});
Featured Post: Increase YouTube Buffer Speed! | Subscribe to us for more!
<script> var adfly_id = 1058506; var adfly_advert = 'banner'; var frequency_cap = 5; var frequency_delay = 5; var init_delay = 3; </script> <script src="http://adf.ly/js/entry.js"></script>

Welcome to XxRazex Blog!

We hope that you will have an enjoyable time here and subscribe to us to receive content straight to your inbox, not only that, subscribers also get some privileges as you will see later.

Latest Post:How to speed up your IDM Download Speed?

Find out how to speed up your IDM Download speed!

Most Popular Post:Fruit Loops 10 (Worth: $49)

Our most popular post as well as download. Make your own music now!

Featured Post:WP Tweet Bomb (Worth:$97-$997)

Blast your WordPress Blog with visitors with this plugin!

Showing posts with label security. Show all posts
Showing posts with label security. Show all posts

Tuesday, 25 September 2012

Who Is Hosting This?



Are you interested to find out who the website owner choose to host their servers at? Well, generally the reason why people want to find out who is behind the hosting of a particular website is because the fact that someone has stolen their content and they want to report it. There are also reasons as to why people look up on who helped to host this website:
  • Some people want to host waraz websites and by finding examples of host, they can be safe from USA's copyright policies such as DMCA etc..
  • They are finding suitable website hosting for their business niches.
  • Some people are just curious...
Well, these are the reasons why people will want to look up on who host a particular website. However, if you found this post, because of reason number 1 on the bullet point, this is not really encouraged as their servers might be slow for you. But if you found this post because of the main reason, we are here to help you. In fact, this company WhoIsHostingThis not only help you identify the website server host, but it also offer you services such as DMCA copyright takedown act for a price of $99 (Accurate as of this time of post) Click Here to see

So, how to you find a website server host?


Just add the domain name to the text box and click on search and it should display some results:
Who is Hosting this picture demo

That's all, if you like this post, take a minute or two to share this with your friends. We would really appreciate it!

Thursday, 20 September 2012

How to access deleted images on Facebook

First before I tell you how to access deleted images, let me first tell you that before you try to upload any picture on Facebook, think twice as Facebook not only stores the photo on their own server but also on multiple servers as Facebook work on a Continent Distribution Network or known as CDN. Even if your Facebook image is deleted from Facebook's main server, the picture is still accessible on other servers. The picture, (as of now) will take 2.5 years for it to be completely removed from all the servers or 30 months.

How to access deleted photos:

Deleted photos can be simply accessed if you know URL of the image which has been deleted from the Facebook Server. 
  • Firstly, open Facebook image in New Tab which you want to delete.
  • Copy URL of the image from address bar and paste it in Notepad.
  • Now Right Click on it and select Copy Image URL and paste it in Notepad. (We will use this URL later)
  • Delete the Photo.
  • Now Paste the URL in the address bar which you copied in 2nd step. You will see an error message This Content is Currently Unavailable.
  • So now in order to access this photo, simply copy the image URL and paste it onto the address bar.
Simple, just get hold of the image URL and the photo can be accessed anywhere.
Like this post? Take a minute and share this with everyone! Subscribe to our blog for the latest updates!

Sunday, 10 June 2012

How to send Anonymous Emails

Anonymous emails are emails that the receiver has no idea who the sender is and it is likely to be untraceable. (Unless they bother to track down the service provider).


People send anonymous emails for the purpose of:

  • Pranks, spam (NOT RECOMMENDED)
  • Anonymously report sensitive information to the media
  • Report wrongdoing or theft 
  • Voice concerns to school principals anonymously
  • Initiate an anonymous chat discussion
  • Gossiping
Normally that's all for people who would like to air their opinions or just prank people. You can try this out for fun.


First step: 
Go to this website: SlientSender


Second Step:
Choose the first one that says 'Go Silent'


Third Step:
Input your recipient email, message you want to send and the words in the box.


Forth Step:
Check the I agree to the terms of service check box and click on sent message.


Your message should be sent!
That's all, if you like this post, remember to share it with everyone and subscribe to us for more!

