Disqus for Cyber Fort

Saturday 29 June 2013

Trace Exact Location Of Mobile Phone

1 Comment
There are many instances when we want to know where our friends are, where our parents are, and for those who've got a pair, where is my girl-friend or boyfriend. ! Well there are many apps in the market which allow you to get exactly the pin-pointed location of  any cellphone. But the problem is they cost too high. Well today I'm gonna show you a process by which you can trace the exact mobile location of any cell phone without the need to spend a single penny. What you need is listed below, and i'm sure most of us already have what is needed.


Requirements:

  • Any cell phone that supports Google maps. eg. Nokia , Blackberry , Symbian etc

  • Google Latitude. Which you can download by going to google.com/latitude from your cell phone.

Process:

  • Go to www.google.com/latitude from your cell phone.
  • Download the free app.
  • Open the App.
  • Enter You mobile number in the entry Field.
  • Now You've set it up on your phone. Now you gotta set it up on your friends cell phone. 

How to set it up on your friends cell phone:

  • You can add friends by their E-mail Addresses. Your friends will receive an E-mail with the download link of Google latitude. 
  • Or you can manually add yourself or ask your friend to add google latitude on his/her cell phone. 
  • Now you and your friend can add each other as friends on google latitude and you'll get the exact location of where your friends cell phone is.
  • There is exactly no limit to how many friends you can add in your latitude circle. ( just make sure you dont add your parents :) 
  • Well so As soon as You and your buddy confirm each other as friends you get to see each others location.




    Privacy:

    • Ofcourse you can fake your location The screenshot below describes the ways to do so.

      How to use it even when you don't have your cell phone with you:

      • Well the most eye catching feature of google latitude is that you can use it online even without a cell phone.
      • Just go to google.com/latitude from you PC, Follow the instructions, log-in into your account. And track You friends Locations !!




        Hope the Post helped You.

Read More

How Many types of Computer Hacking

Be The First To Comment

Computer hacking is most common among teenagers and young adults, although there are many older hackers as well. Many hackers are true technology buffs who enjoy learning more about how computers work and consider computer hacking an “art” form. They often

enjoy programming and have expert-level skills in one particular program. For these individuals,computer hacking is a real life application of their problem-solving skills. It’s a chance to demonstrate their abilities, not an opportunity to harm others.
Since a large number of hackers are self-taught prodigies, some corporations actually employ
computer hackers as part of their technical support staff. These individuals use their skills to find flaws in the company’s security system so that they can be repaired quickly. In many cases, this type of computer hacking helps prevent identity theft and other serious computer-related crimes. Common Methods for Hacking.


Computer Servers:

This comprises of either taking control over terminal(or Server) or

render it useless or to crash it..
following methods are used from a
long time and are still used..


Phishing

This is another type of keylogging,
here you have to bring the user to a                                    
webpage created by you resembling
the legitimate one and get him to
enter his password, to get the same
in your mail box..!! Use social
engginering..


Distributed DoSs

Distributed DoSs (DDoSs) are
coordinated DoS attacks from                          
multiple sources. A DDoS is more
difficult to block because it uses
multiple, changing, source IP
addresses.


Denial of Service

DoS attacks give hackers a way to
bring down a network without
gaining internal access. DoS attacks
work by flooding the access routers
with bogus traffic(which can be e-
mail or Transmission Control Protocol, TCP, packets).


Sniffing

Sniffing refers to the act of intercepting TCP packets. This interception can happen through simple eavesdropping or something more sinister.

Spoofing

Spoofing is the act of sending an illegitimate packet with an expected acknowledgment (ACK), which a hacker can guess, predict, or obtain by snooping.

SQL injection              

SQL injection is a code injection
technique that exploits a security
vulnerability occurring in the
database layer of an application. It
uses normal SQL commands to get
into database with elivated
privellages..


Viruses and Worms  

Viruses and worms are self-
replicating programs or code
fragments that attach themselves to
other programs (viruses) or
machines (worms). Both viruses and
worms attempt to shut down
networks by flooding them with
massive amounts of bogus traffic,
usually through e-mail.


Back Doors

Hackers can gain access to a network by exploiting back doors administrative shortcuts, configuration errors, easily deciphered passwords, and unsecured dial-ups. With the aid computerized searchers (bots), hackers can probably find any weakness in the network. So, not interested in these stuffs.. huh??? wait there is more for you.. So, how about the one related to hacking the passwords of email and doing some more exciting stuffs..

