Disclaimer:-Every thing provided on this website is only for Educational purposes and Author "Ramiz Khan" is not responsible for any damage done.

Ramiz Khan

Ramiz Khan : February 2013facebook.com/ramiz.khan.98478
Contact -E-mail: ramiz.khan.16@gmail.com

Search This Blog

Saturday, February 23, 2013


What is Keylogger & How to Find it in a Computer System


Are you aware of a software which works in the background of computer system?It also tracks every keystroke of the computer on which it is installed.
Keylogger is the software we are talking about. Let us throw some light on it for you to find it on your computer system.
There are two types of keylogger -
  1. Hardware keylogger – It is usually used in cyber cafes to hack the Id and Password of users
  2. Software keylogger - It is used on remote computers. It can provide all logs of texts entered on the installed computer.
keylogger
Let’s look into their details

 HARDWARE KEYLOGGER :

Hardware keylogger is a device which you can simply plug into computer’s keyboard cable and can start tracking keystrokes instantly. It takes very less time (less then 5 seconds) to install, all you need is to simply plug in. It also doesn’t require to log into computer to install. It can be installed on any operating system and if the operating system crashes, the data inside keylogger will remain intact.

 SOFTWARE KEYLOGGER : 

Software keylogger is a software which can be installed only by logging into computer system using password and administration privileges. It can record all operating system events such as page size, keystrokes etc. The main drawback of this software is that it can be detected by antivirus software.

 HOW TO FIND KEYLOGGER IN A COMPUTER :

Essence lies in knowing if someone has secretly installed keylogger in your system. Here are a few steps to find the keylogger in a computer.
Step 1: Click ctrl+alt+del simultaneously and check the task list. If you are unsure about a running task, examine all the running tasks immediately.
Step 2: Check all the installed programs in your system through control panel.
Step 3: Run your antivirus program to detect keylogger in your system.
Step 4: Download keylogger scanner program from internet and scan your system.
Step 5: Type “msconfig” in run box and check all startup programs.
Step 6: On public computers, you need to check keyboard port attached with CPU to detect hardware keylogger.

Scammers steal credit card details in ways you never thought of


Cyber criminals and malicious scammers are constantly at work to devise new ways to steal confidential user data. Unfortunately, such attacks are not just restricted to the Internet. A recently discovered spate of attacks enables scammers to steal credit/debit card details and these methods are increasingly carried out in the physical world.
In brief, here are the 5 most common places from where credit/debit card data can be stolen:
  • Restaurants and retail stores
  • Online shopping portals
  • Hacked email accounts
  • ATM machines
  • Thieves and pickpockets
Restaurants and retail stores
Some scammers have devised ways to tamper with the card readers at retail stores. Malicious smart cards that look like legitimate cards are created and then inserted into the machines to make a payment. However, the machine simply says than an error has occurred and the retail store merchant is unaware of the damage that has been done. When a genuine payment is made with a valid card over the same machine in the future, the details of that card get recorded. Now the scammer revisits the store after a day or two and inserts the fraudulent card into the machine to make another seemingly innocent payment. Details about all the cards that have been inserted in the interim period are now transferred into the malicious card which can be viewed by the scammer via another device.
Retail store card fraud
Online shopping portals
The best online shopping portals mandatorily use secure methods to protect user details. Unsecure portals are susceptible to hackers and can easily lose data to scammers. There have been several instances where major online portals have been breached and card details have been stolen and misused. From a customers perspective it is advisable to be aware of the concept of SSL and security certificates. Additionally, the best Internet security software installed on a machine can also detect fraudulent pages and portals.
Hacked email accounts
Many people receive and pay their credit card bills via email. So if a hacker manages to gain access to an email account, he can cause a lot of trouble. It is imperative to use various tools for email protection like two-factor authentication, strong and unique passwords etc. Mail services like Gmail and Yahoo also offer other methods to check if your account has been hacked into, and these are worth exploring as well.
ATM Machines
Theft of card data from ATM machines is known as ‘skimming’. This is accomplished with the help of simple card reading equipment and a small camera that records an individual when he punches in his PIN. Scammers also use equipment that replicates the magnetic strip of cards. However, various steps can be taken to avoid such attacks and this includes shielding your hand while typing the PIN and being aware of suspicious looking machines.
Thieves and pickpockets
Physical loss of possession of cards is the biggest risk in this scenario. It is advisable to report a card loss to the concerned bank and local authorities as soon as possible. Another noteworthy precaution is to monitor card statements and activity for any signs of malicious activity.
Credit/debit card usage is convenient yet dangerous as scammers have come up with several innovative methods to gain such information. Readers are advised to stay vigilant and follow various safety measures to remain protected

How to Remove New Folder.exe Virus: Step by Step Guide


New folder.exe virus is also known as Iddono. This virus makes a copy file of itself with the name Iddono. It appeared in 2008 on Window’s computer systems. This Computer virus uses program security weaknesses of the Windows operating system. Once it infects a victim’s PC, it executes its own programming,turns the hacked PC to a server and the hacker’s PC to a client machine.

