Saturday, 20 June 2015

Hack your Girlfriend fb account

We at The Hacker News get a lot of requests via emails and messages from people who want to hack into someone else’s Facebook account or Gmail account or break into somebody’s network.

However, 80 to 90 percent requests we receive every day are from people who want to hack into their girlfriend, boyfriend, wife, or husband’s Facebook account in order to read their private conversations and reveal their secret relationships, if any.
Even though we strongly deny any such requests because accessing someone else’s account without their knowledge or permission is a crime…

...but there are demands from people – those cheated by their love, betrayal of trust, driven by greed or revenge – to break into the Facebook accounts of other people.

So, what about Hiring a Hacker?


As money could buy everything, a service received a lot of popularity earlier this year – even featuredon the front page of the New York Times – claims to connect these needy people to professional hackers for hire around the world.

Hacker’s List, launched in November 2014, received more than 500 hacking jobs in the period of just three months. Anyone can post or bid on a hacking project listed on the website.

There are around 2740 anonymous hacker profiles displayed on the website who are ready to accomplish hacks for you if hired. Prices of hackers range from $28 to $300, and full hacking projects range in prices of $100 to $5000.

Payments are done anonymously — collection of fees when tasks are completed, nobody knows the identity of those involved in doing the work.

Hacker’s List claims to provide "ethical hacking" services and asks users not to "use the service for any illegal purposes," as laid out in its 10-page long terms and conditions section.

However, the activities listed on the site are clearly illegal in some cases, so is it providing a so-called white hat hacking service?

Do You Also want to Hack Facebook Accounts?


Recent research indicates that many of the hacking tasks listed on Hacker’s List are related to breaking into Facebook accounts, hacking Gmail passwords, reading someone else’s chat logs from messaging apps like WhatsApp and Messenger.

In short, most of the requests from people are completely unlawful, very few requests are actually legal, and even most of the already completed projects fall under the category of crime.

The statistics of research conducted by security researchers Jonathan Mayer shows that the majority of users want to hack into somebody’s Facebook accounts, as Facebook is the most common target of users.

Below are the stats:


  • 23% of projects relate to Facebook hacking, often involving a business dispute or jilted romance.
  • 14% of projects relate to Google account hacking, also involving a business dispute or jilted romance.
  • 8% of projects involve students asking for University’s computer systems to be hacked in order to improve their exam grades.
  • 3% of projects involve burying some embarrassing tidbit, essentially an ersatz Right to be Forgotten.


Revealing True Identity of Customers


Mayer has also noticed another interesting fact that it is quite possible for anyone to reveal the true identity of Anonymous clients who are actually asking/hiring hackers for his or her jobs.

Every user registered on “Hacker’s List” website choose anonymous usernames in order to keep their actual identity hidden. However, there are physiological possibilities that most users keep their username same for multiple websites like I do.

Mayer explained that using a simple web page crawler, anyone can collect all the usernames from Hacker’s List Project pages and then can cross-link each of these so-called anonymous usernames with Facebook to find active profiles, possibly revealing their true identity, email addresses, contact details and other personal data.

Personally, I don’t encourage anyone to hack into the accounts of other people, and to avoid getting hacked; you should regularly update your password and keep other security settings tight.

Hack your Email Account

This Simple Trick Requires Only Your Phone Number to Hack your Email Account
We all have been receiving spam phone calls and messages on almost daily basis from scammers who want to pilfer your money and personal information, but a new type of social engineering hack that makes use of just your mobile number to trick you is a little scarier.

Security firm Symantec is warning people about a new password recovery scam that tricks users into handing over their webmail account access to the attackers.

In order to get into your email account, an attacker does not need any coding or technical skills. All an attacker needs your email address in question and your cell phone number.

Since the process to reset the password is almost similar to all mail services, this new password recovery scam affects all popular webmail services including Gmail, Yahoo, and Outlook among others.

Symantec has provided a video explanation of how this new hack attack works. The trick is as simple as it sounds: if you want to reset someone’s email account password, all you actually need is their mobile number.

