Pages

Tuesday, March 8, 2011

Secure yourself from Da Threat Of 'Vital information resource under Siege' (VIRUS)

The computer systems using operating systems rather than windows are generally considered more secure and safe. If one compares the number of viruses for windows and other O.S. windows will break any records.

Keeping in mind the Threats we Tech-da-hack team suggests few essentials to secure your system from viruses:

* Antivirus- It is very essential to install an antivirus program in your system.

* Downloads & email -Look if the ISP has provided you with a web based email access. Check your email and delete the spams. When it comes down to the attachments make sure that the attachment is from trusted source.

* Firewall- Install a trusted firewall to monitor the traffic connecting to your system and block malicious visitors.

*Anti-Spyware- Use an anti spyware on your computer in order to secure yourself from a collection of spywares which gets downloaded when you download certain files from few of the free sources. Note: Spywares are totally different from the viruses.

* Email programs- Its advised to use email programs other than Microsoft Outlook Express or Outlook Express as many viruses use the weakness of these programs.

Wednesday, March 2, 2011

Secure your Wireless world ...


Secure your Wireless Router Using WEP

The world is so advanced and fast the people can't afford to have any kind of time lag in communication. In this run wireless networks(Wi-Fi,Bluetooth,infrared etc.) play an essential role. In this article we the 'tech-da-hack' team is sharing way to secure your wi-fi using WEP.

A wireless network helps a home network to be more volatile. In a wireless network one dosent have to have to look for the ethernet cables ,instead he/she can access the internet or the systems in homenetwork using a wireless adaptor. We have to secure our network from the mallicious or unauthorized users.

In order to make our network secured we have to setup our router's WEP(Wireless Equivalence Privacy) settings.

In order to setup the router first we need a connection with it.

Once you are connected to the router:

* Open your browser and in address bar type the address of your routers access page.Some of the commen routers and their address are:

-> BSNL - 192.168.1.1

-> NETGEAR - 192.168.0.1

-> Airtel - 192.168.1.1

*enter the username and password.Some of the common username and passwords are:

Netgear

username-admin

password-password / 1234

Airtel

username -user

password-password

BSNL

username-admin

password-admin

*Now, look for a tab named "security" on the main router page. In the security select "WEP" as your security type ans choose a password for your network.

* Click on "apply changes" and sing out.

caution: Dont select the "restore factory default settings"

* You may need to reboot your computer in order to apply the settings.

* Now, whener anyone tries to connect to your router the router will ask for the password.

ENJOY THE SECURED WORLD OF BROWSING !!!

Monday, February 7, 2011

Dating site has facebook profiles

250,000 Facebook users have become the unwitting members of a "dating" site whose authors claim is a "work of art" and not set up to make money, but Facebook is expectedly not entertained by their stunt.
"Through special custom software we collected data from more than 1,000,000 Facebook users," explain the authors - Paolo Cirio, a media artist, and Alessandro Ludovico, editor in chief of Neural magazine.

"What we collected is their 'public data' - some of their personal data (name, country, Facebook groups they subscribe to) plus their main profile picture and a few friend relationships. We built a database with all this data, then began to analyze the pictures that showed smiling faces."


Once the database was ready, they used a face recognition algorithm to to "group" the faces into a few categories (see in the picture above) that describe how people define a person just by looking at their faces, without knowing anything about them.


"Face-to-facebook practically questions online privacy through one of the web's most iconic platforms," they write. "… we're not just making a sophisticated critical action against another giant online corporation, but we are also trying to formulate a simple hack that everybody can potentially use. Everybody can steal personal data and re-contextualize it in a completely unexpected context. And that shows, once more, how fragile and potentially manipulable the online environment actually is."


To all of those people who are now "members" of the dating site and don't want to be, the authors offer a way out: "Just write to us and we'll remove your data instantly. This website is a work of art and we're committed to avoiding any related annoyances."


Wired
reports that Facebook is looking into the possibility of taking legal action against Cirio and Ludovico.

The social network's terms of service on automated data collection
state that to do that, one must have Facebook's express written permission. "We're investigating this site and will take appropriate action," says Facebook's director of policy communications Barry Schnitt.

