Skip to main content

Posts

Showing posts from February, 2015

Tips for strong password

As we have already discussed that passwords are strong and at the same time weak! If user create password from his name, date of birth or any other combination that is related to him, cracking down his account doesn't need much technical know how. Meaning attacker who know you, can be lucky enough to access your sensitive information by only entering certain key combinations. Creating strong and almost non hackable wait!!! is there any non hackable password! I was once told that any system can be hacked! It only took time, skills and resources! You are absolutely right! But at-least one has to really suffer before getting your data! Arm robbers do rob banks! Do you think a local or common thief can rob bank? The ans is absolute NO! Strong passwords doesn't happen by chance! Below are the steps to create a very strong passwords! Passwords should be at-least 8 characters Its already becoming standard on the internet. Many websites doesn't allow less than 6 charact

What is Password?

What is a Password? Password is combination of alphanumeric and special characters, kept as secret by individual or group. This combination of characters are used as  key to safeguard software, system or any sensitive information from unauthorized access. Passwords are very critical in todays information world. They work like normal keys which we use to lock our house, office, car and other things we deal with in our day to day activities. Weakness of Password Passwords are very strong yet they have their own vulnerabilities. Below are the most common weaknesses of passwords. Guessing Phishing Bruteforce Guessing: The most common way to get passwords is guessing. People especially non-technical users creates passwords with the combinations that can be guessed easily. If you can ask many people what they use as passwords, the common ones will be: date of birth, phone number, name of loved ones, vehicle plate numbers, nick names etc. This makes it very simple for an atta

Windows shortcut to save your time

One of the must interested thing with Information technology is; shortcut is permitted! You are not a geek in computer world without using shortcuts. I know the first thing that comes to people mind about shortcuts is ctrl+c for copy or ctrl+v for paste! There are many windows shortcut that can save time! And make you get the best speed out of your windows machine.  Power of Ctrl+alt+ Create key combination for programs. Sometimes it sound tedious if you want to run a particular program, you have to come back to the desktop or all programs environment. What am about to show you will help you open any program (as long as you have created the shortcut key for the program) while running other programs, without going through startmenu nor desktop environment. Step 1>>> Locate the program you want to create shortcut Step 2>>> Right click and select properties, its always the last available option. Step 3>>> Click on the shortcut option at the top

Goals of Footprinting in hacking 2

Goals of Footprinting in hacking 2 Operating system information One of the must critical part of any system is the Operating System, commonly known as OS. Operating system is the system which serves as an interface between the device and the user. Hacker or Ethical hacker needs to have information regarding the target system OS. Below are the information that needs to gathered:- User and group information and names Banner grabbing Routing tables SNMP (Simple network management protocol): This protocol deals with maintenance and operation of the network. It again aids in exchange of information between network devices. System architecture Remote system data System names Passwords Organizational data This are non technical data regarding the organization. As I already mentioned before, one of the simplest way to hack an organization is getting access to non-technical staff. Extracting of information from such

Facebooking After death! Legacy Contact

What will happen to your Facebook account after you are dead? Starting from today, someone can handle your Facebook account after your demise! How? You need to give that person legacy account privilege. This can be done through facebook website. Before Facebook can freeze your account after receiving notice of your demise. During that period no one can manage your account. Things really changed with the introduction of Legacy contact. Legacy user can update your status, upload picture on your behalf, accept friend request, change your profile picture and can delete your Facebook account. One thing this user cant do is accessing your inbox! Sound great! Even after your demise, Facebook really cares about your privacy. Setting Legacy user is optional! And its only present to users from United states only as at now, but the social networking giant promise to bring the service to other countries. Source: TNW ICTmagazine stay upto date..... Join Us on Facebook:  ICTmagazine

Goals of footprinting in Hacking

Goals of Footprinting Footprinting as already discussed is the process of gathering information, on a network or system, with the aim of finding vulnerability. So what exactly are the set goals or the data an ethical hacker needs to gather? • Network information • Operating system information • Organization information • Network blocks • Network services • Application and web application data and configuration information • System architecture • Intrusion prevention and detection system • Employee name • Work experience Network Information One of the most important data to gather during the footprinting stage is the network information on the target system. Hacking can never be successful without getting accurate and up to date data on the target network. Below are the data an ethical hacker need to get on the network during footprinting. • Domain names used by the organization. • Domain used within the organization(intranet) • IP addressing system

