various good data backup programs are available on the internet. 

Hacking Tips To Speed up windows 7


This article is for all those people who want to increase the performance/speed of their windows 7 operating system. We are not providing here any softwares for this purpose we are just giving you tips to tweak your windows 7 according to your needs and you will certainly get your desired performance from your windows 7 operating system.Here is the step by step tutorial with screenshots on how to increase your windows 7 speed .


1.Disable Startup Services
Windows startup services can be found by clicking on start and the and typing “ msconfig ” and pressing enter.Now click on services tab.Now you can disable the unwanted services by checking them and clicking on disable.While this should be done according to your requirements.Services like “Offline Files,” “Tablet PC Input Services,” Terminal Services,” “Fax” and “Windows Search. “Offline Files,” “Tablet PC Input Services,” Terminal Services,” “Fax” and “Windows Search have a large impact on windows 7 speed/performance.

2.Utilize Readyboast
Microsoft introduced readyboast service with the launch of windows vista and continued the service in windows 7.In ready boast service whenever you plugin your pendrive into your computer you will get an option to use your pendrive to speed up your windows 7 or windows vista.It will increase your windows memory.By using ready boast you can also specify how much memory of the pendrive should be used to speed up your windows 7.

3.Disable Windows transparency
Disabling the windows 7 transparency option will certainty give a good speed to your windows 7 speed/performance.Disabling transparency is very easy in windows 7.Simply right-click on your desktop, select “Personalize,” choose the active theme and then navigate to “Windows Color.” Finally, uncheck the “Enable Transparency” option.

4.Remove Unwanted Programs from Startup
Disabling unwanted programs such as messengers or other programs from startup will not only increase speed of your windows 7 it will also decrease the startup time of windows 7.

5.Disable Unwanted Features Of Windows 7
To disable unwanted features from windows 7 click on “ Start “ then on control panel.Now click on “ Programs “ then on “Turn Windows features on or off”.Now disable the features you think you dont want.We recommend you to disable the “ Indexing Service “ it will have a noticeable effect on the speed.

6.Defragment Your Windows Regularly
Adding and deleting files from drives will make your drives fragmented and it will take longer to access files so defragmenting the drive will decrease file access time.To start defragmentation click on “ Start “ and type “ Disk Defragmenter “ And press enter.Now start the defragmentation.

How To Configure Gmail With A Desktop Mail Client


What is Spyware and Adware?

Spyware and Adware is software made by publishers that allow them to snoop on your browsing activity, invade your privacy, and flood you with those horrible popups. If you are like most users on the internet, chances are you are probably infected with these applications. That is why we have designed our revolutionary product.



Why does Spyware and Adware affect every internet user? 



  • All information you enter via the web can be intercepted 
  • Unauthorized sites can add themselves to your desktop (icons) 
  • Unauthorized sites can add themselves to your internet favorites 
  • Your browsing activity can be tracked and monitored
  • Unwanted tool bars and search bars can attach themselves to your browser without your knowledge or approval
  • Your personal information can be sold to other parties without your knowledge or consent 
  • Your default homepage and settings can be hijacked so you can't 
  • change them 
  • These malicious components not only invade your PC so they can not be removed, but take up your hard drive space and slow down your PC!
  • To protect our system and data, we need some good tools which can protect our system. No adware is a nice tool with great technology. This protects your system and data from various type of threats. 

Free Download Avast 6 Home Edition 1 Year License Serial Key


Avast antivirus is one of the top leading antivirus and it is available for free download.You will get a fully functional 30 day trial version of avast if you download directly from their website.To activate it for one year you need to register with them.Once registered you will get your Serial license key into your mailbox. Here are some of the features of Avast 6 Home Addition Antivirus Avast Sandbox:-Using Avast Sandbox you can run programs suspected for viruses in an isolated envirnoment so even if they contain any virus your computer will be safe. Website Block:-Website Block technology allows you block websites that should not be opened by family members. Webrep:-It allows you to rate websites in your browser.




Get Genuine Avast 6 Home Edition License Serial key?
  • Open Official Avast Registration Page by Click here
  • Enter the details in form and you will recieve your License serial key within 24 hours at your email id.


Free Download Avast Mobile Security Beta For Android


Avast has launched Beta version of its Mobile Security for android devices.Theft Aware which is priced around 4 USD comes pre bundled with Avast Mobile Security for free .This is one of the most comprehensive security suite that is capable of competing against rival paid products.
Avast has always distinguished itself from other companies by releasing quality products for free be it Antivirus for computers or Mobiles.


