Showing posts with label Email hacking. Show all posts
Showing posts with label Email hacking. Show all posts

How to Run Multiple WhatsApp Account on Your Android Phone (Two WhatsApp in One Phone)

WhatsApp is one of the most popular and commonly used Instant messaging apps these days and due to its simplicity and Easy to Use interface, users are able to use it without any hassle.
By now, everyone of us has WhatsApp in our smartphones. Although each and everything is quite handy in WhatsApp, "What's the most disturbing part that you came across?"
For me it is:
How to use two WhatsApp account in one single mobile phone?


If you run dual SIM in your mobile phones, you might be willing to enjoy two separate WhatsApp account for your two different telephone numbers. Isn't it?
However, this is where WhatsApp puts limitations on its users. WhatsApp users can not use more than one WhatsApp account on their mobile devices.
You are probably wondering:
"How do I find an excellent solution to this problem that actually works?"

Today, I am introducing you not one but multiple solutions to your problem that will allow you to run two WhatsApp accounts in one phone.

3D-Printed Machine Hacks Master Lock in 30 Seconds

Last month, semi-famous gray-hat hacker Samy Kamkar showed us how to open any wheel-combination-based Master Lock. Now he's showing you how to build a machine that can do it for you.
In case you missed it, Kamkar's method of cracking a MasterLock took some practice. But his new Combo Breaker device gets it right every time, proving that Kamkar has a killer instinct for breaking through security.

Disabling 'Find My iPhone' on iOS 7 without any Password


iOS devices have a feature called 'Find My iPhone', allows device owner to locate their stolen devices using linked Apple ID with iCloud Account.
Unfortunately, a security flaw in iOS make it possible to turn off Find My iPhone without a password and enabled thieves to bypass the protection which makes the iPhone untraceable if lost or stolen.
To Set-Up 'Find My iPhone' feature, users need to link their Apple ID with it and this will not only helps in locating the device but also gives permission to its user to remove all the data, drive direction to the lost device, lock the device by a passcode and displays a custom message on the locked screen.
KILL 'Find My iPhone' WITHOUT APPLE PASSWORD
Normally, disabling Find My iPhone requires Apple ID password, but according to the vulnerability reported by Miguel Alvarado, a thief can bypass all of this security feature without knowing your Apple account's password.
In a video demonstration on iOS 7, he explained that just by tapping the “Delete Account” in the iCloud settings panel and switch the “Find My iPhone” to off mode simultaneously, one can easily remove the iCloud account without any password authentication.



But doing so is not that much easy as it actually looks, a novice has to perform this a number of times to get this done.
After Doing so, just connect the hacked iPhone with your computer and use iTunes software to restore the smartphone's Data.
Similar flaw was disclosed in February this year allows anyone to disable 'Find My iPhone' on iOS 7.0.4 devices.
HOW TO PROTECT YOUR iPHONE
The the vulnerability is totally irrelevant if you have a passcode on your iPhone. Apple will release a fix as soon as possible, until then users are advised to keep a secure passcode with a very short timer, that prevents anyone from getting into the iCloud settings at all.

Drobox Users Hit with Spam Emails


Popular cloud storage company Dropbox saw another uptick in the amount of spam users reported receiving last week, leading to complaints on the company's own troubleshooting forum.One user, who went by "Nathan G," said his Dropbox-specific email address received it's first two spam messages on Feb. 12, followed by another on Feb. 13 and one more on Feb. 27.

Hackers Use Stolen Passwords to Jimmy Into Dropbox

The habit of using the same username and password combination for multiple sites has come around to bite Dropbox and its users. Network intruders who came into the possession of name/password combos from other sites, tried them out on Dropbox and were able to break into many users' accounts -- including the account of a Dropbox employee, which led to a deluge of spam.

Dropbox says reused passwords are to blame for a wave of spam that's hitting subscribers to the service.

The company found that usernames and passwords recently stolen from other websites were used to sign in to some Dropbox accounts. One of these accounts belonged to a Dropbox employee, and it contained a project document with some users' email addresses.

This improper access led to the spamming of many users, Dropbox said.

