Welcome to Lots Of Hack. Read Our Educational posts about Hacking.

And don't forget to Subscribe to our newsletter to get notified about our new posts.


Following are the some reasons why you should Subscribe:-

  • Educational Posts.
  • Teaches you how to be safe againts Hackers.
  • Keeps you ahead of others.
  • It's Free !!

Monday, 15 May 2017

// // Leave a Comment

How to be safe from Ransomware?

Hello guys today I am going to tell you how to be safe from Ransomware malicious software which can block access to a computer system until ransom or in other words a sum of money is paid. WannaCry, also known as WanaCrypt0r 2.0, WannaCry and WCry, is a form of "ransomware". Also read what Ransomeware is by clicking here. Ways to keep yourself...
Read More
// // Leave a Comment

What is Ransomware?

Ransomeware is a type of malacious software designed to block access to a computer system until ransom or in other words a sum of money is paid. Simple ransomware may lock the system in a way which is not difficult for a knowledgeable person to reverse. More advanced malware encrypts the victim's files, making them inaccessible, and demands a ransom payment to decrypt them. The ransomware may also encrypt...
Read More

Thursday, 23 February 2017

// // Leave a Comment

Windows user account architecture

User account passwords are contained in the SAM in the Hexadecimal Format called Hashes. Once the Passwords converted in Hashes, you cannot convert back to the Clear Text. ...
Read More
// // Leave a Comment

What is Email Bombing?

Email Bombing is sending an Email message to a particular address at a specific victim site. In many instances, the messages will be large and constructed from meaningless data in an effort to consume additional system and network resources. Multiple accounts at the target site may be abused, increasing the denial of service impac...
Read More

Friday, 17 July 2015

// // Leave a Comment

How To Secure Your Email Account?

         Always configure a Secondary Email Address for the recovery purpose.      Properly configure the Security Question and Answer in the Email Account.         Do Not Open Emails from strangers.        Do Not Use any other’s computer to check your Email.         Take Care of the Phishing Links.  ...
Read More
// // Leave a Comment

How To Trace A Email?

§  Tracing an Email means locating the Original Sender and Getting to know the IP address of the network from which the Email was actually generated. §  To get the information about the sender of the Email we first must know the structure of the Email. §  As we all know the travelling of the Email. Each message has exactly one header, which is structured into fields. §  Each field has a name and a value. Header...
Read More

Thursday, 16 July 2015

// // Leave a Comment

Prevention against Phishing

Read all the Email Carefully and Check if the Sender is Original  Watch the Link Carefully before Clicking  Always check the URL in the Browser before Signing IN to your Account Always Login to Your Accounts after opening the Trusted Websites, not by Clicking in any other Website or Email.  ...
Read More