Pages

 

Tuesday, 14 August 2012

How to Recover Your Gmail Account?

0 comments



Now a days, hacking gmail account is increasing.  Most of people doesn't know how to be secure(because they doesn't visit BreakTheSecurity).  So please refer our website to your friends as Security tips Blog. Ok let me come to the point.  In this article, i will explain how to recover your hacked or compromised gmail accounts.

First of all verify yourself whether your entering the correct password. Also check whether the caps lock is turned on. 

How to Recover Your Gmail Account?
If you believe your account is hacked, then visit click the Can't access your account? link below the signin button in gmail.



Enter the Email address . it might ask for CAPTCHA ,fill it and continue.

option 1: If you have secondary email address, select secondary mail and ask to send the password to your secondary mail address. 

option 2:  Answer to your security question and change the password

option 3: if you have added mobile number in your account. then you can recover through mobile.

Contact Gmail:
If the above option doesn't work for you? then you have to contact the gmail.


Visit
https://www.google.com/support/accounts/bin/request.py?ara=1

It will ask whether the password recovery option worked or not. Click "No" button.  It will ask you to enter the information about your email account.  Fill everything. They will ask to enter the email to contact you, enter the alternative email address that you have.(if that also hacked, then create new account and enter it).



Submit the form. 
They will contact you soon.


FAQ About Account Recovery

Q. Why can't I tell someone private information about my account that they could look up to verify my claim?
A. Account privacy rules are very strict within Google, and allowing employees to look at the contents of an account would be a serious breach of privacy.

Q. Why isn't there a comments section on the Account Recovery Form where I could add additional information to prove my claim?
A. Like above, it would be a violation of account privacy for an employee to look in the account to verify any additional information supplied.

Q. Why can't I simply talk to somebody about this?
A. Unfortunately, Google does not offer live support for the free Gmail product (see: http://mail.google.com/support/bin/request.py?contact_type=contact_policy). You must use the recovery methods provided.

Q. Why can't Google lock the account to protect it from any more damage or outgoing spam.
A. They will lock an account that the detection system identifies as being compromised and sending out spam. But again, privacy concerns would prevent them from simply locking an account because someone claims it's theirs and is compromised. In addition, since there is no live support, there is no one to even make such a request to.

Q. I had a really long password of random strings that would be impossible to guess. How was my account compromised?
A. Google (as most e-mail providers) have blocks to prevent trying lots of passwords to guess the correct one (brute-force attacks). Most accounts are compromised by harvesting passwords other ways. While a secure password is important, it's only one in a long list of things needed to keep any online account secure.

Q. But I'm very careful with my password. I don't give it to anyone except an official request from Gmail.
A. Unfortunately if you provided your password in response to any e-mail (even claiming to be from Google/Gmail) then your password was harvested by phishing. It's very common, and can trick even the most careful people.

Q. My contacts were deleted by the hacker, how do I recover them?
A. Deleted contacts can now be restored to any point in the last thirty-days: http://mail.google.com/support/bin/answer.py?hl=en&answer=1069522

Q. My e-mail history was deleted by the hacker, how do I recover it?
A. Have you looked in All Mail and Trash for the missing information? Have you used Search to try and find it? Unfortunately, messages deleted from Trash or Spam can not be recovered. If you would like to request Google attempt to recovery messages deleted by a hacker, see: http://mail.google.com/support/bin/answer.py?hl=en&answer=8256

Q. My account was deleted by the hacker, can I recover it?
A. The Account Recovery Form can sometimes restore a recently deleted account. That is your only option in this case.

Q. I don't care about the account, can I just get the e-mail history or the contacts from it.
A. Unfortunately, you have to be able to access the account in order to transfer any information out of it. This means you need to try and recover the account.

Q. I don’t care about the contents, I just need the e-mail address back because I have other things linked to that address.
A. Account names are never re-used, so you can’t re-create the account. So to get the name back you will have to try and recover the account.

Q. Can I find out who did this? Can anyone prosecute them?
A. About the only information you have available is the list of the last 10 IPs to access your account (see the Details link below the Inbox). But given how easy it is to fake IPs, and how inaccurate they are, it's unlikely that more than a general location can be determined. In general, law enforcement is not interested in a simple compromised account, and Google is not a law enforcement agency. Bottom line is: one's energy is better spent on recovery and re-securing the account.

