Tuesday 31 March 2015

How to detect keylogger and remove it from your computer

Image result for detect keylogger

System Protecting Tricks

Steps to remove or detect keylogger from your computer
  1. You should trace the behavior of you PC in order to find the common virus symptoms because the keylogger symptoms have much in common with the symptoms of other computer infections. We can refer slow computer performance, new icons on your desktop or in tray, network activity and unexpected pop-ups to these symptoms. Also you can notice that the text that you type can appear with little delay – this is the direct symptom that will help you in keystroke logger detection.
  2. Open Task Manager in order to end the process of the installed keylogger. You should know that not every keylogger can be found in Task Manager. Many of them hide their traces. But you should still check the possibility to end its process:
    winlogon.exe
    If there is just one process with such a name, then you should check all other processes, using the special services that contain information about most of the processes to detect the malicious one. You can use LiutilitiesNeuber or any other service that you know. If you are an experienced user, then it will be much easier for you to check the processes, because you will not miss the system process with any malicious.
    If you end the process that belongs to keylogger, then the program is deactivated till the next reboot and the third party will not get your personal information.
  3. You should also look through the list of the installed programs. So, click Start menu, then All programs, try to find there the program that you did not install. Uninstall such programs.
  4. How to detect keylogger? You can also detect this malicious program with the help of Startup list. So, you should follow the instructions:
    • Press Windows+R buttons, then type msconfig in the line and press Enter
    • Select Startup tab and disable all the unknown programs
    • Then restart your computer.
There are all the manual instructions that will help you to find keylogger on your computer and deactivate it...


Thousands of Hacked Uber Accounts Selling on Dark Web for $1

Thousands of Hacked Uber Accounts Selling on Dark Web for $1$US1 may be a very little amount, but it is enough to buy you a stolen Uber account and free car rides around the city.

Two separate vendors on AlphaBay, a relatively new Dark Web marketplace launched in late 2014, are selling active Uber accounts with usernames and passwords for $1 each, Motherboard reports.

Once purchased, these active Uber accounts let you order up rides using the payment information provided on the file.

Additionally, other sensitive information that comes with the purchase includes partial credit card data (the last four digits and expiration date), trip history, email addresses, phone numbers, and location information of users' home and work addresses.

Over on AlphaBay market, a vendor identified as "Courvoisier" is claiming to sell hacked Uber accounts for $1 each. Under the product listing for 'x1 UBER ACCOUNT - WORLDWIDE TAXI!,' anyone can buy a Uber account anonymously.

Another vendor, identified as ThinkingForward, is giving the similar offer, but for $5 each. “I will guarantee that they are valid and live ONLY. Discounts on bulk purchases,” vendor writes on his product listing.

One of the two vendors reached out by Motherboard claimed to have "thousands" of active Uber accounts for sale, and even provided a sample of them. The seller said to have already sold more than 100 Uber accounts to other buyers.

So far, it is unclear that from where the credentials were stolen. It is believed that Uber’s security was hacked or compromised by the hackers.

However, Uber denies that its servers were hacked and suggested its users to avoid sharing the same login credentials across multiple online sites.
"We investigated [the issue] and found no evidence of a breach," a Uber spokesperson said in a statement. "Attempting to fraudulently access or sell accounts is illegal and we notified the [law enforcement] authorities about this report."
The company also recommended its users to use strong and unique usernames and passwords for their accounts and to avoid re-using the same passwords across multiple sites and services.

