Tech Soul

bringing technology to your soul

Home Archive for 2012

How to keep passwords safe from the hackers?



1.You need different passwords for different site/accounts

Keep different passwords for different sites, i.e your facebook and gmail's password should not be the same. If you keep same passwords and incase your one account is hacked, all your other accounts will be easily accessed.
2.Longer passwords are harder to crack
Though it is not the best way to safeguard your password, but it can help if brute-force attack is used to crack the password. So, the longer the password, better it is.
3.You shouldn’t use a word from the dictionary
to avoid dictionary attack. Don't use words that can be easily searched in a dictionary.
4.Humans tend to choose passwords with personal meanings
Avoid this, as it is easy to guess password which contain your or your girlfriend's name, number, address, date of birth. Such passwords are so easy to crackthat  even the boy next door can get your password just by guessing.
5.Passwords need to be changed regularly
It is a good practice to keep changing the passwords frequently at an interval of couple of months. By changing passwords regularly you can avoid major trouble. 
6.There are guidelines for creating strong ones
Most Internet security experts recommend having a password that contain at least 8 characters mixed with capitalized and lower-case letters, numbers, and symbols. A common technique is to put three unrelated words together and make up a short story that involves all three so you can remember it. You can also use the first letter of each word in your favorite line of a song or movie. Change out a couple letters for numbers or special characters, and your password should be too much trouble for a hacker to figure out. and this depends on you how well you mix up words that you can remember. Like replacing s with $ , o with 0, i with ! etc. eg, if your name is john doe your password can be j0hN'sLasTN@me!sD03. Be creative.



So enjoy the internet and be safe.

SSL - Secure Socket Layer 

Secure Sockets Layer or SSL is a secure protocol, which is the reason why secured E-Commerce and E-Banking are working hastle free. It has become the de facto standard for secure and safe only transactions. When Netscape first developed SSL, the main aim or motive behind it was to ensure that the client and host can communicate or transfer data and information securely.



What SSL does in short would be, encrypt data at the sender’s end and decrypt data at the receiver’s end. This encrypted data cannot be picked up or hijacked in between and any tampering would not only be very difficult, it would easily be detected.  Not only that, SSL also provides for two-way authentication i.e. verification of the client’s and the server’s identity.



The various functions or features of SSL can be divided into three main categories-:



1) SSL Encrypted Connection: Provides for secure and safe transaction of encrypted data between the client and the host.

2) SSL Client Authentication: is an optional feature, which allows for verification of the client’s identity.

3) SSL server Authentication: provides for verification of the server’s Certificate Authority (CA) which is nothing but a trusted safe host certificate given to the server by companies like Verisign, Cybertrust, Thawte and more.



The main SSL protocol is made up of two smaller sub-protocols-:



1) The Secure Sockets Layer Record Protocol or The SSL Record Protocol.

2) The Secure Sockets Layer Handshake Protocol or The SSL Handshake Protocol.



The SSL Record Protocol looks after the transmission and the transmission format of the encrypted data. Also it is this sub-protocol of SSL, which ensures data integrity in the transfer process. On the other hand the SSL Handshake protocol basically helps to determine the session key. 

The only guy who can protect you against hackers is YOU!


If you are reading this post you are having an account on facebook..may be more than one (not ethical). Any way today's blog is all about facebook security, that is to improve security on facebook and protect your private photos and infos from the malicious hands sitting quitely to capture everything about you. OKay enough of  'faltu' dialogues and let us get started  




WARNING!
Social network websites can be hazardous if you don’t change the default settings! 


5 Tips for Using any Social Network
1) Set appropriate privacy and security defaults and choose a complex/unique password for your account.

2) Be careful while installing third-party applications. Don’t use applications from sources you don’t trust.

3) Only accept friend requests from people you know in real world or atleast you've seen them once. 

4) Read the privacy policy and terms of service carefully. (lil bit tedious, but you should do it)  


5) Limit personal information while sharing and be careful about things you post. 

Control Your Default Privacy

These settings can be found by clicking the arrow on the top 
right then click Privacy Settings. Limit your audience to your friends only for your posts and photos.

Enable Secure Browsing (https) and Login Notifications

Account Settings-> Security-> Enable Secure 
Browsing (check the box) and the box for  Login 
Notifications. For additional security check the box for 
Login Approvals and enter your mobile number. 
Facebook will send a SMS code to your phone that you 
use when signing-in in addition to your password.



Use extreme caution when posting your phone numbers, address and work information.

and the most important thing : for facebook or any sort of security :
Be conscious and alert, understand what you're doing and just don't go on clicking anything and everything that comes around. 