Q. Isn't what the person did illegal? Can I sue them or get them arrested?
A. Any legal questions should be asked of local law enforcement or an attorney. Google is neither of those and can not advise you on any actions.

Q. Can I find out what they did in my account while they had access.
A. There are no account activity logs available, so you can’t find out for sure. If there is spam in your Sent Mail, they you know they used the account for that. But there’s no way to know if or what messages they may have looked at, so take appropriate precautions.

Q. How was my account compromised?
A. There are many ways passwords can be harvested and account compromised, but the most common ones include:
  • Using the same password on multiple web-sites. A less secure site is hacked and they get the user database (e-mail and password) and then just try them all. If the person did not use a unique password, the hacker gains access to the e-mail account.
  • Phishing e-mails that ask for account information or direct you to a phishing web-site. Don't dismiss this because the messages are a lot more convincing that you would imagine, often using text copied from actual Google e-mails or on-line forms.
  • Use of a computer that is infected with a key-logger or other malware (most common for public computers like at a school or library) which records your login information.

When you reclaim Your Account:

Begin by scrolling to the bottom of your Gmail page and see if there are any other sessions signed into your account ("This account is open in 1 other location"). Then click the word "Details" where it says "Last account activity" and then "Sign out all other sessions". Now change your password to anything reasonable but without worrying too much about how secure because you are going to change it again. Next check all the following items and verify that they are set correctly.

Note: in the following “Settings” means “Mail settings” as found under the Gear icon in the upper/right of the Gmail window. If you still have the old layout, then “Settings” will be one of the choices along the top. If you have the older “Settings” link, some of the paths below will be slightly different.


Account Security:
  • Settings -> Accounts and Import -> Change Account Settings -> Change Password [pick a new secure password]
  • Settings -> Accounts and Import -> Change Account Settings -> Change password recovery options [verify secret question, SMS and recovery e-mail address]
  • Settings -> Accounts and Import -> Change Account Settings -> Other Google account settings -> Email Address -> Edit [verify your name and other settings]
  • Settings -> Accounts and Import -> Change Account Settings -> Other Google account settings -> Authorizing applications & sites [revoke Access to any sites listed]
  • Settings -> Accounts and Import -> Change Account Settings -> Other Google account settings -> Using 2-step verification [enable 2-step verification]

Potential Spam:
  • Settings -> General -> Signature [make sure nothing as been added]
  • Settings -> General -> Vacation Responder [make sure it's disabled and empty]

E-mail Theft
  • Settings -> Forwarding and POP/IMAP -> POP Download [disabled]
  • Settings -> Forwarding and POP/IMAP -> IMAP Access [disabled]
  • Settings -> Forwarding and POP/IMAP -> Forwarding [disabled or correct address]
  • Settings -> Filters [no filters that forward or delete e-mail]
  • Settings -> Accounts and Import -> Send Mail As [make sure it is using your correct e-mail address, delete any unrecognized entries]
Read more...

Monday, 13 August 2012

5 Basic Mobile Security Tips to avoid Dangerous Application

0 comments


Now a days, attackers targets smart phones rather than the Desktop.  The number of malware application for mobile is increasing.  Infected mobile can be used to steal confidential data or  send out expensive text messages without a user’s consent.


Some Top tricks used by attackers:

    Malicious apps are usually offered for free and being disguised as fun applications such as games, calendar and comedy apps.
    Download the legitimate application off of one marketplace, insert malware into it and then re-publish it on other marketplaces or sites with a similar name.

In order to stay away from these type of risky application, McAfee released 5 basic Mobile Security Tips.