Monday 30 March 2015

How to Automatically Clear Data When You Quit Your Browser

How to Automatically Clear Data When You Quit Your Browser
Most web browsers do save your browsing data and they keep this data with them until you manually delete it. This data includes the cookies placed by various websites, cache files, form data, and so on. In most cases, this can be useful as it allows you to check out your history and revisit the sites that you have visited last week. However, if you are sharing your computer (or browser) with others and you don’t want others to find out which sites you have been surfing, you may want to set an action that automatically clears data when you quit your browser. Here’s how you can get your Google Chrome and/or Mozilla Firefox to do that.
Automatically Clear Data in Google Chrome
Unfortunately, Chrome doesn’t have an option to clear all the data when you quit it. It only allows you to clear the cookies when you exit the browser. But there is an extension in the Chrome Web Store that aims to fill this missed functionality. Here’s how you can use it:
1. Launch Google Chrome on your computer.
2. Head over to the Click&Clean extension page in the Chrome Web Store and click on “Add to Chrome.” It should add the extension to your browser.
Add the Click&Clean extension to Chrome.
3. A prompt should appear asking if you really wish to add the extension to your browser. Click on “Add” and wait for it to add the extension to your browser.
Click on the add button to confirm.
4. When the extension is added, click on its icon near the Chrome Menu button. Then, click on the “Options…” button and you will be taken to the configuration panel.
Click on the Click&Clean browser button.
5. Scroll down to the “EXTRA” section and you should see an option that says “Delete private data when Chrome closes.” That is the option that you need to tick-mark to make Chrome clear all the data when you exit it.
Select the 'Delete private data when Chrome closes' option.
You are done.
Your browser has been successfully configured to clear all the website data when you exit it.
Unlike Google Chrome, Mozilla Firefox comes with the functionality to auto clear data when the browser is exited. Here’s how you can set it up:
1. Launch Mozilla Firefox on your computer.
2. Click on the “Firefox” menu in the top-left corner and select “Preferences….” You will be taken to the preferences panel for your browser.
Go to the Firefox Preferences panel.
3. Once in the panel, click on the “Privacy” tab and you will be taken to your privacy settings.
Click on the 'Privacy' tab.
4. In the Privacy panel, under the History heading, there is a drop-down menu with a label that says “Firefox will.” Click on the menu and select “Use custom settings for history.”
Select 'Use custom settings for history.'
5. You can now see some more options that you can configure for your browser. One of these options is “Clear history when Firefox closes.” Tick-mark this option as it allows you to clear the website data when you quit the browser.
Select 'Clear history when Firefox closes.'
6. Firefox allows you to select what data you want to be cleared when you quit the browser. To use that function, click on “Settings…” next to the option discussed in the previous step.
Select what data you want to be cleared when you quit.
7. In the dialog that appears, checkmark all the data options that you wish to be cleared. When you are done, click on “OK” and it will save the settings for you.
Checkmark all the data options that you wish to be cleared.
You are done.
Firefox will now clear all the data you selected in the above step when you exit the browser.
If there is a queue behind you waiting for you to leave the computer so they can use it, it is a good idea to set up the above functionality. This way, no one will be able to see what you have been doing with various websites on your computer.

How to Enable Background Playback in YouTube for Android

How to Enable Background Playback in YouTube for AndroidNot only is YouTube full of videos that you can enjoy watching in your spare time on your devices, it has got some really great music tracks as well. When you are working or chatting with your friends, you can listen to these music tracks and keep your ears busy.
One of the issues doing so is that the video, along with audio, stops playing as soon as you move away from the YouTube app on your Android device. For instance, if you are playing a video in YouTube on your Android device and you move to, say an email app, the video will stop playing. So how can you keep the video playing when you move off from the YouTube app? Well, there’s a way to do that.
An Xposed module called YouTube Background Playback allows you to keep your videos playing even when you are out of the official YouTube app. You don’t need to keep the app open to continue listening to music or a video that you were watching on YouTube. Here’s how you can go about installing the aforementioned module on your Android device.
Note: Your device must be rooted before you can do the following tutorial. Also, install Xposed on your device at your own risk.
First of all, you need to install Xposed Framework on your device and then you can install the aforementioned module. Here’s how:
1. Download and install the Xposed Installer app on your device.
2. Launch the app from the app drawer on your device.
3. On the first screen of the app, you should see an option that says “Framework.” Tap on it and it will let you install the framework on your device.
Xposed Installer for Android.
4. You will see a warning message before you install the framework. Tap on “OK” and it will let you go ahead.
You will see a warning message before you install the framework.
5. Here is where you can install and uninstall the Xposed Framework on your device. Tap on the button that says “Install/Update” and it should let you install the framework.
Tap on the button that says 'Install/Update.'
6. When it has done installing the framework, you should see a message that says it will reboot your device. Tap on “OK” and your device will reboot.
Tap on the button that says 'Install/Update.
You are done.
Xposed is now installed on your device and you can start using it as soon as your device reboots.
As Xposed is now available on your device, let’s see how you can get the aforementioned module installed on your device:
1. Launch Xposed Installer from your app drawer.
2. Tap on the option that says “Download” as that is where you can download new modules for your device.
You can download new modules for your device.
3. Tap on the search icon in the top-right corner; search for and tap on “YouTube Background Playback.”
Search for and tap on 'YouTube Background Playback.'
4. It should launch the description for the module. Tap on the “Versions” tab followed by “Download.” The module should begin downloading.
The module should begin downloading.
5. When it is done downloading, you should be prompted to install it. Just go through the installation steps and you will be all set. It’s the standard app installation wizard and nothing like rocket-science.
Go through the installation steps.
6. You must first enable the module before you can use it. To do that, head back to the main menu of Xposed Installer and tap on “Modules.” Then, checkmark the box next to the module you installed in the above steps and it will be enabled.
You must first enable the module before you can use it.
7. Reboot your device for the changes to take effect.
You are all set.
You can now listen to your favorite music tracks in the YouTube app for Android without keeping the app open. It just works regardless of what app you are currently using.
With the availability of thousands of music tracks on YouTube, you should not miss the chance to listen to them all while you work with other apps on your device. The above solution should help you keep the music going while you are sending out emails or uploading pictures on Facebook.
Cheers!