The dating site is currently unavailable, but it's impossible to tell whether because the duo took it down or because of some technical error.


One thing is for sure, though - they did manage to bring the public's attention to the fact that public available information is up for grabs and - hopefully - raise its awareness about the need to think twice about posting stuff online.

Source of the article:http://tinyurl.com/hnssec

Saturday, January 8, 2011

Bring back the dead~~!

The tech-da-hack team has realized that in this fast paced world, actions of people are sometimes quicker than their thinking. In the process of their quick decision making, they sometimes delete their important data....be it music,pictures,movies,or any valuable document!

So we decided to show our readers the path to two very good tools to undelete the files that they had deleted. But first we must understand that how a file is deleted by an operating system.

Whenever a user deletes a file,the OS(Operating System) just simply removes the link to that file. It means that the file is still present at its original physical location on the hard drive,but is no more visible to the user. If somehow this link is re-created,then the file can be accessed again!!

The files reside at their location only if that portion of the hard-disk has not been re-written by any other data. So softwares that perform such task, are more efficient for the most recently deleted files.

The following two tools are good for this purpose,and have been tested by our team:


1. Recuva(Free)

This is a free data recovery software, but they do accept donations if you wish to make one, so as to keep on providing such great softwares in the future.

Screenshot-1

Screenshot2


2. EASEUS Data Recovery(Free recovery of 1GB data)

This software is a free software which allows data recovery of total 1GB. After that you'll have to purchase the full version. This is simlar to trial software, but the criteria here is data limit.

Screenshot1



These are free(sometimes for limited data), easy to use and easily available tools. You just have to download either of them and install it on your computer.

For your convenience, you can click on the name of the software mentioned above, to download their setup.

After the installation of the software, you'll notice that the procedure of restoring back the deleted files is very easy. Open the software, select the file(s) type you want to recover and then follow the instruction carefully and thus you get back the file. These tools can undelete all type of files ranging from a mere KB(kilobyte) in size to even some GB(gigabyte). So basically you can undelete anything ranging from a text file to a movie which you accidentally or purposely deleted.

You can also use this to see what was there in your friend’s pendrive or what data did he transfer using that particular drive. Such tools are very important for cyber-forensic experts.


We hope you do enjoy undeleting your deleted files!!


Do let us know, in the comments, if this post has helped you in recovering any of your important file.

White House Attacked !!!


A simple Christmas Card e-mail from White House but it was an attack by
cyber criminals to steal sensitive data. The e-mail had a link which asked the recipients to click on it then it would download the Zues Malware. It is a known malware that was created years ago and used to steal passwords and other online credentials, primarily to get the Internet Banking Information .It has already been used to steal millions of dollars. In the case of White House it downloaded a second payload that is designed to steal documents from the recipient's computer thus, accessing Microsoft
Office and Excel files. Due to this the hackers were able to use the e-mail to collect sensitive law enforcement data but there is no proof that important data were stolen.
This e-mail raises the question on White House Cyber Security which is trying to increase their cyber security to the optimum level since Wikileaks
exposure of their sensitive data which showcased the world their truth.

Article posted by:Shipra Sahai

Wednesday, January 5, 2011

Android gets a Vulnerability!!

A new vulnerability in Android based web browser has been found which allows attackers to access the contents of files stored on the device's SD card, credentials stored in the browser, browser history, spy on your web transactions, even in encrypted.


The vulnerability is present in a code written by software company PacketVideo; contributed an open version of their core multimedia application to Android where it became the multimedia subsystem for the Android web browser. Google says that a fix will be released as soon as it will be available.

HTC Desire, Google Nexus One, Samsung Galaxy Tab etc. (even with Android 2.2) are vulnerable to this kind of attack.

Tips to protect you from hacking until Google issues a security patch:

1)Do not use the Android web browser. If this is not possible, only visit trusted sites and only over the T-Mobile network (avoid Wi-Fi). Use browser such as Opera Mobile; which prompts the user before downloading files.


2)Disable JavaScript in the browser.

Check for suspicious automatic downloads, which should be flagged in the notification area. This shouldn’t be happening completely in the background.


3)Unmounting the SD card.



We thank our loyal reader Shipra
Sahai for providing us with this article