Saturday, 11 July 2015

Top 25 Worst Password Of 2014 – Is Yours One Of Them ?

Its really sad that people are very lazy to create strong passwords to log into social media, stores, email and other websites. In one year 3.3 million passwords leaked online , in this SplashData has listed the 25 most common — and therefore least secure The 100 worst passwords include easy series of letters and numbers in alphabetical or numerical order, or as they appear on the keyboard (e.g. “qwerty” and “1qaz2wsx,” the first two semi-columns of keys),   sports teams and favorite sports and less than clever phrases like “letmein,” “access,” and, ironically, “trustno1.” “PASSWORDS BASED ON SIMPLE PATTERNS ON YOUR KEYBOARD REMAIN POPULAR DESPITE HOW WEAK THEY ARE,” “ANY PASSWORD USING NUMBERS...

How to Connect Two Computers Via Lan Cable

In this tutorial we are going to show you how to transfer data from one computer to another. We need to PC/Laptop and a lan cable to transfer data. PC 1 Step1: Go to “Open Networking and Sharing Center“.Step2: Click on “Local Area Connection“.Step3: Now click on “Properties“.Step4: Double click on “Internet Protocol Version 4(TCP/IPv6)“.Step5: Click on “Use the following IP address:” and enter the IP address: as192.168.1.1 and just give a click on Subnet mask. Once done click “Ok” and close it. PC 2 Step1: Go to “Open Networking and Sharing Center“.Step2: Click on “Local Area Connection“.Step3: Now click on “Properties“.Step4: Double click on “Internet Protocol Version 4(TCP/IPv6)“.Step5: Click...

Cracking WPA/WPA2 – PSK Encryption

Cracking WPA/WPA2 About a month ago, to my embarrassment, I learned that my Wi-Fi password was so weak that even my 10 year old neighbour could crack it… No, not really. A little Disclaimer – The contents of this post are solely for ethical and educational purposes. You may not use it for unethical purposes. The Author or the Website is not responsible for any damage to yourself, your network, or the computers in you network, should something go wrong. (Basically guys, be careful where you use this and please don’t do anything stupid.) We’re going to start with a little introduction to Kali Linux, because that is the OS I prefer, is the easiest for this task and comes with all the tools we need. “Kali” is a Linux distribution and is...

New Phishing Scam, Verify Your Email Account

New latest Phishing  scam is about verifying your email account which comes in a mail to the users.The email informs the users that if your account is not verified in 24 hours then you will be termed as a fraudulent user and your email account will be taken down. However, if you click on the “verify” button, you can resolve the issue. THE PURPOSE OF THIS EMAIL IS TO COLLECT YOUR EMAIL CREDENTIALS AND USE IT FOR HIJACKING YOUR ACCOUNT AND PERFORM MALICIOUS SCAMS. WHEN SCAMMERS GAIN ACCESS TO YOUR EMAIL ACCOUNT THEY CAN UTILIZE IT FOR SENDING OUT MANY MORE SUCH SCAMS AND SPAM EMAILS FROM YOUR SIDE TO ALL YOUR CONTACTS AND JUST ABOUT ANYONE, REPORTS HOAX-SLAYER. The sample mail sent to the users : This email is just another...

Why server side games generally can’t be hacked

We get many question daily asking us how to hack games such as Clash of Clans this article explains why server side games generally can’t be hacked Overview – • The Server – This party is responsible for serving content.• The Client – This party requests content from the Server, and displays them to the user. In most cases, the client is a web browser. Each side’s programming, refers to code which runs at the specific machine, the server’s or the client’s. Server Side Code – Server side is the code that resides at web server.For every client request code is executed at server side and result is send to the client in simple HTML format.Performance is lower than client side code due to server round trips.Client cannot see the business...