1.For the moment, the amount of detected smartphone malware is relatively low compared to malware that targets desktop or laptop PCs; but being aware that it exists is the first step toward protecting yourself and your data.
    2.Research apps and their publishers thoroughly and check the ratings – better to install apps that are broadly used in the market or are recommended by your circle of friends and colleagues.
    3.It is wise to purchase from a well-known, reputable app marketplace, such as Google’s Android Market or Apple’s App Store. One way for Android users to avoid installation of non-market applications is to de-select the “Unknown sources” option in the Applications Settings menu on their device. If the option is not listed, it means your mobile service provider has already done this for you.
    4.When you install an app, you’ll see a list of permissions for services that are granted access to the hardware and software components on your device, like contacts, camera and location. If something in the permissions screen doesn’t look right, don’t install that app! For example, a game or alarm clock app probably doesn’t need to access your contacts or have the ability to transmit that data from your device.
  5.  Install antivirus software on your phone. It is a good idea to install an antivirus program when you get a new mobile device before you add any other apps.
Read more...

7 Things You Should Know About Online Passwords

0 comments

As online technology has advanced, so have hackers techniques for getting into your accounts and stealing personal information. Hackers break into computers 2,244 times each day by figuring out weak usernames or passwords, according to University of Maryland data. If you’re still using the same password you made up when you opened your first email account, you are setting yourself up to be a hacking victim. But don’t worry; read on and learn how to set those Internet geniuses-gone-wrong up for failure by knowing the essentials about online passwords.




1.You need different passwords for each site

Since passwords are so hard to remember and you sometimes don’t sign into a site for months, many people have one or two passwords they use for everything. This is an easy way for hackers to get access to your accounts. Hackers will infiltrate sites that aren’t very secure and uncover the passwords used there. Then they run them on all the most popular sites; if you use the same password across the board, they can easily access several of your accounts. By using a different one for each site you log into, you’re not handing them your life if they figure out one password.

2.Longer passwords are harder to hack

It obviously takes less time to type in a five-character password than a 15-character one, but that also means it will take less time for an Internet burglar to figure out. Most of us probably don’t have the interest or the determination to break into someone’s account, so it’s hard to imagine going through enough combinations to find out a five-letter password. Hackers have advanced programs, though, that allow their computers to go through hundreds of possibilities every minute. Each letter, number, or symbol you add to your passwords multiplies the time it takes to figure it out, hopefully frustrating the hacker enough that he gives up. A six-letter password that’s all lower-case takes 10 minutes to hack while an eight-letter one takes four days.

3.You shouldn’t use a word from the dictionary
A dictionary attack sounds like something an overworked English teacher would do, but it’s actually a method of hacking passwords. Many hackers use automated password-guessers that go through the words in the dictionary to try to crack yours. If you’ve used any common words, there’s a good chance that a person equipped with the right tools will be able to break into your account very quickly. By combining two or three dictionary words, you increase the amount of time it will take to guess it exponentially. By adding symbols and numbers in the middle of words, you protect yourself almost completely from a dictionary attack.

4.Humans tend to choose passwords with personal meanings

Because we as humans are so forgetful, our first instinct when choosing a password is to think of words that mean something to us personally. This makes our choices very predictable to hackers. Pet names, favorite sports teams, birthdays, and other personal bits of information are some of the most commonly used passwords, so if anyone knows even a little bit about you (or can find it on Facebook), you could be in trouble. Stay away from using your own name, names of people in your family, or any memorable dates. It should go without saying that you shouldn’t be using “123456″ or “qwerty.”

5.Passwords need to be changed regularly

Some offices and organizations require you to change your password every 90 or 180 days, and while it seems like a hassle, it’s actually a smart practice to do with all your accounts. This is especially important to do with online banking sites or shopping sites where your credit card information might be stored. It’s also necessary if you access any accounts on public or shared computers because your password may be stored without you knowing it and some hackers use programs that record your keystrokes. By regularly changing your password to something completely different, you lower the risk of any major damage being done if someone did manage to hack your account.

6.There are guidelines for creating strong ones

Now that you know you shouldn’t use common words or your dog’s name to access your online accounts, you might wonder what you should use instead. Most Internet security experts recommend having a password that’s at least 8 characters long with a mix of capitalized and lower-case letters, numbers, and symbols. A common technique for avoiding easily guessed words is to put three unrelated words together and make up a short story that involves all three so you can remember it. You can also use the first letter of each word in your favorite line of a song or movie. Change out a couple letters for numbers or special characters, and your password should be too much trouble for a hacker to figure out.

