Sign Up To Recive Latest Blog Updates

subscribe to Hacks N Cracks

Enter your email address:

Delivered by FeedBurner

Singer Lady Gaga Twitter Account got Hacked 2 DAYS AGO


Singer Lady Gaga Twitter Account got Hacked This Morning

The singer had her account invaded by some strange Spanish tweets early this morning.

It’s been quite a day for going Gaga as the stories just keep on coming. You’d think she had an album coming out soon.

Protect Your Mail from Spammers: How Spammers Get Your Email Address?



Protect Your Mail from Spammers: How Spammers Get Your Email Address?
You’ve seen the emails: They claim to have been sent by a financial institution in a faraway land, or from a corrupt bureaucrat in an equally corrupt government. Whatever the ruse, the senders always claim to need your help in spiriting away millions of dollars. These schemes, known as “419,” “advance fee” and “Nigerian letter” scams seemingly have been around forever and are surprisingly effective at duping people. But where in the world do these scammers get their distribution lists, and how did you become a target?

BACKDOOR DISTRIBUTED AS FACEBOOK MESSENGER APPLICATION

New rouge emails posing as official facebook communication service lead users to a 3rd party website which is distributing a backdoor as Facebook Messenger Application. This rouge email bear a subject as "someuser listed you as his uncle" and make use of real theme to look like  real facebook notifications. In the body of message, it informs for a pending action including a friendship request. It's link is of www.facebook.com but it actually points to some 3rd party website.That new page has an advertisement of a program facebook Messenger which is claimed to be an app for quick access to messages from your Facebook account.

EBOMB A VIRUS FOR FUN


This is a simple attack that enables running multiple applications in victims pc just to harass him. There are many ways to ebomb but this is the most easiest way to do it. Simply open notepad and type....

COMPUTER SECURITY THREATS | MALICIOUS PROGRAMS | MALWARES


Computer Security Threats | malicious programs | Malwares

Computer security threats or Malicious code or Malwares comes in a wide variety of forms and is distributed through an ever growing number of delivery mechanisms. In general malicious program is any software that impedes the normal operation of a computer or networking device. This software most often executes without the user's consent. 
Understanding how malwares works can help you develop defensive strategies, select 
computer security products and train employees on how to identify potential threats.

HOW TO AVOID FACEBOOK SCAMS?

Facebook is the part of people's daily life. It's no. 1 social networking website so it is used for spreading scams by spammers.  Scammers search through Facebook user accounts and gather information from public profiles to send phishing emails so they can gather more secure information such as bank account numbers, credit card numbers and user login and password to other secure sites. On facebook scammers use facebook applications to gather user's information and use their profile to post links of worms and trojans. I wrote a post on securing facebook account from hackers. Today i am going to write some steps to protect your facebook account from scams.

HOW TO PROTECT YOUR EMAIL ID AND FACEBOOK FROM HACKERS


How to protect your email id and facebook from hackers

Everybody use email accounts and social networking websites such as orkut, twitter and facebook. There are many important informations of a person in these email accounts and social networking website. so it is important to protect these account from hackers. Because hackers always try to get others account to get those secret and personal data for bad purpose. If use your email id for business and other services then it's a great loss and trouble for you. So always try to be safe from hackers

“Ethical Hacking” Case Studies

 

       “Ethical Hacking” Case Studies


Some information and case studies about Ethical hacking!! 

Trojan Horse Softwares & Tools: Download Free Trojan Horses



Tool: QAZ

  • It is a companion virus that can spread over the network.
  • It also has a "backdoor" that will enable a remote user to connect to and control the computer using port 7597.
  • It may have originally been sent out by email.
  • Rename notepad to note.com
  • Modifies the registry key:

Trojans and Backdoors : Working of Trojans

What actually a backdoor or trojan is. I already posted about trojans so backdoor virus Is  A remote administration utility that bypasses normal security mechanisms to secretly control a program, computer or network.

