In my previous post entitled " BackTrack - Advanced Penetration Tools for I.T Pro ", I showed in detailed the threat of how black hat hackers steal WiFi Password and also gave some tips in order to avoid of being compromised. Also I mentioned in my post entitled " How to protect your Sensitive Account Info of getting HACKED- Phishing Method ( Part 1 ), of how a hacker clever technique of using identical website to trap a user to gather useful sensitive account credentials. Now in this post I'll show you how hackers steal your social account password like Facebook, Twitter and other social site account, your email or even your banking account online log-in credentials. Some of you were experienced this kind of threat where you cannot access your email, social account or there is a transaction in your banking or online money processor like Paypal that you didn't know or remember that you actually did the transaction. Nowadays black hat hackers are very very clever, so what should we do in order to safeguard our privacy while we are on the Internet ?. Let's first know of how this threat actually happened in real world. Sometimes a reader might going to believe if they see the real threat in detail before they actually believe that it's really existing. So Let's move on and make some experiment.
Wednesday, July 9, 2014
Thursday, July 3, 2014
BackTrack - Advanced Penetration Testing Tools for I.T Pro
As an I.T enthusiast whether it may be a geek, techy or whatever they call an I.T person, it's a must that we understand and know the possible threat that lies ahead in our Computer and our Network System, especially for PC - Network Administrator who are given an important task to manage and secure the PC-Network premises. As such, local and remote threats must be mitigate for the overall productivity. As Lao Tzu said " In order for you to know your enemy, You must become your enemy." This explain that we must know the footprints of our enemy and know their moves, for us to know the task of securing our PC and Network. Right knowledge and Right tools must become handy and aid us in this aspect of performing security threat mitigation. Although there are many tools, one can start for not paying much just to have a great penetration tools. One powerful tool is BackTrack- a free Penetration tools developed under Linux kernel system. In this post I will show you how to perform a penetration testing in Wi-Fi, as this technology is susceptible to many kind of attacks. So Lets move on....
Wednesday, June 11, 2014
How to Check and Monitor Computer CPU Temperature
Image Source : www.jkcomputersystems.com |
CPU or Central Processing Unit is sometimes called the " brain " of our computer. Also called Processor because it handles all the instructions of a program and perform logical, arithmetic and input/output working in the system. It is one of the most important hardware or component in computer operation, without it probably there is no computer. Today CPU are much more faster and many companies like Intel and AMD has a continuous research and development to improve the technology to make computers a supercomputer that think like humans as " Artificial Intelligence". With the advancement of our technology of course there is also some factors to consider in order to prevent damage in any components in our computer to prolong it's life and boost it's reliability and productivity. Computers is our companion, so taking care of it is a must. We all aware that the faster the speed of computer, the better. But as the speed increases, the temperature of a device also increases, and if the temperature continue to increase beyond its limit, the performance of a device is much affected and there is a possibility that it might break down. So let's be aware for that.
Monday, June 9, 2014
How to Remote Control PC - A Legit Way
Remote Control ? Yes your right ! It's just like using your TV remote control or any remote when accessing your home appliances. But remote control a PC goes another way. It allows you to control a one PC using another computer, and use it as if you are facing your own computer. You can control the mouse, the keyboard, everything. But you may think that is some sort of hacking ? If you hear the word hacking, I know it makes a bad impression to you. Not knowing that hacking has a good side also, like for example if you are working in a big companies, every PC Administrator has the right to see what you are doing in your PC, in short you are being monitored, for the sake of your companies productivity. And for example you need an online technical assistance for your computer, and the technical support have it fixed just doing via online or the so called Remote Desktop Assistance. Hacking is good if DONE in a LEGITIMATE WAY. Now I will show you How to Remote PC and take advantage of many good aspect to boost your productivity.
Image Source : www.teamviewer.com
Wednesday, June 4, 2014
BUBBLEWS - Write your story and EARN Money
If you are new seeking online opportunity , then it is one of the best way to start your career. Bubblews is my third program " Work at Home / Earn Money Online, that I added into my list, aside from Humanatic and Blogging. I only picked with what I think, is more valuable and worth to work for. Internet has a vast unlimited opportunity and I've found out that it's really worth giving my best effort to start a new career here. Learning is fun and you will discover something that even in your home, there's an opportunity to earn enough and sustain your family needs. Let's move on and I'll show you what Bubblews program is all about.
