Category Archives: attacks

How much safer are you with your antivirus

Hello my dear readers, Hope you people are fine,

I am sharing my post after couple of days due to busy schedule. We all are well aware of anti-viruses and their effectiveness since 1980’s when the term anti-virus was first establishing its name in the field of digital world. since then this word is jostling in the mind of computer users. In early years users did’nt gave  much weightage but as time passed and uses of computers and its applications increased, security measures to avoid any damage to softwares becomes a concern and the hence the importance of the antivirus was felt first. But a debate continued as to whether AVs are necessary or not. Sceptics sometimes blame security providers of hyperbolizing the issue. Some even reached to the extent of blame that the security companies create their own malwares and then put its crack later in market to establish and carry on their business. 

Former Firefox developer Robert O’ Callahan in his blog (www.snipca.com/23283) urged window 10 users to uninstall their antivirus saying that antivirus sellers are terrible. He recommended Windows defender as capable of any of the antivirus available in the market. This is what the topic I want to share over here. Yes, if the user is upto genuine windows and is having regular updates from Microsoft he/she must not be afraid of attacks or safety to maximum extent. Microsoft company itself worked and is working a lot in view of safety issues of the windows and utilities of Microsoft itself is providing all the common measures to keep its user safe and secure.

Why a big company like Microsoft will ignore such a major aspect of its product. As per former mozilla developer Antivirus hurt security significantly and poison other softwares of the windows as well. He draws on his own experience blaming AVs for blocking security updates to the browser which consumed major time of developer in fixing this. Security blogger Graham Cluley acknowledged that AVs sometimes suffered from its own flaws and vulnerablities. But people are crazy enough to use web without using one. In security lab test Microsoft defender did’nt overcome all security issues and failed in 10% but still it is recommended a better option than other rivals of the market. 

In my own experience, I tried to install one new AV as my old one getting expire a day after installation of new one and my new antivirus shows other as presence of virus. To my shock I tried to remove the files (vault backup) from my computer as there are chances when AVs put your infected files into their vault but still my new AV kept on showing my old one as virus. As per my view since XP is not being updated now from Microsoft and most of latest AVs do not offer any installation to XP hence safety of windows XP is on the verge of infection. Similarly windows vista and windows 7 too are vulnerable to an extent as these windows possess some old files which continued even in its latest versions too. Hence updating windows till windows 7 do not offer as much safety as required.Hence good antivirus becomes a necessity in this case. But windows 8 and 10 do provide a tough security to the sneakers if are updated to latest versions. 

In all I must say if your are using genuine windows with later versions your worry chances are reduced to large extent but still you can use antivirus with customized using capabilities for hastlefree browsing but pirated windows do need antivirus softwares from security point of view. Windows updates and availability of antivirus both are the need of hour as one cannot stay safe since thousands of attacks are being faced by your PC within an hour of your browsing in open world.

Thanks for reading

Jagat

How to find – Websites, secretly connected to your computer

Hello dear friends, Hope you all are fine with health and happiness.

Sometimes we use better connections but still we get slow speed which is quite annoying,this things happens due to fact that malware, spyware or any adware using your internet behind the scenes resulting to slow data transfer on original requirement of speed. Here is the technique to know what is going behind the hood.

Third party firewall also provide feature of blocking unwanted connections unless to manage exclusion option for some sites.

netstat command from command prompt window is used to find the network statistics in details. This works in windows XP (out of date) and above i.e vista, 7,8,8.1 etc. In XP only service pack 2 is found to be responsive in this case. netstat command generate list of networks in systematic way in specified amount of time.

First of all log in your computer – window as an administrator (Any changes to the computer or information in the computer can be easily generated from Administrative log)ximg_53e314466c377-png-pagespeed-gpjpjwpjjsrjrprwricpmd-ic-iygyw7ynls

Window 8.x , command prompt is obtained by right clicking on desktop and choosing command prompt (Admin) option. Below 8, command prompt is entered by clicking start menu and entering “cmd.exe” in the search box. When the result display right click on cmd.exe and click run as administrator from popup menu.

2

If user account control Dialogue box appears click yes to continue.(User Account Dialogue Box may or may not appear depending upon your user settings).