Here's How the Scam Works:


Send a text from an unknown number to the victim’s phone, asking them to verify their account by replying with the verification code they are about to receive in order to ensure their Google account is secure, but in real the code is a password resets code.
  • Send another text message containing an unlock code to the registered phone.
  • The victim receives the code with a text something like this: "This is Google. There has been unauthorized activity on your account. Please reply with your verification code."
how-to-hack-email-account
  • As soon as victim responds with the verification code, the email address is forfeited, and the attacker can log into victim’s Gmail account without detection.
This social engineering trick sounds so easy and requires almost no technical skills to get into anyone’s email account.

Most of us reply to the unknown phone calls and messages thinking it is from the company, as receiving messages and phone calls from companies is not something uncommon.

Always be Defensive to such Scams


Before watching the video, someone would have never thought of such a method to hack someone’s account.

Of course, the untrained mind could easily fall victim to the text asking for a response. But, as Symantec says, "Legitimate messages from password recovery services will only tell you the verification code and will not ask you to respond in any way."

The workaround is not to fall victim for such kinds of scams and always examine the messages you receive.

Monday, 8 June 2015

Beware! Facebook UnfriendAlert Software Steals Your Account Password


Facebook-hacking-software Today everybody wants to know — Who visited my Facebook profile?, Who unfriended me from the Facebook Friend list?,
Who saw my Facebook posts?, and many other features that isn't provided by Facebook by default.

So most Facebook users try to find out a software and fall victim to one that promises to accomplish their desired task. Hackers make use of
this weakness and often design malicious programs in order to victimize broad audience.

Following I am going to disclose the realities behind one such software designed cleverly to trick Facebook users to make them believe it is
genuine.



UnfriendAlert, a free application that notifies you whenever someone removes you from the Facebook friend list, has been found collecting its users' Facebook credentials.

UnfriendAlert Stealing your Facebook Credentials:

Security researchers at Malwarebytes have warned users of the UnfriendAlert app saying that the notorious app asks users to login with their Facebook credentials to activate unfriends monitoring and alert service for your Facebook profile.

Facebook has provided API OAuth login system for third party applications, where users don't need to provide their Facebook credentials to them. So you should never submit your Facebook password to any third party service or desktop software in any case.

Once you enter your login credentials, UnfriendAlert will send it to the website "yougotunfriended.com" owned by attackers.

Late last month, UnfriendAlert was also classified as potentially unwanted program (PUP) which often displays unwanted advertisements and deceptively installs other malicious software and free apps when visiting some web pages in your Chrome, Firefox, and Internet Explorer, making you fail to block them.

Uninstall UnfriendAlert and Change your Password Now!

So users are recommended to uninstall UnfriendAlert App from your computer, and besides removing this, you are also advised to change your Facebook password as soon as possible. You can do this under "Settings —> Password —> Edit."

Always do some research before installing any third party application as your one single mistake could compromise your online security and privacy in various ways.

Friday, 3 April 2015

Useful Ubuntu Utilities

1. Unity Tweak Tool

Unity Tweak Tool is the best example of customisation options on Ubuntu as it offers a set of system tweaks for both Ubuntu and Unity desktop. It's packed with full of switches and control and you can configure Unity as however you wish. You can change the GTK theme and icon set without much hassle, adjust launcher size, add or remove workspaces and more. Unity Tweak Tool is available for free at the Software Center.

2. Disk Utility

This is an awesome utility application which allows easy management of any disk drive in the computer. Users can format, partition and erase hard drives easily and also clone, copy and backup from one disk to another one. It's very helpful for a Ubuntu novice who is not very aware of the formatting and partition requirements in the operating system.

3. Proprietary Drivers

You must install proprietary drivers which allow hardware to function in a better way than open source drivers, which come with Ubuntu. It depends on your system's hardware, if the drivers can be installed or not. The most common types of hardware which have these drivers available are AMD and NVIDIA graphics cards and Broadcom wireless chipsets. The drivers can be found at Software & Updates utility.

4. Graphical Firewall Config Utility

Install graphical firewall configuration utility to enable and configure a firewall for your Ubuntu system. Linux is usually immune to viruses but hackers can gain remote access to the systems if there is no firewall which protects network ports. Run the command: sudo apt-get install gufw and configure firewall.

5. WinFF: GUI for FFMPEG

It provides graphical user interface or GUI for FFmpeg. It also helps convert a video file to any format and WinFF can convert multiple files in multiple formats at one time. There are also a variety of preset conversion settings for common formats and devices in this package.