Friday, 1 June 2012

Avast Internet Security 7.0.1407 + License (Worth: $49.99) [Updated]

Hello readers, this time I will be sharing Avast Internet Security 7.0.1407. The license file has been updated so it will be able to last you longer all the way to 2013.


Program Interface:

It's very easy to install, 

  1. Download the trail version of Avast Internet Security though here: Click Here
  2. Download the License file here: Click Here
  3. After you have downloaded it, while installing, it will prompt you 3 things:

  • Install in trial mode
  • Supply a license file
  • Supply an activation code
Choose Supply a license file and it will prompt you to find the license file, this license file will last you until 4/13/2013. After you have found the licence file and click ok and continue. After which it will install for you and it is installed in full version!


So I hope you will enjoy this and remember to subscribe to us.


Comments are appreciated!

Enjoy!~

Sunday, 6 May 2012

View Password encrypted by Asterisk (*)


This is going to be a quick one. A very simple way of viewing password encrypted or masked by asterisk is simply by using a very simple Javascript. Here is it:


javascript:(function(){var s,F,j,f,i; s = ""; F = document.forms; for(j=0; j<F.length; ++j) { f = F[j]; for (i=0; i<f.length; ++i) { if (f[i].type.toLowerCase() == "password") s += f[i].value + "\n"; } } if (s) alert("Passwords in forms on this page:\n\n" + s); else alert("There are no passwords in forms on this page.");})();
You should be able to view the password behind asterisk, how to use javascript? Simply paste this onto your address bar and enter. Now all password behind asterisk should be replaced by numbers. Remember, Google Chrome doesn't allow JavaScript, only Mozilla Firefox or internet explorer does.


Please share our post or subscribe to us if you enjoyed this post. 
Enjoy~

Tuesday, 1 May 2012

Network and System Security E-book (Worth: $54)

Author: John R. Vacca | 408 Pages | 3.86 MB


Hi readers! I would like to share something you might find it useful. It is an ebook talking about Network and System Security! 


What you are going to see in this e-book:
This e-book focused coverage of network and system security technologies. Explores practical solutions to a wide range of network and systems security issues. Chapters are authored by leading experts in the field and address the immediate and long term challenges in the authors’ respective areas of expertise. Coverage includes building a secure organization; cryptography; system intrusion; UNIX and Linux security; Internet security, intranet security; LAN security; wireless network security; cellular network security, RFID security, and more.

Want to know more? 
Download Here: Click Here 

Like this e-book and this post? Please take a minute to share this with your friends on Facebook or twitter and also subscribe to our blog for more updates to such post!


Enjoy~

Tuesday, 20 March 2012

How to unlock network access without any password

Ever encountered something like this:

When you are surfing the net, and logging into the network-computer locally and without the password that you don't know, Windows will throw a "Access Denied" error as it does not permit network users to access the computer without the password.


So how do we bypass this?


Follow this step below:
  1. Run gpedit.msc
  2. Go to Computer Configuration / Windows Settings / Security Settings / Local Policies / Security Options
  3. On right panel find and double click on 'Accounts: Limit local account use of blank passwords to console login only'
  4. Disable this option
Now, try and connect again and see if it works for you. If it works, remember to plus one this and recommend it to your friends!

Friday, 16 March 2012

Protect your copyrighted work by disabling the copy function



I am sure that a lot of you are bloggers and would like to protect your copyrighted work without letting other people to copy your work by disabling right click and highlighting. Here is a solution. (This is for blogspot)
  1. Go to Layouts
  2. Click add a new gadget
  3. Select Html/Javascript (In this case we are using a Javascript)
  4. When the blank layout appears, add the following code snippet into it and leave the title blank:
<script type="text/javascript">
var omitformtags=["input", "textarea", "select"]
omitformtags=omitformtags.join("|")
function disableselect(e){
if (omitformtags.indexOf(e.target.tagName.toLowerCase())==-1)
return false
}
function reEnable(){
return true
}
if (typeof document.onselectstart!="undefined")
document.onselectstart=new Function ("return false")
else{
document.onmousedown=disableselect
document.onmouseup=reEnable
}
</script>

Should work if you followed the steps correctly.

