B6wNHLcaGxP0QgCgNpxIr67hBZ4
Showing posts with label Hackers. Show all posts
Showing posts with label Hackers. Show all posts

Angry IP Scanner 3.0 Beta 5

Scanning of computer networks (searching for addresses with known properties) is a practice that is often used by both network administrators and crackers. Although it is widely accepted that activity of the latter is often illegal, most of the time they depend on exactly the same tools that can be used for perfectly legitimate network administration – just like a kitchen knife that can be used maliciously.

Thanks to the recent activity of mass-media on the subject (that popularized the wrong term for a cracker – a 'hacker'), nowadays every educated person more or less understands the reasons and goals that stand behind malicious cracking: curiosity, stealing of information, making damage, showing self-importance to the world, etc. But why do administrators need to scan their own networks?

There are plenty of answers: to check status of computers and various network devices (are they up or down), find spare addresses in statically-addressed networks, monitor the usage of server-type or P2P applications, make inventory of available hardware and software, check for recently discovered holes in order to patch them, and much more things that are even difficult to foresee.


Angry IP Scanner is widely-used open-source and multi-platform network scanner. As a rule, almost all such programs are open-source, because they are developed with the collaboration of many people without having any commercial goals. Secure networks are possible only with the help of open-source systems and tools, possibly reviewed by thousands of independent experts and hackers alike.

Certainly, there are other network scanners in existence (especially single-host port scanners), however, most of them are not cross-platform, are too simple and do not offer the same level of extensibility and user-friendliness as Angry IP Scanner. The program's target audience are network administrators, consultants, developers, who all use the tool every day and therefore have advanced requirements for usability, configurability, and extensibility. However, Angry IP Scanner aims to be very friendly to novice users as well.

You can download Angry IP Scanner here:

Angry IP Scanner

Or read more here


Posted on 08:49 / 0 comments / Read More

Tools For Hide IP

1. Stealthy
For  Google Chrome : http://adf.ly/4PVqR
For Firefox : http://adf.ly/4PVsa

2. Platinum Hide IP 

3. Super Hide IP 

4. Hotspot Shield

5. Ultrasurf

6. Hide My Ass!
Posted on 08:33 / 0 comments / Read More

Real Hide IP - Hide Your IP to Protect Your Privacy


Key Features

  • Hide Your Real IP Address
    Be assigned fake IP addresses from different countries to conceal your real IP.
  • Anonymous Web Surfing
    Surf anonymously with fake IP, whenever you want to.
  • Protect Your Identity Against Hackers
    Protect you from hackers and identity thieves who will be tricked by your fake IP.
  • Un-ban Yourself from Forums or Restricted Websites
    Real Hide IP allows you to access any forums, blogs or websites that have ever banned you.
  • Prevent Websites from Tracking Your Online Activities
    Hide your real IP when you are surfing the Internet to prevent you from being tracked by websites.

    Download From here

How It Works?

smallhowitworks.jpg
Posted on 08:13 / 0 comments / Read More

How to Block Unwanted Emails

Do you want to  block emails from your ex wife/husband? Do you want to block those annoying offers and newsletters that reach your inbox? Well here is a way to block all those unwanted and annoying emails that you do not want to see or read! With this trick you can block individual email address or the whole domain from which you do not want the emails to come from. Here are the step-by-step instructions to do this.
For Gmail
1. Login to your account
2. At the top-right corner, click on Settings
3. Under Settings, click on Filters
4. You’ll now see an option “Create a new filter“, click on it
5. Now in the From field enter the email address from which you do not want to receive the emails
For ex. you may enter john@gmail .com in the From field to block all incoming emails from this address. However if you want to block the whole domain then use the following syntax:*@xyz.com. Now all the incoming emails from the domain xyz.com will be blocked.
6. Click on Next Step, select the action you’d like to take on the blocked emails. You may select the option Delete it so that the blocked email is moved to trash. To unblock the email, all you need to do is just delete the filter that you’ve created.
For Yahoo
1. Login to your account
2. At the top-right corner, click on Options
3. A drop down menu appears, now click on More options
4. In the left panel select the option Filters and click on create or edit filters
5. Now click on Add
6. In the next screen, give a name to your filter and in the From header field enter the email address that you want to block.
Fox ex. xyz@gmail.com or if you want to block an entire domain then just enter @xyz.com. Dont enter *@xyz.com. Select the option Move the message to: Trash and click on Save Changes.
For Hotmail
1. Login to your account
2. At the top-right corner, click on Options
3. A drop down menu appears, now click on More options
4. Click on Safe and blocked senders link under Junk e-mail
5. Now click on Blocked senders
6. Type in the email address that you want to block under blocked e-mail address or domain field.
For ex. Enter xyz@yahoo.com to block the individual email address or just enter xyz.com to block the entire domain.
That’s it. You no longer receive those annoying emails in your inbox. Keep your inbox clean and tidy. I hope this post helps. pass your comments!
Posted on 07:54 / 0 comments / Read More

