5 Ways To Avoid Being Hacked

 

 

Hacking. We often think of it happening to companies or governments. But it also happens to ordinary people. But we can take steps to stop it.

Step 1: Tough passwords

You need to have a separate password for each account, so that if one account gets hacked, all of your vital information is not vulnerable. The problem is that it's tough to remember dozens of passwords. The answer: a password manager. There are a variety of third-party software programs that will create and store passwords for you.

 

Step 2: Two-Part Authentication

 

When you log on to many different computers — especially shared computers — to access your email account, you are especially vulnerable to hackers.

Many websites are moving toward two-step verification. Google is one. Essentially, it means that you need more than a password to log into a new account. If you use the service, you have to remember a password but also remember a special key that gets sent to you as a text.

Step 3: Change Your Behavior

 

"I hate to say it, but the reality is they need to share a little bit less," says Ulanoff.

Ulanoff says we probably don't want to go back to the pre-social media days, but oversharing may not be just embarrassing, it may cause harm. Things like birth dates and graduation years can be used to access your information. That doesn't mean you need to shut down your online presence, but be careful what details you put out there.

Step 4: Consolidation

 

Remember Friendster? Or MySpace? Whitson Gordon, senior editor of Lifehacker.com, says that back in the early days of the Internet, it would have been hard to imagine "10, 20 years down the road when we would have so many services we're grappling with."

So sit down and think about the last 10 years of your online life. And then delete the accounts for the services you signed up for and no longer use.

Step 5: Back It Up

 

If there's one thing I have to hammer home with everybody, it's back up your data," Gordon says. You can either use an external hard drive or an online service. As more of the things we care about get stored electronically, the more vulnerable they are to get lost. If your smartphone gets stolen with wedding photos on it, there won't be as much heartbreak.

 

ENJOY................

Proxy and Anonymous Internet surfing

 

1) What is a proxy?
A proxy is an address of a proxy server (look @ kind of proxy's) that is placed between your computer and the internet :

Normal :
Computer --------> Internet
With proxy :
Computer ---------> Proxy server -----------> Internet

The main advantage of the Proxy is that it will cover up your IP address (your identity on net) which may help you in opening the ban sites in your country. It was very much popular in days when Facebook was banned in Pakistan and user use Proxies to log into their accounts.


2) Kind of Proxies:

You have 2 different proxy's (some more but these are for a normal internet users) :
-1: Private proxies : They are only for you (it's the same like buy your own ip address ) and will cost 15-20$
-2: Public Proxies : They are for everyone but the problem is sometimes you can get fast proxy's and sometimes slow ones. If you have a good site/list with fast proxy's there as good as private proxy's

3) Where get your proxy ?
There are many ways to find the proxies but some address are also expired , so just search Google for the Fresh Sites. (search : free Proxy, free anonymous surfing)

4) Use proxy with IE(Internet Explorer):
-1: Open Internet explorer
-2: Go to tools > Internet Options > Connections
-3: Now you will see “LAN Settings” open it
-4: Check Use a Proxy server for LAN. Than you will be able to use Address and Port.
-5: Get a proxy (Read Wear get your proxy's) and fill the address you don't have to fill it the port.
-6: Hit ok , ok and it's done. You surf now with a proxy !

5) How safe is it ?
The use of proxy's is legal and it's a good protection BUT don't think ur full protected/undetected. It's more and more popular and some (protected) site block public proxy's because of the spammers …

6) Proxy software
You have lots of software that work with proxies like a Anonymous Surfing, bruteforcer or proxy port scanner.I have even added an link to download 16 various anonymous IP tools from (https://rapidshare.com/files/242280367/IP_Anonymous_Surfing_Tool_16in1_.rar) 


7) WARNING!!!!
It is true that a proxy hide your identity but don’t think that you are really safe if you hack CIA Database because in case of hack the Proxy site will give your real identity and you will end up in jail for at least 20 years. So be responsible!!! 
 

 

Secure Browsing Tips

 


1. Never keep same password for different services you use online like gmail , facebook, bank accounts etc.,

2. Use multiple accounts so that you dont get spams in your personal/ official email address.

3. Install good Antivirus and Two way firewall.

4. Use VPN for hiding identity and secure browsing when using internet out of your home.

5. Update your OS, Antivirus, Firewall and Browsers regularly.

6. Install a good spyware & Adware scanner .

7. Never provide personal information openly in public websites. Share your information carefully.

8. Never click on unwanted or suspiicious links. It may be hacking attempt.

9. Change your passwords regularly to increase the security of your daily actiivities.

 

Security tips to Aviod Virus /Trojan/ Keylogger Infection


Security tips to Aviod Virus /Trojan/ Keylogger Infection

1. Install a good antivirus. Free or Paid is good, but dont used cracked or pirated versions.

2. Install real-time anti-spyware protection

3. Update your Anti-virus programs daily.

4. Perform scans on your computer daily.

5. Disable autorun to prevent infection from pendrives.

6. Disable image previews if usiing Outlook

7. Use good anti-virus which has browser plugins and scans all URL's for malacious content.

8. Use Hardware based Firewall.

9. Dont click on any mail links or attachments from unknown sources or malacious users.

10. Never download softwares from third-party sites. Download from original website. Dont use cracks or keygens which may be a virus/trojan itself.

 

.

20/09/2013 15:56

   

 

1. Enable two step verification in you Email accounts.

 

2. Enable Login-notification for you email and get notification in your mobile whenever you login.
3. Set a strong password with a mix of alphabets, numbers and special charecters.
4. Enable login- notification for you facebook accounts to prevent unauthorised access.
5. Enable HTTPS in your email sttings annd your facebook account settings.
6. Never share your password with anyone. Even to your closest person.
7. Setup a recovery question which is difficult to answer and never setup an easy & guessable answer to your security question.
8. Never click on any links sent through mail or chat. It may be a link which can steal your cookie or inject any viruses.
9. Always check your address bar for proper website address before logging in.

11/08/2013 17:33

Welcome to (HACKINGbegins - "An approach to introduce people with the truth of HACKING"), Hello friends, Today in this post I'll tell you how can you hide your data in a picture. This is an easy technique to secure your data from misuse. Everyone wish to place there sensitive data in a secure manner, so there is an alternative to hide your data in a picture without uploading any additional software in your system, before explaining I'll introduce you with this technique this is called Stegnography.


What is Stegnography ?

Stegnography is defined as the art of hiding information, data or messages in an image. Even the different file formats can be used for the purpose of hiding the information like for example the video or audio etc. The purpose is to pass on the information with out any regard or knowledge of others safely to the destination. The advantage of stegnography is that those who are outside the party even do not realize that some sort of communication is being done. 

Follow these steps to hide data in picture :

  • Copy your data and image file to the same Folder.  
  •  Start > Run > CMD > CD to the folder that contain data, image files.
  • Type this command:

    copy /b image_file.jpg +data_file.rar image_file.jpg
     

 NOTE: image_file.jpg is an image file and data_file.rar is a data file.

To show the data file again just rename the image_file.jpg to data_file.rar, then your data file will be displayed, after that just rename it to image_file.jpg to hide data again.

 Hope this will be informative for you, kindly post your comments ask any kind of problem occur on this article.

Be a real hacker - PROFESSIONAL, and change the trend of HACKING.