Skip to main content

How to Detect FAKE Profiles in Facebook...???


1.  Look for photos in the profile.If there is only one photo of the individual in the whole profile it makes it quite clear that the account is fake.

2. Look for status updates,wall posts and comments.If the user hasn’t updated a status for quite a long time and hasn’t been involved in any wall posting or commenting of other statuses,it means that the profile is likely to be fake.

3. Look at the recent activities.If it is that the user has just been adding randomers and making new friends,and that there are no pages liked or groups joined,it suggests that the user is determined in jst adding people and hence the profile is fake.

4. Check out the friend list.If found that maximum of the friends are of the opposite gender,it can be assumed that the profile is used either for fun or for random dating.

5. Check the info.If found that there is no ideal links given regarding school or education institutions or workplace and that the user is looking for dating and interested in both men and women,it shows signs of fakeness.

6. Check the birthdate.Birth dates like 1/1/XX…..or……31/12/XX are common between fake accounts as it is quite unique and easy to type in.

7. Fake profiles of girls usually have a contact no. in their info. Lets face it,girls harldy will have their contact no. in public.So watch out if the user exposes info that is unlikely for general users to unveil in public.

8. Look out for recent wall posts,if u see loads of people asking…’THANKS FOR THE ADD….DO I KNOW YOU’……and yet the psots remains unanswered…it is bound to be a fake one.

9. Look for common tarits used in facebook,like.using applications such as farmville,pet society etc….and adding siblings.If these traits are not found among the user, the profile is highly inactive or fake.This point can’t single handedly prove the fakeness,however this will be a supporting clue along with other points.

10. If you are quite certain about the profile’s fakeness,and want to be absolutely sure, try browsing google for some random profile pictues. Fake profile pictures are usually selected frm google and while browsing through it,you might as well come upon the picture the user chose for the fake account.

So this was a minor summary of points to note while detecting a fake account on facebook.Thus beware of suck fake accounts which may lead to privacy dilemmas or likewise.Hope you people like the article and it benefits you in case you try to detect any suck profile…..!

Comments

Popular posts from this blog

CIA Triad for- Base of Information security

The essential security principles of confidentiality, integrity, and availability are often  referred to as the  CIA Triad. All security controls must address these principles. These three  security principles serve as common threads throughout the CISSP CBK. Each domain  addresses these principles in unique ways, so it is important to understand them both in  general terms and within each specific domain: Confidentiality is the principle that objects are not disclosed to unauthorized subjects. Integrity is the principle that objects retain their veracity and are intentionally modified by  authorized subjects only. Availability is the principle that authorized subjects are granted timely access to objects  with sufficient bandwidth to perform the desired interaction. Different security mechanisms address these three principles in different ways and offer varying  degrees of support or application of these principles. Objects must be properly classified

My Article :- હેકર બનવું છે? કઈ રીતે?

મારી ૨ વર્ષ ની કારકિર્દી માં મને કેટલાય  લોકોએ, ખાસ કરીને કોલેજ ના વિદ્યાર્થીઓએ ઘણી વાર પૂછ્યું છે કે "મારે હેકર બનવું છે. તો હું શું કરું? " અને મારા બ્લોગ્સ માં પણ પૂછવામાં આવે છે કે એક સારો હેકર કઈ રીતે બની શકાય? એવું હું શું કરું અથવા તો મારા માં કઈ લાયકત હોવી જોઈએ એક હેકર બનવા માટે? આ પ્રશ્ન નો સંતોષકારક જવાબ આપવા માટે મેં internet પર શોધખોળ કર્યા પછી મને જે કઈ માહિતી મળી તેને હું આજે અહી રજુ કરું છું. મિત્રો, સૌપ્રથમ હેકર કઈ રીતે બનવું એ જાણવા પહેલા એ જાણવું જરૂરી છે કે ખરેખર હેકિંગ શું છે ? અને હેકર કોને કહેવાય. હેકિંગ ની સીધી અને સરળ વ્યાખ્યા નીચે મુજબ છે.  "તમારા કમ્પ્યુટર,નેટવર્ક(ઈન્ટરનેટ કે LAN દ્વારા) કે કોઈ ડીવાઈસ માં (ફોન, ટેબ્લેટ) માં કરવામાં આવતા ગેરકાયદેસર પ્રવેશ અને ઉપયોગ એ હેકિંગ કહેવાય છે."અને હેકિંગ કરતા લોકોને હેકર કહેવાય છે. હવે તમને થશે કે આવું શું કામ કરવું જોઈએ? આ તો ક્રાઈમ છે. તો તમને જણાવી દઉં કે હેકર મુખ્યત્વે ૨ પ્રકારના હોય છે.    વાઈટ હેટ હેકર્સ (એથીકલ હેકર્સ) : ધારો કે તમે તમારો ફેસબુક નો પાસવર્ડ ભૂલી ગયા(ખરેખર ના ભૂલતા ક્યારેય..)કે ત

Strengthening Information Security Risk Management for Financial Institutions

In the digital age, financial institutions face an unprecedented challenge in safeguarding sensitive data and maintaining the trust of their customers. The rising tide of cyber threats demands a comprehensive and proactive approach to information security risk management. As the backbone of the global economy, financial institutions are prime targets for cybercriminals seeking to exploit vulnerabilities and gain unauthorized access to valuable assets. This article delves into the critical importance of information security risk management for financial institutions and outlines key strategies to fortify their defenses against evolving cyber threats. Information security risk in financial institutions encompasses the potential for data breaches, unauthorized access, identity theft, and cyber-attacks. The consequences of such incidents can be severe, ranging from financial losses and legal repercussions to irreparable reputational damage. Common sources of information security risk inclu