Showing posts with label Website Security. Show all posts
Showing posts with label Website Security. Show all posts

Sunday 6 April 2014

Trusted Contacts - New facebook security to get back your account if get locked out

Its a good move of facebook security team. They just recently released a Trusted Contacts service by which you can get your locked account back. You just have to add 3 to 5 close friends that you can call for help if you ever have trouble accessing your account.

Trusted contacts are friends that can securely help you if you ever have trouble accessing your account.

How to add Trusted Contacts ?

Go to the Security Setting of your account. You can directly click here to open Security Settings.

Facebook Security Settings

Select Trusted Contacts there.

Facebook Trusted Contacts

Now just click on Choose Trusted Contacts and a pop up window will open and ask you to choose trusted contacts.
Choose Trusted Contacts Facebook

Then just choose 3 to 5 trusted contacts by searching your friends. Remember if you remove someone from your trusted list, facebook will notify to the trusted contact about the removing activity.
 Trusted contacts are the contacts which contain very high chances to access or recover your account so only add the trusted ones.

What after adding Trusted Contacts ? 

In future if your facebook account gets locked by any activity, then you can gain access on your account easily by contacting your trusted contacts. Facebook will send a security code to your trusted contacts, and you have to put the code in the account recovery console to recover your account.

Thank you. Keep your account secured.





 

Tuesday 31 July 2012

How to increase Processor Speed

                     


There are many steps to increase your processor speed or system performance.
This post is for those people who are having problem with Processor speed. Follow the below steps carefully..
If you are using Microsoft Windows xp,then your processor speed may slow down.Why because Windows Xp carries extraordinary large list of unusual,visual sound effects,menu shadows,high resolution, quality color,fade effects and many.These features may slow down your Processor speed.


By decreasing your Xp resources,your Processor speed may definitely increase.


Firstly disable all the settings in Start up mode.
this can be done by following instructions :

1)Go to “Run”.
2)type “msconfig” in run.
3)Go to Start up.
4)Disable all startup items except Antivirus.

Prefetch files:-


delete all prefetch files.
1)go to run.
2)type prefetch.
3)delete all files.

If you are not having any with work with resolution better you restart your system in Safe Mode.This can be done by continuously by clicking F8 key more than 5times as soon as restart your system. Then a page will open with many options.Choose “Safe Mode“.If you want to do any Networking then choose
“Safe Mode with Networking“.

These two options may remove all your display,resolution,bit size settings etc.
But increase your system speed.

Visual effects:-

1)Right click on “My Computer” >Go to System proporties>Go to Advanced Settings
2)Then click on the Setting in Performance then choose the option”Adjust for best appearance”or you
can choose”custom”.

These options many decrease your system visual effects but increase your system performance.

Automatic updates:-

Even though your system is geniune better to turn off your Automatic updates.There are many reasons
which slow down your processor speed if you turn on Automatic updates.few reasons are:-

1)Most of your RAM speed is used by Xp Operating System.If the resources of your XP is increased then Operating
System may slow down.It indirectly effects the processor speed.
2)If your click on Live Up dates then there may be chances of Virus entering in your system.which leads your
processor speed slow.

Defragmentation:-
This is the major step which increases your Processor speed.
Steps to perform Defragmentation
1)Go to my computer.
2)Right click on C drive. Click on proporties.
3)Choose the option Defragment now.

Removing virus:-
Virus such as Trojan,vorm.exe,sass.exe etc which slow down your processor speed.So download any good antivirus software such as Norton,Spyware terminator,Kaspersky etc.I would perfer Kaspersky it is a best antivirus software.Norton may slow down your system performance.

Few months ago i posted a topic on Internet speed.Several ways to increase Internet speed.
Increase your Bandwidth by 20% Windows uses 20% of your bandwidth! Get it back..

Sunday 4 March 2012

How to set up the Cain & Abel network security tool

First you have to install program, called 'Cain and Abel'. Then, you will be automatically asked to install 'Win Pcap' and you should do that.
After installation you have to click on 'Cain and Abel' program icon with right mouse button and start it as administrator. Then push blue plus sign to scan Mac addresses. After scanning go to the bottom of program window and press APR tab. Then push blue plus icon again. When table appears push first option in first square and first option in second and then OK.
To reload you only need to push the third button at the top of program window.



Don't Get Caught! How to Protect Your Hard Drives from Data Forensics



Over the past few days, a lot of questions have been posed to me about removing sensitive data from hard drives. Ideas seem to range from magnets to microwaves and a lot of things in-between. So, I'd like to explain a little bit about data forensics, how it works, and the steps you can take to be safe.

Often, an anon will delete files from his computer, but that is only half the story, as those files are still really there. And if the careless anon doesn't take steps to fix that, when his door gets kicked in and the FBI takes his hard drive, they will be able to see everything. Don't be that anon.

What Is Computer Forensics? The People on 'CSI'?