6. Unity Privacy Indicator

Privacy is a big issue and Privacy Indicator is a useful tool to help you stay informed about which files, folders and services are getting accessed and logged in your Ubuntu desktop. If you click on the 'eye' icon, you can enable the privacy settings on your system.

7. System Load Indicator

If you want to keep a tab on apps and your hardware status, then it's an easy job on Linux. There is no dearth of mediums through which you can monitor CPU usage, network traffic or GPU temperature. System Load Indicator is available from the Ubuntu Software Center which has a host of configuration options.

8. Disk Space Visualiser

In this era of hard drives which have huge storage options, we don't worry much about disk space and all. But if there is smaller SSD and multiple partitions are run and a virtual machine is worked upon with a fixed size virtual disk, then freeing up disk space might become a huge requirement. GNOME Disk Space Visualiser, which comes as default in Ubuntu, is very useful for locating hidden logs, cache files and media files.

Principles For Bug Tracking

1. It's A One-On-One System: 

Each bug is a link between two people – one who detects the bug and one who solves the bug. No matter how many people are there in the channel of the bug resolution, the two main characters matter the most and play the lead roles. One who reports the bug should stand with his/her ticket and defend the issue. There might be several discouraging issues for the bug reporter but the bug needs to be kept alive anyhow. Responsibility of the bug solver is to defend the solution. If a bug is assigned to someone to resolve it, then it's the bug solver's job to convince the bug reporter that best solution is in place. In order to create the best solution, bug solver should understand the problem first, probe into all the possible options and then propose the best solution. However, the bug solver has to convince the reporter that the bug is resolved.

2. Close Bug As Soon As Possible: 

Bug ticketing is not like any chit-chat session. It's all about closing the bug as soon as possible. When a ticket is assigned to someone, the bug resolver's main focus should be how soon it can be closed. Sooner a bug is closed, it's considered better for the project. If a bug is remained unresolved for a long time, then it might become nightmare for the management. Then it also becomes difficult to track them and control them. If any bug/ticket becomes longer than expected, then it should be closed without any delay.

3. Don't Close It Completely: 

Every time a bug is raised, project resources are consumed in some other way. Every bug means there is some amount of money which is spent on the project for finding the problem, reporting it and then finally fixing it. If the bug is closed without solving the problem properly then it means the money is completely misused. As every bug consumes project time and budget resources, there should not be any temporary solution. When the bug is started, there is definitely something in mind. If the bug is closed without solving the problem then same problem may arise again and similar bug will be reported too. If there is actually no issue and the bug was irrelevant, the bug resolver should document it in right way in the source code to prevent any confusion in future.

4. Address Comments For Every Bug: 

If a bug resolver posts a message to a bug, then it needs to be addressed to someone. Comments are not only about opinion but they are for communication. A bug, as we know, is nothing but conversation between two people. If the bug is resolved, then the comment should be addressed to the ticket reporter. If any solution is wrong, comments are marked for the assignee. Generic opinions are least required in case of bug resolving and comments should be very specific. Your comments can help the project a lot, remember that.

5. Broken Product Should Always Be Reported: 

Every bug is reproducible and nobody can beat this fact. Every time a bug is reported, explanation is required how a product is broken. It's mandatory to prove that the software didn't work as expected, or documentation was not done properly and basic requirements were not satisfied. Every bug should be formatted in a particular way. Even if there is a question then the format should be followed. If there is any question it means there is some problem with project documentation and the reason behind why it is broken will also be known. If there is no proper explanation, then it should also be mentioned on the ticket. 

Thursday, 5 March 2015

Do & Don't In Big Data

1. Do involve all business units in your big data strategy: 

Big Data can never be an isolated activity as it is the way which is leveraged by businesses for huge volumes of data to learn more about customers, processes and events. If Big Data is executed properly, a Big Data strategy can have huge impact on its effectiveness. Business units can gain significant value if they are involved into the Big Data process.

2. Do evaluate all infrastructure models for big data implementation: 

For any Big Data initiative, volume of data and its management is a major concern. The only solution to this problem is using data centers. Cost parameters should also be considered before selecting and finalising any storage service. Cloud services are mostly preferred for Big Data but cloud environments should be evaluated first to determine which is the most suitable one. Storage is one of the most important components in any Big Data implementation and this factor should be extensively evaluated in any Big Data project.

