Sunday, April 18, 2010

How ID Thieves see what you type

A Closer Look at Malicious Keyloggers:

Part of iolo's ongoing series exposing malicious software
With iolo's Security Spotlight series, you can read about the various malicious programs that infect computers, destroy data and steal personal information, and get some valuable pointers on how to protect yourself.
Knowledge is power—knowing more about what the high-tech vandals are up to can give you a powerful defense against their tactics.
This part of the series takes a closer look at a stealthy type of malware often used in financial cybercrimes, keyloggers.


 

 

 

 

 

What is a keylogger?

A keylogger, also called a keystroke logger, captures all of the keystrokes you make on your keyboard. A criminal can see your passwords, bank account information, credit card numbers, personal email and instant messaging conversations—any and every thing that you type is covertly captured.
How it works is that as you type, all of your keystrokes are saved to a small file that is then silently sent to an email address, web site or waiting server. The hacker can then sift through the data, pull out all the private information needed to access your financial accounts and begin the theft.
A little history
Early keyloggers were designed for legitimate monitoring purposes, such as for parents wishing to track their children's computer activity (and legitimate keyloggers—software that is intentionally and knowingly installed—are still in use today). However, it didn't take long for criminals to see the potential of this technology; malicious keyloggers first began to appear in the early 1990s.
Keyloggers of today
Today's malicious files are more and more often being designed with a profit motive, and keyloggers are a perfect example of this growing trend—the creators of modern keyloggers don't want to destroy data or cause havoc; they just want to steal money.
Some infamous keyloggers
  • From 2005 to 2006, a large criminal ring in Brazil captured people's bank user IDs and passwords through the use of keyloggers. Before the group of 55 thieves was caught and arrested, an estimated $4.7 million was stolen from 200 different accounts.
  • In 2005, Joe Lopez, the owner of a small computer supply company in Florida, sued his bank after hackers stole $90,000 from his business account through the use of a keylogger. Initially the bank refused to return the stolen money, asserting that the theft was due to a security breach of Lopez's computer, not the bank's. The case was eventually settled out of court.

Where do keyloggers come from?

To install keyloggers, cyber criminals typically exploit the tools we use to communicate over the web: email, instant messaging and social networking sites are the most common ways these malicious programs are distributed. The thieves send attachments or links that, if clicked, install the keylogger. Keyloggers are also often hidden inside of malicious trojans—and it's easy to be tricked into installing a trojan because it disguises itself as program that serves a beneficial purpose. (Click here to read more about trojans.)
Another common source of keylogger infections are peer-to-peer (P2P) file-sharing networks. These networks allow users to share their own digital content and download the content of others, but unfortunately hackers often use P2P networks to "share" keyloggers and other malware that appear to be useful but in reality are very dangerous.

What do keyloggers do?

Keyloggers are designed to steal—your login credentials, your personal data, and ultimately your money. Once your name and login information are known, it's easy for hackers to begin the theft; keylogger-based crimes typically involve setting up wire transfers from people's back accounts or making online purchases with stolen credit card numbers.
While other types of malware can waste system resources, conflict with valid programs and generally just slow your PC down, keyloggers are much more stealthy and are designed to hide themselves unobtrusively: you can't tell when a keylogger is installed. The infiltration may only be discovered when mysterious charges appear on your credit card or your bank account is emptied.

How you can protect yourself

  • Think before you click. Many keyloggers are sent through email, social networking postings and instant messages. And the more sophisticated criminals know better than to use an unknown name—often these malicious messages will arrive under the guise of someone you know. Avoid the temptation to be "click happy": think before you click and if anything looks a little off, check with your contact to make sure they sent it to you.
  • Be cautious of peer-to-peer sites. There are dozens of file-sharing networks out there that offer free access to files. And every one of them is full of keyloggers, viruses and every other form of malware that exists. Either avoid these sites or use them with caution: you're not getting something for free if your bank account ends up getting wiped out.
  • Use anti-malware software. Even with the most diligent preventative measures, malware can still find its way onto your computer. Install and run anti-malware software and turn on the program's "real-time" feature: this will detect and block a keylogger from sending information from your computer.

How System Shield® can protect you

iolo's System Shield® protects your PC from all types of malicious files: keyloggers as well as dozens of other types of malware. Some highlights of System Shield:

Flexible options for scans System Shield's malware scans can run automatically when your computer isn't being used—you don't have to think about it—and you also can run scans whenever you want to: a smart choice for after you download files.

Automated protection 2 ways For total peace of mind, System Shield offers two automated protection features:
  • Real-time is an invisible form of protection that runs quietly behind-the-scenes to check files as they're opened, changed, moved, copied, and saved—a critical defense against malware silently making changes to your PC.
  • Email protection automatically scans email messages and attachments before they're received or sent—both you and the people you communicate with are protected.

Safe quarantine System Shield's Quarantine is a safe holding area that gives you total control over suspicious files. The Quarantine prevents infections from causing any damage, but still allows you to keep the files you know are safe.

