Image Source: babble
Majority of us have started using Internet not just for searching information, but to pay bills, buy things, money transfer, work from home and much more. Many hackers take advantage of this and are trying various methods to steal sensitive information like username, password, credit card numbers, etc. This is referred to as identity theft. How to survive this and safeguard yourself from identity theft? Here are top 5 tips to protect you from identity theft.
1. Have you received an e-mail asking for personal information like your birthday, your username, password or your mother’s maiden name, etc? If yes, please do not respond to such e-mails even if they look legit. Such emails will look like they were sent by your bank or Credit Card Company. This is the main reason why many part away with their personal information. Banks or any other financial institutions will never ask for such sensitive information through e-mail. If you have any doubts on whether it is really sent by your bank, call the customer care and clarify your doubt.
2. Check whether there are any grammatical mistakes or typographical errors are present. No bank or financial institution will send e-mails that are grammatically incorrect or one with lots of spelling mistakes. If you find even a single mistake, rest assured it is from a hacker and not from your financial institution.
3. Some people when they receive such suspicious e-mails, they would try to call up the bank using the number provided in the e-mail. There are 100% chances that this number is not the number of your bank; therefore, do not call your bank using the number provided in the e-mail. Call up using the number you normally use to call your bank or financial institution and check whether they really sent such an e-mail.
4. If the e-mail that you received is not from trusted source, why take chance of opening it. Delete the e-mail without any hesitation. These e-mails may most of the times contain viruses or spyware or malware. When you open these files, these malicious programs get installed in your system and will start sending information to hackers’ computer.
5. Do not use the same password to all websites that you use. Keep changing the passwords at least once in every 3 months. Use a combination of alphabets (both upper and lowercase), numbers, and special characters. Many websites insist that you change the password frequently. When signing up for a website, almost majority of the websites will show how strong your password is. Change the password if it is weak.
Here's a small pie chart that details about various types of identity theft.
Image Source: cybercrimeonline
With these tips, safeguard your system against identity theft and phishing attacks.
Cryptography
Cryptograthy is used for security. Simply Cryptography is converting the understanable text to not understanable text.
Encryption means converting plaintext into cipher text.
Decryption means converting cipher text into plain text.
Purpose of cryptograthy
Cryptography is used to protect the data from theft. And also used for user authentication.
Types of Cryptographic algorithms
There are 3 types of cryptographic algorithm. They are
- Secret Key Cryptography
- Public Key Cryptography
- Hash Functions
Secret Key Cryptography:
This cryptography is also known as Symmetric. Uses single key for both encryption and decryption.
Public Key Cryptography
This cryptography is also known as Asymmetric. Uses Two key for encryption and decryption. One for encryption and other for decryption.
Hash Function
This type uses mathematical transformation to encrypt and decrypt the data.
How should a person start hacking??
That means what should be the first step of him in the world of hacking??
Hacking is not a thing which someone can learn from others. But, ya at first he should see how hackers work, and also have a look on the new hacking tips!!
He should be very much active and all the time should keep his eyes in the world of computing, and the best way to do is Internet Surfing especially GOOGLE.
You can search different things everyday,and by reading then you will know the computing world very well!! Then you can search the hacking tips and should understand yourself,
How these are working !! Doing all these things you will get confidence and also get knowledge!!
Then you can think the things yourself on your own view and that will be the start of your own hacking .
What is a Virus?
A virus is a program that is able to replicate, that is create (possibly modified) copies of itself. Like biological viruses, computer viruses can spread quickly and are often difficult to eradicate. They can attach themselves to just about any type of file and are spread as files that are copied and sent from individual to individual. The replication is intentional, not just a side-effect.
Several years ago, most viruses spread primarily via floppy disk, but the internet has introduced new virus distribution mechanisms. With email now used as an essential business communication tool, virus are spreading faster than ever. Viruses attached to email messages can infect an entire enterprise in a matter of minutes, costing companies millionsof dollars annually in lost productivity and clean-up expenses.
More than 60,000 viruses have been identified, and 400 new ones are created every month, according to the International Computer Security Association (ICSA).
Life Cycle of a Virus:
The life cycle of a virus begins when it is created and ends when it is completely eradicated. A virus has to attach itself to a "host", in the sense that execution of the host implies execution of the virus. The following outline describes each stage of its life cycle.
