Posts

How to enable parents control in Windows 7.

How to enable parents control in window 7. Parental Controls in Windows 7 Parental controls in Windows 7 has lot of improvements and gives parents a lot of power to monitor restrict what their children do. Settings which can be maintained includes > Time Limits for a User > Game Restriction according to Game rating, content and Title. > Allow or block specific Programs. > Web Filtering Windows 7 Parental Controls is a feature in Windows 7 that can specify which PC games a particular user can play and which programs they can use. You can even specify the times when a particular user is allowed to use the PC. Here you can Control when a computer can be used by that particular account. Windows Live Family Safety is a free download that works with Windows 7 and gives you tools to manage and monitor what a particular user do on the Web. For example, Web filtering and contact management help you manage whom a particular user can talk to on

How to convert YouTube video in audio format ?

HOW TO CONVERT YOUTUBE VIDEO TO AUDIO FORMAT HOW TO CONVERT YOUTUBE VIDEO TO AUDIO FORMAT. Steps to convert video to audio. Copy the link Search on google ""mp3 converter"" Click on the website name ytmp3.cc Just simply paste the link on the bar Then click OK Click on mp3 if you want to download audio or click mp4 if you want to click video. Second way Click on URL add ss before ssyoutube.com For example:- https://m. ss youtube.com/watch?v=4yum1sGG86s 3rd Method Copy URL Search online video converter or type OVC in search bar. https://www.onlinevideoconverter.com/en Paste the link on the bar Click on The format in which you want to download.There is awide variety of audio and video format.

Customization of Windows 7 and Vista .

Customization in Windows 7 and Vista Customize Windows 7 Power Button Action Windows 7 User Account Control displays less warning than UAC in Vista, and lets you customize UAC according to your need and preference between security and a less annoying desktop experience. UAC prompts in Windows 7 are not as much as in Vista as very few programs require elevation, and Administrator can adjust these UAC prompts. Go to Start > Control Panel > User Accounts > Change User Account Control SettingsHere you can select when to notify or bring the UAC prompt. There are 4 levels of security which includes: > Always Notify > Notify me only when programs try to make changes to my computer > Notify me only when programs try to make changes to my computer (do not dim my desktop) > Never Notify Select them according to your balance between security and desktop experience and adjust the level of UAC prompt. Any change to the level of the UAC will

Social Engeneering

Social Engeneering Social Engeneering Social engineering, in the context of information security, refers to psychological manipulation of people into performing actions or divulging confidential information. A type of confidence trick for the purpose of information gathering, fraud, or system access, it differs from a traditional con in that it is often one of many steps in a more complex fraud scheme. The term social engineering as an act of psychological manipulation is also associated with the social sciences, but its usage has caught on among computer and information security professionals All social engineering techniques are based on specific attributes of human decision-making known as cognitive biases. These biases, sometimes called bugs in the human hardware, are exploited in various combinations to create attack techniques, some of which are listed. The attacks used in social engineering can be used to steal employees confidential information

Snooping

Snooping Snooping This is when someone looks through your files in the hopes of finding something interesting whether it is electronic or on paper. In the case of physical snooping people might inspect your dumpster, recycling bins, or even your file cabinets; they can look under your keyboard for post-It-notes, or look for scraps of paper tracked to your bulletin board. Computer snooping on the other hand, involves someone searching through your electronic files trying to find something interesting.

Remote File Inclusion

Remote File Inclusion Remote File Inclusion RFI tricks existing software on your webpage to access malicious code elsewhere on the internet and to execute it with privileges. In your logs this may look like: /Display.php?ArticleID= Remotesite where http:// is the address where the malicious code is located.

