Thursday, 7 September 2017

Ransomware


LOCKY RANSOMWARE 

Locky ransomware is malicious program spreading through spam emails which lock your computer or network connected system by encrypting it. To decrypt your devices, it asks for ransom in bitcoins. At the initial stage, it was using fake Dropbox domains to spread ransomware. This malicious program spread zip or documents having extension .exe(although it varies) which have VB script(.vbs). It is run by the hacker through various email campaigns which included 23 million emails. Locky ransomware is frequently updated from initial days of launch.





PROCESS OF ATTACK 

Updated locky ransomware does not trigger by itself running the script present in word document macro. It waits for the user to close the fake document. The script run in the background to encrypt computer contents. Script run to download payload and payload is invoked from %appdata% folder. The message is displayed when commands are fully executed.







HOW TO BE SAFE FROM LOCKY RANSOMWARE 

1. Do not open unknown emails from an unknown person or promotional emails.
2. Enable two step authentication on email ids.
3. Never download email attachment with .exe extension.
4. Don’t enable editing or macro in downloaded files.
5. Install security software and regularly update your system.
6. Perform regular backup of your system.
7. Disable macro in Microsoft office and Remote desktop connections.
8. Don’t install unwanted software.
9. Install firewall from being your system exploited.
10. Block attachment of malicious extension.


By -Vijay Bhushan

Friday, 1 September 2017

Blue Whale - The Internet Game



Internet Game: BLUE WHALE

Blue Whale is a psychological internet game which has various task in series and last is to commit suicide. It is observed to be happening in many countries. This game is run by administrators on various internet forums to players.
The term “Blue Whale” is derived from beached whale who intentionally come on the beach to die.
It started as of “F57” game in Russia, in 2013. It came limelight as a wider phenomenon among teenager when a journalist reported unrelated suicide cases to the game in 2016. Since then it is banned in many countries. Law agencies and authorities are working to stop the trend of Blue Whale game.
It is also linked to “Human Embroidery” game in China.
This game cannot be left when started by teenagers as they have affection or cyber bullied for the game.


Structure Of The Game

Administrator of the game gives players series of the task each day up to 50 days.
Each task should be completed before getting a new task.
The completed task should be photographed and uploaded to administrators.
 Often players are cyber bullied and blackmailed.
Administrator finds players and invites to join them social media groups.


Tips to keep your child safe.

Talk to your children regularly.
Take out time for children to play.
Monitor online activities and affection on the internet towards different things.

Don’t leave you, child, alone most time and if your children live lonely, seek reason or provide psychological support to them. 



For 50 Tasks in The blue whale Game are -- 


1. Carve with a razor "f57" on your hand, send a photo to the curator.
2. Wake up at 4.20 a.m. and watch psychedelic and scary videos that curator sends you.
3. Cut your arm with a razor along your veins, but not too deep, only 3 cuts, send a photo to the curator.
4. Draw a whale on a sheet of paper, send a photo to curator.
5. If you are ready to "become a whale", carve "YES" on your leg. If not, cut yourself many times (punish yourself).
6. Task with a cipher.
7. Carve "f40" on your hand, send a photo to curator.
8. Type "#i_am_whale" in your VKontakte status.
9. You have to overcome your fear.
10. Wake up at 4:20 a.m. and go to a roof (the higher the better)
11. Carve a whale on your hand with a razor, send a photo to curator.
12. Watch psychedelic and horror videos all day.
13. Listen to music that "they" (curators) send you.
14. Cut your lip.
15. Poke your hand with a needle many times
16. Do something painful to yourself, make yourself sick.
17. Go to the highest roof you can find, stand on the edge for some time.
18. Go to a bridge, stand on the edge.
19. Climb up a crane or at least try to do it
20. The curator checks if you are trustworthy.
21. Have a talk "with a whale" (with another player like you or with a curator) in Skype.
22. Go to a roof and sit on the edge with your legs dangling.
23. Another task with a cipher.
24. Secret task.
25. Have a meeting with a "whale."
26. The curator tells you the date of your death and you have to accept it.
27. Wake up at 4:20 a.m. and go to rails (visit any railroad that you can find).
28. Don't talk to anyone all day.
29. Make a vow that "you're a whale."
30-49. Everyday you wake up at 4:20am, watch horror videos, listen to music that "they" send you, make 1 cut on your body per day, talk "to a whale."
50. Jump off a high building. Take your life.
(source from - higgypop.com)



