Showing posts with label Secrets. Show all posts
Showing posts with label Secrets. Show all posts

Monday, January 06, 2014

HOW TO BLOCK MAILS FROM A SENDER


Blocking a Sender

                  Some e-mail providers have a system to block or blacklist specific senders. In most cases it's simply an easy-to-use front-end to a filter system: you provide an e-mail address and it builds a filter for you to auto-delete any messages from that sender. The exact same form of blocking is available in Gmail* except that you explicitly create the filter, which of course allows you more control over how it works and what it does with the messages. The down-side is it take more effort than just entering an e-mail address in some field.

Typically you will simply want to delete the messages. But there may be a case where there is some personal or legal reason you need to save these "blocked" messages. In such a situation you might label the messages, archive them (so they are not in the Inbox), and mark them as read. This is an example of why having full control over the filter is important.

So to create a simple blocking filter, do the following:
  1. Go to Settings -> Filters
  2. Click the "Create a new filter" link towards the bottom of the page.
  3. Enter the sender's e-mail address in the From field
  4. Click the "Create filter with this search" link.
  5. Check the box for "Delete it".

and you have same optional steps in this are as,
  1. [optimal] Check the box for "Skip the Inbox (Archive it)".
  2. [optinal] Check the box for "Apply the label" and select one from the drop-down list.
  3. Check the box for "Send canned response" and select one from the drop-down list.
  4. [optional] Check the box for "Mark as read".

Note 1. and this is important, you can not check the box to delete the message because the system will not send a canned response for a deleted message.

Note 2. the optional steps are basically to keep these messages out of your Inbox by placing them in a label of your choice. You can then decide to save them if needed, or every so often go and delete all the messages in that label.

Clearly this system isn't perfect. The biggest problem being that you can't delete the message and also send the canned response. Still, it's a reasonable work-around given that Gmail doesn't have the ability to bounce a messages. And it will satisfy the needs some users have to block a sender with a message so they know they are blocked.

Of course, as already mentioned, it may not fool a more knowledgeable e-mail user. But what can they do about it? If they send a message saying "I know it's fake" all they'll get is another failure report.


Summary

It's unfortunate that there are reasons why one may want or need to block a sender from e-mailing to your account. But fortunately Gmail provides the tools to keep such messages out of your Inbox. It may take some self-control to not look at them in Trash if the content may be disturbing. But they can be deleted permanently without opening.

And the workaround for simulating a bounced error return is pretty easy to setup and use. It should work for most cases, and help provide one a level of protection from unwanted contact.






Sunday, December 09, 2012

Encryption Is Not the Answer to Security Problems


I just read Cyber Fail: Why can't the government keep hackers out? Because the public is afraid of letting it, an article in the new Foreign Policy National Security channel. I've Tweeted on Mr Arquilla's articles before, but this new one published today offers a solution to security problems that just won't work.Consider these excerpts:

Back in President Bill Clinton's first term, the "clipper chip" concept was all about improving the security of private communications. Americans were to enjoy the routine ability to send strongly encoded messages to each other that criminals and snoops would not be able to hack, making cyberspace a lot safer.

I see two errors in this section. First, having lived through that time, and having read Steven Levy's excellent book Crypto: How the Code Rebels Beat the Government Saving Privacy in the Digital Age, I disagree with Mr Arquilla's statement. The Clipper Chip was the government's last attempt to keep tight control of encryption, not "improve the security of private communications."

Second, Mr Arquilla implies that encryption = "making cyberspace a lot safer." That fallacy appears later in the article.
Sadly, industry leaders have never emphasized the value of strong crypto sufficiently either. There are many reasons for this neglect -- the most likely being that encouraging ubiquitous use of strong crypto could weaken sales of the firewalls and anti-viral products that form so much of the cybersecurity business model.

Here is my key issue with this article. An enterprise could encrypt every single piece of information at rest or in transit, andintruders would still win.
The fundamental reality of cryptography in the enterprise is that users and applications must be able to access data in unencrypted form in order to use it.

In other words, if a user can access data, so can an intruder.
Cryptography certainly frustrates some bad guys, such as amateurs who eavesdrop on encrypted communications, or thieves who swipe mobile devices, or intruders who remove encrypted files without bothering to obtain the material necessary to decrypt it.
However, cryptography will not stop your Web app from suffering SQL injection, nor will it keep Java from being exploited by a client-side attack.
The article concludes in part by saying:

But ways ahead do exist. There is a regulatory role: to mandate better security from the chip-level out -- something that Sen. Joseph Lieberman's Cybersecurity Act would only have made voluntary.