Ransomware

Ransomware Ransomware What it is: Ransomware is a type of malware that restricts access to your computer or your files and displays a message that demands payment in order for the restriction to be removed. The two most common means of infection appear to be phishing emails that contain malicious attachments and website pop-up advertisements. What it can do: There are two common types of ransomware: Lockscreen ransomware: displays an image that prevents you from accessing your computer. Encryption ransomware: encrypts files on your systems hard drive and sometimes on shared network drives, USB drives, external hard drives, and even some cloud storage drives, preventing you from opening them Ransomware will display a notification stating that your computer or data have been locked and demanding a payment be made for you to regain access. Sometimes the notification states that authorities have detected illegal activity on your computer, and that the

Copy Command Prompt Output

Copy Command Prompt Output Copy Command Prompt Output Windows Version tells the exact Build of OS and service Pack you are using. You can simply check it by using Winver Command. Open Run Dialog box by using Win+R and type “Winver” there without quotes. This will bring a Windows which has OS details such as Windows details. Alternatively you can also use the Command prompt to find the information. Type “Winver” in command prompt. It would display all details in command prompt.P.S. Don‟t go by Screenshot details of this one. I am using Windows 7 Ultimate RTM @ my desktop and would be using the same once i fix up some issues with my Dell Studio.

Junk Mail or Spam Mail

Junk Mail or Spam Mail Junk Mail or Spam Mail You get an email from someone you don’t know, or an impersonal one from your bank – that includes an attachment, a link or a form to complete. The email may have the look of the bank or organization but you were not expecting anything (or maybe you were). Typically they say “You were not home when we tried to deliver a parcel” Or “your account has been blocked”. There are also the ones we’ve come to recognize as scams like “You have won $5,300,000.”. But they are all the same – they want you to click the link or open the attachment. Never open any links or attachments from someone you don’t know. Some of these are blocked by anti-virus programs but many are not. If you think the email might be genuine, phone and ask the sender using a phone number you find elsewhere (not from the email). This is the most common method used to attack individuals. A lot of such junk mail gets stopped before yo

Interception

Interception Interception This can be either an active or passive process. In a networked environment, a passive interception might involve someone who routinely monitors network traffic. Active interception might include putting a computer system between sender and receiver to capture information as it is sent. From the perspective of interception, this process is covert. The last thing a person on an intercept mission wants is to be discovered. Intercept missions can occur for years without the knowledge of the intercept parties.

Insider attack

Insider Attack Insider attack An insider attack involves someone from the inside, such as a disgruntled employee, attacking the network Insider attacks can be malicious or no malicious. Malicious insiders intentionally eavesdrop, steal, or damage information; use information in a fraudulent manner; or deny access to other authorized users. No malicious attacks typically result from carelessness, lack of knowledge, or intentional circumvention of security for such reasons as performing a task

Create new instance of an Application in Windows 7 Super Taskbar

Create new instance of an Application in Windows 7 Super Taskbar Create new instance of an Application in Windows 7 Super Taskbar Windows 7 command prompt can be used with a clip utility that can used to copy the contents of the command prompt output into clipboard. It is very much similar like the way tee command works in UNIX. Tee command pipelines the output of a command in UNIX to another file. In Windows 7 we can use the „Clip‟ utility to copy the text of command prompt. Adding clip next to any command copy the output. Syntax for Clipping the Command prompt output: “Command | clip” .You need to type the command followed by Clip in the Command prompt. e.g. > f:dir | clip will copy the output of the command in clipboard; though it won‟t be displayed .You can further paste the “clapboarded text” to notepad or WordPad.

DEFACING

DEFACING Defacing Defacement is a substitution of a web page (or part of a page) by hackers. Defacement is the online equivalent of graffiti.

Password Attack

Password Attack Password Attack Password attack An attacker tries to crack the passwords stored in a network account database or a password-protected file. There are three major types of password attacks: a dictionary attack, a brute-force attack, and a hybrid attack. A dictionary attack uses a word list file, which is a list of potential passwords. A brute-force attack is when the attacker tries every possible combination of characters.

Backdoor Attacks

Backdoor Attacks Backdoor Attacks This can have two different meanings, the original term back door referred to troubleshooting and developer hooks into systems. During the development of a complicated operating system orapplication , programmers add back doors or maintenance hooks. These back doors allow them to examine operations inside the code while the program is running. The second type of back door refers to gaining access to a network and inserting a program or utility that creates an entrance for an attacker. The program may allow a certain user to log in without a password or gain administrative privileges. A number of tools exist to create a back door attack such as, Back Orifice (Which has been updated to work with windows server 2003 as well as erlier versions), Subseven,NetBus, and NetDevil. There are many more. Fortunately, most anti-virus software will recognize these attacks.