How to Protect an Email Account from being Hacked

Today in this post I’ll teach you how to protect your email account from being hacked. Nowadays I get a lot of emails where most of the people say “My Email account is hacked please help…”. Now one question which arises in our mind is:”Is it so easy to hack an email accountOR Is it so difficult to protect an email account from being hacked?”. The single answer to these two questions is “Absolutely NOT!”. It is neither easy to hack an email nor difficult to protect an email account from bieng hacked.
 
If this is the case, then what is the reason for many people to loose their accounts?
 
The answer is very simple. They don’t know how to protect themselves from being hacked! In fact most of the people who loose their email accounts are not the victims of hacking but the victims of Trapping. They loose their passwords not because they are hacked by some expert hackers but they are fooled to such an extent that they themselves give away their password.
Are you confused? If so continue reading and you’ll come to know…
Now I’ll mention some of the most commonly used online scams which fool people and make them loose their passwords. I’ll also mention how to protect your email account from these scams.
1. WEBSITE SPOOFING
Website spoofing is the act of creating a website, with the intention of misleading the readers. The website will be created by a different person or organisation (Other than the original)especially for the purposes of cheating. Normally, the website will adopt the design of the target website and sometimes has a similar URL.
For example a Spoofed Website of Yahoo.com appears exactly same as Yahoo Website. So most of the people believe that it is the original site and loose their passwords. The main intention of spoofed websites is to fool users and take away their passwords. For this,the spoofed sites offer fake login pages. These fake login pagesresemble the original login pages of sites like Yahoo,Gmail,Orkut etc. Since it resemble’s the original login page people beleive that it is true and give away their username and passwords by trying to login to their accounts.
Solution:
  • Never try to login/access your email account from the sites other than the original site.
  • Always type the URL of the site in the address bar to get into the site.Never click on the hyperlink to enter the site.
2. BY USING KEYLOGGERS
The other commonly used method to steal password is by using a Keylogger. A Keylogger is nothing but a spyware. The detailed description of keylogger and it’s usage is discussed in the post Hacking an email account. If you read this post you’ll come to know that it is too easy to steal the password using a keylogger program. If you just access your email account from a computer installed with keylogger, you definitely loose your password. This is because the keylogger records each and every keystroke that you type.
Solution:
Protecting yourselves from a keylogger scam is very easy.Just install a good anti-spyware program and update it regularly. This keeps your PC secure from a keylogger. Also there is a program called Anti-keylogger which is specially designed to detect and remove keyloggers. You can use this program to detect some stealth keyloggers which remain undetected by many anti-spyware programs.