WhatsApp Could Offer 'Like' and 'Mark as Unread' Features Soon

The popular instant messaging app WhatsApp might adopt some features from its parent company, Facebook. The messaging giant is testing some new features that might be coming to the app soon. The features include a 'Like' button similar to that of Facebook and a 'Mark as Unread' feature for chat messages, AndroidPit reports. 'Like' Button for Images Ilhan Pektas, WhatsApp beta tester, recently claimed that a future WhatsApp update will introduce a 'Like' button for images, indicating the company might allow users to Like their friend’s profile picture and images shared in groups as well. There aren't many details about the new features yet, but if implemented, Like button feature is something...

Monday, 6 July 2015

HomeHow ToTips And TricksHow to Track an Email Address How to Track an Email Address

Here is all the things that you need to track an email address : Google Chrome (or a good and fast browser) Fast internet connection Access to a Google Account on which you received the mail. Now follow the steps below to track an email address. Open Google Chrome. Click here to visit the website, which will help you to track the email address. Open a new tab, and open your mail. Now find the mail which you want to track and open it. Now click on the down arrow, near the reply button and click on Show Original. Now Copy all text which you see on this tab. Now go back to the previous tab, where you opened this link. Scroll down and find the empty text box. Paste the copied code here and click on Get Source. Now...

Saturday, 4 July 2015

This 20-year-old Student Has Written 100 Malware Programs in Two Years

Security firm Trend Micro has identified a 20-year-old Brazilian college student responsible for developing and distributing over 100 Banking Trojans selling each for around US$300. Known online as 'Lordfenix', 'Hacker's Son' and 'Filho de Hacker', the computer science student first began his career by posting in forums, asking for programming help for a Trojan he was developing, researchers said. Developed More than 100 Trojans However, Lordfenix has "grown quite confident in his skills" and began developing and distributing malware tailored to pilfer financial information since at least 2013. "Based on our research, Lordfenix has created more than 100 different banking Trojans, not including his other malicious...

Here's How You Can Replace Your iPhone Battery For Free

Nothing is scarier than your iPhone alerting you that your battery had hit 5%, especially when you just took it off the charger with a 100 percent full battery about an hour ago.  To be very honest, it literally sucks. However, you no need to worry about this problem now, as there's a solution. Apple has just modified its warranty programs to make it easier for you to get your iPhone battery or in some cases, the whole device exchanged at an Apple Store. Under its new AppleCare+ policy, the company is offering to replace the batteries in your iOS devices for free until January 2016, but if and only if you are eligible. Are you Eligible for New iPhone Battery? To make sure your iPhone is eligible, you...

Friday, 3 July 2015

Amazing 15 Internet Facts You Need to Know

More than a billion people use the internet daily. You can almost do anything online from earning money to ordering food and much more. Did you know that there are many Interesting facts about the Internet that you must know. So let’s increase our knowledge by knowing some Amazing Internet Facts. #1 World’s first website, Created by Tim Berners-Lee in 1991 and is still running. http://info.cern.ch/hypertext/WWW/TheProject.html #2 The first Youtube video was uploaded on April 23, 2005 and is called “Me at the Zoo” and features Jawed Karim, one of the founders, at the San Diego Zoo. #3 YouTube’s copyright-checking software scans over 100 years of video every day. #4 The First registered domain was symbolics.com #5 One in...

Hide any File in an Image without Steganography Software

We all want to share some secret stuff with our friends but we are unable to do so because of lack of privacy. If we send the Top Secret file using pendrive, then any person can check that very easily.If we want to make our content more secret and secure, we can easily hide our secret file in any image without using any software. Both, the sender and receiver need only Winrar. If you don’t have winrar, then download it for free from here. Follow the steps below to hide any file in an image. Step 1) Create a new folder with any name and send all the content to it which you want to hide. Step 2) Once your folder is ready, right click on it and click on add to archive. Remember either it is a ZIP or a RAR file. Step 3) Now...

Page 1 of 8512345Next
Related Posts Plugin for WordPress, Blogger...
Twitter Delicious Facebook Digg Stumbleupon Favorites More

 
TRICKS AND TIPS CREATED BY SUSHIL UPADHYAY| Grants for single moms