Reverse H4ck3r

Thursday, February 16, 2012

How To Protect Your BSNL WiFi Internet



Hi everyone, we all are under the threat of terror as we are using an unprotected wifi at home or at office.
Recently the attacks on Ahmedabad city, Mumbai city and many other Indian cities were plotted and many email treaths were sent through unprotected wifi networks of our own.
Many innocent peoples from corporate level and individual level were taken to police custody as the IP Address matched from the IP Address of the treath emails sent. This was because of unprotected wifi system.
So if you are using the WiFi for internet you need to protect it right now, to avoid any problems that can ruin your life.
Unprotected or WiFi without proper encryption can be used by anyone coming under its range, anyone coming under your WiFi range can use internet without you knowing untill you get a heavy bill amounts and problems.
So I will tell you how to protect your BSNL WiFi system.

Tuesday, February 7, 2012

Lock/Unlock your Computer with USB Drive using Screen Lock



We all have been using passwords for protecting our computers, don’t we? Some being too complex for anyone to guess and some being simple for anyone to find out like that of our car’s number.
But remembering passwords has always been difficult for most of us and the task becomes more difficult when we are supposed to remember the login credentials for many of our online accounts. Writing the passwords somewhere to remember is not at all a safe option.
Here is a cool tool called Password Booster Screen Lock that I came across recently, which will solve this problem. Using this tool we can turn our USB drive into a pass keywhich can both lock and unlock our computer for us. You can assume this drive similar to your “house key” plugging in which will unlock or lock your system.

Tuesday, January 31, 2012

Website Hacking Techniques



Everyday, you search in GoogleYahoo, and other search engines, "How to Hack Websites?", "Methods to Hack Website", "Website Hacking", etc. Website Hacking have become a popular business or rather an interesting game for many people, reasons behind this hack is normally to prove their skills and to get fame, or anything else. As we know, "To catch a thief, we must think like a thief", like here also, we can conclude that to secure a things, we must first find insecure in it, then we can proceed on securing. So, before proceeding to the topic of securing we must first know what is insecure in it.

There are many drawbacks by which websites are compromised, these is normally due to the poor management of site by the webmaster or admin.

Monday, January 23, 2012

What is Brute Force - Password cracking ?



Brute force (also known as brute force cracking) is a trial and error method used by application programs to decode encrypted data such as passwords or Data Encryption Standard (DES) keys, through exhaustive effort (using brute force) rather than employing intellectual strategies. Just as a criminal might break into, or "crack" a safe by trying many possible combinations, a brute force cracking application proceeds through all possible combinations of legal characters in sequence. Brute force is considered to be an infallible, although time-consuming, approach.

Sunday, January 15, 2012

Botnets



A botnet or robot network is a group of computers running a computer application controlled and manipulated only by the owner or the software source. The botnet may refer to a legitimate network of several computers that share program processing amongst them.

Usually though, when people talk about botnets, they are talking about a group of computers infected with the malicious kind of robot software, the bots, which present a security threat to the computer owner. Once the robot software (also known as malicious software or malware) has been successfully installed in a computer, this computer becomes a zombie or a drone, unable to resist the commands of the bot commander.

A botnet may be small or large depending on the complexity and sophistication of the bots used. A large botnet may be composed of ten thousand individual zombies. A small botnet, on the other hand may be composed of only a thousand drones. Usually, the owners of the zombie computers do not know that their computers and their computers’ resources are being remotely controlled and exploited by an individual or a group of malware runners through Internet Relay Chat (IRC)

There are various types of malicious bots that have already infected and are continuing to infect the internet. Some bots have their own spreaders – the script that lets them infect other computers (this is the reason why some people dub botnets as computer viruses) – while some smaller types of bots do not have such capabilities.