3. ACCESSING YOUR EMAIL ACCOUNT FROM CYBER CAFES
Do you access your email from cyber cafes?  Then definitely you are under the risk of loosing your password.In fact many people loose their email account in cyber cafes. For the owner of the cyber cafe it’s just a cakewalk to steal your password. For this he just need’s to install a keylogger on his computers. So when you login to your email account from this PC, you give away your password to the cafe owner. Also there are many Remote Administration Tools (RATs) which can be used to monitor your browsing activities in real time.
This doesn’t mean that you should never use cyber cafes for browsing the internet. I know, not all the cyber cafe owners will be so wicked but it is recommended not to use cafes for accessing confidential information. If it comes to the matter of security never trust anyone, not even your friend. I always use my own PC to login to my accounts to ensure safety.
So with this I conclude my post and assume that I have helped my readers to protect their email accounts from being hacked. Please pass your comments…
 
 
Posted on 07:40 / 0 comments / Read More

How to Make Invisible Password Protected Folder

How to create a Password Protected Folder

Step-1: Create a new folder (Right-click -> New -> Folder) and give it any name of your choice. For instance I name it as ABC.

Step-2: Now in this folder place all the important files, documents or any folders that you want to password protect.
Step-3: Now Right-click on this folder (ABC) and select the option Send To ->Compressed (zipped) Folder.
Step-4: Now a new compressed zipped folder gets created next this folder (ABC) with the same name.
Step-5: Double-click on this compressed zipped folder and you should see your original folder (ABC) here.
Step-6: Now goto the File menu and select the option Add a password.
ie: File -> Add a password
Now a small window will pop up and here you can set your desired password. Once the password is set, the folder will ask for the password every time it is opened. Thus you have now created the password protected folder.

How to make it Invisible
Step-1: Now Right-click on this password protected folder and select Properties.
Step-2: At the bottom select the option Hidden and press OK. Now your folder gets invisible (hidden).
Step-3: In order to unhide this folder go to My Computer – >Tools -> Folder options. Switch to View tab, scroll down and under Hidden files and folders you’ll see the following two options
  • Do not show hidden files and folders
  • Show hidden files and folders
Now select the second option and press OK. Now the invisible folder becomes visible in it’s location. To access it you need the password. To make it invisible again repeat step -1 through step-3 and select the first option and click OK. Now the folder becomes invisible once again.
I hope you like this post. Pass your comments!! Cheers
Posted on 07:21 / 0 comments / Read More

How To Find or Get IP Address

Hello friends, today i will explain you how to get IP address of any computer remotely. Using some very basic tricks we can find the IP address of any remote computer and then you can start your further hacking into the remote system like port scanning and finding vulnerabilities to enter in to the system and hack it. There are several methods to get an IP address of the victim but i will share few and specially the best one's that can tell you IP address in just few clicks and also all are free methods and special thing is about it is all are manual methods that means you did not require any tool.
how to find ip address of another computer remotely
How to find or get Ip address of somebody else remotely
4 ways to get the IP address of the Victim or another Computer:

1. Using PHP notification Script
2. Using Blogs and Websites
3. Using Read Notify service
4. Sniffing during Gmail and Yahoo chat sessions

As we are here to learn concepts so i will first explain what is an IP address and what's its importance. So friends very basic question What is an IP address? Why its important for hackers and security professionals?

What is an IP address? 
Basically IP address (Internet Protocol address) is a unique numerical value that is assigned to any computer or printer on a computer network that uses an internet protocol for communication purpose. Protocol is basically rules( for Network its rules for communication). 
IP address serves for two basic purposes:
1. Host or network interface identification
2. Location Addressing

For exploring more about IP addressing read on wikipedia.


How to Find IP address of another computer?


1. Using PHP notification Script
Using this Notification script you can get the IP address in just seconds. Steps of using this PHP script:
a. Download the PHP notify script and extract files.
b. Now you will get two files IP.html and index.php . You need to upload these two files to any free web hosting server.
Example: i used www.my3gb.com to upload these two files. Create an account there and upload these two files there as shown below.
IP address finder script
Upload Files to free web hosting server
c. Now you will need to send the link of index.php to the victim whose password you want to get. to get the link click on index.php shown in above snapshot. Now a new window will open copy the link in the address bar and send to the victim whose IP address you want.
d. Now when the victim opens the above link nothing will open but his Ip address is written into the ip.html file. So open the ip.html file to get his IP address.
e. That's all this method... I hope you liked it.

