Sunday, December 9, 2018

Free WiFi Is Not As Safe As You Think! - In Hindi

फ्री Wi-fi इस्तेमाल करें, लेकिन संभलकर

स्मार्टफोन हो, टैबलेट या फिर लैपटॉप. Internet की सुविधा के बिना इन तीनों की उपयोगिता बेमानी लगती है. यही कारण है कि मोबाइल प्लान से लेकर डेटा कार्ड के जरिए लोग 24 घंटे इंटरनेट से जुड़े रहना चाहते हैं. इसी कड़ी में एक नाम WiFi कनेक्शन का भी है. लेकिन मुफ्त कनेक्शन के चक्कर में कई बार यूजर्स हैंकिंग के भी शि‍कार हो जाते हैं.

अगर आप भी राह चलते, उठते-बैठते फ्री Wi-fi कनेक्शन का इस्तेमाल करते हैं तो जरा सतर्क हो जाइए. यह न सिर्फ आपका डेटा चुरा सकता है बल्कि हमेशा के लिए आपके फोन, टैबलेट और लैपटॉप को नुकसान भी पहुंचा सकता है. लेकिन इससे बचना इतना भी मुश्कि‍ल नहीं है. कुछ ऐसे उपाय हैं, जिन्हें अपनाकर हैकर से बचा जा सकता है.

 

जांच लें कौन सा नेटवर्क है सही

 

आम तौर पर Public Place पर कई सारे फ्री Wi-fi कनेक्शन दिख सकते हैं. लेकिन बिना जानकारी के किसी के भी साथ जुड़ना हानिकारक हो सकता है. इसके लिए सबसे पहले जरूरी है कि आप जहां हैं, वहां किसी अधि‍कारी या कर्मचारी से Official Network का नाम पूछ लीजिए. यानी अगर किसी मॉल में हैं तो वहां किसी दुकानदार से मॉल के आधि‍कारिक Wi-fi Host का नाम पूछ लें और फिर कनेक्ट करें. अक्सर एक-जैसे नाम या पॉपुलर नाम से कनेक्शन का नाम बनाया जाता है और एक बार कनेक्ट होने के बाद यह मुसीबत पैदा कर सकता है.

शेयरिंग को ऑफ कर दें

पब्लि‍क Wi-fi कनेक्शन के इस्तेमाल के दौरान Wi-Fi शेयरिंग को ऑफ कर दें. अगर आप Windows का इस्तेमाल कर रहे हैं तो इसे Control Panel में Network And Sharing Center के अंदर, Advance Sharing Settings में जाकर Public Heading के नीचे शेयरिंग को ऑफ किया जा सकता है. दूसरी ओर, अगर आप MAC इस्तेमाल कर रहे हैं तो सिस्टम प्रिफ्रेंस में जाकर शेयरिंग आइकन पर जाइए और चेकबॉक्स को अनमार्क कर दीजिए.

 
एंड्रॉयड डिवाइस का इस्तेमाल करते हैं तो Wi-fi कनेक्शन सेटिंग में जाकर शेयरिंग को ऑफ किया जा सकता है.

VPN का इस्तेमाल करें

वीपीएन यानी Virtual Private Network का इस्तेमाल भी आपके Wi-fi कनेक्शन को Secure बनाने में मदद करता है. असल में यह टूल Server और आपके Device के बीच के ट्रैफिक को Code में बदल देता है, जिससे Hackers या Virus भेजने वाले को आपके Device पर काबू पाने में परेशानी होती है. अगर आपके Device में Free VPN की सुविधा है तो बेहतर, वर्ना Internet पर कई Free VPN Service Provider भी हैं.

HTTPS की जांच करें, तभी आगे बढ़ें

 

यकीनन यह सबसे पुरान तरीका है, लेकिन यह कारगर भी है. अगर आप अपने Device में Chrom, Opera या Firefox Browser का इस्तेमाल करते हैं तो आप पाएंगे कि कोई साइट खुलने पर यह Web Address के पहले HTTPS दिखाता है. यानी ब्राउजर के मुताबिक यह एक सेफ साइट है. यानी HTTPS देखकर आगे बढ़ना भी बेहतर हो सकता है.