Sunday 29 March 2015

How to Cancel Scheduled CHKDSK Operations in Windows

How to Cancel Scheduled CHKDSK Operations in Windows

CHKDSK is one of the important command line utilities that is designed to repair errors that usually appear in the hard disk drive. In Windows you can run the chkdsk command manually by simply entering the command chkdsk in the elevated command prompt. Since chkdsk cannot check for the errors while the system is still running, Windows configures it to run when you boot your system the next time.The time to correct the errors in the next boot session will totally depend on the number of errors and the severity of the errors you have on the hard disk. But if you don’t want Windows to take its time when you next boot into your system, here is how you can cancel scheduled disk error checking in Windows.
To cancel scheduled chkdsk using the Command Prompt, press “Win + X” and select the option “Command Prompt (Admin)” in Windows 8. If you are using Windows 7 or Vista, search for the command prompt in the start menu, right-click on it and select the option “Run as administrator” to start the elevated command prompt.
Select the option 'Command Prompt (Admin).'
Before trying to cancel the scheduled chkdsk, you can actually see if there is a scheduled task. To do that, simply enter the following command in the Command Prompt and press the Enter button. If there is a chkdsk task scheduled you will receive a response that is similar to “chkdsk has been scheduled manually to run on next reboot.”
chkntfs C:
Check to see if there is a scheduled task.
Once you have confirmed, copy the below command and enter it in the command prompt to cancel the scheduled chkdsk task. As soon as you execute the command, Windows will cancel the task and display a response that doesn’t make any sense.
chkntfs /x C:
Cancel the scheduled CHKDSK task.
If you want to, just run the first command discussed above to see if the chkdsk scan is still effective. If there is no scheduled task, Windows will display a response that reads something like “Drive is not dirty.”
If there is not a scheduled task, Windows will display a response.
Besides using the Command Prompt, you can also cancel scheduled chkdsk from the Windows registry. To do that, press “Win + R,” type regedit and press the Enter button to  open the Windows Registry editor.
Cancel scheduled CHKDSK from Windows registry.
Here, navigate to the following key in the left pane.
HKEY_LOCAL_MACHINE\SYSTEM\CurrentControlSet\Control\Session Manager
Navigate to the following key in the left pane.
Find and double click on the Multi-String value “BootExecute.”
Find and double click on the Multi-String value 'BootExecute.'
The above action will open the “Edit Multi-String” window. Replace the string autocheck autochk * /r\DosDevice\C: with the below string. Once replaced, click on the “Ok” button to save the changes.
autocheck autochk *
Replace the string autocheck autochk * /r\DosDevice\C:
That’s all there is to do, and it is that simple to cancel a scheduled chkdsk scan on a Windows system either by using the command prompt or by using the Windows Registry.
Even though cancelling the scheduled chkdsk scan is fairly easy, it is recommended that you continue the scan as it is quite essential for your Windows operations and also helps you in recovering some critical errors on your hard disk.
Hopefully that helps, and do comment below sharing your thoughts and experiences by using the above methods to cancel scheduled chkdsk scans on your Windows system.

