Transparent White Star

GooGle Is SPyIng US ?

That words across my mine during web-surfing, while my gmail and iGoogle account still logged in. Moreover I like Chrome to get any information through internet. Does Google really spy on me? If you open History in Chrome, you will be amazed by how well-organize Chrome doing it.

How Does Google+ Stack Up Against Facebook?

With Google+, the behemoth of Web search may have finally figured out social networking. Demand for Google+ invites is reportedly through the roof, and critics are generally pleased with how the service works..

Angry Birds Now in Windows Phone Marketplace

At last. Angry Birds is now available in the Windows Phone Marketplace—a few hours ahead of schedule and so fresh it hasn’t even been rated yet! Be the first—or just hunker down with your phone and get dem pigs. .

WindOwS 8 is Cool Enough ?

On Tuesday, Microsoft showed off the first tablets running Windows 8, and provided a bunch of new details about the operating system.

Secure Browseing Is The Way To scuess

Go to Blogger edit html and find these sentences.Now replace these sentences with your own descriptions.

Secure Wp-Config File To Prevent Your WordPress Blog From Getting Hacked



Securing To Wp Config File To Prevent Your Wordpress Blog From Getting Hacked Securing To Wp Config File To Prevent Your WordPress Blog From Getting Hacked
If your blog has been hosted on wordpress then your blog is more vulnerable than other blogging platgorms, The reason is that by default the wordpress security is very low and can be compromised easily, Before writing this post I made a little search on the web related to “WordPress Security” and really found some foolish tips out there which would really not help you in any means. So I decided to write a post on my own, There are lots of wordpress admins who use plugins such as login lockdown along with many other plugins to prevent brute force attacks on wordpress, The problem is that now a days a hacker will not use a bruteforce attack or dictionary attack for hacking a wordpress blog, because now a days almost every one atleast has a password of more than 8 characters, and even if some one has a weaker password too, the brute force attacks and Dictionary attacks will be automatically blocked by your webserver, As they have iDS and IPS configured to these kinds of requests automatically.


Phising attacks are also not very common with wordpress blogs and I have seen very rare cases in which wordpress users have fallen for phishing attacks, but almost every time a wordpress user will login into the dashboard by manually adding wp-admin to the end of the url, There are possibliles that wordpress users can be attacked by phishing attacks, but bloggers are already a bit tech savy and won’t fall for these types of attacks, Alternatively if the hacker is smarter and can implement more advanced types of phishing attacks like desktop phishing ,tabnabbing or Dns Spoofing then there are chances that the wordpress user will fall for these attacks.

So How Do Hackers Hack Into WordPress Blogs?

Most of the skilled Hackers will target your wp-config as it’s in an unsecure place by default. Wp-config file is the most important file present on your wordpress blog. It holds very sensitive information such as including your database access, table prefix and Secret Key, So in order to protect your wordpress blog from getting hacked you would need to harden your wp-config file. Here is how a wp-config file looks inside, As you can see from looking into it that it contains very sensitive information.

Protecting Wp-Config File From .htacess

The first step you should take write away is to add the following code to your .htacess file, This is the first step you should take in hardening your wordpress.

# protect wpconfig.php



order allow,deny

deny from all




Changing The Permission

Last week I came across a wordpress blog, whose permission for wp-config file was set to readable, All the hacker needed to do is to upload a mysql database and use those to access victim’s wordpress blog. So the bottom line is that the permission should not be set to readable, it should be set to something like “400?.


Security keys were added in wordpress 2.6 to ensure better encryption of information stored in the user’s cookies, A secret key also includes makes it harder to crack your passwords, If some how the hacker gets hold of your wordpress hash, You can get your secret keys fromhere, All you need to do is to add these secret keys to your wp-config file.


Moving Your Wp-Config File


By default Wp-Config is located in the root folder, WordPress themselves recommend users to move their wp-config file to some other place such as outside the root folder, This will prevent the Symlink bypassing attack to the some extent.


Moving To VPS Or Dedicated Host To Prevent Symlink Bypassing Attack
If your wordpress blog is on a shared host then it will be alot more vulnerable to symlink bypassing attack than on VPS or dedicated, If your blog is quite established and you can afford to move to VPS or dedicated hosting, Then I would recommend to move it right away.

I hope you have liked my post on WordPress security, If you are looking for some more ways to protect your wordpress blog, I would recommend you visiting my website regularily.
 
Source--> tech PANELS
Read More

How to Hide IP Address and Spoof MAC Address | Become Anonymous on Internet


Now today i am going to have another interesting Tutorial , i.e HOW TO HIDE IP ADDRESS AND MAC ADDRESS AND BECOME ANONYMOUS ON NETWORK.
Many of my Daily readers have asked me about how can we become anonymous and do any hacking trick, so by now you will be having anew trick to become anonymous, such that no one can track you. Like wise you can send Phishing pages, spoofed pages and backtrack attack without the fear of being caught.
All the tutorials I have seen on internet tell people How To Set up RAT’s, Keyloggers etc. People follow these steps and start spreading, without doing anything to prevent themselves from being traced. You should follow the below steps before you start spreading, otherwise you will be easy to trace. There is no such thing as 100% anonymous, but this will help you.

This tutorial will show you how to become anonymous on the internet.


How To Hide IP And MAC Address And Becoming Anonymous On Network

How To Spoof/Hide MAC Address
First we will spoof our MAC address. MAC stands for “Media Access Control”. It is commonly used by the authorities to trace hackers. To make it harder to trace us, we can change it!Step1 : Firstly, download the Program NMAC here: 
Step2 : After you have installed it, open it up, and click proceed.You should see a list at the top of the window.
Click on the first one.
Note: The drop-down box under “Network Connection” changes.If you are using a wired connection, you need to select the one that says “Local Area Connection”. If you are using a wireless connection, you need to select the one that says “Wireless Network Connection”. If you are using a VPN, that should be visible too.
 Step3 : Once you have found the correct one, click “Random” as many times as you like.
 Step4 : Now click on “Update MAC”.
 
Click “Yes” to the window that follows, and wait until you get a window telling you that the adapter was restarted succesfully.
Now You just spoofed your MAC address.
 
How To Hide your IP address and encrypt your connection
Next, you need a VPN-Virtual Private Network, This will hide your IP address and encrypt your connection.Step1 : Goto hotspotshield and Click on “Download The Latest Version” on the right-hand side of the page.Note : If you can afford a paid VPN, it is recommended, but a good free one is Hotspot Shield.
 Step2 : Once you have downloaded and installed it, a web page should open up and it should connect to the VPN.Now your IP address will b hide and your Location will be Fake. Just like I used it, and My Location Was set to Milpitas/california – USA.
Note: You cannot go to some sites when using a VPN. This is because of security.
Congratulations! You now have a VPN!
So friends, I hope you like this tutorial.If you have any problem in this tutorial, mention it in comments section.
 
Source--> tech PANELS
Read More

Newer Posts Older Posts Home

Share

Twitter Delicious Facebook Digg Stumbleupon Favorites More