अपडेट करें लेकिन ध्यान से

सुरक्षित Wi-fi कनेक्शन के लिए जरूरी है कि आप अपने Operating System और Apps को Update रखें. लेकिन यह भी ध्यान रखें कि फोन, टैबलेट या लैपटॉप को हमेशा ऐसे कनेक्शन पर ही Update करें, जिसके बारे में आपको पता हो कि वह सुरक्षि‍त है.
कई बार ऐसा देखा गया है कि पब्लि‍क Wi-fi के इस्तेमाल के दौरान एक बार Connect होने के बाद लगातार OS Update, Patch या App अपडेट के ऑप्शन आने लगते हैं. ऐसे किसी भी ऑप्शन पर तब तक क्लि‍क न करें, जब तक कि आप यह तय न कर लें कि कनेक्शन सुरक्षि‍त है. असल में कई बार क्लि‍क करने के बाद Hacking या Virus का आक्रमण भी हो सकता है.

एक जैसा पासवर्ड न रखें

कई बार देखा जाता है कि लोग Social Networking से लेकर Mail ID और तमाम Account का एक ही Password रखते हैं. यह गलत है. अलग-अलग Password का इस्तेमाल करें. अक्सर लोग WiFi कनेक्शन के दौरान Account बनाने के लिए भी अपने उसी खास Password का इस्तेमाल कर बैठते हैं, जिससे Hackers के लिए काम आसान हो जाता है.

नेटवर्क छोड़ने से पहले चेक कर लें

एक बार Wi-fi कनेक्शन से जुड़ने और फिर काम खत्म होने के बाद कनेक्शन बंद करने से पहले अपने उन सभी Account और App को बंद कर दें, LogOff कर दें, जिसका इस्तेमाल आपने हाल ही किया है. साथ ही Connection Setting में जाकर Connect Automatically When Available के ऑप्शन को भी Uncheck कर लें.
अगर आप Android Device इस्तेमाल करते हैं तो Wi-fi नेटवर्क लिस्ट में जाकर, नेटवर्क के नाम पर कुछ सेकेंड के लिए Press करें और Forget Network पर क्लि‍क करें.
IOS का इस्तेमाल करते हैं तो Settings में जाकर, Wi-fi नेटवर्क को Select करें और Forget This Network पर Click करें.

To wind up, if you want to read some blogs, binge watch a web-series or search for images of the place you are planning to visit next, use public Wi-Fi. But avoid using it for online banking, email access or for any other sensitive data information.

Sunday, December 2, 2018

8 Tips to Make WhatsApp More Secure and Private.

WhatsApp is among the fastest growing instant messengers out there, and almost a social networks in its own way. But if you are using it, there are some steps you should take to protect your security and privacy.
This is above and beyond WhatsApp’s built-in end-to-end encryption. It’s enabled by default and can’t be turned off. The encryption ensures that your messages can only be read on the recipient’s phone. It’s the same for voice calls and video calls, both of which are encrypted.

1. Check Encryption for Sensitive Conversations

Even though WhatsApp encrypts all chats by default, sometimes you want to double-check. It’s good practice to do that while sharing sensitive information like a credit card number with a trusted contact.
To verify the encryption, start a conversation with that contact. In the chat window, tap the contact’s name, and then tap Encryption. You’ll see something like this:


This 40-digit pattern is your security code. You can verify this code manually by comparing the digits, asking the contact to scan that QR code, or scanning your contact’s code with the “Scan Code” button. As security researcher Martin Shelton notes, it’s best to use a different messenger to verify that these numbers match.


2. Turn On Security Notifications.

When a new phone or laptop accesses an existing chat, a new security code is generated for both phones. And WhatsApp can send a notification when the security code changes. This way, you can check the encryption with your friend over a different messenger, ensuring its security.


To turn on security notifications, go to WhatsApp > Settings > Account > Security > Show security notifications and flip the toggle to green, as pictured above.

