Saturday, 30 March 2019

SAFE ONLINE BROWSING !! A myth ? which can become a dream come true if you follow these precautions .

In the Internet, it is very difficult to find a trustworthy website. We need to browse smart and most importantly we need to make sure the site is not dangerous by using Multiple approaches.

"Cyber criminals are using various sophisticated techniques to fool online users to drop malware and other cyber threats to cause unbearable damages. So we have to beware of the malicious website's, do not blindly open the website . Better check the website safety before open it."



In general, it is good to type the website URL instead of copy paste or clicking an URL. Also, checking to see the website working with HTTP OR HTTPS is much recommendable .


According to Google, in order to check, is this website Safe, Browsing is a service that Google’s security team built to identify unsafe websites across the web and notify users and webmasters of potential harm.

Here I am going to list few steps to follow :-

STEP 1

Investigating if the website safe or not !!!

In order to find, is this website safe , we need to figure it out if the URL received from an unknown source and we would recommend cross-checking the URL before clicking on it. Copy the URL to analyzers that available over the Internet and ensure it’s Integrity.

If it is a shortened URL you can unshorten it with the site and then analyze the actual URL.

STEP 2


Checking the website safety :

The first and the most recommended method is to check online page scanners, which uses latest fingerprinting technology to show web applications are up to date or infected by malware.

You can use Comodo Web Inspector which is more powerful, however, it would take more time. In another hand, it would be done a very depth analysis with the website and list possible malicious contents.Website reputation check needs to be done to find the trustworthiness of website with WOT .

You can try these these other scanners which are available :

1) Sucuri

2) Virustotal

3) Zelster

4) PCrisk


STEP 3

Checking the Website Safety & Reputation :

Analyzing a website through multiple blacklist engines and online reputation tools to facilitate the detection of fraudulent and malicious websites. This service helps you identify websites involved in malware incidents, fraudulent activities, and phishing websites.

Here are a list of important tools for checking the Website Reputation and confirm its Safety :





Check the Blacklist IP Address :
There are some awesome tools to Check the website IP Address has been listed in Global Blacklist Database.

Multirbl is a free multiple DNSBL (DNS BlackList aka RBL) lookup and FCrDNS (Forward Confirmed reverse DNS aka iprev) check tool to conform if this website is Safe or not.

STEP 5

Ensuring SSL is there before making online purchases :
In order to check website safety, Ensure the website availability with https before entering the payment card details. We can audit the HTTPS availability with the SSL analyzer URL’s available over the internet.

Also, there is a range of certificates available over Internet from low assured (domain validation) to the Most trusted Extended validation certificates, you can refer the URL for more details. 


Moreover, we can verify their prompt installation with various popular checkers available

1) SSLabs




STEP 6

Using a Proxy Server to Avoid Hacking :

The proxy server is designed to build up a wall between the user and the internet. The Internet is like a huge database where the data that a user needs to fetch is stored.The Proxy server helps as a wall between the database and the user so that no user can violate the storage system by any means.
But unluckily a particular hackers genre of people has been misguided or paid a huge amount for carrying out illegal activities that turn out to be harmful to the society. The Internet is playing a very crucial role in the present world, so Proxy server very essentially for personal security.

List of Top 10 Best Proxy Server and online Proxy











Above proxy servers are highly trusted and widely used to hide the identity and securely access your network and protect your asset from malicious hackers.


STEP 7

Surfing the web Using TOR BROWSER 

Tor browser ensures you by bobbing your communication around a distributed system of transfers keeps running by volunteers all around the globe.It prevents some person viewing your Internet connection from realizing what websites you visit, it prevents the websites you visit from learning your physical location, and it gives you a chance to get to websites which are blocked. Usage of a VPN (Virtual Proxy Network) is also recommended.


*POINT TO BE NOTED:

Within a couple of weeks hackers figured out to take control of 3000 routers, and they uncovered    beyond 95% of clients’ personalities!Some proof suggests that a lot of Tor hubs are being controlled by the NSA.The way that Tor’s leave nodes (routers) are having some security issues is likewise conceded by the organizers of Tor system, and it was the principle motivation behind why Agora, once a well-known darknet showcase, has ceased their operation.
Solution: I would Suggest TAIL - OS  if you want to go completely anonymous while browsing but it is upto you to choose according to your level of experience with these.