Here is the step by step guide to remove the New Folder.exe virus.
Step 1: Press “Ctrl” , “Shift” and “Esc” keys simultaneously to open the Task Manager.
 Step 2: Look for “Processes” tab in task manager and click on it to see running process.
 Step 3: Select “new folder.exe” from the list of the processes and click “End Process” button.
 Step 4: Repeat Step 3 for “srvidd20.exe,” “iddono20.exe” and “editor.exe” processes.
 Step 5: Now close the task manager.
 Step 6: Now go to the start menu, type cmd in run and click enter. You will see a command line window.
 Step 7: Type “regsvr32 /u shelliddono.dll” and hit enter. Now type ”regsvr32 /u libedit.dll” and hit enter to unregister the DDL.
 Step 8: Close the command line window.
 Step 9: Now go to the start menu and type “srv0104.ids” in search box and click enter.
 Step 10: Delete all the listed search results.
 Step 11: Repeat Step 1 & 2 for “shelliddono.dll,” “libedit.dll,” “newfolder.exe,” “srvidd20.exe,” “iddono20.exe” and “editor.exe” processes.
 Step 12: Now restart your computer.

Follow the above steps to remove New Folder.exe virus from your computer. 

5 Best Security Tips to Secure Your Mobile and Tablets from Unwanted Attacks


The more you use your mobile or tablet device, the more security you need for your device. Due to increasing number of mobile and tablet users, cyber criminals are paying more attention to mobiles users. So, it is very important to secure your mobile devices and prevent it from any unwanted attacks. To tap the maximum benefits and for uninterrupted secure usage of your mobile and tablet devices, go through these five mobile and tablet security tips.
Mobile & Tablet Security

 KEEP YOUR DEVICE SOFTWARE UP TO DATE:

Security risks, threats and malwares are increasing day by day. So, it is very important to update the software of your device. Updates make your software more secure to use on your device. You can update your software through internet. So, Update your software and operating system on a regular basis is essential in keeping your tablet and mobile devices secure against Zero Day exploits and threats.

 SET A STRONG PASSWORD & PASSCODE AND LOCK THE DEVICE:

It is very important to set a very strong password for your device. A simple password can be hacked. So, set a strong password and passcodes by using special characters, lower & upper case letters and numeric in your password. Always lock your device for better security so that in case of loosing your device, if someone tries to unlock your device, three numerous attempts to enter a password will automatically delete all the data on your phone and thus you can prevent your device from any kind of invasion.

 NEVER DOWNLOAD QUESTIONABLE APPS:

Remember to download apps only from trusted and verified sources like Google play, Amazone app store etc. Security is very important while downloading apps on your device. Please check if the app you are downloading has no infected files or malware.

 USE YOUR BLUETOOTH AND WI-FI SAFELY ON PUBLIC NETWORKS:

It is also very important to use your Bluetooth and WI-Fi very safely specially on public networks. On public networks, your important data can be compromised with others. Always disable your Bluetooth and turn off your Wi-Fi whenever you are not using it. We will also suggest you to switch you Bluetooth in hidden mode. Use extra caution and be very careful while you are performing transitions on public network. Check if you a secure connection or not.

 DOWNLOAD A GOOD ANTI-VIRUS SOFTWARE FOR YOUR DEVICE:

Viruses, malwares, and hacking are some issues that are increasing day by day and becoming an issue for mobile and tablets. Download a good anti-virus software for your device to help prevent infections, viruses and malwares. The majority of anti-virus software vendors provide mobile security software and apps. you should consider installing a best security app for your device to prevent it from unwanted attacks.

Learn to Detect Hidden trojons Viruses/Keyloggers On Your PC


 
Are you beware that there is a hidden Trojan, Virus or Keylogger working on your PC and sending your logins to hackers?

If you are in that situations you don't need to worry anymore. In this post i will show you a security software called Process Revealer that can detect and kill hidden processes.