Have an Insecure Wireless Router? Here’s How to Lock It

Have an Insecure Wireless Router? Here’s How to Lock It
Although wireless routers are a blessing for Internet users, they create a plethora of risks if they are left unlocked. In addition to having a slower connection, individuals with malicious intentions can easily gain access to your network when it is not secured.In order to ensure you are safeguarding your computer and Internet activity from unwanted guests, it is necessary to use the following tips to lock down your insecure wireless router sooner rather than later.
Set Your Approved Devices List
An easy way to boost security of your wireless router is to establish (and maintain) a list of devices that are allowed to access your network. Your mobile phone, tablet, and laptop have unique MAC addresses that can be used to allow access, even when the password is not known. Devices that are not on the approved list will not be able to gain access to your network, even if they have uncovered the password. This helps secure your network from unwanted guests.
Encrypt your Password
Even novice Internet users know that password encryption is a smart move if you want to keep your connection safe and secure. In order to encrypt the password connected to your wireless router, you need to set the wireless security to WPA2 under the settings prompt. This allows you to establish a stronger password that utilizes a random combination of letters, characters and numbers that is far more difficult for intruders to dismantle.
Disable Guest Networks
It is common for wireless routers to come with an additional wireless network intact, known as a guest network. This additional network allows users the ability to share an Internet connection with other users without needing to provide the password for the main network or access to shared files on your personal connection. Although this may be of benefit to a business who offers wireless Internet to its customers, it is not necessarily a perk for home users. In an effort to keep your wireless router secure, it is beneficial to disable the guest network when you install your router.
Turn off Broadcasting
For the majority of wireless routers available on the market today, users have the ability to turn off broadcasting to unauthorized users. For example, when connecting a device to the Internet through your wireless router, you typically see a number of SSIDs, names, or wireless connections listed under the available networks. Although it is helpful for you to know the name of your own personal connection, it is beneficial to turn off broadcasting to surrounding Internet users so that they are not able to view your connection in that listing. Under your router settings, simply deselect “Enable SSID Broadcast” to turn it off.
Although this list is not exhaustive, it does provide a starting point to ensuring your wireless router is safe and secure. To keep hackers and other intruders at bay, make sure to disable broadcasting, turn off access to your guest network if it is not necessary, establish a list of approved devices and keep it current, and consider encrypting your password.

Simple Q::-Computer ports explained| How many ports are there ?

Many of computer users have heard terms like USB, HDMI port, firewire, RJ 45 but only a few know about them,  in this post we will see how to identify the different ports and understand which devices use which plugs and ports.Computers come full of holes (ports) where every port has its own use. These ports change from time to time and we need to upgrade them accordingly. To keep in track with latest technology, it is important to know the basics about these ports.

How many ports are there

  1) USB  

Universal Serial Bus port is a small rectangular port  that comes with every computer. A single USB port can be used to connect up to 127 devices such as mouse, modem, keyboard or external hard disk.  These USB ports come with three standard versions- USB 1.1 (obsolete), 2.0, and 3.0.
Computer ports explained-usb 
The major difference is speed. USB 1.1 could transfer data up to 12 Mbps. USB 2.0 (High-Speed USB)  transmits a max of 480 Mbps.  But its only usb 3.0 which transfers data at an unbelievable rate of 4.8 (10x than usb 2.0) gbps .

  2) HDMI : 

High-Definition Multimedia Interface  carries both video and sound, making one less cable for video 
Computer ports explained-hdmi
or audio. This gives high definition video output and has ability  to send audio to different format .

 3) SERIAL AND PARALLEL PORTS : 

If you have old PC you may have seen that, but nowadays they are not that common. Serial port has 9 pins and parallel port has 25 pins. Today these have been replaced by USB interface. The basic difference between serial and parallel ports is that of the speed. Parallel port is needed  for high speed connection like printers.





 4) LAN (RJ45 ETHERNET CONNECTION) : 

These look similar to our telephone line connection. The only difference between the two is that RJ45 is bigger in size and has 8 pins in them whereas RJ11, that we use for our telephone lines, has only 6 pins. So you can tell the difference by simply looking at them. The usually support 10-1000 Mbps connection. Used mainly for data transfer.

Computer ports explained-rj-45

 5) KEYBOARD/ MOUSE PORTS : 

These are the small round shaped ones consisting of 6 pins. Both ports .ie. the ones for mouse and keyboard look the same. The only difference comes in their color. The purple one is for  keyboard and green is for mouse. But nowadays it has become a lot more easier as we have USB ports for mouse and keyboard.

  6) FIREWIRE : 

Like serial and parallel ports, firewire are outdated now. You would not find it in new computers. The FireWire port has been in common use since 1995, when Apple, Inc. first began to include the port on a number of digital camcorders
-Computer ports explained

  7) E-SATA : 

They are found on the latest computers. These let you plug in the newest breed of portable hard drives with extra speed and larger capacity. One reason why people prefer e-sata over USB is that the transfer rate is fast, really fast. Currently there is a 1.5 Gbps and a 3 Gbps Standard, way much faster than USB 2.0  and firewire.
e-sata | -Computer ports explained

Related Posts Plugin for WordPress, Blogger...
Twitter Delicious Facebook Digg Stumbleupon Favorites More

 
TRICKS AND TIPS CREATED BY SUSHIL UPADHYAY| Grants for single moms