STEP 8

Browsing through Alternative Deep Web Search Engines :


Google has the ability to track your each and every move on the Internet while you are searching via Google .If  you don’t want Google to collect your personal information and your online activities you should maintain your Anonymity in online.“Deep web” Also known as “invisible web”, the term refers to a vast repository of underlying content, such as documents in online databases that general-purpose web crawlers cannot reach.

The deep web content is estimated at 500 times Bigger than Normal search contents, yet has remained mostly untapped due to the limitations of traditional search engines.


Since most personal profiles, public records and other people-related documents are stored in databases and not on static web pages, most of the higher-quality information about people is simply “invisible” to a regular search engine but we can get it from Deep Web Search Engine.

Here we go for the interesting Search Engines to get the deep search results which probably might not be aware by most of the people:

1)Pipl Search Engine

2)My Life Search

3)Yippy

4)SurfWax

5)Way Back Machine

6)Google Scholar

7)DuckDuckgo

8)Fazzle

9)Not Evil

10)Start Page

11)Spokeo


CONCLUSION  :

You can also report the bad websites when you come across one . Here are a few ways listed: 

Please report the dangerous URL to the services mentioned below. They are arranged in categories which should make it relatively easy to decide which services you should report the bad website to.

List of Services which Blacklist Dangerous Sites :-

1)Fortinet

2)Sophos

3)Trustwave

4)Bitdefender

5)Norton

6)Stopbadware

List of Services which Blacklist Phishing Sites :-

1)McAfee

2)AVG Threat Labs

3)Comodo Web Inspector

4)Malwarebytes

5)K7





































This is just written for the acknowledgement of the reader's from various other inspired sources and I am not responsible for any Legalities.

Sunday, 28 October 2018

This is how you Protect your Computer from CRYPTOMINING !!!

Along with digital money, we also learned about threats associated with them, including the problem of cryptojacking, where someone else could secretly use your computer to mine cryptocurrency. It can be a major security threat but is preventable.

A bitcoin or other cryptocurrency encrypted with problematic, mathematical and algorithmic equations which have to be solved to bring itself into existence in the market.



The transactions done on block-chain or other exchanges, constituted of same these equations and problems (which is also called block), which are solved by mining machines.

These mining machines are run under 24hrs electricity, constant cold temperature and constant speed (variable minimum speed for different cryptocurrencies).

The mining machines use the above factors to solve the blocks or the problematic equation to mine bring out new bitcoin or other cryptocurrency in the form of their deformation)



For example:- BITCOIN : Max Supply 21,000,000 BTC

Rate of Generation Or Mining Of Bitcoin since 2008 per 10 min

2008-2012 50 btc
2012-2016 25 btc
2016-2020 12.5 btc
2020-2024 6.25 btc
2024-2028 3.12 btc
2028-2032 1.56 btc and so on ..........................................

And thus variable for different cryptocurrencies accounts to their max supply.



Also there are variable block size of different cryptocurrencies, largest of which is of Bitcoin.

In such a way, Cryptomining refers to solving and regulating transactions of cryptocurrencies on exchanges in the form of evaluating problematic equation in their respective block size.

And the person who follows the necessary factors for machines to run for mining is called cryptominer.
 


In easy terms mining cryptocurrency means. allowing your computers resources to solve complex computational problems.

When you set a mining rig, and keep it on for mining, What your mining rig does is that it starts to solve complex computational problems for other people.Once your miner solves it, you are rewarded with a small amount or cryptocurrency.

Want to protect your computer from hidden cryptomining? Try this




First know how someone else can mine cryptocurrency from your computer?

As cryptocurrency mining is a CPU intensive process, miners use hijacking techniques to use other individuals' computers for the task.

They can run malicious scripts on websites, browsers or fool you to install software bundled with cryptomining malware.

It would look legit, like the recently uncovered case of Adobe Flash Player, but would also install a mining malware in the background.

IDENTIFICATION !!

Identifying Cryptojacking via browser, websites :- 

When a malicious code is used to infect browsers and websites, the malware continues to mine cryptocurrency as long as the browser is running or the infected site remains open.


