<?xml version="1.0" encoding="UTF-8" standalone="no"?><?xml-stylesheet href="http://www.blogger.com/styles/atom.css" type="text/css"?><rss xmlns:itunes="http://www.itunes.com/dtds/podcast-1.0.dtd" version="2.0"><channel><title>Basics of Ethical Hacking | Tutorials, Tips and Tricks</title><description>Learn different Ethical Hacking techniques for beginner or intermediate with simple step by step tutorials and how to stay safe online.</description><managingEditor>noreply@blogger.com (Harwinder Kumar)</managingEditor><pubDate>Wed, 4 Feb 2026 14:11:01 +0530</pubDate><generator>Blogger http://www.blogger.com</generator><openSearch:totalResults xmlns:openSearch="http://a9.com/-/spec/opensearchrss/1.0/">318</openSearch:totalResults><openSearch:startIndex xmlns:openSearch="http://a9.com/-/spec/opensearchrss/1.0/">1</openSearch:startIndex><openSearch:itemsPerPage xmlns:openSearch="http://a9.com/-/spec/opensearchrss/1.0/">25</openSearch:itemsPerPage><link>http://www.basicsofhacking.com/</link><language>en-us</language><itunes:explicit>no</itunes:explicit><itunes:subtitle>Learn different Ethical Hacking techniques for beginner or intermediate with simple step by step tutorials and how to stay safe online.</itunes:subtitle><itunes:category text="Technology"/><itunes:owner><itunes:email>noreply@blogger.com</itunes:email></itunes:owner><item><title>Zero-Day Attacks- How Safe Are You?</title><link>http://www.basicsofhacking.com/2017/06/zero-day-attacks-how-safe.html</link><category>GUEST POSTS</category><category>WEBSITE HACKING</category><author>noreply@blogger.com (Harwinder Kumar)</author><pubDate>Mon, 12 Jun 2017 14:21:00 +0530</pubDate><guid isPermaLink="false">tag:blogger.com,1999:blog-8198217290464183069.post-7649431210802394203</guid><description>&lt;div dir="ltr" style="text-align: left;" trbidi="on"&gt;&lt;div style="background-color: #666666; color: white; font-weight: normal; text-align: center;"&gt;&lt;div style="text-align: center;"&gt;This is a guest post by Meenakshi Nagri.&lt;/div&gt;&lt;/div&gt;&lt;div style="text-align: justify;"&gt;In the past couple of years, there has been a rise in cyber-attacks which has eventually pushed for more reliable and better security capabilities such as protection, code security, encryption, authorization, so on and so forth. Moreover, it is imperative to protect global business and critical infrastructure from such cyber-attacks.&lt;/div&gt;&lt;div style="text-align: justify;"&gt;&lt;br /&gt;
&lt;/div&gt;&lt;div style="text-align: justify;"&gt;An average user or even a web-savvy user has a little knowledge about which application has better security standards. It is imperative to evaluate the safety of applications. There are some security protocols which should be maintained without deviating from the end goal.&lt;br /&gt;
&lt;div class="separator" style="clear: both; text-align: center;"&gt;&lt;a href="https://blogger.googleusercontent.com/img/b/R29vZ2xl/AVvXsEi2BAdu-zIvwTqrGdwrow6FnDAK9uZjKgfxfL11Q2Ji3v-bD4PvdQ2-prhGc-Ue-C0JbqPh9B7H3UhVkL32vu1kWzrd1n_zFme06DrNutAxJn2s9VIja5zQ8M-g3ZlvIkjtEZma8kQIloo/s1600/zero-day-cyber-attack.jpg" imageanchor="1" style="margin-left: 1em; margin-right: 1em;"&gt;&lt;img alt="Zero Day Cyber Attack" border="0" data-original-height="240" data-original-width="864" height="176" src="https://blogger.googleusercontent.com/img/b/R29vZ2xl/AVvXsEi2BAdu-zIvwTqrGdwrow6FnDAK9uZjKgfxfL11Q2Ji3v-bD4PvdQ2-prhGc-Ue-C0JbqPh9B7H3UhVkL32vu1kWzrd1n_zFme06DrNutAxJn2s9VIja5zQ8M-g3ZlvIkjtEZma8kQIloo/s640/zero-day-cyber-attack.jpg" title="Zero Day Cyber Attack" width="640" /&gt;&lt;/a&gt;&lt;/div&gt;&lt;div class="separator" style="clear: both; text-align: center;"&gt;&lt;/div&gt;&lt;/div&gt;&lt;div style="text-align: justify;"&gt;Both organisations and individuals should strive to meet all the necessary security protocols and most importantly evaluate and meet all the security requirements and be assured that they meet the baseline for data security.&lt;/div&gt;&lt;div style="text-align: justify;"&gt;&lt;br /&gt;
&lt;/div&gt;&lt;h3&gt;Vulnerability Timeline&lt;/h3&gt;&lt;div style="text-align: justify;"&gt;&lt;/div&gt;&lt;div style="text-align: justify;"&gt;A study reveals that about 20% of the global organisations rank &lt;a href="https://www.grahamcluley.com/microsoft-zero-day-vulnerability-was-being-exploited-for-cyberespionage/" rel="nofollow" target="_blank"&gt;cyber espionage&lt;/a&gt; as the most pressing concern, therefore, making it a significant threat to their business. The number of zero days is continually rising and with each attack being more severe. The primary targets under the radar have been government institutions, organisations from various sectors, individuals and so on.&lt;/div&gt;&lt;div style="text-align: justify;"&gt;&lt;br /&gt;
&lt;/div&gt;&lt;div style="text-align: justify;"&gt;The basic fundamental of cyber espionage is to expose the private information of the concerned person or company. Cyber espionage tops the list of security concerns as it repercussions can be felt even after eliminating the threat as it damages trade and creates a dent in the global economy. &lt;script async="" src="//pagead2.googlesyndication.com/pagead/js/adsbygoogle.js"&gt;&lt;/script&gt; &lt;!-- BOH Posts Middle --&gt; &lt;br /&gt;
&lt;ins class="adsbygoogle" data-ad-client="ca-pub-7383486949799525" data-ad-format="auto" data-ad-slot="2433698148" style="display: block;"&gt;&lt;/ins&gt;&lt;script&gt;(adsbygoogle = window.adsbygoogle || []).push({}); &lt;/script&gt; &lt;/div&gt;&lt;div style="text-align: justify;"&gt;Ransomware, malware attack, phishing, etc. are some common cyber-attacks. In particular, as recent has been the case with &lt;b&gt;WannaCry ransomware&lt;/b&gt; attack. It was reported that it had &lt;b&gt;infected more than 230,000 computers&lt;/b&gt; worldwide. Many organisations were hit in over 150 countries. The common tactic is to take advantage of the gaps left in the networks that have businesses partnerships and government agencies. Simply put, through these networks, these entities share valuable information that hackers can penetrate into thus easily getting access to useful information.&lt;/div&gt;&lt;div style="text-align: justify;"&gt;&lt;br /&gt;
&lt;/div&gt;&lt;div style="text-align: justify;"&gt;The question that arises next is why these entities get affected by cyber-attacks? The reason being, the lack of proper &lt;a href="http://www.basicsofhacking.com/search/label/BASICS%20OF%20ETHICAL%20HACKING" target="_blank"&gt;security implementation&lt;/a&gt; of protocols. Organizations, enterprises, individuals need to be informed of cyber-attack activities, so they better recognize the risk of exposure before it is unsolicited exposed.&lt;/div&gt;&lt;div style="text-align: justify;"&gt;&lt;br /&gt;
&lt;/div&gt;&lt;h3&gt;Threats are Constantly Evolving&lt;/h3&gt;&lt;div style="text-align: justify;"&gt;While recently catching up with news, you may have heard terms like &lt;b&gt;‘zero day’&lt;/b&gt; and &lt;b&gt;‘cyber conflict’&lt;/b&gt; over and over again. The technology has bestowed us with new exciting security protocols. This implies that with each advancement, we are better at adding an extra layer of security; however, as these approaches become obsolete, they can be bypassed quickly thus leaving a void for the cyber-attacks.&lt;/div&gt;&lt;div style="text-align: justify;"&gt;&lt;br /&gt;
&lt;/div&gt;&lt;div style="text-align: justify;"&gt;A &lt;a href="https://blog.malwarebytes.com/101/2017/04/what-is-a-zero-day/" target="_blank"&gt;zero-day&lt;/a&gt; vulnerability refers to such voids left in software which is unknown to the developers. This flaw is then exploited by the attackers with malicious intent even before the developers become aware of it. To counter the vulnerabilities, a software patch is released to fix the issue. Once such example is of Microsoft’s Patch Tuesday i.e. &lt;a href="https://arstechnica.co.uk/security/2017/05/microsoft-zero-day-defence-eerily-good/" rel="nofollow" target="_blank"&gt;Microsoft releases&lt;/a&gt; security patches on every second or fourth Tuesday of each month for its products.&lt;/div&gt;&lt;div style="text-align: justify;"&gt;&lt;div class="separator" style="clear: both; text-align: center;"&gt;&lt;a href="https://blogger.googleusercontent.com/img/b/R29vZ2xl/AVvXsEgx_zVMe0lZgn5Hn-ODovIVqSSMinSTTtkYbpUSgKnn_9WQF7gq7MyBqlGo1l-FOPx2Gh-1gpHywidxF8BSIsz_TXr8hyphenhyphencNtmHxl9IT2BFB-ADJF5tydCTLkqPmk9HCXZ7JvVBc39TXzUU/s1600/zero-day-attack.png" imageanchor="1" style="margin-left: 1em; margin-right: 1em;"&gt;&lt;img alt="zero-day-attack" border="0" data-original-height="240" data-original-width="250" src="https://blogger.googleusercontent.com/img/b/R29vZ2xl/AVvXsEgx_zVMe0lZgn5Hn-ODovIVqSSMinSTTtkYbpUSgKnn_9WQF7gq7MyBqlGo1l-FOPx2Gh-1gpHywidxF8BSIsz_TXr8hyphenhyphencNtmHxl9IT2BFB-ADJF5tydCTLkqPmk9HCXZ7JvVBc39TXzUU/s1600/zero-day-attack.png" title="zero-day-attack" /&gt;&lt;/a&gt;&lt;/div&gt;&lt;/div&gt;&lt;div style="text-align: justify;"&gt;One of the reasons of the cyber espionage is the lack of applying these tactics i.e. to update their system with recently security updates. Systems running under unsupported operating systems or older versions were substantially exposed.&lt;/div&gt;&lt;div style="text-align: justify;"&gt;&lt;br /&gt;
&lt;/div&gt;&lt;div style="text-align: justify;"&gt;Simply put, developers create software that contains some voids and attackers spot the vulnerability before developers can act and exploits it. Once the patches are released, the exploits are no longer a threat.&lt;/div&gt;&lt;div style="text-align: justify;"&gt;&lt;br /&gt;
&lt;/div&gt;&lt;h3&gt;The Role of Security Standard&lt;/h3&gt;&lt;div style="text-align: justify;"&gt;As attackers look for advanced ways to exploit the vulnerabilities, new procedures and techniques are being adopted by them. They use &lt;a href="http://www.basicsofhacking.com/search/label/BASICS%20OF%20ETHICAL%20HACKING" target="_blank"&gt;hacking methods&lt;/a&gt; such as watering hole attacks, spear phishing attack, Whaling, Port scanning, to name a few.&lt;/div&gt;&lt;div style="text-align: justify;"&gt;&lt;br /&gt;
&lt;/div&gt;&lt;div style="text-align: justify;"&gt;Cyber security is a bigger challenge as one needs to implement advanced protocols and meet safety standards when required. Even though organizations may fulfill all the criteria or the developers checklist everything on the standards of security, there’s always room for enhancing the basic security capabilities. The fast evolving tactics and unpredictable threats used by cyber criminals have pushed for advanced evaluation and monitoring of services.&lt;/div&gt;&lt;div style="text-align: justify;"&gt;&lt;br /&gt;
&lt;/div&gt;&lt;div style="text-align: justify;"&gt;As the attackers adopt the latest technology, the security community is pushing for other defensive stances as well. They have started putting steps in place to guard against cyber- attack. Struggling to keep up with the security standards means to put the critical information and infrastructure at risk.&lt;/div&gt;&lt;div style="text-align: justify;"&gt;&lt;br /&gt;
&lt;/div&gt;&lt;div style="text-align: justify;"&gt;Adopting techniques to protect the cyber environment is the need of the hour. The primary objective is to mitigate and prevent any potential for cyber-attacks and for that, more and more companies are implementing various security safeguards, risk management approaches, guidelines, policies, technologies, investing in data recovery services, so on and so forth.&lt;/div&gt;&lt;div style="text-align: justify;"&gt;&lt;br /&gt;
&lt;/div&gt;&lt;h3&gt;A Helping Hand&lt;/h3&gt;&lt;div style="text-align: justify;"&gt;Zero-day, cyber conflict and cyber espionage all are a broader picture of cyber-attack, and nonetheless, make up for most of the cyber security challenge. The users need not be security experts to protect themselves against the attacks.&lt;/div&gt;&lt;div style="text-align: justify;"&gt;&lt;ol&gt;&lt;li&gt;Use a top antivirus that will ensure that you are protected against both known &amp;amp; unknown vulnerability.&lt;/li&gt;
&lt;li&gt;Time again IT experts ask users to update their software’s, the Update may include protection from a recently discovered bug.&lt;/li&gt;
&lt;li&gt;Upgrade the browsers, push out an automatic update of the browsers regularly.&lt;/li&gt;
&lt;/ol&gt;&lt;/div&gt;&lt;div style="text-align: justify;"&gt;&lt;a href="http://www.stellardatarecovery.co.uk/" target="_blank"&gt;Stellar Data Recovery&lt;/a&gt; is one such name which is capable of countering such cyber-attacks; thereby, it presents itself as a reliable partner when it comes to data security.&lt;/div&gt;&lt;div style="text-align: justify;"&gt;&lt;br /&gt;
&lt;/div&gt;&lt;h3&gt;The Final Word&lt;/h3&gt;&lt;div style="text-align: justify;"&gt;We will always be wooed by the latest technological advancement which also means that the old ones will become obsolete; thereby, adopting new security approaches is equally essential. Cyber-attacks expose valuable assets gaining unauthorized access; therefore, businesses need to defend themselves against it and incorporate security protocols to mitigate the risk.&lt;/div&gt;&lt;/div&gt;&lt;div class="blogger-post-footer"&gt;&lt;hr /&gt; &lt;a href="http://www.basicsofhacking.com"&gt;Basics of Ethical Hacking&lt;/a&gt;&lt;/div&gt;</description><media:thumbnail xmlns:media="http://search.yahoo.com/mrss/" height="72" url="https://blogger.googleusercontent.com/img/b/R29vZ2xl/AVvXsEi2BAdu-zIvwTqrGdwrow6FnDAK9uZjKgfxfL11Q2Ji3v-bD4PvdQ2-prhGc-Ue-C0JbqPh9B7H3UhVkL32vu1kWzrd1n_zFme06DrNutAxJn2s9VIja5zQ8M-g3ZlvIkjtEZma8kQIloo/s72-c/zero-day-cyber-attack.jpg" width="72"/><thr:total xmlns:thr="http://purl.org/syndication/thread/1.0">0</thr:total></item><item><title>How To Protect / Secure Your Wi-Fi Network?</title><link>http://www.basicsofhacking.com/2017/06/protect-secure-wi-fi-network.html</link><category>BASICS OF ETHICAL HACKING</category><author>noreply@blogger.com (Harwinder Kumar)</author><pubDate>Fri, 2 Jun 2017 18:54:00 +0530</pubDate><guid isPermaLink="false">tag:blogger.com,1999:blog-8198217290464183069.post-4694119319716671465</guid><description>&lt;div dir="ltr" style="text-align: left;" trbidi="on"&gt;&lt;div style="text-align: justify;"&gt;Hello All, I am back to blogging again after 3-4 years motivated and ready than ever before. For 5 years now, I am working online on &lt;a href="https://www.upwork.com/fl/harwinderkumar" rel="nofollow" target="_blank"&gt;Upwork&lt;/a&gt; and some other &lt;a href="http://www.basicsofhacking.com/p/hire-me.html" target="_blank"&gt;freelancing sites&lt;/a&gt; as security expert &lt;b&gt;helping clients fixing their hacked sites/servers&lt;/b&gt; so could not manage much time for writing but will try to regularly update with new &lt;a href="http://www.basicsofhacking.com/search/label/BASICS%20OF%20ETHICAL%20HACKING" target="_blank"&gt;hacking tutorials&lt;/a&gt; and tricks from now onwards. I have recently changed the look/design of site as well so I hope you would like it :)&lt;/div&gt;&lt;div style="text-align: justify;"&gt;&lt;br /&gt;
&lt;/div&gt;&lt;div style="text-align: justify;"&gt;Using &lt;b&gt;man-in-the-middle&lt;/b&gt; attack, someone can eavesdrop on your network traffic and can easily get all administrator details and have un-authorized access to your Wi-Fi network.&lt;/div&gt;&lt;div style="text-align: justify;"&gt;&lt;br /&gt;
&lt;/div&gt;&lt;div style="text-align: justify;"&gt;So today I am going to provide some basic approaches to &lt;b&gt;secure your home or office Wi-Fi network&lt;/b&gt; from hackers.&lt;/div&gt;&lt;div style="text-align: justify;"&gt;&lt;br /&gt;
&lt;/div&gt;&lt;h3 style="text-align: justify;"&gt;Logging to Router and Change Default Password&lt;/h3&gt;&lt;div&gt;&lt;div style="text-align: justify;"&gt;You have to look at back of your router and get login details like &lt;b&gt;IP Address&lt;/b&gt;, &lt;b&gt;Username&lt;/b&gt; and &lt;b&gt;Password&lt;/b&gt;. Usually details are written at back and if not you may call your ISP (Internet Service Provider) if they gave you the router otherwise find the model number and look up information on &lt;a href="http://www.basicsofhacking.com/search/label/GOOGLE%20HACKS" target="_blank"&gt;Google&lt;/a&gt;.&lt;/div&gt;&lt;/div&gt;&lt;div class="separator" style="clear: both; text-align: center;"&gt;&lt;/div&gt;&lt;div style="text-align: justify;"&gt;&lt;br /&gt;
&lt;/div&gt;&lt;div class="separator" style="clear: both; text-align: center;"&gt;&lt;a href="https://blogger.googleusercontent.com/img/b/R29vZ2xl/AVvXsEivDzFUGLKoI0tDou1gPPabgXR8_ReFrpuY8YlGQaQYdvitUEAhpwlxt6ARBvRjU7pnJAcUOBOJ-upP3Yfsy78n3MWeym7OkRJ98zGQdTOB6BB0V1xKDka8U-d8ztg7IgFyhJwZjULM78A/s1600/D-Link+Router+Back.jpg" imageanchor="1" style="margin-left: 1em; margin-right: 1em;"&gt;&lt;img alt="D-Link Router Back" border="0" data-original-height="1023" data-original-width="1600" height="255" src="https://blogger.googleusercontent.com/img/b/R29vZ2xl/AVvXsEivDzFUGLKoI0tDou1gPPabgXR8_ReFrpuY8YlGQaQYdvitUEAhpwlxt6ARBvRjU7pnJAcUOBOJ-upP3Yfsy78n3MWeym7OkRJ98zGQdTOB6BB0V1xKDka8U-d8ztg7IgFyhJwZjULM78A/s400/D-Link+Router+Back.jpg" title="D-Link Router Back" width="400" /&gt;&lt;/a&gt;&lt;/div&gt;&lt;div&gt;&lt;div style="text-align: justify;"&gt;&lt;br /&gt;
&lt;/div&gt;&lt;div style="text-align: justify;"&gt;Visit &lt;b&gt;IP Address &lt;/b&gt;&lt;a href="http://www.basicsofhacking.com/2011/01/javascript-shaking-browser.html" target="_blank"&gt;in browser&lt;/a&gt; and enter login details when asked. This page is only accessible when you are using the router’s Wi-Fi network.&lt;/div&gt;&lt;div style="text-align: justify;"&gt;&lt;br /&gt;
&lt;/div&gt;&lt;div style="text-align: justify;"&gt;After logging in, first thing you have to do is to &lt;b&gt;change default password&lt;/b&gt; setup by router. Settings may vary depending on which company router you using (mentioned image is for &lt;b&gt;D-Link&lt;/b&gt; routers), some routers provide options to change default admin username as well.&lt;br /&gt;
&lt;br /&gt;
&lt;/div&gt;&lt;div class="separator" style="clear: both; text-align: center;"&gt;&lt;a href="https://blogger.googleusercontent.com/img/b/R29vZ2xl/AVvXsEgvOGeCe0xuRXRjNspUfknSfJeBnTgPLejz9h9Ah0BMT1iCw3aQYjJpPAFIGRh-10_QspW4UH-bxsFdFymI2uBsjL3PnmbFeiuKqo1r4YPonagPsJO8WBVKfGVDYUKmTBGBbwZ8mjVrruA/s1600/Change+D-Link+Admin+Password.PNG" imageanchor="1" style="margin-left: 1em; margin-right: 1em;"&gt;&lt;img alt="Change D-Link Admin Password" border="0" data-original-height="456" data-original-width="848" height="215" src="https://blogger.googleusercontent.com/img/b/R29vZ2xl/AVvXsEgvOGeCe0xuRXRjNspUfknSfJeBnTgPLejz9h9Ah0BMT1iCw3aQYjJpPAFIGRh-10_QspW4UH-bxsFdFymI2uBsjL3PnmbFeiuKqo1r4YPonagPsJO8WBVKfGVDYUKmTBGBbwZ8mjVrruA/s400/Change+D-Link+Admin+Password.PNG" title="Change D-Link Admin Password" width="400" /&gt;&lt;/a&gt;&lt;/div&gt;&lt;div style="text-align: justify;"&gt;&lt;br /&gt;
&lt;/div&gt;&lt;div style="text-align: justify;"&gt;&lt;b&gt;Why should you change the default network password?&amp;nbsp;&lt;/b&gt;With default password, someone can easily login to router setting (by &lt;b&gt;default gateway IP&lt;/b&gt; which is not hard to find) and have un-authorized access to change router settings. So changing password would not allow anyone to access router settings except you.&lt;br /&gt;
&lt;br /&gt;
&lt;/div&gt;&lt;h3 style="text-align: justify;"&gt;SSID, Password and WPA2 Encryption&lt;/h3&gt;&lt;div style="text-align: justify;"&gt;Pick a SSID (network name) which is not relevant to your identity or draw attention from hackers.&lt;/div&gt;&lt;div style="text-align: justify;"&gt;Use a &lt;a href="http://www.basicsofhacking.com/2012/05/4-password-security-tips-you-dont-see.html" target="_blank"&gt;strong password&lt;/a&gt; and once you do that please make sure to &lt;b&gt;update passwords on all connected devices&lt;/b&gt;.&lt;script async src="//pagead2.googlesyndication.com/pagead/js/adsbygoogle.js"&gt;&lt;/script&gt;&lt;br /&gt;