Process Revealer Free Edition is a free hidden process detector that reveals what does not appear in standard detection utilities like Windows Task Manager. Process Revealer provides detailed information about each process running on your computer to help you know if a process is related to a malicious program. Hidden programs are automatically highlighted in the interface and can be removed in one click.


Full PC Softwares




AutoDesk AutoCAD ISO + Video Tutorials [2013][Torrent] 
*:Cinema 4D Studio V12 Full ISO [Torrent]
 *: Important Hacking Tools For Hackers
*:Microsoft Office Professional Plus 2013 + Serial Key
  *: Hacker Theme in Windows 7   
*:Adobe Photoshop CS6 Extended Edition + Total Training Adobe Photoshop Tutorials 
*:Bitdefender Antivirus Plus 2012 
*: HACK YOUR CPU FAN (using speedfan) 
*: Password Protect Your Software 
Extreme Copy 2.1.0 Pro full (Copy any file Quickly) 
*:Portable Adobe Illustrator CS5
*:Portable Firefox 11 Final Edition 
*:Talking Dictionary 9.0  
*:Bitdefender 2012 Anti-Virus with Activator | 
*:Hide your IP address
*:Guitar Pro 6+Sound banks+Crack Download free 
*:Avast Pro Antivirus 7 Cracked 
*:Orion Browser History Dumper 
*:World's fastest password Cracker (2012)  
*:Microsoft Office 10 full version
*:Solid Edge Full version
*:AutoDesk - 3DMax 2012 FULL + CRACK
*:Advanced SystemCare Pro 5.2 Full Version
*:IDM 6.08 Build 9 Full Version
*:Picasa 3.9 Build full version 
*:Avira AntiVir Personal - FREE Antivirus
*:Adobe Photoshop CS5 Extended & Crack
*:Sony vegas pro 8 cracked

Know if your PC is infected with Viruses, Trojans or other Malware

                                Malware Virus Worm Trojan Infection



The reason why most computer malware are so deadly is because many users fail to recognize whether they have been infected or not. Had they detected the infection at an earlier stage, the damage caused could have been greatly reduced. As each virus is programmed differently, it becomes difficult to identify a virus outbreak. However, there are some general symptoms that makes it easy to detect an infected computer. Here are some of them:-


1) Programs won't start or crash suddenly: If some system programs like the task manager or registry editor have suddenly stopped working or crash randomly without any visible reason, it is more than likely that your computer has got some form of worm that is attaching itself to various programs and thus, corrupting their code. A virus modifying registry entries to prevent these programs from running could also cause this. 



2) Unusual Network Traffic: If even after closing your browser and other applications that may use the internet, you see that your computer is still downloading or uploading anything, then your computer is possibly infected with some form of spyware that is either downloading other viruses to your computer or is uploading your private information to a remote computer. In case you use awifi connection, it is also possible that your neighbors are using your network. 




3) Internet Connection not available or is slow: If suddenly, your internet connection has stopped working or has become extermely slow, it is possible that a malware is the cause. However, problems with your internet service provider could also be the cause of such issues. 



4) Annoying Popups or Redirection to Strange Websites: If there has been an increase in the number of annoying popups while browsing the internet or your web browser redirects you to a different website from the one you wanted to visit, a virus or adware might be the cause. 



5) Computer won't boot: If your computer has suddenly stopped booting, it is possible that some malware has modified your computer's system files. In such a situation, re-installing or repairing your operating system might be the only solution. 



6) Slow Computer: Some viruses are designed specifically for this purpose. Malware programmers achieve this by designing viruses that increase your CPU's usage level to 100%. If on running the Task Manager, you find that your CPU's usage is constantly at 100% level, a malware might be the cause.


                                                  Computer Infected Virus


7) Programs start automatically: Some viruses and adware automatically start strange programs on your computer in order to show unwanted advertisements or simply to frustrate users.



8) Unusual File Associations: Some viruses change .exe or other file associations which prevents these files from opening. Some viruses also do this to automatically start themselves when a file of particular type is started. 



9) Security Software Disabled: Most malware disable antiviruses and firewalls to prevent themselves from being detected. If only a single software stops working, it might be a specific software failure issue. If it is a general trend and almost every security software is facing this issue, a virus infection is most likely. 



10) Weird Behaviour: If your computer automatically starts sending emails or opens strange applications randomly or does things different from its "normal" behaviour, your computer is most likely compromised by malware. 



Most malware infection can however be avoided by using a powerful antivirus software and following some best security practices.