Thursday, March 8, 2012

iNTERNET SECURITY

KEYLOGGER
Keyloggers have been a major problem today as it does not require any prior knowledge of computers to use it. So hackers mainly use keyloggers to steal your passwords, credit card numbers and other confidential data. Below are some methods through which you can protect your computer from keyloggers:

Use a Good Antivirus

This is the first and basic step that you need to take in order to protect your computer from keyloggers. Use a Good antivirus such as Kaspersky, Norton or Mcafee and update it regularly.

Use a Good Antispyware

Since keyloggers are basically spywares, if you are a frequent user of Internet then you could be exposed to thousands of keyloggers and spywares. So you should use a good antispyware such as NoAdware.

Antilogger can be Handy

Antiloggers are programs that detect the presence of keyloggers on a given computer. Over past few years, I have tested a lot of anti-logging programs and have found Zemana Antilogger as the best antilogger.
Zemana
Normally a keylogger can be easily detected by a Good Antivirus program, but hackers use some methods such as hexing, binding, crypting and similar techniques to make it harder to be detected by antivirus programs. In this case Zemana Antilogger comes handy as the program is specially developed to protect your system against harmful keyloggers.
Zemana Antilogger

Online Scanning

When ever you receive a suspicious file, you scan it with online scanners such as Multi engine antivirus scanner which scans your file with 24 antivirus engines and reports it back to you if the file is recognized as a virus or spyware. This ensures that none of the malicious programs can escape from being detected as there are 24 different antivirus engines are involved in the scanning process.

Sandboxie

Sandboxie is another great program to help you protect your computer against harmful keyloggers and spywares. Sandboxie runs your computer in an isolated space which prevents your program from making permanent changes to other programs in your computer.
When ever you receive a file that looks suspicious, just run the program with Sandboxie so even if it is a keylogger or any other virus it will not make permanent changes to your computer system.
Sandboxie
To run a program in Sandboxie follow the steps as mentioned below:
1. Open sandboxie and click on sandbox menu on the top
2. Now goto Default sandbox
3. Then click on run any program
4. Now select the file you wish to run in sandboxie and click open

Keyscrambler

Keyscrambler is one of the best protection against keyloggers that you can have, Keyscrambler is a small program which encrypts your typed keystrokes so even if the victim has installed a keylogger on your system, he or she will get encrypted keys. Keyscrambler currently supports Firefox, Internet explorer and other applications, however its premium version supports more than 160 applications.(GOHACKING)
www.i-tsoul.co.cc

tricks and tips

Most of you may be curious to know about how to make a Trojan or Virus on your own. Here is an answer for your curiosity. In this post I’ll show you how to make a simple Trojan on your own using C programming language. This Trojan when executed will eat up the hard disk space on the root drive (The drive on which Windows is installed, usually C: Drive) of the computer on which it is run. Also this Trojan works pretty quickly and is capable of eating up approximately 1 GB of hard disk space for every minute it is run. So, I’ll call this as Space Eater Trojan. Since this Trojan is written using a high level programming language it is often undetected by antivirus. The source code for this Trojan is available for download at the end of this post. Let’s see how this Trojan works…
Before I move to explain the features of this Trojan you need to know what exactly is a Trojan horse and how it works. As most of us think a Trojan or a Trojan horse is not a virus. In simple words a Trojan horse is a program that appears to perform a desirable function but in fact performs undisclosed malicious functions that allow unauthorized access to the host machine or create a damage to the computer.
Now lets move to the working of our Trojan
The Trojan horse which I have made appears itself as an antivirus program that scans the computer and removes the threats. But in reality it does nothing but occupy the hard disk space on the root drive by just filling it up with a huge junk file. The rate at which it fills up the hard disk space it too high. As a result the the disk gets filled up to 100% with in minutes of running this Trojan. Once the disk space is full, the Trojan reports that the scan is complete. The victim will not be able to clean up the hard disk space using any cleanup program. This is because the Trojan intelligently creates a huge file in the Windows\System32 folder with the .dll extension. Since the junk file has the .dll extention it is often ignored by disk cleanup softwares. So for the victim, there is now way to recover the hard disk space unless reformatting his drive.
The algorithm of the Trojan is as follows
1. Search for the root drive
2. Navigate to WindowsSystem32 on the root drive
3. Create the file named “spceshot.dll
4. Start dumping the junk data onto the above file and keep increasing it’s size until the drive is full
5. Once the drive is full, stop the process.
You can download the Trojan source code HERE. Please note that I have not included the executabe for security reasons. You need to compile it to obtain the executable.

