Search This Blog

Thursday, November 30, 2017

What is Mac Address?? Mac Spoofing??

IP Address के बारे में शायद आप सभी को पता होगा, But MAC Address क्या है  इसके बारे में शायद काफी कम लोगो को पता  हो ,  अगर आपको भी MAC Address के बारे में नहीं पता है,  तो आज में आप सबको MAC Address के बारे में details से बताने वाला हूँ|

MAC Address Kya Hai?
MAC (Media Access Control) को Physical Address के नाम से भी जाना जाता है,
यह सभी Electronic & Networking Devices के लिए एक Unique & Parmanent Address होता है,
MAC किसी भी Devices (Computer, Printer, Router, Phone) के Hardware का Identiifcation Number होता है, यह 12 Digit का Hexa-decimal Number होता है, जो 2-2 के Pair में होता है|
कोई भी Electronic & Networking Device एक दुसरे से MAC को द्वारा ही Connect होते है और एक दुसरे से Communicate करते है|

Mac Address का use क्या है:
MAC  के वैसे तो बहुत से uses है, But मै आपको कुछ Common use के बारे में जानकारी देता हूँ..
.सबसे अच्छा उदाहरण हम आपके राऊटर Router का  ले सकते हे!
आपका ISP Internet service provider अपने सभी यूजर को एक ही mac एड्रेस देता है। आपके  राऊटर से कितने भी computer , Mobile phones, TV ,Gaming console या कोई भी wireless device कनेक्ट होते है ,
और मान लीजिये आपने अपने एक फ़ोन में कोई भी एक वेबसाइट खोली है। तब आपके राऊटर को कैसे पता चलेगा  की कोनसे कनेक्टेड device ने वेबसाइट खोलने का रेकुएस्ट की है ? ये ही समझने के लिए सभी  डिवाइस को एक अलग MAC एड्रेस दिया जाता है। जब भी आपका device राऊटर से कनेक्ट होता है तब वो अपना मैक MAC एड्रेस राऊटर से  शेयर करता है जिससे राऊटर को समझ में आता है की कोण से डिवाइस से रिक्वेस्ट रही हे? और क्या रेकुएस्ट कर रह है ?

2.अगर आपका Laptop कही खो जाता है, या चोरी हो जाता है तो ऐसे में आप MAC के द्वारा बहुत आसानी से अपने Laptop को Track कर सकते है|

3.अगर आपके पास Router है और किसको आपके Router का Password पता है, ऐसे में अगर आप चाहते हो की कोई  आपके Router से Connect ना कर पाए| तो ऐसे में आप MAC Address Filter ON करके उस particular फ़ोन या लैपटॉप को परमानेंट Block कर सकते है|
4.जब आप किसी ISPs का use करते है, तो ऐसे में जब आप Internet bill pay नहीं करते है| तो वह ISPs आपके MAC Address को Block कर देते है, जिससे आप Internet access नहीं कर पाते है|

MAC को check करने के लिए
Computer Laptop-
Simple command in cmd prompt
“ipconfig /all” या “getmac”

Android Phone में MAC Address check करने के लिए,
Phone के Setting में जाये, उसके बाद About Phone में जाये |
About Phone में “Status” option पर click करके Android Phone का MAC  check कर सकते है|

MAC Spoofing क्या होता है
“MAC Address Spoofing का मतलब होता है, किसी भी डिवाइस का ओरिजिनल Original identity number को चेंज करना यानि MAC अड्डेस को बदल देना।
दोस्तों MAC Address Change करना Legal है, आप अपने Computer, Phone का MAC Change कर सकते है.
But MAC Address Change करने के बाद, लोग जो activity (हैकिंग, ddos attack, )करते है, वो Illegal है 
Computer या Phone के MAC Address को change करने के बहुत से Tools & Software आते है, जिसके Help से बहुत आसानी के साथ MAC Address Spoofing कर सकते है|
एंड्राइड फ़ोन का MAC कैसे change करते है:
Android Phone के MAC Address को change करने के लिए पहले Phone को root करना पड़ता है, उसके बाद आपको Play Store पर ऐसे बहुत से App मिल जायेंगे| जिनके Help से आप एंड्राइड फ़ोन का MAC Address Change कर सकते है| जैसे की..
Computer का MAC change कैसे करे:
Laptop या Computer का MAC Address Change करने के लिए आप “Technitium MAC Changer” Software download करके बहुत आसानी के साथ अपने Computer का MAC change कर सकते है|
Conclusion:
दोस्तों इस पोस्ट में MAC & MAC Spoofing  के बारे में बताया गया है, उम्मीद है ये पोस्ट आपको पसंद आया होगा और आपके लिए Helpful रह होगा, अगर आपके पास इस पोस्ट के बारे में कोई भी सवाल या सुझाव हो, तो नीचे Comment करना ना भूले|