&lt;!-- BOH Posts Middle --&gt;&lt;br /&gt;
&lt;ins class="adsbygoogle"      style="display:block"      data-ad-client="ca-pub-7383486949799525"      data-ad-slot="2433698148"      data-ad-format="auto"&gt;&lt;/ins&gt;&lt;br /&gt;
&lt;script&gt;(adsbygoogle = window.adsbygoogle || []).push({}); &lt;/script&gt;&lt;/div&gt;&lt;div style="text-align: justify;"&gt;For encryption, make sure you &lt;b&gt;choose WPA2&lt;/b&gt; and not WEP/WPA. WPA2, short for Wi-Fi Protected Access 2, the follow on security method to WPA for wireless networks that provides stronger data protection and network access control. It provides enterprise and consumer Wi-Fi users with a high level of assurance that only authorized users can access their wireless networks&lt;br /&gt;
&lt;br /&gt;
&lt;/div&gt;&lt;h3 style="text-align: justify;"&gt;Firmware Update&lt;/h3&gt;&lt;div style="text-align: justify;"&gt;Please consider updating firmware of your router which you can find under admin settings. Using the latest firmware version ensures you have all available security patches.&lt;br /&gt;
&lt;br /&gt;
&lt;/div&gt;&lt;h3 style="text-align: justify;"&gt;Disable WPS&lt;/h3&gt;&lt;div style="text-align: justify;"&gt;WPS, short for Wi-Fi Protected setup is insecure so you should disable it. This is a button on your router.&lt;br /&gt;
&lt;br /&gt;
&lt;/div&gt;&lt;h3 style="text-align: justify;"&gt;Guest Networks&lt;/h3&gt;&lt;div style="text-align: justify;"&gt;Some routers provide this option using which you can &lt;b&gt;add guest network&lt;/b&gt; which creates a separate network for guests. It is a totally different network with a different password from the network. This means devices connected to &lt;a href="http://www.basicsofhacking.com/search/label/GUEST%20POSTS" target="_blank"&gt;the Guest&lt;/a&gt; network will NOT be able to share files and printers connected to the main network.&lt;br /&gt;
&lt;br /&gt;
&lt;/div&gt;&lt;div class="separator" style="clear: both; text-align: center;"&gt;&lt;a href="https://blogger.googleusercontent.com/img/b/R29vZ2xl/AVvXsEjPYsyPLIU5xGU2lsAP29YnoCvlV720GbMJCiXZiy_dCVltLaGJBZ7fmg2eyXzRnEYZfSdXaue3HhMX63bgm_Eb8IZS_FTPtZ_NrK-SKLWrj457cBI09WXvijkiFSfjKEECVlavl0a7yJg/s1600/Guest+Network.PNG" imageanchor="1" style="margin-left: 1em; margin-right: 1em;"&gt;&lt;img alt="Guest Network" border="0" data-original-height="215" data-original-width="683" height="125" src="https://blogger.googleusercontent.com/img/b/R29vZ2xl/AVvXsEjPYsyPLIU5xGU2lsAP29YnoCvlV720GbMJCiXZiy_dCVltLaGJBZ7fmg2eyXzRnEYZfSdXaue3HhMX63bgm_Eb8IZS_FTPtZ_NrK-SKLWrj457cBI09WXvijkiFSfjKEECVlavl0a7yJg/s400/Guest+Network.PNG" title="Guest Network" width="400" /&gt;&lt;/a&gt;&lt;/div&gt;&lt;div style="text-align: justify;"&gt;&lt;br /&gt;
&lt;/div&gt;&lt;h3 style="text-align: justify;"&gt;Parental Controls&lt;/h3&gt;&lt;div style="text-align: justify;"&gt;With it, you can block inappropriate sites and limit the time your kids spend online.&lt;br /&gt;
&lt;br /&gt;
&lt;/div&gt;&lt;h3 style="text-align: justify;"&gt;Additional Settings&lt;/h3&gt;&lt;div style="text-align: justify;"&gt;You may consider &lt;b&gt;enable MAC Filtering&lt;/b&gt; (However they can easily spoofed and just give false sense of security) or &lt;b&gt;Hide SSID&lt;/b&gt;. &lt;/div&gt;&lt;div style="text-align: justify;"&gt;&lt;br /&gt;
&lt;/div&gt;&lt;div style="text-align: justify;"&gt;&lt;i&gt;There are wide ranges of settings under your router which you can change and set accordingly but please be cautious when doing so.&lt;/i&gt;&lt;/div&gt;&lt;div style="text-align: justify;"&gt;&lt;br /&gt;
&lt;/div&gt;&lt;div style="text-align: justify;"&gt;Any question? Please let me know in comment section.&lt;/div&gt;&lt;div style="text-align: justify;"&gt;&lt;br /&gt;
&lt;/div&gt;&lt;div style="text-align: justify;"&gt;Thank you.&lt;/div&gt;&lt;/div&gt;&lt;/div&gt;&lt;div class="blogger-post-footer"&gt;&lt;hr /&gt; &lt;a href="http://www.basicsofhacking.com"&gt;Basics of Ethical Hacking&lt;/a&gt;&lt;/div&gt;</description><media:thumbnail xmlns:media="http://search.yahoo.com/mrss/" height="72" url="https://blogger.googleusercontent.com/img/b/R29vZ2xl/AVvXsEivDzFUGLKoI0tDou1gPPabgXR8_ReFrpuY8YlGQaQYdvitUEAhpwlxt6ARBvRjU7pnJAcUOBOJ-upP3Yfsy78n3MWeym7OkRJ98zGQdTOB6BB0V1xKDka8U-d8ztg7IgFyhJwZjULM78A/s72-c/D-Link+Router+Back.jpg" width="72"/><thr:total xmlns:thr="http://purl.org/syndication/thread/1.0">0</thr:total></item><item><title>WordPress Security: Securing Sites From Hackers / Future Attacks</title><link>http://www.basicsofhacking.com/2013/01/wordpress-security-securing-sites-from-hackers.html</link><category>BASICS OF ETHICAL HACKING</category><category>WORDPRESS TRICKS</category><author>noreply@blogger.com (Harwinder Kumar)</author><pubDate>Mon, 28 Jul 2014 00:00:00 +0530</pubDate><guid isPermaLink="false">tag:blogger.com,1999:blog-8198217290464183069.post-3491204688755463833</guid><description>&lt;div dir="ltr" style="text-align: left;" trbidi="on"&gt;
&lt;div style="text-align: justify;"&gt;
&lt;div class="separator" style="clear: both; text-align: center;"&gt;
&lt;a href="https://blogger.googleusercontent.com/img/b/R29vZ2xl/AVvXsEg_Ftsocnl4BzlLfkMT531gjuoS4J5KFuiBFJKD8UKlIL6jhTY-3TZokC1baS6sjXuHOYmjSywFc4Pg34l_PhZTnGzBl_kvRPnsiGQB25wL-NF67-r3YosErGx0brLCMRwpUCtWdNRzawmA/s1600/WordPress+Security.jpg" style="margin-left: 1em; margin-right: 1em;"&gt;&lt;img border="0" height="240" src="https://blogger.googleusercontent.com/img/b/R29vZ2xl/AVvXsEg_Ftsocnl4BzlLfkMT531gjuoS4J5KFuiBFJKD8UKlIL6jhTY-3TZokC1baS6sjXuHOYmjSywFc4Pg34l_PhZTnGzBl_kvRPnsiGQB25wL-NF67-r3YosErGx0brLCMRwpUCtWdNRzawmA/s400/WordPress+Security.jpg" width="400" /&gt;&lt;/a&gt;&lt;/div&gt;
&lt;br /&gt;
As WordPress is the most popular CMS available on the web but also vulnerable to threats if we don't follow the necessary security measures.&lt;br /&gt;
&lt;br /&gt;
In one of previous guest post, &lt;a href="http://www.basicsofhacking.com/2012/06/how-to-secure-your-wordpress-site.html" target="_blank"&gt;Sarah Rexman&lt;/a&gt; mentioned some tips about securing WordPress and in this post I'm gonna share my own experience. While working as freelancer on &lt;a href="https://www.odesk.com/users/~01dbb1c892a88c9a44" target="_blank"&gt;Upwork&lt;/a&gt;, &lt;a href="http://pph.me/arfharwinder" target="_blank"&gt;PeoplePerHour&lt;/a&gt; and &lt;a href="https://www.freelancer.com/u/arfharwinder.html" target="_blank"&gt;Freelancer&lt;/a&gt;; clients always have issues about securing their sites from hackers and ask about how to prevent from future attacks. So consider these points to secure your WordPress site for now and future:&lt;br /&gt;
&lt;ul&gt;
&lt;li&gt;Keep your WordPress up to date. Latest stable version is 6.9.1 released on 3rd February, 2026.&lt;/li&gt;
&lt;li&gt;Keep your all plugins, themes up to date.&lt;/li&gt;
&lt;li&gt;Always keep backup of your database, files and make it update after some interval.&lt;/li&gt;
&lt;li&gt;If site has been compromised, then you must change your salt keys from your  wp-config.php file under root directory. You can generate new keys from &lt;a href="https://api.wordpress.org/secret-key/1.1/salt/" target="_blank"&gt;here&lt;/a&gt;. It will force all users to have to log in again.&lt;/li&gt;
&lt;li&gt;Change your all passwords associated with site at regular interval.&lt;/li&gt;
&lt;script async="" src="//pagead2.googlesyndication.com/pagead/js/adsbygoogle.js"&gt;&lt;/script&gt; &lt;!--BOH Posts Middle--&gt; &lt;ins class="adsbygoogle" data-ad-client="ca-pub-7383486949799525" data-ad-format="auto" data-ad-slot="2433698148" style="display: block;"&gt;&lt;/ins&gt; &lt;script&gt;(adsbygoogle = window.adsbygoogle || []).push({}); &lt;/script&gt;
&lt;li&gt;Use strong passwords for all logins. Include the mixture of atleast one uppercase letter, lowercase letter, special character, number.&lt;/li&gt;
&lt;li&gt;Change your WP-Admin username from admin to some other name.&lt;/li&gt;
&lt;li&gt;Change database prefix from wp_ to some other complicated characters to avoid zero-day SQL injection attacks.&lt;/li&gt;
&lt;li&gt;Remove timthumb script if your site running it as its no longer supported or maintained. &lt;/li&gt;
&lt;li&gt;Use plugins after testing it properly. Going through plugin review, &lt;a href="http://www.basicsofhacking.com/2012/03/guide-to-google-hacking-techniques.html" target="_blank"&gt;Google search&lt;/a&gt; will let you know about the reputation of the plugin.&lt;/li&gt;
&lt;li&gt;Keep track of latest visitors through log files for tracking site users. If you find any suspicious activity at any particular time, then logs files might help you to know a bit about the attacker.&lt;/li&gt;
&lt;li&gt;Change permissions for .htaccess, wp-config.php, themes main files to 444. &lt;/li&gt;
&lt;li&gt;Proper file permissions for other files and folders. Best practice is to use 644 for files and 755 for folders.&lt;/li&gt;
&lt;li&gt;Keep your own system virus free.&lt;/li&gt;
&lt;li&gt;Always try accessing the site credentials from your own system only.&lt;/li&gt;
&lt;li&gt;Validate all user inputs&amp;nbsp; like URL, image uploads etc.&lt;/li&gt;
&lt;li&gt;Keep track of WP-Admin, FTP accounts user section for any unauthorized user.&lt;/li&gt;
&lt;li&gt;You can also use &lt;a href="http://wordpress.org/plugins/wordfence/" target="_blank"&gt;Wordfence plugin&lt;/a&gt; to monitor from malicious scripts. &lt;/li&gt;
&lt;li&gt;Put some security to the server on which your site is hosted, either it hosted on dedicated or a shared server.&lt;/li&gt;
&lt;li&gt;Keep updated with latest vulnerabilities.&lt;/li&gt;
&lt;/ul&gt;
&lt;/div&gt;
&lt;div style="text-align: justify;"&gt;
&lt;i&gt;Is your own site get infected with malware/virus, contact me through &lt;a href="http://www.basicsofhacking.com/p/contact-harwinder-kumar-learn-basics-of_06.html" target="_blank"&gt;contact form&lt;/a&gt; to get rid of malware with future security implementation. In some cases, site might be hit by pharma hack, you can check it either through site content or by searching your site on Google with query "site:example.com pharma"&lt;/i&gt;&lt;/div&gt;
&lt;div style="text-align: justify;"&gt;
&lt;br /&gt;&lt;/div&gt;
&lt;div style="text-align: justify;"&gt;
Having any further issue? Please comment down! &lt;/div&gt;
&lt;/div&gt;
&lt;div class="blogger-post-footer"&gt;&lt;hr /&gt; &lt;a href="http://www.basicsofhacking.com"&gt;Basics of Ethical Hacking&lt;/a&gt;&lt;/div&gt;</description><media:thumbnail xmlns:media="http://search.yahoo.com/mrss/" height="72" url="https://blogger.googleusercontent.com/img/b/R29vZ2xl/AVvXsEg_Ftsocnl4BzlLfkMT531gjuoS4J5KFuiBFJKD8UKlIL6jhTY-3TZokC1baS6sjXuHOYmjSywFc4Pg34l_PhZTnGzBl_kvRPnsiGQB25wL-NF67-r3YosErGx0brLCMRwpUCtWdNRzawmA/s72-c/WordPress+Security.jpg" width="72"/><thr:total xmlns:thr="http://purl.org/syndication/thread/1.0">6</thr:total></item><item><title>Tutorial On Shoulder Surfing Technique &amp;amp; How To Prevent From It</title><link>http://www.basicsofhacking.com/2012/02/tutorial-on-shoulder-surfing-technique.html</link><category>BASICS OF ETHICAL HACKING</category><author>noreply@blogger.com (Harwinder Kumar)</author><pubDate>Wed, 28 May 2014 18:48:00 +0530</pubDate><guid isPermaLink="false">tag:blogger.com,1999:blog-8198217290464183069.post-5002724627577060849</guid><description>&lt;div dir="ltr" style="text-align: left;" trbidi="on"&gt;&lt;div style="text-align: justify;"&gt;&lt;div class="separator" style="clear: both;"&gt;&lt;a href="https://blogger.googleusercontent.com/img/b/R29vZ2xl/AVvXsEj_GjWzizeoi_rx-0l7UZU1zDniuYLiua9N26PMXtDwFdK9ViycBfSPTNkEMhHmfDGxWyEj1-rA9YT9v6im6rnwHxiWxmKLFB090gxDJ25v6mooTiNi1aeINDQ_mGRv5e2jyT8DGlnshEy6/s1600/Shoulder+Surfing.png" imageanchor="1" style="clear: left; float: left; margin-bottom: 0.1em; margin-right: 1em;" target="blank"&gt;&lt;img alt="Shoulder Surfing" border="0" src="https://blogger.googleusercontent.com/img/b/R29vZ2xl/AVvXsEj_GjWzizeoi_rx-0l7UZU1zDniuYLiua9N26PMXtDwFdK9ViycBfSPTNkEMhHmfDGxWyEj1-rA9YT9v6im6rnwHxiWxmKLFB090gxDJ25v6mooTiNi1aeINDQ_mGRv5e2jyT8DGlnshEy6/s1600/Shoulder+Surfing.png" /&gt;&lt;/a&gt;&lt;/div&gt;Hello everyone!! Today I'm gonna tell about &lt;a href="http://www.basicsofhacking.com/2011/06/some-cool-commands-for-linux-users.html" target="_blank"&gt;a cool&lt;/a&gt; &amp;amp; &lt;a href="http://www.basicsofhacking.com/search/label/ENTERTAINMENT" target="_blank"&gt;funny hacking&lt;/a&gt; technique named Shoulder Surfing. Mostly among you would've use this technique before too, but never knew about its name, so let me clear what is shoulder surfing in brief:&lt;/div&gt;&lt;div style="text-align: justify;"&gt;&lt;br /&gt;
Shoulder surfing is the way to obtaining information by looking over any person's shoulder (It's similar to cheating in exam from someone sitting ahead you). For e.g. while filling your personal data like email, password, &lt;a href="http://www.basicsofhacking.com/2012/01/keeping-your-laptop-secure-in-insecure.html" target="_blank"&gt;security pin&lt;/a&gt; or while doing transactions from ATMs, person behind you can see what you're typing &amp;amp; grab the sensitive information. It seems weird, but persons who're very slow in typing, mostly become victim of it. Shoulder surfing can also be done through long distance by using binoculars.&lt;/div&gt;&lt;div style="text-align: justify;"&gt;&lt;br /&gt;
&lt;b&gt;How to prevent from this hacking technique?&lt;/b&gt;&lt;br /&gt;
&lt;ul&gt;&lt;li&gt;As I recommend, type fast as you can.&lt;/li&gt;
&lt;li&gt;Know who's behind you while typing.&lt;/li&gt;
&lt;li&gt;At last but not least, pick strong passwords for email accounts, transactions (so that the person behind you even could not make a guess about what you typed).&lt;br /&gt;
&lt;br /&gt;
And the best way I found &lt;a href="http://www.basicsofhacking.com/search/label/GOOGLE%20HACKS" target="_blank"&gt;on Google&lt;/a&gt;:&lt;/li&gt;
&lt;/ul&gt;&lt;br /&gt;
&lt;table align="center" cellpadding="0" cellspacing="0" class="tr-caption-container" style="margin-left: auto; margin-right: auto; text-align: center;"&gt;&lt;tbody&gt;
&lt;tr&gt;&lt;td style="text-align: center;"&gt;&lt;a href="https://blogger.googleusercontent.com/img/b/R29vZ2xl/AVvXsEj5TYGwUhKpFF2Lw19jlTd89Y_CnQ7zPS5IwyR60u28aBeoP3NX6Lm9h79_S3FmhbRvPpaDpGnMGF9JckeHTslzLR2rYH5JysKmp72nodiDhfU36us-SgqXcli4mKcX0EKwwGVACSgrwTO3/s1600/Shoulder+Surfing.jpg" style="margin-left: auto; margin-right: auto;" target="_blank"&gt;&lt;img alt="Shoulder Surfing Prevention" border="0" src="https://blogger.googleusercontent.com/img/b/R29vZ2xl/AVvXsEj5TYGwUhKpFF2Lw19jlTd89Y_CnQ7zPS5IwyR60u28aBeoP3NX6Lm9h79_S3FmhbRvPpaDpGnMGF9JckeHTslzLR2rYH5JysKmp72nodiDhfU36us-SgqXcli4mKcX0EKwwGVACSgrwTO3/s200/Shoulder+Surfing.jpg" height="150" width="200" /&gt;&lt;/a&gt;&lt;/td&gt;&lt;/tr&gt;
&lt;tr&gt;&lt;td class="tr-caption" style="text-align: center;"&gt;haha :)&lt;/td&gt;&lt;/tr&gt;
&lt;/tbody&gt;&lt;/table&gt;&lt;/div&gt;&lt;/div&gt;&lt;div class="blogger-post-footer"&gt;&lt;hr /&gt; &lt;a href="http://www.basicsofhacking.com"&gt;Basics of Ethical Hacking&lt;/a&gt;&lt;/div&gt;</description><media:thumbnail xmlns:media="http://search.yahoo.com/mrss/" height="72" url="https://blogger.googleusercontent.com/img/b/R29vZ2xl/AVvXsEj_GjWzizeoi_rx-0l7UZU1zDniuYLiua9N26PMXtDwFdK9ViycBfSPTNkEMhHmfDGxWyEj1-rA9YT9v6im6rnwHxiWxmKLFB090gxDJ25v6mooTiNi1aeINDQ_mGRv5e2jyT8DGlnshEy6/s72-c/Shoulder+Surfing.png" width="72"/><thr:total xmlns:thr="http://purl.org/syndication/thread/1.0">3</thr:total></item><item><title>Tutorial On Information Gathering / Foot Printing (Hacking Technique)</title><link>http://www.basicsofhacking.com/2012/02/tutoriol-on-information-gathering-foot.html</link><category>BASICS OF ETHICAL HACKING</category><author>noreply@blogger.com (Harwinder Kumar)</author><pubDate>Wed, 21 May 2014 19:19:00 +0530</pubDate><guid isPermaLink="false">tag:blogger.com,1999:blog-8198217290464183069.post-7794365835526846572</guid><description>&lt;div dir="ltr" style="text-align: left;" trbidi="on"&gt;&lt;div dir="ltr" style="text-align: justify;" trbidi="on"&gt;&lt;div class="separator" style="clear: both; text-align: center;"&gt;&lt;a href="https://blogger.googleusercontent.com/img/b/R29vZ2xl/AVvXsEhBeclA64z2d47QVLKfBlJJEVbGYFcwgIDL0Xs_fMhzTYdPh5HrOXIkcWo5Qlz8K5sJEmrXFbLe-QP8RF7sVDOyXfLZrQFnq-OBCH7a_QamVnzuIJfygaPjZKHZ0aHCdJCYn_ARqmafIjXJ/s1600/Information+Gathering.jpg" imageanchor="1" style="margin-left: 1em; margin-right: 1em;"&gt;&lt;img alt="Information Gathering" border="0" src="https://blogger.googleusercontent.com/img/b/R29vZ2xl/AVvXsEhBeclA64z2d47QVLKfBlJJEVbGYFcwgIDL0Xs_fMhzTYdPh5HrOXIkcWo5Qlz8K5sJEmrXFbLe-QP8RF7sVDOyXfLZrQFnq-OBCH7a_QamVnzuIJfygaPjZKHZ0aHCdJCYn_ARqmafIjXJ/s1600/Information+Gathering.jpg" data-original-height="238" data-original-width="399" height="238" title="Information Gathering" width="320" /&gt;&lt;/a&gt;&lt;/div&gt;&lt;div class="separator" style="clear: both;"&gt;&lt;/div&gt;Information gathering or Foot printing is the basic technique of hacking which includes gathering maximum information about the target computer systems. It is a very important part of hacking because the more information about target system we have, more the number &lt;a href="http://www.basicsofhacking.com/2011/04/world-trade-centre-attack.html" target="_blank"&gt;of attacks&lt;/a&gt; we can launch. Information gathering is the important technique because all other process of hacking based on information that you have. Therefore we must know what information to gather, where to find it, how to  collect it &amp;amp; how to process the collected information.&lt;br /&gt;
&lt;br /&gt;
Let's start with an example: Suppose your designation is as a hacker in your company &amp;amp; company wants some information about the target system like physical location, IP records and some details about the specific domain. What you've is only the domain name (e.g. www.example.com) or IP address. There are some practical steps you need to follow while gathering information about target system:&lt;br /&gt;
&lt;ul&gt;&lt;li&gt;First step is to finding the IP address:&lt;br /&gt;
&lt;ul&gt;&lt;li&gt;Go to command prompt&amp;gt; type ping www.example.com&lt;/li&gt;
&lt;li&gt;It will give you IP of the target system.&lt;/li&gt;
&lt;script async="" src="//pagead2.googlesyndication.com/pagead/js/adsbygoogle.js"&gt;&lt;/script&gt; &lt;!-- BOH Posts Middle --&gt; &lt;ins class="adsbygoogle" data-ad-client="ca-pub-7383486949799525" data-ad-format="auto" data-ad-slot="2433698148" style="display: block;"&gt;&lt;/ins&gt; &lt;script&gt;(adsbygoogle = window.adsbygoogle || []).push({}); &lt;/script&gt; &lt;/ul&gt;&lt;/li&gt;
&lt;li&gt;After getting IP, next step is to know about the physical location of the victim:&lt;ul&gt;&lt;li&gt;Go to IP2location from &lt;a href="http://www.ip2location.com/" target="_blank"&gt;here&lt;/a&gt;, enter the IP in search field &amp;amp; hit enter.&lt;/li&gt;
&lt;li&gt;It will give you details about the physical location of the victim.&lt;/li&gt;
&lt;/ul&gt;&lt;/li&gt;
&lt;li&gt;Now, we have to find out the details of the domain (example.com):&lt;br /&gt;
&lt;ul&gt;&lt;li&gt;Go to &lt;a href="http://www.who.is/" target="_blank"&gt;who.is&lt;/a&gt; or &lt;a href="http://whois.domaintools.com/" target="_blank"&gt;whois.domaindetails.com&lt;/a&gt; &amp;amp; type the site address of victim.&lt;/li&gt;
&lt;li&gt;It will give you details about domain owner, server, domain expiry/creation date.\ &lt;/li&gt;
&lt;/ul&gt;&lt;/li&gt;