Now I'll tell you what to do ?
 
(COUNTER MEASURE'S)

First, check if your system has been cryptojacked.

Once installed or run, the malware will start using your computer's resources to mine cryptocurrency, secretly. So, if your computer is heating up or making more noise, chances are you have been cryptojacked.

To be sure, check your computer's CPU usage via Task Manager (Windows) or Activity Monitor (Mac) and see if it is running at full capacity, even when sitting idle.



ALTERNATIVE !!

Alternatively, you can go for Opera's Cryptojacking test.

If you're still confused, go for the automated 'Cryptojacking test' ( https://cryptojackingtest.com/ ) designed by Opera. Just visit this link and click the 'Start' button. The tool will analyze your CPU's performance in the background and confirm if you've been cryptojacked in a matter of seconds.

PREVENTION TECHNIQUES !! 


How to prevent cryptojacking attacks?

To prevent cryptojacking attacks on your PC, install a reliable antivirus software - one that should have cryptojacking definitions in its virus libraries.

Technically, the antivirus should protect browsers and websites too, but you can also install dedicated cryptomining blockers on your web browsers to prevent attacks via web.

You can use minerBlock, No Coin, and Coin-Hive Blocker on Chrome and NoMiner on Firefox.



Already cryptojacked? Here's what you can do

If you find that your computer has already been cryptojacked, try locating and uninstalling the malware that has been consuming your CPU's power through Taskmanager .

Once the uninstallation is successful, run a full PC scan with an antivirus. And if the malware is working via browser, we'd recommend you to update it and install a blocking extension right away.

If nothing helps, reset the system.


I HOPE MY ARTICLE WILL HELP YOU FREE YOUR CHAINS FROM CRYPTOMINING.

























This is just written for the acknowledgement of the reader's from various other inspired sources and I am not responsible for any Legalities.

                                                                                                                                          - Bhaskar

Saturday, 22 April 2017

STOP IT !! By Finding Out Who is Tracking You Through Your Smartphone by reading this !!

When using modern day gadgets, safety should always be your top priority. With the help of just a few short codes, you can find out more about the settings of your phone and work out whether or not your messages and information are protected and whether you’re being tracked.

                        

In this post i'm sharing you the most useful and important codes for smart phones, together with some instructions for those who’re worried about being TRACKED,TAPPED etc.(Sorry iPhone users, I will try to make it up to you guys in future)


> FIRST OF ALL THE PROBLEM : HOW TO FIND OUT ???


                                                 *#21#

With this code, you can find out whether your calls, messages, and other data are being diverted. The status of the different types of diversions that are taking place along with the number the information is being transferred to will be displayed on your phone’s screen.

                                                 *#62#

Dial this code if you want to find out where calls, messages, and data are being redirected to if it seems that no one can get through to you. The chances are in this case that your voice calls are being redirected to one of your cell phone operator’s numbers.


> NOW THE SOLUTION : HOW TO STOP IT ???

                                                   ##002#

This is a universal code for switching off all forms of redirection away from your phone. It’s a good idea to use this before you have to use roaming. In this case, money won’t be taken from your account for calls that are redirected by default to your voice mail.



> ANOTHER THREAT : IMEI !!!!

                                                   *#06#

With the help of this code, you can find out your IMEI (International Mobile Equipment Identifier). If you know this number, you can find your phone if someone steals it. When switched on, its location is automatically conveyed to the network operator even if a different SIM card is inserted. If someone knows your IMEI number, they can find out the model and technical characteristics of your phone.So make sure you maintain privacy regarding your IMEI.

  Here are some tips which help's you Protect Yourself  From Criminals And Spies !



(1)Use messaging apps that are completely closed to outsiders, such as Telegram, Chare, Wickr, or     Signal.

(2)Determine what information it’s safe to make accessible to all. Should everyone really be able to   find out your phone number or have access to information about your family, loved ones, or your       lifestyle? Be very careful when posting photographs of children.

(3)Don’t install unknown programmes on your phone, keep close track of the apps you have installed, and use multiple security locks wherever you can. Don’t click on unsafe links, and don’t connect         your phone to suspicious “free” charging points.