The various methods employed for

this are:

Trojan Horses     

Trojan horses, which are attached
to other programs, are the leading
cause of all break-ins. When a user
downloads and activates a Trojan
horse, the software can take the full
control over the system and you can
remotely control the whole system..
great..!!! They are also reffered as
RATs(Remote Administration tools)


Key loggers

Consider the situation, everything
you type in the system is mailed to
the hacker..!! Wouldn't it be easy to
track your password from that..
Keyloggers perform similar
functionallities.. So next time you
type anything.. Beware..!! Have
already posted about keyloggers and
ways to protect yourself from
them..


Brute Forcing

The longest and most tiring job.. don't even consider this if you don't
know the SET of password for your victim..


Secret Question

According to a survey done by security companies, it is found that rather than helping the legitimate users the security questions are more useful to the hackers.. So if
you know the victim well try this..


Social Engineering  

Ya this was one of the oldest trick to
hack.. Try to convince your user
that you are a legitimate person
from the system and needs your
password for the continuation of
the service or some maintainence..
This won't work now since most of the users are now aware about the Scam.. But this Social Engginering concept is must for you to have to convince victim for many reasons..!


Fake Messengers

So its a form of phishing in the application format.. getting user, to enter the login info in the software and check your mail..!!!

Cookie Stealer

Here the cookie saved by the sites are taken and decoded and if you get lucky.. You have the
password..!!! Hmmm.. not satisfied with single account at a time..?? so there are ways to hack lots of accounts together.. I know few but there exists many..!! listed are the ones i
know and will teach you in coming posts...


DNS Poisoning or PHARMING

So, phishing is a tough job.. isn't
it..?? convincing someone to enter
their password at your page..??
what if you don't have to
convince..?? what if they are
directed automatically to your site
without having a clue..?? Nice huh..?? Pharming does the same for you.. More about it in my next post..


Whaling

This method gets you the password of the accounts which are used by the hackers to recive the
passwords.. So you just have to hack one ID, which is simplest method( Easy then hacking any
other account, will tell you how in coming posts..) and you will haveloads of passwords and so loads of accounts at your mercy..!!!
Read More

Future Of Computer

Be The First To Comment
I have some ideas how the computer industry will be in next half-a-century, its very difficult to predict anything with vertinity now a days, especially with such advances in technology. Every five years something comes and amaze everyone. Actually thats how it works.... Something new comes in the industry and it owns it. I remember the touch sensitive mobiles were a new thing in 2005 and within half decade the whole scenario is changed, the mobile mogul Nokia is not where found in industry and everyone owns a touch mobile.
Still I would like to share my ideas, how the future will be...
Well one thing I am certain about the PC will be dead. Personal computer is now a secondary device but I see this would be finished in next 50 years. How would it happen? Well the answer is in front of us... Cloud Computing..
The Cloud Computing concept is that instead of a CPU in front of you, there is a very high speed computer somewhere in the world acting as CPU for you. Here the input is entered from your side and that info is sent to the Cloud Computer that process the info and sent the output back to you. This would be perfect as It could save alot of money, as you won't have to buy expensive computer for heavy task like gaming. And within next 2-3 decades the Quantum Computers will be reality that will increase the current chips power by million times.
But the biggest problem in this concept is availability of high speed internet as a large amount of data has to be transferred in very small amount of time, but the good news is that the technology exist at this moment and in time it will be in everyone's reach. The technology used fiber-optics and the good news is Google has already taken initiative with Google Fiber, the chance it before long the whole world will be covered with this and Cloud Computing could become a reality for everyone.
Read More

Monday 24 June 2013

Top 10 Programming Languages In 2014

5 Comments
If you are software engineer, computer programmer or tech savvy so this post worth lot for you, So we have compiled list of best programming languages. This list is very useful especially for those beginners who wants to jump in information technology or computer science field. Newbies always want to get know about that which  programming language is better to learn, have lots of reputation and market demand as well. Considering all important factors including market demand, Language future, functionality and popularity we compiled this list to provide you best information which guides you what to learn that worth.
1. Java Programming language
 

Yes no doubt Java is the Top programming language. Because it have massive developers and over billions of Computers are using Java services. It also have major shares in mobile and Android market which shows clearly that how much future and demand it have.



2. C programming language




C programming language is developed by an American computer scientist name DennisRitchie. Who developed this language for Unix. In my opinion it is mother of programming language because the one if learn this language can easily understand code of any language. The main strength  of this language is speed and weaknesses is difficult to learn and memory management.

3. C++ Programming language
C++ in simple words is the updated version of C programming language. C++ comes with OOP (object oriented programming)  feature which is the main reason of this language to come because C language is lack of this feature. It is developed in 1979 by Bjarne Stroustrup.its strength is same like C its weakness is it is considered clumsy compared to java.


4. Objective C programming language 

Objective C is basically used in development of iPad and iPhone apps. This language is growing massively because Apple devices is becoming more popular and people like to use apple devices which contains IOS. All apps of IOS are programmed in objective C so it have lot of potential and future.

5. PHP programming language


php basically used in web application and web developments projects. It is developed in 1996 byRasmus lerdorf. it is multi-paradigm language use for scripting html and developing major web application. Its best part is that php is mother of web programming and also its good documentation features. The negative part is its syntax errors and security problems.


6. Visual Basic language
Visual Basic is one of the best choice for those who loves to develop apps in windows. It is founded by Microsoft corporation. The best part of this language is that it is easy to use and you can develop any kind of application in it but the weak part is that it only runs in windows.

7. C# or C sharp 

C# is also developed byMicrosoft it is pretty much similar to java because of its nature. It is an open specification programming language but majority of programmer only use this on windows platform. It is not as user friendly as C or C++ are.
Advantages:- It is powerful and very fast as compared to other languages 
Disadvantages:- Runs smoothly only on Windows platform
8. Python
Python is found in 1980 by Guido van Rossum. It if also multi-paradigm, object oriented, highly readable and easily understandable language. Python becomes more popular because of big fishes who love to benefit their organizations from this language like Google and Ubuntu. Its name is not given on the name of snake but it was given after Monty Python comedy group. Advantages:-1.Opensource programming language 2.Easily to understand and ReadDisadvantages:- 1.Documentation problems like php 2.Quite slow
9. JavaScript
 JavaScript was developed in 1995 in the same year that Java is introduced. But the fact is that JavaScript have nothing similar with Java they both are unique languages and have totally different features. JavaScript is also multi-paradigm  and interpreted language. It is scripting language and mostly used to enhance web browsers, It is generally used to validate forms and for styling AJAX (a programming languages) web applications. In upcoming days we will see complex apps which will be develop in this language.

10. Ruby and Perl

Ruby and Perl both takes number ten because we can’t ignore even one of them. They both are great programming languages if we talk about Ruby so it is a major object oriented language and open source as well. It is developed by Yukihiro Matsumoto in 1995. Now its Perl’s turn, Perl is developed by Larry Wall in 1986. It is an interpreted and multi-paradigm language. It is strong in processing and system administration scripting but in my opinion it is not much valuable but still best in some cases. It loses its hold when new languages such as PHP, Ruby and Python introduced. But if learn this language so it benefits you a lot and tells concept about other languages as well.


how u like this information tell me from comments......
Read More

Friday 14 June 2013

How Antivirus Software Works.

Be The First To Comment
Due to ever increasing threat from virus and other malicious programs, almost every computer today comes with a pre-installed antivirus software on it. In fact, an antivirus has become one of the most essential software package for every computer. Even though every one of us have an antivirus software installed on our computers, only a few really bother to understand how it actually works! Well if you are one among those few who would really bother to understand how an antivirus works, then this article is for you.


# How Antivirus Software Works.

An antivirus software typically uses a variety of strategies in detecting and removing viruses, worms and other malware programs. The following are the two most widely employed identification methods:

1. Signature-based dectection (Dictionary approach)

This is the most commonly employed method which involves searching for known patterns of virus within a given file. Every antivirus software will have a dictionary of sample malware codes called signatures in it’s database. Whenever a file is examined, the antivirus refers to the dictionary of sample codes present within it’s database and compares the same with the current file. If the piece of code within the file matches with the one in it’s dictionary then it is flagged and proper action is taken immediately so as to stop the virus from further replicating. The antivirus may choose to repair the file, quarantine or delete it permanently based on it’s potential risk.

As new viruses and malwares are created and released every day, this method of detection cannot defend against new malwares unless their samples are collected and signatures are released by the antivirus software company. Some companies may also encourage the users to upload new viruses or variants, so that the virus can be analyzed and the signature can be added to the dictionary.

Signature based detection can be very effective, but requires frequent updates of the virus signature dictionary. Hence the users must update their antivirus software on a regular basis so as to defend against new threats that are released daily.