3. Enable Two-Step Verification.

If a service supports it, you should be using two factor authentication (2FA). This adds a periodic passcode to WhatsApp, and also ensures your data isn’t accessed by someone else.

To activate 2FA, go to Menu > Settings > Account > Two-step verification > Enable. Follow the steps to create a six-digit PIN code that you can easily remember. Importantly, add your email address to retrieve that code in case you forget it.


The periodic checks for the passcode are randomized, so it’s not exactly the same as password-locking your chat. But that’s not 2FA’s purpose anyway. The purpose is to stop someone else from accessing your WhatsApp account without your consent. It’s truly one of the best new WhatsApp features, and even available on WhatsApp Web.

4. You Can't Password Protect WhatsApp.

Unfortunately, there’s no way to lock WhatsApp with a password. WhatsApp has said so explicitly and recommends using a third-party locking app for it on Android.
On iPhones, there is simply no way to password-protect WhatsApp. Apple doesn’t allow it, whether with a passcode or Touch ID.



So for now, the periodic 2FA pin is your only hope. Apart from that, the only way to keep WhatsApp private from snooping eyes is to use a password or pattern lock on your phone.

5. Disable Cloud Backups (If You Care About Privacy)

The end-to-end encryption is awesome, but there’s one loophole: WhatsApp backs up chats to Google Drive or iCloud. That way, if you reinstall it later, you can retrieve your old messages. But this backup isn’t encrypted.

So if you really care about your privacy, then that’s something you need to disable. Remember, storing your data with Apple and Google might not protect you against eavesdropping by governments.


To disable automatic cloud backups:

  • On iPhone: Go to WhatsApp > Settings > Chats > Chat Backup > Auto Backup > Off
  • On Android: Go to WhatsApp > Menu > Settings > Chats > Chat Backup > Backup to Google Drive > Never

6. Beware Of Common Scams.

Since it’s an instant messenger, you might get some scams on WhatsApp periodically. You need to know some of the popular ones and not fall for them.

The most persistent ones talk about a premium version of WhatsApp, “WhatsApp Gold,” or your account expiring. No matter how it’s worded, the scam is about making you pay for WhatsApp. It shouldn’t need to be said, but don’t ever pay money for WhatsApp. The company has made it clear that WhatsApp will forever be free.

7. Get The Official WhatsApp Desktop Apps.

To use WhatsApp on your computer, you need to sync your phone with either WhatsApp Web or the WhatsApp desktop apps. To be on the safe side, get the official desktop app.

The main reason for this is that WhatsApp Web can be easily manipulated, the Electronic Frontier Foundation says. It’s one of the biggest security threats WhatsApp users are facing.

And when the EFF wrote that report, the recommended solution was to provide desktop clients.

Sure, the WhatsApp desktop client is only second best and there are better options. But don’t trade in security for a few extra features.

8. Protect Your Privacy Ob WhatsApp.

WhatsApp isn’t the most private messenger out there, but it gives users at least some control. Go to Settings > Account > Privacy to see everything at your disposal.


You can control who can see your Last Seen, profile photo, about, status, and live location. You can also turn off Read Receipts here, so the blue check marks are switched off.
There’s no recommendation here, you can choose what works best for you.

Do You Think WhatsApp Is Safe And Private??

Even with all these features, you should know that WhatsApp isn’t completely secure. In fact, there are other more secure communication apps you can try instead. But for 99 percent of regular users, WhatsApp’s security protocols should be good enough.

Saturday, November 3, 2018

Cyber Security Tips for Your Users

10 Most Important Cyber Security Tips For Your Users:

No matter how effective—or expensive—the security tools protecting your network are, there’s no way to predict the damage caused by a single careless user. The war against cyber criminals is fought each time a user decides to click an unfamiliar link or open an attachment—and just a single mistake could be the reason for massive data loss.

Read our top 10 Cyber Security tips below:

1. You Are A Target. 

 

 

Realize that you are an attractive target to hackers. Don’t ever say “It won’t happen to me.

