Powered by Blogger.

Monday 10 November 2014

, ,

How to secure your system from Keyloggers | AMANAHAD Tech

Now a days keylogger is major problem for all.  So we should learn to secure our computer from keylogger.    This article will help for ethical hackers or who want to protect their pc.


What is Keylogger?


Keylogger is one of spyware which will what type you through the keyboard and send it to hacker who send the keylogger. Hackers mainly use keyloggers to steal your passwords, credit card numbers and other confidential data.  So whenever you type the username and password in gmail,online banking sites, it will send the username and password to hacker. 







How to Protect?



In order to provide security for your system,you must have


Good AntiVirus:
This is basic and best step to protect your system from keylogger.  So buy a licensed and best antivirus which is currently in market.  My suggestion is Kaspersky, Norton or Mcafee.  Don't forget to update regularly.
Note: Don't use trial or cracked pack ,it is worthless to use.

Good Spyware:
Since keyloggers are basically spywares, if you are a frequent user of Internet then you could be exposed to thousands of keyloggers and spywares. So you should use a good antispyware such as NoAdware.




Antilogger can be Handy

Antiloggers are programs that detect the presence of keyloggers on a given computer. Zemana Antilogger is the best antilogger.

Online Scanning

When ever you receive a suspicious file, you scan it with online scanners such as Multi engine antivirus scanner which scans your file with 24 antivirus engines and reports it back to you if the file is recognized as a virus or spyware. This ensures that none of the malicious programs can escape from being detected as there are 24 different antivirus engines are involved in the scanning process.

Keyscrambler

Keyscrambler is one of the best protection against keyloggers that you can have, Keyscrambler is a small program which encrypts your typed keystrokes so even if the victim has installed a keylogger on your system, he or she will get encrypted keys. Keyscrambler currently supports Firefox, Internet explorer and other applications, however its premium version supports more than 160 applications 

by Triple A A-@-A
Publisher: Unknown - 13:26
, , ,

Hacking Tutorials For Beginners | AMANAHAD Tech

Hacking Tutorials For Beginners


Hi, are you searching for hacking tutorials?! You have come to right place.  I've listed the posts that helpful for beginners to understand the Ethical hacking.

Before reading these tutorials, make you sure that you have good knowledge in computer and internet related topics.

Hacking Tutorials For Beginners
Read the Discliamer
Introduction to Hacking
How to become Ethical Hacker?
Introduction to Social Engineering
What is Malicious Softwares?
Top 10 Command Promts commands
Different Types of Email Hacking
How to See saved Passwords in Mozilla?
How to Access blocked websites in college or school?
How To Compile C program?
What is Port Scanner?
What is Database?What is SQL injection?
Introduction To Batch Programming
Hacking gmail
Hacking facebook

Security Tips
What is FireWall?
How to secure from Keyloggers
Protect your Email
Avoid Adware
Important facts about Security
What are Symptomps for inected system?
How to use Windows Firewall
Secure Online Shopping
Spyware and Preventions
What you should if you suspect your system is infected
What is password?How it should be?
Simple trick provided by gmail to know whether your system is hacked or not

I didn't list all topics here. Please visit the main Page for latest posts.


by Triple A A-@-A
Publisher: Unknown - 13:23
, ,

A simple trick provided by gmail to know whether your gmail hacked or not | AMANAHAD Tech

Hi friends, today i am going to give small information about Gmail. I do not know whether you know this or not. But it's my service to provide you the hacking and security details. Have you ever see the bottom of the gmail page? Hey wait, after reading this article go and visit. Now go ahead.



You can see in the bottom of gmail like this:


Gmail Bottom screen shot(for security reason striked the ip address)
 It will show the last activity.  So you can come to know from which ip you login last time.  If you click the Details link.  It will show the detailed of session.  It will show List of Ip address you login.  Using this Detail you can come to know whether any other using your gmail ID or not.

If you suppose that find any other using your gmail or you are login any other system, Click the " Sign out all other Session".  This will sign out all other session from other computers.  Then change your password if you want.

by Triple A A-@-A
Publisher: Unknown - 13:22
, ,

What is Your Password ? How the Password should be? | AMANAHAD Tech

What is your password ? is your password like 123456, 98654, billgates,yourname,lovername,iloveyou,thankyou?  Then you will definitely  loose your account soon.  The hackers can easily hack your account with much effort.


Your password should be :

  • Above 10 letters
  • Both uppercase and lowercase letters
  • Should use special characters like '&'.
  • Should contain Numbers
  • Should not Use any names of your lover ,mother,father,etc.
  • Should not be usual words like iloveyou,ihateyou,ihateu.
  • Should not be your birthday like oct2010.