7.Password managers can help you keep track of them all

Once you’ve updated all your passwords to long strings of letters and digits, you’re probably going to forget one along the way. Security experts say it’s a bad idea to write down a list of all your passwords and leave it on or near your computer because someone could easily steal it. The smartest alternative is to use a trusted password manager, which can be web-based technology, software you put on your computer, or a portable device. Password managers keep track of your various passwords and often protect against keystroke recording programs and look-alike sites that hackers use
Read more...

How to protect your cloud storage from hacking?

0 comments

The concept of cloud storage has become more common these days especially when offered commercially since it's more cost effective for a large corporation to store data on an off-site data center. It is cheaper and they don't have to worry about finding space for storing data on server which can be the size of a warehouse. However, at individual level, it is preferred less over local storage devices like flash drive, hard drive and disk drive.


What is cloud storage?
To talk about the security level of cloud storage, we'll first have to talk about what cloud storage is. Cloud storage is an off-site data warehouse where data is transferred and stored. It can be accessed anywhere in the world provided an Internet access is available. You can store virtually anything in a cloud storage model. I say virtually, because you are transferring it over the Internet on a web-based interface or Application Programming Interface (API) so it makes it seem like it is stored virtually.

Audio, video, documents, and any other forms of data that you can think of can be stored on a cloud storage location. You also have the option of choosing to share files with others. Saving messages or draft on your email is actually a type of cloud storage. However, to store data on it, you'll have to pay according to the storage capacity and other factors as imposed by cloud storage companies.

Hacking and Security Issues


Hackers don't need to visit your house or office and use your computer to access data. They do it over the Internet through various means like email, attachments in downloads, and so on. Since cloud storage is the process of transferring, storing, and sharing data on a remote data center over the Internet, people question its integrity and security.

To figure out the level of security cloud storage provides; we first need to ask ourselves how we actually get hacked. A hacker simply cannot access my system without a medium of connecting my computer to theirs and the medium usually is the Internet. But if all the right measures are taken, then the risk of being hacked becomes close to none. Securing your system, having a good and updated anti-virus, using strong passwords that are not common like your name, date of birth, not opening attachments and emails of unknown senders, and so much more will keep your data safe. The same applies for cloud storage.

Just because you transfer your data over the Internet to a third party server doesn't mean the chances of your data getting hacked is relatively high. Making sure that the cloud storage data center is secure will assure you that your data won't get stolen. Find out about the measures cloud storage companies are taking to protect data. Ask what level of encryption and firewalls they are using and how safe is the process of data transfer from and to the data center before you start storing data onto their servers.

Hacking normally happens not because of the shortcomings of systems but rather because of human operators. Not taking proper measures like downloading free software or anything that is free, using an outdated antivirus and a weak or common password are generally the reasons you get hacked. So, it is through the user that a hacker can gain access to the system.

To ensure that your data is protected, make sure you've done all of the following:

• Use a strong password.
A strong password contains a combination of symbols, numbers, special characters like _, $ and so on. It should be a combination of uppercase and lowercase letters. Make sure you change your password periodically too - weekly, monthly or quarterly.

• Update your Anti-Virus
An outdated antivirus can pretty much be used to clean your garage. There are new viruses, Trojans, Worms, Botnets etc. so make sure your antivirus is updated.

• Do not accept malicious email.
Do not open emails and file attachments and spam from unknown senders.

• Avoid connecting an unsecure WiFi.

• Avoid freeware.
Do not download freeware unless you are absolutely sure of it. Make sure that the website is trustworthy before downloading anything. Hackers attach worms, viruses onto files that look and work normally.

• Do not share your password.
You have a password so that no one else can access your system. If you are going around telling people your password, then it's better not to have one instead.

• Set your cloud storage data sharing permission
Make sure you know whether you have opted to keep your stored data private or if you are sharing them with others.

• Find out about the company whose cloud storage service you'll be paying for
Store your data only on data centers of companies which uses an effective encryption when transferring data to and from your system and the data center itself. Know all about the security measures taken by the company to ensure your data is secure as well.
Read more...