4

Type the following command in the command prompt:

netstat -abf 5 > activity.txt

5

Here the  –a option shows all connections and listening ports,

–b option shows the application which is making the connection,

–f option displays the full DNS name for each connection option for easier

understanding of where the connections are being made to.

You can also use the –n option if you wish to only display the IP address.

The 5 option will poll every 5 seconds for connections to make it more easy to track what is going on, and the results are then piped into the activity.txt file.

Wait about two minutes and then press Ctrl + C to stop the recording of data.

Once  recording data is finished, Simply open the activity.txt file in your favorite editor to see the results, or type activity.txt at the command line to open it in Notepad.

The resulting file will list all processes on your computer (browsers, IM clients, email programs, etc.) that have made an internet connection in the last two minutes, or however long you waited before pressing Ctrl + C. It also lists which processes connected to which websites.

If you see process names or website addresses with which you are not familiar, you can search for “what is (name of unknown process)” in Google and see what it is. It may be a system function you don’t know about or a function of one of your running programs. However, if it seems like a bad site, Google helps you to get rid of it.

6

Some third party softwares are also handy in knowing and removing unwanted connections.

CURRPORTS and TCPVIEW are some of the common ones.

Thank you for bearing me ..

Jagat

What is “Phishing” and “How to avoid Phishing”

Dear friends,

How are you,hope you will be fine definitely,

I am going to share my knowledge with you about “PHISHING”. Basically it sounds typical that of fishing and work same like a catcher puts a catch to lure a fish similarly a hacker puts a lure to inspire you to click on the link or attachment which seems to came from one of your own mail contacts list. when you click on the link a page very much imitate of that of login page of gmail, yahoo, rediff or else pops up and ask you to login for further proceedings and when you put your credentials into it, your username and password passes to the hands of cyber criminals and you just phished off..

Yesterday  I had gone through a news in which it was alerted that “A new highly effective phishing technique is targeting Gmail users, along with other email services”

Mark Maunder, the CEO of WordPress security plugin Wordfence, says the attacker will send an email to your Gmail account. That email may come from someone you know who has had their account hacked using this technique. It may also include something that looks like an image of an attachment you recognize from the sender.

data

If you click on the image, expecting Gmail to give you a preview of the attachment, a new tab will open up, prompting you to sign in to your Gmail account again. At first glance, the location looks like a service login page, but it is actually a phishing attempt.A sign-in page for Gmail pops-up. Once you complete sign-in, you account has been compromised. Once they have access to your account, the attacker also has full access to all your emails including sent and received at this point and may download the whole lot. and the same thing repeats with the contacts downloaded or copied from your mail account and the process keeps on moving and expanding.

Phishing is quite familiar  with a group of computer geeks known as hackers and those who prefer crime through cyber space, as it is far easier to trick someone into clicking a malicious link in a seemingly legitimate email than trying to break through a computer’s defenses by putting malware on your system or steal your credentials.

Spear fishing ,Whaling ,email Spoofing – sometimes individually or sometimes combined  used by the attacker to bring the target under impression of faith so that he/she submits before the attacker’s technique.

Spoofing is forgery of email header appearing to be orginated from somewhere by someone from other source and tactics is used in phishing. Main aim of email spoofing is to force targets to open, and possibly even respond to, a solicitation.

Spear phishing is targeting particular organization  and cannot be done by individual hacker but can be performed through perpetrators out of gains.

Whaling in which high profile individuals like CEOs, celebrities, corporate tycoons and politicians emails are targeted.

Hacker in original sends you a script in the form of attachment when attachment is clicked a new page opens in which it asks to log in and when person logs into nothing happens but the entered data is saved and transferred to the hacker through that very script.

Question arises then How is one safe from such kind of fraud , in this case one has to be alert when such spoofs occurred. When you sign in to page of any service, check the browser location url bar and verify there isn’t any extra text mostly in the form of

<script src=data.text/html/https://,,,,,,,,,,,something like that, then definitely it is fake page from one of the cyber crime world.

always use https: ,,in url entries

But safety is better than cure. keeps on changing your password every while and then, if your email contains some sensitive or urgent useful data.

Service providers too bring two step verification methods which helps to protect your emails.

The field is vast but ‘

Hope this helps you to understand a part of hacker’s one of the styles to peep into your accounts.

Thanks

Jagat