2. Heuristic-based detection (Suspicious behaviour approach)

Heuristic-based detection involves identifying suspicious behaviour from any given program which might indicate a potential risk. This approach is used by some of the sophisticated antivirus softwares to identify new malware and variants of known malware. Unlike the signature based approach, here the antivirus doesn’t attempt to identify known viruses, but instead monitors the behavior of all programs.

For example, malicious behaviours like a program trying to write data to an executable program is flagged and the user is alerted about this action. This method of detection gives an additional level of security from unidentified threats.

File emulation: This is another type of heuristic-based approach where a given program is executed in a virtual environment and the actions performed by it are logged. Based on the actions logged, the antivirus software can determine if the program is malicious or not and carry out necessary actions in order to clean the infection.

Most commercial antivirus softwares use a combination of both signature-based and heuristic-based approaches to combat malware.

Issues of concern

Zero-day threats: A zero-day (zero-hour ) threat or attack is where a malware tries to exploit computer application vulnerabilities that are yet unidentified by the antivirus software companies. These attacks are used to cause damage to the computer even before they are identified. Since patches are not yet released for these kind of new threats, they can easily manage to bypass the antivirus software and carry out malicious actions. However most of the threats are identified after a day or two of it’s release, but damage caused by them before identification is quite inevitable.

Daily Updates: Since new viruses and threats are released everyday, it is most essential to update the antivirus software so as to keep the virus definitions up-to-date. Most softwares will have an auto-update feature so that the virus definitions are updated whenever the computer is connected to the Internet.

Effectiveness: Even though an antivirus software can catch almost every malware, it is still not 100% foolproof against all kinds of threats. As explained earlier, a zero-day threat can easily bypass the protective shield of the antivirus software. Also virus authors have tried to stay a step ahead by writing “oligomorphic“, “polymorphic†and, more recently, “metamorphic†virus codes, which will encrypt parts of themselves or otherwise modify themselves as a method of disguise, so as to not match virus signatures in the dictionary.



Thus user education is as important as antivirus software; users must be trained to practice safe surfing habits such as downloading files only from trusted websites and not blindly executing a program that is unknown or obtained from an untrusted source. I hope this article will help you understand the working of an antivirus software.


admin--<>
Read More

Monday 10 June 2013

How To Use Mspy To Monitor Cellphones Remotely

Be The First To Comment
Mspy is currently the best and cheap Cellphone spyware in the market, Unfortunately there is no proper step by step guide on how to use Mspy. So today i will be writing a step by step Guide (in Faq Format ) On How to Use Mspy to monitor Cellphones Remotely


1.What Is a Cellphone Spyware

Cellphone Spyware or keylogger is piece of software, which once installed on a cellphone will record all the phones activity such as calls ,sms ,mms , emails and other such credential data and will send them to the attacker (hacker)

2.Why Mspy

 Mspy is currently the best Cellphone Spyware both in features and in cost , Following are some of the best Features in Mspy
  • SPY on Calls
  • SPY on Sms
  • SPY on Emails
  • Track Gps
  • Remote Control
  • Easy To Install
  • Completely  Undetectable 
  • View All Logs Online
  • Compatible with All SmartPhones (Ios, Android, Blackberry, Symbian , Windows )
and more ...
                                      Mspy - Best CellPhone Spyware
  
3.What are the Uses of  Using Mspy

 Some of the popular uses of Mspy are
  • Monitor your chilidern , Employees
  • Spy on Your Spouse
  • Locate Cellphones via GPS 
 4.How To Get a Copy of Mspy

 You can get a Copy of  Mspy from the following link

                                                            Download Mspy

You can choose the number of months as you wish but best would be to select 3 months

5.How To Install Mspy on a Phone

Once you purchase MSPY, You will receive an e-mail containing a password to your MSPY Control Panel

Step 1. Log into your Control Panel and follow installation instructions given by the wizard.

After logging in, you will see the Wizard asking you to select the OS of the target mobile device and install the surveillance software. The installation takes just a couple of minutes.

Step 2. You'll be shown the combination code by the Wizard.

After installing MSPY, dial the combination code you get from the wizard on the target phone.

Step 3. View the data captured by the software online

If all the settings are configured, you'll be able to view the first logs in a couple of minutes. Congratulations! Now all activities on the target phone are monitored and can be viewed any time in your private MSPY account.

Will MSPY get detected by Av's
Once installed Its impossible for the owner of the target phone to detect the MSPY software Currently  MSPY is not detected by Any Antivirus Software's.


Hope this article helps you, For further doubts and clarifications Please pass your comments


Read More