Stay safe.













Caesar Cipher


In cryptography, a Caesar cipher, also known as Caesar's cipher, the shift cipher, Caesar's code or Caesar shift, is one of the simplest and most widely known encryption techniques. It is a type of substitution cipher in which each letter in the plaintext is replaced by a letter some fixed number of positions down the alphabet. For example, with a shift of 3, A would be replaced by D, B would become E, and so on. The method is named after Julius Caesar, who used it in his private correspondence.



How it works?

Plain:    ABCDEFGHIJKLMNOPQRSTUVWXYZ
Cipher:   DEFGHIJKLMNOPQRSTUVWXYZABC



The encryption can also be represented using modular arithmetic by first transforming the letters into numbers, according to the scheme, A = 0, B = 1,..., Z = 25. Encryption of a letter x by a shift n can be described mathematically as,
E_n(x) = (x + n) \mod {26}.
Decryption is performed similarly,
D_n(x) = (x - n) \mod {26}.

following shows a message : 

Ciphertext: WKH TXLFN EURZQ IRA MXPSV RYHU WKH ODCB GRJ
Plaintext:  the quick brown fox jumps over the lazy dog

History!

The Caesar cipher is named after Julius Caesar, who, according to Suetonius, used it with a shift of three to protect messages of military significance. While Caesar's was the first recorded use of this scheme, other substitution ciphers are known to have been used earlier.














1. Check Windows Update and Office Update regularly (http://office.microsoft.com/productupdates) have your Office CD ready. Click on the Automatic Updates tab in the System control panel and choose the appropriate options.

2. Install a personal firewall. Both SyGate (_www.sygate.com) and ZoneAlarm (_www.zonelabs.com) offer free versions.


3. Install a free spyware blocker.  (http://security.kolla.de). SpyBot is also paranoid and ruthless in hunting out tracking cookies.

4. Use strong passwords and change them periodically. Passwords should have at least seven characters; use letters and numbers and have at least one symbol. A decent example would be f8izKro@l. This will make it much harder for anyone to gain access to your accounts. and even harder to remember at first but if you make some combinations, it will work.

5. If you're using Outlook or Outlook Express, use the current version or one with the Outlook Security Update installed. The update and current versions patch numerous vulnerabilities.

6. Buy antivirus software and keep it up to date. If you're not willing to pay, try Grisoft AVG Free Edition (Grisoft Inc., www.grisoft.com). And doublecheck your AV with the free, online-only scanners available at www.pandasoftware.com/activescan and http://housecall.trendmicro.com.

7. If you have a wireless network, turn on the security features: Use MAC filtering, turn off SSID broadcast, and even use WEP with the biggest key you can get.

8. Be skeptical of things on the Internet. Don't assume that e-mail "From:" a particular person is actually from that person until you have further reason to believe it's that person. Don't assume that an attachment is what it says it is. Don't give out your password to anyone, even if that person claims to be from "support."

Today I'll be talking about crypters - to bypass antivirus

Crypters

Crypting is one of the popular methods used for antivirus evading due to it’s simplicity and also because it does not require any prior knowledge about any programming language.

How Crypters Work?

A crypter is a small program that allows the attacker to crypt the source code of a Trojan or any form of malware, A crypter basically jumbles the source of the file to make it undetectable, As I told you before that an antivirus use a signature based detection, the crypter jumbles the source so when an antivirus scans the virus/malware/trojan it cannot be detected.

FUD

FUD stands for “Fully Undetectable” which simply means that a trojan or a virus which cannot be detected by an antivirus. FUD server is very difficult to achieve, you are very lucky if you can find any binders or crypters out there which is FUD. Free Crypters lose their affectivity as antivirus makes or composes a signature for them, however paid crypters are said to be Fully undetectable.


Ultimate Crypter – Ultimate crypter is one of the most commonly used crypters around, Ultimate crypter may not be able to achieve a FUD server but it has a very low detection rate. It has a paid version too which claims to make the server FUD however I haven’t tried it


Yoda’s Crypter – Yoda’s crypter has a lower antivirus detection rate than ultimate crypter, it has a user friendly graphical representation and is very easy to use.

Crypters are not always used for hacking purposes. 
A Crypter encrypts and packs other software in a way that makes the actual bytes unreadable. People use a crypter to protect software from reverse engineering, piracy / theft, hacking / tampering. Antivirus positives can be defeated this way as well, though unfortunately this technique of using crypters is also used by hackers to make a virus and other malware undetected by antivirus software.

What is botnet?

A botnet is a collection of infected computers that are remotely controlled by a hacker.