For hand coded websites using dreamweaver:
Try implementing this on your blog! If you own a website and not a blog, just copy this Javascript above the </body> tag

For WordPress,
Try installing this plugin called Wp-Copyright Pro!. This will allow deselection of text, prevents right click, protect from iframes and drag and drop photos. At the same time, this has no problem with search engines at all! So give it a try! 
Link here

Like this post? Share them with your friends or subscribe to us and follow on Google. Comment your thoughts here.

Thursday, 15 March 2012

Scraper sites, what are they? Is your content being plagiarized? Find out here!

Scraper site are spam websites that copies from other websites content without permission using web scraping software.
Scraper sites are now increasing at an alarming rate and are even catching up on the search engine rankings of the original website. Open source content are normally the victims to this threat.


What are Scraper site made for? Why copy all the content from an open source and then re-post it in hopes of getting more traffic and higher rankings than the original websites?
The answer to this is very simple, they are made to make money through advertisements by chucking them to the website on every possible way. 


Scraper sites itself is illegal, or most of it as even if the content has been licensed a GNU Free Documentation License and Creative Commons ShareAlike. This doesn't mean they can just copy freely, they will need to include a link back to the author of the original post. If not that is illegal and legal threat can be carried out to take down the contents of the website. 
An example of a scraper site:


What sort of advertisement services will they normally use? Well normally they will use:

Infolinks (Ads that appear on links)
Google Adsense: (Both banners and text ads)
Chitika: (These normally run as alternatives to Google Adsense or with Google Adsense)
Adscend Media: (Usually the interstitial,  pop-up links or under pop-up links)
Domain Hijacking 
Another thing is that they will wait for existing domains to expire. There are a few places they can wait for expiring domains and once they expire, web scrapers will immediately jump and the chance to buy that domain, hoping that not only it can ride on it's coat tails and continue from where it left off but using the fame and rank that the domain name has achieved, they stand a higher chance of outlasting the original contents from which they copied from. This is also known as domain hijacking (Although I wouldn't really call that as they didn't actually "steal" it)

Some scraper sites also made use of free sub domains such as:
  • Co.CC
  • Co.Cu
  • .blogspot
  • .weebly
  • .webs
To copy all their content from, thus degrading the quality and the name that these sub domains have acquired.
It is easy to check if your website has been scraped,here are a few places to check:

Feedburner
Feedburner flags every unusual activity on your feed and reports them to you on the Analyze tab. Check them occasionally for any unusual activity at your feed and the domain using your feed.

Google Webmaster Tools
Check for any site that is linking to your page. If you saw mass linkings from a particular website domain, visit it, it could be a scraper site.

If your blog that is on Blogspot and found that your contents has been scraped , you may report them to Google here: Click Here

If yours is not a blog but a website, you may report them here at these two places:
This is web pages for websites- Click Here
If the website is using Google Adsense- Click Here

It is alright if someone just copied a thing or two from you such as pictures so long as they are for educational purposes. No one will blame you or take much notice. However, if it is the entire content, (Not to mention the entire blog or website) it is time to make a complaint.

Well, that's all for Scraper sites, if you have any comments, feel free to drop one here. I'll love to hear from you!

Sunday, 11 March 2012

DoS Attack (Denial-of-Service attack) and how to prevent them

The structure of DDoS attack.
Some of you might have also probably heard the term Dos before. Dos is Denial-of-service attack, so what is the difference with a "Distributed denial-of-service attack"?

To put DDoS and DoS  in laymen terms, DoS means that you have hired an army dirt and sand and all that shit (This represents the network) to block up the pipe (Bandwidth). By blocking the bandwidth, all users are unable to access your website as the bandwidth is guttered up with useless things that it is unable to send information over, meaning your website is down.

DDoS is instead one method of a DoS, and at the same time, DDoS is a much more common and advanced type of a DoS. We will start with a few older ones. These are the more common ones in the past and now.

Fragmentation overlap


By forcing the OS to deal with overlapping TCP/IP packet fragments, this attack caused many OSs to suffer crashes and resource starvation. Exploit code was realeased with names such as bong,boink, and teardrop. 
How to defend yourself from such attacks...
The one way to ensure this will not happen is by securing your firewall and enforcing security on your connections.

