Sunday, April 18, 2010

Network hacking



Webs’ biggest threat: Botnets

                              By Abir Atarthy


Introduction






Botnets are quickly becoming a growing threat to computer users due to their inconspicuous and diverse methods of taking over computers. Millions of computers around the world are believed to be compromised and the numbers continue to grow. It is important understand this threat and how to avoid it. Are you sure that there is no malicious Bot hiding in your computer??? So carry on with this article to check whether your PC had been infected with Bots.






If you like this article then  please pass your comments. Stay secure and Cheers!
 Q: What's a bot?
A: A bot is a malicious program which has several purposes. 
They are usually told what to do by a botnet admin although many of the features now are automated.



Q: What's a botnet?
A: A botnet is a network of infected computers that all connect to one area where they are commanded by the botnet admin.



Q: What can a bot do?
A: Usual features of a bot include...
  • P2P Spreading (Limewire, uTorrent, etc.)
  • IM Spreading (Sends to contacts on MSN, AIM, etc.)
  • DDoS attacking (See "what's a DDoS attack?")
  • Spam mailing to lists of emails (Often used to spread)
  • Collecting personal information (Passwords, bank details and the like)

Q: How are bots told what to do?
A: Bots are usually commanded through an IRC channel by the user. Commands are built in and the bots listen for them.



Q. Why Bots are used?

A. Bots were originally designed to help transmit spam. Since their creation, they have been modified to engage in illegal activities as well.



Botnets are commonly used for:
  • DDoS (distributed denial of service) attacks
    DDoS attacks attempt to overload a site in order to disrupt business by creating a loss of connectivity or connection bandwidth.Read my previous article "Denial of service attack" for details.
  • Click-fraud
    Certain advertising firms pay website hosts a small fee every time an ad of theirs is clicked on. Some botnets take advantage of this by having computers access the site repeatedly in order to fraudulently obtain payment from the advertiser.
  • Phishing campaigns
    These are used to harvest email addresses. Zombies within a botnet are used to send out spam and
    phishing email in order to collect addresses to add to their spamming lists.
  • Keylogging
    Software is installed that records keyboard activity that is send back to the botnet. Keylogging programs to try to gain your personal information, such as usernames, passwords and credit cards.
  • Host malicious web sites
    Botnets can use home computers to create malicious websites that download malware when accessed.






Q.  How does your computer become a  Bot?
A.  Home computers that have security vulnerabilities are prime targets for botnets. Spammers scan the Internet looking for computers that are unprotected and use these “open-doors” to install malicious software. Another tactic is through phishing or spam emails that contain links or attachments. When clicked-on or opened, malware is then installed on the machine. Furthermore, visiting certain websites can result in malicious software being installed. This malicious software may cause your computer to run slower, your ISP (Internet Service Provider) to shut down your account for spamming, or you becoming a victim of identity theft.



Q.  What are the warning signs?
A. Your computer may be part of a botnet if:



  • Your computer suddenly starts operating slowly or erratically
  • You receive emails accusing you of sending spam
  • You have email messages in your outbox that you didn’t send

Q. How to protect yourself?
A. To prevent your computer from becoming infected:



  • Use up-to-date anti-virus and anti-spyware software
    Look for software that removes viruses and updates itself automatically on a daily basis. Be wary of ads on the Internet offering spyware software, as this might be a ploy to get you to download malicious code.
  • Set your operating system software to download and install security patches automatically
    These security patches released monthly by Microsoft help fix any flaws companies find in their operating system which in turn helps to give your computer the latest protection.
  • Insure that your firewall is turned on
    Firewalls are designed to prevent hackers from accessing your computer by making you invisible on the Internet. They help to block incoming communications from unauthorized sources. Many operating systems like Windows and Mac OS X have built-in firewalls however you may need to check to see if it is enabled. Routers have hardware firewalls. It is especially important to have your firewall enabled if you have a broadband connection because the connection is always open. For more information see
        http://hackingheart.blogspot.com


  • Be cautious about opening any attachments, or downloading any files from emails you receive
    Even if the email is from a friend or co-worker, be careful about what you choose to open since their computer could be compromised. If you send an email attachment, explain in the email what the attachment is.
  • Be careful what you download from the Web
    Only visit sites you trust. It is recommended that you use a web browser that has security features or use a program like 
    SiteAdvisor that checks the status of websites to insure that they are safe to visit and use.

