HOW TO PROTECT YOUR ACCOUNTS ONLINE

It seems like we store almost everything “in the cloud” these days–on social media networking sites, retail sites, or just in our webmail–but have little recourse when those sites become corrupted by forces outside of our control. Sure, keeping your info online is convenient and fast, but what extra precautions can you take to make sure you won’t be hurt by any unexpected hack attacks?

Don’t Access Accounts from WiFi Hotspots

Checking your e-mail or social media accounts from a hotel, cafe, or other unsecured WiFi hotspot probably isn’t the best idea, for the simple fact that determined hackers can easily access your personal information. Onguardonline.gov, a government website operated and maintained by the Federal Trade Commission, warns against logging into sites unless they’re fully encrypted. (Encrypted sites usually have https in front of the URL and a lock symbol to the right of the web address.) Hotspots with WPA (not WEP) encryption are probably your safest bet. And if you find yourself traveling with your notebook often, consider signing up for a paid hotspot network like Boingo or T-Mobile that automatically encrypts your sessions.

Delete Cookies

 
Cookies track your online activity and store information about your current session on a website. These are necessary for a short while, but if you allow a site to keep a cookie on your for a long time, it can track you even if you’re not on the website. Why is this dangerous? A malicious or malware-ridden site might be using cookies to track you. Delete your cookies selectively by going to your browser’s preferences and viewing them individually, deciding to “never” accept them, or only accepting them from sites you visit (not from third-parties and advertisers.)

Don’t Click On Links In Your E-Mails

One of the oldest phishing scams in the book involves sending a falsified “official” e-mail from a website (whether it’s your bank, a retailer like Amazon.com, or a service, like Skype) telling you to click an embedded link and enter or update your credit card information before “your account is disabled.” These e-mails typically have official-looking logos, and may contain identifying personal information about you that scammers found on networking sites. They might even appear to be from someone in your address book. Some direct you to a phone number, where a “representative” asks for private account or PIN number.
If you really are concerned about your account, type the URL to the site directly into your browser and login. It’s much safer to verify any messages that way.

SAFETY TIPS TO FOLLOW WHEN USING PUBLIC COMPUTERS



I know a lot of people who don’t have computers at home, but still go to the nearest cyber cafe to get things done online. However, these public computers, very so often, are highly infected with malicious programs. You’re actually putting your data and online accounts at high risk when you’re accessing them via a cyber cafe.
Keep the following tips in mind so that the next time you’re accessing the internet via a public centre, you can be more safe.

Avoid Keyloggers

Besides being a host to viruses and trojans, public computers are also homes to keyloggers – programs that monitor every keystroke you press, and probably even take screenshots and transmit them to hackers. Remember: every key that you press is being logged, so how do you prevent this from happening?
Thanks to Technospot.net, there’s a simple trick that can be used to efficiently fool keyloggers. What you have to do is this: enter a few characters in the passwords box, select them with your cursor, type the first letter of your real password. You repeat the first two steps, and then press the second letter.
Or there’s another better method: Get Nero SafeKeys. Put the .exe file in your USB Drive. Or download it when you’re in the public computer, and then do your job.
nerosafekeys
With Nero SafeKeys, you can efficiently avoid keyloggers in public computers – it’s an onscreen keyboard. You use your cursor to select the right characters, and then all of them appear in the Nero SafeKeys window (hidden in asterisks). You drag and drop them in the right field. This way, you didn’t enter a key, and nothing got logged.

With Nero SafeKeys, you can efficiently avoid keyloggers in public computers – it’s an onscreen keyboard. You use your cursor to select the right characters, and then all of them appear in the Nero SafeKeys window (hidden in asterisks). You drag and drop them in the right field. This way, you didn’t enter a key, and nothing got logged.

Use an alternative Browser

Alternative Browser

Avoid using Internet Explorer. Use an alternative browser. IE is more prone to malicious attacks than Firefox or Opera. If the computer you’re using has a browser other than IE installed, don’t forget to use it.
You can also get a portable version of Firefox (only a few computers have USB ports, so this might be useless sometimes) that runs from your portable disk. You can carry the customized version wherever you go.

Don’t store login information

login_information

When the browser asks you whether you want the passwords to be saved, immediately ignore. You don’t want your account to be accessible by others, do you?

Clear Cookies & History, Log Off

how_to_clear_history.png
Make sure you log off from all your online accounts before you leave the system. If you don’t sign out, any body else could misuse your account. Never forget to sign out.
Also, if you downloaded any important documents while browsing make sure you delete them as well.

Use a Live CD

live_cd

I’ve spoken about this before, but I want to stress this once again. Grab a Linux Distro ISO from here, burn it onto a CD. Pop it into the computer you’re on, and you have a whole new OS. So safe that you don’t have to care about the other methods I’ve mentioned above.
Everything is read only, so you don’t leave a trace. And moreover, viruses don’t attack Linux the way they’re widespread in Windows, so it’s guaranteed that you’re very much safe.
But not all cyber cafes these days give access to CD Drives though. Some of them even have stripped down PCs that have very less RAM so this is something that you can’t rely on.