More about it...

Once a computer is infected with a bot, the hacker can control the computer remotely over the Internet. From then on, the computer is a zombie, doing the bidding of the hacker, although the user is completely unaware. Collectively, such computers are called botnet.

The hacker can share or sell access to control the botnet, allowing others to use it for malicious purposes.

For example, a spammer can use a botnet to send out spam email. Up to 99% of all spam is distributed this way. This allows the spammers to avoid detection and to get around any blacklisting applied to their own servers. It can also reduce their costs because the computer’s owner is paying for the Internet access.

Hackers can also use zombies to launch a distributed denial-of-service attack, also known as a DDoS. They arrange for thousands of computers to attempt to access the same website simultaneously, so that the web server is unable to handle all the requests reaching it.

The website thus becomes inaccessible.





Everyone knows about computer viruses. Or at least they think they do.


copied from sophos.com

Thirty years ago, the first computer virus appeared, Elk Cloner, displaying a short poem when an infected computer booted up for the 50th time. Since then, cybercriminals have created millions of viruses and other malware—email viruses, Trojans, Internet worms, spyware, keystroke loggers—some spreading worldwide and making headlines.
Many people have heard about viruses that fill your computer screen with garbage or delete your files. In the popular imagination, malware still means pranks or sabotage. The early 1990s saw global panic about the Michelangelo virus. In the 2000s, when millions of computers were infected with the SoBig-F virus and primed to download unknown programs from the web at a set time, antivirus companies scrambled to persuade Internet service providers to shut down servers to avoid a doomsday scenario. Hollywood movies like Independence Day reinforced this perception, with virus attacks signaled by flashing screens and alarms.
However, this is far from the truth today.
The threats are no less real now, but they are low-profile, well-targeted, and more likely to be about making cash than creating chaos.
Today, malware is unlikely to delete your hard disk, corrupt your spreadsheet, or display a message. Such cyber-vandalism has given way to more lucrative exploits. Today’s viruses might encrypt all your files and demand a ransom.
Or a hacker might blackmail a large company by threatening to launch a denial-of-service attack, which prevents customers from accessing the company’s website.
More commonly, though, viruses don’t cause any apparent damage or announce their presence at all. Instead, a virus might silently install a keystroke logger, which waits until the victim visits a banking website and then records the user’s account details and password, and forwards them to a hacker via the Internet.
The hacker is an identity thief, using these details to clone credit cards or plunder bank accounts. The victim isn’t even aware that the computer has been infected. Once the virus has done its job,
it may delete itself to avoid detection.
Another trend is for malware to take over your computer, turning it into a remote-controlled zombie. It uses your computer without your knowledge to relay millions of profit-making spam messages. Or, it may launch other malware attacks on unsuspecting computer users.

And as social networks like Facebook and Twitter have grown in popularity, hackers and cybercriminals are exploiting these systems to find new ways of infecting computers and stealing identities.
Hackers may not even target large numbers of victims any more. Such high-visibility attacks bring unwanted attention, and antivirus companies can soon neutralize malware that is widely reported. In addition, large-scale exploits can bring hackers more stolen data than they can handle. Because of this, threats are becoming more carefully focused.
Spearphishing is an example. Originally, phishing involved sending out mass-mail messages that appeared to come from banks, asking customers to re-register confidential details, which could then be stolen. Spearphishing, by contrast, confines itself to a small number of people, usually within an organization. The mail appears to come from colleagues in trusted departments, asking for password information. The principle is the same, but the attack is more likely to succeed because the victim thinks that the message is internal, and his or her guard is down.
Stealthy, small-scale, well-targeted: for now,
this seems to be the way that security threats
are going.
What of the future, though? Predicting how security threats will develop is almost impossible. Some commentators assumed that there would never be more than a few hundred viruses, and Microsoft’s Bill Gates declared that spam would no longer be a problem by 2006. It’s not clear where future threats will come from, or how serious they will be. What is clear is that whenever there is an opportunity for financial gain, hackers and criminals will attempt to access and misuse data.

Malware - Malicious Software



If you are reading this, it's certain that you have a computer, and if you have used a computer, I am sure you have found malware or a virus inside your PC atleast once. So let us see what exactly is a malware?

Malware, short for malicious software, is software used or created by hackers to disrupt computer operation, gather sensitive information, or gain access to private computer systems. It can appear in the form of code, scripts, active content, and other software. 'Malware' is a general term used to refer to a variety of forms of hostile, intrusive, or annoying software.It includes computer virus, worm, spyware, adware and other malicious code/script which is not good for us. 

