Monday, 12 March 2012

What to Do When Your Email Account is Hacked?


How to Recover Hacked Email Accounts?

Email Hacked?It can be a real nightmare if someone hacks and takes control of your email account as it may contain confidential information like bank logins, credit card details and other sensitive data. If you are one such Internet user whose email account has been compromised, then this post will surely help you out. In this post you will find the possible ways and procedures to get back your hacked email account.

For Gmail:

It can be a big disaster if your Gmail account has been compromised as it may be associated with several services like Blogger, Analytics, Adwords, Adsense, Orkut etc. Losing access to your Gmail account means losing access to all the services associated it with too. Here is a list of possible recovery actions that you can try.
Step -1: Try resetting your password since it is the easiest way to get your account back in action. In this process Google may ask you to answer the secret question or may send the password reset details to the secondary email address associated with your compromised account. You can reset you password from the following link
If you cannot find success from the Step-1 then proceed to Step-2.
Step-2: Many times the hacker will change the secret question and secondary email address right after the account is compromised. This is the reason for the Password Reset process to fail. If this is the case then you need to contact the Gmail support team by filling out the account recovery form. This form will ask you to fill out several questions like
1. Email addresses of up to five frequently emailed contacts
2. Names of any 4 Labels that you may have created in your account
3. List of other services associated with your compromised account
4. Your last successful login date
5. Account created date
6. Last password that you remember and many more…
You need to fill out this form as much accurately as possible. It is obvious to forget the dates of last login, account creation and similar terms. However you need to figure out the closest possible date/answers and fill out this form. This is your last chance! The more accurate the information filled out in the recovery form, the more the chances of getting your account back. You may reach the account recovery page form the following link

For Yahoo and Hotmail:

Unfortunately for Yahoo/Hotmail there is no second option like filling out the form or contacting the support team. All you need to do is either answer the secret questions that you have setup or reset the password using the secondary email option. 
To initiate the password reset process just click on the Forgot password link in your login page and proceed as per the screen instructions.
I hope this post will help you recover the lost account. I highly recommend that you also read my post on How to protect your email account from being hacked and Tips to find unauthorized activity on your Gmail account so that you always stay protected!        

                                                                                                                                  @Jasper Dekcah@

How to Retrieve Clipboard History in Windows


Retrieve clipboard history using alternative clipboard managersEver copied a code snippet or text from the web and forgot to paste it before you copied something else? Well, all of us will have an experience of something like this, where we want to desperately retrieve those information that was once copied to the clipboard. But since Windows clipboard will only remember the last item that was copied onto it, it would seem impossible to recover the information that was copied earlier. However, this problem can be solved using an alternative clipboard manager in place of the default one.
In this post you will find a few such alternative clipboard managers for Windows using which it would be possible to save and retrieve every piece of information that was copied to the clipboard. Here’s a quick list:

1. Clipdiary

How to Retrieve Clipboard HistoryThis tool is a powerful clipboard manager which will store every piece of information that was copied to the clipboard including text, images or any other file. Clipdiary automatically loads upon Windows startup and maintains a database to store the history of all copied items.
This makes it possible to retrieve the information that was once copied to the clipboard, be it the last hour or the last week. Clipdiary is a shareware tool which comes with a 30 day fully functional evaluation period.

2. ClipMagic

ClipMagic is similar to Clipdiary but includes a few extra features that could seem handy for advanced users. The following are some of the extra features of ClipMagic that are not present in Clipdiary:
  • Categorize/organize your clips. You can also create filters/rules for your incoming clips
  • You can store/categorize your ideas to research fast
  • Assign often used text like email signatures to hotkeys

3. Ditto

Ditto is a powerful alternative to the default Windows clipboard manager which is an open source tool. It keeps track of all the copied items such as text, images and other files so that you can retrieve them whenever necessary. The following are some of the highlights of Ditto:
  • Assign hotkeys to frequently used clippings
  • Search and organize the clippings based on task or project
  • Supports unicode so that you can copy foreign and non-standard characters without any issues
  • Get a preview of all the copied items including thumbnails of images just by pressing the assigned hotkey
  • Ditto comes as a freeware so that you can enjoy all of it’s features free of cost
Even though Ditto is a freeware, it is still comparable to the two shareware tools discussed earlier. So in my opinion Ditto is always the first choice. You may still download and try all the three and keep the one that you like!

Hacking Types and Tips to stay protected


Hacking Types and Tips to stay protectedThere are many numbers of hacking techniques available and each hacking attempt happens for a malicious purpose. The word hacker means attacker who assault on the computer’s system security. Not all the hackers have the intention to steal others’ things. Hacking can be done on several places like a website, wireless connection, broadcasting networks, emails, gadgets like mobile phones, etc.
Type of hacking
Legal hacking or White hat – Hacking done intentionally to check for vulnerabilities in their system.
Black hat – Hacking done to steal others’ confidential information.
Grey hat – Combination of both the above. They make use of legal access to steal unauthorized data.
Blue hat – Delegating authority to a third person to check for bugs in your own system. 
Elite – Expert hackers are referred as Elite hackers. 
Script kiddie – Amateur hacker who uses others ideas and software for hacking.
Neophyte – Almost new to internet fundamentals. 
Hacktivism – Spreading their beliefs in the form of message via the hacked system to others.
Phreaker – Telecomm hacker who tricks plays with the telephone and making you do free ISD calls.
Computer Security Hacker – hacker knowing the tech spec of computer security and networking. Using fragmented packets to attack the firewall or ISP.
Academic Hacker – Academic person doing a research about hacking.
Hobby Hacker – Hacking done as a hobby like jail breaking done on Apple iPhones, modifying software and hardware, etc.

