Friday, November 5, 2010

Awesome Free Anti-Virus Scanning Websites

    It’s highly likely that you’ve had some sort of experience with a computer virus in the past. If not, then lucky you – but you can never be too safe, especially if you’re running Windows
     Online free anti virus scan apps have been around for a while, and whilst they’re no match for standalone software they certainly have their uses. Perhaps you’re on an unfamiliar PC that’s acting a little strange? Or maybe your existing software has been disabled, and you’ve frantically restarted in Safe Mode looking for a solution.
     Below you will find 4 websites to check and verify that your PC is virus free, and 3 to upload and check individual files to help prevent an outbreak. Let the scanning begin!

Note : To view the corresponding web sites click on the names of sites. 

 free anti virus scan


     This free scanner will work in all major browsers, and requires a quick addon to be installed before you can scan. Simply visit the site, click Scan Now, agree to the installation and accept the EULA.

     Your PC will then be scanned in record time to let you know whether or not you’ve got any nasty viruses, trojans or other malware hiding in your PC’s memory. It won’t scan your whole hard drive, but if your PC is acting up and you suspect malicious software is to blame, QuickScan should find it.

     Unfortunately ActiveScan will only work with Internet Explorer or Firefox, although Panda recommends you install the IE Tab Classic extension for compatability if you’re running Chrome.

     For a quick scan of running processes choose Quick Scan or if you’d prefer to delve a little deeper you can opt for a Full Scan. Once you’ve chosen click Scan now and you’ll be prompted to download either an extension (if you’re running Firefox) or an ActiveX control (if Internet Explorer’s your thing).

     The scanner will update its definitions and then run the scan of your choice before delivering the good or bad news.

TrendMicro Housecall

 free online virus scan


     Housecall is completely browser independent, which means you can access it from any web browser. It achieves this by packaging the scanner into a small executable file which when run scans your PC for any signs of malware.

     There are two versions to choose from – 32bit and 64bit – and you should make your choice based on your operating system. In case you’re wondering what version you’re running, open Control Panel in your Start menu and choose System. Once you’ve downloaded the file, run it and the definitions will be updated for you.

     After you’ve accepted the EULA click Scan Now to see what’s lurking on your PC.

F-Secure Online Scanner

 

free online virus scan

     Utilising the Java platform to check your PC for nasties, F-Secure should run in any browser provided you’ve got Java installed and JavaScript enabled. To launch the scanner you must accept the license terms by checking the box and then click Run Check.
     You’ll need to authorise the Java applet to run before the scanner will launch in a separate window. You’re then free to choose between Quick Scan, Full Scan and a customized My Scan (where you choose which bits of your hard drive to check).
     Once you’ve chosen the scanner will update its definitions (it’ll take a few minutes, but stick with it) and your PC will be checked for problems. 

 

Individual File Scanners

VirScan

 free virus scan

    The VirScan service allows you to upload a file (up to 20MB) and check it against more than 30 other sets of definitions from the web’s finest anti-virus solutions.

   You can upload .ZIP and .RAR files with a maximum of 20 compressed items, and even give the archive a password of “infected” or “virus”. Simply click Choose File followed by Upload and your file will be scanned, showing you the results in your browser. 

 

VirusTotal

 free virus scan

    With support for both file upload and URL checking VirusTotal is a popular online virus scanner (so check the server load before you submit). Not only can you upload via the web form on the homepage, but you can email your files (again, 20MB maximum filesize) to scan@virustotal.com with “SCAN” in the subject field.

    You will then receive your results via email once your scan has been complete. Much like VirScan, VirusTotal uses a database of definitions assembled from all over the web.

 

Jotti

 free anti virus scan

    Operating much in the same way as the previous two engines, Jotti allows you to upload a file of 20MB or less for submission to a selection of the web’s anti-virus engines.

You should know the drill by now – click Choose File and then Submit file to receive your results.

Thanks for reading my post if it's useful please post comments.

Thursday, October 21, 2010

Email Protection..

To Find Unauthorized Activity On Your Email Account


           Do you suspect that your email account is under attack? Do you want to maintain total security of your email account and make it 100% hack proof? Well, Some times our email account might have got hacked and we may not be aware of that. We may believe that our email account is safe, but in reality our private and confidential information may be falling into the hands of a third person.


