Posted in
Labels:
Cyber Security,
Face IT,
Facebook
|
6:47:00 PM
DNS spoofing is a term used when a DNS server accepts and uses incorrect information from a host that has no authority giving that information. DNS spoofing is in fact malicious cache poisoning where forged data is placed in the cache of the name servers.If both the victim and attacker are on the same network, an attacker can use a DNS spoofing attack and change the original Facebook.com page to his own fake page and hence can get access to victims Facebook account.
Posted in
Labels:
Cyber Security,
Face IT,
Facebook
|
6:18:00 PM
In computer science, session hijacking is the exploitation of a valid computer session—sometimes also called a session key—to gain unauthorized access to information or services in a computer system. In particular, it is used to refer to the theft of a magic cookie used to authenticate a user to a remote server.Typically, SideJacking is most common on sites that require authentication through a username and password, such as online Web mail accounts as well as social networking sites. SideJacking works only if the site catches a non-SSL cookie, so any Web site that uses SSL exclusively would be safe from SideJackers.
Posted in
Labels:
Cyber Security,
Face IT,
Facebook
|
12:25:00 AM
So we discussed about keylogging ! Now lets look into its prevention!
Posted in
Labels:
Cyber Security,
Face IT,
Facebook
|
12:18:00 AM
A keylogger is a type of surveillance software (considered to be either software or spyware) that has the capability to record every keystroke you make to a log file, usually encrypted. A keylogger recorder can record instant messages, e-mail, and any information you type at any time using your keyboard. The log file created by the keylogger can then be sent to a specified receiver.
Posted in
Labels:
Cyber Security,
Face IT,
Facebook
|
9:16:00 AM
E-mail spoofing can assume a variety of forms. Basically, a spoofed e-mail appears to be sent from one source when it actually was sent from another source entirely. However, any replies to a spoofed e-mail go directly to the legitimate e-mail account causing confidential customer information to be captured. It is extremely difficult to detect a spoofed e-mail address, at first glance.Spoofing when combined with Phishing can be the most destructive hacking technique!
Posted in
Labels:
Cyber Security,
Face IT,
Facebook
|
7:24:00 PM
One action that you can take is report
the fake profile. To report you can just go to the FB page of the fake
profile, click on Report/Abuse this profile. You will get a new
dialogue box, where you need to check the “Report the person”. You
will be asked to mention the reason. In the first place, select “Fake
Profile”. Secondly select the “Impersonated profile”, and you also need
to post the URL of your original profile .The FB team then should get
back to you in next 24 hrs.
Posted in
Labels:
Cyber Security,
Face IT,
Facebook
|
7:23:00 PM
Phishing is the prime attack method of majority of hackers!Phishing is 100% avoidable!Phishing is the most commonly used method to
hack Facebook. The
most widely used technique in phishing is the use of Fake Login Pages,
also known as spoofed pages. These fake login pages resemble the
original login pages of sites likeYahoo , Gmail, MySpace etc. The victim
is fooled to believe the fake facebook page to be the real one and
enter his/her password. But once the user attempts to login through
these pages, his/her facebook login details are stolen away.
>>I have explained the step by step phishing process in my post below:
Posted in
Labels:
Cyber Security,
Face IT,
Facebook
|
7:18:00 PM
Wikipedia defines Phishing as:-
"Phishing is a way of attempting to acquire information such as usernames, passwords, and credit card details by masquerading as a trustworthy entity in an electronic communication." It's still one of the best methods out there for hacking Facebook accounts.In the simplest of all phishing attacks a hacker creates a fake login page which exactly looks like the real Facebook page and then some how makes the victim to login into that page. Once he logins through the fake page the victims "Email Address" and "Password" is stored in to a text file, which could be downloaded by the Hacker.
"Disclaimer: Hacking is a Cyber Crime.Cyber crimes can involve criminal activities that are traditional in nature, such as theft, fraud, forgery, defamation and mischief, all of which are subject to the Indian Penal Code.Please don't misuse this article!"
Posted in
Labels:
Cyber Security,
Events,
Face IT,
Facebook
|
6:02:00 PM
More than ever these days the cyber war is on its paramount.Internet has become an open battle ground! Believe me!No one is safe! There is nothing called a safe internet as there can be only a safer internet!Same is the case of social networking sites as well.Better prepare to defend yourself online than be a victim.So decide :- '
FACE IT' or regret!!!!
Posted in
Labels:
Cyber Security
|
9:36:00 AM
The Stop Online Piracy Act (SOPA) is a United States bill introduced by U.S. Representative Lamar S. Smith (R-TX) to expand the ability of U.S. law enforcement to fight online trafficking in copyrighted intellectual property and counterfeit goods. Provisions include the requesting of court orders to bar advertising networks and payment facilities from conducting business with infringing websites, and search engines from linking to the sites, and court orders requiring Internet service providers to block access to the sites. The law would expand existing criminal laws to include unauthorized streaming of copyright material, imposing a maximum penalty of five years in prison. A similar bill in the Senate is called the PROTECT IP Act (PIPA). Here we the Technology Bay is providing you the full form of this bill!
Posted in
Labels:
Facebook
|
9:26:00 AM
You can try out what we say in this post for fun.This trick tells you how to find a Profile ID or Page ID which is often hidden by a user name or page name.
Posted in
Labels:
Facebook
|
8:02:00 AM
It is a quite famous trick.I'm posting it for people who aren't still aware about it!
Posted in
Labels:
Google,
internet
|
7:31:00 AM
Every one would love to have a custom domain.Batman would like to own a domain like help@batman.com.So do you. It's a plus point for online businesses.Here in this post I'll explain how to make a custom email with a registered domain.
Posted in
Labels:
internet,
Other
|
7:22:00 PM
File Sharing Religion!!!!
Yes! Indeed a file sharing religion that believes that File-sharing is a sacred religious ceremony .The followers of this file sharing religion are called Kopimists from copy me, the root of which is a phrase in the Bible.The establishment of the church of Kopimism comes amid a backdrop of governmental zero-tolerance towards piracy.Now the act of copying becomes a religious right of Kopimists and it hard to take actions against piracy.
Posted in
Labels:
Google
|
3:45:00 AM
Spice up your search with Dinoogle search.
Posted in
Labels:
Facebook,
Poor mans technology,
Script,
Te-Bay Apps
|
3:14:00 AM
|
It is often used to create attractive statuses on Social networking sites like Facebook or Twitter. Upside Down Text can also be used to create strong passwords (Though not supported by most of the websites). The beauty of Upside Down Text is that the flipped characters are actually text, not images. You can use our upside down text nearly everywhere - Facebook, Twitter, Microsoft Word, YouTube, MSN, AIM, Gmail, on forums, or blogs.
Under Text Effects, deselect the "Upside Down Effect (Flips text)" option. Your text will then be reversed, without the upside down effect being applied. So "I am a geek " will become " keeg a ma I".
|