Showing posts with label Internet Security. Show all posts
Showing posts with label Internet Security. Show all posts

Live Chat is Available on DefenceHacker.in


We have launched a chat on our website for Readers. The Live Chat is available For 365 days online. To start a conversation with our Readers support, 

Simply go to   and click on button Online on the right side of the page. We will do  best to help you as soon as possible.
Thank You.

Yours Hacker Friend,
Parth Patel
(Defence Hacker)

Anonymous Web Surfing Tools

anonymous_mask110825163504.jpg (652×381)



HideMyAss
Tor
Download #Tor from https://www.torproject.org/
Guardster
Check out Guardster # http://www.guardster.com/
MegaProxy
Fsurf
Checkout Fsurf # http://www.fsurf.com/
Privoxy
You can download Privoxy from https://sourceforge.net/projects/ijbswa/files/

Online Anonymous proxy
Checkout Online Anonymous Proxy # http://zend2.com/
TryCatchMe
Checkout TryCatchMe # http://www.trycatchme.com/
Heeky
Checkout Heeky # http://www.heeky.com/
Web4Proxy
Checkout Web4Proxy # http://www.web4proxy.com/

Coming Soon - "Defence Hacker - The Book"























Go this link 1st of you like our fan page then wall post with your details(name-country-email address) 
I will mail you books price list..

And email me with your detail - defencehacker.in@gmail.com

OR Comment here your feedback...



Free Premium Accounts For All The Popular Sites




     If you are looking for premium accounts like hotfile, rapidshare, megaupload, mediafire, filesonic, fileserve and more, and still can't find a working one than this is a right place for you.


    If you like having premium features like instant download no time limit but you cannot find a premium account and you are using a link generator than you will not have a hassle to download copy and paste links but direct downloads. 



    I would be happy to provide username and password here, don’t worry about passwords not working because all the password and usernames are updated daily. All the usernames we provide are the latest. So, what are you waiting for, you are just a one click away from premium accounts you choose. We update the premium account everybody crawling over the internet so you don't have to. So, just get it for free.


   You can use the premium accounts to download everything you want from all over the internet, like the mp3 music, the latest movies, games, e-book, whatever and get all you want as a premium download, so you can save your time and money.


(Click on Image to visit site)





How to Stay Anonymous on the Internet Using Tor ?

Why you should hide yourself?
Internet is risky place to surf, here your privacy is not secure as you think.  Others can track what you are searching or what is your interest(Based on that , scammers can scam you).  Some websites store your real IP. An attacker can get the IP from the website by attacking that website.  Using your IP , he can take control of your System(using Open Port).  Two weeks back, we explained about the Facebook Privacy Ris.  If you want to secure your privacy, this article will help you. 

What is Tor and Usage?
Tor is a network of virtual tunnels that allows people and groups to improve their privacy and security on the Internet. It also enables software developers to create new communication tools with built-in privacy features. Tor provides the foundation for a range of applications that allow organizations and individuals to share information over public networks without compromising their privacy.

For Individual: They use Tor to keep websites from tracking them and their family members, or to connect to news sites, instant messaging services, or the like when these are blocked by their local Internet providers. Tor's hidden services let users publish web sites and other services without needing to reveal the location of the site. Individuals also use Tor for socially sensitive communication: chat rooms and web forums for rape and abuse survivors, or people with illnesses.

For Journalists: They use Tor to communicate more safely with whistleblowers and dissidents. Non-governmental organizations (NGOs) use Tor to allow their workers to connect to their home website while they're in a foreign country, without notifying everybody nearby that they're working with that organization.

For Groups such as Indymedia recommend Tor for safeguarding their members' online privacy and security. Activist groups like the Electronic Frontier Foundation (EFF) recommend Tor as a mechanism for maintaining civil liberties online. Corporations use Tor as a safe way to conduct competitive analysis, and to protect sensitive procurement patterns from eavesdroppers. They also use it to replace traditional VPNs, which reveal the exact amount and timing of communication. Which locations have employees working late? Which locations have employees consulting job-hunting websites? Which research divisions are communicating with the company's patent lawyers?

A branch of the U.S. Navy uses Tor for open source intelligence gathering, and one of its teams used Tor while deployed in the Middle East recently. Law enforcement uses Tor for visiting or surveilling web sites without leaving government IP addresses in their web logs, and for security during sting operations.

