Suppose You have to send a file from your laptop to a Whatsapp contact. So you have to transfer data from your laptop to mobile and only after that you can send it through your mobile.
This blog is simply about tips and tricks of computer system, internet and also provides the way of learning to become a ethical hacker. keep in touch...rock the digital world with HACKERS ROCKS.
Sunday, 18 December 2016
Using WHATSAPP From Your System (Computer/Laptop)
Suppose You have to send a file from your laptop to a Whatsapp contact. So you have to transfer data from your laptop to mobile and only after that you can send it through your mobile.
Monday, 19 September 2016
The Cyber Crimes In India
1- Computer as a Target - Using a computer attack to other computers.
eg- Hacking, send Virus/Worm , DOS attack etc.
eg- Credit card frauds, Pornography etc.
♥ E-commerce/ Investment Frauds:-
♥ Online gambling:-
Identity theft is the fastest growing crime in countries like America.
♥ Data diddling:-
♥ Physically damaging a computer system:-
Tuesday, 13 September 2016
ANDROID NOUGAT “SEAMLESS UPDATES”
Wednesday, 10 August 2016
ROOTKIT
Hey Friends,
Today I am going to introduce term ROOTKIT.
Rootkit is a tool or malicious tool that helps to get back door.
Rootkit is divided into two words ROOT + KIT.... ROOT means root/admin access and KIT means set of tools.
The Rootkit is installed in your computer system through various methods like virus inserted into your system,from download or copy from internet, through email,installing unsafe program etc.
Once a Rootkit is installed , this will create a back door for hackers/attackers which will help in remote access and authorize access.
Some Facts About ROOTKIT
1- It is a Malicious Software
2- It's hard to detect Rootkit, because it activated at the time of booting process.
3- Rootkit is developed for Unix OS.
4- It is limitless, because it also works inside windows directories/functions.
5- Rootkit is mainly used for making money through cyber crimes.
6- It is the most powerful technique among all.
If you want to know more about rootkit...Please visit
1- www.techrepublic.com click here..
2- www.bleepingcomputer.com click here..
By - Somesh Sah
Tuesday, 9 August 2016
Trojan, Virus and Worm..
Hey Friends,
Today, I am going to explain you "Terms Like Trojans, Viruses and Worms...
There are very useful things for the hackers to get the information about the victim.
They often use these skills to gain access to the victim's systems. The aim of targeting an organization or a victim to steal sensitive data or information and physically damage computer controlled equipment and many more. Trojans, viruses and worms can be used to help to complete above tasks.
Trojan
-The full name of Trojan is a "Trojan Horse".
-A Trojan horse is a kind of a program that allows the attacker/hacker to control the user’s computer from a remote location.
-The program "Trojan" comes with your additional applications that is useful for users.
-When the user install the application, then hacker is able to install malicious softwares, create backdoors, install other unwanted applications that can be used to damage your system.
-Hacker is able to use the user’s computer as part of the Botnet.
-Damage the user’s computer (crashing, blue screen of death etc.)
-Stealing sensitive data(password,card number etc).
-Modifying files on the user’s computer
-Installs various software like keylogger.
-Viewing the user’s personal data (pictures,screenshot etc)
- Able to Downloading and access all the useful information.
Worm
A worm is a malicious computer program that replicates itself usually over a computer network. An attacker/hacker use a worm to complete the following tasks...
-Install backdoors on the victim’s computers.
(The created backdoor may be used to create zombie computers that are used to send spam emails, perform distributed denial of service attacks etc. the backdoors can also be exploited by other malware.Worms may also slowdown the network by consuming the bandwidth as they replicate.)
-Install harmful payload code carried within the worm.
Virus
-A virus is a computer program that attaches itself to legitimate programs and files without the user’s consent.
-Viruses can consume computer resources such as memory and CPU time.
-The attacked programs and files are said to be “infected”. A computer virus may be used to....
1-Access private data such as user id and passwords
2-Display annoying messages to the user
3-Corrupt data in your computer
4-Log the user’s keystrokes
These techniques involve deceiving the users to open the files which appear to be normal files such as word or excel documents. Once the file is opened, the virus code is executed and does what it’s intended to do.
Summary
Definition
Trojan - Malicious program used to control a victim’s computer from a remote location.
Worm - Self replicating program that attaches itself to other programs and files
Virus - Illegitimate programs that replicate themselves usually over the network
Purpose
Steal sensitive data, spy on the victim’s computer etc.
Disrupt normal computer usage, corrupt user data etc.
Install backdoors on victim’s computer, slow down the user’s network etc.