 

 

 

2. Eight Characters Is Not Enough.

Practice good password management. Use a strong mix of characters, and don’t use the same password for multiple sites. Don’t share your password with others, don’t write it down, and definitely don’t write it on a post-it note attached to your monitor.

 

3. Lock It Up.



Never leave your devices unattended. If you need to leave your computer, phone, or tablet for any length of time—no matter how short—lock it up so no one can use it while you’re gone. If you keep sensitive information on a flash drive or external hard drive, make sure to lock it up as well.





4. Practice Safe Clicking.

Always be careful when clicking on attachments or links in email. If it’s unexpected or suspicious for any reason, don’t click on it. Double check the URL of the website the link takes you to: bad actors will often take advantage of spelling mistakes to direct you to a harmful domain.



5. Beware Of Browsing.


Sensitive browsing, such as banking or shopping, should only be done on a device that belongs to you, on a network that you trust. Whether it’s a friend’s phone, a public computer, or a cafe’s free WiFi—your data could be copied or stolen.



6. Back It Up.


Back up your data regularly, and make sure your anti-virus software is always up to date.





7. Physical Cyber Safety.


Be conscientious of what you plug in to your computer. Malware can be spread through infected flash drives, external hard drives, and even smartphones.





8. Share Less Sensitive Information.


Watch what you’re sharing on social networks. Criminals can befriend you and easily gain access to a shocking amount of information—where you go to school, where you work, when you’re on vacation—that could help them gain access to more valuable data.



9. Cut Out The “Middle Man”.

Offline, be wary of social engineering, where someone attempts to gain information from you through manipulation. If someone calls or emails you asking for sensitive information, it’s okay to say no. You can always call the company directly to verify credentials before giving out any information.



10. Stay On Top Of  Your Accounts.


Be sure to monitor your accounts for any suspicious activity. If you see something unfamiliar, it could be a sign that you’ve been compromised.

 

Thursday, November 1, 2018

Why C is The Default Drive in Windows?

Here is Your Answer

A question that has bothered almost everyone of us at some point of time has been answered

Computers, which were thought as a luxury few years ago are now a necessity. Computers are making lives easier for almost everyone. Windows is a dominant OS used by majority of computer users. Actually it is used mostly in fields where computers have to be used for non technical tasks.(And hence those trolls on Facebook, describing how Linux wins).

There are many things which are usually ignored, And the question on naming of default drive in Windows is one of them.

It could be anything if it had to be C as it does not follow any order. Logically A should be the default drive.

Then why? why did Windows do this?

Actually the reason is something historical. And it is related to the classic floppy drives . Before hard disks became standard(1980), floppy disks were used for booting the computers. These were available in two sizes at that time: 5 1/4 ” and 3 1/2?.

Those two floppy disk drives were labelled as Local Disk (A) and Local Disk (B). After the invention of Hard disk, floppy disk of size 8 inch came into existence.

The hard disk drive was named C. Once hard disks became standard and floppy disks became obsolete, the drive names A and B vanished.

As a result , drives other than default drive (C) labelled as D, E etc. DVD drive and USB drive are labelled as F, G and so on.

This is the answer of our question.

Despite of all this, you can rename your default it to whatever letter you want( if no other drive is present with same alphabet as its name) if you have administrative rights.

If you have one such question that you think has been ignored for a long time and should be searched for answers, you can post it here in the comments.

 

 

 

Sunday, October 28, 2018

What is Surface Web, Dark Web, Deep Web and Dark Net??


Understanding:

Well if you are a tech enthusiast, you must have come across these words just like I have a lot of times! But I had never looked so deeply into finding out the differences as I thought deep web and darknet are the same, but it’s not. So, let’s understand the difference between Surface Web, Deep Web, Dark Web and Darknet. Also understand what darknet browsers are needed to enter darkweb and darknet.

What Is Surface Web?? 