&lt;li&gt;Use Traceroute for tracing the websites path:&lt;br /&gt;
&lt;ul&gt;&lt;li&gt;Check out my post on &lt;a href="http://www.basicsofhacking.com/2011/06/trace-websites-path-using-cmd.html" target="_blank"&gt;Trace Website Path Using CMD&lt;/a&gt;. &lt;/li&gt;
&lt;/ul&gt;&lt;/li&gt;
&lt;li&gt;Use &lt;a href="http://www.basicsofhacking.com/search/label/GOOGLE%20HACKS" target="_blank"&gt;Google for getting&lt;/a&gt; more information about the victim.&lt;/li&gt;
&lt;/ul&gt;&lt;/div&gt;&lt;div style="text-align: justify;" trbidi="on"&gt;Following above methods will help you in getting maximum information about the target system &amp;amp; if you need further information, then google it with your queries.&lt;/div&gt;&lt;div style="text-align: justify;" trbidi="on"&gt;&lt;br /&gt;
&lt;/div&gt;&lt;div style="text-align: justify;" trbidi="on"&gt;Some of the tools used for information gathering are nslookup, &lt;a href="http://www.basicsofhacking.com/2011/06/trace-websites-path-using-cmd.html" target="_blank"&gt;traceroute&lt;/a&gt; &amp;amp; Nmap. Very soon, I will explain about Information Gathering technique using &lt;a href="http://www.backtrack-linux.org/" target="_blank"&gt;Back Track&lt;/a&gt;.&lt;/div&gt;&lt;/div&gt;&lt;div class="blogger-post-footer"&gt;&lt;hr /&gt; &lt;a href="http://www.basicsofhacking.com"&gt;Basics of Ethical Hacking&lt;/a&gt;&lt;/div&gt;</description><media:thumbnail xmlns:media="http://search.yahoo.com/mrss/" height="72" url="https://blogger.googleusercontent.com/img/b/R29vZ2xl/AVvXsEhBeclA64z2d47QVLKfBlJJEVbGYFcwgIDL0Xs_fMhzTYdPh5HrOXIkcWo5Qlz8K5sJEmrXFbLe-QP8RF7sVDOyXfLZrQFnq-OBCH7a_QamVnzuIJfygaPjZKHZ0aHCdJCYn_ARqmafIjXJ/s72-c/Information+Gathering.jpg" width="72"/><thr:total xmlns:thr="http://purl.org/syndication/thread/1.0">3</thr:total></item><item><title>A Guide To Google Hacking Techniques</title><link>http://www.basicsofhacking.com/2012/03/guide-to-google-hacking-techniques.html</link><category>BASICS OF ETHICAL HACKING</category><category>GOOGLE HACKS</category><author>noreply@blogger.com (Harwinder Kumar)</author><pubDate>Mon, 3 Mar 2014 22:31:00 +0530</pubDate><guid isPermaLink="false">tag:blogger.com,1999:blog-8198217290464183069.post-3265897516184170796</guid><description>&lt;div dir="ltr" style="text-align: left;" trbidi="on"&gt;&lt;div class="separator" style="clear: both; text-align: justify;"&gt;&lt;a href="https://blogger.googleusercontent.com/img/b/R29vZ2xl/AVvXsEgrYyjp7yRvbr95ldnuiyjozgHjK5YCWkAhv36gDsGSuJw2R1uoXLWuq6EuU25p2wvwexhrAgslWA4O2angu_CcXRrOtPsp0ZSEFGnRgJ8_85zUrmyODgUxdU4Wbt5Y4UapLAnRG_wWBgiR/s1600/Google+Hacking.png" imageanchor="1" style="clear: left; float: left; margin-bottom: 0.1em; margin-right: 1em;" target="_blank"&gt;&lt;img alt="Google Hacking" border="0" src="https://blogger.googleusercontent.com/img/b/R29vZ2xl/AVvXsEgrYyjp7yRvbr95ldnuiyjozgHjK5YCWkAhv36gDsGSuJw2R1uoXLWuq6EuU25p2wvwexhrAgslWA4O2angu_CcXRrOtPsp0ZSEFGnRgJ8_85zUrmyODgUxdU4Wbt5Y4UapLAnRG_wWBgiR/s1600/Google+Hacking.png" /&gt;&lt;/a&gt;&lt;/div&gt;&lt;div style="text-align: justify;"&gt;Hi everyone!! As we all know Google is the major search engine and #1 ranking site and it's like a part of our daily routine.&lt;/div&gt;&lt;div style="text-align: justify;"&gt;&lt;br /&gt;
&lt;/div&gt;&lt;div style="text-align: justify;"&gt;Google hacking does not mean to hack Google's site/server, it means likely to be smart in Google search. Almost every kind of information is provided there, but the thing is  how you search your queries. In this post I've provided &lt;a href="http://www.ziddu.com/download/18761310/GOOGLE_HACKING.ppt.html" target="_blank"&gt;a PPT&lt;/a&gt; which is all about Google &lt;a href="http://www.basicsofhacking.com/search/label/FACEBOOK%20HACKS" target="_blank"&gt;hacking techniques&lt;/a&gt;. I'm sure after completing the whole PPT, you would become more expert in &lt;a href="http://www.basicsofhacking.com/2011/07/how-to-disable-public-search-of-your.html" target="_blank"&gt;Google search&lt;/a&gt;.&lt;/div&gt;&lt;div style="text-align: justify;"&gt;&lt;br /&gt;
&lt;/div&gt;&lt;div style="text-align: justify;"&gt;PPT is all about learning the basics of Google hacking and finding vulnerabilities &lt;a href="http://www.basicsofhacking.com/search/label/WEBSITE%20HACKING" target="_blank"&gt;in the websites&lt;/a&gt;.&lt;/div&gt;&lt;div style="text-align: justify;"&gt;&lt;br /&gt;
&lt;/div&gt;&lt;div style="text-align: justify;"&gt;&lt;i&gt;You can download it from &lt;a href="http://www.ziddu.com/download/18761310/GOOGLE_HACKING.ppt.html" target="_blank"&gt;here&lt;/a&gt;.&lt;/i&gt;&lt;/div&gt;&lt;div style="text-align: justify;"&gt;&lt;br /&gt;
&lt;/div&gt;&lt;div style="text-align: justify;"&gt;Whether you search your queries as smart worker or hard worker in Google, depends upon how much you know about it! so start your smart work from right now. &lt;/div&gt;&lt;/div&gt;&lt;div class="blogger-post-footer"&gt;&lt;hr /&gt; &lt;a href="http://www.basicsofhacking.com"&gt;Basics of Ethical Hacking&lt;/a&gt;&lt;/div&gt;</description><media:thumbnail xmlns:media="http://search.yahoo.com/mrss/" height="72" url="https://blogger.googleusercontent.com/img/b/R29vZ2xl/AVvXsEgrYyjp7yRvbr95ldnuiyjozgHjK5YCWkAhv36gDsGSuJw2R1uoXLWuq6EuU25p2wvwexhrAgslWA4O2angu_CcXRrOtPsp0ZSEFGnRgJ8_85zUrmyODgUxdU4Wbt5Y4UapLAnRG_wWBgiR/s72-c/Google+Hacking.png" width="72"/><thr:total xmlns:thr="http://purl.org/syndication/thread/1.0">0</thr:total></item><item><title>How To Protect In Cafe/Public Computers While Surfing Internet?</title><link>http://www.basicsofhacking.com/2011/05/how-to-protect-in-cafe-while-browsing.html</link><category>BASICS OF ETHICAL HACKING</category><author>noreply@blogger.com (Harwinder Kumar)</author><pubDate>Thu, 6 Feb 2014 15:53:00 +0530</pubDate><guid isPermaLink="false">tag:blogger.com,1999:blog-8198217290464183069.post-1582017445875135285</guid><description>&lt;div dir="ltr" style="text-align: left;" trbidi="on"&gt;&lt;div style="text-align: justify;"&gt;&lt;div class="separator" style="clear: both; text-align: center;"&gt;&lt;a href="https://blogger.googleusercontent.com/img/b/R29vZ2xl/AVvXsEgCW67Jg9fDCwj1Vrl5fpML0w3IEAk9DE4Ko3tGLGJY8_1_NNgVPxPPRw3OXACrg_YQx_teGpyIN9ZS-zLyp-XD_5BGhxerqQkMuF4TCPlLYFmpLfubIQlCAUlJbgqQcRv_MQ_PrO11_bHh/s1600/Protect+Email.jpg" imageanchor="1" style="margin-left: 1em; margin-right: 1em;"&gt;&lt;img alt="Protect in Cafe" border="0" height="284" src="https://blogger.googleusercontent.com/img/b/R29vZ2xl/AVvXsEgCW67Jg9fDCwj1Vrl5fpML0w3IEAk9DE4Ko3tGLGJY8_1_NNgVPxPPRw3OXACrg_YQx_teGpyIN9ZS-zLyp-XD_5BGhxerqQkMuF4TCPlLYFmpLfubIQlCAUlJbgqQcRv_MQ_PrO11_bHh/s320/Protect+Email.jpg" title="Protect in Cafe" width="320" /&gt;&lt;/a&gt;&lt;/div&gt;People who surf internet on cafe/public computers, are more vulnerable to be hacked, reason is simple! They are unaware from the software installed on public computers, their privileges. It's always secure to access internet from your personal computers, but some times you have to access it from other places like cafe, your friend computer. So what if you wanna to secure yourself from these hacks? Two things you must keep in mind while surfing from pubic computers:&lt;/div&gt;&lt;br /&gt;
&lt;div style="text-align: justify;"&gt;1. Always prefer to &lt;b&gt;private browsing&lt;/b&gt;. Mostly people are unaware from this wonderful feature of browsers. So what is private browsing and how to enable it?&lt;/div&gt;&lt;ul style="text-align: justify;"&gt;&lt;li&gt;Private Browsing allows you to browse the Internet without saving any information about which sites and pages you’ve visited, private browsing do not save Visited pages, History, Passwords, Cookies and Cache files.&lt;/li&gt;
&lt;li&gt;For enabling it, press &lt;b&gt;Ctrl+Shift+P &lt;/b&gt;for firefox and IE users (For chrome use shortcut &lt;b&gt;Ctrl+Shift+N&lt;/b&gt; or check my other post &lt;a href="http://www.basicsofhacking.com/2011/05/incognito-window-in-google-chrome-for.html" target="_blank"&gt;Incognito Window In Google Chrome For Safe Browsing&lt;/a&gt;), a prompting window will ask you for starting private browsing.&lt;/li&gt;
&lt;/ul&gt;&lt;div style="text-align: justify;"&gt;2. Use &lt;b&gt;On-Screen Keyboard&lt;/b&gt;. What to do if you think there is suspicious keylogger installed on system. Don't take risk, use on-screen keyboard. Keyloggers captures information from normal keyboard only. So whenever you do login on your personal internet banking accounts or else, always prefer to use virtual keyboard. You can open it by typing &lt;b&gt;OSK &lt;/b&gt;in run.&lt;/div&gt;&lt;/div&gt;&lt;div class="blogger-post-footer"&gt;&lt;hr /&gt; &lt;a href="http://www.basicsofhacking.com"&gt;Basics of Ethical Hacking&lt;/a&gt;&lt;/div&gt;</description><media:thumbnail xmlns:media="http://search.yahoo.com/mrss/" height="72" url="https://blogger.googleusercontent.com/img/b/R29vZ2xl/AVvXsEgCW67Jg9fDCwj1Vrl5fpML0w3IEAk9DE4Ko3tGLGJY8_1_NNgVPxPPRw3OXACrg_YQx_teGpyIN9ZS-zLyp-XD_5BGhxerqQkMuF4TCPlLYFmpLfubIQlCAUlJbgqQcRv_MQ_PrO11_bHh/s72-c/Protect+Email.jpg" width="72"/><thr:total xmlns:thr="http://purl.org/syndication/thread/1.0">0</thr:total></item><item><title>Tutorial On DNS Cache Poisoning (Redirect abc.com By Entering xyz.com In Address Bar)</title><link>http://www.basicsofhacking.com/2014/01/redirect-yahoocom-by-entering-googlecom.html</link><category>BASICS OF ETHICAL HACKING</category><author>noreply@blogger.com (Harwinder Kumar)</author><pubDate>Tue, 21 Jan 2014 16:18:00 +0530</pubDate><guid isPermaLink="false">tag:blogger.com,1999:blog-8198217290464183069.post-5608763020001530712</guid><description>&lt;div dir="ltr" style="text-align: left;" trbidi="on"&gt;&lt;div style="text-align: justify;"&gt;Hello guys! Today I'm going to post about a &lt;a href="http://www.basicsofhacking.com/search/label/BASICS%20OF%20ETHICAL%20HACKING" target="_blank"&gt;hacking technique&lt;/a&gt; named "DNS Spoofing or&amp;nbsp;DNS Cache Poisoning". DNS cache poisoning is a computer hacking attack, whereby data is introduced into a Domain Name System (DNS) name server's cache database, causing the name server to return an incorrect IP address, diverting traffic to another computer (often the attacker's).&lt;br /&gt;
&lt;script async="" src="//pagead2.googlesyndication.com/pagead/js/adsbygoogle.js"&gt;&lt;/script&gt;&lt;br /&gt;
&lt;div class="separator" style="clear: both; text-align: center;"&gt;&lt;/div&gt;&lt;div class="separator" style="clear: both; text-align: center;"&gt;&lt;/div&gt;&lt;div class="separator" style="clear: both; text-align: center;"&gt;&lt;/div&gt;This trick is commonly used by hackers for&amp;nbsp;redirecting original site to fake site (like &lt;a href="http://www.basicsofhacking.com/search/label/FACEBOOK%20HACKS" target="_blank"&gt;opening Facebook&lt;/a&gt;, Gmail would open fake facebook, gmail).&lt;br /&gt;
&lt;div class="separator" style="clear: both; text-align: center;"&gt;&lt;a href="https://blogger.googleusercontent.com/img/b/R29vZ2xl/AVvXsEhaKjZXG0c0vgNQDJItLW3Hx-1-qVP_OErhdz8N6RbOMrJKvp2u7v_XqooVJtwfXtbZg3cnb9zH_6dS5kQMhPdLYH45V-yiBWBT43sxSFC4f44yam_s4QLMA3YvHxq3HgbvGpMa-D_kQFk/s1600/dns_cache_poisoning.png" imageanchor="1" style="margin-left: 1em; margin-right: 1em;"&gt;&lt;img alt="DNS Cache Poisoning" border="0" data-original-height="461" data-original-width="760" height="242" src="https://blogger.googleusercontent.com/img/b/R29vZ2xl/AVvXsEhaKjZXG0c0vgNQDJItLW3Hx-1-qVP_OErhdz8N6RbOMrJKvp2u7v_XqooVJtwfXtbZg3cnb9zH_6dS5kQMhPdLYH45V-yiBWBT43sxSFC4f44yam_s4QLMA3YvHxq3HgbvGpMa-D_kQFk/s400/dns_cache_poisoning.png" title="DNS Cache Poisoning" width="400" /&gt;&lt;/a&gt;&lt;/div&gt;Let's understand it by taking an example:&lt;/div&gt;&lt;ul style="text-align: left;"&gt;&lt;li&gt;Go to C:\Windows\ System32\ Drivers\ etc\ Hosts&lt;/li&gt;
&lt;li&gt;&lt;span style="font-weight: normal;"&gt;Open it &lt;a href="http://www.basicsofhacking.com/search/label/NOTEPAD%20TRICKS" target="_blank"&gt;with notepad&lt;/a&gt;.&lt;/span&gt;&lt;/li&gt;
&lt;li&gt;&lt;span style="font-weight: normal;"&gt;Write 67.195.160.76 &lt;a href="http://www.basicsofhacking.com/search/label/GOOGLE%20HACKS" target="_blank"&gt;www.google.com&lt;/a&gt; below 127.0.0.1 localhost like that:&lt;/span&gt;&lt;span style="font-weight: normal;"&gt;&lt;br /&gt;
&lt;b&gt;127.0.0.1 localhost&lt;/b&gt;&lt;/span&gt;&lt;b&gt;&lt;span style="font-weight: normal;"&gt;&lt;br /&gt;
67.195.160.76&amp;nbsp; www.google.com&lt;/span&gt;&lt;/b&gt;&lt;/li&gt;
&lt;/ul&gt;&lt;div style="text-align: justify;"&gt;&lt;b&gt;&lt;span style="font-weight: normal;"&gt;Where 67.195.160.76 is IP address &lt;a href="http://www.basicsofhacking.com/search/label/YAHOO%20MESSENGER%20TRICKS" target="_blank"&gt;of yahoo&lt;/a&gt;&lt;/span&gt;&lt;span style="font-weight: normal;"&gt;, you can change it whatever you want. If you are thinking about knowing IP address of any site, then go to &lt;/span&gt;&lt;span style="font-weight: normal;"&gt;command prompt&amp;gt; Type ping site name&lt;/span&gt;&lt;/b&gt;&lt;b&gt;&lt;span style="font-weight: normal;"&gt;, for e.g. &lt;/span&gt;&lt;b&gt;ping &lt;/b&gt;&lt;/b&gt;&lt;b&gt;www.facebook.com&lt;/b&gt;&lt;b&gt;&lt;span style="font-weight: normal;"&gt;.&amp;nbsp;&lt;/span&gt;&lt;/b&gt;&lt;/div&gt;&lt;b&gt;&lt;span style="font-weight: normal;"&gt;&lt;/span&gt;&lt;/b&gt;&lt;br /&gt;
&lt;b&gt;&lt;span style="font-weight: normal;"&gt;&lt;i&gt;Note: Even you can use it for phishing purpose.&lt;/i&gt;&lt;/span&gt;&lt;/b&gt;&lt;br /&gt;
&lt;ul style="text-align: left;"&gt;&lt;/ul&gt;&lt;/div&gt;&lt;div class="blogger-post-footer"&gt;&lt;hr /&gt; &lt;a href="http://www.basicsofhacking.com"&gt;Basics of Ethical Hacking&lt;/a&gt;&lt;/div&gt;</description><media:thumbnail xmlns:media="http://search.yahoo.com/mrss/" height="72" url="https://blogger.googleusercontent.com/img/b/R29vZ2xl/AVvXsEhaKjZXG0c0vgNQDJItLW3Hx-1-qVP_OErhdz8N6RbOMrJKvp2u7v_XqooVJtwfXtbZg3cnb9zH_6dS5kQMhPdLYH45V-yiBWBT43sxSFC4f44yam_s4QLMA3YvHxq3HgbvGpMa-D_kQFk/s72-c/dns_cache_poisoning.png" width="72"/><thr:total xmlns:thr="http://purl.org/syndication/thread/1.0">4</thr:total></item><item><title>Best Server Hardware And Network Solution For Your Business</title><link>http://www.basicsofhacking.com/2013/04/best-server-hardware-and-network-solution.html</link><category>REVIEWS</category><author>noreply@blogger.com (Harwinder Kumar)</author><pubDate>Mon, 15 Apr 2013 23:56:00 +0530</pubDate><guid isPermaLink="false">tag:blogger.com,1999:blog-8198217290464183069.post-8050294215445363420</guid><description>&lt;div dir="ltr" style="text-align: left;" trbidi="on"&gt;&lt;div style="text-align: justify;"&gt;The &lt;a href="https://serverclub.com/" target="_blank"&gt;serverclub.com&lt;/a&gt; is a provider of server hardware and network plans. Just from its name you can understand the specialty of this website:dedicated server services. As why in our modern days the Internet is everything especially for our work, many of companies, web designers, businessmen or bloggers have enjoyed the advantages of the dedicated servers.&amp;nbsp;&lt;/div&gt;&lt;div style="text-align: justify;"&gt;&lt;br /&gt;
&lt;/div&gt;&lt;div style="text-align: justify;"&gt;These servers allow other people to browse your website on the internet. This storage of this data on servers is called hosting. Some people to decrease their costs host their data in shared servers but sometimes have to deal with problems like the server overloading. So, that’s the reason the big companies and the website owners prefer the dedicated servers.&lt;br /&gt;
&lt;br /&gt;
&lt;div class="separator" style="clear: both; text-align: center;"&gt;&lt;a href="https://blogger.googleusercontent.com/img/b/R29vZ2xl/AVvXsEhD15YwQ8NZAn2smx0IUlkt2Y3t0Ymg-XfdLk1eGnDFXbMcgl3s249EP4gpe6Xg01r2nYKEHkM3ogI8-C_2E6zC2ImMeDVAm3xPiCD0Cx1LWIZ3Y9GD84JAKIC9uKqkWMzTOeSKa0xIE1Cg/s1600/Dedicated+Server.jpg" imageanchor="1" style="margin-left: 1em; margin-right: 1em;" target="_blank"&gt;&lt;img alt="Dedicated Server" border="0" height="106" src="https://blogger.googleusercontent.com/img/b/R29vZ2xl/AVvXsEhD15YwQ8NZAn2smx0IUlkt2Y3t0Ymg-XfdLk1eGnDFXbMcgl3s249EP4gpe6Xg01r2nYKEHkM3ogI8-C_2E6zC2ImMeDVAm3xPiCD0Cx1LWIZ3Y9GD84JAKIC9uKqkWMzTOeSKa0xIE1Cg/s200/Dedicated+Server.jpg" title="Dedicated Server" width="200" /&gt;&lt;/a&gt;&lt;/div&gt;&lt;/div&gt;&lt;div style="text-align: justify;"&gt;The ServerClub can provide you exactly this &lt;a href="https://serverclub.com/dedicated" target="_blank"&gt;dedicated server hosting&lt;/a&gt;. The site provides the best hardware and software services and also very good and useful customer support, all these in very low prices. In additional are available two very profitable offers: to refer a friend and to become a reseller which in simple words means that when for example you recommend the ServerClub services to your friends then you will get the 10% of the rent bill of their server plan every month for the lifetime of their contract. You can also sell servers from your website gaining the 20% of the sales.&amp;nbsp;&lt;/div&gt;&lt;div style="text-align: justify;"&gt;&lt;br /&gt;
&lt;/div&gt;&lt;h3 style="text-align: justify;"&gt;ServerClub Features:&lt;/h3&gt;&lt;ul style="text-align: justify;"&gt;&lt;li&gt;Environmentally friendly technologies and power saving systems at the servers host which help the costs cutting.&lt;/li&gt;
&lt;li&gt;Reliable hardware combined with amazing bandwidth = perfect hosting.&lt;/li&gt;
&lt;li&gt;Excellent customer support service.&lt;/li&gt;
&lt;li&gt;Backup server available in case of failure or overload.&lt;/li&gt;
&lt;li&gt;Customization of plans and extra requirements depend on the needs.&lt;/li&gt;
&lt;li&gt;High quality servers (instant setup of Dell’s premium servers with Xeon processors and hardware RAID, the IP network is designed by Cisco) &lt;/li&gt;
&lt;/ul&gt;&lt;h3 style="text-align: justify;"&gt;In Conclusion&lt;/h3&gt;&lt;div style="text-align: justify;"&gt;&lt;br /&gt;
&lt;/div&gt;&lt;div style="text-align: justify;"&gt;ServerClub provides all the services which are required to set up dedicated hosting with the best possible features at logical rates. So if you are thinking to switch to dedicated hosting, you are highly recommended totake look onthe ServerClub. &lt;/div&gt;&lt;/div&gt;&lt;div class="blogger-post-footer"&gt;&lt;hr /&gt; &lt;a href="http://www.basicsofhacking.com"&gt;Basics of Ethical Hacking&lt;/a&gt;&lt;/div&gt;</description><media:thumbnail xmlns:media="http://search.yahoo.com/mrss/" height="72" url="https://blogger.googleusercontent.com/img/b/R29vZ2xl/AVvXsEhD15YwQ8NZAn2smx0IUlkt2Y3t0Ymg-XfdLk1eGnDFXbMcgl3s249EP4gpe6Xg01r2nYKEHkM3ogI8-C_2E6zC2ImMeDVAm3xPiCD0Cx1LWIZ3Y9GD84JAKIC9uKqkWMzTOeSKa0xIE1Cg/s72-c/Dedicated+Server.jpg" width="72"/><thr:total xmlns:thr="http://purl.org/syndication/thread/1.0">0</thr:total></item><item><title>How To Create Your Own Website For Free With uCoz?</title><link>http://www.basicsofhacking.com/2013/04/create-your-own-website-free-with-ucoz.html</link><category>REVIEWS</category><author>noreply@blogger.com (Harwinder Kumar)</author><pubDate>Thu, 11 Apr 2013 21:38:00 +0530</pubDate><guid isPermaLink="false">tag:blogger.com,1999:blog-8198217290464183069.post-3315234365416047850</guid><description>&lt;div dir="ltr" style="text-align: left;" trbidi="on"&gt;&lt;div style="text-align: justify;"&gt;The &lt;a href="http://www.ucoz.com/" target="_blank"&gt;www.ucoz.com&lt;/a&gt; is a unique website which allows you to build your site easily, for free. It gives you the ability to create a multi-functional website for every topic you want. Either you are a professional or you just want to create a site for your personal purposes have in mind that with the ucoz you have the ability to create a page with your own unique style.&lt;/div&gt;&lt;div style="text-align: justify;"&gt;&lt;br /&gt;