Many early infectious programs, including the first internet worm (morris worm) were written as experiments or pranks. Today, malware is used primarily to steal sensitive personal, financial, or business information for the benefit of others.Malware is sometimes used broadly against government or corporate websites to gather guarded information, or to disrupt their operation in general. However, malware is often used against individuals to gain personal information such as social security numbers, bank or credit card numbers, and so on. 

Before Internet access became widespread, viruses spread on personal computers by infecting the executable boot sectors of floppy disks. By inserting a copy of itself into the machine code instructions in these executables, a virus causes itself to be run whenever a program is run or the disk is booted. Early computer viruses were written for the Apple II and Macintosh, but they became more widespread with the dominance of the IBM PC and MS-DOS system. Executable-infecting viruses are dependent on users exchanging software or boot-able floppies, so they spread rapidly in computer hobbyist circles.

Source : wikipedia .



What is Trojan?

A Trojan horse, or Trojan, is a type of malware that masquerades as a legitimate file or helpful program with the ultimate purpose of granting a hacker unauthorized access to a computer. Trojans do not attempt to inject themselves into other files like a computer virus. Trojan horses can make copies of themselves, steal information, or harm their host computer systems. Many trojans rely on drive-by downloads or install via online games or internet driven applications in order to reach target computers. The term is derived from the Trojan Horse story in Greek mythology because Trojan horses employ a form of “social engineering,” presenting themselves as harmless, useful gifts, in order to persuade victims to install them on their computers.

A trojan is used for

1.Capturing the user's screen

2.Crashing the computer


3.Keystroke logging (Including usernames and password )


4.Use of the machine as part of a botnet (e.g. to perform  

    automated spamming or to distribute Denial-of-service attacks)

5.Electronic money theft


6.Data theft (e.g. retrievin
g passwords or credit card

    information)

7.Installation of software, including third-party malwares


8.Downloading or uploading of files on the user's computer


9.Modification or deletion of files


10.Anonymising internet viewing

These are some few functionality of trojan horse, different scripts have different functions.


Popular trojan horses

  • Netbus (by Carl-Fredrik Neikter)
  • Subseven or Sub7(by Mobman)
  • Y3K Remote Administration Tool (by Konstantinos & Evangelos Tselentis)
  • Back Orifice (Sir Dystic)
  • Beast
  • Zeus
  • The Blackhole exploit kit
  • Flashback Trojan (Trojan.BackDoor.Flashback)



Avoiding Trojan 


1. Never execute programs unless they are from a trusted source.

2. Never open e-mail attachments unless you know who they're from, especially attachments with the extensions .exe,                .ink and .vbs.

3. Update your antivirus and security software on a regular basis.

4. Install patches and security updates for your operating system and software as they become available.

5. Beware of homemade CDs and floppy disks or pen-drive. If you plan to use these disks in your computer, scan them    with your anti-virus software first.

6. Never accept programs transferred by instant messaging applications.







Introduction

Strong passwords are important, but even the best password won’t keep you safe from keyloggers  that’s designed to secretly record your keystrokes.
Hi today we'll discuss about keyloggers, software or hardware designed to capture key strokes or simply to get passwords. But now a days keyloggers not just capture key strokes but do much more than excepted. Different key loggers have different functions depending upon the producer of those s/w or h/w. 


A keylogger is a device that is installed on your computer and is used to record passwords, keystrokes and other important information. These are the most common tools used by hackers and can be very dangerous if you have important information on your computer that you need to protect. There are several programs that you can use to protect your computer and prevent keyloggers from stealing your information.

Keyloggers are of two types : 
  1. software keylogger
  2. hardware keylogger

The hard ware keylogger is installed in the computer's mother board manually to capture key strokes, not much entertained by the hackers. 


The most common is software keylogger, these softwares are installed remotely. A keylogger can be downloaded from internet for free but paid ones are also available. A keylogger can take screen shots after a fixed interval of time say 2 min and send it to the hacker, it can save every og in/out information and yeah it sure capture your facebook/gmail/etc passwords, your messages and mails. So its not good to have one such s/w in your PC.

How to avoid it.


  1. Use on-screen keyboard while typing passwords.
  2. Always turn on your fire-wall.
  3. Use a good paid anti-virus for your PC, as most of the keyloggers are detectable.
  4. Never download anything which is not secure.
  5. Do not avoid warning message from the browser while downloading.
  6. Keep changing your password every month or two. 
  7. Be conscious while doing anything on net.
  8. and Enjoy!