3. Do enrich Big Data to gain context about your customer: 

Data can be supplemented with more information from a marketing perspective. If data is coupled with more information, then marketers get a better angle of customers' lives, wants and needs. Marketers need to look beyond sales and marketing data to get a clearer picture of the customer front. Data should be enriched with Web data, social data and other information which are derived from sales and marketing.

4. Do plan for consistent big metadata: 

If a complete analysis is done of a massive data set, then it's possible that you will come up with that data which matches a pattern. This set of data can lead an organisation to begin analysing a new issue. This data might come from customer service sites or social media environments and before you trust any data then you have to ensure that you deal with a consistent set of metadata and analyse it with the data from your systems of record.

5. Do distribute the data: 

The volume of data is a major concern if the processing environment is considered. As Big Data has huge volume of data, processing on a single server is not possible. If there is a Hadoop environment then there is a solution. Hadoop is a distributed computing environment which runs on commodity hardware. It also gives power of faster processing on multiple nodes.

6. Don't focus solely on collecting Big Data at the expense of quality: 

Data collection should always be strategic. Pulling data without any plan is a very confusing thing. There should be a plan and a goal. Big Data is less about collection and more about if the information is really helpful for the customer and the sales purpose. It's not about all the data, but it's right data which matters.

7. Don’t rely on a single approach to big data analytics: 

There is much hype around technologies like Hadoop and MapReduce. There are lots of technologies available like text analytics, predictive analytics, streaming data environments and spatial data analysis. First investigate the variety of technologies which can support you and then experiment with the technology solutions which can make you successful.

8. Don't start large big data initiative before you are ready: 

Start with small steps for any Big Data initiative. Start with pilot projects to gain expertise and head for the final implementation. Potential of Big Data is very impressive but the real value can only be achieved if you reduce mistakes and gain more expertise.

9. Don't ignore data security: 

Data security is a huge consideration in Big Data planning. Security needs to be strictly implemented and after some processing you'll get a subset of data which provides some insight. At this point, data security becomes essential and the more data is processed, the more valuable it becomes. This is finely tuned output data which must be secured and data security must be implemented as a part of the Big Data life cycle.

10. Don’t overlook the need to manage the performance of your big data: 

Big Data demonstrates that people are able to make use of more data at a faster speed and it will gain more insight too. If data is not managed in an effective way, then it may cause huge problems for the company. You need to build manageability into your road map and plan for Big Data.

GNOME Shell Extensions

1. Dash to Dock

If you like GNOME Shell's dock but hate the fact that you can access it in the Activities mode only, then Dash to Dock is the solution for you. By this extension Gnome's dash dock is turned into a full-fledged dock for everyday use. It transforms the dock in a way to launch applications and switch between windows and desktops in a faster way. As per users, it's an indispensable tool which has an excellent collection of configuration options.

2. Places Status Indicator

Gnome's menu can be restored with the Places Status extension and you can access all your favourite filesystem bookmarks like home, documents, music, videos and so on. As it adds the menu, navigation within the system becomes easier. This extension is a part of Classic Mode and supported by GNOME officially. It's recommended that GNOME Bugzilla should be used to report bugs with this extension. Users find it as a very useful extension.

3. Removable Drive Menu

This extension helps manage any removable device like an external hard drive, USB, DVD and more. They can be managed from the top panel and the devices can be unmounted easily too. It means lots of your clicks are saved. Users find it useful since quite a long time now and they are quite satisfied with the extension.

4. Caffeine

If you are reading something on your system with full concentration and suddenly the screensaver appears, you must have been feeling very annoyed. That's where this extension, Caffeine, is needed as it doesn't allow GNOME Shell enable its lock screen when the screen is enabled. So to disable the screensaver on a temporary basis, Caffeine is a must. This is said to be one of the most useful extensions in the lot.

5. TopIcons

GNOME is not very popular about its support for legacy icons, though they can be found at the hidden tray at the bottom of the screen. But this is not a very excellent practice as most people want that the icons appear in the top panel only. That's when Toplcons comes forward to help as with this extension all system tray icons appear on the GNOME Shell panel. It also mixes up the legacy icons and newer icons in an extraordinary way.