Some signs of  unauthorized activity on an email account.

1. Your new emails are marked as Read even if you’ve not read them.
2. Your emails are moved to Trash or even permanently deleted without your notice.

3. Your emails are being forwarded to a third party email address (check your settings ->forwarding).
4. Your secondary email address is changed.

If you come across any of the above activities on your email account, then it is a clear indication that your email account is hacked.

Security Features in Gmail 


          Gmail provides an additional security feature to protect your email account through the means of IP address logging. That is, Gmail records your IP address every time you login to your Gmail account. So, if a third party gets access to your account then even his/her IP is also recorded. To see a list of recorded IP address, scroll down to the bottom of your Gmail account and you’ll see something like this.


Gmail - Last account activity

      You can see from the above figure that Gmail shows the IP address of last login (last account activity). You can click on Details to see the IP address of your last 5 activities. If you find that the IP listed in the logs doesn’t belong to you, then you can suspect unauthorized activity.


Steps to be carried out to stop unauthorized activity on your email account
       If you feel/suspect that your account is hacked then you must immediately take the actions mentioned below

1. Change your Password
2. Change your security question.
3. Remove any third party email address (if any) to which your account is set to forward emails.
4. Make sure that you can access the email account of your secondary email address.
5. Also change you secondary email password and security question



       This ensures that your account is safe from future attacks. But I strongly recommend that you read the following post to protect your email account from being hacked.

How To Protect An Email Account From Being Hacked 

        Today in this post I’ll teach you how to protect your email account from being hacked. Nowadays I get a lot of emails where most of the people say “My Email account is hacked please help…”. Now one question which arises in our mind is: “Is it so easy to hack an email account? OR Is it so difficult to protect an email account from being hacked?”. The single answer to these two questions is “Absolutely NOT!”. It is neither easy to hack an email nor difficult to protect an email account from bieng hacked.


If this is the case, then what is the reason for many people to lose their accounts?

         The answer is very simple. They don’t know how to protect themselves from being hacked! In fact most of the people who lose their email accounts are not the victims of hacking but the victims of Trapping. They lose their passwords not because they are hacked by some expert hackers but they are fooled to such an extent that they themselves give away their password.

         Are you confused? If so continue reading and you’ll come to know…

         Now I’ll mention some of the most commonly used online scams which fool people and make them lose their passwords. I’ll also mention how to protect your email account from these scams.

1. Website Spoofing.

      Website spoofing is the act of creating a website, with the intention of misleading the readers. The website will be created by a different person or organisation (Other than the original) especially for the purposes of cheating. Normally, the website will adopt the design of the target website and sometimes has a similar URL.

      For example a Spoofed Website of Yahoo.com appears exactly same as Yahoo Website. So most of the people believe that it is the original site and lose their passwords. The main intention of spoofed websites is to fool users and take away their passwords. For this,the spoofed sites offer fake login pages. These fake login pages resemble the original login pages of sites like Yahoo,Gmail,Orkut etc. Since it resemble’s the original login page people beleive that it is true and give away their username and passwords by trying to login to their accounts.
Solution:
  • Never try to login/access your email account from the sites other than the original site.
  • Always type the URL of the site in the address bar to get into the site. Never click on the hyperlink to enter the site.
2. By Using Key-loggers

         The other commonly used method to steal password is by using a Keylogger. A Keylogger is nothing but a spyware. The detailed description of keylogger and it’s usage is discussed in the post Hacking an email account. If you read this post you’ll come to know that it is too easy to steal the password using a keylogger program. If you just access your email account from a computer installed with keylogger, you definitely lose your password. This is because the keylogger records each and every keystroke that you type.

Solution:

         Protecting yourselves from a keylogger scam is very easy.Just install a good anti-spyware program and update it regularly. This keeps your PC secure from a keylogger. Also there is a program called Anti-keylogger which is specially designed to detect and remove keyloggers. You can use this program to detect some stealth keyloggers which remain undetected by many anti-spyware programs.

