Wednesday, November 3, 2010

Protection Against Key Loggers

keyloggers:
  • It is a recently  emerging problem on internet...
  • Hackers use it to hack passwords,bank account details,to most secret data..
The following are used to prevent attack from keyloggers:

1.Anti-keyloggers:  
  •    It detects the presence o f key loggers
  •    latest one  is Zemana.
2.good anti-virus software
3.anti-spyware software usage
4.online scanning tools

other tools:
  1.sandboxie
 2.keyscramblers

keyscramblers:

It is one of the latest software to give protection against key strokes..
by encrypting the key strokes .so that hackers get the encrypted

Friday, October 29, 2010

Easy way for face book search

To make faceboook search easier:
1)open book
2)facepinch
These two helps us to find the updates in facebook,find persons,pages,goup etc in facebook..

Note:you dont need to have a facebook account if use these facebook search engines.

If you want to search more than one thing in facebook
ie.page or group or people at a time means:

use: groupname|person|page name in search box

Saturday, October 16, 2010

CAPTCHA

Completely Automated Public Turing test to tell Computers and Human Apart..
It s kind of word verification test... to differentiate human and computers.

Reason for having  CAPTCHA:
  • To prevent 1)malicious attacks
                            2)Spammers
  • To avoid automated software bots..
(Automated software bots-computer automatically created huge no. of large requests to server which in turn cause, degrade the server quality)

Various forms of  CAPTCHA:
  • It is distorted  or randomly  stretched characters ..
  • It is rely on images also, four images present in that three of them contain animal picture, one contain flower. We have to choose it.
  • Another audio challenge which contains some sound with noisy effect..
Human beings only able to identify patterns of CAPTCHA

Pros:

One Artificial intelligence algorithm is found   until to train the real intelligence to machine to break
CAPTCHA

Applications of CAPTCHA:

1)Online polls
2)Registration forms
3)Free account creation process in Gmail,Ymail,hotmail etc

Saturday, October 9, 2010

Protecting the folder in PC



It is necessary to protect the important folder in pc when more than one user using the system..
4 ways to protect:
1.Hiding the folder
2.Lock folder tools
3.System security tools
4.Coding

Now, we are going to see how to hide our folder by locking code with help of batch file
  • Batch file should be in folder location
  • Locking the folder code
  • Open the notepad just type
 ren folder name folder name .
{21EC2020-3AEA-1069-A2DD-08002B30309D}

  • Save it as “lock.bat”,then double-click folder to lock
Unlock the folder: 

  • Open the notepad and type ren folder name
.{21EC2020-3AEA-1069-A2DD-08002B30309D}folder name
  • Save it as “key.bat”,then double-click the folder to unlock it

Removal of trojan horse


Trojans
  • Trojans is a kind of spyware...employed by hackers..
  • Popularly called as “root-kits”..
  • It is collection of programs that allows the hacker to make  a massive deep intrusion access the administrative control of the computer..

Hacker may crack the password with aid of root kit...and take entire control of the system..

Trojan remover Software..:
  • UnHackMe is a Trojan remover to detect and remove the hidden/invisible Trojans..
  • It is suitable for windows operating systems

Popular viruses used by Hackers:



Most probably hackers recently employing the “conficker” virus:

Effects of the Conficker:
  • Able to attack nearly 15 million computers
  • It collects user’s password, other personal information including bank account..
>>Once It is installed in pc then, it starts downloading files from internet from a “boss” server..
>>Infected systems form a network it will communicate with each other, start updating, evolve itself etc..

Other viruses used by hackers are:
1.Downadup,
2.kido

Solution to protect the pc from Conficker:
To download the patch fro Microsoft in addition to anti-virus software..
 follow the link: