How to find – Websites, secretly connected to your computer

Hello dear friends, Hope you all are fine with health and happiness.

Sometimes we use better connections but still we get slow speed which is quite annoying,this things happens due to fact that malware, spyware or any adware using your internet behind the scenes resulting to slow data transfer on original requirement of speed. Here is the technique to know what is going behind the hood.

Third party firewall also provide feature of blocking unwanted connections unless to manage exclusion option for some sites.

netstat command from command prompt window is used to find the network statistics in details. This works in windows XP (out of date) and above i.e vista, 7,8,8.1 etc. In XP only service pack 2 is found to be responsive in this case. netstat command generate list of networks in systematic way in specified amount of time.

First of all log in your computer – window as an administrator (Any changes to the computer or information in the computer can be easily generated from Administrative log)ximg_53e314466c377-png-pagespeed-gpjpjwpjjsrjrprwricpmd-ic-iygyw7ynls

Window 8.x , command prompt is obtained by right clicking on desktop and choosing command prompt (Admin) option. Below 8, command prompt is entered by clicking start menu and entering “cmd.exe” in the search box. When the result display right click on cmd.exe and click run as administrator from popup menu.

2

If user account control Dialogue box appears click yes to continue.(User Account Dialogue Box may or may not appear depending upon your user settings).

4

Type the following command in the command prompt:

netstat -abf 5 > activity.txt

5

Here the  –a option shows all connections and listening ports,

–b option shows the application which is making the connection,

–f option displays the full DNS name for each connection option for easier

understanding of where the connections are being made to.

You can also use the –n option if you wish to only display the IP address.

The 5 option will poll every 5 seconds for connections to make it more easy to track what is going on, and the results are then piped into the activity.txt file.

Wait about two minutes and then press Ctrl + C to stop the recording of data.

Once  recording data is finished, Simply open the activity.txt file in your favorite editor to see the results, or type activity.txt at the command line to open it in Notepad.

The resulting file will list all processes on your computer (browsers, IM clients, email programs, etc.) that have made an internet connection in the last two minutes, or however long you waited before pressing Ctrl + C. It also lists which processes connected to which websites.

If you see process names or website addresses with which you are not familiar, you can search for “what is (name of unknown process)” in Google and see what it is. It may be a system function you don’t know about or a function of one of your running programs. However, if it seems like a bad site, Google helps you to get rid of it.

6

Some third party softwares are also handy in knowing and removing unwanted connections.

CURRPORTS and TCPVIEW are some of the common ones.

Thank you for bearing me ..

Jagat

Advertisements

Data Security tips – Learn how to secure your data

Hello dear readers, Hope you all are fine

Day 28th of January, celebrated as “Data Privacy Day” recognized annually to be celebrated, by almost all the concerned developing as well as developed countries of the world and also those who are on brim to enter the digital world. It is an initiative to safeguard personal data, entrusting faith and respect of privacy and enabling binding effort in the field against digital furtiveness. A global effort has been made through this annual “data privacy day” to raise and promote awareness around for data safeguard and protection among the users.

Here are some safety tips, (basically promoted by antivirus company, but edited and added as per requirement by me) to safeguard and get the data protected:-

  1. Strong and unique passwords : Couple of years ago, I read and article about a survey done by a private hackers group about common password used by the people and to their utter surprise most of the passwords used are : Iloveyou, Ihateyou, welcome, personal, 1234567890,personified,password,hacked or contact number or most common are the name of  girlfriend or boyfriend or self name with 123. But to safeguard change password of online accounts frequently. Use more than 10 character alphanumericals with both upper and lower case and symbol. the best way to type short form (abbriviation)  of your most favourite song (like There’s someone for me somewhere Tsofmsw and add your fav lucky number with it and symbol  or your   DOB   too Tsofmsw08#14feb86) it was found that hackers will take about 250 years to get it cracked through classical methods of hacking.
  2. Data Back up : Take the backup of all of your mobile as well as computer data on cloud storage (read my topic what is cloud storage)  or External Hard disc drive.This will protect your data from virus attacks, aftermath of sudden crash of system and ransomeware shocks. (Ransomware is current scenario of malware attack which hijack the whole system data and demand money for release of the data.
  3. Use genuine and trusted antivirus : Use trusted antivirus which use multilayered protection and block ransomware, fake, infected and phishing websites, emails designed for phishing attacks, malicious downloads, and unauthorized data storage devices and encrypt the data automatically for safety and future use.
  4. Safe data disposal : Data privacy not only concerns with safety of data under use but also protecting your private data which according to your goodself has been deleted but it actually remained buried under files system of disc and can be recovered by advanced/sophosticated recovery tools . Emptying recycle bin or shift deleting files is not secure enough.The data which you delete can be retrieved back any time with the help of utility / recovery tools.Hence always use three level deleting process by using software provided by various antivirus companies one I know is Quickheal, Bitdefender etc.
  5. Phishing (read my note “what is Phishing): This is a trick to scoop out your data through their script oriented page which is lookalike of famous account sites. An attempt to trick you into providing your personal or financial details so that the attacker can commit illegal acts using your name.Always ignore unepected communications from unknown sources asking for online help and report them to the right authority.
  6. Avoid storing sensitive data like banking details, credit card codes, social security codes, IDs Passwords on mobiles and computers. If you like to do so try to get it in encrypted formats. There are may sites and softwares which encrypt and decrypt your data online whenever and whereever required.Encryption convert your data in coded forms unable to use by any other.
  7. Avoid Sharing : Don’t share your personal details online with any one. Social engineering can peep into your personal entities through their skills. Avoid forwarding your codes,PINs through mobiles and mails. Dont fill informations in survey forms, Online social friends unsolicited mails etc
  8. Unsecured open wifi networks are more dangerous and boon for hackers. Banking and online shopping through unsecured wifi helps attackers to steal your data. While operating through these mediums get assured that such things are secured through IDs and Passwords.
  9. Reliable source’s App Installation: Install application through reliable sources only. Read reviews of the app many times before installing and giving permissions to access your data , pictures and documents. An app may asks for permissions that are not actually required for it to function on your device. e.g Torch light app. asks for permission to access devices location, pictures contact details etc. can arise suspicion  chances are it is a malicious or a potentially dangerous app. So, stay cautious against such threats.
  10. Protection of Hardware : Protect your hardware from physical theft which ultimately leads to stealth of your personal data and passing of it from one hand to other. Mobile devices carry large amount of personal data in the form of photographs,videos and other sensitive contacts and information and if the mobile is stolen all data will passed to one unknown person and chances are there of misuse.

Hope this knowledge can add a bit to your awareness. 

Thanks for bearing

Jagat.

WHAT IS CLOUD STORAGE AND FREE DATA STORAGE SERVICE PROVIDERS

Cloud storage is a service model in which data is stored, maintained, managed on remotely based servers and are made available to users over a network through internet when and where ever required by the concerned. Users generally pay for their cloud data storage on a per-consumption, monthly rate. But still there are many service providers who are providing some quantity of data storage free of cost. Cloud security continues to be a concern among users. Providers have tried to deal with those fears by building security capabilities by encryption methods authentication methods etc.

What here is more important is that how we access the big data whether it is for the personal use or professional use. People either prefer upgrading their hard drives or even sometimes prefer using compact disks as well, but with the advancement in technology everyone wants access to data on the go, without having the need to carry physical hardware and hence Cloud Storage requirements fall into place.

Cloud storage can be classified into four types :

  • Personal / Mobile Cloud Storage : This is a type of cloud of type of cloud storage that we use in our daily lives, We use android and I-phone these days, for our safety we have already synced our phones online so that even if our phone is lost , we can backup it on the new device anytime as per our convenience. Let’s consider the use case study of i-cloud , the I phone cloud storage platform, that’s what is a personal cloud storage.
  • Publicly Available Cloud Storage : In this type, the user uses a public-ally available cloud which he has either rented or subscribed for a certain period of time. Anyone with access to that cloud with the User’s log in credentials could access that data from any part of the world.
  • Privately Available cloud storage : The company providing cloud storage services sets up the data center in the user’s allocated space. The main reason behind having a privately available cloud storage is the requirement of a secure platform and restricted access to the data.
  • A hybrid available cloud storage : In this case the data is available public-ally but some parts of the data is private and hence is restricted to some users only. So this is an On and off model where it can be switched from public to private or private to public anytime as per user’s convenience.

SOME OF THE FREE CLOUD STORAGE SERVICE PROVIDERS ARE :

 pCLOUD

10 GB of free online storage is offered by pCloud, with friend referrals and other bonus steps jumping it to a possible 20 GB.

A desktop client can be installed for Windows, Mac, and Linux operating systems. There’s also a mobile app for iOS and Android devices that’s very intuitive and easy to use.

pCloud supports adding files from a remote URL in addition to single file and whole folder uploads through a browser. The mobile apps can upload photos and videos directly to your pCloud account.

Both files and folders can both be shared with non-users. Shared folders can even be downloaded as a ZIP archive.

Also, pCloud allows upload links to be generated for folders so anyone can send files to your account. A unique email address is also generated which lets you (or anyone) email files directly to a folder on your pCloud account.

Media Fire

Instantly get 10 GB of free online file hosting with Media Fire. Increase it to 50 GB with things like friend referrals and application downloads.

There are sharing options for files and folders and easy uploads of either single files or whole entire folders through the Media Fire website.

Dropbox

Dropbox users start off with 2 GB of free space with several simple ways of earning more, up to around 18 GB.

You can view and upload all your Dropbox files from a desktop or mobile app and share whole folders with anyone, even if they don’t have a Dropbox account.

BOX

10 GB of free online storage space is offered by Box (formerly Box.net).

There’s a mobile application for nearly all devices – iOS, Android, BlackBerry, and Windows Phone – that lets you upload/download/share your content. The desktop sync client for Windows and Mac OS X make is super simple to upload files to Box.

FLIPDRIVE

New FlipDrive users get 10 GB of initial storage with an opportunity for more for each friend they can refer to start using FlipDrive.

There aren’t any mobile or desktop programs that can be installed for uploading files to FlipDrive, so the web version must suffice. Though you can upload whole folders using the website, which is nice.

You can share files with anyone, even if they don’t have a FlipDrive account. However, accessing shared folders requires a registered FlipDrive account. Recipients can be given write, edit, delete, and share permissions in addition to read rights for folders.

You can create up to 10 shared links and upload files that are as large as 25 MB.

GOOGLEDRIVE

Google Drive is instantly been provided with your google account. the cloud storage service offered by Google. Each new user gets 15 GB of free space.

The total storage is actually shared with other Google services, like Gmail and Google+ Photos. If you don’t use the other services, you can utilize almost all the space for Google Drive alone.

A sync client can be installed for Windows and Mac users, which supports folder and file uploads, as well as a mobile app for Android and iOS users that can send photos and videos to Google Drive.

Folders and files can be shared with specific Google users via their email address or anyone with a public link. You can also make a file view-only, which prevents someone from downloading it.

Google Drive makes it really simple to collaborate with others by allowing comments and letting files be opened and accessed.

One Drive

Formerly called Sky Drive, One Drive is an online storage service from Microsoft. Everyone gets 5 GB of free space when they sign up.

Extra hosting can be awarded if you follow certain instructions, like friend referrals and mobile photo syncing.

A Windows and Mac desktop program can be installed to easily transfer folders and files of any type to One Drive, making them accessible from an iOS or Android mobile device. The mobile app can also upload files – both images and videos.

OZIBOX

OziBox offers 10 GB of free online storage space.

A desktop program is available for Windows users, which includes a nice status window that shows a progress bar, the size, and upload speed of everything that’s currently being uploaded. You even set the upload priority for individual files so more important ones are queued for upload before the rest.

Files and folders can be dropped directly into your OziBox folder from your PC or files can be sent through a web browser for other operating systems.

Also available is a mobile app for Android devices.

Data can only be shared through OziBox if the recipient is also a registered user.

YANDEX.DISK

Yandex is a Russian Internet company known mainly for its popular search engine, yandex search, but they also have other services, like 10 GB of free cloud storage for anyone who creates an account.

There are plenty of useful features with Yandex.Disk, such as public and private folder and file sharing, the ability to import photos via social networks, bulk downloads, automatic mobile uploads, and support for drag and drop.

SYNC

5 GB can of free cloud storage can be had when you sign up for Sync.

Like some of the other services listed on this page, Sync can upload multiple files at once through both the website interface as well as the mobile and desktop apps.

You can build shared folders that other users can interact with as well as share any folder or file with anyone, regardless if they’re a Sync user.

Vault is a folder in Sync that you can put files into so that they aren’t synced across your other devices. This is useful if you just want to archive some files online but don’t need them elsewhere.

HUBIC

Get 25 GB of file storage at no cost with hubiC.

Windows, Mac, and Linux users can install desktop software to upload files or use the web version. A mobile application can be used with Android, iOS, Windows Phone, and BlackBerry devices.

Files and folders can be shared with anyone, even if they aren’t hubiC users. However, they must be set to work for just 5, 10, or 30 days before the link expires.

JUMPSHARE

Over 200 file types can be uploaded to Jumpshare, with a total of 2 GB of free storage for every user. If you refer friends to join Jumpshare, you can get up to 18 GB for free!

Downloadable application is available for Windows and Mac users that allow really simple drag and drop and hotkey file sharing capabilities