&lt;/div&gt;&lt;h3 style="text-align: justify;"&gt;How it Works?&lt;/h3&gt;&lt;div style="text-align: justify;"&gt;&lt;br /&gt;
&lt;/div&gt;&lt;div style="text-align: justify;"&gt;The uCoz allows you to create your page from a large number of template options for a functional and interactive site. But it’s good to keep in mind that is a free web builder so do not wait to get the functionality of a paid one. Although the ucoz is a site which gets closer to a paid website planning than the rest of its kind. It is the ideal helper to &lt;a href="http://www.ucoz.com/tour/examples.html" target="_blank"&gt;create your own website for free&lt;/a&gt; like personal homepages, online stores, portals, fan sites, blogs and communities, educational and governmental websites and many more.&lt;/div&gt;&lt;div style="text-align: justify;"&gt;&lt;br /&gt;
&lt;/div&gt;&lt;div class="separator" style="clear: both; text-align: center;"&gt;&lt;a href="https://blogger.googleusercontent.com/img/b/R29vZ2xl/AVvXsEj8riyQ3EaSxDmCVLFErFOeIkw_GLH69ACK98EieU72r9wpvj4it5xqk3CuTzfrgBDsc7Ap7hw-n5YHmgcJHo6AIq7iyaOQHJ10w6nBKifPNEiI9T5Kk4h4aQgw5TpSPf1MFiS8yp8GPE3M/s1600/uCoz+Free+Site.jpg" imageanchor="1" style="margin-left: 1em; margin-right: 1em;" target="_blank"&gt;&lt;img alt="uCoz Free Site" border="0" height="200" src="https://blogger.googleusercontent.com/img/b/R29vZ2xl/AVvXsEj8riyQ3EaSxDmCVLFErFOeIkw_GLH69ACK98EieU72r9wpvj4it5xqk3CuTzfrgBDsc7Ap7hw-n5YHmgcJHo6AIq7iyaOQHJ10w6nBKifPNEiI9T5Kk4h4aQgw5TpSPf1MFiS8yp8GPE3M/s400/uCoz+Free+Site.jpg" title="uCoz Free Site" width="400" /&gt;&lt;/a&gt;&lt;/div&gt;&lt;div style="text-align: justify;"&gt;Except offering the typical features to Content Management Systems like the database of site users with division into groups or the RSS import and export, also offers some unique features as special template language which allows you to check different conditions when generating pages,template builder which allows to completely change the design in a very effective way and possibility to extend your website functionality with the help of PHP or third database servers like MySQL and API. It doesn’t require installation, offers many different templates in its template store and a variety of modules, tools and features as well to give your page a sense of your own personality. The good is that uCoz is suitable for both newbies and experienced professionals. &lt;/div&gt;&lt;div style="text-align: justify;"&gt;&lt;br /&gt;
&lt;/div&gt;&lt;h3 style="text-align: justify;"&gt;Why Choose uCoz?&lt;/h3&gt;&lt;div style="text-align: justify;"&gt;&lt;br /&gt;
&lt;/div&gt;&lt;div style="text-align: justify;"&gt;uCoz has a very good background as works for 7 years already and has over 1.200.000 active websites with more than 100 million page views daily and the most important: error free. Also, it provides free Web hosting with unlimited space. It is not possible to summarize up everything in one article. But one you have to keep in mind: uCoz provides a free and easy to use service for people who want to create their own page with their own personality and to enjoy the many advantages of using a multi-functional website for their work, to exhibit their art, to express their ideas or just to have fun. Absolutely recommended!&lt;/div&gt;&lt;/div&gt;&lt;div class="blogger-post-footer"&gt;&lt;hr /&gt; &lt;a href="http://www.basicsofhacking.com"&gt;Basics of Ethical Hacking&lt;/a&gt;&lt;/div&gt;</description><media:thumbnail xmlns:media="http://search.yahoo.com/mrss/" height="72" url="https://blogger.googleusercontent.com/img/b/R29vZ2xl/AVvXsEj8riyQ3EaSxDmCVLFErFOeIkw_GLH69ACK98EieU72r9wpvj4it5xqk3CuTzfrgBDsc7Ap7hw-n5YHmgcJHo6AIq7iyaOQHJ10w6nBKifPNEiI9T5Kk4h4aQgw5TpSPf1MFiS8yp8GPE3M/s72-c/uCoz+Free+Site.jpg" width="72"/><thr:total xmlns:thr="http://purl.org/syndication/thread/1.0">1</thr:total></item><item><title>Cheap And Quality Downloads For Music Addicts</title><link>http://www.basicsofhacking.com/2013/04/cheap-and-quality-downloads-for-music.html</link><category>REVIEWS</category><author>noreply@blogger.com (Harwinder Kumar)</author><pubDate>Thu, 11 Apr 2013 01:08:00 +0530</pubDate><guid isPermaLink="false">tag:blogger.com,1999:blog-8198217290464183069.post-1017820193047337727</guid><description>&lt;div dir="ltr" style="text-align: left;" trbidi="on"&gt;&lt;div style="text-align: justify;"&gt;What is the most remarkable difference between &lt;a href="http://www.iomoio.com/" target="_blank"&gt;www.iomoio.com&lt;/a&gt; and the other download music sites? Of course, the price! You can download a track you like only for $0.16 with all taxes included in this price. You only pay for the purchased music and the site do not charge any extra or hidden fees. You just have to create an account and add an one-time payment for $16! You can add money using PayPal, Visa or MasterCard. In additional, there are available very attractive discounts and special promotions! &lt;/div&gt;&lt;div style="text-align: justify;"&gt;&lt;br /&gt;&lt;/div&gt;&lt;div style="text-align: justify;"&gt;&lt;h3&gt;Extra Benefits and Bonuses on Deposits:&lt;/h3&gt;&lt;/div&gt;&lt;div style="text-align: justify;"&gt;&lt;br /&gt;&lt;/div&gt;&lt;div style="text-align: justify;"&gt;$32 + $12 Bonus&lt;/div&gt;&lt;div style="text-align: justify;"&gt;$48 + $26 Bonus&lt;/div&gt;&lt;div style="text-align: justify;"&gt;$96 + $76 Bonus&lt;/div&gt;&lt;div style="text-align: justify;"&gt;&lt;br /&gt;&lt;/div&gt;&lt;div style="text-align: justify;"&gt;You might think how can be so cheap and concurrently legal. This is why the site’s licensing body is located outside the United States, so it’s not bounded by the $0.99 per track regulation of the RIAA. &lt;/div&gt;&lt;div style="text-align: justify;"&gt;&lt;br /&gt;&lt;/div&gt;&lt;h3 style="text-align: justify;"&gt;Easy to Use and Safe&lt;/h3&gt;&lt;div style="text-align: justify;"&gt;&lt;br /&gt;&lt;/div&gt;&lt;div style="text-align: justify;"&gt;It’s very easy to find a track as when you enter the site, there is a search engine and also you can search by categories as artists, albums etc. Iomoio has more than 1,600,000 tracks and over 56,000 artists around its database. When finding the tracks you want, simply purchase them and download them from the Downloads page. It’s not necessary to spend your money for free. Before purchasing a track you can have a 60 seconds preview of it and then decide! &lt;/div&gt;&lt;div style="text-align: justify;"&gt;&lt;br /&gt;&lt;/div&gt;&lt;div class="separator" style="clear: both; text-align: center;"&gt;&lt;a href="https://blogger.googleusercontent.com/img/b/R29vZ2xl/AVvXsEi6pRa-DgsxZ9-GOVDWd0UJjFErsY-LKwdzCztxwGh2Vml_rZ9dX9PJWt12tEVl4ap32q4y8upS1rUS27uxOvLENfsKTQWSpfoHQW11S0S-6k5A0XHG3QVSld6On_2uslGh7qpY8xCYEZya/s1600/iomoio.jpg" imageanchor="1" style="margin-left: 1em; margin-right: 1em;" target="_blank"&gt;&lt;img alt="iomoio" border="0" height="298" src="https://blogger.googleusercontent.com/img/b/R29vZ2xl/AVvXsEi6pRa-DgsxZ9-GOVDWd0UJjFErsY-LKwdzCztxwGh2Vml_rZ9dX9PJWt12tEVl4ap32q4y8upS1rUS27uxOvLENfsKTQWSpfoHQW11S0S-6k5A0XHG3QVSld6On_2uslGh7qpY8xCYEZya/s400/iomoio.jpg" title="iomoio" width="400" /&gt;&lt;/a&gt;&lt;/div&gt;&lt;div style="text-align: justify;"&gt;The site through its help desk guarantees that your payment data is transferred through closed bank networks with the highest level of security. Site uses the protocol SSL 3.0, server certificate (128 bit)to prevent unauthorized access to your information. &lt;/div&gt;&lt;div style="text-align: justify;"&gt;&lt;br /&gt;&lt;/div&gt;&lt;h3 style="text-align: justify;"&gt;In Conclusion&lt;/h3&gt;&lt;div style="text-align: justify;"&gt;&lt;br /&gt;With the iomoio.com you can download the &lt;a href="http://www.iomoio.com/charts.html" target="_blank"&gt;mp3 songs&lt;/a&gt; you love absolutely free of unwelcome viruses and 100% legally only for $0.16! This site offers to its visitors simplicity and a wide range of music data which is every day updated with the latest tracks. The only you have to do is just to create an account and start to shake with the rhythm of your music! &lt;/div&gt;&lt;/div&gt;&lt;div class="blogger-post-footer"&gt;&lt;hr /&gt; &lt;a href="http://www.basicsofhacking.com"&gt;Basics of Ethical Hacking&lt;/a&gt;&lt;/div&gt;</description><media:thumbnail xmlns:media="http://search.yahoo.com/mrss/" height="72" url="https://blogger.googleusercontent.com/img/b/R29vZ2xl/AVvXsEi6pRa-DgsxZ9-GOVDWd0UJjFErsY-LKwdzCztxwGh2Vml_rZ9dX9PJWt12tEVl4ap32q4y8upS1rUS27uxOvLENfsKTQWSpfoHQW11S0S-6k5A0XHG3QVSld6On_2uslGh7qpY8xCYEZya/s72-c/iomoio.jpg" width="72"/><thr:total xmlns:thr="http://purl.org/syndication/thread/1.0">0</thr:total></item><item><title>All For Your Smartphone Just In One Site - General-play.com</title><link>http://www.basicsofhacking.com/2013/04/all-for-your-smartphone-just-in-one.html</link><category>REVIEWS</category><author>noreply@blogger.com (Harwinder Kumar)</author><pubDate>Wed, 10 Apr 2013 16:10:00 +0530</pubDate><guid isPermaLink="false">tag:blogger.com,1999:blog-8198217290464183069.post-8790403633553934025</guid><description>&lt;div dir="ltr" style="text-align: left;" trbidi="on"&gt;&lt;div style="text-align: justify;"&gt;You hold in your hands your lovely smartphone but do you know what makes the smartphones to distinguish from the rest applies? The mobile apps! You have the ability to boost your smartphone with your favorite apps just in a few minutes through the General play. Entering &lt;a href="http://www.general-play.com/" target="_blank"&gt;www.general-play.com&lt;/a&gt;&lt;span id="goog_1852837242"&gt;&lt;/span&gt;&lt;a href="http://www.blogger.com/"&gt;&lt;/a&gt;&lt;span id="goog_1852837243"&gt;&lt;/span&gt;, you can install games, useful apps even tips how to cook a chicken!&amp;nbsp;&lt;/div&gt;&lt;h3 style="text-align: justify;"&gt;&amp;nbsp;&lt;/h3&gt;&lt;h3 style="text-align: justify;"&gt;What is the General play?&lt;/h3&gt;&lt;h3 style="text-align: justify;"&gt;&amp;nbsp;&lt;/h3&gt;&lt;div style="text-align: justify;"&gt;General play is a search engine for apps for every type of smartphone.&lt;br /&gt;&lt;br /&gt;&lt;div class="separator" style="clear: both; text-align: center;"&gt;&lt;a href="https://blogger.googleusercontent.com/img/b/R29vZ2xl/AVvXsEgy282DyQCCKgdvmPSlDnIE40175kAMlGUgaAfqv0bHVRNZLgKWDJItbX7Clu_rrwhBPzsTl7fdyrmMHXVnlpiAYO24zBQZfYsCMJbOrzmzLKab8rTUtaU_3GHGzvR2xemazoos6aMwQ73r/s1600/General+Play.jpg" imageanchor="1" style="margin-left: 1em; margin-right: 1em;" target="_blank"&gt;&lt;img alt="General Play" border="0" height="93" src="https://blogger.googleusercontent.com/img/b/R29vZ2xl/AVvXsEgy282DyQCCKgdvmPSlDnIE40175kAMlGUgaAfqv0bHVRNZLgKWDJItbX7Clu_rrwhBPzsTl7fdyrmMHXVnlpiAYO24zBQZfYsCMJbOrzmzLKab8rTUtaU_3GHGzvR2xemazoos6aMwQ73r/s400/General+Play.jpg" title="General Play" width="400" /&gt;&lt;/a&gt;&lt;/div&gt;&lt;/div&gt;&lt;div style="text-align: justify;"&gt;There are thousands of mobile apps free or paid to choose like over 740000 appsfor iOS (Apple devices), over 882000 apps for Android, over 102500 apps for Windows, over 232500 apps for Blackberry and many others for all the operating systems devices.&lt;/div&gt;&lt;div style="text-align: justify;"&gt;Check the categories of the apps which are provided in this interesting site:&lt;br /&gt;&lt;ul&gt;&lt;li&gt;Books &amp;amp; Reference&lt;/li&gt;&lt;li&gt;Business&lt;/li&gt;&lt;li&gt;Education&lt;/li&gt;&lt;li&gt;Entertainment&lt;/li&gt;&lt;li&gt;Finance&lt;/li&gt;&lt;li&gt;Food &amp;amp; Drink&lt;/li&gt;&lt;li&gt;Games&lt;/li&gt;&lt;li&gt;Health &amp;amp; Fitness&lt;/li&gt;&lt;li&gt;Kids &amp;amp; Family&lt;/li&gt;&lt;li&gt;Lifestyle&lt;/li&gt;&lt;li&gt;Media &amp;amp; Video &amp;amp; Photo&lt;/li&gt;&lt;li&gt;Medical&lt;/li&gt;&lt;li&gt;Navigation &amp;amp; Travel&lt;/li&gt;&lt;li&gt;News &amp;amp; Magazines&lt;/li&gt;&lt;li&gt;Other&lt;/li&gt;&lt;li&gt;Social Networking&lt;/li&gt;&lt;li&gt;Sports&lt;/li&gt;&lt;li&gt;Themes&lt;/li&gt;&lt;li&gt;Tools &amp;amp; Productivity&lt;/li&gt;&lt;li&gt;Utilities&lt;/li&gt;&lt;li&gt;Weather&lt;/li&gt;&lt;/ul&gt;&lt;/div&gt;&lt;div style="text-align: justify;"&gt;You can search from the provided categories or just to type a keyword gaining numerous results to choose the one you like. If you are from the people who love technology, enjoy different apps in their free time or search for useful apps, it’s sure that you will love this site.&lt;/div&gt;&lt;h3&gt;&amp;nbsp;&lt;/h3&gt;&lt;h3&gt;Some features of the General play:&lt;/h3&gt;&lt;div style="text-align: justify;"&gt;&lt;ul&gt;&lt;li&gt;You can download from wallpapers to music, recipes and many more others.&lt;/li&gt;&lt;li&gt;You can download both free and paid files.&lt;/li&gt;&lt;li&gt;Before you download an app, you have the chance to be informed by an extended description about it.&lt;/li&gt;&lt;li&gt;You are able to do the most efficient search in most convenient way.&lt;/li&gt;&lt;li&gt;Simple design and very easy to use.&lt;/li&gt;&lt;/ul&gt;&lt;/div&gt;&lt;div style="text-align: justify;"&gt;It’s pretty funny as well very useful! So build the personality of your mobile device through the &lt;a href="http://www.general-play.com/" target="_blank"&gt;mobile apps&lt;/a&gt; from General play. Sure you will bookmark this site as one of your favorites. It’s absolutely recommended for its rich variety and its great simplicity.&lt;/div&gt;&lt;/div&gt;&lt;div class="blogger-post-footer"&gt;&lt;hr /&gt; &lt;a href="http://www.basicsofhacking.com"&gt;Basics of Ethical Hacking&lt;/a&gt;&lt;/div&gt;</description><media:thumbnail xmlns:media="http://search.yahoo.com/mrss/" height="72" url="https://blogger.googleusercontent.com/img/b/R29vZ2xl/AVvXsEgy282DyQCCKgdvmPSlDnIE40175kAMlGUgaAfqv0bHVRNZLgKWDJItbX7Clu_rrwhBPzsTl7fdyrmMHXVnlpiAYO24zBQZfYsCMJbOrzmzLKab8rTUtaU_3GHGzvR2xemazoos6aMwQ73r/s72-c/General+Play.jpg" width="72"/><thr:total xmlns:thr="http://purl.org/syndication/thread/1.0">0</thr:total></item><item><title>Making Things Uncomplicated In Hacking World With ChatWing Chat Software</title><link>http://www.basicsofhacking.com/2013/03/making-things-uncomplicated-in-hacking_8.html</link><category>GUEST POSTS</category><author>noreply@blogger.com (Harwinder Kumar)</author><pubDate>Fri, 8 Mar 2013 16:28:00 +0530</pubDate><guid isPermaLink="false">tag:blogger.com,1999:blog-8198217290464183069.post-8945524373580777383</guid><description>&lt;div dir="ltr" style="text-align: left;" trbidi="on"&gt;&lt;div style="background-color: #666666; color: white; font-weight: normal; text-align: center;"&gt;&lt;div style="text-align: center;"&gt;This is a guest post by Aaron Kong.&lt;/div&gt;&lt;/div&gt;&lt;div style="text-align: justify;"&gt;&lt;br /&gt;&lt;div class="separator" style="clear: both; text-align: center;"&gt;&lt;a target="_blank" href="https://blogger.googleusercontent.com/img/b/R29vZ2xl/AVvXsEihdSxFB1Mqsmz2NAjTQU6U5Qa3D8-tMHov8xyEWz8fwyTk6_cPPOG_ff_fmJkhkLqD9RcjkZwptCqf6jQ7IpHiaYyujteSaVR_VDDVFWR2zSZ7IfzAK4RxPjE8eFbQN0-aznB5JV4sUVSY/s1600/ChatWing+Hacking.jpg" imageanchor="1" style="clear: left; float: left; margin-bottom: 0.1em; margin-right: 1em;"&gt;&lt;img alt="ChatWing Hacking" border="0" height="320" src="https://blogger.googleusercontent.com/img/b/R29vZ2xl/AVvXsEihdSxFB1Mqsmz2NAjTQU6U5Qa3D8-tMHov8xyEWz8fwyTk6_cPPOG_ff_fmJkhkLqD9RcjkZwptCqf6jQ7IpHiaYyujteSaVR_VDDVFWR2zSZ7IfzAK4RxPjE8eFbQN0-aznB5JV4sUVSY/s320/ChatWing+Hacking.jpg" title="ChatWing Hacking" width="260" /&gt;&lt;/a&gt;&lt;/div&gt;Putting up a site intended to inform people of things they need to know like an online encyclopedia and such is a very good idea of sharing your knowledge to the people who needs it. As such, it is also important that you describe thoroughly these bits of information so these people would easily come to understand it. But sometimes, doing so just won’t cut it since there will always be terms and methods that are totally unheard of to these people. In these cases, you’ll need a tool that can let you engage with your visitors in a more direct manner so you can express your thoughts and ideas to them more clearly – and to do that you need Chatwing &lt;a href="http://chatwing.com/" target="_blank"&gt;chat app&lt;/a&gt;.&lt;/div&gt;&lt;div style="text-align: justify;"&gt;&lt;br /&gt;&lt;/div&gt;&lt;div style="text-align: justify;"&gt;&lt;div class="separator" style="clear: both; text-align: center;"&gt;&lt;a target="_blank" href="https://blogger.googleusercontent.com/img/b/R29vZ2xl/AVvXsEilKskyNmk4eUCtnEXXRdQj_S_fipFJhOj1TqEJFAWUo0D7D8AT3XCvWc9EF65JGE1orlhuqYGLXG8uxHwnWhR_T20SfKrkd3a0f8pAFFIBHTGEeb5nV1oVqDNvI9g32JX7rCZcIR3VHt5T/s1600/ChatWing.jpg" imageanchor="1" style="margin-left: 1em; margin-right: 1em;"&gt;&lt;img alt="ChatWing" border="0" height="220" src="https://blogger.googleusercontent.com/img/b/R29vZ2xl/AVvXsEilKskyNmk4eUCtnEXXRdQj_S_fipFJhOj1TqEJFAWUo0D7D8AT3XCvWc9EF65JGE1orlhuqYGLXG8uxHwnWhR_T20SfKrkd3a0f8pAFFIBHTGEeb5nV1oVqDNvI9g32JX7rCZcIR3VHt5T/s400/ChatWing.jpg" title="ChatWing" width="400" /&gt;&lt;/a&gt;&lt;/div&gt;&lt;br /&gt;This chatting tool is very effective in connecting you and your online readers through live chat. It’s easy enough to be embedded into you site in seconds and stable enough to hold out a large number of web traffic chatting simultaneously within the chat room. You don’t have to worry about your chat box not being able to handle large volumes of traffic as it is built specifically for that purpose.&lt;/div&gt;&lt;div style="text-align: justify;"&gt;&lt;br /&gt;&lt;/div&gt;&lt;div style="text-align: justify;"&gt;Another good thing about this chat widget is that it’s very lenient in letting your readers gaining access to chat. With its socially integrated log-in mechanism, they are able to log-in using their social media accounts like Facebook, Twitter, Google and Yahoo accounts. They can also use their Chatwing accounts (provided they have one) or log-in as guests, if they want chat with you anonymously.&lt;/div&gt;&lt;div style="text-align: justify;"&gt;&lt;br /&gt;&lt;div class="separator" style="clear: both; text-align: center;"&gt;&lt;a target="_blank" href="https://blogger.googleusercontent.com/img/b/R29vZ2xl/AVvXsEjGMQpGj_RnwCqdFBDf7Id-9LjlDgiFhiUahHR0B72YYJjtTRM4Ek6jhEXuE_07lNNdpoRujCy53fjLMMgA2WuIUwc9rxsCC406vB5_DFnpZlJHuoFxoiijX3UNUZvYpbkJMdjZzQKtQ-14/s1600/ChatWing+App.jpg" imageanchor="1" style="margin-left: 1em; margin-right: 1em;"&gt;&lt;img alt="ChatWing App" border="0" height="293" src="https://blogger.googleusercontent.com/img/b/R29vZ2xl/AVvXsEjGMQpGj_RnwCqdFBDf7Id-9LjlDgiFhiUahHR0B72YYJjtTRM4Ek6jhEXuE_07lNNdpoRujCy53fjLMMgA2WuIUwc9rxsCC406vB5_DFnpZlJHuoFxoiijX3UNUZvYpbkJMdjZzQKtQ-14/s400/ChatWing+App.jpg" title="ChatWing App" width="400" /&gt;&lt;/a&gt;&lt;/div&gt;&lt;br /&gt;&lt;/div&gt;&lt;div style="text-align: justify;"&gt;Having your readers join &lt;a href="http://chatwing.com/" target="_blank"&gt;your chatroom&lt;/a&gt; with ease is one of the upbringings of this nifty chat widget. But what separates ChatWing from the others is its ability to comply with its lenience in logging methods. Since it is very easy for other people to join in on your conversations, it can’t be helped that your chat room will fall prey to spammers and other people that post messages which can be damaging to your site’s reputation. But as the admin user, you can prevent all that by using ChatWing’s very effective yet easy-to-use security features.&lt;/div&gt;&lt;div style="text-align: justify;"&gt;&lt;br /&gt;&lt;/div&gt;&lt;div style="text-align: justify;"&gt;By simply watching over your chat room, you can easily ban people out of it with a simple click of the mouse and at the same time erase their messages. Or you can use the blacklist tab on the Dashboard to do so or unban people if you think otherwise. Using the word filter can block out profanity in the chat room and you also have the choice of putting moderators who can also watch over the chat room for you.