PHISHING -  an introduction

The most common way a usual internet user get attacked by hackers is phishing. Phishing is one of many ways by which your private data can be attacked. Wikipedia describes phishing as :
Phishing is a way of attempting to acquire information such as usernames, passwords, and credit card details by masquerading as a trustworthy entity in an electronic communication.
Phishing attack can be used to get your social networks's password, your bank account's information or any other private information which can be dangerous in hands of hackers. Broadly speaking it is a way of fooling a person. I mean the victim gives the information on a site which look legitimate, but it is not.

For explaining the rest of the part let us take an example of bank account's phishing attack.

Suppose the hacker want to have back account's information. So he go to the bank's official web site and make a copy of  the page where users log in to their account. The copied page looks similar to the original one. The attacker creates a php script , that copies the user name and password to a simple text file accessible to the hacker. Little changes are made in the copied log in page of bank to get the password but it does not affect the look of the page, it is similar to the original page. Now he upload the copied page, the php script and a blank text file to get passwords to a server.

This was the hackers part, now here come the step where the user get trapped.
The attacker will send the link of the copied fake page of bank's login area to the user, claiming that he is a bank authority. The user generally log in through the fake copied page and his password is stolen and the hacker can access his account using his password. There are numerous ways in which a fake mail can be sent, editing the from field, the header and much more.

Using a similar way facebook's or gmail's fake page can be created.
The hacker get the passwords written on a text file as follows : 




OK! so how to stop this and prevent phishing attack?

PREVENTING  phishing attack



Be suspicious of any email with urgent requests for personal financial information

Don't use the links in an email, instant message, or chat to get to any web page if you suspect the message might not be authentic or you don't know the sender or user's handle

Avoid filling out forms in email messages that ask for personal financial information 

Always ensure that you're using a secure website when submitting credit card or other sensitive information via your Web browser 

Remember not all scam sites will try to show the "https://" and/or the security lock. Get in the habit of looking at the address line, too. Were you directed to facebook? Does the address line display something different like "http://www.somethibgelse.com/facebook/login.htm?" Be aware of where you are going.

Consider installing a Web browser tool bar to help protect you from known fraudulent websites. These toolbars match where you are going with lists of known phisher Web sites and will alert you.

Regularly check your bank, credit and debit card satements to ensure that all transactions are legitimate 

If you are on facebook and you click on any suspicious link(other than facebook)link that asks you to enter password and login details. Never do it.

At last if you find that this is a phishing/spoofing , bring it in notice of reportphishing@antiphishing.org 

Indian users can go to: www.complaints-india.com/Online-Scam-Complaints/Phishing-Scams/


The most important step towards avoiding phishing is to look at the URL where you are entering any information 


Subscribe to: Posts ( Atom )

Categories

security phone tips review smartphone android google hacking game howto tablet windows htc mobile phones programming racing XOLO web definition

Popular Posts

  • manage your contacts with ease : contacts+
    One way or another we all are tied to our personal gadgets and gizmos, and why shouldn't we? it is the best way to stay connected with ...
  • Nokia ASHA 502 and 503
    Note : Nokia Asha 502 has been released in India for Rs.5,739 and official release date for Asha 503 in India has not been announced yet. N...
  • The Best Android Tablets
    Apple iPad has dominated the tablet market since its first release in early 2010, but lower priced, variety of designs and other feature...

Blog Archive

  • ►  2015 (1)
    • ►  11/08 - 11/15 (1)
  • ►  2014 (5)
    • ►  02/16 - 02/23 (1)
    • ►  02/02 - 02/09 (4)
  • ►  2013 (53)
    • ►  12/29 - 01/05 (2)
    • ►  12/22 - 12/29 (3)
    • ►  12/15 - 12/22 (3)
    • ►  12/08 - 12/15 (11)
    • ►  12/01 - 12/08 (4)
    • ►  11/24 - 12/01 (5)
    • ►  11/17 - 11/24 (6)
    • ►  11/10 - 11/17 (12)
    • ►  11/03 - 11/10 (7)
  • ▼  2012 (12)
    • ▼  08/19 - 08/26 (2)
      • Passwords
      • A short introduction to SSL
    • ►  08/12 - 08/19 (1)
      • Facebook security
    • ►  08/05 - 08/12 (3)
      • Caesar Cipher - cryptography
      • 8 Fast and Free Security Enhancements
      • Crypters
    • ►  07/29 - 08/05 (6)
      • Botnet
      • An introduction to cyber threat
      • Malware
      • Trojan Horse
      • Avoiding keyloggers
      • avoid getting phished!
Powered by Blogger.

Contact us

Name

Email *

Message *

Followers

Copyright 2014 Tech Soul.
Designed by OddThemes