Blog links

Showing posts with label internet. Show all posts
Showing posts with label internet. Show all posts

How to Protect Your Web Server From Hackers ?

I know creating a website is not simply about putting some pages and information online.
Ensuring the security of your website is a bigger and highly crucial task.

Most websites these days have a dedicated web server that gives them the leverage to grow and develop further. Basically the websites with a high volume of web traffic, a heavy database and complex application specifications require an exclusive web server. It is extremely important to hack proof your web server in order to protect your website and business.
There are a great number of hackers out there in the web world who are looking for opportunities to exploit your web server and cause serious damage. These hackers look to deface the websites with malicious content, use the scripts on the server to send out spam or phish out the personal sensitive information of the website users. Such attacks also attempt to tamper with parameters and gain access to confidential files or cross-site scripting or cookie poisoning to alter the customer data. These kinds of invasions can prove to be fatal for e-commerce and finance based websites. To prevent your web server from falling prey to such web attacks, here are some important recommendations and antihacking tips.You need to follow a two-pronged approach to safeguard your web server from any hackers.
The first layer is a firewall that exists to block any unwarranted unused Internet ports. A good firewall will use a rule based access system to allow only the legitimate users to enter and filter out as well as obstruct any malicious traffic from accessing the server. Also create strong passwords that use a combination of characters, numbers and special characters in order to keep the password hackers at bay.
The second element is to put in place an intrusion protection service. This is a more sophisticated approach to deal with hackers wherein you stop the illegitimate entry of users at the source itself. If a firewall works on the front line, an intrusion protection system works on the back end to deal with the enemies. This involves putting all the compromised hosts in the quarantine section and letting the genuine users move through efficiently. But setting up such an anti-hacking arrangement is only the first step. The hackers are moving fast and ahead with newer techniques to break into and sabotage the web servers. So, you need to continually update and monitor the filters, blacklists and all other aspects.

Read more

How to hack gmail password account easily



After a long time, Today i am posting a hacking trick that is related to gmail.Tric Plz Dont Misuse  This trick..This is For Educational Purpous Only..Almost all people who use internet have account on gmail and it is important for every one. So here i am using phising technique for hacking. Trick is simple and i have a easy way to do it.
  
How to hack gmail account password:
1. First of all download Gmail Phisher
2. The downloaded file contains:
gmail.html
log.txt
mail.php
3. Upload all of the files to any free webhosting site like:
www.drivehq.com
www.t35.com
www.yourfreehosting.net
www.esmartstart.com
www.110mb.com
4. Once you have uploaded the files in the directory, send this phisher link (gmail.html) i.e: “http://nameofyoursite.com/gmail.html” to your victim and make him login to his Gmail account using your sent Phisher.
5. Once he logs in to his Gmail account using Phisher, all his typed Gmail id and password is stored in “log.txt”.
6. Now, open log.txt to get hacked Gmail id and password as shown.
That’s it, very simple. Now you have your victim’s Gmail id and password hacked.


How it Works?
When a user types a Username and Password in the the text box,The info is sent to “login.php” which acts as a password logger and redirects the page to “LoginFrame2.htm” which shows “There has been a temporary error Please Try Again” in it . So when the person clicks on try again it redirects to the actual URL so that the victim does not know that yoursite is a fake site and gets his gmail.com password hacked.

Read more

Hack WI-Fi internet to use full bandwidth in college or Schools


Hacking The Internet Connection of the shared computers in Colleges/ Cyber Cafe / schools etc. and gain the complete Access of internet with full speed. Every one wants a fast internet connection so that he can surf or download any thing from the internet but no one knows how to do this here is the solution you can do it with the help of netcut. You just have to simply install this software and you are done.Netcut stands for Network Cut. NetCut is software where we can control the connection to each 



computer/laptop in a WIFI network/LAN. However, this software can be used to retrieve internet bandwidth from other computers in a LAN/WIFI. Shared.The only computer which is allowed by you can get a network connection other-wise no one will be able to surf the internet. You can download this software from the internet free of cost.Here is the link for this download NETCUT


Step 1:- you will need the NetCut 2.0 software so download it
Step2:- Unzip the downloaded Software and install it On Your System.
Step3:- Open the Software and you will get the following screen.



Step 4:- Select all or any One of the IP Addresses Seen on the Screen EXCEPT the first Two IP because they are Your PC's IP Address.
Step 5:- After Selecting the IP address Press the Cut off Button and the internet connection will be cut off within few Seconds.


Step 6:- To Resume or Start the Internet again Press the Resume Button and the internet will again start working in the shared computers.

Read more

Free live cd distros for Pentest, Recovery& Forensics

Penetration testing is the security-oriented probing of a computer system or network to seek out vulnerabilities that an attacker could exploit.
A distro is a unix-like operating system comprising software components such as the Linux kernel, the GNU toolchain, and assorted free and open source software.
I've listed 20 top distros used for Pentest, recovery & forensics .