How to compile, test and remove the damage?

Compilation:
For step-by-step compilation guide, refer my post How to compile C Programs.
Testing:
To test the Trojan,  just run the SpaceEater.exe file on your computer. It’ll generate a warning message at the beginning. Once you accept it, the Trojan runs and eats up hard disk space.
How to remove the Damage and free up the space?
To remove the damage and free up the space, just type the following in the “run” dialog box.
%systemroot%\system32
Now search for the file “spceshot.dll“. Just delete it and you’re done. No need to re-format the hard disk.
 NOTE: You can also change the ICON of the virus to make it look like a legitimate program. This method is described in the post: How to Change the ICON of an EXE file ?
(gohacking)
www.i-tsoul.co.cc

types of hacking


I_T soul

Type of hacking
Legal hacking or White hat – Hacking done intentionally to check for vulnerabilities in their system.
Black hat – Hacking done to steal others’ confidential information.
Grey hat – Combination of both the above. They make use of legal access to steal unauthorized data.
Blue hat – Delegating authority to a third person to check for bugs in your own system.
Elite – Expert hackers are referred as Elite hackers.
Script kiddie – Amateur hacker who uses others ideas and software for hacking.
Neophyte – Almost new to internet fundamentals.
Hacktivism – Spreading their beliefs in the form of message via the hacked system to others.
Phreaker – Telecomm hacker who tricks plays with the telephone and making you do free ISD calls.
Computer Security Hacker – hacker knowing the tech spec of computer security and networking. Using fragmented packets to attack the firewall or ISP.
Academic Hacker – Academic person doing a research about hacking.
Hobby Hacker – Hacking done as a hobby like jail breaking done on Apple iPhones, modifying software and hardware, etc.

soucre "hackingalert "
www.i-tsoul.co.cc

How to become a hacker


This note deals with

 

                                                                     

What is hacking ?

Who is a hacker ?

How to become a hacker ?

Types of hackers

Hacking techniques

By I-T SOUL


Warning
If you are not interested in hacking, so please don’t read it

The term hacking is not a simple work only the passionate can do it. Nobody can do it without any interest, non passionate can’t do it. So kids don’t try it, without any knowledge don’t try to hack   warning



What is hacking?

The term hacking is now famous word in the world…so hacking means to hack or gather some information from another systems without any permission. Or we can say hack somebody’s system and gather some important info without knowing him that he is hack by someone…
Actually hacker is a strong programmer..

Who is a hacker ?

Actually a hacker is a strong programmer with computer and programming geeking skills. but actually there are the programmer who knows the new networking terms and knows about how computer works, how networks work, know about internet working..
But there are the some hackers which have programming knowledge
And hacking knowledge and they are just like real hackers and day by day they giving challenge to real hackers. The difference is they real hackers have made system of internet and they are certified hackers
Another they are not certified…they just having there fun with world hackers. day by day there are making new new systems of internet but the local hackers find the way to hack systems. They don’t have that system which is not hacked by hackers. Everything in internet is hacked
Important point
Hacker is not a person who hacks facebook account or hack website and called himself a hacker but hacker is a person who knows the whole working of internet and computer programming
Now

How to become a hacker?

If you want to learn the hacking you have to follow by step by step follow these steps to learn hacking
Ø      First you should know the basics of programming, computer science, hacking. Try to solve problems of computer science and try to make your own tricks of internet or computer science
Ø      You have to learn programming language like phyton,c,c++ languages then you will understand the little bit about working of internet
Ø      Try to learn how your operating system works
Ø      Use UNIX ,Linux operating systems
Ø      You should know the html,xml and other languages of webpages
Ø      You should read the books of hacking
Ø      Contact hackers and go to hackers forums learn new tips
Ø      Go to deep everything, everything you learn in hacking
Ø      You should know the html,xml languages of WebPages
Ø      Read the book of hacking like the basics of ethical hacking
Ø      Don’t use any software but you can analyze how software works
Ø      If you are using software then cant be the hacker it makes weak
Ø      Don’t use to watch the youtube videos because foolish videos
Ø      If you are ready for hacking the you should know the security of your system
Ø      Secure your system after hacking like hiding ip, prevent form malware virus...
Ø      Before you should have security for your system
Ø      At last you are hacker
Ø      One thing is more don’t tell anybody your are the hacker because if you tell them it will take fun of hacking


Note written by

www.I-tsoul.co.cc