Sunday, 18 December 2016

Using WHATSAPP From Your System (Computer/Laptop)



Hey,

 Suppose You have to send a file from your laptop to a Whatsapp contact. So you have to transfer data from your laptop to mobile and only after that you can send it through your mobile.

Now, you can use Whatsapp from your System (Computer/Laptop) Then you can do it fast 
and easily.


STEPS - 

1 - On Your Mobile - Open Your Whatsapp


I - CLICK ON THE OPTION BUTTON WHICH IS IN THE TOP OF Whatsapp.(three dots on the right upper corner of the screen)


  II - CLICK ON Whatsapp WEB.






2- On Your System - Open Browser In your System (Computer/Laptop)

3- Go to URL bar and type - " https://web.whatsapp.com/ " 




4- On Your Mobile -Scan a QR Code that is shown on System (Computer/Laptop) Screen  




That's It ....Now you can use Whatsapp from your System (Computer/Laptop)
and you can directly send your files to a whatsapp contact.  




If You want  to add more then one System (Computer/Laptop) then click on add ( + ) Symbol from the top.






Monday, 19 September 2016

The Cyber Crimes In India




"Cyber Crime defined as a crime that is done from system using Internet."

Or

"Cyber Crime is unlawful act done from the digital devices using Internet."
Or 

According to whatis.com...

" Cyber crime, also called computer crime, is any illegal activity that involves a computer or network-connected device, such as a mobile phone or computer or laptops."





In the world of computers Cyber Crimes is done in two ways -


1- Computer as a Target - Using a computer attack to other computers.

    eg- Hacking, send Virus/Worm , DOS attack etc.

2- Computer as a weapon  - Using a computer to commit crimes.

    eg- Credit card frauds, Pornography etc.





Cyber Crimes are -


 Unauthorized access & Hacking
Using other system without its permission or acknowledgment.


 Trojan Attack
A Trojan horse is a kind of a program that allows the attacker/hacker to control the user’s computer from a remote location.


  Virus and Worm attack
A worm is a malicious computer program that replicates itself usually over a computer network.
A virus is a computer program that attaches itself to legitimate programs and files without the user’s consent.


 E-mail & IRC related crimes
1. Email spoofing
2. Email Spamming
3 Sending malicious codes through email
4. Email bombing
5. Sending threatening emails
6. Defamatory emails
7. Email frauds
8. IRC ( Internet Relay Chat ) related


   Denial of Service attacks:-
Flooding a computer resource with more requests than it can handle. This causes the resource to crash thereby denying access of service to authorized users.


  Distributed DOS
A distributed denial of service (DoS) attack is accomplished by using the Internet to break into computers and using them to attack a network.
Hundreds or thousands of computer systems across the Internet can be turned into “zombies” and used to attack another system or website.
  Pornography


  Forgery


 Cyber Terrorism:-
Targeted attacks on military installations, power plants, air traffic control, banks, trail traffic control, telecommunication networks are the most likely targets. Others like police, medical, fire and rescue systems etc.
Cyberterrorism is an attractive option for modern terrorists for several reasons.
1.It is cheaper than traditional terrorist methods.
2.Cyberterrorism is more anonymous than traditional terrorist methods.
3.The variety and number of targets are enormous.
4.Cyberterrorism can be conducted remotely, a feature that is especially appealing to terrorists.
5.Cyberterrorism has the potential to affect directly a larger number of people.


  Banking/Credit card Related crimes:-
 stolen card information or fake credit/debit cards are common.
Bank employee can grab money using programs to deduce small amount of money from all customer accounts and adding it to own account also called as salami.
Source -  


   E-commerce/ Investment Frauds:-


   Online gambling:-
There are millions of websites hosted on servers abroad, that offer online gambling. In fact, it is believed that many of these websites are actually fronts for money laundering.


 Identity Theft :- 
Identity theft is the fastest growing crime in countries like America.
Identity theft occurs when someone appropriates another's personal information without their knowledge to commit theft or fraud.


 Data diddling:-
Information is changed from the way it should be entered by a person typing in the data, a virus that changes data, the programmer of the database or application, or anyone else involved in the process of having information stored in a computer file.