Precautions
-Use of anti-virus software (updated),
-Update patches for operating systems,
-Security policy on usage of the internet and external storage media etc.
-Take regular backup
By - Somesh Sah
ALSO READ -
VIRUS using BATCH Files
Sunday, 7 August 2016
FOOTPRINTING
Hey Friend,
Today i am here to tell you about Footprinting.
Footprinting
Types of Footprinting
1-Active Footprinting
2-Passive Footprinting
Active Footprinting -
In this Footprinting , Hackers/Attacker does not make any direct connection but they can use same source by download as it is, to reduce risk and able to find out almost all the loopholes .
Example is google database hacking.
Passive Footprinting -
In Passive Footprinting, Hacker/Attacker does not make any direct connection/relation with the victim system.
All the information gathered by using internet (via google search ,web sites,social networking etc)
By Somesh Sah
Saturday, 6 August 2016
Linux and its Distributions
Today i am telling you about LINUX and IT'S DISTRIBUTIONS.
Linux is an open source operating system (For detailed description of Linux click here). So basically Distribution is nothing but the version or types of linux.
In Windows XP 2000,Vista, 8, 8.1 .10 etc are the windows various versions...like that Linux also has different versions or types known as Distribution or Distro.
There are more than thousand linux operating system, as we all know that Linux is an open source operating system therefore anyone with little knowledge of linux can modify its original source code and make its own linux distribution is also called customized operating system (make modifications according to your need. )
So some famous Linux Distribution are...
1.Arch linux
-It is for developers (Not for beginners)
-Do it yourself Approach based OS
-Fun for Developers
-Light weight and flexible OS
official website- https://www.archlinux.org/
2.Cent OS
-Mostly used by enterprise and web services
-Free OS
-It is based on Rad Hat enterprise Distro
official website- https://www.centos.org/
3.Gentoo Linux
-It is not for beginners but fun for experience users
-It is Source based Distribution means you have to configure source code of a program before use.
-full to flexible used in any hardware configuration system.
official website- https://www.gentoo.org/
4.Linux Mint
-4th most popular operating system
-launch in 2006
-generally used for desktops and GUI Based
official website- https://www.linuxmint.com/
5.Ubuntu
-Is the 3rd most popular operating system(after Windows and Mac)
-Used in home Desktop and Laptops
-based on Debian distribution
-Fully GUI Based
-It is also used for mobile,tablets ,cloud etc.
official website- http://www.ubuntu.com/
6.Backtrack and Kali Linux
-These are used for Pentesting and Vulnerabilities
-Used by Hackers for hacking purpose,
- Debian Linux distributing.
- Backtrack is the old distribution of Kali Linux.
-To know more Click here
official website(backtrack)- http://www.backtrack-linux.org/
official website(kali)- https://www.kali.org/
7.Gnome and Zorin
- These have a very attractive GUI and Whereas Zorin Somehow resembles like Windows.
- GNOME Shell is the graphical shell of the GNOME desktop ...
-Zorin OS is a multi-functional operating system designed specifically for Windows users who want to have easy and smooth access to Linux. It is based on Ubuntu, and uses a customized version of Gnome and the Avant Window Navigator which they call the 'Zorin Desktop'.
-GNOME 3 is an easy and elegant way to use your computer. It is designed to put you in control and bring freedom to everybody.
official website(Gnome)- https://www.gnome.org/
official website(Zorin)- http://zorinos.com/
By - Somesh Sah
Also Read this --
Monday, 1 August 2016
DEEP-WEB
WHAT IS “DEEP WEB”?
Deep web is also termed as ‘Invisible Web’ because it is that part of internet that can’t be accessed as through usual browser like Google Chrome, Firefox etc. and couldn’t be indexed by search engines. Websites of deep web particularly use dynamic databases and non-indexed file formats, also they do not have any direct link, that’s why search engine can’t web crawl to them.
How You Can Access Deep Web?
To access deep web, user should download Tor browser and install on there systems. In the address bar of the browser, user should type particular deep web websites. Every deep web sites have .onion domains. Some general deep web sites you can use to explore deep web.
Advantages of Deep Web.
-Anonymity ( User can be anonymous on deep web ).
-User Privacy( no one can distinguish your identity)
-Security of Information.
-Safe from government surveillance like NSA Prism, GHCQ.
-In deep web, user can find various sites which do illegal activities which can be inhumane.
Various Deep Web Search Engines:-
-DeepPeep-Intute
-Ahmia
-Scirus
Trace your Andriod Device using IMEI Number
Welcome Friendz...