6. Skype Integration

If you can't imagine your life without Skype and simply wish that GNOME Shell is integrated to Skype, then here is the Skype Integration extension. It will allow you add Skype as a search provider too and you can search your contacts inside the Gnome dash and Skype will use native GNOME Shell notifications. It will show your online status too. It's a charming extension and a great app, no doubt.

7. Drop Down Terminal

Linux cannot be imagined without terminal and you have no choice than using it. So have a stylish terminal with Drop Down Terminal extension which will give you fast access to such a terminal in Gnome only. Press a button on your keyboard and the terminal will appear. But users are also known to be missing multiple terminals through the tabs in the extension.

8. SystemMonitor

If you want to check your system at a simple glance here is the SystemMonitor extension which will let you check the GNOME Shell tray and you can check your system. This extension gives an idea about CPU and memory usage in the message tray.

Thursday, 22 January 2015

Open Source Web-Based File Explorer Applications

eXtplorer
You can use eXtplorer to browse directories or files on the server. The browser is equipped with various basic functionalities such as edit, move, copy, delete, search, upload and download files. You can even create and extract archives, new files and directories. In addition, you can use eXtplorer to login and work through FTP. To run eXptlorer, you should have minimum requirement of PHP 4.3 on the server and an update of Javascript on the browser.

AjaXplorer 
AjaXplorer provides you a quick accessibility much like a website. Almost all key browsers support this program. Another interesting feature of the browser is that it can easily adapt to small screen devices. A Web-server with PHP 5.1 or later is sufficient to run AjaXplorer.

KFM 
KFM is a free open source file manager, and provides you with an option to use it as a plugin for rich text editors such as CKeditor, Tiny MCE or FCKeditor. You need Apache or IIS web server support to run this browsert. Additional requirements include Linux operating system PHP 5.2+, MacOSX, Windows, Database (MySQL 4.1+/5.0+, PostGreSQL, or SQLite)

PAFM 
PAFM allows you complete user control on the files. You can even do source code editing with CodePress. Code Press is an editor equipped with as-you-type syntax highlighting.

QuiXplorer
QuiXplorer can be used to manage the internet and Intranet file managing and sharing. A multi-user file manager, the multiuser mode needs user authentication, administration control over users and specific settings for each user.

BytesFall Explorer
BytesFall Explorer is launched under GNU GLU license, which is written in PHP and Javascript. Other than offering usual functionalities like copy, paste, view, download etc., it makes use of work of some other projects such as LiveTree, GeSHi, Shell Commander, FCKeditor, tar/Gzip/Bzip2/Zip archives to perform different functions.

NavPHP
PHP navigator is written in PHP and AJAX with its unique XP style navigation. The key features include multiuser support, Gzip & Deflate webpage, which are built in HTML and code editor and Extract Zip. It is available for free.

iDC File Manager
The iDC file manager refers to a multiuser system that can be installed either on Linux or Windows web server. You can save, share and manage every format of digital media such as documents, images, audio, video, publishing layout, presentations and PDF files. 

FileMan
FileMan is integrated with a compatible browser to easily access files and directories. WYSIWYG editor allows you to create and edit html files. ASCII/binary transfer capability enables you to upload single or multiple files. The powerful archive management system is a feature that allows you to create, view, and extract .Tar files.

Relay
The Relay is launched under GPL. It is AJAX enabled, and has an improved UI and deliveres a performance that is ideal for large file sets. You can also handle the files and directories uploaded into file stores from other locations.

WebFile Explorer 
WebFile Explorer is constructed with a friendly user interface and online administration with user permission and quota limits. You don’t require server configuration knowledge to manage users/permissions. It is possible to turn the standard browser into a “Windows XP Explorer" like file manager when you need to share documents among other users.

phpXplorer
As indicated by its name, phpXplorer is written in PHP. It stands for an open source file management system with file types, property sheets, views and themes all built on by modular design. The permission manager can limit the user access to multiple users in a complete manner.