 Theft of Internet Hours:-
Unauthorized use of Internet hours paid for by another person.


 Physically damaging a computer system:-
Physically damaging a computer by sending viruses or anything that can damage our hardware is a crime.
Source -  






Tuesday, 13 September 2016

ANDROID NOUGAT “SEAMLESS UPDATES”




IN UPCOMING ANDROID 7.0 i.e NOUGAT, GOOGLE WILL INTRODUCE THE CHANGE IN ITS UPDATE PROCESS.

IT IS REFERRED AS SEAMLESS UPDATE. THROUGH HIS METHOD, THERE WILL BE LESS INTERRUPTION TO THE USER DURING UPDATING THE SMARTPHONE.
SEAMLESS UPDATE WORKS BY USING TWO PARTITIONS: AN ACTIVE SYSTEM PARTITION AND A DORMANT PARTITION, WHICH ARE IMAGES OF EACH OTHER. OTA UPDATE IS DOWNLOADED IN ACTIVE PARTITION AND OTA UPDATE IS INSTALLED IN DORMANT PARTITION. AFTER REBOOT, DORMANT PARTITION BECOME ACTIVE SYSTEM PARTITION AND VICE VERSA . THROUGH THIS PROCESS, NEW UPDATE IS APPLIED.

ADVANTAGES OF SEAMLESS UPDATES

1.       FASTER UPDATE OF SMARTPHONE.
2.       DORMANT PARTITION SERVES AS BACKUP.
3.       BETTER HANDLING OF UPDATE FAILURES.


THIS SEAMLESS UPDATE WILL ONLY WORK WITH PRE-INSTALLED NOUGAT ANDROID SMARTPHONE.





By - V. Bhusan



Wednesday, 10 August 2016

ROOTKIT






Hey Friends,
Today I am going to introduce term ROOTKIT.

Rootkit is a tool or malicious tool that helps to get back door.
Rootkit is divided into two words ROOT + KIT.... ROOT means root/admin access and KIT means set of tools.
The Rootkit is installed in your computer system through various methods like virus inserted into your system,from download or copy from internet, through email,installing unsafe program etc.
Once a Rootkit is installed , this will create a back door for hackers/attackers which will help in remote access and authorize access.


Some Facts About ROOTKIT

1- It is a Malicious Software
2- It's hard to detect Rootkit, because it activated at the time of booting process.
3- Rootkit is developed for Unix OS.
4- It is limitless, because it also works inside windows directories/functions.
5- Rootkit is mainly used for making money through cyber crimes.
6- It is the most powerful technique among all.



If you want to know more about rootkit...Please visit

1- www.techrepublic.com   click here..
2- www.bleepingcomputer.com  click here..



By - Somesh Sah



Tuesday, 9 August 2016

⁠⁠⁠Trojan, Virus and Worm..




Hey Friends,
Today, I am going to explain you "Terms Like ⁠⁠⁠Trojans, Viruses and Worms...
There are very useful things for the hackers to get the information about the victim.
They often use these skills to gain access to the victim's systems. The aim of targeting an organization or a victim to steal sensitive data or information and physically damage computer controlled equipment and many more. Trojans, viruses and worms can be used to help to complete above tasks.





Trojan


-The full name of Trojan is a "Trojan Horse".
-A Trojan horse is a kind of a program that allows the attacker/hacker to control the user’s computer from a remote location.
-The program "Trojan" comes with your additional applications that is useful for users.
-When the user install the application, then hacker is able to install malicious softwares, create backdoors, install other unwanted applications that can be used to damage your system.

Activities performed by hacker by using Trojan horse.

-Hacker is able to use the user’s computer as part of the Botnet.
-Damage the user’s computer (crashing, blue screen of death etc.)
-Stealing sensitive data(password,card number etc).
-Modifying files on the user’s computer
-Installs various software like keylogger.
-Viewing the user’s personal data (pictures,screenshot etc)
- Able to Downloading and access all the useful information.