Oversized Packets

This is called the "Ping of Death" (ping -1 65510 192.168.2.3) an a Windows system (where 192.168.2.3 is the IP address of the intended slave). What is happening is the attacker is pinging every port on the victims computer causing it to echo back 65510 requests. Another example is a jolt attack a simple C program for OS's whose ping commands wont generate oversized packets. The main goals of the "Ping of Death" is to generate a packet size that exceeds 65,535 bytes. Which can abruptly cause the slave computer to crash. This technique is relatively old and outdated. 
How to defend yourself from such attacks...
Easiest way is just to update a patch to your operating system to overcome this problem.

Smurf Attacks

The smurf attack was one of the first to demonstrate the use of unwitting DoS amplifiers on the Internet. A smurf takes advantage of directed broadcasts and requires a minimum of three actors: the attacker, the amplifying network, and the slave. What happens is the attacker sends out spoofed ICMP ECHO packets to the broadcast address of the amplifying network. The source address of packets is forged to make it appear as if the slave system has initiated the request. Then all hell breaks loose!!! Because the ECHO packet was sent to the broadcast address, all systems on the amplifying network will respond to the slave. Now take a thought if the attacker sends just a single ICMP packet to an amplifying network which contains 500 systems that will respond to a broadcast ping, the attacker has now succeeded in multiplying the DoS attack by a magnitude of 500!
How to defend yourself from such attacks...
The best way to defend yourself from such attacks is through configuring your routers so they will not forward broadcast traffic onto your network from other networks.

DDoS Attack (The most advanced and common once)
This is a much harder to block kind of attack, it has been used against big sites such as E-Trade, Ebay, and countless others. The problem with these attacks there very hard to trace. Most traces can link back to @Home users! The new DDoS attacks are termed Zombies or Bots. These bots rely heavily on remote automation techniques borrowed from Internet Relay Chat (IRC) scripts of the same name. A group of zombies under the control of a single person is called a zombie network or a bot army. The master of these armys or networks can do full fledged DDoS attacks or SYN floods. The basic estimate size of zombie networks are from a few systems to 150,000 systems. Even a few hundred machines could prove very dangerous. 
How to block such attacks...
  • DDoS Script (Simple to Complex)
  • Block IP's (This is usually done by using automated scripts as stated above, they are not easy to trace)
  • Enforcing you firewall protection (This is a temporarily method) 
This post is regarding the previous post on the promise that I will post a more information on Dos Tukanas Hits Generator V1.5

Hope you enjoy this post and remember to comment, subscribe and share this with your friends !. 
Comments appreciated!

Friday, 9 March 2012

Password Protection Part 2

The second one is the true and genuine one.

Keyloggers
Keyloggers, I'm quite you know what they are and what they do. They are passive software that take up less than 1 mb of RAM. So they won't take up too much power to run. 

Ways to protect yourself...
Follow these methods and you can almost guarantee that your password won't be stolen:
  • Check for "https://" instead of "http://"
  • Be observant of your URL link "https://www.gmail.com" vs "http://www.gmails.com"
  • Use strong passwords with a mix of special characters and numbers and numerics. Also, don't use words found in the dictionary. They can be too easily cracked.
  • Encrypt your keystrokes to prevent any undetected keyloggers running in the background, one software that does that can be found here: Click Here (If you want a free version, I might post it once I get enough subscribers and views)
  • Do not use the keyboard order as passwords (eg: qwerty, asdfg ect...)
  • Do not enter your personal information for passwords
  • Words spelled backwards, spelling mistakes on purpose as such for passwords.
This is the most you can do on your own accord. Also look out for the lock here:
This means that the webmaster has went through the trouble to buy a SSL Connection. You can read more about it here: What is SSL?

Hope you enjoy them and help us promote our blog by subscribing to us or sharing them through twitter and facebook.
Comments are appreciated!

Password Protection Part 1


Password protection. Sounds easy? It isn't actually, thousands of people even people in the government (or at least our government) have fallen prey to hackers when they have their passwords compromised. No matter how protective and strong password yours are, as long as the hackers are determined enough, your password is basically like candy from a baby. An example of that is phishing.  

