Friday, 17 July 2015

// // Leave a Comment

How To Secure Your Email Account?

         Always configure a Secondary Email Address for the recovery purpose.      Properly configure the Security Question and Answer in the Email Account.         Do Not Open Emails from strangers.        Do Not Use any other’s computer to check your Email.         Take Care of the Phishing Links.  ...
Read More
// // Leave a Comment

How To Trace A Email?

§  Tracing an Email means locating the Original Sender and Getting to know the IP address of the network from which the Email was actually generated. §  To get the information about the sender of the Email we first must know the structure of the Email. §  As we all know the travelling of the Email. Each message has exactly one header, which is structured into fields. §  Each field has a name and a value. Header...
Read More

Thursday, 16 July 2015

// // Leave a Comment

Prevention against Phishing

Read all the Email Carefully and Check if the Sender is Original  Watch the Link Carefully before Clicking  Always check the URL in the Browser before Signing IN to your Account Always Login to Your Accounts after opening the Trusted Websites, not by Clicking in any other Website or Email.  ...
Read More
// // Leave a Comment

Phishing scams could be

Emails inviting you to join a Social Group, asking you to Login using your Username and Password.  Email saying that Your Bank Account is locked and Sign in to Your Account to Unlock IT.  Emails containing some Information of your Interest and asking you to Login to Your Account.  Any Email carrying a Link to Click and asking you to Login.   ...
Read More
// // Leave a Comment

What is Phishing?

The act of sending an Email to a user falsely claiming to be an established legitimate enterprise in an attempt to scam the user into surrendering private information that will be used for identity theft.  The Email directs the user to visit a Web site where they are asked to update personal information, such as passwords and credit card, social security, and bank account numbers, that the legitimate organization...
Read More
// // Leave a Comment

What is Email Spoofing?

Email spoofing is the forgery of an Email header so that the message appears to have originated from someone or somewhere other than the actual source. Distributors of spam often use spoofing in an attempt to get recipients to open, and possibly even respond to, their solicitations. Spoofing can be used legitimately.  There are so many ways to send the Fake Emails even without knowing the password of the Email ID. The...
Read More
// // Leave a Comment

Steps Performed By Hackers

1) Reconnaissance 2) Scanning 3) Gaining Access 4) Maintaining Access 5) Clearing Tracks OR • Performing Reconnaissance  • Scanning and Enumeration  • Gaining access  • Maintaining access and Placing Backdoors  • Covering tracks or Clearing Logs  Phase I: Reconnaissance  Reconnaissance can be described as the pre-attack phase and is a systematic attempt to locate, gather,...
Read More
// // 1 comment

Why Hackers Hack?

·       The main reason why Hackers hack is because they can hack. Hacking is a casual hobby for some Hackers — they just hack to see what they can hack and what they can’t hack, usually by testing their own systems. Many Hackers are the guys who get kicked out of corporate and government IT and security organizations. They try to bring down the status of the organization by attacking or stealing...
Read More
// // Leave a Comment

Types Of Hackers

Let’s see the categories of Hackers on the basis on their knowledge.  Coders  The Real Hackers are the Coders, the ones who revise the methods and create tools that are available in the market. Coders can find security holes and weaknesses in software to create their own exploits. These Hackers can use those exploits to develop fully patched and secure systems.   Coders are the programmers who have...
Read More
// // Leave a Comment

Difference Between Hacker and Cracker.

What Is the Difference Between a Hacker and a Cracker? Many articles have been written about the difference between Hackers and crackers, which attempt to correct public misconceptions about hacking. For many years, media has applied the word Hacker when it really means Cracker. So the public now believe that a Hacker is someone who breaks into computer systems and steal confidential data. This is very untrue and is an insult...
Read More
// // Leave a Comment

What is a Hacker?

·       Hacker is a word that has two meanings:  ·       Traditionally, a Hacker is someone who likes to play with Software or Electronic Systems. Hackers enjoy Exploring and Learning how Computer systems operate. They love discovering new ways to work electronically.    ·       Recently, Hacker has taken on a new meaning...
Read More