What is Computer/Browser Cookies? - Use of Cookies


What is Cookies? 

HTTP cookie or Browser Cookie are used to store the information about the visitors. Also cookies used to store the Login informations(username ,passwords). It will be useful to track visitors wish so that display the related info or ads.

Different Types of Cookies:

Session cookie
A session cookie upto certain hours,depending on website.  After the session hour, it will be destroyed.


Persistent Cookie
A persistent cookie will outlast user sessions. If a persistent cookie has its Max-Age set to 1 year, then, within the year, the initial value set in that cookie would be sent back to the server every time the user visited the server. This could be used to record a vital piece of information such as how the user initially came to this website. For this reason, persistent cookies are also called tracking cookies or in-memory cookies.

Secure cookie
Secure cookies are encrypted cookies. If you used HTTPS(secure Connection), then it will store the cookies in encrypted format. Even hackers steal the cookie, he is able to see only the encrypted data.
Example:
Bank websites always use Secure Cookies.

HttpOnly cookie
The HttpOnly cookie is supported by most modern browsers. On a supported browser, an HttpOnly session cookie will be used only when transmitting HTTP (or HTTPS) requests, thus restricting access from other, non-HTTP APIs (such as JavaScript). This restriction mitigates but does not eliminate the threat of session cookie theft via Cross-site scripting.[15]. It is important to realize this feature applies only to session-management cookies, and not other browser cookies.

Third-party cookie
Third-party cookies will store the cookies with another domain.
For Example:
www.example.com will store the cookies with ad.advertise12.com
At the same time, another website also set cookies with same domain.
www.othersite.com will store the cookies with ad.advertise12.com

Supercookie
A "supercookie" is a cookie with a public suffix domain, like .com, .co.in,.in.

Most browsers, by default, allow first-party cookies—a cookie with domain to be the same or sub-domain of the requesting host. For example, a user visiting www.example.com can have a cookie set with domain www.example.com or .example.com, but not .com. A supercookie with domain .com would be blocked by browsers; otherwise, a malicious website, like attacker.com, could set a supercookie with domain .com and potentially disrupt or impersonate legitimate user requests to example.com.

Zombie cookie
A zombie cookie is any cookie that is automatically recreated after a user has deleted it. This is accomplished by a script storing the content of the cookie in some other locations, such as the local storage available to Flash content, HTML5 storages and other client side mechanisms, and then recreating the cookie from backup stores when the cookie's absence is detected.

What is the use of Cookies?

Session management
Cookies may be used to maintain data related to the user during navigation, possibly across multiple visits. Cookies were introduced to provide a way to implement a "shopping cart" (or "shopping basket"), a virtual device into which users can store items they want to purchase as they navigate throughout the site.

Personalization
Cookies may be used to remember the information about the user who has visited a website in order to show relevant content in the future. For example a web server may send a cookie containing the username last used to log in to a web site so that it may be filled in for future visits.

Tracking
Tracking cookies may be used to track internet users' web browsing habits. This can also be done in part by using the IP address of the computer requesting the page or the referrer field of the HTTP request header, but cookies allow for greater precision. This can be demonstrated as follows:

Check Who is Accessing your Wireless Connection

Using a good password for your Wireless Network does not necessarily mean that it will prevent others from hacking into it and using your Wireless Connection. Other people using your Wireless Connection can hog your Bandwidth and leave you with a very slow Internet Connection.If you have any doubts on whether or not your Wireless Connection is being accessed by someone else without your knowledge then you can check  out now by using a free tool-Wireless Network Watcher. This software allows you to scan your network to find who is using your network. You can also export the results and save then as .xml, .txt and a couple other formats for future use. This software is tested and working in 32 and 64 bit versions of Windows 7, Windows Vista etc.

Without further waiting lets move on to how to use the free tool:
wireless image Check Who is Accessing your Wireless Connection
  • Using Wireless Network Watcher is pretty much straight forward and simplistic. First download the file from here. It is a small file just around 250 KB. After downloading the tool extract it then run it.
  • It will scan your Network quickly and display the results. The results will display the IP Address, MAC Address and the device’s Name and Manufacturer.If you want to save the results just select all the results and click on “Save selected Items” button.
  • This would help you quickly note down the culprit who has gained access to your wireless network unauthorized.