Add To Google BookmarksStumble ThisFav This With TechnoratiAdd To Del.icio.usDigg ThisAdd To RedditTwit ThisAdd To FacebookAdd To Yahoo

Monday, November 20, 2017

Step-by-step guide to read deleted text messages on WhatsApp

The 'delete for everyone' feature on WhatsApp has been cracked and now a user can read the text messages that were deleted by the sender. There are a couple of ways to retrieve deleted texts on Android phone and there are several limitations to the process as well.



When instant messaging app WhatsApp rolled out its newest feature ‘delete for everyone’, it seemed like the days of wrongly sent texts were over but no, there are loopholes in the feature. Apparently, even after the sender deletes a text, it still can be read by the recipient.A Spanish tech blog has cracked couple of ways to retrieve the deleted texts and they are plain simple. One can either do it from the phone settings or a dedicated app can be downloaded from PlayStore.
As per the Spanish blog, if the message sent by another user has generated a notification in the receiver’s handset then the message can be retrieved from the notification log of Android phone. But if the receiver was already in the chat with the sender or was active on WhatsApp then, in that case, there will no notification, hence the message cannot be recovered. So following are the two methods to recover the deleted message:


Method One
Go to Google PlayStore.
Download Notification History application.
After installing, open the app and tap the WhatsApp icon in it.
You can access all the Whatsapp texts there.


Method Two
Long press on the home screen of Android phone.
Select the Widgets option.
Scroll down to Settings widget in the list.
Drag the Settings widget on the home screen.
Multiple options will pop up and select notification history option.
Once the log is open, all the texts of WhatsApp can be seen, along with other details.


Things to know
Only texts can be retrieved and any other picture, audio or video messages will be permanently deleted.
If the user runs any cleaner on the phone then the messages cannot be recovered even from the notification log, because then they will be permanently deleted.
Upon recovery, only 100 characters will be visible out of the entire message.
The notification log can save the messages for a couple of hours, after that the messages cannot be recovered.

Add To Google BookmarksStumble ThisFav This With TechnoratiAdd To Del.icio.usDigg ThisAdd To RedditTwit ThisAdd To FacebookAdd To Yahoo

Tuesday, October 31, 2017

How to Block/Stop Cryptojacking Using Adblock

You probably read about how The Pirate Bay was testing out a new system that would dig into your CPU to fuel a cryptocurrency mining operation for itself. Maybe you’re cool with that. Probably you’re not.
If not, you can add a filter to Adblock Plus that will keep your computer from becoming a crypto-mule.
Just take these steps:
1. Go to your list of extensions, or click on the Adblock Plus stop sign.
2. Find Adblock Plus and click on Options.
3. Click the Add your own filters tab at the top. In the text field that appears, enter ||coin-hive.com/lib/coinhive.min.js
4. Click +Add Filter
You’re done!

Add To Google BookmarksStumble ThisFav This With TechnoratiAdd To Del.icio.usDigg ThisAdd To RedditTwit ThisAdd To FacebookAdd To Yahoo

What is cryptojacking?

What is cryptojacking?

Cryptojacking: Surprise, you’re mining cryptocurrency for a hacker!
 
Cryptojacking, also called in-browser mining, is using a computer’s resources to mine cryptocurrencies for others’ benefit. Cryptojacking is quite clever and has a distinct advantage over and virus-based mining malware in that nothing needs to be installed on the host computer for the attacker to set your computer to work.