Up-to-date malware definitions Old definition files can't protect you against the most recent attacks—and the criminals come up with newly designed malware every day. System Shield updates its definitions in real-time as threats emerge, sometimes even 8-10 times in a single day, based on the latest research from iolo Labs.

 

Thursday, April 15, 2010

How to Get Blood in Emergency

God could not be everywhere; so He made mothers.












Now it has become easier to get the blood we need.

All you have to do is just type "BLOOD and send SMS to 96000 97000" (in India )

EX: "BLOOD B+"

A BLOOD DONOR WILL CALL YOU!!

So please pass this message to all. It certainly would save many lives.

It's a Must to Know & Share. Do it now....

Forward this to all your friends whom you care ....as the minute you spare to share this information can save somebody's life with rare Blood Group!

Sunday, April 4, 2010

Can I Borrow Rs.25/-?

Can I Borrow Rs.25/-?


A woman came home from work late, tired and irritated, to find her 5-year old son waiting for her at the door.

SON: 'Mummy, may I ask you a question?'

MUM: 'Yeah sure, what it is?' replied the woman.

SON: 'Mummy, how much do you make an hour?'

MUM: 'That's none of your business. Why do you ask such a thing?' the woman said angrily.
SON: 'I just want to know. Please tell me, how much do you make an hour?'

MUM: 'If you must know, I make Rs. 50 an hour.'

SON: 'Oh,' the little boy replied, with his head down.

SON: 'Mummy, may I please borrow Rs.25?'

The mother was furious, 'If the only reason you asked that is so you can borrow some money to buy a silly toy or some other nonsense, then you march yourself straight to your room and go to bed. Think about why you are being so selfish. I don't work hard everyday for such childish frivolities.'

The little boy quietly went to his room and shut the door..

The woman sat down and started to get even angrier about the little boy's questions. How dare he ask such questions only to get some money?

After about an hour or so, the woman had calmed down , and started to think:

Maybe there was something he really needed to buy with that Rs.25.00 and he really didn't ask for money very often.The woman went to the door of the little boy's room and opened the door.

'Are you asleep, son?' She asked.

'No Mummy, I'm awake,' replied the boy.

'I've been thinking, maybe I was too hard on you earlier' said the woman. 'It's been a long day and I took out my aggravation on you. Here's the Rs.25 you asked for.'

The little boy sat straight up, smiling. 'Oh, thank you Mummy!' he yelled. Then, reaching under his pillow he pulled out some crumpled up bills.

The woman saw that the boy already had money, started to get angry again.

The little boy slowly counted out his money, and then looked up at his mother.

'Why do you want more money if you already have some?' the mother grumbled.

'Because I didn't have enough, but now I do,' the little boy replied.

'Mummy, I have Rs.50 now. Can I buy an hour of your time? Please come home early tomorrow. I would like to have dinner with you.'

The mother was crushed. She put his arms around her little son, and she begged for his forgiveness.

It's just a short reminder to all of you working so hard in life. We should not let time slip through our fingers without having spent some time with those who really matter to us, those close to our hearts. Do remember to share that Rs.50 worth of your time with someone you love.

If we die tomorrow, the company that we are working for could easily replace us in a matter of hours. But the family & friends we leave behind will feel the loss for the rest of their lives.

Saturday, March 20, 2010

About the Film The Bicycle Thief

The Bicycle Thief is a 1948 Italian neorealist film directed by Vittorio De Sica. It tells the story of a poor man searching the streets of Rome for his stolen bicycle, which he needs to be able to work. The film is based on the novel of the same name by Luigi Bartolini and was adapted for the screen by Cesare Zavattini. It stars Lamberto Maggiorani as the poor man searching for his lost bicycle and Enzo Staiola as his son.

The film is frequently on critics' and directors' lists of the best films ever made. It was given an Academy Honorary Award in 1950, and, just four years after its release, was deemed the greatest film of all time by the magazine Sight & Sound's poll of filmmakers and critics in 1952. The film placed sixth as the greatest ever made in Sight & Sound's latest directors' poll, conducted in 2002.

The film tells the story of Antonio Ricci, an unemployed man in the depressed post-World War II economy of Italy. With no money and a wife and two children to support, he is desperate for work. He is delighted to at last get a good job hanging up posters, but on the sole condition that he has a bicycle which must be used for work. He is told unequivocally: "No bicycle, no job." His wife Maria pawns their bedsheets in order to get money to redeem his bicycle from the pawnbroker.

Early on in the film, Ricci's coveted bicycle is stolen by a bold young thief who snatches it when he is hanging up a poster.

Antonio thinks that the police will take the theft very seriously, but they are not really interested in the petty theft of a bike. The only option is for Antonio and his friends to walk the streets of Rome themselves, looking for the bicycle. After trying for hours with no luck, they finally give up and leave.