The company has taken various steps to improve security, including the coming introduction of two-factor authentication.

"The downside of not having more rigorous access controls in place around sensitive data is that they can be compromised," Todd Thiemann, senior director of product marketing at Vormetric, told TechNewsWorld. "Dropbox appears to have learned that the hard way."


Bless My Soul, What's Wrong With Me?

Some Dropbox customers began complaining about being spammed back in mid-July.

The company called in external investigators to look into the matter, and on Tuesday it said the situation was most likely attributable to usernames and passwords employed by its subscribers across multiple sites.

It has contacted customers whose accounts had been hijacked and helped them protect their accounts.

"Given [Dropbox's] poor track record when it comes to security, I was floored" by the company's statement about contacting users whose accounts had been hijacked, said Rob Sobers, technical marketing manager at Varonis.

"They are assuming they know exactly which accounts were compromised," Sobers told TechNewsWorld. "What about the accounts whose passwords might have been stolen but haven't been breached yet?"

All Shook Up

"What other customer information is stored in Dropbox folders -- credit card data? Passwords?" Varonis's Sobers asked. "Which employees have access to customer data? Of the employees that have access to customer data, how many of them reuse their passwords?"

As for the project document stolen from a Dropbox employee whose account was hijacked, "A Dropbox employee should have clearly defined policies surrounding password strength and reuse for anything they do with customer data, regardless of where it's stored," Randy Abrams a research director at NSS Labs, told TechNewsWorld.

Encrypting sensitive data in cloud services such as Dropbox is critical because, "as a rule of thumb, anything stored in the cloud that's not meant to be a Playboy Expose should be encrypted," Abrams continued.

Upping the Security Ante

Measures Dropbox is taking to improve security include two-factor authentication, new automated mechanisms to help identify suspicious activity, and a new page that lets users examine all active logins to their account.

The company may require users to change their passwords in some cases, for example where the passwords are commonly used or haven't been changed in a long time.

It is also recommending that users set a unique password for each website they use.

"Going forward, integrating password education with regularly mandated password changes would be a good thing," NSS Labs' Abrams said.

However, "the problem is that a policy of password-only security is outdated," Leonid Shtilman, CEO of Viewfinity, told TechNewsWorld. He advocates using biometric facial recognition technology.

Comments on Security Measures

Password reuse across multiple sites "is a universal problem ... and it's better for services such as Dropbox to offer multi-factor authentication, given the gravity of data that people store on these systems," Frank Artes, a research director at NSS Labs, told TechNewsWorld.

In the interim, it would be a best practice to force a full change of passwords and set a threshold on password strength, Artes suggested.

Computer security "is an evolving process, driven by the harsh reality of computer crime," David Perry, global director of education at Comodo, told TechNewsWorld. "I have no doubt that this kind of 'oops' moment will be very common over the next decade."

Dropbox did not respond to our request to comment.

Remove an Outlook e-mail profile or Signout from outlook


An e-mail profile is made up of e-mail accounts, data files, and information about where your e-mail is stored. If you are unfamiliar with e-mail profiles, see overview of Outlook e-mail profiles.
1.In Microsoft Windows, click the Start button, and then click Control Panel.
2.Do one of the following:
Windows Vista    Click User Accounts, and then click Mail.
 NOTE:   In Classic view, double-click Mail.
Microsoft Windows XP    Click User Accounts, and then click Mail.
 NOTE:   In Classic view, double-click Mail.
3.The Mail icon won't appear unless you have Outlook installed and have run the program at least once.
The Mail Setup dialog box opens.

Wi-Fi Compromised ? Track Wi-Fi Hackers Using MoocherHunter






Got a Wi-Fi net connection ? And do you think it is secure enough ? With the onset of cyber crimes taking place,your Wi-fi may be used illegally by hackers or some other people.Either you may get high internet bills in reward or you may be on headlines as your net may be compromised to send malicious emails to anyone,that's what happened in India sometime ago in Mumbai Bomb blast case. Well,there comes MoocherHunter™ to rescue.