(4)Only your cell phone operator should ever offer you tracking services, and they should only turn      them on with your explicit agreement. Websites and applications that offer to find out the location      of other people are almost certainly acting with criminal intent.

I am leaving you some Android code's which might come handy at the time of their need !!!!







  • #7353#                                       To hide test menu 2/Self Test Mode.
  • ##7764726                                 To hide service menu for Motorola Droid.
  • *#*#273283*255*663282*#*#*   For backup of our all media files.
  • *#*#232338#*#*                          It display the Wi-Fi mac address.
  • *#7465625#                                To view status of lock-phone.
  • *#*#3264#*#*                              To show RAM version.
  • *#*#44336#*#*                            To display build time and change list number.
  • *#*#232337#*#                           To see or display device’s Bluetooth address.
  • *#*#197328640#*#*                    It enables test mode for service.
  • *#*#8351#*#*                              To enable voice dial mode.
  • *#*#8350#*#*                              To disable the voice dial mode.
  • *#*#0842#*#*                              To test Back-light/vibration.
  • *#*#2664#*#*                              To test the touch-screen.
  • *#*#0289#*#*                              For Audio test.
  • *#*#0*#*#*                                  For LCD display test.
  • *#*#232331#*#*                         To test Bluetooth of any Android device.
  • *#*#0283#*#*                             To perform a packet loop-back test.
  • *#*#1575#*#*                             For advanced GPS test.
  • *#*#1472365#*#*                       To Perform a quick GPS test.
  • *#*#0588#*#*                             To perform a proximity sensor test.
  • *#*#7262626#*#*                       To perform field test.
  • *#*#232339#*#*                         Testing Wireless LAN.
  • *#9090#                                      To Diagnose configuration of device.
  • *#872564#                                  To control U-S-B logging.
  • *#9900#                                      System dump mode.
  • *#*#7780#*#*                             Reset  to factory state.
  • *2767*3855#                              To format Android device.
  • *#*#4986*2650468#*#*             To get pda, phone, H/W and RF Call Date.
  • *#*#1234#*#*                             To know about pda and firmware version.
  • *#*#1111#*#*                              For FTA Software version.
  • *#*#2222#*#*                             For FTA Hardware version.
  • *#*#7594#*#*                             To change power button behaviour once code enabled.
  • *#*#8255#*#*                             To launch Google Talk service monitor.

  • Conclusion: 

    So Update and Upgrade yourselves as the Mobile's Do so that you will be in Peace !!!!





































    This is just written for the acknowledgement of the reader's from an inspired source and I am not responsible for any Legalities.
                                                                                                                                 -Bhaskar

    Saturday, 31 December 2016

    My Love for JAVA and a few Reasons for you to Love it !!!!

    There’s a long list of programming languages that continue to exist with their strengths and flaws, making our lives easier. Over the course of past 20 years, Java has proved that it’s one of the best programming languages around. However, I strongly don’t believe in any type of competition between different programming languages.


    During its journey, this free and open source programming language has achieved numerous milestones and proved its worth. With time, Java has evolved and established its place as an essential ingredient for making successful software and applications. The recent indexes of programming languages’ popularity have once again reinforced that Java is one of the most popular languages around.This brings us to the reasons that make Java a top contender in the race of programming languages that a programmer should consider learning.

    Why one should learn Java programming language and become a programmer? The answer to this question comprises of multiple reasons like its popularity, ease-to-learn nature, helpful open source tools and libraries etc. Gaining expertise in Java ensures a secure career with fat paychecks and the power to create applications with real-world applications.

    So here comes the Reasons !!!!!!!!!!!!!

    Tons of resources to learn Java.

    Being a mature programming language, there are numerous resources available online that can act as your perfect companion in the learning process. Depending upon your need, you can look for free and paid learning resource to aid yourself. In short, almost any imaginable doubt related to Java has already been asked and answered on the online forums.

    Java is easy to learn

    Let’s accept this fact — most of us pick Java as our first programming language as it’s easy-to-learn. With an English-like syntax, Java could be learnt in a short span of time and used to build useful applications all along if we are having revolutionary ideas in our minds.


