Saturday, 4 March 2017

Hackers Can Hack Your Computer If It Has LED Lights


Well, we might have seen many techniques that are used by hackers to get control over your computer. However, hackers have just disclosed a new hack that gathers sensitive data from a computer’s tiny blinking LED lights.
Hackers can hack into your computer and can steal away sensitive information by injecting a malware. Israeli researchers have found an innovative hack that turns computer/laptop’s LED light into a signaling system that shows passwords and other data.
Researchers at the Ben-Gurion University of the Negev, Israel demonstrated the hack in a YouTube Video. The video clearly shows a hacked computer which is broadcasting sensitive data through computer’s LED light, with an air drone nearby reading the whole pattern.
Well, Air-gapped system is typically very hard to hack. Air-gapped computers carry highly confidential information or operate critical infrastructure. Researchers have demonstrated the hack just to show vulnerabilities of air-gapped systems.
The latest hack exploited the computer’s hard drive indicator, or you can say LED activity light for the hard disk drive, which is usually found on desktop PCs and laptops and blinks when memory is read or written.
Researchers have found that with the help of malware that was injected on the victim’s computer, they could control the LED light to emit binary signals by flashing on and off. Researchers claimed that data could be transferred at the speed of 4,000 bits per seconds.
Mordechai Guri, who led the research said in a statement “The hard drive LED flickers frequently, and therefore the user won’t be suspicious about changes in its activity,”. Now you all might be wondering about how to read the signals from the LED light, well the signals from the LED light can be recorded via camera or an optical sensor.
Researchers have used the drone which is placed 20 meters away from outside a building. They have managed to read the signal with an optical zoom lens. Well, this type of hacking attempt is not going to be easy because they’d have to design a malware that can control the LED light and needs to be placed on the air-gapped system which is usually heavily protected.
Moreover, hackers need to find a way to read the signals from the LED light. Which is again not easy. However, this type of attempts can be dodged easily, researchers have recommended that placing a piece of tape over the LED light can make things harder for hackers.
So, what do you think about this? Share your views in the comment section below.

Friday, 24 February 2017

How To Find If Someone Logged Into Your Windows PC At A Given Time

Login Credentials is one of three sorts of Identity Data. Login Credentials to a Managed System, as a rule, comprise of a User ID and secret key. Distinguishing proof may likewise utilize a PKI declaration, and Authentication may utilize Tokens or biometrics or an arrangement of individual inquiries that the client must reply. The other two sorts of Identity Data
  1. Personal Information
  2. Legal Information.

Access the Credential Manager

You can rapidly get to the Credential Manager in Windows 7 by tapping the Start catch and writing Credential in the Start Search exchange box. When you do, you’ll see Credential Manager show up in the outcomes board
  • You’ll see Credential Manager show up in the outcomes board.
On the other hand, you can discover the Credential Manager in the User Accounts and Family Safety segment of the Control Panel
  • Credential Manager can be found in the User Accounts and Family Safety area of the Control Panel.
In any case, when you dispatch the Credential Manager, you’ll see its window
  • Credential Manager is extremely easy to understand.
Credential types
The Credential Manager isolates the sorts of qualifications that it stores into three classifications: Windows Credentials, Certificate-Based Credentials, and Generic Credentials.
  • Windows Credentials are client names and passwords used to sign on to Windows-based system offers, Web destinations that utilization Windows Integrated Authentication, and Remote Desktop/Terminal Server Connections.
  • Certificate-Based Credentials are for keen cards and other comparable gadgets.
  • Generic Credentials are for outside applications that oversee approval isolate from the certifications of the at present signed on the client.

How To Find If Someone Logged Into Your Windows PC At A Given Time

The method is quite simple and easy, and you just need to follow some of the simple steps that we had discussed just right below.

Starting Event Viewer:

  1. To begin Event Viewer in your Windows 7 and 8.1, you have to tap the Start Button and open the Control Panel.
  2. Now discover the System and Maintenace alternative and tap on it. There, you’ll find Administrative Tool which will contain Event Viewer.
  3. On Windows 10, one can essentially sort Event Viewer in the desktop look box. On the other hand, one can utilize Windows+X+V key to dispatch the program.
Another approach to open the Event Viewer to discover on the off chance that somebody signed into your PC at a given time is by utilizing the Run discourse. To do this, press Windows+R key. It will run exchange. Presently sort Event Viewer and click OK. 

How to find if someone logged into your computer without permission?