Today i am here with the amazing and useful topic..That is really helpful to all of you.
In my last post , We see IMEI Number is very useful to us...
So, In this post , I will show you how to trace your Smart mobile phones (Android device) by yourself...
Trace By Tele-Operator
Trace By Pre-Installed App's
Trace By GOOGLE DASHBOARD
I will explain step by step with screenshots...
SCREEN SHOT
Sunday, 24 July 2016
IMEI
Hello, friends
Today I am going to tell you about a IMEI Number.
-IMEI Number is stands for INTERNATIONAL MOBILE EQUIPMENT IDENTITY.
-Every single mobile phone device is assigned with a 15 digit code know as IMEI Number.
-To know your device IMEI Number ...enter *#06# and make a call...
Now it will display a 15 digit number ....that is your IMEI Number.
-The IMEI is an unique identification number Which helps to trace your stolen or lost mobile phones.
-The IMEI number is very useful to block your mobile phone to prevent it from illegal usages.
-Typically your IMEI number is divided into 5 parts.....
1- Country Code
2- Final Assembly Code
3- Manufacturer Code
4- Serial Number
5- Spare Code
For Example....
Your device IMEI number is
350151808410101
Therefore the code is broken down into...
Country code - 35
Final assembly code - 0151
Manufacture code - 80
Serial number - 841010
Spare or unused - 1
Thursday, 30 June 2016
SPEED UP YOUR COMPUTER
Hello Friendz,
Today i am going to tell you some useful ways to speed up your slow computer..
I know you are bored with your system speed and not have patience to wait.
It is because all computers/laptops have some configuration like fix amount of RAM, hard drive space, clock speed of the processor etc...
Don't worry i am here with you, to solve you problem..and i feel happy if your problem is sort out with he help of this post.
So, Lets starts
- START UP APPLICATIONS
- CLEAN USELESS DATA
- UNINSTALL UNUSED PROGRAM
- CLEAN YOUR DESKTOP
- ANTIVIRUS
- COMPATIBILITY
- OTHER WAYS
♥ START UP APPLICATION
Start up application are the programs that automatically starts when ever your operating system boots.
These programs slow down your booting process as well as reduce overall performance speed.
Some programs automatically start like torrent , Skype etc..
So i suggest you to disable these programs from the startup menu and make your system fast.
Steps-
○ press CTRL + ALT + DEL
○ click last option TASK MANAGER
○ then task bar window open
○ go to startup
○ click on status of a particular program
○ click on disable to stop it.
♥ CLEANSES
As you can clean you home regularly like that only you have to clean your PC too.For cleanness of PC you don't need water and mop , you just need a software CCleaner , I am Using this..There are many tools like this is available in internet , you can download any one.
♥ UN-USED APPLICATIONS
There are many applications in your computer system that you hardly used 1-2 times in a month or year.
I suggested please remove all these applications and when every you need these application , i suggested to use online tools.
Steps-
1- go to Control Panel
♥ CLEAN YOUR DESKTOP
The purpose to cleaning of desktop is very important because of mainly two reasons
1- when every operating system crash ,all desktop file lose and can't be recovered,
2- all the document that is saved or rest in Desktop , have space in C drive (in which windows installs) so because of that all the free space is occupied by files
Therefore your system become slow.
The Compatibility is very important factor in computer systems...
Basically you have to download software according to your system configuration ..
All Software comes with minimum requirement ...please read the requirement list before install it... as well as check it either your software is 32 bit or 64 bit and well as operating system for compatibility
- Specially for games
If you tried all above methods and you still have problem then i suggest you to do below things...
- Reinstall operating system and all programs
- Increase you RAM
- Change your processor
- Don't install heavy programs
- Don't run more then 2 programs at a time
- Stop auto-updation
- Stop antivirus for scanning each and every time...
Basic tip to free space in Mac
WINDOWS SUBSYSTEM FOR LINUX
Microsoft partnered with Canonical (creator of Ubuntu) to bring Linux environment experience in Windows 10. Through Windows Subsystem F...
-
HEY FRIEND, TODAY I WILL TEACH YOU...HOW TO UNLOCK TATA DOCOMO PHOTON MAX 3G WIFI ...IN 9 EASY STEPS... STEP 1- THE PHOTON DEVICE I...
-
Hey Friends, Today I am Going To Show You How To Hack Wifi Wpa And Wpa2 Using Crunch Without Creating Wordlist, most of the hackin...
-
Hello, everyone , Today i am going to hack Facebook account for you , using Kali-Linux. It is like phishing method but don't wo...