Posts

Showing posts from September, 2017

Security Vulnerability in McDonald's India allows hackers to access Customer data

If you are from India and have ordered Burger in McDonald's, your personal details are at risk. Security researchers from  Fallible foung a serious vulnerability  McDonald’s India application that allows hackers to access millions of customer data. There is no authentication or authorization check in API used in the application.   Sending request to "http://services.mcdelivery.co.in/ProcessUser.svc/GetUserProfile" with customer id in the header allows to access customer details. The customer id is a sequential number.  All an attacker needs to do is create a script and increase the number to dump all customer data. "The lack of strong data protection and privacy laws or penalties in India, unlike the European Union , United States or Singapore has led to companies ignoring user data protection" The researcher said. "We have in the past discovered more than 50 instances of data leaks in several Indian organizations." The researcher said. The vul...

Ukrainian CyberPolice arrested the spreader of PETYA RANSOMWARE

Image
Ukrainian CyberPolice arrest the Hacker Ukrainian officers from cyber crime department have arrested a 51-year-old resident of Nikopol (Ukraine, Dnipropetrovsk region), who is suspected of spreading computer virus "Petya.A". Petya is a ransomware that infects the Master boot Record(MBR). If the malware successfully infectes the MBR, it will encrypt the whole hard drive. Otherwise, it encrypts all files. According to the local news report  the suspect published an online tutorial video explaining how to use the "Petya.A" malware to infect victim's computers. In the comments section, he also shared a link to social network on which he has uploaded the malware and distributed. The police have conducted a search at the residence of the suspect. They have seized the computer equipments and found malicious software which is similare to the "Petya.A". The malware is said to be infected more than 400 computers. Also a number of companies inte...

Why Python Programming Language is very useful for Hackers?

Programming is one of the most important skills of a hacker. When someone wants to become a hacker, he/she has to be a good programmer. But, what is the best programming language for hackers to begin with? Although, It is very important to have basic knowledge of every programming language still you have to master in a particular language. For that purpose, Python is the most popular programming language among hackers. Why is Python Programming Language very useful for Hackers? When you start learning the core of hacking, Python is great. With a giant standard library and a packaging system that puts prebuilt tools and frameworks at your fingertips, it is often very easy to hack something into existence. 1. Python is an Object-Oriented programming Object oriented programming approach is the most popular approach for software development. It uses classes and objects to create models based on the real world environment. Object-oriented Programming makes it eas...

Why Python Programming Language is very useful for Hackers?

Programming is one of the most important skills of a hacker. When someone wants to become a hacker, he/she has to be a good programmer. But, what is the best programming language for hackers to begin with? Although, It is very important to have basic knowledge of every programming language still you have to master in a particular language. For that purpose, Python is the most popular programming language among hackers. Why is Python Programming Language very useful for Hackers? When you start learning the core of hacking, Python is great. With a giant standard library and a packaging system that puts prebuilt tools and frameworks at your fingertips, it is often very easy to hack something into existence. 1. Python is an Object-Oriented programming Object oriented programming approach is the most popular approach for software development. It uses classes and objects to create models based on the real world environment. Object-oriented Programming makes it eas...

How to Reset Your Windows Local Admin Login Password !

 By Command Prompt Note: Most computers do not have administrator passwords by default when you open it in safe mode. This method will not work if it’ll ask you administrator password during safe mode.  Enter safe mode by restarting your computer by pressing F8 and then go to “Advanced Boot Options”. Then it will show you three options out of them you have to select Safe Mode with Command prompt. When you see Windows boots up choose Administrator. Press Windows button and type run or by holding windows button and press r then run command will open on the computer. In run, you have to type cmd.exe and a Command prompt pops up and then type net user and press Enter. For example, you have to remove login user “sun” then type “net user sun” then press Enter three times. You can change all the accounts password and also an administrative local password also. When the command is completed successful, the new password has been successfully reset. Then restart your comput...

How to Reset Your Windows Local Admin Login Password

 By Command Prompt Note: Most computers do not have administrator passwords by default when you open it in safe mode. This method will not work if it’ll ask you administrator password during safe mode.  Enter safe mode by restarting your computer by pressing F8 and then go to “Advanced Boot Options”. Then it will show you three options out of them you have to select Safe Mode with Command prompt. When you see Windows boots up choose Administrator. Press Windows button and type run or by holding windows button and press r then run command will open on the computer. In run, you have to type cmd.exe and a Command prompt pops up and then type net user and press Enter. For example, you have to remove login user “sun” then type “net user sun” then press Enter three times. You can change all the accounts password and also an administrative local password also. When the command is completed successful, the new password has been successfully reset. Then restart your comput...