This sounds like an advertisement for a chip maker. I've heard their lobbyists use the same terms on Capitol Hill. "Mandating security" at the "chip level" would be as effective as FISMA -- a waste of time.
Mr Arquilla does make a few points I agree with, such as:

[W]e should treat cybersecurity as a foreign-policy issue, not just a domestic one. For if countries, and even some networks, can find a way to agree to norms that discourage cyberwar-making against civilian infrastructure -- much as the many countries that can make chemical and biological weapons have signed conventions against doing so -- then it is just possible that the brave new virtual world will be a little less conflict prone.

However, do not be fooled into thinking that encryption is the answer to our security problems.


Friday, November 09, 2012

How to login without password windows xp/7


Logon to any password protected Windows machine without knowing the password


Today we will show you proof of concept on how you can log on to any password protected Windows machine, without knowing the password at all. I am sure you have heard of utilities which will "reset" or "recover the Windows login password for you, but this is way cooler than that, this utility will not write or reset anything to the hard drive. After you are done, on the next reboot the machine will retain its original password. There is no "reset" or lengthy recovery involved. The 5 step process is so easy that after you have seen this, you will be shaking your head
We are going to demonstrate this process on a Windows XP service pack 3 machine, but the process is essentially exactly the same for other versions of Windows such as Windows 7, Vista, Windows Server 2003 or even Windows 2000 workstation and server.
Most of the magic will be done by a nifty utility from Kryptos logic called Kon-Boot, which you can download from its web page located athttp://www.piotrbania.com/all/kon-boot/. This same utility can also be used to log on to Linux systems, but that is outside the scope of this article, we will concentrate only on Windows.
You will need to download the .iso file from the Kon-Boot website and burn it to a CD. If you need instructions on how to burn a CD from an iso image using a free tool, you can read up on it on our article here. Next, make sure that the BIOS is set to boot from the CD drive. With the CD in the drive, boot the machine
Step1:
- After the machine boots from the CD, you will see the splash screen as shown on the left hand side. Simply hit enter to continue

Step 2:
- After hitting enter in the previous step, you will find this second splash screen. This is important as as soon as you hit enter on this screen, you will be taken to the next step, which is booting Windows, there are no other steps to configure here. In a few minutes, the normal Windows boot menu will appear, just proceed as you normally do in your normal logon sequence to Windows

Step 3:
- On Windows Logon screen, fill in the name of the user whom you want to log on as, leave the password blank and hit enter

Step 4:
- Olla! you are logged in! and what's the coolest thing, you have not reset the password for the account at all. It simply let you in because it interacted with the kernel directly using Linux. No alteration was done to any hard drive content at all during the process of logging in.

Step 5:
- Remove the CD from the drive, and reboot. Your machine will now present you the normal ctrl+alt+del screen like it always use to, try logging on with the username we tried before with the blank password! The blank password will not work, you can only get in if you knew what the right password was..this demonstrates that the user password was never reset, it still is what it use to be.

As you can see that this nifty little cd can be of many uses, you do not need to reinstall or repair Windows if you have forgotten your password. If you are locked out, you can use this to log in as well. It also brings raises a question on Windows security. Once again, this method is exceptionally fast and does not actually reset the password. If you have for some reason the need to "recover" and "reveal" a user's password, you can use the tutorial I wrote earlier here and it will actually show you what the password is.
If the method I described above, is being used to gain unauthorized access to then there are really only two ways of protecting against such an intrusion:
1. Block Physical access to the machine or prevent users from hooking in USB devices or booting from CD ROMs and floppies
2. Encrypt your sensitive data. We will cover a step by step article on how to use encryption to protect your data in a forthcoming article
Hopefully this has been informative for you. If you have any further questions, please do leave us a comment or contact us through the Contact Us link on this web site.


You might also like:

HackingWindows Xp

Download youtube videos without any sofware


Wednesday, November 07, 2012

Make your computer talk what you type



              This is very good and interesting javascript trick which let your computer speaks whatever you type. There is no requirement of any software. Just follow belowsimple steps.

  • First open Notepad and copy below codes
     Dim message, sapi
      message=InputBox("What do you want me to say?","COOL HACKING TRICKS")
     Set sapi=CreateObject("sapi.spvoice")
     sapi.Speak message
  • Now save the notepad file as talk.vbs
  • Now close the notepad file and open it again.
  • Done !!!

Enable Registry Editor disabled by Admin




  • What is Registry ?
        Windows registry is hierarchical database that stores configuration setting and option on microsoft windows operating system.It contains settings for low level operating system component as well as applications running on windows.
        Registry is also called as Brain of Windows which store all information in form ofregistry keys Technically known as DWORD or STRING or BINARY or MULTI_STRING values which stores data.



