Guys today I thought to post some different but much crucial
thing in my blog. Here I would like to give you some guidelines to protect from
hacking threats and other internet related security threats. Because now actually we spend half of our life time with internet so it’s better to
have some knowledge on Hacking and other security issues that we have to face
within our routine internet life. The content
that I shared here, I got through practicing as a little punk but not as a
great hacker or a victim of a hacker.
Before learning the strategies to avoid from hacking you
should have at least basic understanding on hacking methods. So here I would like
to give you the basic understanding on hacking methods which are widely use to
hack social network profiles and emails.(
Can you guys remember we learnt some of these things in our 1st year 2nd
semester? There were few interesting areas like Vandalism, Phishing, Internet
profiling, etc.)
Phishing
Phishing is the most widely using method to hack email
accounts and social profiles. It’s an easy method to implement so the numbers
of phishing victims are damn high. If you want hack some ones account using
phishing method you have to follow few steps. First you should save the clone
page of the email account index or social network page index. Here I take Facebook
as an example. So the first thing
you should do is log on to fb and save
the index page as html file. Secondly
you have to do some alteration to this saved web index’s html script in order
to save the victim’s password and user name on your hosting account (if you
want to find that alteration Google it or you can find already altered indexes
for the phishing purpose) thirdly crate
a hosting account you can create a free hosting account (E.g-100mb.com, 000.com).
Then upload your EDITED FB INDEX file to this hosting website, and finally you can send this fake index
link to your victim’s email or fb inbox by fabricating a cunning story in order
to make them log in through that fake link. (But the browser address bar will
indicate the original URL) so if that person has little bit knowledge on these
thing you will be never able to hack that account.
Guidelines for avoid from Phishing
- Don’t click on the suspicious links that come through anonymous mails or direct messages
- Always look at the address bar on your web browser and make sure that you are log in to the original web page. (fake hostings are easily identifiable)
- Set shttp settings for your web browser and profiles
- Install a proper internet security software
Key loggers
Key loggers are in
two forms as internal key loggers and remote key loggers. Both the key loggers
record your all key strokes (what you type on your computer) but you may never
see those key loggers are running. Those are hidden applications. ACTUAL SPY is
a good example for an internal key logger. If you want to take some ones
details you can simply install this to your computer and hide then allow
someone to log in internet via your computer. Remote key loggers are installed
secretly in your computer without your consent. But your all keystrokes are
recorded in some remote location (hacker’s computer) via Internet.
Guidelines for avoid from Key loggers
- Don’t use suspicious computers to browse internet
- If you’re log in from internet café check the task manager and see in applications and process. Check whether any suspicious program is running.
- Guys be careful if you log in to the internet by using your office computer there can be monitoring systems to record your all browsing activities I am sure the prestigious organization that you work will not do these things but if you network administrator want it he can easily hack you with his office network privileges.
- Use personal devices to browse the internet much as possible.
- Install a proper internet security system and update it.
Spy ware
Spy wares are
harmful programs that secretly installed in your computer and work as a spy.
All the activities that you do with your computer will be recorded in some
other location through the spy ware. These programs are automatically come with
some programs and landing on your hard disk without your approval.
Guidelines for avoid from spy ware
- Don’t install suspicious softwares to your computer
- Install and update an internet security program to block spyware and other malicious programs.
Other major
guidelines for avoid from hacking threats
- Be careful when using FIREFOX browser because if you tick the remember the password tab the password and user name can be easily obtain through security options of the browser.
- Always remember to sign out your log ins (especially when you log in through lab , internet café or a someone’s computer)
- Use proper security questions to secure your social network profiles and email accounts.
- Don’t use simple passwords, always make password with a mix of letters and numbers.
- Don’t save your security details like passwords and usernames inside your mobile phone.
I think above explanations are
good enough to being avoid from hacking. So now hacking is an Illegal thing
even in Sri Lanka. Some laws have been imposed very recently. But hackers are
still there so be careful. My personal advice is don’t hack others. And don’t
be a victim as well. After being hacked your entire life will be adversely
affected. Finally one of Sri Lankan celebrities after being hacked behave like
this lol
after being hacked the
best thing to do is not threatening the hacker inform it to relevant
authorities .