Posts

Image
How to fix Windows 10 taskbar  While Microsoft has been working on Windows 10, this taskbar was offered with plenty of attention and indeed it appeared to be the humblest one in the whole lot. Of course, the taskbar involved some really new options that were too useful to the users, but along with that, it also brought in some errors that were frustrating. With these new options, the mistakes were consequently brought into the fold. Before we move on to guide you regarding the prospects of fixing the common issues of the taskbar and how you can help your taskbar work again, it is essential that you learn about the features and all other important things that are new to this Windows 10 taskbar. Undoubtedly, it has got some awesome functionality but at the same time, it also includes some downside as well. With the advent of Windows 10, there are certainly some modifications to the taskbar. Before we proceed further in this piece of article, I would like to guide you so that...

This child has Cancer , Will You not pray for her! 1 Share = 1 Pray, Now read the Post You will never gonna do that...!

Image
The Actual Meaning of " This child has Cancer , Will You not pray for her! 1 Share = 1 Pray. " Now a days we start our days with Facebook and WhatssApp , In the whole day we must see a post like  Post copy and paste status updates This is  XXX Temple/Masjid . Please share it now you will get a good news by today Evening. This child has Cancer , Will You not pray for her! 1 Share = 1 Pray. This Child is found in XXX Village and he is crying , So Please share this post that his Parents can find him easily . This Child has cancer so if you Share this post his family will get 1 RS per share . This is XXX Good, Please share this otherwise you will get a bad news within 1 days.* Can You remember this posts?   Do you know how much it is spreading terrorism in India?            The terrorists Spread there news by Sharing this type of post. If a terrorist communicate with his gang member by phone calls/Email/Private...

Learn About Email Spoofing

Image
Email Spoofing:-    Email spoofing basically comes down to sending emails with a false sender address. This can be used in various ways by threat actors. Obviously pretending to be someone else can have its advantages especially if that someone else holds a position of power or trust with regards to the  receiver. Why spoof the sender address? Although most well-known for phishing purposes, there are actually several reasons for spoofing sender addresses: Hiding your true identity, although if this is the only goal it can be achieved easier by registering anonymous mail addresses. Easy to rotate. If you are spamming, you are bound to be blacklisted quickly. If you’re able to switch sender addresses, who cares? Pretending to be someone the receiver knows. This can be used to ask for sensitive information or just plain orders to transfer funds . Pretending to be from an organization the receiver has a relationship with. Phishing attempts to get hold of ban...

How to Secure Your Internet Banking

Image
How to Secure Your Internet Banking ATM Card fraud has more than doubled over the last two years both in terms of value and volume, according to this announcement  to the Rajya Sabha 2017. Credit card fraud has declined over the period.Reported ATM/debit card fraud increased 179% in value from Rs 13.86 crore in 2014-15 to Rs 38.67 crore in 2016-17, based on data from the Reserve Bank of India. People also get calls from  the Hackers and they use some tricky method to convince people easily. and collect sensitive information very easily . There are various ways in which fraudsters may try to deceive you into giving them your personal and security details. Here are some of the common online banking frauds that are prevalent Phishing Emails :  As the name suggests, these are fraudulent emails, claiming to come from the authorised channel. Further explaining the Phishing scams, Vice President, Banking and Financial Services, Virtus aPolaris, a financial tech...

How to secure Your Facebook Account

Image
How to secure Your Facebook Account In those days Facebook is the most popular social networking website all over the world. In 2004  when Mark Zuckerberg start this social networking site there are a few people who are used, but now a days this is huge. If we look the graph of facebook uses then it will be like this This graph is from JUNE2004 - JUNE2017, and you can see the graph that describe that how much people use facebook now a days. There are so many social networking websites and applications are available now a days like :- Instagram, twitter, snapchat, wechat,whatss app, YouTube, messenger and many more , but facebook take the first position for maximum uses. Facebook’s growth the last half decade has been fueled by the developing world. The company has relentlessly optimized its app for cheap Android smartphones and low-bandwidth connections. It’s added 746 million users in Asia and the Rest of World region since hitting 1 billion users total. Meanwhil...

D DOS attack

Image
D DOS Attack   What is D DOS Attack?  A DDOS (distributed denial-of-service attack) is an attempt at rendering a server unreachable to its visitors. During a DDOS attack your website may become unreachable since the server is being flooded with bogus requests and cannot process the valid ones. Think of this example: Imagine someone prank calling your phone. It’s like a 500  people prank calling your phone and tying up the phone lines. Then someone that wants to talk to you tries to call. They might get a busy signal or not get through at all. The phone company may have trouble distinguishing between the “real” phone calls and the “prank” phone calls. The objective of the prank phone calls is to simply tie up the phone lines so no one else can get through to you.             Now, Think of the web server as the phone company that’s handling your phone calls and the DDOS attack is all the prank callers. The legitimate calle...

Facebook phishing Page

Image
  Facebook phishing page:-   What is phishing page? Phishing is a most popular technique used for hacking passwords and stealing sensitive information like credit cards, banking username & passwords etc. Phishing aka fishing attack is a process of creating a duplicate copy or a clone of a reputed website in the intention of stealing user’s password or other sensitive information like credit card details  How to make a phishing Page :- open any web browser     Type www.facebook.com on the URL      3. Right click on the facebook page and Click on " View Page Source "       4. Now Copy the whole php code    5. Now paste the copied code into a Notepad File.   6.  Save the file as Index.html ,  7. Now ready  any php script which can send You password       this is script  below which y...