    It’s an Object Oriented Programming Language

    Being an Object Oriented Programming language, the concepts of Java are relatable and much easier. This property makes Java a flexible, system modular, and extensible programming language. Java strongly suggests the best practices of OOPS design and promotes its correct usage.

    Lots of job opportunities 

    Programmers with a sound knowledge of Java are in great demand. With a large installed base, this widely used programming language continues to create jobs in the tech industry. Additionally, the popularity of Android apps has brought along countless opportunities for an Android developers who write native apps in Java.If you are still skeptical about Java and its worth, let me tell you that Java is used in websites like Amazon.com, Facebook.com. LinkedIn.com, and eBay.com. It also finds use in enterprise application development, IoT, cloud development etc. Aiding to this popularity, Java has a strong development roadmap with a continuous improvement to security and performance.

     Universal usage & Great community support

    Java programming language is omnipresent. Due to its stability and scalability, you can find Java on mobiles, desktops, large scale applications etc. The same can also be said about Java programmers who easily outnumber other professionals. Java is also gaining big in the field of Internet of Things (IoT). With about 10 million Java developers spread across the world, Java community continues to grow. Just like other open source technologies, Java promotes the philosophy of giving back to the society. On multiple online forums like Stackoverflow, expert Java programmers are always ready to help the newcomers.

    Java’s Rich API & Powerful development tools

    Java programming language’s Rich API can be listed among the main reasons behind its success. Couple it with a wide set of tools supported by Java’s open source ecosystem and you’ve got just about everything you’ll need while working with Java.The powerful IDEs available for Java have played a key role in taking Java to the top level. Eclipse and Netbeans have made coding in Java a pleasant experience. Apart from helping you in the code writing process, they also offer a high-level of debugging assistance to the programmers.



    AND FINALLY THE CONCLUSION !!


    Java is just ever-ending and open source. We just need to keep ourselves updated !!  We love free and open source software, don’t we? OpenJDLK is a free and open source implementation of Java programming language. Being an open source programming language, it’s platform independent across OS environments. Also, you don’t need to pay a penny to write applications on Java.


                                                                   ------<PEACE>------










































    This is written from an inspired source just for the acknowledgement of the readers and I am not responsible for any Legalities
                                                                                                                                            Bhaskar.

    Wednesday, 3 August 2016

    Hater's are Gonna Hate !!!! But this is how you're gonna fight back Hating.

    With the recent posts of mine about Techie Stuff and all I felt like I made you reader's miss some spicey read about our daily life routine . So here I am with a common topic of our's !!!


    The recent tactics of my fellow mates who showed me true colour's by their words of hate got me thinking again about why people today love to hate. It's really unfortunate that we all wish to be loved, yet, some would easily jump to hating on others. If you've been a victim of hate or cyber bullying, this should be inspiration enough for you to tackle those a-holes.


    But first, let's understand what builds hate in people. Haters are usually people who are insecure. Know this. It has been established time and again that if people hate on you or criticize you without you having harmed them in any way, they most definitely are jealous of or intimidated by you. And their hate directed towards you is only their defense mechanism. Because they know no better!!!

            "Not all insecure people are haters, but all haters are insecure people." 

                                                                                    ~ Jack Schafer, Professor and Author

    Remember !! Where there is Hate !! There is a Rumor about you for them to talk behind your back!!


    Whether you're a person who actively voices out their opinions or not, as long as you're on social platforms, you've most definitely experienced some kind of hatred - directed towards you or one of your social connections. But, it's amazing how people have started taking hate on social media, turning it into something nicer, and throwing it back into the digital universe. Earlier last year, Australian academic, Susan Carland decided to donate $1 to UNICEF for every hate tweet she received.

    "I donate $1 to @UNICEF for each hate-filled tweet I get from trolls. Nearly at $1000 in donations. The needy children thank you, haters! 😎"

                                    WOW!!This one is a hell of a way to handle the Haters!!!!



    Same as the above , I'm going to share few more Example's below about the super people who reacted to their hater's !!!!

    Lynelle Cantwell, a student at Holy Trinity Regional High, discovered a poll that was doing the rounds in her class. It was a poll to know who was the ugliest girl in school was.