Thursday, 9 August 2012

10 Awesome New Features of Windows 8

0 comments

Windows 8 has taken the world by storm! In the recently conducted MWC (mobile world congress) 2012 Microsoft released its much awaited WINDOWS 8 operating system. This new operating system by Microsoft is different in many ways from the already successful WINDOWS 7. It runs best on tablet devices because of its inclusion of touchscreen technology. Windows is completely redesigned, and with it, interoperability between mobile devices and desktops is closer to reality.
Though the WINDOWS 8 is not yet available as a whole, its consumer preview is available for download from the Microsoft website.
With WINDOWS 8 comes a complete change in the way we operate our computers! 10 of the best new features offered by Windows 8 are enlisted here:-

1) METRO STYLE: Windows 8 features an extensively redesigned “Metro-style” user interface, optimized for touchscreens as well as mice and keyboards. A new “Start screen”, similar to the one in Windows phone 7 includes live application tiles. The start screen replaces the Start menu, being triggered by the Start button or Windows key, and is also the first screen shown on start up. The user can go to the regular desktop, which is treated as a Metro app with its own “Desktop” tile on the Start screen. Starting a traditional desktop-based application also switches to the desktop. The Start screen also displays the user’s name and picture.
METRO STYLE 200x112 10 Awesome New Features of Windows 8
2) USB 3.0 SUPPORT: Windows 8 has USB 3.0 support which is 10 times faster than the older version USB 2.0. It comes outfitted with native USB 3.0 drivers.
usb 3 200x164 10 Awesome New Features of Windows 8

3) INTERNET EXPLORER 10: IE 10 is fast, fluid, and tons of fun in Metro. It is designed to offer faster browsing through greater hardware acceleration, along with rapid gesture-based zoom, pan, and Web site navigation.
IE 10 200x200 10 Awesome New Features of Windows 8
4) CHARMS: In large part, ‘charms’ is a new implementation of the traditional Windows start bar. Charms can also be used to quickly configure settings for individual apps. On an ordinary non-touch PC, charms are accessed by dragging the mouse to the bottom-left corner of the screen, to the same spot as the old Windows start button.
On a tablet, swipe from the right side of the screen to bring up charms.
CHARMS 10 Awesome New Features of Windows 8

5) MULTI TASKING: Multitasking in WINDOWS 8 is called “snap multitasking”. “Snap multitasking” is designed to make it easy to run two apps in Windows 8 side-by-side, to resize them, and to switch between them. On the right-hand side of the screen, you can snap an app into place.You can make an app smaller or larger by dragging the bar for the app. To switch between apps in Windows 8, you swipe from the left-hand part of the screen.

6) WINDOWS STORE: Microsoft has confirmed the introduction of a Windows Store on Windows 8, similar to the Ubuntu Software Center and Mac App Store, that allows developers to publish their Metro-style applications on Windows 8 devices. The Windows Store will also allow developers to publish their Win32 or “traditional desktop” applications, however, the store will only provide links to the application on their website.
STORE LOGO 200x142 10 Awesome New Features of Windows 8
7) SUPPORT FOR X86 PCs AND TABLETS: Windows 8 is the first edition of Windows to operate on both ARM-based tablets and traditional x86 PCs based on ARM processors from Intel and AMD.Support for ARM-based chipsets, touch, and sensors makes Windows 8 work beautifully on your choice of a full spectrum of devices, such as 10-inch slates with all-day battery life, ultra-lightweight laptops, and powerful all-in-ones with 27-inch high-definition screens.
8 ) WINDOWS TO GO: Windows to go is an upcoming Windows 8 feature that will allow users to create a bootable USB Flash drive (usually called a Live USB) with Windows 8 in it, including the user’s programs, settings, and files. In addition to that, the system will freeze if the USB drive is removed, and will continue to operate if the USB drive is inserted in the next 60 seconds after removal.

9) TASK MANAGER: The task manager has been remade, redone and rethought altogether. It is now displayed as a heatmap, making it easy to identify resource-gobbling applications or processes. There’s also an incredibly useful App History Tab, which exposes the apps that have been downloading the most data over your wireless network – which could potentially be a huge cash saver if you’re paying for data by the MB on a 3G connection.
task 200x146 10 Awesome New Features of Windows 8
10) CLOUD SYNCHRONISATION: The extensive cloud based functions in Windows 8 will allow you to backup your files and folders into the cloud. Thus you can access these from the internet being in any corner of the world. Also you have option to access these files and folders stored in the cloud through your Windows phone 7, which means, you can carry your world with you wherever you go. Your computer account can also be linked to your Windows Live account opening many new possibilities like the Android and iOS do. Also, Windows 8 can be put on a stick with a feature called “portable workspaces”.