On Todays Newspaper I read about the Master Mind behind this Game is --- Click here  (It will redirect to - /metro.co.uk )







Friday, 27 January 2017

Partition (MBR Vs GPT)




Partition Table - 

A partition table is a 64-byte data structure that provides basic information for a computer's operating system about the division of the hard disk drive (HDD) into primary partitions.

A data structure is an efficient way of organizing data. A partition is a division of a HDD into logically independent sections.


There are two ways of Partition

1- MBR Partition Table

2- GPT Partition Table







Advantages of GPT-

  • It is modern Partition Table
  • It has no limitation like MBR Partition Table
  • Robust Standard 
  • Windows 8, 8.1 and 10 run on GPT Partition 
  • GPR gradually replacing MBR
  • Helpful in DUAL BOOT 


 Check & Conversion - 

Steps -


♣  Evaluate CMD.
(Note- window + R, then type " cmd " and hit enter)

♣ Type " diskpart "

♣ Type " list disk "

♣ Type " select disk #
(Note - # is a number of your disk in which you want to perform operation. Please choose disk carefully, It will lead to data lose. )


























♣ Type "
clean "
(Note - This Commands delete your data )

♣ Type " convert gpt "  or " convert mbr "
(Note - GPT is recommended )

♣ Type " exit "





Saturday, 21 January 2017

Hidden Game On Google Chrome

Game on Google Chrome



Would you every seen, this image on the your Google Chrome Browser .





It is a small game , embedded in google chrome to play when ever net is not working properly or you have slow connection (that cannot able to load a web page)


How to play this Game.


♥ Disconnect your internet connection.

♥ Load any website, it won’t load since there is no internet. It will show an error message which will     have a dinosaur on the top.
♥ Press the “Space Bar” key and dinosaur will jump in the air, the game will start immediately. Use       space bar key to jump, down arrow key to bend the dinosaur. (It can also play with UP and Down       Key)


It’s a really very addictive game. 

Google Chrome also add extra sweetness by adding flying birds and after make a considerable score it goes into night mode that looks awesome.






Use this hacked version to play any time without needing to go offline -




By - Somesh Sah






Wednesday, 18 January 2017

Bitcoin




What is Bitcoin ?


◘ Bitcoin is digital currency (cryptocurrency) and a payment system

◘ Bitcoins aren’t printed, like our Rupee, Dollars or Euros

◘ It is created and held electronically (through nodes) and No one controls it.

◘ Bitcoin is invented by an unidentified programmer, or group of programmers, under the name of Satoshi Nakamoto.

◘ Bitcoin was introduced on 31 October 2008

◘ Bit coins are produced by people, and increasingly businesses, running computers all around the world, using software that solves mathematical problems.




Difference Between Bit coin and Normal Currency?


◘ It is not printed.

◘ Banks don't have power to control it.

◘ Bitcoin can be used to buy things electronically.

◘ No transaction fee imposed (By any bank)

◘ The system is peer to peer and transactions take place between users directly.




Characteristics of a Bitcoin ?


It is Anonymous - It can not linked with your any personal details.You also have multiple accounts to handle bitcoin.

Transaction fees - Banks charge Transaction fees whereas in Bitcoin no transaction charged.

It is fast - You can send money anywhere and it will arrive within a minutes.

It is decentralized -The bitcoin network is not controlled by one central authority.




Site to Buy and Sell Bitcoin

For more Information and stat dealing with bitcoin please visit bitcoin.org





By - Somesh Sah




WINDOWS SUBSYSTEM FOR LINUX

Microsoft partnered with Canonical (creator of Ubuntu) to bring Linux environment experience in Windows 10. Through Windows Subsystem F...