Showing posts with label SECURITY TIPS. Show all posts
Showing posts with label SECURITY TIPS. Show all posts

Friday, April 13, 2012

Proxy To Bypass Restrictions On College Network

Seeing the amount of time and bandwidth students waste on social networking sites and torrent downloads. Most of the colleges (at-least in India) have blocked access to such sites on their network. The effectiveness of this restrictive measures depend upon the system used by the college to place this restrictions. Now most of this systems can be easily bypassed by using some simple trick or procedure. But some colleges employ professional system to place the restrictions. Bypassing them can be a real headache. But here is a proxy service which you can use to even bypass this professional systems. Frankly i didn't try it, but one of my friend was facing the restrictions on his college Wi-Fi, especially for torrent downloads. Now he had the options to use other bypassing tricks but it would not work for him because he was compelled to use his student login details to connect to the internet and he feared that if the authorities came across his bypassing he would be permenately blocked from the network. But when he used the below proxy service according to him the proxy bypassed the whole login procedure and directly connected to the internet.

PD-Proxy 
PD-Proxy is a proxy software which uses tunneling to provide more secure connection to the internet. According to my freind, it uses VPN to bypass the system and connect directly to internet. If you are using Wi-Fi this VPN service can be very useful as the information travelling from your computer to the VPN is encryted and thus you have an added layer of security.
To use the service, you have to visit their website and sign up. Then download and install the software. Connect through the software and enjoy. Their free account has 100mb limit. Before you buy premium account please check if it works for you, don't come blaming me later, because you can never be sure which service is good to bypass a particular restricting system. 

Click here to visit PD-Proxy website                                


Tuesday, March 29, 2011

HACKING EMAIL IDs USING SMS & EMAIL BOMBERS

Hacker always come up with innovative ideas to hack email ids. Fake sms and email bomber softwares are one of them. Now let us have a look at how this sms and email bombers are used to hack email ids on a large scale. So what the hacker will do is, make a simple program with Graphical user interface using programing language like Visual Basic or Java (This basic programs are very easy to make if you have some knowledge of Visual Basic).
Here is a example of such a program. The GUI is kept very basic with minimum options. Now when the user fills the fields and presses "bomb" instead of doing its said work it will just deposit the username and the password in the hackers database and give the users some silly error like "Server busy" or "The target has blocked you" etc. So don't be surprised when you receive a email about Viagra or Porn sites because after collecting enough of this email ids the hacker will just sell them to above site owners.

I am not saying that all this softwares are fake, there are some genuine software which really work. I have my self successfully tested SMS bombers.But they have their limitations. Do you really think that Gmail will allow anybody to bomb anybody? It will quickly understand your intentions and stop you.

So next time if a thought of bombing comes in your mind. Just pause for a minute and think, do you really want to do this? my personal opinion about bombing is that it is very childish and immature and if anybody gets satisfaction or happiness by doing such dumb things then he should get some psychological help.
 
 

Wednesday, September 1, 2010

A DUMB METHOD TO HACK EMAIL IDs

We all know that hackers are one of the most creative people in the world and they always invent ingenious hacking methods. Here is a method for "mass hacking" email ids. Though its a smart method, mostly the dumb people fall prey to it. Lets have a look at this method.

While randomly searching, i found this procedure for automatically hacking email ids. Here is the procedure as i found it. Lets do an autopsy of this so called easy hacking procedure.
NOTE:- The procedure in normal black writing is the fake hacking method and the notes in red are the explanation by me.

Friday, August 13, 2010

HOW TO USE PATCH FILE ( provided with cracked softwares)

Generally the executable files which are provided by software developers to fix some bugs in their software or as a update to the latest version of their softwares used by the users are called Patch Files. But the executable files provided with softwares to crack them are also called Patch files.
If you download softwares using torrent and other p2p sharing sites you will often get a patch file with it to bypass the registration of the software and use the software for free, but many times the downloader doesn't understand how to use the Patch, so here is the method

Wednesday, July 14, 2010

SECURITY MEASURE AGAINST USB HACKING

Now-a-days usb hacking has become very popular because its easy and quick. Computers in institutions and other public places are especially vulnerable to it. So here is a software to protect your computer from such kind of threats.


USB LOCK
usb lock is one of the best software to restrict the unauthorized use of USB storage devices, cd-rom and floppy. Without blocking other important usb devices like printer, mouse, camera etc

DOWNLOAD (torrent link)

DOWNLOAD (rapidshare)

Saturday, June 19, 2010

SECURITY MEASURE TO BE TAKEN BEFORE INSTALLING HACKING SOFTWARES

1) Please keep your antivirus updated because every passing minute hundreds of new virus and trojans are born and left loose in the cyberspace.

2) Use software like "spyware doctor" to protect you against spying trojans ,cookies etc and keep it updated.

3) If you have downloaded a file or setup and after clicking it, if you notice that it is taking very long time to install or is responding weirdly stop the process right there, if it is not closing use task manager to close it and delete the file permanently, it was probably installing a backdoor in your computer.

4) If some software needs you to disable the antivirus or it is suggested such by the uploader please first check this things
  • is the software popular and made by some reliable company.
  • check if any comments are given at the downloading site always read them to get some hint about the health of the software.
5) If you thing everything is OK then take a chance and download it, if the software requires the antivirus to be disabled don't disable the antivirus right away, first give it a try with antivirus enabled and see what reaction the antivirus gives if the the antivirus gives it a clean cheat then well and good. mostly the antivirus detects a hacking software as a security threat or a trojan if it does so you may take a try with it but if it detects any other thing then trojan like backdoors, virus, worm, adware, then avoid installing it.

But please note there is no guarantee that hacking software detected as security threat or trojan is totally clean but you have to take chances, because no risk no gain.

SECURITY TIPS AGAINST PHISHING ATTACK

1) Always check the url of the login page of your account before logging in any site.if the url shows any other address then website you want to log in please dont do it.

2) Never follow any link to any site that is offering you anything free like free laptops, mobile recharge, or any other costly items remember nobody offers anything free to anybody.

3) Use different passwords for different accounts dont use the same password for all the accounts because it is easy to remember, because the first thing any hacker will do after hacking any of your account is try to check if it is the same for your other accounts. better lose one then all.
 
© 2009 BASIC HACK AND TECH FOR BEGINNERS. All Rights Reserved | Powered by Blogger
Design by psdvibe | Bloggerized By LawnyDesigns