&lt;/div&gt;&lt;div style="text-align: justify;"&gt;&lt;br /&gt;&lt;/div&gt;&lt;div style="text-align: justify;"&gt;By properly managing the security for your site you can ensure your chatters that the information they’re receiving is totally credible and legit. And with you explaining the things hard for them to understand like different codes or how to crack games and such, it will be much easier for them to understand those. Having a managed and secured chat room will provide you and your chatters a more fulfilling conversation which will benefit you both.  &lt;br /&gt;&lt;br /&gt;&lt;/div&gt;&lt;div style="background-color: #666666; color: white; text-align: justify;"&gt;&lt;i&gt;About the author:&lt;/i&gt;&lt;br /&gt;&lt;i&gt;&lt;br /&gt;&lt;i&gt;Aaron Kong is an active web developer and technology enthusiast who believes in the power of free speech and open communication. These are the driving principles behind his Chatwing chat software. In his spare time he enjoys playing with new gadgets and testing various open source technology. &lt;/i&gt;&lt;/i&gt;&lt;/div&gt;&lt;/div&gt;&lt;div class="blogger-post-footer"&gt;&lt;hr /&gt; &lt;a href="http://www.basicsofhacking.com"&gt;Basics of Ethical Hacking&lt;/a&gt;&lt;/div&gt;</description><media:thumbnail xmlns:media="http://search.yahoo.com/mrss/" height="72" url="https://blogger.googleusercontent.com/img/b/R29vZ2xl/AVvXsEihdSxFB1Mqsmz2NAjTQU6U5Qa3D8-tMHov8xyEWz8fwyTk6_cPPOG_ff_fmJkhkLqD9RcjkZwptCqf6jQ7IpHiaYyujteSaVR_VDDVFWR2zSZ7IfzAK4RxPjE8eFbQN0-aznB5JV4sUVSY/s72-c/ChatWing+Hacking.jpg" width="72"/><thr:total xmlns:thr="http://purl.org/syndication/thread/1.0">0</thr:total></item><item><title>Essential Security Steps For iPhone Fanatics</title><link>http://www.basicsofhacking.com/2013/03/essential-security-steps-for-iphone.html</link><category>GUEST POSTS</category><category>iPHONE HACKS</category><author>noreply@blogger.com (Harwinder Kumar)</author><pubDate>Mon, 4 Mar 2013 17:26:00 +0530</pubDate><guid isPermaLink="false">tag:blogger.com,1999:blog-8198217290464183069.post-7747602505727293082</guid><description>&lt;div dir="ltr" style="text-align: left;" trbidi="on"&gt;&lt;div style="background-color: #666666; color: white; font-weight: normal; text-align: center;"&gt;&lt;div style="text-align: center;"&gt;This is a guest post by Claudia.&lt;/div&gt;&lt;/div&gt;&lt;div style="text-align: justify;"&gt;&lt;br /&gt;For being an iPhone owner, chances are quite bright that you may be obsessed with the same. You will also never be bored from the same, given a range of cool apps that are available on iPhone.&lt;/div&gt;&lt;div style="text-align: justify;"&gt;&lt;div class="separator" style="clear: both; text-align: center;"&gt;&lt;a href="https://blogger.googleusercontent.com/img/b/R29vZ2xl/AVvXsEhxAfWTsrQFbvaHua6-fCwo9pFQrtsYjS0BRF4KI3-dvmc81hMQGBW-25lAhidaORCe1cV7QTgPnV1xCrX6mr8jC7Rz9VUYGeKsgvhBHUZbAeZeiRRK833E3kcrUJ1tfCjCkxr0OM3aqZq7/s1600/iPhone+Security.jpeg" imageanchor="1" style="margin-left: 1em; margin-right: 1em;" target="_blank"&gt;&lt;img alt="iPhone Security" border="0" height="256" src="https://blogger.googleusercontent.com/img/b/R29vZ2xl/AVvXsEhxAfWTsrQFbvaHua6-fCwo9pFQrtsYjS0BRF4KI3-dvmc81hMQGBW-25lAhidaORCe1cV7QTgPnV1xCrX6mr8jC7Rz9VUYGeKsgvhBHUZbAeZeiRRK833E3kcrUJ1tfCjCkxr0OM3aqZq7/s320/iPhone+Security.jpeg" title="iPhone Security" width="320" /&gt;&lt;/a&gt;&lt;/div&gt;&lt;br /&gt;&lt;/div&gt;&lt;div style="text-align: justify;"&gt;However, attractive as they seem, iPhone are a big threat too and the chances of these getting stolen are very high. However, taking some security measures will ensure that the iPhone is safe and secure.&lt;/div&gt;&lt;div style="text-align: justify;"&gt;&lt;/div&gt;&lt;ol&gt;&lt;li&gt;&lt;div style="text-align: justify;"&gt;&lt;b&gt;Have an Auto Lock and a Password:&lt;/b&gt; One of the basic security measure that can be taken is to have an auto lock for the iPhone. Though this may not prevent the phone from being stolen, having an auto lock and a password will ensure that all the important data within the iPhone will never fall in wrong hands. In an incident that took place in 2012, an iPhone belonging to a top political leader in India was stolen while he was travelling by a train. However, as per the information given by the leader in media, no vital data was lost as the iPhone had auto lock mode on. Having this basic security measure ensures that your iPhone will never fall in wrong hands, as the data will be secure all the while.&lt;/div&gt;&lt;div style="text-align: justify;"&gt;&lt;br /&gt;&lt;/div&gt;&lt;div style="text-align: justify;"&gt;&lt;b style="font-weight: bold;"&gt;Real Life Example:&lt;/b&gt; Recently the media in India was abuzz with speculations that iPhone belonging to a senior political leader was stolen when he was away on a tour of his home constituency in Rai Barelly in the state of Uttar Pradesh. However, much loss was prevented as the iPhone had auto lock feature that prevented data loss.&lt;/div&gt;&lt;/li&gt;&lt;li&gt;&lt;div style="text-align: justify;"&gt;&lt;b&gt;Using Wi- Fi Wisely:&lt;/b&gt; Wi-Fi is the most important feature on an iPhone and most iPhone users relish having this feature on the phone. However, unmindful to your knowledge, the Wi-Fi facility on your iPhone can be a security concern too.&lt;/div&gt;&lt;div style="text-align: justify;"&gt;&lt;script async="" src="//pagead2.googlesyndication.com/pagead/js/adsbygoogle.js"&gt;&lt;/script&gt;&lt;br /&gt;&lt;!-- BOH Posts Middle --&gt;&lt;br /&gt;&lt;ins class="adsbygoogle" data-ad-client="ca-pub-7383486949799525" data-ad-format="auto" data-ad-slot="2433698148" style="display: block;"&gt;&lt;/ins&gt;&lt;br /&gt;&lt;script&gt;(adsbygoogle = window.adsbygoogle || []).push({}); &lt;/script&gt;&lt;br /&gt;&lt;/div&gt;&lt;div style="text-align: justify;"&gt;If you are using Wi-Fi facility on your iPhone, ensure that your home network is encrypted so that the iPhone cannot be used without your knowledge. Though, this feature might not be limited to iPhone only but using the iPhone on non encrypted network can have security concerns and you should avoid the same.&lt;/div&gt;&lt;div style="text-align: justify;"&gt;&lt;br /&gt;&lt;/div&gt;&lt;div style="text-align: justify;"&gt;&lt;b style="font-weight: bold;"&gt;Real Life Example:&lt;/b&gt; Wi- Fi facility needs to be used wisely, else the same can lead to data theft too. Top ranking IT companies as Wipro and IBM have caught some mischievous employees who were in the habit of proliferating data on a regular basis causing numerous losses to the establishment.&lt;/div&gt;&lt;/li&gt;&lt;li&gt;&lt;div style="text-align: justify;"&gt;&lt;b&gt;Have an Insurance Package for your iPhone:&lt;/b&gt; One of the biggest security concerns for your iPhone is the risk of it being stolen. Though you might be able to protect the data in your iPhone by enabling the auto lock feature, the physical loss of the iPhone can cost a lot. The best and viable method of getting your iPhone protected is to get an insurance for the same.&lt;/div&gt;&lt;div style="text-align: justify;"&gt;&lt;br /&gt;&lt;/div&gt;&lt;div style="text-align: justify;"&gt;A range of iPhone insurance services are available. Use your instinct and choose a compatible insurance plan for the iPhone that covers iPhone loss due to theft, fire or data damage.&lt;/div&gt;&lt;div style="text-align: justify;"&gt;&lt;br /&gt;&lt;/div&gt;&lt;div style="text-align: justify;"&gt;&lt;b style="font-weight: bold;"&gt;Real Life Example:&lt;/b&gt; Having an insurance package for the iPhone can help recover losses, in case the phone is stolen. Leading insurance companies as Bajaj and HDFC have some plans that have been specially prepared for iPhone users who wish to have insurance for their prized possession.&lt;/div&gt;&lt;/li&gt;&lt;li&gt;&lt;div style="text-align: justify;"&gt;&lt;b&gt;Data Wiping:&lt;/b&gt; You can ensure an additional protection layer for the iPhone by having data wiping facility for the iPhone. This feature is especially useful if someone accesses the passcode of your iPhone. All the data gets wiped off automatically ensuring that no vital information stored in the iPhone lands in wrong hands.&lt;/div&gt;&lt;div style="text-align: justify;"&gt;&lt;br /&gt;&lt;/div&gt;&lt;div style="text-align: justify;"&gt;However, this has risks associated too. Small children in your home might access the iPhone and lay seize to vital data in the iPhone. This will lead to wiping of the data in the iPhone and you might end up in unnecessary trouble.&lt;/div&gt;&lt;div style="text-align: justify;"&gt;&lt;br /&gt;&lt;/div&gt;&lt;div style="text-align: justify;"&gt;&lt;b style="font-weight: bold;"&gt;Real Life Example:&lt;/b&gt; Data wiping is a critical issue that needs to be addressed. A range of software are available online that will help you recover the data in case it is wiped unintentionally. This facility is of special use to intelligence agencies who usually need to crack codes and recover data that might help them solve a case.&lt;/div&gt;&lt;/li&gt;&lt;/ol&gt;&lt;div style="text-align: justify;"&gt;Technology comes with its flaws too and safety of your iPhone is one such concern. Pay attention to the above listed facts and your iPhone will be safe.  &lt;/div&gt;&lt;div style="text-align: justify;"&gt;&lt;br /&gt;&lt;/div&gt;&lt;div style="background-color: #666666; color: white; text-align: justify;"&gt;&lt;i&gt;About the author:&lt;/i&gt;&lt;br /&gt;&lt;i&gt;&lt;br /&gt;&lt;i&gt;Claudia is a writer/blogger. She loves writing, travelling and reading books. She contributes to &lt;a href="http://www.dictated.com/1224/dr-keith-ostrosky-promotes-oral-health-resolution-2013/" target="_blank"&gt;Dr. Keith Ostrosky&lt;/a&gt;.&lt;/i&gt;&lt;/i&gt;&lt;/div&gt;&lt;/div&gt;&lt;div class="blogger-post-footer"&gt;&lt;hr /&gt; &lt;a href="http://www.basicsofhacking.com"&gt;Basics of Ethical Hacking&lt;/a&gt;&lt;/div&gt;</description><media:thumbnail xmlns:media="http://search.yahoo.com/mrss/" height="72" url="https://blogger.googleusercontent.com/img/b/R29vZ2xl/AVvXsEhxAfWTsrQFbvaHua6-fCwo9pFQrtsYjS0BRF4KI3-dvmc81hMQGBW-25lAhidaORCe1cV7QTgPnV1xCrX6mr8jC7Rz9VUYGeKsgvhBHUZbAeZeiRRK833E3kcrUJ1tfCjCkxr0OM3aqZq7/s72-c/iPhone+Security.jpeg" width="72"/><thr:total xmlns:thr="http://purl.org/syndication/thread/1.0">0</thr:total></item><item><title>Most Friendly Tricks For Your iPhone</title><link>http://www.basicsofhacking.com/2013/01/most-friendly-tricks-for-your-iphone.html</link><category>GUEST POSTS</category><category>iPHONE HACKS</category><author>noreply@blogger.com (Harwinder Kumar)</author><pubDate>Fri, 4 Jan 2013 18:58:00 +0530</pubDate><guid isPermaLink="false">tag:blogger.com,1999:blog-8198217290464183069.post-3055866986417755100</guid><description>&lt;div dir="ltr" style="text-align: left;" trbidi="on"&gt;&lt;div style="background-color: #666666; color: white; font-weight: normal; text-align: center;"&gt;&lt;div style="text-align: center;"&gt;This is a guest post by Claudia.&lt;/div&gt;&lt;/div&gt;&lt;div style="text-align: justify;"&gt;&lt;br /&gt;&lt;/div&gt;&lt;div style="text-align: justify;"&gt;&lt;b&gt;Survey Says There are a Lot More iPhone Users Now in India:&lt;/b&gt;&amp;nbsp;The latest gadget to strike human race is iPhones. IPhones are common mobile phones to be used by even the labour class people outside India and is a fast catching device in India. The sales strategies of combined offer of the phone with a sim card seem to be working in their favour and more and more people are using their smart phones as their own peers. These iPhones are believed to have a brain of their own, and are not called smart phones just like that; the features are bound to be user friendly. And so if you are planning to buy an iPhone the following list of tricks is sure to help you get accustomed with the phone.&lt;br /&gt;&lt;br /&gt;&lt;div class="separator" style="clear: both; text-align: center;"&gt;&lt;a href="https://blogger.googleusercontent.com/img/b/R29vZ2xl/AVvXsEjSvkQSzd05Et6M7JFCCpTaLN6j4WuZ8csQUfcXeAxFsLoDw3dqIvNTD_BR_EmSSFwc0H9DZewGe3y2Y35GEmp0fXHZNWnjUkFwBhRW8YMNNaoB3D0rCaj3QhJqvTe8pAetlsE6_FAxSd9G/s1600/iPhone+Tips.jpg" imageanchor="1" style="margin-left: 1em; margin-right: 1em;" target="_blank"&gt;&lt;img alt="iPhone Tips" border="0" height="200" src="https://blogger.googleusercontent.com/img/b/R29vZ2xl/AVvXsEjSvkQSzd05Et6M7JFCCpTaLN6j4WuZ8csQUfcXeAxFsLoDw3dqIvNTD_BR_EmSSFwc0H9DZewGe3y2Y35GEmp0fXHZNWnjUkFwBhRW8YMNNaoB3D0rCaj3QhJqvTe8pAetlsE6_FAxSd9G/s200/iPhone+Tips.jpg" title="iPhone Tips" width="147" /&gt;&lt;/a&gt;&lt;/div&gt;&lt;br /&gt;&lt;/div&gt;&lt;div style="text-align: justify;"&gt;&lt;b&gt;You Might Lose Track of Your Relationships, your iPhone Will Not:&lt;/b&gt;There is a list of user friendly applications or apps as you put it in mobile language. One of them Siri, keeps a track of your relationships. For example you save it beforehand that so and so are your wife and mother. Therefore when you voice command your phone, “call my wife” it has enough intelligence to not mix it up between your mother and wife and dial your wife’s number. This is not the only useful part of Siri, it even stores your home and office address so that it can distinguish between the reminders that you put on your phone and remind you every time before you leave a certain place. Siri even can take quick dictations and reply to a certain email.&lt;br /&gt;&lt;br /&gt;&lt;div class="separator" style="clear: both; text-align: center;"&gt;&lt;a href="https://blogger.googleusercontent.com/img/b/R29vZ2xl/AVvXsEj1AzsIzwEen8AjwxJccVj5Ko5dkXtx3HOko7out4ji8bU_L4OWsiI0swb1vAE1mCLqRS9poHdE_ZzXA8fhQr4dxLnA7CvkjUcdJiGzLvbOsrDTWjDLNKSHGqm51SlWRPZhw5KuoLknPDdE/s1600/iCard.jpg" imageanchor="1" style="margin-left: 1em; margin-right: 1em;" target="_blank"&gt;&lt;img alt="iCard" border="0" height="111" src="https://blogger.googleusercontent.com/img/b/R29vZ2xl/AVvXsEj1AzsIzwEen8AjwxJccVj5Ko5dkXtx3HOko7out4ji8bU_L4OWsiI0swb1vAE1mCLqRS9poHdE_ZzXA8fhQr4dxLnA7CvkjUcdJiGzLvbOsrDTWjDLNKSHGqm51SlWRPZhw5KuoLknPDdE/s200/iCard.jpg" title="iCard" width="200" /&gt;&lt;/a&gt;&lt;/div&gt;&lt;br /&gt;&lt;/div&gt;&lt;div style="text-align: justify;"&gt;&lt;b&gt;Saving you From Tacky Situations - iPhone Dictation:&lt;/b&gt;IPhone is getting forever upgraded with newer and newer versions.&lt;/div&gt;&lt;ul style="text-align: left;"&gt;&lt;li style="text-align: justify;"&gt;The latest is the iPhone5 but the software of taking dictation was developed in iPhone4 itself. The microphone button is present in the keypad itself that saves you in a situation where it is easier to dictate a quick reply to an email or text.&lt;/li&gt;&lt;li style="text-align: justify;"&gt;Whereas iPhone5 launched the panorama concept of photography. In this mode you can take a long picture as soon as you press star and move the camera in the direction of the picture without the resolution creating a difference.&lt;/li&gt;&lt;/ul&gt;&lt;div style="text-align: justify;"&gt;&lt;b&gt;&lt;b&gt;iPhone Made Web Browsing a Hobby For Everyone:&lt;/b&gt;&lt;/b&gt;Emailing is made easy with iPhone where if you just touch and hold the compose button you can edit the last saved draft item. And refreshing your inbox is always ready with a download swipe that is quick enough to save your precious time. While switching to landscape full screen mode gives a totally different and realistic view of the website. Touching and holding a picture in the web browser easily saves the image in your own gallery.&lt;br /&gt;&lt;/div&gt;&lt;b&gt;&lt;/b&gt;&lt;br /&gt;&lt;div style="text-align: justify;"&gt;&lt;b&gt;Conclusion:&lt;/b&gt;IPhone is also very handy for all those messaging fingers. The customized keyboard offers you an option of saving your very own short forms so that later you don’t have to type the whole thing while replying to a text. And the oh-so-delightful app iCloud easily tracks your iPhone after you have lost it by simply activating the “find my iPhone” option in the app itself. If you just zeroed in another model of mobile phone think again about all the features and don’t forget to compare them with those of the iPhone. This is sure to change your decision for good. This one time investment has a long way to go.&lt;br /&gt;&lt;br /&gt;&lt;/div&gt;&lt;div style="background-color: #666666; color: white; text-align: justify;"&gt;&lt;i&gt;About the author:&lt;/i&gt;&lt;br /&gt;&lt;i&gt;&lt;br /&gt;&lt;i&gt;Claudia is a blogger by profession. She loves writing, reading and traveling. Beside this she is fond of luxury cars and wishes to own one day &lt;a href="http://www.bornrich.com/lexus-gs-450h-sedan.html" target="_blank"&gt;Lexus GS 450h Sedan&lt;/a&gt;.&lt;/i&gt;&lt;/i&gt;&lt;/div&gt;&lt;/div&gt;&lt;div class="blogger-post-footer"&gt;&lt;hr /&gt; &lt;a href="http://www.basicsofhacking.com"&gt;Basics of Ethical Hacking&lt;/a&gt;&lt;/div&gt;</description><media:thumbnail xmlns:media="http://search.yahoo.com/mrss/" height="72" url="https://blogger.googleusercontent.com/img/b/R29vZ2xl/AVvXsEjSvkQSzd05Et6M7JFCCpTaLN6j4WuZ8csQUfcXeAxFsLoDw3dqIvNTD_BR_EmSSFwc0H9DZewGe3y2Y35GEmp0fXHZNWnjUkFwBhRW8YMNNaoB3D0rCaj3QhJqvTe8pAetlsE6_FAxSd9G/s72-c/iPhone+Tips.jpg" width="72"/><thr:total xmlns:thr="http://purl.org/syndication/thread/1.0">0</thr:total></item><item><title>How To Change Default Google Chrome Icon with Golden Color?</title><link>http://www.basicsofhacking.com/2013/01/how-to-change-default-google-chrome.html</link><category>CHROME TRICKS</category><author>noreply@blogger.com (Harwinder Kumar)</author><pubDate>Tue, 1 Jan 2013 16:21:00 +0530</pubDate><guid isPermaLink="false">tag:blogger.com,1999:blog-8198217290464183069.post-6068568597275636097</guid><description>&lt;div dir="ltr" style="text-align: left;" trbidi="on"&gt;&lt;div&gt;&lt;div class="separator" style="clear: both; text-align: justify;"&gt;&lt;a href="https://blogger.googleusercontent.com/img/b/R29vZ2xl/AVvXsEgf6iI8hESxARF7a1OjrYQ4sPA1QTUwgRgWM4gx-bSOZusl7gDbs10c06ON7okA_vGvCyewHEvEZ2i8bMmua5XTx1l5cg9J6q31AXGa0GUB_B9JfWcX30biPl1EZTGE_IshvwPCqtaXZLsj/s1600/Google+Chrome+Golden+Icon.png" imageanchor="1" style="clear: left; float: left; margin-bottom: 0.1em; margin-right: 1em;" target="_blank"&gt;&lt;img alt="Google Chrome Golden Icon" border="0" src="https://blogger.googleusercontent.com/img/b/R29vZ2xl/AVvXsEgf6iI8hESxARF7a1OjrYQ4sPA1QTUwgRgWM4gx-bSOZusl7gDbs10c06ON7okA_vGvCyewHEvEZ2i8bMmua5XTx1l5cg9J6q31AXGa0GUB_B9JfWcX30biPl1EZTGE_IshvwPCqtaXZLsj/s1600/Google+Chrome+Golden+Icon.png" height="199" title="Google Chrome Golden Icon" width="200" /&gt;&lt;/a&gt;&lt;/div&gt;&lt;div style="text-align: justify;"&gt;Hi everyone! First of all happy new year to all! It has been a long time since my last own written post and today I'm writing my first post of this year on how to change &lt;a href="http://www.basicsofhacking.com/2012/06/fun-with-google-some-more-cool-google.html" target="_blank"&gt;default Google&lt;/a&gt; chrome icon with the golden color.&amp;nbsp;&lt;/div&gt;&lt;div style="text-align: justify;"&gt;&lt;br /&gt;&lt;/div&gt;&lt;div style="text-align: justify;"&gt;As for now I'm working as freelancer on some freelancer sites like &lt;a href="https://www.odesk.com/users/~013d4fe948c11fedf1" target="_blank"&gt;oDesk&lt;/a&gt;, &lt;a href="https://www.freelancer.com/u/arfharwinder.html" target="_blank"&gt;Freelancer&lt;/a&gt;, PPH so hardly found time in last few months to manage the blog, but from now I hope to be regular again on blogging. Recently I have published a page "&lt;a href="http://www.basicsofhacking.com/p/hire-me.html" target="_blank"&gt;Hire Me&lt;/a&gt;", so please take a look on it too.