DesktopBrowser 
This web application makes use of SharpKit to maintain client-side code in C#. It is an open-source project, which is maintained at Google Code. It is possible to browse local and network drives. Requirements include NET 4 Framework, IIS Express

CSS Editing Tools For Programmers And Web Developers



1. Amaya:



This CSS web editor tool is open source and it is used for documentation works.
 Amaya supports HTML, CSS, XHTML, MathML and SVG.

2. Rapid CSS:



This is very simple to use and with this tool you can create or modify multiple CSS documents
simultaneously. You can also indulge in auto completion of code through Rapid CSS.
A CSS checker and code verifier are included in Rapid CSS to check your errors in coding
automatically.

3. jedit:



This CSS editor is great for programming use for Linux users. Written in Java, jedit is famous
among coders, mostly.

4. Style Master:



This CSS tool is super powerful as it supports both Windows and MAC operating systems.
 The editor has been written in HTML5 and CSS and designers simply love this option.
Stylemaster is pre-loaded with 20 pre-defined templates too.

5. Bluefish:



For programmers and web developers, using Linux exclusively, Bluefish is a powerful CSS editor. It enables creating websites, scripts and programming code.

6. TopStyle:



TopStyle is a very user-friendly CSS editing tool and the most useful one too, probably.
 With TopStyle you can edit files directly from your FTP server.

7. cssed:



This is a free tool which is used for CSS applications and CSS editing.
 It can be downloaded for free and the key features of this program are syntax highlighting,
 syntax validation, auto-completion etc.

8. Espresso:



This editor is used by MAC users and its drag and drop editing interface allows you to edit codes quite fast. The latest version of Espresso supports improved HTML5, CSS3, JavaScript, PHP integration, Ruby, Python, Apache and Markdown.

9. SciTE:



SciTE runs on both Linux and Windows and it's used to print CSS files. SciTE is able to
 export CSS files to PDF format while maintaining the syntax highlighting.

10. Sublime Text:

Open Source Mobile Tools For Workplace

1. Convertigo

This is a full-fledged mobile platform for developing and deploying apps. You can use the free community edition to access to the apps. The platform has standard and extended editions as well which come at small price. You can use Convertigo to deploy and manage apps for iOS, Android, Windows Phone and Blackberry OS. The software is available for Windows, Linux and OS X platform.

2. ForgeRock

ForgeRock consists of several management and identity tools. It comes with apps that can support mobile devices, mobile apps and APIs. Even though the app is free, the support comes at some cost. ForgeRock software supports only Linux. 

3. OpenMobster

OpenMobster is a backend service for mobile platform that provides private cloud and mobile enterprise application private. OpenMobster offers unique enterprise sync platform that ensures reliability. The open source tool features push notification, mobile remote procedure caller (RPC) and management console. The tool is available on Windows, Linux and OS X.

4. WSO2 Enterprise Mobility Manager

This tool provides comprehensive enterprise mobility solution. It offers MDM, mobile management, enterprise app store and mobile data security features. The platform offers paid support and training. The tool is available on Windows, Linux and Solaris.

5. APG

APG (Android Privacy Guard) is OpenGPG encryption standard for Android. The tool offers encryption, decryption, signing and key management capabilities. The tool supports apps for Android.

6. ASEF

Android Security Evaluation Framework (ASEF) is a test suite for locating malware, adware and hogs in your Android app. The tool can detect malicious malwares in your app. The tool is limited to only Android apps.

7. The Guardian Project

The Guardian Group offers number of security and privacy related tools for Android devices. The tool uses Orweb private web browser. The tool includes apps like ChatSecure messaging, ObscuraCam, Pixelknot hidden message and Ostel encrypted phone call. 

8. LBE Privacy Guard

LBE Privacy Guard is the most powerful protection software app for Android. The tool can block unwanted traffic and malware. Users can customize the data that apps can access. However, you need rooted Android phone to run this app.

9. Orbot

This app lets users access internet using private Tor network on Android devices. Tor ensures anonymous private browsing. The app sends encrypted message through several servers to cover your online footpath. Your browsing becomes impossible to trace if you are using Orbot.

10. Apache Cordova

Apache Cordova offers set of APIs for native apps that use web development technologies. There are more than 600 plug-ins available for Apache Cordova. You can use Apache Cordova to extend capabilities of creating apps. The platform supports coding mobile apps using HTML, CSS and JavaScript.