  Worm

A worm is a malicious computer program that replicates itself usually over a computer network. An attacker/hacker use a worm to complete the following tasks...
-Install backdoors on the victim’s computers.
(The created backdoor may be used to create zombie computers that are used to send spam emails, perform distributed denial of service attacks etc. the backdoors can also be exploited by other malware.Worms may also slowdown the network by consuming the bandwidth as they replicate.)
-Install harmful payload code carried within the worm.




Virus


-A virus is a computer program that attaches itself to legitimate programs and files without the user’s consent.
-Viruses can consume computer resources such as memory and CPU time.
-The attacked programs and files are said to be “infected”. A computer virus may be used to....
1-Access private data such as user id and passwords
2-Display annoying messages to the user
3-Corrupt data in your computer
4-Log the user’s keystrokes

These techniques involve deceiving the users to open the files which appear to be normal files such as word or excel documents. Once the file is opened, the virus code is executed and does what it’s intended to do.



Summary


Definition

Trojan - Malicious program used to control a victim’s computer from a remote location.
Worm - Self replicating program that attaches itself to other programs and files
Virus - Illegitimate programs that replicate themselves usually over the network

Purpose

Steal sensitive data, spy on the victim’s computer etc.
Disrupt normal computer usage, corrupt user data etc.
Install backdoors on victim’s computer, slow down the user’s network etc.

Precautions

-Use of anti-virus software (updated),
-Update patches for operating systems,
-Security policy on usage of the internet and external storage media etc.
⁠⁠⁠⁠-Take regular backup



By - Somesh Sah



ALSO READ -


VIRUS using BATCH Files









Sunday, 7 August 2016

FOOTPRINTING



Hey Friend,
Today i am here to tell you about Footprinting.

Footprinting 



" Footprinting is defined as the collection of all the information of the victim gathered."  

0r

"A fine art of gathering target information of the victim."



Types of Footprinting 


1-Active Footprinting
2-Passive Footprinting



Active Footprinting -

In this Footprinting , Hackers/Attacker does not make any direct connection but they can use same source by download as it is, to reduce risk and able to find out almost all the loopholes .
Example is google database hacking.


Passive Footprinting -

In Passive Footprinting, Hacker/Attacker does not make any direct connection/relation with the victim system.
All the information gathered by using internet (via google search ,web sites,social networking etc)


By Somesh Sah

Saturday, 6 August 2016

Linux and its Distributions

Hey Friends,
Today i am telling you about LINUX and IT'S DISTRIBUTIONS.


Linux is an open source operating system (For detailed description of Linux click here). So basically Distribution is nothing but the version or types of linux.
In Windows XP 2000,Vista, 8, 8.1 .10  etc are the windows various versions...like that Linux also has different versions or types known as  Distribution or Distro.

There are more than thousand linux operating system, as we all know that Linux is an open source operating system therefore anyone with little knowledge of linux can modify its original source code and make its own linux distribution is also called customized operating system (make modifications according to your need. )

So some famous Linux Distribution are...



1.Arch linux



-It is for developers (Not for beginners)
-Do it yourself Approach based OS
-Fun for Developers
-Light weight  and flexible OS

official website- https://www.archlinux.org/






2.Cent OS


-Mostly used by enterprise and web services
-Free OS
-It is based on Rad Hat enterprise Distro

official website- https://www.centos.org/





3.Gentoo Linux


-It is not for beginners but fun for experience users
-It is Source based Distribution means you have to configure source code of a program before use.
-full to flexible used in any hardware configuration system.

official website- https://www.gentoo.org/




4.Linux Mint


-4th most popular operating system
-launch in 2006
-generally used for desktops and GUI Based

official website- https://www.linuxmint.com/



5.Ubuntu 


-Is the 3rd most popular operating system(after Windows and Mac)
-Used in home Desktop and Laptops
-based on Debian distribution
-Fully GUI Based
-It is also used for mobile,tablets ,cloud etc.

official website- http://www.ubuntu.com/



 