PC Software


  Error Repair Professional 4.1.3
                                                                               
                                   By Abir Atarthy

Almost all  PCs Have Hidden Errors on Them! Let Us Scan Your PC andDiscover How Many Errors Are Lurking Inside It..."
"Eliminate Them Instantly and Have The Peace Of Mind Knowing Your PC is Automatically Kept Error Free, 24 Hours A Day!"




Download :-

VB.Net

Animating your VB.Net Form

                                                By  Tanaya Karmakar

 Here i have written a funny programm that will animate the VB.Net main form. Basically The form will go on increasing in its size.
Create a new form and add two buttons on it. change the caption as Continue and Exit. Clicking on continue will animate the form.
The Form design will look as follows:



The full code will look like as follows. Add it to the programme.

Public Class Form1
Private Sub Button1_Click(ByVal sender As System.Object, ByVal e As System.EventArgs) Handles Button1.Click
Dim h, w As Integer
h = Me.Height
w = Me.Width
Me.BackColor = Drawing.Color.Blue
While (h < 700 And w < 700)
h += 1
Me.Height = h
w += 1
Me.Width = w
End While
End Sub
Private Sub Button2_Click(ByVal sender As System.Object, ByVal e As System.EventArgs) Handles Button2.Click
Me.Close()
End Sub
End Class
 
Now when you run it you will get the output as follows. If you like this programe then don't forget to leave your comments...!







Get hackingheart in your mobile

Hackingheart in your mobile:-
Join our free IT sms group called hackingheart(1000 + members)and get news on latest hapning on IT,useful Softwares,cool,websites, security tricks etc on your mobile.
All r absolutely free!GUARANTEED TO MAKE U ROCK!!!
How to join?
To join the group type in ur mobile 
JOIN hackingheart
and send it to 567678
One time subscription of Rs 2.00 will b deducted for BSNL. Others 
subscriber one time Rs 3 only.
There after no charge/no hidden cost. Just receive absolutely free sms.
If u have any difficulties/queries/doubts then call Abir, at 9434243285

Thursday, April 1, 2010

Windows

Delete Useless DLL Files To Speed Up Computer


By-Rahul Jaiswal •»яנ«•

If you are on any Windows Operating System (Windows XP, Vista or 7) then you can speed up your computer to a considerable extent using this tip – Just delete duplicate and orphaned DLL files.


Whenever you install any software, it intalls some DLL files in your system. When you uninstall the software, some of these DLL files are left behind. These DLL files are known as orphaned DLL files. They are not used by any program but they do hog your memory and hard disk space, making your computer slow.


To remove useless DLL files, you have to download PC Cleaner. Its a free software used to delete temp files. But it can also help in removing useless DLL files from your computer.


Removing Orphaned and Duplicate DLL Files


First download and install PC Cleaner. Then click on Orphan DLLs.



It will scan and display all the orphaned DLLs to you. Now, just delete those DLLs.


Repeat this procedure for duplicate DLLs. Once you get rid of all useless DLL files, you will immediately see a significant improvement in your PC’s performance.


Warning – Before deleting any DLL file, make sure that it is actually not used by any program. You can do this by simple Google search. Deleting a DLL used by any software may make that software useless.

Windows Advantages

Use Bluetooth Proximity To Lock And Unlock Computer

By-Rahul Jaiswal •»яנ«•

Assuming that you are on a Windows based machine, you can always lock your system by pressing Window+L keys. But what if you need to lock your computer from some distance.


Suppose you are out of your office and suddenly remembered that you forgot to lock your machine, what will you do? You will go back to lock it? What if I tell you that you can lock your computer remotely using any bluetooth enabled device.


BtProx (Bluetooth Proximity Lock) is a small software that locks any Windows computer if it gets disconnected from the same. When you come back in the range, the computer is unlocked again.


You can also specify any command that it should run when it locks the computer and when it unlocks the computer.