Search This Blog

Thursday, November 30, 2017

What is Mac Address?? Mac Spoofing??

IP Address ą¤•ą„‡ ą¤¬ą¤¾ą¤°ą„‡ ą¤®ą„‡ą¤‚ ą¤¶ą¤¾ą¤Æą¤¦ ą¤†ą¤Ŗ ą¤øą¤­ą„€ ą¤•ą„‹ ą¤Ŗą¤¤ą¤¾ ą¤¹ą„‹ą¤—ą¤¾, But MAC Address ą¤•ą„ą¤Æą¤¾ ą¤¹ą„ˆ  ą¤‡ą¤øą¤•ą„‡ ą¤¬ą¤¾ą¤°ą„‡ ą¤®ą„‡ą¤‚ ą¤¶ą¤¾ą¤Æą¤¦ ą¤•ą¤¾ą¤«ą„€ ą¤•ą¤® ą¤²ą„‹ą¤—ą„‹ ą¤•ą„‹ ą¤Ŗą¤¤ą¤¾  ą¤¹ą„‹ ,  ą¤…ą¤—ą¤° ą¤†ą¤Ŗą¤•ą„‹ ą¤­ą„€ MAC Address ą¤•ą„‡ ą¤¬ą¤¾ą¤°ą„‡ ą¤®ą„‡ą¤‚ ą¤Øą¤¹ą„€ą¤‚ ą¤Ŗą¤¤ą¤¾ ą¤¹ą„ˆ,  ą¤¤ą„‹ ą¤†ą¤œ ą¤®ą„‡ą¤‚ ą¤†ą¤Ŗ ą¤øą¤¬ą¤•ą„‹ MAC Address ą¤•ą„‡ ą¤¬ą¤¾ą¤°ą„‡ ą¤®ą„‡ą¤‚ details ą¤øą„‡ ą¤¬ą¤¤ą¤¾ą¤Øą„‡ ą¤µą¤¾ą¤²ą¤¾ ą¤¹ą„‚ą¤|

MAC Address Kya Hai?
MAC (Media Access Control) ą¤•ą„‹ Physical Address ą¤•ą„‡ ą¤Øą¤¾ą¤® ą¤øą„‡ ą¤­ą„€ ą¤œą¤¾ą¤Øą¤¾ ą¤œą¤¾ą¤¤ą¤¾ ą¤¹ą„ˆ,
ą¤Æą¤¹ ą¤øą¤­ą„€ Electronic & Networking Devices ą¤•ą„‡ ą¤²ą¤æą¤ ą¤ą¤• Unique & Parmanent Address ą¤¹ą„‹ą¤¤ą¤¾ ą¤¹ą„ˆ,
MAC ą¤•ą¤æą¤øą„€ ą¤­ą„€ Devices (Computer, Printer, Router, Phone) ą¤•ą„‡ Hardware ą¤•ą¤¾ Identiifcation Number ą¤¹ą„‹ą¤¤ą¤¾ ą¤¹ą„ˆ, ą¤Æą¤¹ 12 Digit ą¤•ą¤¾ Hexa-decimal Number ą¤¹ą„‹ą¤¤ą¤¾ ą¤¹ą„ˆ, ą¤œą„‹ 2-2 ą¤•ą„‡ Pair ą¤®ą„‡ą¤‚ ą¤¹ą„‹ą¤¤ą¤¾ ą¤¹ą„ˆ|
ą¤•ą„‹ą¤ˆ ą¤­ą„€ Electronic & Networking Device ą¤ą¤• ą¤¦ą„ą¤øą¤°ą„‡ ą¤øą„‡ MAC ą¤•ą„‹ ą¤¦ą„ą¤µą¤¾ą¤°ą¤¾ ą¤¹ą„€ Connect ą¤¹ą„‹ą¤¤ą„‡ ą¤¹ą„ˆ ą¤”ą¤° ą¤ą¤• ą¤¦ą„ą¤øą¤°ą„‡ ą¤øą„‡ Communicate ą¤•ą¤°ą¤¤ą„‡ ą¤¹ą„ˆ|

