Wednesday, December 17, 2014

Trojan - The Most Unwanted Thing

Trojan


Trojan is MALWARE program that contains MALICIOUS code. The program that perform malicious activity that is not authorized by the user or victim.

Malware, short for malicious software, is any software used to disrupt computer operation, gather sensitive information, or gain access to private computer systems. 


Malware is defined by its malicious intent, acting against the requirements of the computer user, and does not include software that causes unintentional harm due to some deficiency.

RAT (Remote Administration Tool): 

Remote Administration Tool is used to Trojans. With the help of RAT you can create Trojan easily. It is also used to control Victims PC. RAT is created by the Hackers to help Hackers.
Rat are available for both types of Trojans (Direct Connection, Reverse Connection Trojan). There are numerous RATS available over the internet.



If Trojans gets into your system then it will collect all your personal information without you being aware of it. Trojans are very difficult to remove on your own and slow down your PC. We can say Trojan as a program. This program gets installed in the background while you are doing something else on the internet. Trojans has fairly widespread because of your cable modem or DSL connection is always connected.

With the help of Trojan an attacker can get access to stored password, he can able to read your personal documents stored in your PC, delete files, and he show the images on the screen.

Difference between Virus, Worms and Trojans:




TROJAN: Trojan is a program that once executed performs a task other then expected. 

VIRUS: Virus is an application it self replicates by injecting its code into other data files. Virus spreads and attempts to consume specific targets and are normally executable.

WORMS: Worm copies itself over a network. It is a program that views the infection points of another computer rather than as other executable files on an already infected computer.

Types of Trojans:
1. Direct connection Trojan
2. Reverse connection Trojan

Trojans are transmitted in many ways:
1. Email Attachments
2. Physical Access
3. Software
4. Images
5. Advertisements
6. Fake programs


Trojan Creators looks for:
1. Confidential Documents
2. Credit Card Information
3. Account Data (Email, Password, Username, etc)
4. Financial Data
5. Using Victims PC for illegal purpose.

BEAST:
Beast is a Windows-based backdoor Trojan horse, more commonly known in the underground hacking community as a RAT. It is capable of infecting versions of Windows from 95 to XP.



Beast was one of the first Trojans to feature a reverse connection to its victims, and once established it gave the attacker complete control over the infected computer. Beast came with a built-in firewall by-passer and had the ability of terminating some Anti-Virus or firewall processes. It also came with a binder that could be used to join two or more files together and then change their icon.

It is discontinued in year 2004 and any PC infected by Beast can be easily disinfected by starting windows XP in safe-mode and than removing some infected system files. Also the system restore must be turned off to do this process.

Stay Safe !!!

Saturday, December 6, 2014

TRICK: Create Secret Folder in Windows

TRICK: SECRET FOLDER IN WINDOWS









Hello friends, today we ll show you how to make secret folders in windows PC for your personal use.
These folders are not easily visible to other and only you know it where you had created it.




NOTE: This trick is best suited for making a secret folder on desktop rather in some other place like My Documents or any other drive.

So lets start step wise process for the same.
First you go there where you to have a secret folder and then continue with the following steps:

STEP 1: First create a new folder in simple way as we all do.





STEP 2: Rename it. And when you rename it, don't press any character. Instead, just press and hold the "alt" key and then press number 2 then number 5 and again number 5. The "alt" key must be kept pressed till you press all the numbers one by one (i.e. "alt+255). Then leave the "alt" key and press Enter.





STEP 3: As you can see that you folder now don't have any name, which is not possible by normal space-bar key. Now we had created two more simple folders below the secret folder for your better understanding.





STEP 4: Now open the Properties of your secret folder and go to "Customize" tab. There click the "Choose Icon" button, and from there select any empty space or empty icon as show in image below. After this you will notice that your secret folder now don't have any icon too.






STEP 5: As your folder is still visible, lets make it "Hidden" from the Properties. And it ll go off from the list.





STEP 6: Now final step... To access your folder, just click the address bar, and add a slash and then type the same thing "alt+255", and press Enter. And you are in you secret folder now.





Here, you can notice the difference that before going in our secret folder there was not pointer arrow after "test" in address-bar. But in the last image we can see that there is an arrow, which gives the hint that we are in our secret folder but there is no name.


ALSO NO ONE CAN OPEN THIS FOLDER BY SIMPLE SPACE-BAR KEY.
THIS SECRET FOLDER WILL OPEN BY ALT+255 KEY ONLY.

Enjoy and have fun...!!!

Saturday, November 29, 2014

Get old wifi password by command prompt






The netsh command is used in windows operating system.
By using this command you can get the information of the previously connected Wi-Fi on that particular system.
You can also get the passwords of those old SSID that were connected once.
The following steps are to be followed to get the password:

STEP 1: Go to run with administrative rights.
STEP 2: Type “cmd” and open command prompt.
STEP 3: In command prompt type “netsh” and press enter. You ll come under the “netsh” command prompt.


STEP 4: There type “wlan” and press enter. After this you will go into the “netsh wlan” command prompt.


STEP 5: Now to view all SSID list of previously connected wifi type
“show profile”
and it will display the whole list.


STEP 6: Now to know the key of a particular SSID then type 

show profile name=”<SSID name>” key=clear
 
Here, the “key=clear” command will force the command to display the key.


 STEP 7: To exit, directly close the command prompt or type exit.

Wednesday, November 26, 2014

Vitrual Keyboard

A Virtual Keyboard is a software component that allows a user to enter characters. A virtual keyboard can usually be operated with multiple input devices, which may include a touchscreen, an actual computer keyboard and a computer mouse.



On a desktop PC, one purpose of a virtual keyboard is to provide an alternative input mechanism for users with disabilities who cannot use, or do not have access to a physical keyboard. This is the basic thing.

Virtual keyboards can be categorized by the following aspects:
1. Physical keyboards with distinct keys comprising electronically changeable displays integrated in the keypads
2. Virtual keyboards with touchscreen keyboard layouts or sensing areas
3. Optically projected keyboard layouts or similar arrangements of "keys" or sensing areas
4. Optically detected human hand and finger motions
5. Virtual keyboards to allow input from a variety of input devices, such as a computer mouse, switch or other assistive technology device.

An optical virtual keyboard was invented and patented by IBM engineers in 2008. It optically detects and analyses human hand and finger motions and interprets them as operations on a physically non-existent input device like a surface having painted keys. In that way it allows to emulate unlimited types of manually operated input devices such as a mouse or keyboard. All mechanical input units can be replaced by such virtual devices, optimized for the current application and for the user's physiology maintaining speed, simplicity and unambiguity of manual data input.


VIRTUAL KEYBOARDS is a keyboard used as a most secure keyboard till now. This keyboard works virtually it is a on screen keyboard. Most of the bank prefer Virtual keyboard because if your system is infected some types of Trojans or key logger etc. so this will help you to protect from it. If you use virtual keyboard the keys which you pressed is not monitored or saved in key loggers.

Virtual keyboards may be used in some cases to reduce the risk of keystroke logging. For example, Westpac’s online banking service uses a virtual keyboard for the password entry, as does TreasuryDirect. It is more difficult for malware to monitor the display and mouse to obtain the data entered via the virtual keyboard, than it is to monitor real keystrokes. However it is possible, for example by recording screenshots at regular intervals or upon each mouse click.

This keyboard are very useful for everyone. We suggest to use this type of keyboard for doing secure login and signup or online transactions, etc.