How to Reset Your Windows Local Admin Login Password

 By Command Prompt Note: Most computers do not have administrator passwords by default when you open it in safe mode. This method will not work if it’ll ask you administrator password during safe mode.  Enter safe mode by restarting your computer by pressing F8 and then go to “Advanced Boot Options”. Then it will show you three options out of them you have to select Safe Mode with Command prompt. When you see Windows boots up choose Administrator. Press Windows button and type run or by holding windows button and press r then run command will open on the computer. In run, you have to type cmd.exe and a Command prompt pops up and then type net user and press Enter. For example, you have to remove login user “sun” then type “net user sun” then press Enter three times. You can change all the accounts password and also an administrative local password also. When the command is completed successful, the new password has been successfully reset. Then restart your comput...

How Google displays Search results?

PageRank Page rank is the relevancy score or authority score that Google assigns to a website depending on various factors in its own trademark algorithm. PageRank is like the result of voting system. When you get link from some other website, Google considers it as that website has voted for you, so higher the number of unique and relevant (anchor text and voting website content somewhat matching to your blog/webpage topics) votes, higher is the PageRank that you can expect. But you should remember, every vote is not equal, it isn’t like democracy! Thus, ‘link quantity’ is counted but at the same time the weightage of the link source is also counted in the Google PageRank algorithms. We would go into details of the PageRank concept in the upcoming articles. In Links In links are actually the links you get from the owners of other web sites. You can either contact to other site owners to submit your site or request the link from them or you can write or create such an attracti...

What is Android Rooting? Is it safe to Root android ?

Most people root their Android device is to rid of the bloatware that’s impossible to uninstall. Some people don’t like handset built-in firmware and their Rom. Their rom sometimes includes unnecessary apps which you don’t use. Rooting your phone will make your phone much faster as it is free from unnecessary built-in apps. Moreover, you’ll be able to set up wireless tethering option which is disabled by default in your handset. Some other benefits include the ability to install special apps and custom ROMs. Every custom ROM can add extra features and streamline your phone or tablet’s performance. Many people are tempted by the ability to completely customize the look of their phones. There is an option to manually accept or deny app permissions. There are some great apps that won’t work without rooting. For example, some apps allow you to automatically backup all of your apps and all of their data, make secure tunnels to the Internet, totally block advertisements, make your device ...

WHAT IS A SERVER ? SERVER TYPES ???

What is a Server? A server is a device with a particular set of programs or protocols that provide various services, which other machines or clients request, to perform certain tasks. Together, a server and its clients form a client/server network, which provides routeing systems and centralised access to information, resources, stored data, etc. At the most ground level, one can consider it as a technology solution that serves files, data, print, fax resources and multiple computers. The advanced server versions, like Windows Small Business Server 2003 R2 enable the user to handle the accounts and passwords, allow or limit the access to shared resources, automatically support the data and access the business information remotely. For example, a file server is a machine that maintains files and allows clients or users to upload and download files from it. Similarly, a web server hosts websites and allows users to access these websites. Clients mainly include computers, printers, f...

5 Best Ways to Use Linux inside Windows OS

1. Wubi Wubi is an official installer for Windows users that allows Ubuntu to be installed and uninstalled in a safe, easy way as any other Windows application. Wubi installs the latest stable release of Ubuntu on your Windows system. Wubi does not work on any new PC with the Windows 8 logo or using UEFI firmware.Use a 64-bit version of Ubuntu, installed directly to its own partition instead. Downloading and Installation of Wubi : Download Wubi from the Ubuntu Windows Installer Download page; this will provide you with the latest version. You can download other versions of the Ubuntu from pages on releases.ubuntu.com  look for wubi.exe at the bottom of the page. Installation : Run Wubi. Insert a password for the new account, adjust the disc space and click on ”install” button The installation process from this point on is fully automatic. The installation files (approximately 700MB) will be downloaded and checked. Now you will be asked to reboot your...

5 Best Ways to Use Linux inside Windows OS

1. Wubi Wubi is an official installer for Windows users that allows Ubuntu to be installed and uninstalled in a safe, easy way as any other Windows application. Wubi installs the latest stable release of Ubuntu on your Windows system. Wubi does not work on any new PC with the Windows 8 logo or using UEFI firmware.Use a 64-bit version of Ubuntu, installed directly to its own partition instead. Downloading and Installation of Wubi : Download Wubi from the Ubuntu Windows Installer Download page; this will provide you with the latest version. You can download other versions of the Ubuntu from pages on releases.ubuntu.com  look for wubi.exe at the bottom of the page. Installation : Run Wubi. Insert a password for the new account, adjust the disc space and click on ”install” button The installation process from this point on is fully automatic. The installation files (approximately 700MB) will be downloaded and checked. Now you will be asked to reboot your...