    Lynelle took to Facebook, head held high, to lash out at the boys behind the poll. And her post got some huge response.
    The very recent tweet by cricketer Virat Kohli, in which he defended ex-girlfriend Anushka Sharma, was a fine example of how non-victims too, are standing up against haters and bullies, and supporting those unjustly targeted.

    By considering the above Example's and several other experience's I conclude by saying a few stepological points on to how to overcome HATER's as a part of providing a solution  :-

     Here are some:


    1) Be calm, and don't react. Because that's exactly what insecure people look for - attention and               knowing you got affected by their snarky remarks, will make them feel like they have some sort of         power on you.

    2) But if you must, respond - instead of giving into stimuli, take a couple of milliseconds, and come up       with a quip instead to tell them off.

    3) Don't take what they say, personally. Remember, it's not you, it's them.

    4) Know your own strengths (and weaknesses), and concentrate on those (the strengths, of course)         instead.

    Know your opponents' strengths and weaknesses too. Then point them all, and say, "You see, like I just pointed out, you have some strengths and weaknesses too. We all do. So, we're all the same."

    Note: This is an updated piece and I am sharing it again, because I stand against cyber bullying and hating. I wish for more people to be inspired to support and defend those who are victimized.

    If you know of someone who is a victim of bullying (or any other form of hatred), share this article with them. Also, share your thoughts about hate on social media. You are welcome to leave a comment below !!














































    This is written from an inspired source just for the readers acknowledgement and I am not responsible for any Legalities.
                                                                                                                                       -Bhaskar                                            

    Thursday, 21 July 2016

    A No Hack-Trick: Using Whatz App without Data Connection !!!!

    WhatsApp is currently the biggest instant messaging service provider in the world. With more than 700 million active user monthly, it has certainly become the most popular app in the market. Whatsapp is not the only app that we use. There is Facebook, Snapchat, Instagram and many other apps which do consume a lot of our data. And this tempted every user in the world to find some or the other ways to reduce their data consumption.

    There are a ton of black hat websites which will teach you many illegal ways to use whatsapp without data charges or internet. But we, RVCJ team are sharing this amazing FACT ( Not Trick ) with you guys so that you don’t end up screwing your smartphones with malwares and Trojan virus.

    There is no trick in this, instead there is new sim card for this. ‘WhatSim’ is what they call it. An entrepreneur Manuel Zanella (38 years old), engineer, founder and CEO of a company named ‘Zeromobile’, an Italian based company was the one who came up with this idea.

    Manuel Zanella Rngineer in an interview said, “WhatsApp is the future of mobile communications. Its only “limit” is the data connection especially when you are traveling because the roaming charges are expensive and you can’t always find Wi-Fi everywhere and it is not always free. As someone who appreciates and uses WhatsApp, I tried to figure out how to get around this problem. That’s why WhatSim is an extraordinary opportunity for WhatsApp.”

    Interested in getting one of those sims???? here is the answer !!!!

    For 10 EUROS which is approximately Rs 714, You will get a SIM card (standard worldwide shipping is 5 EUROS, roughly Rs. 350) which will provide you unlimited text messaging for a year. While sending and receiving text messages, contacts, documents and location updates via WhatsApp is free, you will have to buy credits for sharing multimedia messages such as videos, photos and voice messages. The credit required for sending multimedia messages will depend on your current location
    Zanella further explains, “The solution we have developed is simple and intuitive. With €5 you get 1000 credits that you can use, for instance, to exchange 50 photos or 10 videos in many countries around the world. There are no limits to sharing your position and contacts. This way we guarantee the utmost transparency. Buying a recharge is quick and easy: just go to our website even from your smartphone and soon even from a dedicated app.”
    The company is planning to span their wings in different parts of the world which includes almost 150 countries and planning to make WhatSim available via “network of local distributors in over 100 countries.”

    Although this is not the first time when a social media company is planning to collaborate with a Telco company promising to provide unlimited data usage, Last year, Facebook did the same by collaborating with Reliance, although things didn’t go so well due to outrage of many Netitizens on the topic ‘ Net Neutrality’.
    So, this is how you can use WhatsApp without internet. No technical stuff, no black or white hat tricks, just pure and simple way.


















    This is written from an inspired source just for the reader's acknowledgement and i am not responsible for any legalities. 
                                                                                                                         Bhaskar.