&lt;br /&gt;&lt;/div&gt;&lt;div style="text-align: justify;"&gt;Coming back to the post, follow these simple steps to change your chrome icon with golden color:&lt;/div&gt;&lt;ul style="text-align: left;"&gt;&lt;li&gt;Go to the Properties of Google Chrome by right click on the shortcut icon.&lt;/li&gt;&lt;li&gt;Under Properties, go to Shortcut tab and click on Change Icon, you will prompted to a new window as shown in picture below.&lt;br /&gt;&lt;br /&gt;&lt;div style="text-align: center;"&gt;&lt;a href="https://blogger.googleusercontent.com/img/b/R29vZ2xl/AVvXsEjgGRtZpavc11hBFFJ4dSER8BJaOjyLGMo5msyHC_oJODCFR0Kqobn_hHD_n4GEWPXOHvn9Cx_DC0bH_0NT574Vg4GgJO5iPAKhH8_XZIr-6-F3HTH-uWtrhfM3U3urjQIQMNVO8mqNgSr1/s1600/Chrome+Properties.PNG" style="margin-left: 1em; margin-right: 1em;" target="_blank"&gt;&lt;img alt="Chrome Properties" border="0" src="https://blogger.googleusercontent.com/img/b/R29vZ2xl/AVvXsEjgGRtZpavc11hBFFJ4dSER8BJaOjyLGMo5msyHC_oJODCFR0Kqobn_hHD_n4GEWPXOHvn9Cx_DC0bH_0NT574Vg4GgJO5iPAKhH8_XZIr-6-F3HTH-uWtrhfM3U3urjQIQMNVO8mqNgSr1/s1600/Chrome+Properties.PNG" height="310" title="Chrome Properties" width="320" /&gt;&lt;/a&gt;&lt;/div&gt;&lt;/li&gt;&lt;li&gt;Click on Golden icon and apply changes.&lt;/li&gt;&lt;li&gt;That's all.&lt;/li&gt;&lt;/ul&gt;&lt;/div&gt;Enjoy your first day of new year :)&lt;/div&gt;&lt;div class="blogger-post-footer"&gt;&lt;hr /&gt; &lt;a href="http://www.basicsofhacking.com"&gt;Basics of Ethical Hacking&lt;/a&gt;&lt;/div&gt;</description><media:thumbnail xmlns:media="http://search.yahoo.com/mrss/" height="72" url="https://blogger.googleusercontent.com/img/b/R29vZ2xl/AVvXsEgf6iI8hESxARF7a1OjrYQ4sPA1QTUwgRgWM4gx-bSOZusl7gDbs10c06ON7okA_vGvCyewHEvEZ2i8bMmua5XTx1l5cg9J6q31AXGa0GUB_B9JfWcX30biPl1EZTGE_IshvwPCqtaXZLsj/s72-c/Google+Chrome+Golden+Icon.png" width="72"/><thr:total xmlns:thr="http://purl.org/syndication/thread/1.0">0</thr:total></item><item><title>The Grinch And His Data Theft Antics 2012</title><link>http://www.basicsofhacking.com/2012/12/the-grinch-and-his-data-theft-antics.html</link><category>GUEST POSTS</category><author>noreply@blogger.com (Harwinder Kumar)</author><pubDate>Tue, 18 Dec 2012 12:43:00 +0530</pubDate><guid isPermaLink="false">tag:blogger.com,1999:blog-8198217290464183069.post-7384883731614146753</guid><description>&lt;div dir="ltr" style="text-align: left;" trbidi="on"&gt;&lt;div style="background-color: #666666; color: white; font-weight: normal; text-align: center;"&gt;This is a guest post by Jane Andrew.&lt;/div&gt;&lt;div style="text-align: justify;"&gt;&lt;br /&gt;Check list for this Christmas:&lt;br /&gt;&lt;ul style="text-align: left;"&gt;&lt;li style="text-align: justify;"&gt;Gifts for loved ones&lt;/li&gt;&lt;li style="text-align: justify;"&gt;Menu for Christmas dinner&lt;/li&gt;&lt;li style="text-align: justify;"&gt;Christmas tree&lt;/li&gt;&lt;li style="text-align: justify;"&gt;Shopping&lt;/li&gt;&lt;li style="text-align: justify;"&gt;Data protection…?&lt;/li&gt;&lt;/ul&gt;You must be surprised to see the last chore in your Christmas checklist. Prevention is better than cure. With rise in data breach incidents, it is better that you keep a backup of your data, so that it is not lost forever. You can also install an anti-virus or anti-spyware in your gadget to prevent attack of malware, hackers and thieves.&lt;br /&gt;&lt;br /&gt;&lt;div class="separator" style="clear: both; text-align: center;"&gt;&lt;a href="https://blogger.googleusercontent.com/img/b/R29vZ2xl/AVvXsEii1HMPW-GnCYFNLmElz2vAGn1A2tjlOwLs4ipRwSWlbmPT9cXPyZFLOOBwsktrsYFTyb4FTl7TBx3SpS60nbOx0HC5nap9hEATAf-IhgORqgT4bV38qQxfRphMYw4qhdpEwtlUTJJVkIVz/s1600/Christmas+Grinch.jpg" imageanchor="1" style="margin-left: 1em; margin-right: 1em;" target="_blank"&gt;&lt;img alt="Christmas Grinch" border="0" src="https://blogger.googleusercontent.com/img/b/R29vZ2xl/AVvXsEii1HMPW-GnCYFNLmElz2vAGn1A2tjlOwLs4ipRwSWlbmPT9cXPyZFLOOBwsktrsYFTyb4FTl7TBx3SpS60nbOx0HC5nap9hEATAf-IhgORqgT4bV38qQxfRphMYw4qhdpEwtlUTJJVkIVz/s1600/Christmas+Grinch.jpg" title="Christmas Grinch" width="400" /&gt;&lt;/a&gt;&lt;/div&gt;&lt;br /&gt;&lt;/div&gt;&lt;div style="background-color: #666666; color: white; text-align: justify;"&gt;&lt;i&gt;About the author:&lt;/i&gt;&lt;br /&gt;&lt;i&gt;&lt;br /&gt;&lt;i&gt;Written by Jane Andrew. "The Grinch who stole data" has been created to keep you in the loop about Data Theft trends 2012. Mobistealth, the firm that developed the infographic, deals in keylogger software.&lt;/i&gt;&lt;/i&gt;&lt;/div&gt;&lt;/div&gt;&lt;div class="blogger-post-footer"&gt;&lt;hr /&gt; &lt;a href="http://www.basicsofhacking.com"&gt;Basics of Ethical Hacking&lt;/a&gt;&lt;/div&gt;</description><media:thumbnail xmlns:media="http://search.yahoo.com/mrss/" height="72" url="https://blogger.googleusercontent.com/img/b/R29vZ2xl/AVvXsEii1HMPW-GnCYFNLmElz2vAGn1A2tjlOwLs4ipRwSWlbmPT9cXPyZFLOOBwsktrsYFTyb4FTl7TBx3SpS60nbOx0HC5nap9hEATAf-IhgORqgT4bV38qQxfRphMYw4qhdpEwtlUTJJVkIVz/s72-c/Christmas+Grinch.jpg" width="72"/><thr:total xmlns:thr="http://purl.org/syndication/thread/1.0">0</thr:total></item><item><title>Why These Days Hacking Is Easy And Everyone Is Hacked?</title><link>http://www.basicsofhacking.com/2012/09/why-these-days-hacking-is-easy-and.html</link><category>GUEST POSTS</category><author>noreply@blogger.com (Harwinder Kumar)</author><pubDate>Thu, 27 Sep 2012 14:01:00 +0530</pubDate><guid isPermaLink="false">tag:blogger.com,1999:blog-8198217290464183069.post-5929657512233346022</guid><description>&lt;div dir="ltr" style="text-align: left;" trbidi="on"&gt;&lt;div style="background-color: #666666; color: white; font-weight: normal; text-align: center;" xmlns="http://www.w3.org/1999/xhtml"&gt;This is a guest post by Claudia.&lt;/div&gt;&lt;br /&gt;&lt;div style="text-align: justify;"&gt;This is among the most common questions which seem to be troubling the modern day generation. People with even some basic computer and internet knowledge can understand the severity of this issue.&lt;br /&gt;&lt;div class="separator" style="clear: both; text-align: center;"&gt;&lt;a href="https://blogger.googleusercontent.com/img/b/R29vZ2xl/AVvXsEgDjMcDOSCxe-mDv7NFKUVxko56DJCcl1DOsQY0HG1lwuLYSvjnzlg5DAjiAfGs_QW58W2vI-W3C0ag68nmMxGMce5T3K8Ml1a6ie8vLJCSYlxs4EmG4AGcSk-h7x_rtOvYshd1pmctBa7w/s1600/Hacking.jpg" imageanchor="1" style="margin-left: 1em; margin-right: 1em;" target="_blank"&gt;&lt;img alt="Hacking" border="0" height="282" src="https://blogger.googleusercontent.com/img/b/R29vZ2xl/AVvXsEgDjMcDOSCxe-mDv7NFKUVxko56DJCcl1DOsQY0HG1lwuLYSvjnzlg5DAjiAfGs_QW58W2vI-W3C0ag68nmMxGMce5T3K8Ml1a6ie8vLJCSYlxs4EmG4AGcSk-h7x_rtOvYshd1pmctBa7w/s400/Hacking.jpg" title="Hacking" width="400" /&gt;&lt;/a&gt;&lt;/div&gt;&lt;br /&gt;However, hacking is not an easy nut to crack; it requires lots of skills and efforts and is considered among the tougher tasks. Yet, these days, hackers have created whole lot of mess by simply cracking passwords of emails, bank accounts, and other similar things. This has emerged as a serious threat in the present context especially when you transfer money online, and carry out countless things on the web. The following are few possible reasons why hacking is becoming a rampant phenomenon where so many people are getting hacked.&lt;/div&gt;&lt;div style="text-align: justify;"&gt;&lt;br /&gt;&lt;/div&gt;&lt;h3 style="text-align: justify;"&gt;The Password Habits of Users are Getting Worse&lt;/h3&gt;&lt;div style="text-align: justify;"&gt;Any average internet user maintains around 25 different accounts but simply uses merely 6.5 passwords to secure them. The fact is maintaining this much of accounts is not an easy job as you need lots of brain space to remember complex code combos which is actually a difficult task. This simply ends up creating common passwords for a number of accounts.&lt;br /&gt;&lt;!-- BOH Posts Middle --&gt;&lt;br /&gt;&lt;ins class="adsbygoogle" data-ad-client="ca-pub-7383486949799525" data-ad-format="auto" data-ad-slot="2433698148" style="display: block;"&gt;&lt;/ins&gt;&lt;br /&gt;&lt;script&gt;(adsbygoogle = window.adsbygoogle || []).push({}); &lt;/script&gt;Further, the password people select are often very simple and even stupid which are easy to crack. According to different studies, it takes hardly ten minutes to crack any lower case six character based passwords. The best way to avert this issue is to use dumb passwords.&lt;/div&gt;&lt;div style="text-align: justify;"&gt;&lt;br /&gt;&lt;/div&gt;&lt;h3 style="text-align: justify;"&gt;Cracking Passwords Have Become Easy&lt;/h3&gt;&lt;div style="text-align: justify;"&gt;Earlier cracking passwords was really a tough nut to crack, however, these days with so many tools, graphic processors, and password cracking programs doing this job has become faster and easy. In fact, there is a drastic advancement seen in the hacking world which has made cracking password a simple exercise. The most classic example is the LinkedIn breach of how things have changed in hacking domain. This has therefore proved that modern passwords are no more secure as they were in the past.&lt;/div&gt;&lt;div style="text-align: justify;"&gt;&lt;br /&gt;&lt;/div&gt;&lt;h3 style="text-align: justify;"&gt;Growth in Hacking Network Effect&lt;/h3&gt;&lt;div style="text-align: justify;"&gt;With every successful password hacking effort, the hackers and cyber thieves learn a lot about these crimes. The fast growing list of a wide range of leaked passwords has enabled the programmers to device rules which make the cracking algorithms more accurate and fast. This has therefore made the password attacks a cut and paste job, which even the script kiddies are able to carry out without much efforts. Still, you would see many web users having a password like ‘123456’ or words like ‘password’ despite being cautioned several times to use difficult and unique passwords.&lt;/div&gt;&lt;div style="text-align: justify;"&gt;&lt;br /&gt;&lt;/div&gt;&lt;h3 style="text-align: justify;"&gt;Websites Have Now Turned Worst in Protecting the Users&lt;/h3&gt;&lt;div style="text-align: justify;"&gt;The best example is again the case of LinkedIn breach where the company confessed that it simply occurred due to some poor protective measures. There are other examples of such hacking over a number of big and small websites. Most of these sites simply do not have sufficient amount of ‘cryptographic salt’ to their password protection. This renders opportunities to cyber criminals to hack such sites. A number of popular sites are seen ignoring this cryptographic salt element in their password security system.&lt;/div&gt;&lt;div style="text-align: justify;"&gt;&lt;br /&gt;&lt;/div&gt;&lt;h3 style="text-align: justify;"&gt;Conclusion&lt;/h3&gt;&lt;div style="text-align: justify;"&gt;Checking the above reasons confirms a fact that we have now reached to end of these password security systems. However, let’s keep our fingers crossed and see technology fixing these issues for the millions of users. Or, we need to simply embark with our own solutions to shield us from different hackers attack.&lt;br /&gt;&lt;br /&gt;&lt;/div&gt;&lt;div style="background-color: #666666; color: white; text-align: justify;" xmlns="http://www.w3.org/1999/xhtml"&gt;&lt;i&gt;About the author:&lt;/i&gt;&lt;br /&gt;&lt;i&gt;&lt;br /&gt;&lt;i&gt;Claudia is a writer/blogger. She loves writing, travelling and content marketing. These days she is busy to write an article on &lt;a href="http://betaout.com/" target="_blank"&gt;content marketing&lt;/a&gt;. Recently she did an article on viral marketing.&lt;/i&gt;&lt;/i&gt;&lt;/div&gt;&lt;/div&gt;&lt;div class="blogger-post-footer"&gt;&lt;hr /&gt; &lt;a href="http://www.basicsofhacking.com"&gt;Basics of Ethical Hacking&lt;/a&gt;&lt;/div&gt;</description><media:thumbnail xmlns:media="http://search.yahoo.com/mrss/" height="72" url="https://blogger.googleusercontent.com/img/b/R29vZ2xl/AVvXsEgDjMcDOSCxe-mDv7NFKUVxko56DJCcl1DOsQY0HG1lwuLYSvjnzlg5DAjiAfGs_QW58W2vI-W3C0ag68nmMxGMce5T3K8Ml1a6ie8vLJCSYlxs4EmG4AGcSk-h7x_rtOvYshd1pmctBa7w/s72-c/Hacking.jpg" width="72"/><thr:total xmlns:thr="http://purl.org/syndication/thread/1.0">1</thr:total></item><item><title>New Headache: Hackers Targeting Android Browser</title><link>http://www.basicsofhacking.com/2012/09/new-headache-hackers-targeting-android_21.html</link><category>GUEST POSTS</category><author>noreply@blogger.com (Harwinder Kumar)</author><pubDate>Fri, 21 Sep 2012 11:36:00 +0530</pubDate><guid isPermaLink="false">tag:blogger.com,1999:blog-8198217290464183069.post-9146565786510015732</guid><description>&lt;div dir="ltr" style="text-align: left;" trbidi="on"&gt;&lt;div style="background-color: #666666; color: white; font-weight: normal; text-align: center;" xmlns="http://www.w3.org/1999/xhtml"&gt;This is a guest post by Jaskirat S Talwar.&lt;/div&gt;&lt;div style="text-align: justify;"&gt;&lt;br /&gt;&lt;div class="separator" style="clear: both; text-align: center;"&gt;&lt;a href="https://blogger.googleusercontent.com/img/b/R29vZ2xl/AVvXsEiBTffo95c8gSzBmkIJ8TgkGhC7toIxUsCZy636S1f2JnlJSfix1qHDQjxkO56KLy5nZSwxdYSY8g8_l3ND8Ga5nOHeFe4VImitm16kGW6BPZLSkPRXIy-4f710ygLYDM2aKL7BNLEPirNL/s1600/Android+Virus.jpg" imageanchor="1" style="clear: left; float: left; margin-bottom: 0.1em; margin-right: 1em;" target="_blank"&gt;&lt;img alt="Android Virus" border="0" height="127" src="https://blogger.googleusercontent.com/img/b/R29vZ2xl/AVvXsEiBTffo95c8gSzBmkIJ8TgkGhC7toIxUsCZy636S1f2JnlJSfix1qHDQjxkO56KLy5nZSwxdYSY8g8_l3ND8Ga5nOHeFe4VImitm16kGW6BPZLSkPRXIy-4f710ygLYDM2aKL7BNLEPirNL/s200/Android+Virus.jpg" title="Android Virus" width="200" /&gt;&lt;/a&gt;&lt;/div&gt;According to statistics, cybercriminals and hackers are now targeting the Android browser. Many Android phones are now malware-infected through the browsers. This tactic is working and so if you are an Android phone user, you have to take the necessary precautionary measures.&lt;br /&gt;&lt;br /&gt;Hackers implant hidden downloads in the web pages that are optimized for mobile internet users. Reports claim that there are now over 4,500 malware species infecting Android phones, Java ME, and Symbian.&lt;br /&gt;&lt;br /&gt;A great disadvantage in using Android phones is that the security etiquette adopted by laptops and desktop computers is not yet available to mobile gadgets. Most Android users are unaware that there are infected sites that can cause potential harm to their mobile phone. Fake files make use of unsuspected names and the vulnerable Android user downloads it thinking that the file is a system or software update.&lt;br /&gt;&lt;br /&gt;Hackers these days are very specific in choosing their targets, and are also more precise. If you want to protect your phone from hackers, here are some things you can do:&lt;br /&gt;&lt;ul&gt;&lt;li&gt;&lt;b&gt;Update your Android browser automatically:&lt;/b&gt;&amp;nbsp;This is to ensure that you’re using the latest browser version. You need to be sure that it is set in auto-updating because in some browsers it is disabled.&lt;/li&gt;&lt;li&gt;&lt;b&gt;Disable cookies tracking:&amp;nbsp;&lt;/b&gt;At some point, cookies can be useful. However, there are individuals who don’t like cookies that follow you anywhere you go. A good option is to block the so called third-party cookies. The procedure in blocking these cookies may differ depending on the browser that you’re using.&lt;/li&gt;&lt;li&gt;&lt;b&gt;Sync bookmarks:&lt;/b&gt; You can say goodbye to manual wrangling of bookmarks. Premium services are now available to sync bookmarks to the Android browser. However, you may have to pay around $12 per year for such services. Despite the cost that you will incur, there are also benefits to enjoy.&lt;/li&gt;&lt;li&gt;Use reliable mobile security for your Android. It is better to pay for premium services because you can take advantage of better features like secured internet browsing, remote locking function, back up of important files, and many others.&lt;/li&gt;&lt;li&gt;To keep all data in your phone, you have to make a password today.&lt;/li&gt;&lt;li&gt;Get only the official apps for Android – Be selective with what you download and get it from the official Android Market&lt;/li&gt;&lt;/ul&gt;It is truly a headache for Android phone users once their device is infected with malware. Now that you know the latest news about hackers targeting the browser of Android phones, it is your responsibility to browse the web securely. Follow the suggestions above and you can protect your device from the many malware species found on infected websites.&lt;br /&gt;&lt;br /&gt;Safety is an important factor whenever you surf the web. You can combat these hackers and cybercriminals but you should be equipped with the right knowledge and tools. Frequent updates on your browser are the best way to keep hackers at bay, and this is true whether you own the Google Android or the Apple iOS.&lt;br /&gt;&lt;br /&gt;Because of the popularity of Android phones, it has become one of the primary targets of hackers and cybercriminals.&lt;br /&gt;&lt;div&gt;&lt;br /&gt;&lt;/div&gt;&lt;/div&gt;&lt;div style="background-color: #666666; color: white; text-align: justify;" xmlns="http://www.w3.org/1999/xhtml"&gt;&lt;i&gt;About the author:&lt;/i&gt;&lt;br /&gt;&lt;i&gt;&lt;br /&gt;&lt;i&gt;Jaskirat S Talwar is the owner of Imping Solution. Impinge Solutions is a &lt;a href="http://www.impingesolutions.com/" target="_blank"&gt;WEB DESIGN COMPANY&lt;/a&gt; which offers full-cycle services in areas of custom web design, web development, MOBILE APPLICATION DEVELOPMENT, SEO, hosting &amp;amp; support in all over the Globe.&lt;/i&gt;&lt;/i&gt;&lt;/div&gt;&lt;/div&gt;&lt;div class="blogger-post-footer"&gt;&lt;hr /&gt; &lt;a href="http://www.basicsofhacking.com"&gt;Basics of Ethical Hacking&lt;/a&gt;&lt;/div&gt;</description><media:thumbnail xmlns:media="http://search.yahoo.com/mrss/" height="72" url="https://blogger.googleusercontent.com/img/b/R29vZ2xl/AVvXsEiBTffo95c8gSzBmkIJ8TgkGhC7toIxUsCZy636S1f2JnlJSfix1qHDQjxkO56KLy5nZSwxdYSY8g8_l3ND8Ga5nOHeFe4VImitm16kGW6BPZLSkPRXIy-4f710ygLYDM2aKL7BNLEPirNL/s72-c/Android+Virus.jpg" width="72"/><thr:total xmlns:thr="http://purl.org/syndication/thread/1.0">0</thr:total></item><item><title>Two Leading Hacking Vulnerabilities In Your Mobile Device</title><link>http://www.basicsofhacking.com/2012/09/two-leading-hacking-vulnerabilities-in.html</link><category>GUEST POSTS</category><author>noreply@blogger.com (Harwinder Kumar)</author><pubDate>Thu, 20 Sep 2012 00:15:00 +0530</pubDate><guid isPermaLink="false">tag:blogger.com,1999:blog-8198217290464183069.post-2662470560206098811</guid><description>&lt;div dir="ltr" style="text-align: left;" trbidi="on"&gt;&lt;div style="background-color: #666666; color: white; font-weight: normal; text-align: center;" xmlns="http://www.w3.org/1999/xhtml"&gt;This is a guest post by Ryan Corey.&lt;/div&gt;&lt;div style="text-align: justify;"&gt;&lt;br /&gt;&lt;div class="separator" style="clear: both; text-align: center;"&gt;&lt;a href="https://blogger.googleusercontent.com/img/b/R29vZ2xl/AVvXsEjvxhyGGEGLxjLvq_Zzxpfo-_zp-yCXviHp3KCyUwHT-43U3AoiwHvQEioizOYdDCjuF5147SOQ8fORpX0Yi_9Twwuo24Yw8cmcuKn8j-kebNs2bEMVSLlGDHqIDuDBR6r6_4u0NsfyQulO/s1600/mobile-device.jpg" imageanchor="1" style="clear: left; float: left; margin-bottom: 0.1em; margin-right: 1em;" target="_blank"&gt;&lt;img alt="Mobile Device" border="0" height="200" src="https://blogger.googleusercontent.com/img/b/R29vZ2xl/AVvXsEjvxhyGGEGLxjLvq_Zzxpfo-_zp-yCXviHp3KCyUwHT-43U3AoiwHvQEioizOYdDCjuF5147SOQ8fORpX0Yi_9Twwuo24Yw8cmcuKn8j-kebNs2bEMVSLlGDHqIDuDBR6r6_4u0NsfyQulO/s200/mobile-device.jpg" title="Mobile Device" width="150" /&gt;&lt;/a&gt;&lt;/div&gt;Mobile devices including smartphones and tablets are convenient tools used to connect people to professional contacts, friends and family members. While this technology has made life easier for many people, weaknesses in mobile devices that leave these devices open to hacking can result in theft of personal, corporate, Government and classified information and lead to the burden of dealing with identity theft, public humiliation, reputation damage and even legal penalty and financial loss.