3. Accessing your account from cyber cafe's.

          Do you access your email from cyber cafes?  Then definitely you are under the risk of loosing your password.In fact many people lose their email account in cyber cafes. For the owner of the cyber cafe it’s just a cakewalk to steal your password. For this he just need’s to install a keylogger on his computers. So when you login to your email account from this PC, you give away your password to the cafe owner. Also there are many Remote Administration Tools (RATs) which can be used to monitor your browsing activities in real time.

          This doesn’t mean that you should never use cyber cafes for browsing the internet. I know, not all the cyber cafe owners will be so wicked but it is recommended not to use cafes for accessing confidential information. If it comes to the matter of security never trust anyone, not even your friend. I always use my own PC to login to my accounts to ensure safety.

Thanks for reading my post if it's useful please post comments.

Tuesday, October 5, 2010

Tips For Safe Surfing

BROWSER : Mozilla Firefox (Highly Secured Browser)                       

                     The Web is all about innovation, and Firefox sets the pace with dozens of new features to deliver a faster, more secure and customizable Web browsing experience for all.
  • Performance. Firefox is built on top of the powerful new Gecko platform, resulting in a safer, easier to use and more personal product.
  • Security. Firefox raises the bar for security. The new malware and phishing protection helps protect from viruses, worms, trojans and spyware to keep people safe on the Web.
  • Customization. Everyone uses the Web differently, and Firefox lets users customize their browser with more than 5,000 add-ons.   

To Download : http://www.filehippo.com/download_firefox/

Note : click images to view in large size

Open Comparison of browsers:

Addons for Safe surfing :

1.WOT - Safe Browsing Tool : 

              Would you like to know which websites you can trust? The WOT add-on is a safe surfing tool for your browser. Traffic-light rating symbols show which websites you can trust when you search, shop and surf on the Web. 

To Download : https://addons.mozilla.org/en-US/firefox/addon/3456/

Samples :

2.KeyScrambler Personal
          KeyScrambler Personal encrypts your keystrokes at the kernel driver level to protect your information from keyloggers.

Samples :
3.FoxyProxy Standard (Hide's our IP)

              A proxy server is a server (a computer system or an application program) that acts as an intermediary for requests from clients seeking resources from other servers. A client connects to the proxy server, requesting some service, such as a file, connection, web page, or other resource, available from a different server. The proxy server evaluates the request according to its filtering rules. For example, it may filter traffic by IP address or protocol. 



           FoxProxy is an advanced proxy management tool that completely replaces Firefox's limited proxying capabilities. It offers more features than SwitchProxy, ProxyButton, QuickProxy, xyzproxy, ProxyTex, TorButton, etc. 

To Download :https://addons.mozilla.org/en-US/firefox/addon/2464/

After installation we have to restart firefox then we have to configure proxy server as shown in the below:

               First we have to find a proxy IP address which act as a duplicate instead of our IP . For that we have to go : http://www.samair.ru/proxy/proxy-01.htm .From this website select the proxy IP address and Proxy Port number and make a note on it.


Then locate the fox proxy icon at right bottom of the firefox browser as shown below.
After a click a default window will opens. In that window click Add New Proxy button.


After that a settings window will opens there enter the proxy IP (duplicate ip) and port number which is obtained from that website.Then click ok
After configuration a confirmation message will displayed.click ok.
After a successful configuration make a right click on the fox proxy icon and select the configured proxy server . As shown in the below.
Now check it out your original IP will hided and your duplicate proxy IP will displayed every where.


By those powerful addons we can surf securely from hackers....................

Have a happy hacking.................................


Thanks for reading my post if it's useful please post comments.

Sunday, September 26, 2010

StegoStick - Best Steganography Tool

StegoStick is a stenography tool that Hides any kind of file inside any BMP, JPEG, Gif image files, WAV Audio, AVI/MPEG Video or any Binary File and gives "Steg" as Output File containing hidden file.