  • Protect your personal data with automatic virus scans and infected-URL alerts.
  • Stop hackers by adding a firewall (rooted phones).
  • Control anti-theft features with remote SMS commands for: history wipe, phone lock, siren activation, GPS tracking, audio monitoring, and many other useful tools.
  • Your ‘invisible’ app hides itself, making it extremely hard for thieves to find and disable.
  • A standalone yet tightly integrated component of avast! Mobile Security, avast! Anti-Theft is the slyest component on the market. Formerly known as Theft Aware, the Anti-Theft portion of avast! Free Mobile Security has been recommended by leading industry experts that include T-Mobile, N-TV, AndroidPIT, and Android Police.
                                      

Free Download Bitdefender Total Security 2012 Beta Antivirus (Full Version)


ow To Download Bitdefender Total Security 2012 Beta ?

Click the Link Below to goto official Download page


Or use the download link below to download the oflline installer directly


Monday 10 September 2012

Counselling At Anna University-58000 Seats Vacant


Anna University recently held its first academiccounselling. In-spite of increase in number of students opting for engineering, around 58000 seats are left vacant at the end of academic counsellingsession on Saturday. This time, the number of vacant seats is 14029 more in comparison to last year.
In order to justify the lag, it is said that students are rushing to newer colleges and they prefer government seats than the management quota seats. Educational analyst say that an additional 21 new colleges offered 28.460 seats but the students didn't prefer them.
TN consists of 540 Engineering Colleges across the state. The number of Government seats inEngineering colleges including vocational courses is 1,24,430 and that for engineering is 1,20,712. Its almost 58,029 seats left vacant, said the sources.
The secretary of Tamil Nadu Engineering Admissions (TNEA) Rhymend Uthiaraj said "When more than 28,000 seats were added, vacancies were bound to increase. But the fact that people opting for engineering seats went up by 15,000 means the field is in demand." On having a look at the previous allotments, around1,10,000 seats were occupied out of 1,54,000 seats. He also said that the colleges have given up more than 20,000 management seats to Government. The number of vacant seats is likely to be estimated in a week.

Anna University: M.Tech Counseling Scheduled Dates


Anna University, Chennai announced Tamil Nadu Common Admissions (TANCA 2012) counselling dates for admission in to M.E, M.Tech, M.Arch, M.Plan degree programmes.
The Anna University has declared that the counselling will begin from Aug 25 to 31, 2012 for PG Programmes, nearly 12,000 seats are available for the counselling. This year 20,000 candidates have applied for the M.Tech Programme. The University is offering 20 specialization in Civil Engineering, 34 in Mechanical and 28 in Information and Communication.
Faculty of Technology offers 20 courses and 6 by School of Architecture that include specialization in real estate, Digital Architecture, Language and Environment Architecture.
Rhymand Uthariaraj, in-charge of the single window counselling for Tamil Nadu Common Admissions (TANCA 2012) said that, "There is a 2,000 more seats for M.Tech programmes". The increase in number of candidates is also because of more research oriented jobs available in the market now.
The counselling schedule and the format containing details have been published in official website of Anna University and will be updated frequently, said officials. The counselling for candidates who have their GATE scores will be on Aug 25, 2012. The next day will be for students with physical disability and then we will have the phase one admission for the students with non-gate score on Aug 31. 2012.
Mr.Uthiariaraj Said,"We have split the counselling into two parts and we might extend it by abother two days if there are vacancies. Candidates are advised to check the TANCET college wise seats allotment for GATE and Non-GATE candidates, sid officials.
Eligible candidates have to appear for counseling according to their cutoff mark, two hours before the counselling session, irrespective of receipt of individual communication. Candidates who do not attend the counselling may have to forget the claim of admission.
Click here, To know the Counseling scheduled dates.
Contact Details:
044-2235 8265 / 66 / 67.
tanca2012@annauniv.edu .