Computer forensics is the collection, preservation, analysis and presentation of computer-related evidence. In summary, it helps determine the who, what, where, and when related to a computer-based crime or violation. When the feds are finished arresting you and boxing up your belongings into evidence crates, they will ship them off to the FBI data lab in Washington, D.C.


In addition, an examiner will work to uncover all files on the subject's system. This includes existing active, invisible, deleted, hidden, password-protected, and encrypted files. In many cases, information is gathered during a computer forensics investigation that is not typically available or viewable by the average computer user, such as fragments of data that can be found in the space allocated for existing files (known as “slack space”). Special skills and tools are needed to obtain this type of information or evidence.


An expert can recover pretty much all of your deleted files, along with other data that has not yet been overwritten. As a computer is used, the operating system is constantly writing data to the hard drive. From time to time, the OS will save new data on a hard drive by overwriting data that exists on the drive, but is no longer needed by the operating system, i.e. a deleted file.  So, the ongoing use of a computer system may destroy data that could have been extracted before being overwritten.

How to Protect Yourself

While erasing files simply marks file space as available for reuse, data-wiping overwrites all data space on a storage device, replacing useful data with garbage data. Depending upon the method used, the overwrite data could be zeros (also known as "zero-fill") or could be various random patterns. This is why simply deleting information is never enough. You must take proactive steps to ensure your removal is complete.

We are going to use a great boot disk called DBAN to perform this operation.

Step 1

Obtain and Burn DBAN

You can download the 2.2.6 Beta release from Sourceforge. Once you have the .ISO, all that's left to do is burn it to a blank CD/DVD. Place the media into your drive and restart the computer. Most computers are set to try and boot from the CD drive before the hard disk. If this is not the case, and your computer does not boot the CD drive, you will need to enter your BIOS setup and change the boot priority order.

Step 2

Boot and Run!

After the CD starts, you will be greeted with this screen:


We want to simply press enter here to start DBAN in interactive mode. The main menu shown below should display your hard drive to be wiped.



The next screen shows us DBAN is ready to get down to work, the default method is a DoD Short wipe, and it will work fine for us.




Hit the space bar to select and it will start. Be warned though, the DoD wipe takes a bit of time, especially on larger hard drives. But not as long as a prison sentence would be.

In Closing

DBAM is a great tool to clean a hard drive. I carry a copy of it in my laptop bag when I travel and you should do the same. It is quick and easy and works better then most other tools I have used. Be careful as (obviously) it is impossible to recover if you zap the wrong hard drive!



Thursday 1 March 2012

How to change IP with Proxy

One way to change the IP address of the computer is by using a Proxy.
Now we need to go in deep of this creation for better understanding.

What is a Proxy?

In general a proxy is an IP (Internet Protocol) or an intermediary who can serve as a media liaison with the ISP connection. Proxy is one of the functions can change our computer identity (IP) with a different IP. Here are tips on replacing the IP with a proxy:

For this creation I use the Mozilla Firefox browser.

Consider the following example, before I change to using the tool what is my ip IP and location of the server looks as follows (IP deliberately Blur because the interests of privacy):

what is my ip

After I enter the proxy would look as follows:

How to change IP with Proxy

All identities will be changed by entering the proxy.
Follow these steps to change the IP
In the Browser tap  Tools> Options , then the box will pop up the following configuration

mozilla option tab

Then select Advanced> Network> Settings , will appear as follows:

mozilla advanced option tab

Fill HTTP Proxy with your Proxy, for example I use data
IP: 89.97.232.161
Port: 80
Country: Italy

Then press the OK to terminate. You can find out your computer with the new IP tool what is my IP . while for some you can use proxy to download Proxy here.
If still you are facing problem regarding my post then you can mention in your comments.
Good Luck :)


Sunday 5 February 2012

Mask My IP 2.2.5.6 | Full version Free Download

Mask My IP 2.2.5.6
Mask My IP 2.2.5.6 | 5.3 Mb

When you connect to a network, your computer has a unique identification IP-address as your home address, alerting everyone who you are and where you are. When you visit online stores, or send an e-mail, your IP address associated with this activity, and it identifies you personally. Hackers who steal personal data can get into your computer, monitor your activities, to steal your personal information. Mask My IP program will help to solve this problem. 
Key Features: 
- Hide Real IP Address 
- Surf Anonymously 
- Block ISP Eavesdropping 
- Guard Against Hackers 
- Prevent Identity Theft & Credit Card Fraud 
- Protect All Connections Including Wi-Fi 
- Defend in the Forum once be banned 
- Send Anonymous Emails 
- Easy & Effective 
- Auto / Manual IP Changing 
- 100% Clean & Safe 
- Compatible With A lot

Home Page - http://www.mask-myip.com/
Setup
+
Crack
Mediafire
4shared
2shared

Thursday 26 January 2012

How to Prevent a website from SQL Injection Attack | Full Tutorial


A SQL injection is a common programming error the consequences of which can be really devastating. Many successful hacking attacks start when a hacker discovers a vulnerability that gives an opportunity to inject SQL code.