Let me tell you one thing, if you are reading this blog then you are exploring the surface part of the web. The websites, webpages and information that you find using web search engine like Google, Yahoo, Bing, etc. only portray that you are exploring just the surface of the web. Search Engines use the crawling process to index the webpages. Thus, the general public access only surface web. Now, let’s go little deeper.

Did You Know??

4% of the content is only available for the general public in the entire ocean of the web.

What Is Deep Web??

The content that you cannot find using the search engine is termed as deep web. For example- If you search for something specific in the search engine it will give you many links and you will only find the content that you are looking for after clicking those links. Every website has its own search box. Thus the search engine’s search is limited to navigate the website. It won’t give you the links that are deep inside the website even if your search is specific. You have to go through different websites to find the particular link.


In simple terms, there are places in web that cannot be accessed by search engines but can be accessed if you have an address.

Did You Know?? 

96% of the content is available in the entire ocean of web.

What Is Dark Web??

The data that are purposefully unrevealed and is not attainable through any standard web browsers is termed as dark web. Dark Web is mostly used for illegal and nefarious activities. The content inside Dark Web is usually found using the Tor network.

Did You Know??

Have you heard of the Silk Road? It is an online black market, infamous for selling and purchasing illegal drugs. In October 2013, FBI shutdown the website and arrested the owner but still in November 2013 Silk Road 2.0 came online. It was shutdown again by the FBI in 2014.

What Is darkNet??

A different network that is encrypted and is created upon the existing internet is Darknet. It can only be accessed by using some specific configuration of the tools and software.

DarkNet Browsers: 

Some of the popular darknet browsers are Freenet, Tor, GNUnet, I2P, OneSwarm, RetroShare, etc.


Two types- i. Friend-to-friend networks (used for sharing files using peer-to-peer connection) ii. Privacy networks (such as Tor). Darknet is mainly used for doing illegal activities- computer crime, Purchase or sell illegal goods and services, news leaks, mass surveillance, pirated movies, child pornography, etc.

Did you know?

Tor Browser is not totally secure and has vulnerabilities through which attackers may be able to find who is using a Tor Browser. Maximizing the Tor Browser can reveal the window and screen size.

 

 

Saturday, September 22, 2018

What Is 127.0.0.1 (Local Host)??- In Hindi

Computer Localhost Kya Hai(क्या है)?

Computer Localhost वर्ड को आप सभी ने बहुत से लोगो से सुना होगा. But क्या आपको पता है की Computer Localhost Kya Hai(क्या है)? or 127.0.0.1 kya hai (क्या है)? और किस लिए Use होता है. अगर नहीं पता है तो आप बिलकुल सही जगह है, क्योकि अगर आप Website Development या Computer हैकिंग का practice करना चाहते है. तो इसके लिए Computer Localhost के बारे में जानकारी रखना बहुत जरुरी है. क्योकि ये दोनों Practice करने के लिए एक Server की जरुरत होती है और Localhost से ही सबसे सस्ता और सबसे Safe Server बना सकते है.

  • Computer Localhost Kya Hai(क्या है)? या 127.0.0.1 kya hota hai(क्या होता है)?

    Localhost यानि 127.0.0.1 Microsoft Computers का Local Server या local Network होता है. जिसके Help से Windows Computer को एक Local Web Server बनाया जा सकता है और सभी HTTP Web Application को Offline run/test किया जा सकता है. इसे Internet Information Services (IIS) के नाम भी जाना जाता है. अगर आप Website Development करते है और आप अपने Website को HTTP Web पर test करना चाहते है तो आप IIS Feature को Enable करके अपने Computer को एक Web Server बना सकते है और कंप्यूटर पर ही वेबसाइट को टेस्ट कर सकते है.

    अक्सर आप सभी ने Ethical Hacker या black Hat Hacker से ये सुना होगा की Localhost जैसा और कोई जगह नहीं है. Hacking Practice करने के लिए और सीखने के लिए, तो ऐसा इसलिए है क्योकि Localhost पर किसी भी तरह के हैकिंग practice करना legal है और आप अपने Computer पर कुछ भी कर सकते है 

    आप सभी को शायद पता ना हो, Internet Network पर जितने भी Website, Web Applications, Servers मौजूद है इन सभी के पास दो तरह के Address होते है. 