&lt;/div&gt;&lt;div style="text-align: justify;"&gt;&lt;br /&gt;&lt;/div&gt;&lt;h3 style="text-align: justify;"&gt;Downloading Applications&lt;/h3&gt;&lt;div style="text-align: justify;"&gt;&lt;br /&gt;&lt;/div&gt;&lt;div style="text-align: justify;"&gt;Apps are fun and useful additions to a mobile device, but users should take care when browsing the app store and starting a download. While most apps are perfectly safe, there is the possibility that an app will contain malware. Even if the app itself does not contain malware, ads that are featured when a user is using a free app could prompt a person to start a download of malicious material. Anyone who notices that a download has started on their mobile device after they have clicked on an ad should be sure to immediately stop the download and delete anything that has been downloaded on to their mobile device.&lt;/div&gt;&lt;div style="text-align: justify;"&gt;&lt;br /&gt;&lt;/div&gt;&lt;div style="text-align: justify;"&gt;Preventing malware downloads in the first place requires a person to be diligent about what is downloaded on a personal mobile device. Free apps require a bit of research before a download is completed. Make note of the publisher, and run an online search to find out if anyone has reported that apps from this publisher contain malware. Read all of the information provided before the app is download. Permissions that are required prior to a download should be related to the features contained in the app. For example, there is no reason that a calculator app would need to access a user's contact list.&lt;/div&gt;&lt;div style="text-align: justify;"&gt;&lt;br /&gt;&lt;/div&gt;&lt;div style="text-align: justify;"&gt;The final line of defense against malware downloaded from apps available on mobile devices is utilizing a virus scanner. As with any other download, make sure that the virus scanner itself is from a reputable source. Online reviews can help a person decide which virus scanner is most effective for their mobile device.&lt;/div&gt;&lt;div style="text-align: justify;"&gt;&lt;br /&gt;&lt;/div&gt;&lt;h3 style="text-align: justify;"&gt;Wireless Man in the Middle Attacks&lt;/h3&gt;&lt;div style="text-align: justify;"&gt;&lt;br /&gt;&lt;/div&gt;&lt;div style="text-align: justify;"&gt;Setting your mobile device, and in most cases your phone, can be one of the main perks of upgrading your device to the latest model. 3G mobile hotspots became popular years ago and now everyone wants a device that can act as a hub for multiple devices to get online at almost any 4G location. These devices are also extremely vulnerable to what is referred to in the hacking community as Wireless Man in the Middle Attacks (MiTM). These attacks are easy to implement from a hacker perspective and can be the most personally damaging because they usually offer up the majority of a person’s personal information via their cell phone and other active mobile device like an iPad or Laptop. The MiTM attacker can easily mask themselves as an authorized user on the network and can give themselves full access to almost all information on your device including credit card numbers, access codes, data and even access to other networks related to you.&lt;/div&gt;&lt;div style="text-align: justify;"&gt;&lt;br /&gt;&lt;/div&gt;&lt;div style="text-align: justify;"&gt;Wireless hacking is rampant. It is not just a tool for covert ops professionals overseas anymore. Thieves are using these types of attacks daily across the country.&lt;/div&gt;&lt;div style="text-align: justify;"&gt;&lt;br /&gt;&lt;/div&gt;&lt;h3 style="text-align: justify;"&gt;Using the Android Operating System (OS)&lt;/h3&gt;&lt;div style="text-align: justify;"&gt;&lt;br /&gt;&lt;/div&gt;&lt;div style="text-align: justify;"&gt;Reports related to the number of malware attacks on mobile devices have shown that the Android OS is the most vulnerable to these attacks. According to McAfee, mobile devices with an Android OS accounted for approximately 70 percent of all malware attacks on mobile devices in 2011. The most common way for malware attacks to occur on these devices is through the download of an app.&lt;/div&gt;&lt;div style="text-align: justify;"&gt;&lt;br /&gt;&lt;/div&gt;&lt;div style="text-align: justify;"&gt;The fact that the Android OS is most vulnerable to malware attacks does not necessarily mean that people should avoid all mobile devices using an Android OS. As detailed above, users of mobile devices can avoid malware by being proactive about the security of their devices.&lt;/div&gt;&lt;div style="text-align: justify;"&gt;&lt;br /&gt;&lt;/div&gt;&lt;div style="text-align: justify;"&gt;Owning a mobile device is a convenient way to stay connected with your organization as well as your social world, but this connectivity does result in serious vulnerabilities. Want to learn more about mobile security and hacking? Check out the &lt;a href="http://www.trainace.com/courses/mobile-hacking/" target="_blank"&gt;TrainACE Advanced Mobile Hacking Courses&lt;/a&gt;.&lt;br /&gt;&lt;br /&gt;&lt;/div&gt;&lt;div style="background-color: #666666; color: white; text-align: justify;" xmlns="http://www.w3.org/1999/xhtml"&gt;&lt;i&gt;About the author:&lt;/i&gt;&lt;br /&gt;&lt;i&gt;&lt;br /&gt;&lt;i&gt;This is a guest post by Ryan Corey or TrainACE, a computer training school in Maryland. TrainACE provides on campus, on-site, and online training for various IT security classes such as CEH, CHFI, Security+, and more.&lt;/i&gt;&lt;/i&gt;&lt;/div&gt;&lt;/div&gt;&lt;div class="blogger-post-footer"&gt;&lt;hr /&gt; &lt;a href="http://www.basicsofhacking.com"&gt;Basics of Ethical Hacking&lt;/a&gt;&lt;/div&gt;</description><media:thumbnail xmlns:media="http://search.yahoo.com/mrss/" height="72" url="https://blogger.googleusercontent.com/img/b/R29vZ2xl/AVvXsEjvxhyGGEGLxjLvq_Zzxpfo-_zp-yCXviHp3KCyUwHT-43U3AoiwHvQEioizOYdDCjuF5147SOQ8fORpX0Yi_9Twwuo24Yw8cmcuKn8j-kebNs2bEMVSLlGDHqIDuDBR6r6_4u0NsfyQulO/s72-c/mobile-device.jpg" width="72"/><thr:total xmlns:thr="http://purl.org/syndication/thread/1.0">0</thr:total></item><item><title>Are Social Networks Putting You At Risk?</title><link>http://www.basicsofhacking.com/2012/09/are-social-networks-putting-you-at-risk.html</link><category>GUEST POSTS</category><author>noreply@blogger.com (Harwinder Kumar)</author><pubDate>Tue, 11 Sep 2012 17:30:00 +0530</pubDate><guid isPermaLink="false">tag:blogger.com,1999:blog-8198217290464183069.post-6867404792761194042</guid><description>&lt;div dir="ltr" style="text-align: left;" trbidi="on"&gt;&lt;div style="background-color: #666666; color: white; font-weight: normal; text-align: center;" xmlns="http://www.w3.org/1999/xhtml"&gt;This is a guest post by Phoenix TS.&lt;/div&gt;&lt;br /&gt;&lt;div class="separator" style="clear: both; text-align: center;"&gt;&lt;a href="https://blogger.googleusercontent.com/img/b/R29vZ2xl/AVvXsEhZJQuK-tVUR6dlQs9jwvp2TN7NyjC1jOogSxEeOG-wSpujV3h-hyV7rIBrPKfM98OYden7pOh6kmOVhGGUeOl7y-UE21zAUV41KDZ_ExL-LqYRM3B-iW4b5RMtrfd_wFecDapEQooijrx6/s1600/social-media-logos.JPG" imageanchor="1" style="clear: left; float: left; margin-bottom: 0.1em; margin-right: 1em;" target="_blank"&gt;&lt;img alt="Social Media Logos" border="0" src="https://blogger.googleusercontent.com/img/b/R29vZ2xl/AVvXsEhZJQuK-tVUR6dlQs9jwvp2TN7NyjC1jOogSxEeOG-wSpujV3h-hyV7rIBrPKfM98OYden7pOh6kmOVhGGUeOl7y-UE21zAUV41KDZ_ExL-LqYRM3B-iW4b5RMtrfd_wFecDapEQooijrx6/s1600/social-media-logos.JPG" title="Social Media Logos" /&gt;&lt;/a&gt;&lt;/div&gt;&lt;div style="text-align: justify;"&gt;Consumers share a significant amount of personal information on various social networking sites and as a result are putting themselves at greater risk for identity fraud. So how can you protect yourself? Follow these simple steps and decrease your chances of falling victim to identity thieves.&lt;/div&gt;&lt;div style="text-align: justify;"&gt;&lt;br /&gt;&lt;/div&gt;&lt;h3 style="text-align: justify;"&gt;Are Social Networks Putting You at Risk?&lt;/h3&gt;&lt;div style="text-align: justify;"&gt;&lt;br /&gt;&lt;/div&gt;&lt;div style="text-align: justify;"&gt;There is no denying that in today’s world there isn’t much that can be done without using the internet. A person can very easily perform their banking needs, complete a graduate degree, find a job and even find that perfect someone all on their laptops, smartphone or tablet. The use of the web has become an integral part of life and as a result many people do not see it as anything but a means to going about their day and do not think twice about the information they put out there for the world to see.&amp;nbsp;&lt;/div&gt;&lt;div style="text-align: justify;"&gt;&lt;br /&gt;&lt;/div&gt;&lt;div style="text-align: justify;"&gt;Millions of people actively engage on multiple social networking sites in order to connect with the world around them. These sites are used in order to form social, business or personal connections with people all over the world. While creating these connections is fun and often times necessary, it is also one that cannot be completed without disclosing personal information. For this reason, Javelin Research incorporated social media behaviors amongst consumers into their 2012 Identity Fraud Report. This report actually showed that consumers share a significant amount of personal information on various social networking sites and as a result are putting themselves at greater risk for identity fraud. Since the 2011 report, identity theft increased 13%, affecting roughly 12 million Americans, the majority of which were actively engaging on social networking sites. The identity fraud rate associated with the world’s top social networks includes:&lt;/div&gt;&lt;div style="text-align: justify;"&gt;&lt;/div&gt;&lt;ul&gt;&lt;li style="text-align: justify;"&gt;10% of LinkedIn users&amp;nbsp;&lt;/li&gt;&lt;li style="text-align: justify;"&gt;7% of Google+ users&amp;nbsp;&lt;/li&gt;&lt;li style="text-align: justify;"&gt;6.3% of Twitter users&amp;nbsp;&lt;/li&gt;&lt;li style="text-align: justify;"&gt;5.7% of Facebook users&lt;/li&gt;&lt;/ul&gt;&lt;div style="text-align: justify;"&gt;Based on this information, roughly 17.5 million LinkedIn users experienced some degree of identity fraud; all of which could easily be prevented if the right precautions were taken.&amp;nbsp;&lt;/div&gt;&lt;div style="text-align: justify;"&gt;&lt;br /&gt;&lt;/div&gt;&lt;div style="text-align: justify;"&gt;So how can you protect yourself from falling victim? Realize that you are vulnerable on these sites and don’t put anything that could put you at risk for identity theft. Some basic tips to follow when using social networking sites:&lt;/div&gt;&lt;div style="text-align: justify;"&gt;&lt;/div&gt;&lt;ul&gt;&lt;li style="text-align: justify;"&gt;Ensure your device has the proper security measures in place and the connection is secure, this includes mobile phones, tablets and laptops.&lt;/li&gt;&lt;li style="text-align: justify;"&gt;Use strong passwords and do not use the same password for every account.&lt;/li&gt;&lt;li style="text-align: justify;"&gt;Think about the information you make available, if it is not something you would tell to a complete stranger, then don’t post it.&lt;/li&gt;&lt;li style="text-align: justify;"&gt;Do not use your full name to identify yourself or use your full date of birth.&lt;/li&gt;&lt;li style="text-align: justify;"&gt;Do not post your current or past addresses, phone numbers or primary email address.&lt;/li&gt;&lt;li style="text-align: justify;"&gt;Use private profiles and only invite into your network those people you know.&lt;/li&gt;&lt;li style="text-align: justify;"&gt;Be aware of the groups you are joining because then all the members of those groups can gain access to your information.&lt;/li&gt;&lt;/ul&gt;&lt;div style="text-align: justify;"&gt;Finally, just to be sure your information is safe, Google yourself. Go through the results and see if personal information about you appears and then do something about it. By following all of this tips and managing your online presence you can reduce your risk of becoming a victim of identity fraud.&lt;br /&gt;&lt;br /&gt;&lt;/div&gt;&lt;div style="background-color: #666666; color: white; text-align: justify;" xmlns="http://www.w3.org/1999/xhtml"&gt;&lt;i&gt;About the author:&lt;/i&gt;&lt;br /&gt;&lt;i&gt;&lt;br /&gt;&lt;i&gt;Phoenix TS is a management, computer, IT and cyber security training company headquartered in Columbia, Maryland.&lt;/i&gt;&lt;/i&gt;&lt;/div&gt;&lt;/div&gt;&lt;div class="blogger-post-footer"&gt;&lt;hr /&gt; &lt;a href="http://www.basicsofhacking.com"&gt;Basics of Ethical Hacking&lt;/a&gt;&lt;/div&gt;</description><media:thumbnail xmlns:media="http://search.yahoo.com/mrss/" height="72" url="https://blogger.googleusercontent.com/img/b/R29vZ2xl/AVvXsEhZJQuK-tVUR6dlQs9jwvp2TN7NyjC1jOogSxEeOG-wSpujV3h-hyV7rIBrPKfM98OYden7pOh6kmOVhGGUeOl7y-UE21zAUV41KDZ_ExL-LqYRM3B-iW4b5RMtrfd_wFecDapEQooijrx6/s72-c/social-media-logos.JPG" width="72"/><thr:total xmlns:thr="http://purl.org/syndication/thread/1.0">0</thr:total></item><item><title>Unlock / Jailbreak iPhone Using Unlock iPhone Software</title><link>http://www.basicsofhacking.com/2012/09/unlock-jailbreak-iphone-using-unlock.html</link><category>iPHONE HACKS</category><category>REVIEWS</category><author>noreply@blogger.com (Harwinder Kumar)</author><pubDate>Tue, 4 Sep 2012 22:05:00 +0530</pubDate><guid isPermaLink="false">tag:blogger.com,1999:blog-8198217290464183069.post-6815857774270716286</guid><description>&lt;div dir="ltr" style="text-align: left;" trbidi="on"&gt;&lt;div class="separator" style="clear: both; text-align: center;"&gt;&lt;a href="https://blogger.googleusercontent.com/img/b/R29vZ2xl/AVvXsEiKvt5igoFdTUlAODvzoPDdDfvhnp54JZVDwbhXB1drQGIfbvyvR8UpHMCseHkZyL7nI7Y_aQ_5p7rkbHLcum6g2pHxUhY37KnOxk5yU-TtUj0hO3xWgC5FvzwmbLnRT99x1HkQ9tM4EFaU/s1600/Unlock+iPhone.png" imageanchor="1" style="clear: left; float: left; margin-bottom: 0.1em; margin-right: 1em;" target="_blank"&gt;&lt;img alt="Unlock iPhone" border="0" height="160" src="https://blogger.googleusercontent.com/img/b/R29vZ2xl/AVvXsEiKvt5igoFdTUlAODvzoPDdDfvhnp54JZVDwbhXB1drQGIfbvyvR8UpHMCseHkZyL7nI7Y_aQ_5p7rkbHLcum6g2pHxUhY37KnOxk5yU-TtUj0hO3xWgC5FvzwmbLnRT99x1HkQ9tM4EFaU/s200/Unlock+iPhone.png" title="Unlock iPhone" width="119" /&gt;&lt;/a&gt;&lt;/div&gt;&lt;div style="text-align: justify;"&gt;Hello everyone! It’s my first own written post after 3 months interval following the last one in &lt;a href="http://www.basicsofhacking.com/2012_06_01_archive.html" target="_blank"&gt;June 2012&lt;/a&gt;. Today I come up with a hacking approach on Unlock / Jailbreaking iPhone within 10 minutes using software named &lt;a href="http://www.unlockiphone5now.com/" target="_blank"&gt;Unlock iPhone&lt;/a&gt;.&lt;/div&gt;&lt;div style="text-align: justify;"&gt;&lt;br /&gt;Unlock iPhone works with iPhone 3GS, 4, 4S and your iPhone will be unlocked within 10 minutes or 100% money back guarantee.&lt;br /&gt;&lt;br /&gt;Some of its key features listed are:&lt;/div&gt;&lt;div style="text-align: justify;"&gt;&lt;ul&gt;&lt;li&gt;Compatibility &lt;a href="http://www.basicsofhacking.com/search/label/WINDOWS%20HACKS" target="_blank"&gt;with Windows&lt;/a&gt; and MAC operating system.&lt;/li&gt;&lt;li&gt;100% money back guarantee.&lt;/li&gt;&lt;li&gt;Available for 3Gs, 4, 4S.&lt;/li&gt;&lt;li&gt;Lifetime updates and support.&lt;/li&gt;&lt;li&gt;Convert any videos into iPhone format.&lt;/li&gt;&lt;/ul&gt;Unlock Solution works even if you have had an iPhone unlocked and it was relocked after an upgrade and &lt;a href="http://www.unlockiphone5now.com/purchase.html" target="_blank"&gt;new iPhone 5 Unlock&lt;/a&gt; is feature approach of this software.&lt;/div&gt;&lt;div style="text-align: justify;"&gt;&lt;br /&gt;It has two types of membership:&lt;/div&gt;&lt;div style="text-align: justify;"&gt;&lt;ol&gt;&lt;li&gt;&lt;b&gt;$19.99 - Jailbreak &amp;amp; Unlock iPhone 4S, 4, 3GS + (6 Months Membership &amp;amp; Updates):&lt;/b&gt; Unlock, Jailbreak and Activate your iPhone 4S, 4, 3GS. All versions with our step by step iPhone unlocking software. Runs on MAC and Windows!&lt;/li&gt;&lt;li&gt;&lt;b&gt;$24.99 - Jailbreak &amp;amp; Unlock iPhone 4S, 4, 3GS + (Lifetime Membership &amp;amp; Updates):&lt;/b&gt; Unlock, Jailbreak and Activate your iPhone 4S, 4, 3GS. All versions with our step by step iPhone unlocking software. Runs on MAC and Windows! 100% &lt;a href="http://www.basicsofhacking.com/2012/04/free-download-winrar-400-precracked-for.html" target="_blank"&gt;FREE software&lt;/a&gt; updates FOR LIFE to guarantee your iPhone always remains unlocked.&lt;/li&gt;&lt;/ol&gt;&lt;/div&gt;&lt;/div&gt;&lt;div class="blogger-post-footer"&gt;&lt;hr /&gt; &lt;a href="http://www.basicsofhacking.com"&gt;Basics of Ethical Hacking&lt;/a&gt;&lt;/div&gt;</description><media:thumbnail xmlns:media="http://search.yahoo.com/mrss/" height="72" url="https://blogger.googleusercontent.com/img/b/R29vZ2xl/AVvXsEiKvt5igoFdTUlAODvzoPDdDfvhnp54JZVDwbhXB1drQGIfbvyvR8UpHMCseHkZyL7nI7Y_aQ_5p7rkbHLcum6g2pHxUhY37KnOxk5yU-TtUj0hO3xWgC5FvzwmbLnRT99x1HkQ9tM4EFaU/s72-c/Unlock+iPhone.png" width="72"/><thr:total xmlns:thr="http://purl.org/syndication/thread/1.0">3</thr:total></item><item><title>Steps To Increase Your Smartphone Security</title><link>http://www.basicsofhacking.com/2012/08/steps-to-increase-your-smartphone.html</link><category>GUEST POSTS</category><author>noreply@blogger.com (Harwinder Kumar)</author><pubDate>Wed, 22 Aug 2012 23:38:00 +0530</pubDate><guid isPermaLink="false">tag:blogger.com,1999:blog-8198217290464183069.post-8897435302896640348</guid><description>&lt;div dir="ltr" style="text-align: left;" trbidi="on"&gt;&lt;div style="background-color: #666666; color: white; font-weight: normal; text-align: center;" xmlns="http://www.w3.org/1999/xhtml"&gt;This is a guest post by Lucille J Cronk.&lt;/div&gt;&lt;div style="text-align: justify;"&gt;&lt;br /&gt;The increasing use of smartphones and the reliance placed on it by smartphone users has made them the targets of many malicious activities. Their enormous storage capacity has given relief to our brains in trying to recollect all information at odd times. However, in case of loss of the smartphone, the security of such confidential information is compromised. The phone as well as the data would be subjected to misuse by fraudulent persons. To prevent such misuse, it is necessary to increase the security of your smartphone. There are various ways by which you can step up your smartphone security.&lt;/div&gt;&lt;div style="text-align: justify;"&gt;&lt;br /&gt;&lt;/div&gt;&lt;div style="text-align: justify;"&gt;&lt;b&gt;1. Set a Non Decodable Password:&lt;/b&gt; You would be using your smartphone for many activities like online banking, shopping, internet surfing and for a whole lot of activities which you do using a computer. You would also be accessing your company mails and portals. To ensure the security of the activities that you have gone through, and to prevent anybody from gaining access to private information, it is essential to secure your mobile either with a password or PIN. You need to select a password which is strong and cannot be easily decoded. Setting a password is the first and foremost step in mobile security. If access is denied by setting up a strong password, the safety of your all data in the smartphone is safeguarded.