Desperate for leads and with his better judgement clouded, Antonio even visits the dubious backstreet fortune teller that he had earlier mocked, in the hope that she may be able to shed light upon the bike's whereabouts. However, she merely doles out to him one of the truisms that form her stock in trade: "you'll find the bike quickly, or not at all." Feeling cheated, a crestfallen Antonio hands over to her some of the last money that they have. After a rare treat of a meal in a restaurant, Antonio admits to his son that if he isn't able to work, they will simply starve.

Antonio finally manages to locate the thief (who, it seems, had already sold the bicycle) and Bruno slips off to summon the police to the apartment. Antonio meanwhile, angrily accuses the thief of stealing his bike but the boy denies all knowledge of the crime. When the policeman arrives, he sees the accused boy lying on the floor feigning a seizure and surrounded by irate neighbours who blame Antonio's accusations for causing the "innocent" boy's fit.

The policeman tells Antonio that although he may have seen the boy stealing the bike, he did not catch the thief red-handed, nor has he any witnesses and that Antonio making an accusation is not good enough. With no proof and with the thief's neighbours willing to give him a false alibi, he abandons his cause. Antonio walks away from the house in despair, as the thief's neighbours follow, jeering at him about his lost bicycle.

At the end of the film in one of the most resonant scenes, Antonio is sitting on the curb outside the packed football stadium. He looks at the hundreds and hundreds of bicycles that are parked outside the stadium and as he cradles his head in despair, a fleet of bicycles mockingly speeds past him.

After vacillating for some time about whether to steal one for himself, he decides he has no other option but to snatch one that he spots outside an apartment. Unluckily, he is seen taking the bike and caught by a crowd of angry men who slap and humiliate him in front of his son. Ironically, this time with an army of witnesses who catch him, he is frogmarched off to the police station but after seeing how upset Bruno is, the owner of the bicycle declines to press charges.

The film ends with the boy and his son, sad and let down from what has just happened, they walk along in a crowd, leaving us with a dim outlook for the two. Holding hands, they both a reduced to tears.

Saturday, February 27, 2010

Block a website in all browsers

How to Block A Website in All Web Browsers


This action will require you to edit your Host file. Your host file is a computer file used to store information on where to find a node on a computer network. . 
In Windows XP
1. Click Start->All Programs->Accessories->Command Prompt.
2. Click Command Prompt This will open a DOS command window.
3. Type: notepad C:/Windows/System32/drivers/etc/hosts
4. Locate the line 127.0.0.1 localhost
5. To block the website google.com for example, just add this text under 127.0.0.1 localhost:

127.0.0.1 google.com
127.0.0.1 www.google.com
You can add as many sites any site, However you will need to prefix it with "127.0.0.1".

6. Save the file
Google will now be blocked in all web browser. This is an advanced but easy method on how to blow a website.

Another Way to do it

You can use any internet filtering softwares such as "Block Web Site Buddy" to accomplish this task.Download Block web site buddy from here Download
Congratulations to Sachin Tendulkar for scoring the first double century(200 Not out from 147 balls) in One Day Internationals..!!!Carry on your form to the next World cup!!

Saturday, January 16, 2010

Shahrukh-Salman ceasefire


The animosity between SRK and Salman Khan has by now become one of the accepted facts in the industry. But, all this is going to change now if the latest behavior between the two Khans' is taken into account.

In a bid to strike friendship with SRK again, Salman Khan recently called up SRK's best friend Karan Johar in order to congratulate him for the promos of MY NAME IS KHAN. It's known that Salman Khan really liked the promos of the film and wasted no time to make it a tool to strike friendship with the SRK camp once again.

In return SRK too seized the moment and praised Salman's upcoming film VEER. Thus both stars hinting at ending all hostilities. Though, SRK and Salman have not spoken directly to each other after their famous spat on Katrina's Birthday party, but it seems that the two Khans' are gradually ironing out their differences.

Well, let's hope the old friendship between the two gets a new leash of life in this New Year.

Sunday, October 4, 2009

Utility to clear Cookies Temporary Internet Files Temp files Windows History etc.

History Cleaner :: Utility to clear Reent Documents, TEMP files, Cookies and More.... Wih a Single Mouse Click!!


Welcome to My History Cleaner utility.This uilty will help you to clear the following history items in your system.
Internet Explorer Typed URL
Current User Temp Files
Recent Documents
Cookies
Temporary Internet Files
Start Menu..Run
Windows History
Windows Temp Folder
Windows File Search

Installation/Uninstallation:
Basically there is no installation required. Just Run 'HistClean.exe'and the executable will create a folder under the Program files called HistClean and the History Cleaner.exe(The Main executable)will be extracted to that folder.
For Uninstallation, just remove the HistClean Dirctory mentioned above and that's it.


Getting Started:
Run HistClean.EXE. You'll be presented with a Message Box to read the help file.Click yes to read it.Or no to run the Main executable(History Cleaner.exe).
By Clicking the System Tray icon, you may quit this utility or click the close Button to quit.
You don't need to run HistClean.exe more than once.HistClean.exe is only an extractor of the main executable and it's associated files to the Program Files folder.


You may download my program from here.Please click the following link to download it.
Download HistClean
Download Histclean