Skip to main content

Posts

Showing posts from May, 2012

Social Engineering..... whats truth??

Please note this article is for educational purpose only. What be your reaction if you get a mail in your corporate Inbox w ith from field as “HR Helpdesk” (assuming that’s how HR mail appears in your organization) with subject as “Best Employee Bonus of Rs. 1,50,000”? The mail reads that you have been awarded the bonus because of your hard work, dedication etc. All you need to do is reply with some of your official & personal details and the bonus is yours. If I were you I would jump on it and reply in matter of 30 seconds. However, what you would have failed to notice is that the email ID in reply field would not be one of your HR’s corporate email ID’s but some malicious unknown email ID on the public domain. This is what we called Social Engineering. Social Engineering is a term associated with attacker’s abilities to manipulate the natural human tendency of trust leading to malicious activities like unauthorized access, loss of confidential details, phishing etc. It’s actually

Hacker's Job

Cyber Cells in India

                                    Hello Friends, Did you ever become a victim of any Cyber Crime? if No, than you are lucky person. Its Good to be aware & secure on the internet. but unfortunately (in future) if you stuck with any cyber crime than how you will survive that  situation? where you will report your case? in nearest police station? No, that's wrong decision. you should  have information of your State's Cyber Cell. Here I put down a list of Cyber Cells in India which are listed state wise. please keep note of your state's cyber cell because nobody knows when u can need of it.       Assam CID HQ,Dy.SP. Assam Police co ntact Details Ph: +91-361-252-618       +91-9435045242 E-mail: ssp_ co d@assampolice. co m Chennai Address: Assistant  Co mmissioner of Police Cyber Crime Cell Co mmissioner office Campus Egmore, Chennai- 600008 Co ntact Details:  +91-40-5549 8211 E-mail id:  s.balu@nic.in For Rest of Tamil Nadu, Address:  Cyber Crime Cell, CB, CID, Chennai ph:

Unlock IDEA NET SETTER

Now a days most of us are using data cards of various companies and one of them is IDEA NETSETTER. Today I’m going to tell, how you can use any other SIM in IDEA NET SETTER and then you can access upto 2mbps via that USB Net setter Netsetter is using a Huawei modem Step 1 : Download UNIVERSAL MASTER CODE (software) Step 2 : Now take your USB modem and see its back , you will see a 15 digit number and that’s your modem’s IMEI number . Open notepad and type that IMEI no. Step 3 : Now double click on the downloaded file of Universal Master Code and extract it then click on Universal Master Code.exe Step 4 : In the IMEI number field of Universal Master Codetype , enter the IMEI number which you have already typed in notepad and press calculate. It will generate a flash and unlock code. Step 5 : Now connect your USB IDEA net setter and install net setter software from there and run it and also put a non IDEA SIM. It will ask you for unlock code , also it will show u have 10 attempts ,simply

How do I Test VirusScan Installation?

After installing VirusScan, you may logically wonder, how do I know if it's working? The answer is a test virus. The EICAR Standard AntiVirus Test File is a combined effort by anti-virus vendors throughout the world to implement one standard by which customers can verify their anti-virus installations. Solution To test your installation, copy the following line into its own file, then save the file with the name EICAR.COM. More detailed instructions are found below. X5O!P%@AP[4\PZX54(P^)7CC)7}$EICAR-STANDARD-ANTIVIRUS-TEST-FILE!$H+H* The file size will be 68 or 70 bytes. If VirusScan is running and configured correctly, when you try to save the file, VirusScan will detect the virus. If VirusScan is not running, start it and scan the directory that contains EICAR.COM. When your software scans this file, it will report finding the EICAR test file. Note that this file is NOT A VIRUS. Delete the file when you have finished testing your installation to avoid alarming unsuspecting users.

Indian Hackers V/s Bangladeshi Hackers

They Call it " Cyber war " - but In actual they are destroying Cyber Space of their own Country by Defacing Sites for a matter that can't be solved by Ministry like this. The cyber attacks was started two days back from both sides. Indian Hacking Group  Indishell  become active once again against Bangladesh Black Hat Hackers. The whole issue of these Hacks by Bangladeshi Hackers are because of BSF brutality at the India-Bangladesh border zone as they mentioned on Defaced Pages. In Return Indian hackers hacked a little over 30 government websites of Bangladesh yesterday. Bangladeshi hacking group Bangladesh Cyber Army then showed up to save their country's cyber space they started attacking back. Bangladesh Cyber Army and other Bangladeshi Hackers took down around 30 Indian Government websites and 4 other high-profile websites in last two days. Most of sites become victim of DDoS attacks resulting them to shut-down. Here is the list of the  34 sites . Also a hacker nam

10 Biggest Computer Security Myths in India

Keeping your computer secure can be confusing, so it’s not surprising that mistaken beliefs often end up taking root. Here are the ten biggest myths about computer security, busted once and for all. We’ve run posts in the past covering  common virus myths , but viruses are just one small part of the overall security equation. Here are some widespread beliefs that are (for the most part) flat-out wrong. Myth #10. Computers represent the biggest security risk While many criminals and scammers use email, web sites and other electronic tools, they haven’t abandoned more traditional methods. According to the Australian Competition and Consumer Commission, phone scams remain more common  than any other type. That doesn’t mean you shouldn’t take appropriate precautions when you’re online. Rather, it serves as a reminder that a questioning attitude is wise whenever you interact with people in any forum. Myth #9. Security software companies write most viruses A persistent myth ever since comp

How to Lock your PC with USB Flash Drive?

PREDATOR Software locks your PC when you are away, even if your Windows session is still opened. It uses a regular USB flash drive as an access control device, and works as follows: you insert the USB drive you run PREDATOR (autostart with Windows is possible) you do your work... when you're away from your PC, you simply remove the USB drive:  once it is removed, the keyboard and mouse are disabled and the screen darkens when you return back to your PC, you put the USB flash drive in place:  keyboard and mouse are immediately released, and the display is restored. It's easier and faster than closing your Windows session, since you do not have to retype your password when you return. Advanced Security Features: Protect several computers with a single flash drive Protect a computer with several flash drives PREDATOR can send alert messages by Email or by SMS. PREDATOR records all security-related events in a log file: start, alarms, stop. By reading this log, you will know if int