2. Using Blogs and Websites
This method is for those who have their blogs or websites. Normal users can also do this as blog is free to make. Make a new blog and use any stats service like histats or any other stats widget. Just add a new widget and put histats code there and save template. And send the link of your blog to your friend and get his IP.
That's only.

3. Using Read Notify service
This is an email based service. Steps to use Read Notify service:
a. First open the Read Notify website : RCPT
b. Now register on this website and then it will send you confirmation mail. Verify your account.
c. Once your account is activated. 
Do the following steps use this service:
  1. Compose your email just like you usually would in your own email or web email program
  2. Type:   .readnotify.com   on the end of your recipients email address (don't worry, that gets removed before your recipients receive the email). Like this: shiviskingg@gmail.com.readnotify.com  
  3. Send your email
Some things to remember:
  • don't send to and from the same computer
  • if your email program 'auto-completes' email addresses from your address book, you'll need to keep typing over the top of the auto-completed one to add the .readnotify.com
  • if you are cc-ing your email to other readers, you must add tracking to all of them 

4.  Sniffing Yahoo and Gmail Chat sessions
With the help of Sniffers like ethereal, wireshark etc we can sniff the Gmail, and yahoo chat sessions while we are chatiing to any our friend and extract the IP address from there. I will explain this trick in detail in my next article as its a long article in itself.


5. Bonus Method for Online Gamers
We can also get the IP address from online games like counter strike, age of empires in Game ranger etc.. Many counter strike servers use amx mode. Just view which people are connecting and whats their IP addess as plugins show the IP address of people connecting to the game server.  If you have more access to counter strike server you can use status command in console. Just go to console and type "status"(without quotes) and press enter there you can see all players details his steam ID and much more depending upon server.

Now you have IP address but what you can do with an IP address. Ahhaah everything, that i will explain in my next article.



Posted on 20:06 / 0 comments / Read More

Facebook Smileys

Hello Friends, today i am going to share some awesome hidden emotions and smileys of Facebook. Facebook offers lots of emotions and smileys but hard luck users does not know codes to use these smileys and emotions. So friends if these exists then how to use them in general chats. Most people doesn't know about these codes so they go for external software's. 



Note: Most software's that provide free emoticons and smileys contains malware like Trojans, spywares, bots etc. These tools steal your private and confidential data and browsing practices and exploit them to achieve their targets. So friends don't use any such software that can put your system on risk. Its always better to find manual ways to do these things like i always force you to do that don't be script kiddie's (dependent on software's and tools). Be professional and find manual ways to do things and specially hacking and cracking... Otherwise you will expose yourself to hackers.
I have discovered several Hidden Smiley and Emotions on Facebook and Found the below codes... Enjoy with latest Emoticons and smileys...I have also added several special shapes that might be helpful to you.. Enjoy and have fun with your friends..


Hidden Smileys and Emoticons:


