Tuesday, 14 May 2013

HIDE TEXT BEHIND IMAGE

STEGNOGRAPHY

Hello friends and welcome to my new post today i will tell you how you can hide the message or text behind any image, if you want good security and you want that nobody can interpret your message except the desired person this method is called stenography this is a method to hide your personal message behind the image so no one can see it.

1. First of all download image hide software its a freeware for hide a text in a image.

2. Download Image hide , image hide is very simple tool you can download it by searching goggle now you have to load the image in which you want to hide your text, type the text and hit the write data option, you can also password protect the text  so that it can only be opened by entering the password.

Wednesday, 1 May 2013

How to know Antivirus is working or not

Welcome guess today i will tell the method by which you can check that your antivirus is working properly or not. Antivirus plays an important role for protecting our computer it's like a Gatekeeper or Watchman who protects our house or colony from thief's same like antivirus protects our computers from viruses and hackers and you must know that your antivirus is working properly.

First of all open notepad and select new document.txt  & type below codes :-

X50!P%@AP[4\PZX54(P^)7CC)] $EICAR-networkstraining-file!$H+H*

Now save it in the notepad on your desktop & now Rename it change it name from new document.txt to networkstraining.com

Now open this file on your pc if your antivirus detect it as virus it's mean your antivirus is working properly if not you should change your antivirus...

PHISHING

What is Phishing ?
Phishing is an attemp to criminally and fraudulently acquire sensitive information such as username, password and credit card details, by appearing as a trustworthy entity in an electronic communication Amazon, Paypal & etc. are common target. Phishing is typically done by emails or instant messaging & often direct user to enter details at a website, phone contacts can also used. Phishing is an example of social engineering techniques used to make fool the users and attempts to deal with growing number of reported, like if some one wants to hack your facebook account password with the help of phishing so first he make the fake page of Facebook which exactly same like facebook & make a php file then upload it to any web hosting websites then send that link to you by email, or by messaging & ask you to enter your username & password u will think that this is a facebook real page & u will enter your user name & password but in real you are not entering your user name password on facebook page but you are entering username & password on hacker's fake Facebook page and your user name & password will be store in txt. file & goes to hacker, so beware from phishing never reply such type of emails, or messages , always check the U.R.L like if your entering facebook user name & password so check the U.R.L (website address) that it should be http://www.facebook.com or not http://www.fecabook.com or anything .

Monday, 8 April 2013

Basic about computer virus & worms

Virus

A virus (Vital information under seize) is a self replication programs that attaches itself it on executiable file in executed the virus automatically gets executed and enter into the system memory. Once it enters into the system memory it either searches for other file that can be infected or stays in background and infect the file that are uses the virus infected programs.

WORMS

Worms are very similar to viruses but differ in way that they don't bind themselves they uses the network if we find excessive use of our networks bandwidth then we may be infected by a worm, so a worm don't require a  user to execute any file for it execution.