Targeted Attack

Targeted Attack Targeted Attack Emails can be sent using any “from” email address so it’s possible for someone to send me an email that appears to come from (e.g.) Joe and from a cobourginternet.com address that doesn’t exist. In most cases, they will guess the name of the person or use a generic name like “reception”. If they work at it, they can find out the name of a worker at your company and use their name. So now you are getting an email from someone you know at a legitimate looking address. There are security measures (DKIM) that are now more common to make sure that the email does in fact come from the address it claims to be from and these are implemented on all Cobourg Internet sites as well as major email suppliers like Gmail and Yahoo. (But maybe the clever Chinese can spoof this too!) You might even reply to the sender by email saying “Did you send this – is it OK to open?” They reply saying “yes”. Then once an innocent looking docum

WiFi eavesdropping

WiFi eavesdropping WiFi eavesdropping WiFi eavesdropping is another method used by cyber criminals to capture personal information. What it is: Virtual “listening in” on information thats shared over an unsecure (not encrypted) WiFi network. What it can do: Potentially access your computer with the right equipment. Steal your personal information including logins and passwords.

SQL Injection

SQL INJECTION SQL Injection SQLI uses parameters to run SQL statements via your webpages. The SQL statements could be used to dump the contents of a database or to view data such as User IDs, or to manipulate data in the database. This is one of the more common attacks.

Copy Command Prompt Output

Copy Command Prompt Output Copy Command Prompt Output Windows Version tells the exact Build of OS and service Pack you are using. You can simply check it by using Winver Command. Open Run Dialog box by using Win+R and type “Winver” there without quotes. This will bring a Windows which has OS details such as Windows details. Alternatively you can also use the Command prompt to find the information. Type “Winver” in command prompt. It would display all details in command prompt.P.S. Don‟t go by Screenshot details of this one. I am using Windows 7 Ultimate RTM @ my desktop and would be using the same once i fix up some issues with my Dell Studio.

Customize the Windows 7 log-on screen

Customize the Windows 7 log-on screen Customize the Windows 7 log-on screen In windows 7 Taskbar instance of an application can easily be created by using Win + Number Key. Here number key signifies the position of the Application in the Taskbar. If you press Windows + 1, it will create a new instance of the first icon in the task bar. In the taskbar Shown here it will open an instance of Internet Explorer while Win+5 open Windows media Player, Win+7 to Windows Live writer and so on. Now that‟s when i wish there must be Double digit Keys as well in Keyboard.

Close-in attack

Close-in attack Close-in attack A close-in attack involves someone attempting to get physically close to network components, data, and systems in order to learn more about a network Close-in attacks consist of regular individuals attaining close physical proximity to networks, systems, or facilities for the purpose of modifying, gathering, or denying access to information. Close physical proximity is achieved through surreptitious entry into the network, open access, or both. One popular form of close in attack is social engineering in a social engineering attack, the attacker compromises the network or system through social interaction with a person, through an e-mail message or phone. Various tricks can be used by the individual to revealing information about the security of company. The information that the victim reveals to the hacker would most likely be used in a subsequent attack to gain unauthorized access to a system or network.

Assign Keyboard Shortcuts for Programs

Assign Keyboard Shortcuts for Programs Assign Keyboard Shortcuts for Programs Application can be assigned a shortcut key in Windows 7. The application would launch when the combo of keys is pressed which you entered as the Shortcut Key for that application. To create Shortcut key for any application in Windows 7: Right-click the program icon and select Properties. Select the Shortcut tab Click in Shortcut key textbox Enter the keyboard shortcut for that program. Press OK to exit. Use the Keyboard shortcut combo to launch the application. Like the way i have used a combo of keys Ctrl+Alt+C to launch calculator application other applications can also be launched using Shortcut keys.