So start downloading Windows 8 consumer preview and experience a whole new world!
You’ll surely not regret the change.

Read more...

Wednesday, 8 August 2012

Fb Symbols

0 comments


Complete list of special and rare facebook symbols:

Special faces facebook symbols

facebook symbols face 01: 
facebook symbols face 02: 
facebook symbols face 03:
facebook symbols face 04:【ツ】

Heart symbols on facebook: 

❤ ❥ ♡ ♥ ღ ɞ 

Facebook Flowers Symbol:

❀ ✿ ❁ ✾ ✽ ❃ ❋

Facebook Butterfly Symbols:

Butterfly symbol 01: Ƹ̴Ӂ̴Ʒ

Butterfly symbol 02: ƸӜƷ 

Butterfly style 03εїз 

Facebook Music Symbols:

♪ ♫ ♩ ♬ ♭ ♮ ♯

Stars facebook symbols

★ ✩ ✮ ✯ ✰ ☆ ⋆ ╰☆╮✡ ۞
  
Snowflake facebook symbols: 

❇ ❈ ❅ ❄ ❆

Religion & belief facebook symbols

☯  ✞ ☥ ☦ ☧ ☩ ☪ ☫ ☬ ☭ 


Peace facebook symbols: ✌☮


Facebook Poker Symbols:

Poker black:   ♥ ♦ ♣ ♠

Poker White: ♡ ♢ ♤ ♧

Zodiac symbols for facebook 

 – Aries (The Ram)
♉ – Taurus (The bull)
 – Gemini (The Twins)
 – Cancer (The Crab)
 – Leo (The Lion)
 – Virgo (The Virgin)
 – Libra (The Scales)
 – Scorpio (The Scorpion)
 – Sagittarius (Centaur The Archer)
♑ – Capricorn (Goat-horned, The sea goat)
 – Aquarius (The water bearer)
 – Pisces (The fish)

Chess black facebook symbols : 

♚ ♛ ♜ ♝ ♞ ♟

Chess White Facebook Symbols: 

♔ ♕ ♖ ♗ ♘ ♙ 

Crosses facebook symbols:

☩ ☨ ☦ ✙ ✚ ✛ ✜ ✝ ✞ ✠


Moon symbols  ☾ ☽

Sun symbols☼ ☀

Cloud and umbrella  ☁ ☂  

Snowman: ☃

Comet: ☄

Apple symbol for facebook: Ѽ  

Risk radioactive and biological: ☢ ☣ 

Check symbol for facebook 

Hands pointing

☚ ☛ ☜ ☝ ☞ ☟ 

Writing Symbols

✉ ✍ ✎ ✏ ✐✑✒ 


Scissors symbols:   ✂ ✄ 

Phones symbols:  ☎ ☏ ✆

Clocks:⌛ ⌚ 

Airplane facebook symbol:  ✈

Dinner: 
Skull symbol: 

Decorative symbols: ๑ ۩ ۞ 


Numeric facebook symbols:

①②③④⑤⑥⑦⑧⑨⑩ ⑪⑫⑬⑭⑮⑯⑰⑱⑲⑳

Letters:

ⒶⒷⒸⒹⒺⒻ ⒼⒽⒾⒿⓀⓁ ⓂⓃⓄⓅⓆⓇ ⓈⓉⓊⓋⓌⓍ ⓎⓏ
ⓐⓑⓓⓔⓕ ⓖⓗⓘⓙⓚⓛ ⓜⓝⓞⓟⓠⓡ ⓢⓣⓤⓥⓦⓧⓨⓩ
you can write your own words, for example:!! 


Facebook symbols = Ⓕⓚ 


Oriental symbols:

㊊㊐㊋㊌㊍㊎㊏ ㊐㊑㊒㊓㊔㊕㊖㊗ ㊀㊁㊂㊃㊄㊅㊆ ㊇㊈㊉

Some facebook symbols may not appear (showing up as squares, or ?) if the user doesn't have all the fonts required installed.
Read more...