 Working Of Backdoors and Trojans

How to spread a Trojan Horse: Methods to spread Trojan Horse on Internet

Wanna spread some TROJAN  Virus then read below, the modes of transmission..


                             Modes of Transmission


Types of Trojan Horse Virus



Various Trojan Genre
Most of the Trojans use auto-starting methods so that the servers are restarted every time the remote machine reboots / starts. This is also notified to the attacker. As these features are being countered, new auto-starting methods are evolving. Well now     ,some type of trojan virus are..

What is Trojans or Trojan Horse: Backdoors & its Working



We will begin with:
  • Terms of reference for various malicious code
  • Defining Trojans and Backdoors
  • Understanding the various backdoor genre
  • Overview of various Trojan tools
  • Learning effective prevention methods and countermeasures
  • Overview of Anti-Trojan software
  • Learning to generate a Trojan program

Facebook has announced TWO FACTOR AUTHENTICATION


Facebook is the main target of hackers and spammers these days. SO facebook security team always try to make it as secure as possible. In this way they have added many security features in the website. Now facebook security team has announce some safety and security changes which include two factor authentication system and improvements to it's Https supports.
In this multi-factor authentication systems, it has combined traditional passwords login system with additional identification methods, like one time use codes or digital keys. 
This type of authentication system is also used in banking sectors for customer account protection and also announced in Google accounts earlier this year which send a code to user via sms.

All Facebook CHAT Slangs and Smily Codes



Slang’s have become very common in chat’s,Sms,emails.People new  to these slang’s find really difficult to understand converstion.On the other hand it saves a lot of time and effort if slang’s are used.I will give the most commonly used Slangs with there meanings that are used in facebook chat or Sms.

Hacks n Cracks

Now, at last with a hard work of modification in ".js" and ".CSS" scripts , I had made a chome extension. As per the statistics i had found that 73% INTERNET users are using the famous browser CHROME , so i decided to make a chrome extension for Hacks N cracks visitors , as it is ease of use and by just a click we can browse the latest posts! SO MOVE ON AND DOWNLOAD OUR NEW CHROME EXTENSION !

Google Chrome Shortcut Keys

Today i am going to write some secrets of google chrome. Hey don't think too much. It's only a list of chrome shortcut keys. These keys can help you to navigate and use your chrome browser in faster an easy way.

How To Use Keyboard Numpad to Control Mouse


I had got to know this feature long ago, but now i am posting it b'coz some times when our mouse is  not working and for some urgent work or for some use , we are not able to use computer perfectly!. Well, I had to because , in school I hate using BALL MOUSE, as they don't work smoothly. So I use the numpad instead to control my mouse pointer rather than a mouse or the touch-pad.

How to Protect Your Websites From Hackers? How to Protect You BLOGS from Hackers ?


How to Protect Your Websites From Hackers? How to Protect You BLOGS from Hackers ?

It’s a nightmare scenario. You go to your website only to find a nasty message from a hacker bragging about hacking your site. And nothing else. As far as you can tell your content is gone and you can’t even find a way to log into your Website, WordPress OR Blogspot dashboard.

Have You Really Been Hacked?
Must of times people came to me saying, “My Blog’s been hacked,” when it really hasn’t. With Blog sometimes plugin conflicts can cause issues that seem to the user like a hacker has messed with something. This is most common when upgrading to a new version of blogging services if a plugin hasn’t been made compatible with the new version yet.

True Story Behind Underground Hackers: Myth About Blackhat Hackers

True Story Behind Underground Hackers: Myth About Blackhat Hackers

Cyber war is nothing but an eye wash, actually speaking cyber war is a created hype by some old kids, in which one thinks himself a soldier and others as toy guns. And the computer as his Kingdome, little knowledge he possess is his wisdom, and tools he posses for hacking are his arms and ammunitions. The so called cyber war soldiers are living in their own imaginary world and each one of them thinks he is superior amongst them.

Twitter Delicious Facebook Digg Stumbleupon Favorites More