Hacking tips
Following are the tips to keep off hacker’s interruption.
1.Try to avoid usage of wireless networks and turn off your Wi-Fi and Bluetooth devices. Use wired network only with managed firewalls.
2.Never use wireless technologies like Bluetooth and Wi-Fi in Public Areas,
3.The password you use for each account should be unique. Even if someone manages to find your password of a particular account, you could limit the damages to that account alone.
4.To avoid dictionary attacks and brute force attack, be sure to use complex passwords that are combination of letters, numbers and special characters, and must be more than 10 characters long.
5.Never use others’ system to log into your accounts, beware of the software like keylogger, abel, etc.
6.When using others system, be sure to download Spybot software to see if there are any security holes and then begin using their system.
7.You password must be changed frequently and periodically.
8.Check your antivirus for frequent updated for virus threats, malware removal, adware removal and prevention.
In order to stay safe against hacking, you must know the way hacking works. You can browse the internet for hacking guides, hacking software, hacking methods and do some academic research on those topics. Hackers usually use malware to attack the system and create paths for them to enter and steal the valuable information stored on the systems. A lot of expert hackers write their own software and use their own technique to perform hacking, and thus making it tough for us tracks them down. All you can do is follow the above guidelines and make use effective security related application programs like antivirus (Norton, McAfee, etc), Spyware (STOPzilla Spyware remover), etc and stay protected against malware.

DOWNLOAD YOUTUBE’S VIDEOS VIA GOOGLE CHROME



If you prefer to use Google Chrome for browsing on the internet, you can use one of the extensions that function displays the download button when opening one of the youtube video page on the site.
The extension name is Chrome Youtube Downloader. Use with the following steps :
1. Open Google Chrome
2. Visit ChromeExtensions.org to install Chrome Youtube Downloader
3. Then click the Add button to Chrome to install on the browser Chrome / Chromium you use. The button is in the upper right (which signs +)
4. After successful installation, you will be taken on the settings page. Just select ‘Classic Download’ on the Style Button option.
5. Visit Youtube video page (which you want to download of course). It would appear the button to download that is located below the box. If the button is not appear, playing the video ‘streaming’ for the firt time. I’ll definitely button will appear. just click the download button to download the video immediately.
In the list that appears when you click the download button, please select the quality / type / format of the video you want. Then wait for the download to complete.

How- To Bypass the Passwords in Windows


This post is about an interesting hack to bypass the login passwords in Windows. Application of this hack will result in Windows logging you on everytime as a certain user Follow the steps mentioned below to apply this trick
  • Click Start -> Run.
  • Type Control userpasswords2
  • Press Enter.
  • Click to uncheck the box labelled ‘ Users must enter a user name and password to use this computer’.
  • Press OK.
  • Enter the username and password in the box that appears.
  • Click OK.

Linux Hacking


Entries for the ‘Linux Hacking’ Category

Mouse Shortcuts/Tricks for Ubuntu Unity

Clicking and holding an icon and then dragging it around will allow you to reorder it on the launcher. You can also drag it off to the right of the launcher to move it around. Note that you need to make an explicit movement to the right to move the icon off the launcher before you can move it around.
  • Dragging and Dropping an icon into the trash can will remove it from the Launcher.
  • Moving and holding the cursor on the left side for a few seconds will launch Unity dock.
  • Moving the cursor to top-left corner(near Ubuntu icon) will launch Unity dock as well.
  • Scrolling the mouse wheel while over the Launcher scrolls the icons if you have too many and need to move around quickly.
  • By Scrolling the mouse wheel while over the Sound icon on top panel helps you increase or decrease system volume.
  • Middle click on an application’s launcher icon – Open a new instance of the application in a new window. Very useful at times. In laptops with touchpads, hitting left/right click buttons together is akin to middle click.
  • Maximizing – Dragging a window to the top panel will maximize it.
  • Restore/Unmaximize – Dragging the top panel down OR double clicking on the top panel will do.
  • Tiling – Dragging a Window to the left/right border will auto tile it to that side of the screen. One of the highlights of new Unity experience.
 
                                                                                                                                                                             @Jasper Dekcah@

Tips


How to hack Facebook account

Hai friends today I will tell a How to hack facebook account hacking method which work’s surely above 80%. Here we trying to Phishing the facebook website through email. Its simply known as Smart Phishing With Email Trap.
This smart phishing is almost undetedable because we send HTML mails to the victim with same header as that of original mails by email address that looks similar to original one. And ask user to join some Group or watch video or read comment etc.. So its quite easier to exploit fact.
Here is the steps for Hack Facebook Passwords or Accounts ?
Step 1.First you have to download the Facebook phisher.
Step 2. Then Extract the rar file now you will get two files as given below:
• index.html
• write.php
Step 3. Now upload all the two files in any free webhosting server because since its cast free. No one want to spend money for hacking. On these servers try the username as nearer to original URL like faccbook or fecabook etc.
Step 4. You Now have done upload and now you have to send these to your victim.Now you reach most important step of smart email phishing.
Here is some sample for your better understand
HowtohackFacebookpasswords
This the sample email that comes to your email account from facebook.
Now You have to edit this mail. Open this email and click on forward now you will see this email in editable mode now remove the forwarded headers etc and forward from Header.
Remember your Name in Gmail must be Facebook and email account should be like noreplyfacebook@gmail.com etc… Now you have to put the Fake link of index.html file which you have got after uploading in a web hosting server in place of Two exploit points.Mind it always put link in href and original text should be as such. And also try to keep the link as much as closer to facebook original link.
Step 5. After sending phisher to victim, once the user logs in to his Facebook account using your Phisher, his user ID and password are saved in our hosting folder as a text file..And these are stored in passes.txt What you have to do is just refresh your Web hosting account files.
Step 6. And that file will contain the passwords and look like this:
password you got