  1. After opening Event Viewer on your Windows PC, you have to find Windows Logs > System.
    Find If Someone Logged Into Your Windows PC At A Given Time
    Find If Someone Logged Into Your Windows PC At A Given Time
  2. In the center sheet, this will open a rundown of the events that occurred when Windows framework was running.
  3. The events may take a few minutes to populate. Here, tap on any column in the center sheet to open another appear with the data about that specific occasion.
  4. Now, to see whether somebody logged into your PC, you have to sort this information.
  5. Click on the Filter Current Log catch in the correct sheet. Firstly, ensure that Event logs field demonstrates System.
    Find If Someone Logged Into Your Windows PC At A Given Time
    Find If Someone Logged Into Your Windows PC At A Given Time
  6. Secondly, ensure that User field demonstrates <All Users>.As appeared in the screenshot, enter occasion IDs 6005 and 6006 in the vacant field. This will channel the System occasions.
    Find If Someone Logged Into Your Windows PC At A Given Time
    Find If Someone Logged Into Your Windows PC At A Given Time
You can see the start-up and close-down time in the Date and Time segment. Here, Event ID 6005 signifies “The occasion log administration was begun” (i.e. start-up time), and 6006 signifies “The occasion log administration was halted” (i.e. closed down time).You can likewise utilize the Custom view alternative on the off chance that you wish to check this information consistently.

best cmd commands used for hacking

Here in this article, we are going to show you the list of best CMD commands which are used by hackers. Therefore, if you have just made a mind of becoming a hacker then you could learn to utilize these ten best CMD commands used in hacking.

#1 ping

This command uses your internet connection in order to send some packets of data to a specific web address then these packets are sent back to your PC. The test simply shows the amount of time it took to reach the specific address. In simple words, it helps you to know if the host you pinging is alive.
You can use Ping command whenever you need to verify that the host computer can connect to the TCP/IP network and its resources.
For example, you can type in Command prompt ping 8.8.8.8 which belongs to Google.
You can replace “8.8.8.8” to “www.google.com” or something else which you want to ping.

#2 nslookup

It is a network administration command-line tool which helps you to obtain domain name or IP address mapping for any specific DNS record. Suppose you have a website URL but want to know its IP Address, you can simply type in CMD
nslookup www.google.com (Replace Google.com with your website URL of which you want to find the IP address)

#3 tracert

You can say Trace Route like its name it allows users to trace the route than an IP packed has taken to reach a destination. The command calculates and displays the amount of time each hop took to reach a destination. You just need to type
tracert x.x.x.x (if you know the IP Address) or else you can type tracert www.google.com (If you don’t know the IP address)

#4 arp

This command helps you to modify ARP cache. You can run arp-a command on each computer to see whether the computers have the correct MAC address listed for each other to ping each other successfully on the same subnet.
This command also helps users to find out if anyone has done arp poisoning in their LAN.
You can try typing arp-a in command prompt.

#5 ipconfig

This is the command which shows every useful thing. It will show you IPv6 address, temporary IPv6 address, IPv4 address, Subnet Mask, Default gateway and all other things that you want to know.
You can type in command prompt “ipconfig” or “ipconfig/all”

#6 netstat

If you want to find out who is establishing a connection with your computer then you might try typing in command prompt “netstat -a” it will display all the connection and you will get to know about the active connections and listening ports.
Type in command prompt “netstat -a”

#7 Route

It is a command which is used to view and manipulate the IP routing table in Microsoft Windows operating system. This command will show you routing table, metric and interface.
You can type in command prompt “route print.”

#8 Net View

This command displays the whole list of resources, computers or domains that are shared by the specified computer.
You can type in command prompt “net view x.x.x.x or computername”

#9 Net User

Well, this command is used to modify changes to use accounts on a computer. You can add, remove users with the help of this command
You can use these commands while using net user
net user [<UserName> {<Password> | *} [<Options>]] [/domain] net user [<UserName> {<Password> | *} /add [<Options>] [/domain]] net user [<UserName> [/delete] [/domain]]

#10 Net Use

This command is been used to connect, remove and configure connections to shared resources like, network printers and other mapped drives. The use of this command is little bit complicated. So, we recommend you to visit the Microsoft site to get full details on how to use this command.
So, above are the 10 best CMD commands used in hacking. You can actually explore the lot more than this, we have listed 150+ CMD commands in one of our articles! I Hope you like the post! Share it with your friends too. Leave a comment below if you want to add any command in the list.

