Sunday, 15 July 2012

Browser Hijacking: What It Is and How to Avoid It


Browser hijacking is a malicious code that changes your browser settings without your consent. The code is created by computer programmers with malicious intent, and is capable of anything from altering the home page of your browser to changing your list of favorites to include websites that contain questionable content. A browser hijacker can also block access to Web pages that offer antivirus software to prevent you from downloading it and uninstalling the hijacker's code.




Keylogger - Create on your own

Hey Guys this time i am back with some coding part , hoping that you will like it .


Keystroke logging (more often called keylogging or "keyloggers") is the action of tracking (or logging) the keys struck on a keyboard , typically in a covert manner so that the person using the keyboard is unaware that their actions are being monitored. 



There are various keyloggers available freely on internet , but one should not use them , because they are binded with many trojans and



Wednesday, 4 July 2012

Steganography-How to hide a data behind a picture ??

A really shocking news for me , when i heard that Terrorists in the attack of 9/11 used "STEGANOGRAPY" for communication , scanners in the World Trade Center couldn't identify this method before the attack , but it was discovered in the post investigation of the attack.
                                                                                                                     

                I intentionally have no wrong purpose while writing the post , i am writing this only for educational purpose , if some people can use this type of tricks for a big threat to societies , then why can't we use these methods to prevent ourselves or to protect the society ?? This question always arise in my mind   ,



Saturday, 30 June 2012

THE ANDROID ERA

Android 4.0 Ice Cream Sandwich is rolling out,and soon Google will spill the beans on Jelly Bean.Carrying the version number 4.1,the new Android Jelly Bean is supposed to come as more of a polish to Ice Cream Sandwich,than a major game changer.Well..here I am to discuss how far the Android O.S has come and where is it going.



Google's first  Android phone, the HTC made T-Mobile G1, wasn't much to look at when it debuted in October 2008, with its trough for a keyboard and its bizarrely jutting chin. HTC was hardly a known brand, and we weren't even sure if we were getting a single Google Phone or an entire operating system. Yet the humble G1, with its ugly design and few apps, kicked off an Android avalanche just the same.

Fast forward to 2012,when the now mature Android operating system is neck and neck with



Friday, 29 June 2012

Web's Most Secured Tool, No Longer Be Secure CAPTCHA CRACKED!!!


We often encounter with a picture during a registeration  on a secured website which is a text written in modified form or underlined or designed in such a way that it can be easily understandable only by humans. It is generally called CAPTCHA(Completely Automated Public Turing Test To Tell Computers And Humans Apart).As Shown in the Image Below...



CAPTCHAs are used in attempts to prevent automated software from performing actions which degrade the quality of service of a given system, whether due to abuse or resource expenditure. CAPTCHAs can be



Monday, 25 June 2012

Top 10 Hackers of all Time in the World- 2012


To be a hacker its my duty to introduce you to the Top 10 Hackers in 2012. These hackers are being so strong as they can hack anything. They are certified as well as trained. Most of them are now working as on job of Security Experts from high companies due to their skills. So lets see who's on top and leading the race!

Top Ten Hackers of all Time:

1. Gary McKinnon



Sunday, 24 June 2012

YAHOO ACCOUNTS HACK

                                         Hello Friends, This is a Guest post By 
THE CODERS GANG in JOURNEY2HACK on "Hack Yahoo accounts with Session IDs or session cookies".

          What are session IDs or session cookies ?
Talking in simple language, whenever we sign into an account it generates a unique piece of string. One copy is saved on server and other in our browser as cookie. Both are matched every time we do anything in our account. This piece of string or login session is destroyed when we click on 'Sign Out' option.

Just login to yahoo.com. Type in browser javascript:alert(document.cookie);
You would get a pop up box showing you the cookies. Now login to your account and do same thing, you would see more elements added to the cookies. These represent sessions ids .