But in the past  stenography session we use "S-tools"  tool which hides only text(.txt) file inside only(.bmp) file format but i designed this StegoStick to hide any format file inside any format file

 


ADVANTAGES

  • Supported for all format of files.
  • (NO DATA LOSS) THERE WILL NOT BE ANY PERCEPTIBLE DISTORTION IN THE CARRIER FILE AFTER HIDING.YOUR FILE WILL SEEM EXACTLY AS THE ORIGINAL, so it's  almost impossible to detect hidden data.
  • Platform independent.
  • Contains various Encryption algorithms.
To Download : http://mcaf.ee/35427

TO HIDE A FILE:

After downloading we have to open StegoStic.jar file from downloaded folder.Then select Hiding tab in the window displayed as shown below

Note : click images to view in large size
Then choose the Algorithm which is used to hide files or select default option and then click ok.
Then browse for the file which is to be hide .
In this demo i am going to hide a (.rar) file inside a (.mp4) file. So i select "pwaste.rar" file to hide.
Then Browse for the cover which act as a cover for the file to be hide.
As i told in the previous step my cover file is an (.mp4) file.So i select "NenjeNenjeBRRip]- Uyirvani.com.mp4".
Note : Memory of cover file must larger than the secrete file.

Then Browse for the output folder where output file in the name "steg" is to be create.
Then the password which is used to encrypt and decrypt the file to be hide.Then clock ok.
After a successful process a confirmation msg will show the status.

Finally the "pwaste.rar" hide inside "NenjeNenje[BRRip]-Uyirvani.com.mp4" and the final ouput as "steg.mp4" as shown below.

TO UN-HIDE A FILE

Run the same "StegoStick.jar" file and select "UnHiding" tab then select decryption algorithm which is used to encrypt the file .Then click ok
Then browse for the cover file which contains hidden file.
Select the output folder.

Then enter the password which is used to encrypt the hidden file.

After successful decryption a confirmation status message will displays.
Finally the original file will extracts like shown in the below.
ANALYSIS RESULT


No Memory Loss:
No Data Loss.


Hide your data protect form third parties................
Have a happy hacking..................




Thanks for reading my post if it's useful please post comments.

Saturday, September 25, 2010

General Windows 7 Shortcuts

Shortcut               Description

Win + UP Arrow    Maximize the current window
Win + Down Arrow    Restore down or minimize current windows
Win + Left Arrow     Dock the current window to the left half of the screen
Win + Right Arrrow     Dock the current window to the right half of the screen
Win + [number]     Activate and run the program pinned on Windows 7 Taskbar, running program wont be affected
Win + Home     Minimize all but the current window
Win + Space     Makes all windows transparent so you can see through to the desktop
Win + Pause/Break     Open System Properties
Win + Tab     Flip Aero 3D [press Tab to cycle between Windows]
Win + B     Move focus to notification tray (the right-most portion of the taskbar)
Win + D     Show/Hide desktop
Win + E     Windows Explorer is launched
Win + F     Search
Win + G     Bring all gadgets on top and foreground
Win + L     Lock Computer
Win + M     Minimize all windows
Win + P     Open the projection menu (generally used for laptops connected to projectors)
Win + R     Run Command is launched.
Win + S     OneNote Screen Clipping Tool
Win + T     Show preview thumbnail of running applications in Windows Taskbar one by one without mouse over
Win + X     Mobility Center
Win + #     Quicklaunch
Win + =     Magnifier
Win + [+/-]     Enables the magnifier and zooms in/out
Win + Shift + Up Arrow     Maximize vertical size
Win + Shift + Down Arrow     Restore vertical size
Win + Shift + Left Arrow     Jump to left monitor
Win + Shift + Right Arrow     Jump to right monitor
Win + Shift + M     Undo all window minimization
Win + Shift + T     Cycles backwards
Win + Ctrl + F     Opens the Active Directory Find Computers dialog
Ctrl + Right Arrow     Move the cursor to the beginning of the next word
Ctrl + Left Arrow     Move the cursor to the beginning of the previous word
Ctrl + Up Arrow     Move the cursor to the beginning of the previous paragraph
Ctrl + Down Arrow     Move the cursor to the beginning of the next paragraph
Ctrl + Click     A pinned taskbar icon to cycle through the program’s open windows (e.g. IE)
Ctrl + Win + Tab     Persistent flip 3D
Ctrl + Shift with an arrow key     Select a block of text
Ctrl with any arrow key + Spacebar     Select multiple individual items in a window or on the desktop
Ctrl + Shift + Esc     Open Task Manager directly
Ctrl + Shift + N     Create new folder