6.Backtrack and Kali Linux


-These are used for Pentesting and Vulnerabilities
-Used by  Hackers for hacking purpose,
- Debian Linux distributing.
- Backtrack is the old distribution of Kali Linux.
-To know more Click here

official website(backtrack)- http://www.backtrack-linux.org/
official website(kali)- https://www.kali.org/




7.Gnome and Zorin


- These have a very attractive GUI and Whereas Zorin Somehow resembles like Windows.
- GNOME Shell is the graphical shell of the GNOME desktop ...
-Zorin OS is a multi-functional operating system designed specifically for Windows users who want to have easy and smooth access to Linux. It is based on Ubuntu, and uses a customized version of Gnome and the Avant Window Navigator which they call the 'Zorin Desktop'.
-GNOME 3 is an easy and elegant way to use your computer. It is designed to put you in control and bring freedom to everybody.
official website(Gnome)- https://www.gnome.org/
official website(Zorin)- http://zorinos.com/





By - Somesh Sah



Also Read this --



Monday, 1 August 2016

DEEP-WEB


WHAT IS “DEEP WEB”?



Deep web is also termed as ‘Invisible Web’ because it is that part of internet that can’t be accessed as through usual browser like Google Chrome, Firefox etc. and couldn’t be indexed by search engines. Websites of deep web particularly use dynamic databases and non-indexed file formats, also they do not have any direct link, that’s why search engine can’t web crawl to them.


How You Can Access Deep Web?



To access deep web, user should download Tor browser and install on there systems. In the address bar of the browser, user should type particular deep web websites. Every deep web sites have .onion domains. Some general deep web sites you can use to explore deep web.



Advantages of Deep Web.



-Anonymity ( User can be anonymous on deep web ).
-User Privacy( no one can distinguish your identity)
-Security of Information.
-Safe from government surveillance like NSA Prism, GHCQ.
-In deep web, user can find various sites which do illegal activities which can be inhumane.


Various Deep Web Search Engines:-

-DeepPeep
-Intute
-Ahmia
-Scirus




 By - VIJAY BHUSAN 



Trace your Andriod Device using IMEI Number

Hey ,
Welcome Friendz...
Today i am here with the amazing and useful topic..That is really helpful to all of you.

In my last post , We see IMEI Number is very useful to us...
So, In this post , I will show you how to trace your Smart mobile phones (Android device) by yourself...


There are many ways to trace your mobile devices using IMEI Number...

1- Trace by Tele-operator
2- Trace by pre-installed applications
3- Trace by using Google Dashboard 



Trace By Tele-Operator

By using this method you need police permission (need to register FIR) ... without permission tele operator cannot find your lost or stolen mobile phone.
But It find out exact location of your device.
Mobile phone should be switched on under network area.  


Trace By Pre-Installed App's

Some applications (Apps) provide these facilities , like anti-virus application such as AVG Anti-Virus, CMS, Clean Master etc..
It can be installed before lost or stolen your mobile phone.
And my be thief can uninstall or deactivate your app from your mobile phone....
Therefore this is not a feasible way to find out our phone.


Trace By GOOGLE DASHBOARD

This is the best way we have...
suppose you don't have IMEI Number of your phone...Then WHAT TO Do???
Don't worry ...

I will explain step by step with screenshots...  


1- Open web browser
2- Go to GOOGLE DASHBOARD
3- Login your self
4- Now list of google thinks will open...in which you are registered with lot of details..
5- Search for android and click on it..
6- Now ,under Android section..you can see list of android devices which are login with your id
7- Then Click on Manage Device.
8- Now, new google Active Manager device window open..
9- Now, you can lock your phone, Ring your phone and erase important data from your phone and you can also find the location of your device in the map.

NOTE- Your device should be connected with internet ( Via 3G or WIFI )


SCREEN SHOT 







    


For Video ....
See this...By Guiding Tech 

It will show how to trace your lost or stolen Android and iPhone Devices. 







Sunday, 24 July 2016

IMEI

Hello, friends

Today I am going to tell you about a IMEI Number.

-IMEI Number is stands for INTERNATIONAL MOBILE EQUIPMENT IDENTITY.

-Every single mobile phone device is assigned with a 15 digit code know as IMEI Number.