Emoticons Shortcut Key Description
42 red facebook chat emoticon :42: 42 Red Number FaceBook Chat Emoticon NEW!!
facebook chat emoticon angel O:)    or        O:-) Angel FaceBook Chat Emoticon
facebook chat emoticon confused o.O    or        O.o Confused FaceBook Chat Emoticon
facebook chat emoticon cry :'( Cry / Tears Eye FaceBook Chat Emoticon
facebook chat emoticon curly lips :3 Curly Lips Facebook Emoticon / cute / cat-like
facebook chat emoticon devil 3:)    or        3:-) Devil / Satan / Vampire FaceBook Chat Emoticon
facebook chat emoticon frown :-(   or   :( or  :[   or  =( Frown / Sad FaceBook Chat Emoticon
Facebook Chat Emoticon Gasp :-O  or   :O  or   :-o  or :o Gasp / Surprise FaceBook Chat Emoticon
facebook chat emoticon glasses 8-) or  8) or  B-) or  B) Glasses / Blue Glasses FaceBook Chat Emoticon
facebook chat emoticon grin :-D  or  :D  or  =D Grin Facebook Chat Emoticon (Big Smile)
facebook chat emoticon grumpy >:(  or  >:-( Grumpy FaceBook Chat Emoticon
facebook chat emoticon heart <3 Heart / Love FaceBook Chat Emoticon
facebook chat emoticon kiki ^_^ Kiki FaceBook Chat Emoticon
facebook chat emoticon kiss :-*      or       :* Kiss Facebook Chat Emoticon
facebook chat emoticon pacman :v Pacman Facebook Chat Emoticon
facebook chat emoticon penguin <(") Penguin Facebook Chat Emoticon
facebook chat emoticon chris putnam :putnam: Putnam (Chris Putnam) Facebook Chat Emoticon
facebook chat emoticon robot :|] Robot Facebook Chat Emoticon
facebook chat emoticon shark (^^^) Shark FaceBook Chat Emoticon
facebook chat emoticon smile :-)  or :) or  :] or  =) Smile Facebook Chat Emoticon
facebook chat emoticon squint -_- Squint FaceBook Chat Emoticon
facebook chat emoticon sun glasses 8-|  or 8| or  B-|  or  B| Sun / Black Glasses FaceBook Chat Emoticon
facebook chat emoticon tongue :-P  or :P  or :-p or  :p or  =P Tongue FaceBook Chat Emoticon
facebook chat emoticon unsure :/ :-/ : :- Unsure Facebook Chat Emoticon
facebook chat emoticon upset >:O   or >:-O   or  >:o  or >:-o Upset FaceBook Chat Emoticon
facebook chat emoticon wink ;-)     or       ;) Wink FaceBook Chat Emoticon

 

Posted on 19:34 / 0 comments / Read More

Facebook Password Hacking Techniques

Hi friends, I have already posted two posts on How to hack Facebook account password, first using the Keyloggers and other is using Phishing on my other website isoftdl. Today I am going to reveal all the methods used by hackers to hack a Facebook account password.

If you know these methods then you can protect yourself from getting hacked and save your Facebook account password.

Today I will discuss all general methods to Hack Facebook Account Password that all hackers usually use to hack your Facebook account.
1. Facebook Phishing Attack
2. Hacking Facebook account password remotely using Keyloggers and RAT's
3. By hacking the primary email address that user has used for creating Facebook account.
4. Social Engineering or simply Guessing your friends Password.
Facebook Phishing Attack: 

I am explaining this method first because its the most easiest and also the most popular method for hacking Facebook password. You can also search on Google the various famous Facebook hacking methods and you will find Phishing technique on the top always. And I am explaining the methods according to their popularity.
Now you want to know which is my favorite method for Hacking Facebook account passwords and i will undoubtedly tell its simply PHISHING.
I will recommend my users to read this post for knowing how to hack Facebook using Phishing as i have explained it in detail here on my other website:
How to hack Facebook accounts or Passwords using Phishing
If you want latest Facebook phisher then subscribe my Hacking tricks and mail me privately or post your email below in comments. I will provide you within a day, Now why i am not providing it directly, if i provide directly then Facebook will block it again like the previous one.

Hacking Facebook account password remotely using Keyloggers and RAT's
Aaw... Best method for advanced Hackers. And my second favorite too. Its popularity is little but lower than Phishing only because it involves you to download hack tool and then create your keylogger and send it to victim which is a lengthy process and also unsecured too as you don't aware that the keylogger that you downloading is himself contain some spyware or simply a keylogger attached with it. Keylogging becomes more easy if you have physical access to victim computer as only thing you have to do is install a keylogger and direct it to your destination so that it will send all recorded keystrokes to pointed destination. What a keylogger does is it records the keystrokes into a log file and then you can use these logs to get required Facebook password and thus can hack Facebook password.

I have written a complete article on How to hack Facebook accounts remotely using Keyloggers, so i will recommend you to go through that if you want to learn this technique in detail, so read this article on my other website:
How to Hack Facebook accounts or Passwords remotely using Keyloggers

Now if you need latest Fully Undetectable Keylogger, then subscribe my hacking tricks and mail me privately or post ur email ID below in comments on which you want to get the download link.