Read more

How To Hacking internet web cameras

first go to google search website through www.google.com and then in the search box type:(without quotes)

“inurl:/view/index.shtml” and press enter

then you will get list on web cameras working on net,,,

note:: if u type the ip address of the computer in place of inurl then the web camera of that computer can be hacked

example:: you can type in google search as

207.111.165.30/view/index.shtml to view webcamera used at that ip address

the other google search links which makes web cameras publicly viewable are:

inurl:/view.shtml
intitle:”Live View / - AXIS” | inurl:view/view.shtml^
inurl:ViewerFrame?Mode=
inurl:ViewerFrame?Mode=Refresh
inurl:axis-cgi/jpg
inurl:axis-cgi/mjpg (motion-JPEG)

Read more

7 Ways to Improve Your Blog Loading Speed


Loading time of your website or blog is one of the important factors influencing search engine optimization, which when is too slow could take the reader away from your website and move onto the next, thus indirectly affecting your page ranking as well. Some of the factors affecting the loading speed are the presence of Java Scripts and the lack of use of web-optimized images.

Read more

How to Deal with Laptop Over Heating


A laptop is an extensive investment that requires a great care from your side so that it keeps on running for years. Many laptops (almost 90%) face the problem of overheating. This overheating can cause the laptop to show abnormal behaviour thereby causing the internal machinery to fail. Today we will be discussing the techniques and methods that are available today so that your laptop runs smoothly for many years to come.

Read more

7 ways to increase Torrent Speed


The use of Bit Torrent is an efficient way to transfer files of just about any size quickly and efficiently. How this works is by breaking the huge files into smaller pieces and is from one or many of the different sources. This is one of the best ways to transfer bulky files quickly even when you are using a low bandwidth connection. There are many more things that you can do with Bit Torrent, but here we are going to discuss how to make this work much faster.

Read more

How To Disable The New Photo Viewer On Facebook


Facebook recently unveiled its new photo viewing application that has not gone well with the users. The new interface has a black lite box in the background in which the photo gets displayed. The website did not provide any means for the users to disable it but here are some tweaks and tricks that you can perform so that you can view the photos in the classic viewer. In response to the feedback that the company has received the Facebook might be thinking to shutting it down for ever. At present I had come to know about three possible ways where we can shut down this feature:

Read more

Check Whether Your PC is Male or Female


Today I am going to discuss about an amazing trick using which you can easily find out whether your pc is male or female. To find out whether your computer is male or female just follow the steps given below.
Step 1 : First of all open Notepad.

Read more

Top 10 Cool Google Tricks


Today I am going to discuss about 10 really cool and funny google tricks.
google tricks

Read more

How to Block Unwanted Emails


Emails are an important part of our lives. So here we tell you how to block those unwanted emails from reaching your mailbox. Depending on the type of the email service you use, there are different ways to block them. We will be considering only the popular ones. We would discuss how to block unwanted emails in Gmail, Yahoo and Hotmail.

Read more

How To Block Facebook Applications


Are you regularly bombarded with unusual application requests from your friends? These requests make you install them or allow access before you can use them. Would you like to have a better control on these requests and permanently block some of them?

Read more

Some Useful Tips To Maintain a Virus Free Computer


Are you fed up with the number of viruses infecting your computer? Then here in this interesting post you will find me telling you about how the various worms, viruses and spywares find their way into your precious computer. Most of the time, they are harmful probably aiming to steal your personal information. In this case, we are more concerned about those that could cause your computer to hang up. Follow these six easy to do tip that can free your computer from viruses.
virus free
1. E-mails:
This is the most of the common way through which spywares, worms, Trojans and viruses find their easy way into your computer. When you have your own private emails, increase the privacy settings and never ever open unsolicited and unknown emails, as they may be the source of the much awaiting harms that can damage your whole computer. To avoid this harming your computer, use very good anti-spam software. Never click links in e-mails if you are not sure what are they.
2. USB thumb or pen drives:
This is another and most common source that could affect your computer in a number of ways. The best option to avoid this from happening is by performing a virus scan before copying any data onto your computer and another small tip is not to double click the pen drive for opening. Use right click to open or explore the files in the drive before opening is the best alternative.
3. Use of MS Outlook:
It is not known that MS Outlook could be a source and the best way to spread and hack into your computer, unless you have a real time antivirus programs running. Alternatives to MS Outlook will include the use Windows Mail (which can even identify spam emails from known sources), Pegasus of thunderbird, or web based programs like hotmail or Yahoo.
4. Internet or World Wide Web:
Even a basic computer user knows that internet is the best way to spread viruses like pandemic and are the main sources of malicious programs like viruses, worms, Trojans, etc., which can range up to 80 percent of the worldwide transfer during surfing of the web. By following some of the best surfing habits this danger could be waded off, which will include by not clicking the pop-up windows or by using pop-up blockers.
5. Search Engines:
Most of us surf the web using mostly with the help of search engines, and one of the best ways either to prevent from visiting malicious website from being listed in your search or to point them out when listed, is by installing some powerful scanners like AVG Link scanner, which is a free ware. Even Mozilla says if a site will harm your computer or not.
6. Use a good antivirus:
If you are looking for one solution that can do most of the jobs mentioned so far, it is also good for preventing from someone else stealing your personal information like online identity, credit card information, password stealing and many other such activities. So always use a powerful antivirus.
Comments are always appreciated!!

Read more
2leep.com