Several Engineering Seats Go Vacant In Tamil Nadu


A huge number of Engineering seats are to go vacant in Tamil Nadu. According to the officials the predicted number of seats is 60,000 plus in number. At the end of ongoing counselling at Anna University these seats are remained unfilled in almost across 450 engineering colleges in Tamil Nadu.
The sources recall that last year the vacant seats were around 40,000 and this year increased to 20,000 plus seats going vacant. This was instead expected going by the growing difference between demand and supply in the engineering sector of education.
However, besides all these growing concerns for the down-slide in the quality of infrastructure and faculty in many of the institutions. The most unexpected fact is that it is likely that a dozen more engineering colleges are likely to harvest by the end of this year's admission process.
Well, it seams that the demand for arts and science courses has gone up, as Coimbatore colleges have filled their arts and science seats successfully. And, less than a three-forth of engineering colleges are able to fill their seats by building a positive image through judicious investments in infrastructure and faculty, and consecutively good results in examinations and campus recruitment's too.

Taliban deny report that they are ready for peace talks

LONDON/KABUL, Sep. 10, 2012 (Reuters) — The Afghan Taliban denied a report on Monday that some of their leading members were ready to negotiate a comprehensive peace deal involving a long-term U.S. military presence in Afghanistan.


A report to be published by the Royal United Services Institute said some leading Taliban were determined to make a decisive break with al Qaeda as part of a settlement and were open to negotiation about allowing education for girls.
"The Taliban would be open to negotiating a ceasefire as part of a general settlement, and also as a bridge between confidence-building measures and the core issue of the distribution of political power in Afghanistan," the report said.
But a spokesman for the Islamist group in Afghanistan denied that any interviews had taken place. "The report is a lie and is baseless," Zabihullah Mujahid told Reuters from an undisclosed location.
"We have never wanted the Americans to stay in Afghanistan and this has always been our position."
The Taliban, who have been fighting against NATO-led troops for 11 years, have always maintained that any negotiations with Afghan authorities and Washington could only be carried out once there were no foreign soldiers on Afghan soil.
RUSI said its report, entitled "Taliban Perspectives on Reconciliation", was based on interviews with four unnamed Taliban figures, two of whom had been ministers in the former Taliban government and were still close to the inner circle of leadership.
The report cites a person described as a founding member of the Taliban as saying that the group might accept continuing U.S. counter-terrorist operations targeting al Qaeda in Afghanistan as long as the bases were not used to launch attacks on other countries or for interference in Afghan politics.
The report said that from the Taliban's point of view, any ceasefire would need strong Islamic justification and could not hint at any form of surrender.
U.S. officials have said they see signs that insurgent hostility to peace talks may be splintering.

China factory growth slips, government spending eyed

BEIJING, Sep. 9, 2012 (Reuters) — China's factories ran at their slowest rate for 39 months in August while a double-digit rise in fixed asset investment showed that infrastructure spending remained key to economic growth.