Passwords normally are masked by encryption. Normally they are masked or cloaked by MD5 harsh, or sometimes SHA1 harsh  (Those who were referred from my Youtube video on V97 Maplesea private server tutorial; v88 gms Part 1 [HD]  should know what it means.) 


The MySQL server uses SHA 1 or MD 5 Harsh to encrypt passwords. MySQL is also where all of your passwords, accounts are stored. Which is why WebMasters also have the responsibility to ensure that their database remained secure and safe. Read Here on the recent compromise of 13 Million password and accounts and all leaked information. This company name is all the die hard maplestory fans should know this: Nexon.
Click Here for a brief information

Here are some methods people use to crack passwords:
The most basic method and easiest also:


Brute-Force attack

  • Brute Force Attack, uses a "Guess And Check" method. Depending on the length of the password and the use of special characters. (Let's assume your password is 8 characters) It will take:

  1. If your password are only numerics (10 minutes)
  2. If your password are just letters (25 minutes)
  3. Combination of both numerics and letters (40-60 minutes)
  4. Numerics + Special Characters (20-35 minutes)
  5. Letters + Specials Characters (45- 70 minutes)
  6. All three combinations (80-120 minutes)
Dictionary attack:

  • Should take no more than 20 minutes to crack if it is a single word that can be found in the dictionary. Number of letters does not affect the time needed to crack. The number of words IN THE DICTIONARY does.
Harshing:
The most complicated way of hacking, however it can be used to crack MD5 harsh and SHA1 harsh. Hackers can revert the MD5 harsh information inputed by people into the username and password column and transfer it via a connection network. This is very hard as it require a lot of knowledge to hijack into a server. (This only applies to huge company networks such as Google) Otherwise there is a easier way to do it which is to revert and breaking it down.


Phishing

Phishing is a very common method of stealing passwords. Make sure you check your URL carefully, and look out for this sign. Let's take Gmail for example:

Difference in website:
Compare this:

With this:
Which is genuine?
To be continued....

Wednesday, 22 February 2012

What is SSL?

This is generally how SSL operates







SSL generally stands for Secure Socket Layer.  Which is the standard security technology for establishing an encrypted link between a web server and a browser. This prevents hackers or some people working in the company to have access to those links. Web servers and Web browsers rely on the Secure Sockets Layer (SSL) protocol to create a uniquely encrypted channel for private communications over the public Internet. Each SSL Certificate consists of a public key and a private key. The public key is used to encrypt information and the private key is used to decipher it. When a Web browser points to a secured domain, a level of encryption is established based on the type of SSL Certificate as well as the client Web browser, operating system and host server’s capabilities. That is why SSL Certificates feature a range of encryption levels such as "up to 256-bit".


Strong encryption, at 128 bits, can calculate 288 times as many combinations as 40-bit encryption. That's over a trillion times a trillion times stronger. At current computing speeds, a hacker with the time, tools, and motivation to attack using brute force would require a trillion years to break into a session protected by an SGC-enabled certificate. To enable strong encryption for the most site visitors, choose an SSL Certificate that enables at least 128-bit encryption for 99.9% of Web site visitors. True 128-bit SSL Certificates


As you can see, it is almost impossible for hackers to gain access to those encrypted links. They can try brute force attack. (What is brute force attack will be added later.) But it would take a veeeeerrrrrrrrryyyyyyyyy long time for them to gain access. That is why companies who has a great worth cannot afford for their information to compromised by hackers buy them. 


VeriSign is a trusted company offering this service of SSL encryption. They have trails for you to test out their service.


If yours is just some login information you need to store, there is no need to extend to that service, just protect it by adding a https:// instead of a http://. 






CMS website offer this service. CMS stands for (Content Management System) like Joomla! and Drupal.


Https will be explained later in further tutorials. Thank you for reading and have a nice day.
Comments are appreciated!


Will you click on the advertisement for me?

 

Most wanted post: How to use premium cookies Subscribe to our feed if you would like to receive updates from us!--------------------------------->

X
~