Footprinting In Hacking

Footprinting in hacking is the process of studying an organization or system, with the aim of collecting valid or genuine information, which gives the attacker a clue and can help him find the vulnerability in the system. This is the first step in any systematic hacking approach. Attacker or ethical hacker will spent time in this stage carefully, because slit mistake in footprinting might leads to wastage of time, which can lead to the failure of the attack. After collecting data, hacker needs to spend time verifying and updating the extracted data. Attacker that doesn't update the data collected, might end-up doing nothing. How? Because the organization or individual can migrate from the known system. Thus leaving him with useless information. Steps to ensure Proper Information retrieval Since this stage is all about passive information gathering, below are the best practice that will leads to extracting the most genuine information. • Carefully collect public avail

Steps of Ethical Hacking

Steps of Ethical hacking Foot printing Scanning Enumeration System hacking NB: This will only be an introduction. I shall discuss the steps in details, bit by bit. Footprinting: This is the first step in hacking. This involves gathering information about the target network, firm or organization. The information collected will help the attack successful. This step is the foundation of hacking. If data collected is inaccurate the attack is likely to fail. This happens during the  passive state of the system. This steps target information that are carelessly handled or stored. Attack is as good as how accurate the information collected at this stage. Information that can be collected or extracted include IP addressing range Phone Numbers Email addressing Name spaces Employee information facility information Job information Scanning: This stage deals with studying the system during it active time. It focuses on gathering more useful information which wil

Apple Founders

Do you know that Apple Inc was not founded by Steven Jobs and Steven Wozniak alone? Apple was founded by 3 geniuses! Apple was found as partnership on April fool's day 1976 by three people who originally worked at Atari. Steven Paul Jobs 1955 to 2011 Steven Gary Wozniak 1950 to date Ronald Gerald Wayne 1934 to date Apple was incorporated in January 3rd 1977 without Ronald who sold his shares out for $800,  Not upto the price of an Ipad!  Todays his shares will have been valued more than 40billion USD!  If he knew Apple will be this big he wont do that! Though he said he have no regrets for his action. The reasons for leaving Apple after 12days of founding as he said was because of Steven Jobs was too strict! Ronald wrote the Apple I manual, drafted the partnership and design the first Apple logo. Apple logo! Designed by Ronald.  ICTmagazine stay upto date.... Join Us on Facebook: ICTmagazine   BBM Chanel: ICTmagazine

SSL (secured socket layer) explained

Secured Socket Layer This technology was developed by Netscape in the Mid 1990s. The technology has become standard in exchanging data over unsecured environment like the internet. Since we already mentioned that SSL secured data exchange on an unsecured environment like internet, and we all know that internet is almost all about websites. SSL helps in securing your website data. Once this service is installed on your server, a padlock sign will always appear on your address. Which will change HTTP (hypertext transfer protocol) to HTTPS (Hypertext transfer protocol secured). As already mentioned this technology has become standard to almost all websites. Once this certificate is installed on your server your data is secured (don't forget that a perfect system doesn't exist but at least the attacker has to put effort to get through). SSL uses a handshake like techniques to make sure data is secured. When client needs to access data from a saver or location that uses SSL

Introducing WhatsApp voice call and how to get it!

The world most popular instant messenger is at it again! This time around is not on temporary ban or WhatsApp on web. WhatsApp added something into its instant messaging system! Something WhatsApp fans have been waiting for... voice integration. Voice? WhatsApp already has voice note! What exactly are you trying to say! WhatsApp added calling feature! Wow you can now call FAF friends and family using whatsApp, mind you they have to be on the platform too! Not voice note! You can talk to your loved one in realtime! Other IM instant message platforms like BBM fans are already using this feature. WhatsApp voice is available on android Kitkat (version 4.4) and Lolipop (version 5) for now. Though android 4.3 too has been reported working. As for now no one has report working on IOS devices. User can only get the WhatsApp (v2.11.508)  via the whatsApp official site, since the latest version on google play is v2.11.505. You need to manually install the App since its not downloaded fr