Consider this tips when you create a password. Secure your password.

by Triple A A-@-A
Publisher: Unknown - 13:21
, ,

What should you do if you suspect your system is infected? | AMANAHAD Tech





  • Stop shopping, banking, and other online activities that involve user names, passwords, or other sensitive information.
  • Confirm that your security software is active and current. At a minimum, your computer should have anti-virus and anti-spyware software, and a firewall.
  • Once your security software is up-to-date, run it to scan your computer for viruses and spyware, deleting anything the program identifies as a problem.
  • If you suspect your computer is still infected, you may want to run a second anti-virus or anti-spyware program – or call in professional help
  • .Once your computer is back up and running, think about how malware could have been downloaded to your machine, and what you could do to avoid it in the future.



Prevention

  • Don't click on a link in an email or open an attachment unless you know who sent it and what it is.Links in email can send you to sites that automatically download malware to your machine. Opening attachments – even those that appear to come from a friend or co-worker – also can install malware on your computer.
  • Download and install software only from websites you know and trust.Downloading free games, file-sharing programs, and customized toolbars may sound appealing, but free software can come with malware.
  • Talk about safe computing.Tell your kids that some online activity can put a computer at risk: clicking on pop-ups, downloading "free" games or programs, or posting personal information.
  • Finally, monitor your computer for unusual behavior. If you suspect your machine has been exposed to malware, take action immediately. Report problems with malware to your ISP so it can try to prevent similar problems and alert other subscribers, as well as to theFTC.


by Triple A A-@-A
Publisher: Unknown - 13:19
, ,

What is spyware ? How it comes to your pc? Prevent it | AMANAHAD Tech




Often you can heard a word spyware. Is it important to know about spyware ? Yes!
We are in advanced technology world. Day by day the technology is developing. At the same time crime is also increasing. One of the crime is spyware method.

Spyware:

Spywareis software that resides on a computer and sends information to its creator. That information may include surfing habits, system details or, in its most dangerous form, passwords and login information for critical applications such as online banking. Many spyware programs are more annoying than dangerous, serving up pop-up ads or gathering e-mail addresses for use inspamcampaigns. Even those programs, however, can cost you valuable time and computing resources.
According to a number of sources, the first use of the term spyware occurred in a 1994 posting that made light of Microsoft's business model. Later, the term was used to describe devices used for spying, such as small cameras and microphones. In 2000, a press release from security software provider Zone Labs used the current meaning of spyware for the first time and it's been used that way ever since.

How it comes to ur pc


Often, spyware comes along with a free software application, such as a game or a supposed productivity booster. Once it's downloaded to your computer, the functional element of the software works exactly as promised, while the information-gathering system sets up shop behind the scenes and begins feeding your personal data back to headquarters.



Internet security


The Best way to avoid and remove spywares is installing a best internet security software or spyware remover softwares. Get a original internet security and update it properly. Scan daily your pc using internet security while scanning you better to avoid doing other things in your pc. My advice is use KASPERSKY INTERNET SECURITYfor better security.

other than internet security, you prevent your system from getting infect. Becareful when you download files from websites and mail.


by Triple A A-@-A
Publisher: Unknown - 13:17
, ,

How to Make your online shopping secure? | AMANAHAD Tech




Shopping online does carry some risk, but so does shopping at brick-and-mortar stores. At least online shoppers don't need to worry about fender-benders in the parking lot, pick pockets at the mall, or getting the flu from all those fellow shoppers.But the nice thing about shopping online is that by following some basic guidelines you can be reasonably sure you'll have a safe experience.


Secure your PC:

The first thing you need to do is be sure your computer is secure. Trend Micro's education director David Perry, says that "bad guys these days are operating by planting a keylogger on your system that listens in, surreptitiously waiting for you to use your credit card or your bank password so that they can steal your money." So, even if you're dealing with a legitimate merchant, you're at risk if your computer is infected. Your best protection from these attacks is to keep your operating system and browsers updated and use a good and up-to-date security program. If you're getting or giving a Netbook or other PC for the holidays, make sure that security software is installed right away. Most security companies offer a free-trial version that will tide you over for a month or so, but be sure to subscribe so you get ongoing protection.


Click with care:
You're going to be getting a lot of offers via e-mail this holiday season. While they might be legitimate, there is the possibility of some offers coming from criminals trying to trick you into giving your password to a rogue site or visiting a site that can put malicious software on your computer. Your best protection is to not click on any links--even if the message looks legitimate--but to type in the merchant's URL manually.

Know the Merchant:

If you're not familiar with the merchant, do a little research like typing its name (and perhaps the word "scam") into a search engine to see if there are any reports of scams. Look for user reviews on sites likeEopinions.com. Look for seller ratings if you locate the merchant through a shopping search engine likeGoogle Shopping.

Pay by credit card:

Credit cards offer you an extra level of protection including the right to "charge back" if you feel you're a victim of fraud. The credit company will investigate your claim and permanently remove the charge if fraud can be proven.

Know the Real price:

Be sure you understand the actual cost of the item, including shipping, handling, and sales tax. That can have an enormous impact on the final price.
Read Policy
The policy, according to the American Bar Association'sSafeshopping.org, should disclose "what information the seller is gathering about you, how the seller will use this information; and whether and how you can "opt out" of these practices."


by Triple A A-@-A
Publisher: Unknown - 13:16