Application based Volume Mixer

Application based Volume Mixer Application based Volume Mixer Volume Mixer in Windows 7, not just show device volume but also lists all applications that are currently running and producing the audio. You can control the audio of any of the application from there on. So when you are having more than one application that is producing sound you can control from here and stop it as well. @ the time when i snipped the screen, there were few applications running on my system, Yahoo Messenger, Google Talk, few media players Windows Media Player, VLC Media player, QuickTime and one video clip was also being played in Windows Live photo gallery (yes it can play Video as well apart from Images).

Access Jump Lists with the Left Mouse Button

Access Jump Lists with the Left Mouse Button Access Jump Lists with the Left Mouse Button Jump Lists are a new feature in Windows 7 that shows recently used files for a particular application or related tasks to an application. Jumplists can be accessed by right clicking an application icon in Windows 7 taskbar. Although it can be accessed by left clicking an application icon and while holding the mouse click dragging the icon upwards. i.e. Right click and drag the application icon upwards to access jumplists in Windows 7 using Left Mouse button.The more you drag icon upwards the lesser transparency of Jumplist becomes. In above screenshot, case 1 shows when Jumplist invoked through right click and application icon is not dragged much upwards while case 2 shows solid Jumplist when application icon is dragged upwards completely.

Directory Traversal Local File Inclusion

Directory Traversal Local File Inclusion Directory Traversal Local File Inclusion Directory traversal is one of the most common attacks occurring today. It causes your web application to access a file or program located in another directory that should not be accessible or exposed publicly. LFI is similar to Remote File Inclusion (RFI) except the file is located on the same server. In this case, the attack is used to gain access to sensitive data such as password files etc.

DISTRIBUTED ATTACK

DISTRIBUTED ATTACK DISTRIBUTED ATTACK A distributed attack requires that the adversary introduce code, such as a Trojan horse or back-door program, to a “trusted” component or software that will later be distributed to many other companies and users Distribution attacks focus on the malicious modification of hardware or software at the factory or during distribution. These attacks introduce malicious code such as a back door to a product to gain unauthorized access to information or to a system function at a later date.

ZERO DAY EXPLOITS

ZERO DAY EXPLOITS ZERO DAY EXPLOITS For some hackers, news of a new software patch being released is like Christmas coming early. If they look hard enough, vulnerabilities may sometimes be found in new software patches; vulnerabilities that they may exploit before software vendors can discover and patch. Zero-day exploits are a lot more common than you might think. Last year alone, 3 big zero-day exploits named Heartbleed, Shellshock and POODLE were discovered, along with numerous other vulnerabilities in common software like Internet Explorer. Most recently, hackers found a zero-day exploit in Adobe’s Flash Player, another common software found on many computers worldwide. Keeping your system safe from the looming threat of zero-day exploits is not easy; it requires you to constantly be in the know about new exploits, and quick action to fix those exploits. Of course, sometimes the threat of vulnerabilities could come built into the very computer t

Cross Site Scripting

Cross Site Scripting Cross Site Scripting XSS OR Cross Site Scripting targets the scripts embedded in a webpage that are executed client-side on your browser such as Javascript, VBScript, Activex, HTML, Flash etc. The injected code/scripts can then be used to send malicious code to the user or to steal information from the user rather than from the website or database itself. A lot of websites are vulnerable to this type of hacking.

Botnets

BOTNETS Botnets Botnets are not commonly used for hacking Facebook accounts, because of its high setup costs. They are used to carry more advanced attacks. A Botnet is basically a collection of compromised computer. The infection process is same as the key logging, however a Botnet gives you additional options for carrying out attacks with the compromised computer. Some of the most popular Botnets include Spyeye and Zeus. What is a Botnet ? The word Botnet is formed from the words ‘robot’ and ‘network’. Cybercriminals use special Trojan viruses to breach the security of several users’ computers, take control of each computer and organise all of the infected machines into a network of ‘bots’ that the criminal can remotely manage. Bots are one of the most sophisticated and popular types of cybercrime today. They allow hackers to take control of many computers at a time, and turn them into 'zombie' computers, which operate as part of a powerful 'botnet