Creation : Until recently, creating a virus required some knowledge of the computer programming languages. Today anyone with basic programming knowledge can create a virus. Typically, individuals who wish to cause widespread, random damage to systems create viruses. A virus may be modified, either by the original author or someone else, so that a more harmful version of it appears.
Replication : Viruses typically replicate for a long period of time before they activate, allowing plenty of time to spread.
Activation : Viruses with damage routines will activate when certain conditions are met, for example, on a certain date or when the infected user performs a particular action. Viruses without damage routines do not activate, instead causing damage by stealing storage space.
Discovery : When a virus is detected and isolated, it is sent to the anti-virus software developers. Discovery normally takes place atleast one year before the virus might have become a threat to the computing community.
Assimilation : At this point, anti-virus software developers modify their software so that it can detect the new virus.
Eradication : If enough users install up-to-date virus protection software, any virus can be wiped out. So far no viruses have disappeared completely, but some have long ceased to be a major threat.
Some Other Terminologies:
Trojan : A Trojan is a program that pretends to do something useful or interesting, but when it is run, it may have some harmful effect, like scrambling the FAT (File Allocation Table), formatting the hard disk or releasing a virus. The main difference between a Trojan and a virus is the inability to replicate. Trojans cause damage, unexpected system behavior, and compromise the security of systems, but do not replicate. If it replicates, then it should be classified as a virus.
Malware : Short for malicious software - refers to any malicious or unexpected program or code such as viruses, Trojans, and droppers. not all malicious programs or codes are viruses.
Worms : Unlike viruses, worms do not require a host.
Boot Sector Viruses : This virus infects boot sectors on diskettes and / or hard disks. It replaces the original boot sector with itself and stores the original boot sector somewhere else.
There some tricks with the use of which you can apply security and also will get some knowledge
1.) To see internal & external IP :
a. Internal IP
method 1st
steps : a. My N/W Places [ right click ]
b. properties
c. Lan [ right click ] --> properties
d. TCP/IP settings
e. properties
f.We can see the manually configured IP address
method 2:
steps : a. go to run
b. type cmd
c. on smd prompt, write ipconfig/all
d. after this cmd, we can see the ip address & other imptortant things also.
method 3:
steps : a. got to taskbar[ LAN icon ]
b. right click
c. go to satus
d. click on support
e. now u can see IP
b. External IP
method 1st :
www.whatismyip.us
method 2:
www.whatismyip.com
2.) To Block Website :
method 1st :
steps: a. open the "c" drive [ the only drive in which window is installed ]
b. windows
c. drivers
d. etc
e. hosts
f. open in notepad
g. type the website which u want to be block( at the place of local host )
h. save this
i. check taht, site blocked or not.
method 2:
steps: a. got to internhet explorer properties
b. privacy
c. sites
d. type the address of website which u want to be block
e. ok & then apply
f. check that blocked or not.
3. To find the MAC address
method 1:
steps: a. got to task bar
b. Right Click --> status
c. support
d. details
e. We can see the MAC address
method 2:
steps: a. My N/W places
b. Right click --> properties
c. LAN R.C. --> status
d. support
e. Details
6. then see the MAC address
other names of MAC address :
a. Physical
b. N/W
c. hardware address
d. LAN address
e. Ethernet address
4.) To hide the MAC address
steps: 1. My N/W places
2. Right click --> properties
3. LAN [ Disable the LAN ]
4. Go To Lan properties
5. TCP/IP
6. Configure [ ask for proceed , click on " yes" ]
7. advanced
8. Locally Administered address [ select it]
9. click on the value
10. type the new MAC address [ 12 HexaDecimal code ]
11. ok
12. Enable LAN
13. we cna see the new MAC address
14. Restart [ for old MAC address ]
5.) NETMEETING :
Netmeeting is the feature of windows through which we can communicate, chat, file transfer and desktop share with all the pc connected through same LAN.
it dont need any internet connection
steps: 1. configure the netmeeting
2. type on run command - " cong "
3. after that a wizard of netmeeting will appear
4. click next --> next
5. In netmeeting we can share desktop, chat, file transfer, painting
6. Suppose that these are two ppc PC1 & PC2 , Pc1 wants to take the desktop of Pc2, then first it will call through IPaddress, if PC2 acept the call, then it can take the desktop of pc2.
Now call the another pc with the help of IP address of anotehr pc. and enjoy
Hope u will like it. please give ur comments