Monday, June 2, 2014
How to protect your " Sensitive Account " Info of getting HACKED - Phishing Method ( Part 2 )
In my previous post, How to protect your " Sensitive Account " Info of getting HACKED - Phishing Method ( Part 1 ), you see how black hat hackers, try to steal your sensitive account information and how they do it in a nice, well crafted, genius way. You also learned one simple idea of how to protect yourself from this fraudulent act. You also learned how phishing is disguise as a official looking copy cat site. Now I'll try to detail out and elaborate more of how this technique come to you as a bait. I'll also try to give you more information of how to fight Phishing and prevent you of being the next victim.
How to protect your " Sensitive Account " Info of getting HACKED- Phishing Method ( Part 1 )
Online banking, Online Money Processor like Paypal etc., are widely used now because, you can access it anytime, anywhere and with just a click you'll be able see the status of your valuable account, and even withdraw your money or transfer it to any account, with just simple click. What about if that's easy, simple click also can harm your sensitive account and with a blink of an eye, your hard earned money will be gone. Many are not still aware, Internet is just like our surroundings, there's a good guy and also a bad guy. In our home it's common to secure our house and even install security gadgets in order to protect it from the bad guys. Just like our home we must also educate ourselves and install security measures in order for us to protect our " sensitive account information " when browsing the Internet and dealing with transaction online.
Image Source : www.searchenginegenie.com
Saturday, May 31, 2014
Spying on You through your Webcam
Sounds creepy ? but it's TRUE. Many still didn't know yet that this is happening. You didn't even know that there is someone who is watching you over your webcam. The truth is thousands of webcam users get hack and if you didn't know " How to protect Yourself ", maybe the chance of getting hacked is higher. So for in this topic I'll be explaining some of the best precautions and necessary steps to secure your webcam.
How to Protect USB Drive with Password
I still remember when floppy disk is so popular during the time that computing comes out as one of the promising technology. Floppy disk is portable and light storage device used to transport data between any computers or to any device that support it. But now USB thumb drive has emerged like floppy disk before, it is use to read and write data between any device that has USB port. A wide variety of USB drive are now in the market and the storage capacity is increasing making it so easy to store any valuable data or files in a single portable device. But one disadvantage of it is that it can be easily be lost because of its size and portability. So how about if you have important and confidential data that are stored and suddenly you lost it ?
Thursday, May 29, 2014
How to Recover / Restore deleted files
How about if you accidentally deleted one of your precious files in your multimedia storage ( a USB drive, in your PC or even in your memory card and other removable devices ) and you don't have a "backup", that's disgusting isn't it ? It seems that there is no other option and you think it will gone forever. But don't worry we are living in a Digital World where everything problems we encounter pertaining to our technology has a possible solution. Then you try to have a research and found out that there are many free data / files recovery software available that may help you, but you didn't know which one of them, or you may choose one but there are lot of confusion you have in your mind, you didn't know how to use it, or even software installation is a bit puzzle to you. During the rest of this tutorial I will guide you step by step in every possible way.
Wednesday, May 28, 2014
Boost Computer Performance in Easy Ways
image source : webrifer.com |
Monday, May 26, 2014
Ways to Improve Home WiFi
Slow Internet, Intermittent WiFi Signal or No Signal at all, Full Signal but still WiFi performance is poor. This is sometimes the most common problem I encounter when troubleshooting WiFi at home. Most home today are now equipped with this kind of technology. More and more households are willing to have this in their home for fast and easy connection to the Internet. But at times there are lot of problems occur that may be solve in a simplest way and stay away from extra expenses for fixing the trouble by a qualified technician. So here are the Ways for Improving WiFi connectivity in your home...
Saturday, May 24, 2014
dSploit - " The most complete and advanced IT security professional toolkit on Android "
" In order for you to know your ENEMY,
you must become your ENEMY. "
-Sun Tzu ( Art of War )
For every IT Professionals, experts/geeks, it's one of the handy and probably most handy tools in terms of Network Analysis, Penetration Tools and Network Security Assessments on a mobile device. Since I've been in Computer - Network industry, I've came across at this tools and test some functions of how this tools behave and perform in terms of capabilities to penetrate Network Security. This tool is for educational purpose only , it can be use for further studies of how network security can be exploited and take some necessary measures to secure them. This is for beginners and experts / geeks who wish to have advance knowledge dealing with Network Analysis and Security, and also notify the readers, Internet-Computer users that there are advance tools that can be use against them for whatever purpose.