  • How to enable Registry Editor disabled by Admin ?
         1. Open Notepad and copy below codes.

 REGEDIT4
 [HKEY_CURRENT_USER\Software\Microsoft\Windows\CurrentVersion\Policies\System]
 "DisableRegistryTools"=dword:00000000

         2. Now save the file as anything.reg (.reg is must)
         3. Double click the save file.
         4. Done !!



Download youtube videos without any sofware




                    This is simple trick which will allow you to download youtube videoswithout any software and in different formats such as mpeg4, 3gp, hd and many more.

  • First Go to Youtube webpage.

  • Then go to video you want to download.


  • Now add save before youtube and press enter.

  • Now you will be redirected to a new page from where you can download videoin any format of your choice

       NOTE: In place of save you can also use kick



How to view saved password in google chrome ?





Previously i had showed you how to view password behind asterisk. In this post i will show you a simple but very powerfull trick  to view or hack saved password in googlechrome. It does not  matter for which website the password is saved it will work on all of them. It will work on Facebook, Gmail, Yahoo, twitter and many more. If you get your hands on your friend computer  you can hack their password with this simple little trick. It does not require any software or addons to be installed on your computer. Lets get started.

How to do that ?


1. Open any website where password is saved by user. Here i will demonstrate with facebook but it will work on any website.
2. Right click on password(Dots or asterisks) as shown in below image.
3.Then click on Inspect element.

4.Then change Password to text as shown in below picture.

  • Before changing it will look like below:


  •  After changing it will look like below:


5. Done now asterisk or dots will changed to text. Still confused or did not got any steps then watch video below but make sure to watch it in high defination. If you like it then like the video.

Still confused watch the video below






You might also like:


Restrict access to USB drives

Tuesday, November 06, 2012

How to make IDM as full version






IDM is a download accelator. By using this software we are able download from the Internet at a high speed.But when we are downloading the software from its official site it is not a full version. That is a 30 day trial pack. After these days are past it will ask you to enter serial key or to buy. So here is the process to make any downloaded IDM full version.After making this it will be registered for lifetime and not ask to register it further.


Download Link: http://www.internetdownloadmanager.com/download.html


Also See: How to increase the speed of torrent Download without using any 3rd Party Software

Process:


1.Install the latest version of IDM.


2. If you like your installed version of IDM very much. Then don't update it or change it to latest version.


3. Now click on "registration" on the menu bar.


4. When you click on registration, Now a new window Will be open ask your First Name, Last Name, Email Address and Serial Key


5. Enter your First name, Last Name, Email address in the required field.


6. In the serial key field enter any of the following given below

     RLDGN-OV9WU-5W589-6VZH1
     HUDWE-UO689-6D27B-YM28M
     UK3DV-E0MNW-MLQYX-GENA1
     398ND-QNAGY-CMMZU-ZPI39
     GZLJY-X50S3-0S20D-NFRF9
     W3J5U-8U66N-D0B9M-54SLM
     EC0Q6-QN7UH-5S3JB-YZMEK
     UVQW0-X54FE-QW35Q-SNZF5
     FJJTJ-J0FLF-QCVBK-A287M

    And click on ok to register.


7. After you click OK, it will show an error message that you have registered IDM using fake serial key and IDM will exit. 

Now the actual hacking process starts:

8. First of all go to "C:/" drive then go to "Windows" Folder and then go to "System32" folder and then go to "Drivers" folder and then go to "Etc" Folder.
    Path is: C:\Windows\System32\drivers\etc
    or Simply copy C:\Windows\System32\drivers\etc paste this (without quotes) in the address bar and hit enter. It will open the required folder.


9.in the Etc folder you will see the "hosts" file. Open the file with notepad.
Now copy the below lines of code and add to hosts file as shown below the image box :


127.0.0.1 tonec.com
127.0.0.1 www.tonec.com
127.0.0.1 registeridm.com
127.0.0.1 www.registeridm.com
127.0.0.1 secure.registeridm.com
127.0.0.1 internetdownloadmanager.com
127.0.0.1 www.internetdownloadmanager.com
127.0.0.1 secure.internetdownloadmanager.com
127.0.0.1 mirror.internetdownloadmanager.com
127.0.0.1 mirror2.internetdownloadmanager.com
10. After adding these codes, save the notepad file. And exit from there.

Now again repeat the 3rd step to 6th step.
Reboot or restart your PC. After restart Now open your IDM it will be full version and not ask you to register.

Also See: 
How to download a You tube Video
NOTE:
In windows vista and seven  we are not able to save the "hosts" file  due to security resion. For that first of all we have to take the ownership of the file to our logged user.So here is the process how to do so. [
How to add a local user to take ownership of the file]