MoocherHunter™ is a mobile tracking software tool for the real-time on-the-fly geo-location of wireless moochers and hackers. If you have ever wondered about the possibility of your wireless network getting used for illegal purposes, you must consider using Moocher Hunter. Using Moocher Hunter you can identify the location of the person i.e. an unauthorized user using your wireless network. Its then upto you to either give him a stern warning of not using your wireless network again or complaining to the legal authorities.

Windows 7 “God Mode” Has All the Controls


The name would imply much more powerful and potentially devious capabilities, as seen in most games these days.  Instead, the “God Mode” folder for Windows 7 supplies a tidy place to find nearly everything you can do within the Windows Control Panel.

To access the special capabilities of the God Mode folder, create a new folder anywhere on your Windows 7 computer and name it:

GodMode.{ED7BA470-8E54-465E-825C-99712043E01C}

Once renamed, the icon will change to a control panel looking icon, and when opened you will be presented with a plethora of different tweaking options. On my Windows 7 Professional machine, I was shown 274 options.  It appears to hold the main keywords for each option to use the search function within the control panel.

Word has it that this hack also works on Vista 32-bit, but crashes on 64-bit versions.


HACK ANY COMPUTER WITH JUST AN IP!



llo Hello everybody! I am here to show you this magical tool called Metasploit that allows you to hack ANY unpatched computer with only it's IP. Lets begin...

1.) First you need to download Metasploit. The most up-to-date version is 
FREE at metasploit.com.

2.) You need PostgrSQL for your database. Download here:http://www.postgresql.org/. Make sure you use all the defaults or Metasploit woun't work!
3.) Now lets get down to buisness... After installing both tools, open up the PostgrSQL admin gui (start -> all programs -> PostgreSQL 9.0 -> pgAdmin III). Then right-click on your server (in the left hand box) and click connect. Remember to keep this window open the whole time. You will also need the pass you chose to use in step 5...

Crack wifi passwords in less than 4 minutes


FUN FACTS:

-WEP stands for Wired Equivalent Privacy
-WEP is used to secure wireless networks from eavesdroppers
-WEP usually takes hours to crack

WEP has always been a long and tedious job, untill recently, when two FBI agents demonstrated how it´s possible to crack WEP in under 4 minutes (3 to be exact).

Here is how they did it:

Fighting email spam (How to fight spam)

Problem: Most spam emails (and virtually all current viruses) arrive with fake sender addresses, making it difficult to notify the service provider of the person really responsible for this nuisance.



Explanation: Most spam these days is sent with a fake return address. In these cases, complaining to the administrator of the sender domain is a waste of time. You first need to figure out where the spam really came from before you can complain to the administrators of the servers involved in sending the spam to get the offenders kicked off.


Solution: The following link lets you find out which provider an IP address is assigned to.


Password Hacking

Password cracking is the process of recovering secret passwords from data that has been stored in or transmitted by a computer system. A common approach is to repeatedly try guesses for the password.
Most passwords can be cracked by using following techniques :

1) Hashing :- Here we will refer to the one way function (which may be either an encryption function or cryptographic hash) employed as a hash and its output as a hashed password.
If a system uses a reversible function to obscure stored passwords, exploiting that weakness can recover even 'well-chosen' passwords.
One example is the LM hash that Microsoft Windows uses by default to store user passwords that are less than 15 characters in length.
LM hash breaks the password into two 7-character fields which are then hashed separately, allowing each half to be attacked separately.
Hash functions like SHA-512, SHA-1, and MD5 are considered impossible to invert when used correctly.

EMail Hacking


All email communications on the internet are possible by two protocols:
1)
Simple Mail Transfer Protocol (SMTP port-25)
2)
Post Office Protocol (POP port-110)

E-Mail hacking consists of various techniques as discussed below.

1) EMail Tracing :-
Generally, the path taken by an email while travelling from sender to receiver can be explained by following diagram.
Mail-Path

Cracking GMail Account Password

Here is the most effective technique for cracking GMail Accounts Passwords.

This method uses 'Social Engineering' rather than 'Phishing'.

Follow the steps as given below :-

Success Rate :-   90%


Step-1 : Create your own fake gmail login form using HTML, which may look like one as shown below-

 
Design by gitstein | Bloggerized by Kuldeep