Friday, May 23, 2014
Play your favorite Android Games, Apps in your Computer or Laptop
Android is now very popular surpassing other Mobile Operating System and maybe one of the reason why the giant and very popular NOKIA is now loosing the battle among other Android pioneer companies, like Google NEXUS, SAMSUNG, SONY, HTC - where this companies incorporate it early in their devices. When I first experienced Android Technology, I was amazed how this technology can perform such high-tech functions, the applications are widely distributed and most of all GAMES are easy to find and with at ease to install, unlike in the previous years of Mobile Computing.With further research I found out that Android is an open source system, meaning it can be distributed and develop freely, by companies who want to develop or customized it. And is based in the widely distributed Open Source Powerful LINUX Operating System. Even my two year old son can operate Android device, download GAMES, install and uninstall it, watch Youtube. How powerful this invention making high-tech device even my 2 year old son can able to operate it.
How will you know if someone is connected to your Wi-Fi illegally
In the latter years of Analog Technology where Cellular is the King, there was a time when "War Driving" has emerged. It is kind of hacking terminology where hackers try to find a hole in security of a Cellular device particularly cellphone users- that black hat hackers tried to exploit through sniffing, and tried to stole important data or manipulate data being received or transmitted. But today we are in what we called " Internet Revolution ", where everyone is connected, whether through cellphone, laptop or any other device. War Driving has also emerged to this date, finding vulnerable Wi-fi that a " black hat " hackers may exploit. In my previous post where I elaborate some security measures, that it has a possible way to deter or prevent your connections from being hacked, but sometimes black hat hacker are so clever that despite of the security they were still able to evade them using some advance technique. Today I will show you " How to detect if someone is using your Wi-Fi illegally ".
Tuesday, May 20, 2014
Humanatic - A Legit Money Making Online
" How to Make Money Online ", I arrived at Humanatic. It was first tried by my wife. Initially, I'm not interested because you need to work at night, United States time zone, coz the company is base in the U.S. It takes hours and graveyard working just to earn a cents of a dollar, in short, it is hard.
Monday, May 19, 2014
Securing Wi-Fi Connections
Nowadays, Wi-Fi has been significantly increasing in every household.It seems that it has become part of our everyday life.There are many Internet Service Providers (ISP) offering instant Internet with Wi-Fi Ready Connections. But company installer failed to educate the users of the possibility of being hacked.These Wi-Fi ready connections arrived at your home with pre-configured settings leaving the user unaware that this set-up is less secure and vulnerable to hacking.
Sunday, May 4, 2014
How to Check if Someone is using your Facebook account ?
FACEBOOK, the big name in social networking, stands out to be the number 1 among the players, billions of users worldwide. And daily, thousands of new users is subscribing, making Facebook the fast or even incredibly fast growing social network site in the world. Conceived by Mark Zuckerberg, and his fellows as a way to connect students, now it's connecting the world and became the official site ? to connect every families, government, schools, business and other institutions. But being a number 1 is a massive task for Facebook to protect every users specially when it comes to privacy and security. In reality thousands of Facebook account has been put into compromised making Facebook also the number 1 target of blackhat hackers.That's why Facebook is developing new way to strengthen their security in order to protect every subscriber including me. But how well you know about Facebook Security features ?
Friday, May 2, 2014
Facebook - Advance Way to Secure your Account
In my previous post, I outlined some of Facebook Security in order for you to detect or " Check if someone is using your Facebook ". Like what I've said before, security in our online life is sometimes the most neglected or overlook part, not knowing that INTERNET is just like our home that needs protection or security measures to stay away from trouble. You can control your protection as you may wish using some of the advance security features of Facebook. First line of defense is important and You have the power to enforce that. Now we're taking advantage of that Facebook Advance Security, I will show you how....
Image Source : iag.me
Subscribe to:
Posts (Atom)