Hacking the Primary Email address
If Facebook hacker or any specific Keylogger, by some means, hacks your primary Gmail or yahoo account which you are using as primary email address, then this information account can easily hack your Facebook password using "Forgot password" trick. The Hacker will simply ask Facebook to send password to the primary email address and ask Facebook administrators to send the reset email to your primary email address- which is already hacked. Thus, your Facebook account password will be reset and it will also be hacked !

So, always remember to protect your primary email address that you have used to create Facebook account and try to keep unknown or useless mail id as your primary email address in Facebook.

Social Engineering or Guessing Passwords

This method sounds to be pretty not working at beginning. Even I was neglecting this way for a long time . But, once, I thought of using it against my friend on Facebook and amazingly what happened that i guessed his Facebook password very easily by this method. I think many of you might be knowing how what this social engineering, For novice hackers, Social engineering is method of retrieving password or Guessing the password or answer of security question simply be hacking some information about the victim or simply gathering his information from his own Facebook and other social networking profiles where most of users provide their critical information just for fashion and doesn't know its consequences. 
You have to be very careful while using this as victim must not be aware of your intention. Just ask him cautiously using your logic.

Some Common passwords that you can try on your friends are :
1. Their mobile number or their girlfriend or boyfriend mobile number. (always try his previous or old mobile number as they are not as much as fool that they appears)
2. Their Girlfriend or boyfriend names or their own names concatenating with their Girlfriend or boyfriend names.
3. Date of births
4. Their favorite movie names , cartoon character names or favorite music band names or simply the hero names like batman,dark knight, Superman,Godzilla, Spartacus and much more..
5. Most important now most website ask that password should be alphanumeric now what users do they just adds 1,2,3 in their normal passwords and some more smart guys adds !,@,# in their passwords and amazingly all in Sequence.

Note the above common passwords are not from any internet resource, its by my own case study that i have come to conclusion after hacking 19,788 emails accounts. I know now you want to know how i hacked so much accounts. As i have already mentioned for advanced hackers second option is best and the only thing that i did was just made my Keylogger USB and pendrive spreadable. Who ever used the infected USB drive also got infected and this procedure goes so on. And last what happened my 10Gb free storage was filled and i don't have enough time to clean it regularly.
Posted on 19:42 / 0 comments / Read More

How To Find Keylogger or Spyware in PC

Hello friends, today i will explain share with a great method to find or detect a keylogger or any other spyware in your PC or system. As we all know nowadays keyloggers and spywares are big concern as hackers are trying their best to infect the victims to hack their accounts. Today i will teach you how to find a keylogger or Trojan or spyware in your PC or Laptop. There are several ways to find them but using this method you will know the exact path of the keylogger and where its saving the log file. Also once you have the keylogger server now you can reverse engineer the server and hack the hackers account password which he used in keylogger server. Lets first start with keyloggers introduction..

What is Keylogger and How it actually works?

Keylogger as the name suggests somethings that logs keystrokes. Yup its right, keylogger is a password hacking tool which is used to steal victims passwords, logging the keystrokes pressed by victim and also some advanced keyloggers are even used to retrieve stored confidential data. Based on internet scope keyloggers are of two types:

1. Physical Keylogger: These keyloggers are installed if hacker has physical access to your system. User has to install this type of keylogger manually on your PC or system. These types of keyloggers are hard to find but i will show you today how to find that also.

2. Remote Keylogger: Remote keyloggers are new generation keyboard hook hacking software's which does not require a physical access to the system that means they can be installed remotely. These usually comes into your PC through torrents, porn websites, hacking tools(software's like Facebook hack tool, Gmail hack tool, Hotmail hacker) and cracks, keygens and patches. As most users usually ignore these files as antivirus usually shows virus in these files. So hackers exploit this loophole and attach their keyloggers and keyboard hook programs with such things like keygens, patches, cracks and torrents etc.

Remote keyloggers logs the data into a file and send these logs to hackers FTP or his email. So friends, always try to avoid above mentioned things as far as possible.