-To know your device IMEI Number ...enter *#06# and make a call...
Now it will display a 15 digit number ....that is your IMEI Number.

-The IMEI is an unique identification number Which helps to trace your stolen or lost mobile phones.

-The IMEI number is very useful to block your mobile phone to prevent it from illegal usages.

-Typically your IMEI number is divided into 5 parts.....
1- Country Code
2- Final Assembly Code
3- Manufacturer Code
4- Serial Number
5- Spare Code

For Example....

Your device IMEI number is

350151808410101

Therefore the code is broken down into...

Country code - 35
Final assembly code - 0151
Manufacture code - 80
Serial number - 841010
Spare or unused - 1

Thursday, 30 June 2016

SPEED UP YOUR COMPUTER



Hello Friendz,
Today i am going to tell you some useful ways to speed up your slow computer..
I know you are bored with your system speed and not have patience to wait.

It is because all computers/laptops have some configuration like fix amount of RAM, hard drive space, clock speed of the processor etc...

Don't worry i am here with you, to solve you problem..and i feel happy if your problem is sort out with he help of this post.

So, Lets starts


  1. START UP APPLICATIONS
  2. CLEAN USELESS DATA
  3. UNINSTALL UNUSED PROGRAM
  4. CLEAN YOUR DESKTOP
  5. ANTIVIRUS
  6. COMPATIBILITY
  7. OTHER WAYS






START UP APPLICATION


Start up application are the programs that automatically starts when ever your operating system boots.
These programs slow down your booting process as well as reduce overall performance speed.
Some programs automatically start like torrent , Skype etc..
So i suggest you to disable these programs from the startup menu and make your system fast.

Steps-
○ press CTRL + ALT + DEL
click last option TASK MANAGER
○ then task bar window open
○ go to startup
○ click on status of a particular program
○ click on disable to stop it.







♥ CLEANSES

As you can clean you home regularly like that only you have to clean your PC too.
For cleanness of PC you don't need water and mop , you just need a software CCleaner  , I am Using this..There are many tools like this is available in internet , you can download any one.




Steps-
1- Download CCleaner
2- install and open
3- Click on Analyze
4- Run Cleanner








UN-USED APPLICATIONS


There are many applications in your computer system that you hardly used 1-2 times in a month or year.
I suggested please remove all these applications and when every you need these application , i suggested to use online tools.

Steps-
1- go to Control Panel
2- go to Programs and features
3- select the application(single right click)
4- on the top, click to uninstall/change to remove.










CLEAN YOUR DESKTOP



The purpose to cleaning of desktop is very important because of mainly two reasons
1- when every operating system crash ,all desktop file lose and can't be recovered,
2- all the document that is saved or rest in Desktop , have space in C drive (in which windows installs) so because of that all the free space is occupied by files
Therefore your system become slow.





ANTI-VIRUS

"Antivirus are the programs which is designed to detect and destroy computer viruses, and give you protection and also helps to secure your computer data."

So I suggest you ,Don't install any kind of anti-virus in your system because 
1- It continually use your process ,therefore your system become slow.
2- All the new operating system comes with inbuilt antivirus or a kind of application.
like- windows os comes with windows defender,just update it and use it.









♥ COMPATIBILITY



The Compatibility is very important factor in computer systems...
Basically you have to download software according to your system configuration ..
All Software comes with minimum requirement ...please read the requirement list before install it... as well as check it either your software is 32 bit or 64 bit and well as operating system for compatibility
- Specially for games







OTHER METHODS

If you tried all above methods and you still have problem then i suggest you to do below things...



  1. Reinstall operating system and all programs
  2. Increase you RAM
  3. Change your processor
  4. Don't install heavy  programs 
  5. Don't run more then 2 programs at a time
  6. Stop auto-updation
  7. Stop antivirus for scanning each and every time...




Basic tip to free space in Mac


WINDOWS SUBSYSTEM FOR LINUX

Microsoft partnered with Canonical (creator of Ubuntu) to bring Linux environment experience in Windows 10. Through Windows Subsystem F...