&lt;/div&gt;&lt;div style="text-align: justify;"&gt;&lt;br /&gt;&lt;/div&gt;&lt;div style="text-align: justify;"&gt;&lt;b&gt;2. Verify the Authenticity of Downloads:&lt;/b&gt; The multi functionality of smartphones allows us to install numerous applications. There are many numbers of fraudulent sites operating in the cyber world. They would entice you with free downloads and ultimately install malicious software on your smartphone. Always install apps from trusted and verified sources. It is safer to download from the app website.&lt;/div&gt;&lt;div style="text-align: justify;"&gt;&lt;br /&gt;&lt;/div&gt;&lt;div style="text-align: justify;"&gt;&lt;b&gt;3. Install Antivirus Software:&lt;/b&gt; Lots of malevolent software is circulating with the net result that lots of your mail attachments and apps are loaded with virus. It is advisable to install antivirus software on your smartphones to prevent any damage. You should also frequently check and install the updates too, to ensure that your antivirus software is potent to weed out all malicious software.&lt;/div&gt;&lt;div style="text-align: justify;"&gt;&lt;br /&gt;&lt;/div&gt;&lt;div style="text-align: justify;"&gt;&lt;b&gt;4. Anti Theft Spyware:&lt;/b&gt; The Smartphone is prone to mobile thefts due to its utility. Though you cannot prevent theft, other than being careful; by installing anti theft mobile apps you can secure your stolen smartphone. Anti theft spyware has features which allow you to lock the phone remotely and also allow wiping out the data to prevent misuse in your stolen smart phone. Such spyware enable you to track the location of the phone through text messages.&lt;/div&gt;&lt;div style="text-align: justify;"&gt;&lt;br /&gt;&lt;/div&gt;&lt;div style="text-align: justify;"&gt;&lt;b&gt;5. Mobile Monitoring Apps:&lt;/b&gt; Mobile monitoring apps have gained popularity in view of the emerging mobile threats. Their features are designed to protect your smartphone and safeguard the information stored on them. The mobile monitoring app or &lt;a href="http://cellphonespy360.blogspot.com/" target="_blank"&gt;cell phone spy&lt;/a&gt; software is very easy to install. There are many such monitoring apps like Mobile Spy, Mobistealth, Spybubble, Stealthgenie and Flexispy. Installation can be done in a few minutes by downloading the application from your chosen apps website. Installation is the only time that you require to gain physical access of the smartphone on which you wish to install the spyware. Later on, you can review the activities of the smartphone like call and mail tracking, location tracking, browsing history, pictures and contacts stored on the smartphone from a remote user account.&lt;/div&gt;&lt;div style="text-align: justify;"&gt;&lt;br /&gt;&lt;/div&gt;&lt;div style="text-align: justify;"&gt;On the whole, securing your smartphone from human and cyber world threats is of utmost importance in order to ensure that all your confidential information is well protected.&lt;br /&gt;&lt;br /&gt;&lt;/div&gt;&lt;div style="background-color: #666666; color: white; text-align: justify;" xmlns="http://www.w3.org/1999/xhtml"&gt;&lt;i&gt;About the author:&lt;/i&gt;&lt;br /&gt;&lt;i&gt;&lt;br /&gt;&lt;i&gt;Lucille J Cronk is a blogger who is enough passionate about mobile technology and other monitoring apps. She has her own blog on cell phone spy and one can get plenty of information on her site.&lt;/i&gt;&lt;/i&gt;&lt;/div&gt;&lt;/div&gt;&lt;div class="blogger-post-footer"&gt;&lt;hr /&gt; &lt;a href="http://www.basicsofhacking.com"&gt;Basics of Ethical Hacking&lt;/a&gt;&lt;/div&gt;</description><thr:total xmlns:thr="http://purl.org/syndication/thread/1.0">0</thr:total></item><item><title>Is Your Mobile Device Hacker-Proof?</title><link>http://www.basicsofhacking.com/2012/08/is-your-mobile-device-hacker-proof.html</link><category>BASICS OF ETHICAL HACKING</category><category>GUEST POSTS</category><author>noreply@blogger.com (Harwinder Kumar)</author><pubDate>Wed, 22 Aug 2012 23:15:00 +0530</pubDate><guid isPermaLink="false">tag:blogger.com,1999:blog-8198217290464183069.post-3763225309118823227</guid><description>&lt;div dir="ltr" style="text-align: left;" trbidi="on"&gt;&lt;div style="background-color: #666666; color: white; font-weight: normal; text-align: center;" xmlns="http://www.w3.org/1999/xhtml"&gt;This is a guest post by Alyse.&lt;/div&gt;&lt;br /&gt;&lt;div style="text-align: justify;"&gt;If it's connected to the Internet, it can be hacked. For years, this was mainly a concern to PC users and IT guys, but anything that achieves mainstream usage and market share will eventually attract black hat types. From greedy cyber-criminals to malicious joy riders, the latest lure is the Internet-connected device in everyone's pocket.&lt;/div&gt;&lt;div style="text-align: justify;"&gt;&lt;br /&gt;&lt;/div&gt;&lt;div style="text-align: justify;"&gt;Unfortunately, the very things that make our Smartphone’s and tablets so appealing to us -- mobility, ease of use, always-on communications -- render mobile devices even more exposed to the hijinks of hackers. Plus, let's face it -- most of the people walking around with tablets and Smartphone’s aren't going to take the same basic security precautions that have become second-nature to "serious" PC and IT folks.&lt;/div&gt;&lt;div style="text-align: justify;"&gt;&lt;br /&gt;&lt;/div&gt;&lt;div style="text-align: justify;"&gt;With that in mind, let's run down a checklist of what you can and should be doing to make your constant mobile companion as safe as possible.&lt;/div&gt;&lt;div style="text-align: justify;"&gt;&lt;br /&gt;&lt;/div&gt;&lt;h3 style="text-align: justify;"&gt;They're Just Little Computers&lt;/h3&gt;&lt;div style="text-align: justify;"&gt;&lt;br /&gt;&lt;/div&gt;&lt;div style="text-align: justify;"&gt;Although hackers need a different set of tools to gain access of a mobile device, many of the vulnerabilities are very similar to well-known PC security risks. Browser exploits, email phishing, password cracking -- all of the classic holes can be found on mobile devices.&lt;/div&gt;&lt;div style="text-align: justify;"&gt;&lt;br /&gt;&lt;/div&gt;&lt;div style="text-align: justify;"&gt;&lt;b&gt;How to protect yourself:&lt;/b&gt;&amp;nbsp;Simple common security precautions: use strong passwords, don't open unknown attachments or click on unknown links, use HTTPS whenever you can while browsing, pay even closer attention to security certificate warnings, and avoid transmitting personal and financial data as much as possible (and never unencrypted!).&lt;/div&gt;&lt;div style="text-align: justify;"&gt;&lt;br /&gt;&lt;/div&gt;&lt;h3 style="text-align: justify;"&gt;There's an App for That&lt;/h3&gt;&lt;div style="text-align: justify;"&gt;&lt;br /&gt;&lt;/div&gt;&lt;div style="text-align: justify;"&gt;iOS users don't yet need too much app help for security and antivirus tasks, but the Google or Amazon app markets should be your first stop for mobile security and antivirus solutions.&lt;/div&gt;&lt;div style="text-align: justify;"&gt;&lt;br /&gt;&lt;/div&gt;&lt;div style="text-align: justify;"&gt;&lt;b&gt;How to protect yourself:&lt;/b&gt;&amp;nbsp;Use one of the big security names like avast!, Norton, and Kapersky, or a proven mobile-specific security developer such as Lookout or Antivirus Free by Creative Apps.   &lt;/div&gt;&lt;div style="text-align: justify;"&gt;&lt;br /&gt;&lt;/div&gt;&lt;h3 style="text-align: justify;"&gt;Cool the Hotspot&lt;/h3&gt;&lt;div style="text-align: justify;"&gt;&lt;br /&gt;&lt;/div&gt;&lt;div style="text-align: justify;"&gt;Many mobile devices, especially tablets, regularly connect to the Internet via Wi-Fi. This means that they share all of the risks of any wireless network, which can be infiltrated by any self-respecting hacker with a sniffer, or simply riding on the same public hotspot.&lt;/div&gt;&lt;div style="text-align: justify;"&gt;&lt;br /&gt;&lt;/div&gt;&lt;div style="text-align: justify;"&gt;&lt;b&gt;How to protect yourself:&lt;/b&gt;&amp;nbsp;Practice basic router sense by changing the default login and SSID using strong passwords, enabling WEP / WPA encryption, restricting allowed devices (MAC filtering), and making sure the firewall is active. On the device side, turn off any "auto-connect to Wi-Fi networks" settings, and disable Wi-Fi completely when it's not needed. In addition to being more secure, this will noticeably increase your battery life.  &lt;/div&gt;&lt;div style="text-align: justify;"&gt;&lt;br /&gt;&lt;/div&gt;&lt;h3 style="text-align: justify;"&gt;Stop Malicious Apps Before They Start&lt;/h3&gt;&lt;div style="text-align: justify;"&gt;&lt;br /&gt;&lt;/div&gt;&lt;div style="text-align: justify;"&gt;This tends to be a bigger problem with Android, because Apple has historically been very restrictive when reviewing app submissions. Still, some things get by the review process on any mobile OS, so you should be very careful when downloading and installing, especially if you are "side loading" (i.e., installing an APK from a non-market source).&lt;/div&gt;&lt;div style="text-align: justify;"&gt;&lt;br /&gt;&lt;/div&gt;&lt;div style="text-align: justify;"&gt;&lt;b&gt;How to protect yourself:&lt;/b&gt;&amp;nbsp;Don't leave everything up to the antivirus software. Do your research before adding apps. Check for plenty of reviews (number of downloads means nothing). Note how long the app has been available, and investigate developer websites (and any other apps they may have). Think carefully about the requested permissions -- a flashlight app does not need to know your location or connect to the Internet.&lt;/div&gt;&lt;div style="text-align: justify;"&gt;&lt;br /&gt;&lt;/div&gt;&lt;h3 style="text-align: justify;"&gt;Location, Location, Location&lt;/h3&gt;&lt;div style="text-align: justify;"&gt;&lt;br /&gt;&lt;/div&gt;&lt;div style="text-align: justify;"&gt;Location tracking is a common worry for most Smartphone users, all the more so since Apple and Google were questioned by the federal government for keeping detailed logs of user coordinates. The good news is that GPS data is securely transmitted, but the bad news is that many phones use a technology called "Assisted GPS" which makes an insecure connection to cell towers. Because it's a low-level process, hackers could get access to the processor itself, enabling remote takeover.&lt;/div&gt;&lt;div style="text-align: justify;"&gt;&lt;br /&gt;&lt;/div&gt;&lt;div style="text-align: justify;"&gt;&lt;b&gt;How to protect yourself:&lt;/b&gt;&amp;nbsp;Find the "Assisted GPS" setting on your phone, and make sure that it's turned off. This will make it a little harder for you to get your exact location, but it will close a major hole in your mobile security.&lt;/div&gt;&lt;div style="text-align: justify;"&gt;&lt;br /&gt;&lt;/div&gt;&lt;h3 style="text-align: justify;"&gt;When Texts Attack&lt;/h3&gt;&lt;div style="text-align: justify;"&gt;&lt;br /&gt;&lt;/div&gt;&lt;div style="text-align: justify;"&gt;Simple SMS / MMS text messages can be used by hackers, for DoS attacks or in many of the same ways that email is vulnerable. But there's no "spam filter" for texts, and SMS is "always on" by default, so there may be no way of avoiding opening potentially malware-bearing messages with links or embedded multimedia attachments (pictures, graphics, and sounds). Luckily, SMS exploits are relatively rare, but the sheer vulnerability of them is appealing to hackers.&lt;/div&gt;&lt;div style="text-align: justify;"&gt;&lt;br /&gt;&lt;/div&gt;&lt;div style="text-align: justify;"&gt;&lt;b&gt;How to protect yourself:&lt;/b&gt;&amp;nbsp;You'll be safest if you can turn off the automatic multimedia display so that you need to click on any attachment first, but not all devices have this function. If you get a text from an unknown number, it may be safest to delete it ASAP before reading it.&lt;/div&gt;&lt;div style="text-align: justify;"&gt;&lt;br /&gt;&lt;/div&gt;&lt;div style="text-align: justify;"&gt;Armed with these tips, you should be as safe as possible from the black hat hackers out there. As we've seen, there's nothing that can't be hacked, but if you make it difficult enough, they'll go find something easier to mess with. Oh, and one final tip: the most time-honored way to gain access to a device is to simply pick it up and walk away. It's not very high-tech, but keeping an eye on your Smartphone and tablet at all times may be the best advice of all.&lt;br /&gt;&lt;br /&gt;&lt;/div&gt;&lt;div style="background-color: #666666; color: white; text-align: justify;" xmlns="http://www.w3.org/1999/xhtml"&gt;&lt;i&gt;About the author:&lt;/i&gt;&lt;br /&gt;&lt;i&gt;&lt;br /&gt;&lt;i&gt;Alyse is a marketing, photography, and tech addict who spends her time investigating the next generation of technology. When she is not brushing up on her art of the scientific know how in the world, you can find her contributing &lt;a href="http://www.attsavings.com/" target="_blank"&gt;to ATTSavings&lt;/a&gt; or on Twitter &lt;a href="https://twitter.com/alyse_1" target="_blank"&gt;@Alyse_1&lt;/a&gt;.&lt;/i&gt;&lt;/i&gt;&lt;/div&gt;&lt;/div&gt;&lt;div class="blogger-post-footer"&gt;&lt;hr /&gt; &lt;a href="http://www.basicsofhacking.com"&gt;Basics of Ethical Hacking&lt;/a&gt;&lt;/div&gt;</description><thr:total xmlns:thr="http://purl.org/syndication/thread/1.0">0</thr:total></item><item><title>Remove Unwanted Files With CCleaner</title><link>http://www.basicsofhacking.com/2012/08/remove-unwanted-files-with-ccleaner.html</link><category>GUEST POSTS</category><author>noreply@blogger.com (Harwinder Kumar)</author><pubDate>Wed, 1 Aug 2012 12:52:00 +0530</pubDate><guid isPermaLink="false">tag:blogger.com,1999:blog-8198217290464183069.post-6882700556924279883</guid><description>&lt;div dir="ltr" style="text-align: left;" trbidi="on"&gt;&lt;div style="background-color: #666666; color: white; font-weight: normal; text-align: center;" xmlns="http://www.w3.org/1999/xhtml"&gt;This is a guest p​​​​​ost by Vincent Ammirato.&lt;/div&gt;&lt;div style="text-align: justify;"&gt;&lt;br /&gt;&lt;div class="separator" style="clear: both; text-align: center;"&gt;&lt;a href="https://blogger.googleusercontent.com/img/b/R29vZ2xl/AVvXsEiaOGB5KHaTi2hCa2WUiTnb41dXHbrwtcJvcbbgRoXsV-CYnzwDMfkalGGvVUBjG7Vsj66dwJsu3OIItTt3XH1zJYTMe3iXNI_p30wrpd1Pl2h2Uag_yT87K0zhIXCQiPnytnHvWbR6PQFT/s1600/Ccleaner.jpg" imageanchor="1" style="clear: left; float: left; margin-bottom: 0.1em; margin-right: 1em;" target="_blank"&gt;&lt;img alt="Ccleaner" border="0" height="200" src="https://blogger.googleusercontent.com/img/b/R29vZ2xl/AVvXsEiaOGB5KHaTi2hCa2WUiTnb41dXHbrwtcJvcbbgRoXsV-CYnzwDMfkalGGvVUBjG7Vsj66dwJsu3OIItTt3XH1zJYTMe3iXNI_p30wrpd1Pl2h2Uag_yT87K0zhIXCQiPnytnHvWbR6PQFT/s200/Ccleaner.jpg" title="Ccleaner" width="200" /&gt;&lt;/a&gt;&lt;/div&gt;Your personal computer has a lot more junk in it, than what is visible to the eye. To ensure this junk does not hinder the performance of your PC you must do away with it on an on-going basis. This will not only keep the system clean but also help your PC and the various software and applications therein to function efficiently.&lt;/div&gt;&lt;div style="text-align: justify;"&gt;&lt;br /&gt;&lt;/div&gt;&lt;div style="text-align: justify;"&gt;CCleaner is a handy system utility that helps in handling everyday PC issues. The software simply analysis your PC and scrubs out all the junk files it can find. Given below is a brief tutorial on how to remove unwanted files with CCleaner:&lt;/div&gt;&lt;div style="text-align: justify;"&gt;&lt;/div&gt;&lt;ul&gt;&lt;li style="text-align: justify;"&gt;After you install CCleaner you will be asked about good cookies, i.e. your email login details etc. Click OK.&lt;/li&gt;&lt;li style="text-align: justify;"&gt;Once the CCleaner is launched, you will notice two option tabs, ‘Windows’ and ‘Applications’ whereas on the left you will see vertical list of options namely, Cleaner, Registry, Tools and Option.&lt;/li&gt;&lt;li style="text-align: justify;"&gt;In the Windows and Application, tabs select the data you wish to do away with.&lt;/li&gt;&lt;li style="text-align: justify;"&gt;Thereafter click on ‘Analyze’ to get a brief overview of the total data that can be deleted in the various categories. This feature will give you a detailed analysis of the files and the total number of files along with the space they are accumulating on your system.&lt;/li&gt;&lt;li style="text-align: justify;"&gt;After ‘Analysis’ you can hit the ‘Run Cleaner’ button to permanently delete the analyzed files. Remember that you will not be able to recover these files once you delete them.&lt;/li&gt;&lt;li style="text-align: justify;"&gt;After the Window and Application related data, you can also check the Registry option to know the Registry related issues in your PC. When you install various software and application on your system, there could be some registry related issues due to the various overlapping changes made to the registry.&lt;/li&gt;&lt;li style="text-align: justify;"&gt;Before you clean, the Registry issues remember to take a backup of your Registry just for precautionary reasons. There could be a probability that the registry clean could create new issues for your system. The registry also cleans the system of unused and orphaned keys.&lt;/li&gt;&lt;/ul&gt;&lt;div style="text-align: justify;"&gt;You can download it from &lt;a href="http://www.piriform.com/ccleaner/download" rel="nofollow" target="_blank"&gt;here&lt;/a&gt;.&lt;/div&gt;&lt;div style="text-align: justify;"&gt;&lt;br /&gt;&lt;/div&gt;&lt;div style="text-align: justify;"&gt;Before you initiate the cleaner process, make sure you have checked the software and applications that you wish to do away with. The most common applications are web browsers like Internet Explorer, Google Chrome, Mozilla Firefox as well as multimedia like Adobe Flash Player, etc.&lt;/div&gt;&lt;div style="text-align: justify;"&gt;&lt;br /&gt;&lt;/div&gt;&lt;div style="text-align: justify;"&gt;The CCleaner cleaning process is very easy. You need not break your head trying to find your way around the various options. In addition to cleaning junk files and registry clean up, you can also make changes to your windows startup. You can use CCleaner as often as you wish to, may it be everyday or even before you wish to cleanup your system before installing a new software. CCleaner can also be used as a portable application on your USB and run on any system. Therefore, if you are looking for a handy system-cleaning tool that will not eat up your memory, you can opt for CCleaner.&lt;/div&gt;&lt;div style="text-align: justify;"&gt;&lt;br /&gt;&lt;/div&gt;&lt;div style="background-color: #666666; color: white; text-align: justify;" xmlns="http://www.w3.org/1999/xhtml"&gt;&lt;i&gt;About the author:&lt;/i&gt;&lt;br /&gt;&lt;i&gt;&lt;br /&gt;&lt;i&gt;Vincent Ammirato is the marketing strategist for Alter Imaging -a &lt;a href="http://alterimaging.com/" target="_blank"&gt;digital agency&lt;/a&gt; in Charlotte, NC. Vincent has over 15 years experience in digital design, development and marketing working both large corporations in house and in agency settings. He also teaches web design at UNC Charlotte.&lt;/i&gt;&lt;/i&gt;&lt;/div&gt;&lt;/div&gt;&lt;div class="blogger-post-footer"&gt;&lt;hr /&gt; &lt;a href="http://www.basicsofhacking.com"&gt;Basics of Ethical Hacking&lt;/a&gt;&lt;/div&gt;</description><media:thumbnail xmlns:media="http://search.yahoo.com/mrss/" height="72" url="https://blogger.googleusercontent.com/img/b/R29vZ2xl/AVvXsEiaOGB5KHaTi2hCa2WUiTnb41dXHbrwtcJvcbbgRoXsV-CYnzwDMfkalGGvVUBjG7Vsj66dwJsu3OIItTt3XH1zJYTMe3iXNI_p30wrpd1Pl2h2Uag_yT87K0zhIXCQiPnytnHvWbR6PQFT/s72-c/Ccleaner.jpg" width="72"/><thr:total xmlns:thr="http://purl.org/syndication/thread/1.0">0</thr:total></item></channel></rss>