When an SQL injection occurs, the structure of an SQL query is compromised and as a result you are left at the mercy of the potential hackers. If there is a vulnerability found, hackers can exploit it to gain access not only to your site and database but in extreme cases also to your corporate network. When hackers can inject their code in your code, they can do what they want.

Why do SQL injections happen so often?


The shortest answer is that SQL injections are so popular because of poor programming. Hackers know about the potential of a successful SQL injection attack and they search for vulnerabilities. Unfortunately, very often they don’t have to search hard – vulnerabilities pop right in their face. On the other hand, the risk for a hacker from executing an SQL injection is minor, while the potential rewards are lucrative. What else could a criminal ask for?
Therefore, don’t rely that hackers won’t bother with your site and don’t leave the door widely open. Nobody says that each vulnerability of this type will turn into an attack but it’s not wise to take any chances. The good news is that fortunately, SQL injections are also relatively easy to prevent.

Steps to prevent a SQL injection attack


Basically, there are two fire-proof ways to make an SQL injection impossible:


  • Don’t use dynamic database queries.
  • Don’t accept user input in queries.

However, obviously these two steps can’t be done because if you follow them, then the sites you can create will be very static and in today’s Web this is not a solution. What you can do, is minimize the risks when using dynamic queries and user input. Here are some basic principles that apply to any programming language:

1. Patch your SQL server regularly


Before we get into the coding part of the advice how to prevent an SQL injection, we need to start with the fundamental issues. SQL injections might be a frequent programming error but they aren’t the only way for a hacker to break into. If your underlying software – i.e. the database and the operating system have vulnerabilities, then your efforts to secure your code become obsolete. This is why you should always patch your system, especially your SQL server.

2. Limit the use of dynamic queries

As I already mentioned, dynamic queries are the door to SQL injections. Of course, it might not be realistic to expect that all dynamic queries can be trashed right away but some of the ways out are stored procedures, parameterized queries, and above all – prepared statements. The exact approaches vary from one programming language to the other but basically any programming language offers good substitutes of dynamic queries.

For instance, the PreparedStatement() with bind variables in Java, or the SqlCommand() and OleDbCommand() with bind variables in PHP, or strongly typed parameterized queries with bindParam() in PHP are all possibilities to explore.

3. Escape user input


The second biggest evil for SQL injections is user input. While you can’t always avoid user input completely, the next best thing is to escape it. Escaping user input doesn’t do as good job as limiting dynamic queries but still it can stop many SQL injection attacks. For instance, if you are using PHP, for GET and POST, use htmlspecialchars() to escape XSS characters and addslashes(), in case you using database. Alternatively, you can escape user input from inside your database but since the exact code varies from one database to the next, you should check with the docs of your database for the exact syntax to use.

4. Store database credentials in a separate file

In order to minimize the damage in case of an SQL injection attack, always store database credentials in a separate file. This way even if a hacker manages to break in, he or she won’t benefit much.

5. Use the principle of least privilege

The principle of least privilege is a security cornerstone and it applies to SQL injections as well. For instance, when you grant a user access only to the tables he or she needs rather to the whole database; this drastically reduces the damage potential.

6. Turn magic quotes off

Turning the magic_quotes_gpc variable off can also stop some SQL injection attacks. Unfortunately, this isn’t always a reliable measure because sometimes magic quotes might be off and you are unaware of this but still it is better than nothing. In any case, you need to have code to substitute quotes with slashes. Here is the simplest way to do it:

if (!get_magic_quotes_gpc()) {
$username = addslashes($username);
$password = addslashes($password);
}

7. Disable shells


Many databases offer shell access which essentially is what an attacker needs. This is why you need to close this door. Consult your DB’s documentation about how to disable shell access for your particular database.

8. Disable any other DB functionality you don’t need

In addition to the shells there are many other functions in a database you don’t need. While not all of them are a security risk, the general rule here is that less is more. Just remove or at least disable any functionality you can do without.

9. Test your code

Finally, the last step to ensure your code is SQL injections-proofed is to test it. There are automated tools you can use to do this and one of the most universal is the SQL Inject Me Firefox extension. This tool has many options and many tests the best is if you have the time to run all of them.

All these steps to prevent an SQL injection are relatively easy to implement but failing to do so could make a huge difference. If you stick to these rules, you will drastically reduce the risk of your site being compromised via a SQL injection. Still, you can never be 100 per cent sure that you are completely protected against such an attack (or any other type of attack, to be more precise) and this is why you need to keep an eye on your logs so if a breach occurs, you will know it right away and react appropriately to minimize the damage.

For more about website security you can visit my all posts on WebSite Security
Thanks for reading this creation.
Be updated always here :)