Here’s how cryptojacking works

  1. A hacker gains control of a website
  2. Malicious JavaScript mining code is installed on web pages
  3. When visitors land on an infected web page, the Javascript is loaded into their web browser
  4. The JavaScript starts mining cryptocurrency leveraging the visitor’s computing resources and electricity
  5. Cryptocurrency coins, or tokens, are deposited into the hacker’s wallet

How it all started: Coinhive’s Monero script

The Pirate Bay caught Cryptojacking
The Pirate Bay was one of the first to cryptojack visitors.
A few weeks ago a company called Coinhive released JavaScript code that, when loaded by a web browser, could mine a cryptocurrency called Monero. The code, behaved just as outlined in the section above. Once installed, computers visiting infected pages of a web site would be put to task mining Monero with their CPU. CPU stands for Central Processing Unit. Normal humans refer to it as a processor. 

The script was quickly adopted by The Pirate Bay who later stated they installed the mining script to generate revenue without serving advertisements to site visitors. 

Why aren’t the hackers mining Bitcoin?

Hackers would make nearly nothing if they attempted to mine Bitcoin. Bitcoin’s algorithms require far more computing power than Monero.
Monero is a secure, private, and untraceable cryptocurrency. It is open-source and accessible to all. With Monero, you are your own bank. Only you control and are responsible for your funds. Your accounts and transactions are kept private from prying eyes.

The original script cited it’s selection of Monero because it can easily be mined by a computer’s CPU. Most cryptocurrencies are best mined with a computer’s graphics card

The Pirate Bay isn’t mainstream, but some infected sites are

It’s unclear how many websites have been coopted to stealthily mine cryptocurrencies, but it’s clearly beyond sites with pirated music and software. 
Since the release of Coinhive’s in-browser miner, several malicious scripts have surfaced on websites including PolitiFact, CBS’ Showtime and Real Madrid soccer star Cristiano Ronaldo’s official web site.

In-browser mining WordPress plugins

WordPress plugins including Coin Hive Ultimate Plugin and Simple Monero Miner. 
That’s right, WordPress site owners with zero coding experience can now easily add coin mining scripts to their websites, with or without the knowledge of site visitors.

How can you tell if you’re computer has been cryptojacked?

A slow or unresponsive computer
A hot or overheating computer

If you think you’re computer is mining, one thing you can do is to check your computer’s resource usage.

 Look at what applications are heavily using the CPU. If it’s the web browser you were surfing the web with this may confirm your fears.
If your CPU is highly tasked, but by anther hungry application, like Photoshop or video editing software, you’re probably not mining, but instead simply pushing your computer too hard. Try closing applications that are consuming large amounts of CPU power and see the computer starts responding normally again.

If your computer was cryptojacked. Here’s how to stop it.

If your computer is suffering from one of the above tell-tale signs when browsing the web, we recommend you take the following steps:
  1. Close your web browser – Since these malicious scripts are on webpages, closing your web browser should stop them in their tracks.
  2. Restart your computer – If you’ve closed your browser you’re probably safe, but we still recommend restarting your computer.
  3. Run a virus scan – Cryptojacking currently occurs when visiting websites, and hasn’t been found to put any code on your computer. But, just to be sure, we recommend running a virus scan for good measure.
That should take care of it, for now. If it doesn’t either things have evolved since writing this or your computer has a bigger problem.

Stopping in-browser mining before it starts


  • Block suspicious websites – Some browsers have built-in site blocking functionality where you can supply a list of sites you do not wish anyone on the computer to be able to visit. 
    • Others, like Google’s Chrome browser, don’t have built-in functionality and recommend third-party extensions such as Block Site. Either way, if you’ve found a website that you believe to be cryptojacking, block it.
  • Install ad blocking software – Some ad blocking software can stop cryptojacking. One specific ad blocker, AdGuard, has integrated CoinHive mining detection into their desktop software.
There is one option we aren’t going to recommend: disabling JavaScript. Yes, it would stop the mining dead in its tracks, but it would also make browsing most mainstream websites next to impossible.

Add To Google BookmarksStumble ThisFav This With TechnoratiAdd To Del.icio.usDigg ThisAdd To RedditTwit ThisAdd To FacebookAdd To Yahoo