Always configure a Secondary Email Address for the recovery purpose.
Properly configure the Security Question and Answer in the Email
Account.
Do Not Open Emails from strangers.
Do Not Use any other’s computer to check your Email.
Take Care of the Phishing Links.
...
Friday, 17 July 2015
How To Trace A Email?

§ Tracing an Email means locating the Original Sender and Getting to
know the IP address of the network from which the Email was actually generated.
§ To get the information about the sender of the Email we first must
know the structure of the Email.
§ As we all know the travelling of the Email. Each message has
exactly one header, which is structured into fields.
§ Each field has a name and a value. Header...
Thursday, 16 July 2015
Prevention against Phishing

Read all the Email Carefully and Check if the Sender is Original
Watch the Link Carefully before Clicking
Always check the URL in the Browser before Signing IN to your
Account
Always Login to Your Accounts after opening the Trusted Websites,
not by Clicking in any other Website or Email. ...
Phishing scams could be

Emails inviting you to join a Social Group, asking you to Login
using your Username and Password.
Email saying that Your Bank Account is locked and Sign in to Your
Account to Unlock IT.
Emails containing some Information of your Interest and asking you
to Login to Your Account.
Any Email carrying a Link to Click and asking you to Login. ...
What is Phishing?

The act of sending an Email to a user falsely claiming to be an
established legitimate enterprise in an attempt to scam the user into
surrendering private information that will be used for identity theft.
The Email directs the user to visit a Web site where they are
asked to update personal information, such as passwords and credit card, social
security, and bank account numbers, that the legitimate organization...
What is Email Spoofing?
Email spoofing is the forgery of an Email header so that the
message appears to have originated from someone or somewhere other than the
actual source. Distributors of spam often use spoofing in an attempt to get
recipients to open, and possibly even respond to, their solicitations. Spoofing
can be used legitimately.
There are so many ways to send the Fake Emails even without
knowing the password of the Email ID. The...
Steps Performed By Hackers

1) Reconnaissance
2) Scanning
3) Gaining Access
4) Maintaining Access
5) Clearing Tracks
OR
• Performing Reconnaissance
• Scanning and Enumeration
• Gaining access
• Maintaining access and Placing Backdoors
• Covering tracks or Clearing Logs
Phase I:
Reconnaissance
Reconnaissance can be described as the pre-attack phase and is a
systematic attempt to locate, gather,...
Why Hackers Hack?

·
The main
reason why Hackers hack is because they can hack. Hacking is a casual hobby for
some Hackers — they just hack to see what they can hack and what they can’t
hack, usually by testing their own systems. Many Hackers are the guys who get
kicked out of corporate and government IT and security organizations. They try
to bring down the status of the organization by attacking or stealing...
Types Of Hackers

Let’s see
the categories of Hackers on the basis on their knowledge.
Coders
The Real Hackers are the Coders, the ones who revise the methods
and create tools that are available in the market. Coders can find security
holes and weaknesses in software to create their own exploits. These Hackers
can use those exploits to develop fully patched and secure systems.
Coders are the programmers who have...
Difference Between Hacker and Cracker.
What Is the
Difference Between a Hacker and a Cracker?
Many articles have been written about the difference between
Hackers and crackers, which attempt to correct public misconceptions about
hacking. For many years, media has applied the word Hacker when it really means
Cracker. So the public now believe that a Hacker is someone who breaks into
computer systems and steal confidential data. This is very untrue and is an
insult...
What is a Hacker?

·
Hacker is a
word that has two meanings:
·
Traditionally,
a Hacker is someone who likes to play with Software or Electronic Systems.
Hackers enjoy Exploring and Learning how Computer systems operate. They love
discovering new ways to work electronically.
·
Recently,
Hacker has taken on a new meaning...