HIDE FOLDERS IN NOKIA/JAVA PHONES WITHOUT SOFTWARE



Have you ever wanted to hide folders in your phone? If yes,there here is very interesting solution for you to hide folders in your phone without the need of any software.This trick can be used for phone from Nokia,Samsung,Motorola,LG or any other company.The only requirement is that your phone should support java which almost all mobile phones support now .

So,If your phone support java then here is the Trick Hide Folders in Nokia / Java phones without software.

Create any new folder or you can use any existing folder that is to be hidden.

Rename the folder to any name but with the extension of .jad like if I want to hide my images folder then I will name it as images.jad
Now create a new folder with the same name in the same directory but with the extension of .jar So, I would create the folder with the name images.jar
And thats it!! My orignal images folder which has been renamed with .jad gets hidden and only folder with.jar extension is visible which is empty.So,my data is protected/hidden from unwanted eyes.
Now ,we have to learn how to open these hidden folders.So here is the trick to open these hidden folders in Mobile phones

To unhide the orignal folder you have to remove the .jar extension from the new folder and your orignal folder with all the files and with .jad will become visible.

AS SIMPLE AS THAT!!

HACK FACEBOOK/TWITTER OR ANY E-MAIL ACCOUNT

Session Hijacking

When logging into a website you usually start by submitting your username and password. The server then checks to see if an account matching this information exists and if so, replies back to you with a "cookie" which is used by your browser for all subsequent requests. It's extremely common for websites to protect your password by encrypting the initial login, but surprisingly uncommon for websites to encrypt everything else. This leaves the cookie (and the user) vulnerable. HTTP sessionhijacking (sometimes called "sidejacking") is when an attacker gets a hold of a user's cookie, allowing them to do anything the user can do on a particular website. On an open wireless network, cookies are basically shouted through the air, making these attacks extremely easy.
This is a widely known problem that has been talked about to death, yet very popular websites continue to fail at protecting their users. The only effective fix for this problem is full end-to-end encryption, known on the web as HTTPS or SSL. Facebook is constantly rolling out new "privacy" features in an endless attempt to quell the screams of unhappy users, but what's the point when someone can just take over an account entirely? Twitter forced all third party developers to use OAuth then immediately released (and promoted) a new version of their insecure website. When it comes to user privacy, SSL is the elephant in the room. Firesheep, a Firefox extension designed to demonstrate just how serious this problem is. After installing the extension you'll see a new sidebar. Connect to any busy open wifi network and click the big "Start Capturing" button. Then wait. As soon as anyone on the network visits an insecure website known to Firesheep, their name and photo will be displayed: Double-click on someone, and you're instantly logged in as them. That's it.Firesheep is free, open source, and is available now for Mac OS X and Windows. Linux support is on the way. Websites have a responsibility to protect the people who depend on their services. They've been ignoring this responsibility for too long, and it's time for everyone to demand a more secure web. My hope is that Firesheep will help the users win.
 

CREATE YOUR OWN SEARCH ENGINE

1. Open website from Here

2. Enter your Search Engine name

3. Select style as per u like

4. Click on create my Search Engine

5. Finally you got your own Search Engine

Note: Actually mechanism is there that you have only replace Google name with your own rest of remains same.

CREATE AND SEND FAKE SMS TO YOUR OWN MOBILE FREE (EVEN IN OFFLINE MODE)

How about creating any message (From any name and number you choose) in your (Or any other) mobile and send it to your own inbox and that too without any network and operator (In offline mode, no SIM required)??? Impossible? No, actually it is easier than sending a real SMS. This is called a fake SMS, a prank that will astonish even an unaware mobile expert. Sometimes for fun and sometimes to make someone believe something, this trick is awesome.
So to get started, you need to have Active File installed in your Symbian S60 phone (Download from HERE). Active File is a free file explorer app (Just like X-Plore and FExplorer) for Symbian mobiles (All editions and versions). Besides, Active File can do a whole lot of other things as well. Now to create and send a fake SMS, run Active File and go to "Options/Tools/Create Fake SMS" (Here you can set parameters like sender’s name, mobile number, text of message, date, time, number of times sms will be sent, set as read status and target folder (Inbox, Outbox, sent, draft). Fill the required fields and go to “Options/Create”, simple and yo!!! Your message tone will ring up the next moment (Or at the set time) and a “genuine” SMS (That you just created yourself) will flash as a “1 new message”. There is no way theses messages can be distinguished from other SMSes. Now time to have some fun with your friends.
 NOTE: This app is available only for Symbian S60 phones (S60v2, 3 and 5), so no luck for other OS phones (Java, Windows mobile, iPhone, Blackberry, Android etc).  "

Hotmail finally gets ActiveSync feature

After a long wait Microsoft has provided ActiveSync support in Hotmail. This feature enables you to keep updated with latest email updates from any mobile platform like Android, Windows Mobile, iPhone etc. This feature can be availed by using push mail service.Push mail service with ActiveSync makes it possible for users to get the latest mails instantly on their mobile devices. Apart from inbox mails it also synchronizes any updates in Contacts and Calender.
The push support has been enabled using Exchange ActiveSync and it can be enabled on mobile devices by keeping server address to m.hotmail.com in Exchange ActiveSync option of mobile devices.