How to detect or find keylogger or any spyware in your system:

1. Download the Forensic investigation tool OPENFILESVIEW and Install it.

2. Now open openfilesview and you will see a complete list of all processes and temporary files currently being used by your system or PC along with their full path from which they have been running. Here is the snapshot:

find keyloggers in PC or detect viruses in PC
How to Find Keyloggers or Trojans in PC


3. Now in above snapshot you can clearly identify the keylogger and system files. Check the Program name and then check its corresponding location in full path. Also you can verify with time at which keylogger file has  been created.


4. Now we have find the location of Keylogger or spyware. Go to that location and open the File with bintext or any binary debugger and search for @ or ftp in that. This will help you to get the email ID or FTP address at which keylogger is sending logs. 

You can also use Wireshark and capture the packets for 20-30 minutes and filter ftp and smtp packets. By this methods you can will get email and password of hacker. I will explain this in my coming tutorials.

Info : Hackingloops.com 

 
Posted on 19:11 / 0 comments / Read More

How To Protect Your PC From Keylogger

Keyloggers and key stroke monitoring tools are nowadays becoming a severe problem for internet users. keyloggers are that much common that you cannot trust any installer that it doesn't have keylogger in it. So friends today i will tell you tell you how to protect and secure your PC or Laptop from keyloggers. Well there is no manual way to get rid of Fully undetectable keyloggers but we can encrypt our keystrokes and make the keystroke logs encrypted so that hacker can never know what are the actual keys pressed. So first lets have some background information about keyloggers and how they works and then we will have solution to protect and secure our-self from getting infected.

What is Keylogger?

Keylogger is basically a software tool which clones your key strokes pressed and writes them into log files. Some smart or simply say advanced keyloggers are retrieves the saved passwords in web browsers and other windows applications. Hackers use keyloggers to hack users email account passwords and other passwords and monitor their day to day activity.



How the Keylogger Works?

Lets explain this in very simple way, Whenever you press any key on your keyboard or laptop your machine generates a simple key code which depends on the keyboard format you are using. That key code tell your operating system that you have pressed a particular key. Now what keylogger does it save your key stroke into a file. Now further processing depends upon type of Keyloggers. Basically there are two types of keyloggers:

1. Physical keylogger

2. Remote Keylogger



The above processing is same for both physical and remote keyloggers. The difference lies in how they are gonna use a log file. 

Physical keyloggers requires physical access to a victim's system, so that hacker can install it manually. He may be your friend, brother, sister or some close one who actually has physical access to your PC or laptop. Now for getting logs also he has to manually access your PC to check logs. But nowadays few good physical keyloggers are there which sends logs on email address. So nowadays we only need one time Physical access and that's just to install Keylogger and configure an email address to send logs.



Remote keyloggers are a bit different as there name suggest they can be installed from remote, means you don't need any physical access. Remote keyloggers during configuration generates a server that we can send to victim and which does not need any installation. Remote keylogger maintains the records into log files and when victim connects to internet it send the logs to hacker's email address or FTP account that he has putted during configuration time to receive logs. 



SOLUTION FOR KEYLOGGERS:

As we all know new keyloggers are always FUD (fully undetectable) so our antivirus doesn't show any warning messages while infection. So the best method to protect yourself from keyloggers is that encrypt your key strokes by using key scramblers. What a keylogger does is that it monitors key strokes, so when we encrypt our key strokes, Hacker will still receive logs but that garbage as our keys are encrypted and hence he doesn't get anything and victim will remain safe from his keylogger. 



Let's understand it with example. Suppose you have typed 


What key scrambler will do? It will Encrypt your each key pressed into some garbage code and keylogger will get this as something like:

sT@ad9;8in=P

So friends what scrambler has done is that it has encrypted your keystrokes and saved you from getting prey to hackers. Secure and protect yourself from keyloggers as you cannot avoid them what you can just do is fool them by encrypting your keystrokes.






 
Posted on 19:21 / 0 comments / Read More
 
Copyright © 2011. Digital Info Tech . All Rights Reserved
Home | Company Info | Contact Us | Privacy policy | Term of use | Widget | Site map
Design by Herdiansyah . Published by Borneo Templates