Tuesday, 24 January 2017

Top 30 Computer Tricks Every Geek Should Know

Things You need to know If you are not a Basic User of PC. If you are an Advanced user, you know mostly tricks. But here we collect tricks and I think you know most of them. Try these tricks in your PC and Be a Pro User.
Top 30 Computer Tricks Every Geek Should Know
Top 30 Computer Tricks Every Geek Should Know10 Cool YouTube Tricks Every User Should Know
Want More Life Hacks and Tricks:
31 Things You Know Only If You’ve Been Pro User
  1. Shift + Delete button combination  in Keyboard delete your file and folder permanently and you can’t recover it through Recycle bin.
    Shift + Delete Delete Your Files Permanently
    Shift + Delete Delete Your Files Permanently
  2.  Download Youtube Videos from Adding SS before youtube.com
    Download Youtube Video from Adding SS
    Download Youtube Video from Adding SS
  3. Install and update All Windows Software at one click from Ninite.
    Download All Windows at once from Ninite Installer
    Download All Windows at once from Ninite Installer
  4. Recover your deleted Data and files from Recuva Software.
    Recuva File Recovery Software for Windows
    Recuva File Recovery Software for Windows
  5. Speed up your PC from CCleaner software.
    Speed up Your from CCleaner
    Speed up Your from CCleaner
    Also Read: Best Feature in CCleaner Software for Speed up Your PC                                                                                   How to Speed up a Slow Computer 2015
  6. Convert all type of files like audio, video, documents, pictures from  into any formats from Zamzar.com .
    Zamzar File Converter
    Zamzar File Converter
  7. Download Facebook Backup Data from Facebook Website.  Open Facebook Settings and Download Copy of Your Facebook Data.
    Facebook Tricks 2015
    Facebook Backup Data
  8. Type like a hacker from Hackertyper website.
    Hackertyper for Make your Computer look like hacker
    Hacker typer for Make your Computer look like hacker
  9. Edit your Photos Like a pro from Autodesk Pixlr.
    Autodesk Pixlr Edit Photos Like a Pro
    Autodesk Pixlr Edit Photos Like a Pro
  10.  Control Your PC through RDP Connection from any android mobile.
    RDP App fpr Android
    RDP App for Android
  11. Calculate any values from searching on google.
    Google search calculator
    Google search calculator
  12. Listen to Free Music from Soundcloud.com .
    Listen Free Music SoundCloud
    Listen Free Music SoundCloud
  13.  See the Space in your Mobile from Starchart Android App
    Starchart Android App
    Starchart Android App
  14. Change the Color of your Windows Folder from Folder Colorizer.
    Folder Colorizer
    Folder Colorizer
  15. Enhance Your Windows Desktop from Rainmeter
    Iron-Man-Rainmeter-Skin
    Iron-Man-Rainmeter-Skin
  16. Edit PSD Files without installing Photoshop in Computer from Onlinephotoshopfree.net
    Online Photoshop
    Online Photoshop
  17. Save your Important Data on Cloud from Using Google Cloud Drive.
    Google Cloud Drive
    Google Cloud Drive
  18. Turn your Computer into a WiFi Hotspot and share internet connection with other devices. Download Mhotspot software or you can use command method.
    Windows-PC-Hotspot
    Windows-PC-Hotspot
  19. Kodi one of the best Media Player for any PC.
    Kodi Best Media Player for Windows
    Kodi Best Media Player for Windows
  20. Download Sumatra PDF Reader for windows(Only 4MB), Adobe Reader give you limited features and take lots of time in installing.
    Sumatra PDF Reader
    Sumatra PDF Reader
  21. Change the Login Screen Wallpaper from Windows Login Wallpaper Changer.
    Window 7 Login Background Changer
    Window 7 Login Background Changer
  22. Use DNS Changer software for increasing your internet speed.
    DNS Jumper for fast DNS
    DNS Jumper for fast DNS
  23. Turn your android mobile into mouse and keyboard from Unified App.
    Unified-Remote-App
    Unified-Remote-App
  24. Increase the Download Speed in Internet Download Manager from these IDM amazing Tricks.
    IDM Speed
    IDM Speed
  25. Get Ownership of any file in windows from simple registry hack.
    take ownership of files in windows
    Take ownership of files in windows
  26. Remove all program shortcuts and widgets from Window Desktop, increase your computer speed.
    A Clean Desktop Means A Faster Computer
    A Clean Desktop Means A Faster Computer
  27. Run android apps in windows from the Bluestack android app.
    Bluestacks Android App in Windows
    Bluestacks Android App in Windows
  28. Change the Password of Windows without Knowing Old Password.
    Change Password of Windows
    Change Password of Windows
  29. Unlock Window Computer from Your Android Smartphone. A new way of security can protect your PC from unidentified login.
    unlock pc from android phone
    unlock PC from android phone
  30. Increase the Size of Your HardDisk up to 2TB by Creating Virtual HardDisk
    Increase the Size of Harddisk
    Increase the Size of Harddisk
  31. How to Change Windows 7 Boot Screen Animation
    windows-custom-boot
    Windows-custom-boot