SESSION HIJACKING

SESSION HIJACKING In computer science, session hijacking, sometimes also known as cookie hijacking is the exploitation of a valid computer session—sometimes also called a session key—to gain unauthorized access to information or services in a computer system. In particular, it is used to refer to the theft of a magic cookie used to authenticate a user to a remote server. It has particular relevance to web developers, as the HTTP cookies used to maintain a session on many web sites can be easily stolen by an attacker using an intermediary computer or with access to the saved cookies on the victims computer (see HTTP cookie theft). A popular method is using source-routed IP packets. This allows an attacker at point B on the network to participate in a conversation between A and C by encouraging the IP packets to pass through Bs machine. If source-routing is turned off, the attacker can use blind hijacking, whereby it guesses the responses of the tw

Keystroke logging or Keylogging

Keystroke logging or Keylogging Keystroke logging, often referred to as keylogging or keyboard capturing, is the action of recording (logging) the keys struck on a keyboard, typically covertly, so that the person using the keyboard is unaware that their actions are being monitored. Keylogging can also be used to study human–computer interaction. Numerous keylogging methods exist: they range from hardware and software-based approaches to acoustic analysis. What is Keylogger? A keylogger is a type of surveillance software (considered to be either software or spyware) that has the capability to record every keystroke you make to a log file, usually encrypted. A keylogger recorder can record instant messages, e-mail, and any information you type at any time using your keyboard. The log file created by the keylogger can then be sent to a specified receiver. Some keylogger programs will also record any e-mail addresses you use and Web site URLsyou visit.

What is Footprinting ?

What is footprinting ? What is Footprinting ? The systematic footprinting of an organization will allow attackers to create a complete profile of an organization’s security posture. By using a combination of tools and tech- niques, attackers can take an unknown quantity (Widget Company’s Internet connec- tion) and reduce it to a specific range of domain names, network blocks, and individual IP addresses of systems directly connected to the Internet. While there are many types of footprinting techniques, they are primarily aimed at discovering information related to these technologies: Internet, intranet, remote access, and extranet. Table 1-1 depicts these technologies and the critical information an attacker will try to identify. Why Is Footprinting Necessary? Footprinting is necessary to systematically and methodically ensure that all pieces of in- formation related to the aforementioned technologies are identified. Without a sound methodology f

How to Data Recover Files from Corrupted USB and Memory Card

How to Data Recover Files from Corrupted USB and Memory Card Step 1 First download M3 Data Recovery software and install in your Windows or Mac. Step 2 Once your download complete after connect your Pen Drive or Memory Card to your computer. Step 3 Now run the program and click Data Recovery module. Step 4 Choose your pen drive or memory card and then click Next> to search your lost data. Step 5 M3 Data Recovery will analyze every sector on the selected volume and then find the lost files. Step 6 When the scan finishes, you will be able to preview found files. Then select files you want to recover and save them. What is c programming ? The C programming language is a structure oriented programming language, developed at Bell Laboratories in 1972 by Dennis Ritchie C programming language features were derived from an earlier language called “B” (Basic Combined Programming Language – BCPL) C language was invented for implementing UNIX operating system In 1978, Dennis Ritchie and Br

What is Script and Macro Viruses ?

What is Script and Macro Viruses ? Script viruses (sometimes called macro viruses) generally travel embedded in email and office automation documents, although they can be found in web pages as well. Old fashioned program viruses are usually implemented in executable system code, whereas script viruses are usually written in a powerful high-level language that is compiled and run on the fly. They often have sophisticated functionality and direct interfaces to high level applications such as word processing, spreadsheet, email, and web programs, and can wreak considerable havoc. Since they first surfaced in office automation programs, they are sometimes also called "macro" viruses. Script viruses can also propagate through IRC protocols. How To Remove Write Protection on a USB To remove the write protection, simply open your Start menu, and click on Run. Type in regedit and press Enter. This will open the registry editor. The next step is to navigate to the following path