    Physical Address: Localhost, Google.com, Facebook.com, blogspot.com ये सभी Physical Address है और इन्हें हम नाम से याद कर सकते है.

    Logical Address: हर एक Web Application, Servers का जो Original Address होता है वह IP (Internet Protocol) के रूप में होता है. जैसे की Localhost का 127.0.0.1, इसे ARP (Address Resolution Protocol) की मदद से Physical Address में कन्वर्ट किया जाता है ताकि लोगो को नाम याद रखने में आसानी हो.

    • दोस्तों, यहाँ पर बताया गया है की  Computer Localhost Kya Hai(क्या है)? या 127.0.0.1 kya hai (क्या है)? अगर आप Server Side Website (PHP, JSP, ASP) बनाना चाहते है तो आपको ये पता होना चाहिए की localhost kya hai (क्या है) क्योकि कोई भी Dynamic Website बिना Server के run नहीं होता है और Localhost सबसे सस्ता और सबसे अच्छा Server है. दोस्तों अगर आपको ये Computer और Networking इनफार्मेशन पसंद आया हो तो आप इसे Share जरुर करे 

     

Tuesday, September 18, 2018

Types of Hackers

7 Types of Hackers You Should Know

 

  • Script KiddieScript Kiddies normally don’t care about hacking (if they did, they’d be Green Hats. See below.). They copy code and use it for a virus or an SQLi or something else. Script Kiddies will never hack for themselves; they’ll just download overused software (LOIC or Metasploit, for example) and watch a YouTube video on how to use it. A common Script Kiddie attack is DoSing or DDoSing (Denial of Service and Distributed Denial of Service), in which they flood an IP with so much information it collapses under the strain. This attack is frequently used by the “hacker” group Anonymous, which doesn’t help anyone’s reputation.

  • White HatAlso known as ethical hackers, White Hat hackers are the good guys of the hacker world. They’ll help you remove a virus or PenTest a company. Most White Hat hackers hold a college degree in IT security or computer science and must be certified to pursue a career in hacking. The most popular certification is the CEH (Certified Ethical Hacker) from the EC-Council.

  • Black HatAlso known as crackers, these are the men and women you hear about in the news. They find banks or other companies with weak security and steal money or credit card information. The surprising truth about their methods of attack is that they often use common hacking practices they learned early on. 

  • Gray Hat – Nothing is ever just black or white; the same is true in the world of hacking. Gray Hat hackers don’t steal money or information (although, sometimes they deface a website or two), yet they don’t help people for good (but, they could if they wanted to). These hackers comprise most of the hacking world, even though Black Hat hackers garner most (if not all) of the media’s attention.  

  • Green Hat – These are the hacker “n00bz,” but unlike Script Kiddies, they care about hacking and strive to become full-blown hackers. They’re often flamed by the hacker community for asking many basic questions. When their questions are answered, they’ll listen with the intent and curiosity of a child listening to family stories. 

  • Red Hat – These are the vigilantes of the hacker world. They’re like White Hats in that they halt Black Hats, but these folks are downright SCARY to those who have ever tried so much as PenTest. Instead of reporting the malicious hacker, they shut him/her down by uploading viruses, DoSing and accessing his/her computer to destroy it from the inside out. They leverage multiple aggressive methods that might force a cracker to need a new computer.

  • Blue Hat – If a Script Kiddie took revenge, he/she might become a Blue Hat. Blue Hat hackers will seek vengeance on those who’ve them angry. Most Blue Hats are n00bz, but like the Script Kiddies, they have no desire to learn.

There you have it. Thanks for reading.  

Free WiFi Is Not As Safe As You Think! - In Hindi

फ्री Wi-fi इस्तेमाल करें, लेकिन संभलकर स्मार्टफोन हो, टैबलेट या फिर लैपटॉप. Internet की सुविधा के बिना इन तीनों की उपयोगिता बेमानी लग...