Industrial output growth slowed to 8.9 percent year on year, the weakest since May 2009 and below market forecasts of a 9.1 percent rise, data from China's National Bureau of Statistics (NBS) showed on Sunday.
Fixed asset investment, which accounted for half of China's net economic growth in the first-half of 2012, grew 20.2 percent between January and August compared to the year earlier period, a touch below expectations for a 20.4 percent expansion.
Retail sales rose 13.2 percent last month from a year ago, in line with forecasts in a Reuters poll, though the trend of spending so far in 2012 has been tracking slightly lower.
The data is likely to reinforce market expectations that China will further adjust policies soon to lift an economy mired in its softest period of growth in three years.
"The headline numbers do not look very good and they suggest a pretty challenging outlook for policymakers," Zhang Zhiwei, chief China economist at Nomura in Hong Kong said.
China's vast factory sector has been badly hit by slowing new orders. Surveys of purchasing managers earlier this month showed concerns growing about new business, suggesting that manufacturers will run inventories down further before they can begin to turn production up again.
Data earlier on Sunday showed the annual rate of consumer inflation ticked up to 2.0 percent in August from July's 30-month low of 1.8 percent, suggesting that room to ease monetary policy to shore up growth may be narrowing.
Economists polled by Reuters had forecast inflation to pick up to 2.0 percent in August, but month-on-month inflation was a touch ahead of forecasts, up 0.6 percent in August versus July. Analysts had anticipated a rise of 0.5 percent.
"Inflation is coming back quickly. Together with rising home prices, it will limit the scope for further policy relaxation," said Dong Xian'an, economist with Peking First Advisory.
STICKY FOOD INFLATION
Food prices have eased sharply in 2012, but are still running at an annual rate of 5.9 percent so far - sticking above the government's overall inflation target of 4 percent.
That is especially pertinent to policymaking as most household income in China is spent on basic necessities. Average annual urban disposable income was 21,810 yuan ($3,500) in 2011.
China's economic growth has slowed for six straight quarters and analysts expect the trend to extend to a seventh when third quarter GDP data for 2012 is published. Growth in Q2 was 7.6 percent, its slackest in more than three years.
Recent data have cemented views that growth for the full year will be its lowest since 1999 and may fall below 8 percent.
Separately, the NBS said China's producer price index dropped 3.5 percent in August from a year earlier, which compared to forecasts for a 3.3 percent decline.
It marked the sixth straight month of producer price deflation, putting a further squeeze on corporate profits already dampened by a drop-off in demand at home and abroad courtesy of global economic headwinds stemming from Europe's sovereign debt crisis.
Investors widely expect the central bank to ease monetary conditions further as part of the government's campaign of "policy fine-tuning" unveiled in the autumn of 2011.
The People's Bank of China has cut interest rates twice since June and trimmed banks' required reserve ratios (RRR) in three 50 basis point steps since last November that has freed an estimated 1.2 trillion yuan ($190 billion) for new lending.
But a seeming recent preference for using money market operations over interest rates to boost liquidity conditions in the economy is seen as a sign of the policy dilemma facing a central bank and a government super hawkish on inflation and wary of aggressive rate cuts.
Officials last week revealed they had given the green light to 60 infrastructure projects worth more than $150 billion, as Beijing seeks to energise the economy. The announcement fuelled investor hopes the world's growth engine may get a lift in the fourth quarter of the year and beyond.
The approvals are roughly a quarter of the total size of the massive stimulus package unleashed in response to the global financial crisis in 2008. Fixed asset investment contributed 3.9 percentage points China's 7.6 Q2 growth.
Chinese President Hu Jintao urged Asia-Pacific nations on Saturday to speed up infrastructure development to help face the "grave challenges" from the global economy.
Qiu Xiaohua, former head of the National Bureau of Statistics and now a senior researcher with the China National Offshore Oil Corporation (CNOOC), told a forum in the city of Xiamen on Sunday that the government still had room to act to bolster growth - and urged it to do so.

Enough Wind to Power Global Energy Demand: New Research Examines Limits, Climate Consequences

ScienceDaily (Sep. 9, 2012) — There is enough energy available in winds to meet all of the world's demand. Atmospheric turbines that convert steadier and faster high-altitude winds into energy could generate even more power than ground- and ocean-based units. New research from Carnegie's Ken Caldeira examines the limits of the amount of power that could be harvested from winds, as well as the effects high-altitude wind power could have on the climate as a whole.


Their work is published September 9 by Nature Climate Change.
Led by Kate Marvel of Lawrence Livermore National Laboratory, who began this research at Carnegie, the team used models to quantify the amount of power that could be generated from both surface and atmospheric winds. Surface winds were defined as those that can be accessed by turbines supported by towers on land or rising out of the sea. High-altitude winds were defined as those that can be accessed by technology merging turbines and kites. The study looked only at the geophysical limitations of these techniques, not technical or economic factors.
Turbines create drag, or resistance, which removes momentum from the winds and tends to slow them. As the number of wind turbines increase, the amount of energy that is extracted increases. But at some point, the winds would be slowed so much that adding more turbines will not generate more electricity. This study focused on finding the point at which energy extraction is highest.
Using models, the team was able to determine that more than 400 terrawatts of power could be extracted from surface winds and more than 1,800 terrawatts could be generated by winds extracted throughout the atmosphere.
Today, civilization uses about 18 TW of power. Near-surface winds could provide more than 20 times today's global power demand and wind turbines on kites could potentially capture 100 times the current global power demand.
At maximum levels of power extraction, there would be substantial climate effects to wind harvesting. But the study found that the climate effects of extracting wind energy at the level of current global demand would be small, as long as the turbines were spread out and not clustered in just a few regions. At the level of global energy demand, wind turbines might affect surface temperatures by about 0.1 degree Celsius and affect precipitation by about 1%. Overall, the environmental impacts would not be substantial.

We Have Available Total 120 Crore Indian Mobile & Email Database Updated Before 2 Month.

All INDIA Updated Mobile Database. Price For Database. Rs. 1100/-      For Any 1 Indian City. Rs. 1600/-    For...