Mac Address ą¤•ą¤¾ use ą¤•ą„ą¤Æą¤¾ ą¤¹ą„ˆ:
MAC  ą¤•ą„‡ ą¤µą„ˆą¤øą„‡ ą¤¤ą„‹ ą¤¬ą¤¹ą„ą¤¤ ą¤øą„‡ uses ą¤¹ą„ˆ, But ą¤®ą„ˆ ą¤†ą¤Ŗą¤•ą„‹ ą¤•ą„ą¤› Common use ą¤•ą„‡ ą¤¬ą¤¾ą¤°ą„‡ ą¤®ą„‡ą¤‚ ą¤œą¤¾ą¤Øą¤•ą¤¾ą¤°ą„€ ą¤¦ą„‡ą¤¤ą¤¾ ą¤¹ą„‚ą¤..
ą„§.ą¤øą¤¬ą¤øą„‡ ą¤…ą¤šą„ą¤›ą¤¾ ą¤‰ą¤¦ą¤¾ą¤¹ą¤°ą¤£ ą¤¹ą¤® ą¤†ą¤Ŗą¤•ą„‡ ą¤°ą¤¾ą¤Šą¤Ÿą¤° Router ą¤•ą¤¾  ą¤²ą„‡ ą¤øą¤•ą¤¤ą„‡ ą¤¹ą„‡!
ą¤†ą¤Ŗą¤•ą¤¾ ISP Internet service provider ą¤…ą¤Ŗą¤Øą„‡ ą¤øą¤­ą„€ ą¤Æą„‚ą¤œą¤° ą¤•ą„‹ ą¤ą¤• ą¤¹ą„€ mac ą¤ą¤”ą„ą¤°ą„‡ą¤ø ą¤¦ą„‡ą¤¤ą¤¾ ą¤¹ą„ˆą„¤ ą¤†ą¤Ŗą¤•ą„‡  ą¤°ą¤¾ą¤Šą¤Ÿą¤° ą¤øą„‡ ą¤•ą¤æą¤¤ą¤Øą„‡ ą¤­ą„€ computer , Mobile phones, TV ,Gaming console ą¤Æą¤¾ ą¤•ą„‹ą¤ˆ ą¤­ą„€ wireless device ą¤•ą¤Øą„‡ą¤•ą„ą¤Ÿ ą¤¹ą„‹ą¤¤ą„‡ ą¤¹ą„ˆ ,
ą¤”ą¤° ą¤®ą¤¾ą¤Ø ą¤²ą„€ą¤œą¤æą¤Æą„‡ ą¤†ą¤Ŗą¤Øą„‡ ą¤…ą¤Ŗą¤Øą„‡ ą¤ą¤• ą„žą„‹ą¤Ø ą¤®ą„‡ą¤‚ ą¤•ą„‹ą¤ˆ ą¤­ą„€ ą¤ą¤• ą¤µą„‡ą¤¬ą¤øą¤¾ą¤‡ą¤Ÿ ą¤–ą„‹ą¤²ą„€ ą¤¹ą„ˆą„¤ ą¤¤ą¤¬ ą¤†ą¤Ŗą¤•ą„‡ ą¤°ą¤¾ą¤Šą¤Ÿą¤° ą¤•ą„‹ ą¤•ą„ˆą¤øą„‡ ą¤Ŗą¤¤ą¤¾ ą¤šą¤²ą„‡ą¤—ą¤¾  ą¤•ą„€ ą¤•ą„‹ą¤Øą¤øą„‡ ą¤•ą¤Øą„‡ą¤•ą„ą¤Ÿą„‡ą¤” device ą¤Øą„‡ ą¤µą„‡ą¤¬ą¤øą¤¾ą¤‡ą¤Ÿ ą¤–ą„‹ą¤²ą¤Øą„‡ ą¤•ą¤¾ ą¤°ą„‡ą¤•ą„ą¤ą¤øą„ą¤Ÿ ą¤•ą„€ ą¤¹ą„ˆ ? ą¤Æą„‡ ą¤¹ą„€ ą¤øą¤®ą¤ą¤Øą„‡ ą¤•ą„‡ ą¤²ą¤æą¤ ą¤øą¤­ą„€  ą¤”ą¤æą¤µą¤¾ą¤‡ą¤ø ą¤•ą„‹ ą¤ą¤• ą¤…ą¤²ą¤— MAC ą¤ą¤”ą„ą¤°ą„‡ą¤ø ą¤¦ą¤æą¤Æą¤¾ ą¤œą¤¾ą¤¤ą¤¾ ą¤¹ą„ˆą„¤ ą¤œą¤¬ ą¤­ą„€ ą¤†ą¤Ŗą¤•ą¤¾ device ą¤°ą¤¾ą¤Šą¤Ÿą¤° ą¤øą„‡ ą¤•ą¤Øą„‡ą¤•ą„ą¤Ÿ ą¤¹ą„‹ą¤¤ą¤¾ ą¤¹ą„ˆ ą¤¤ą¤¬ ą¤µą„‹ ą¤…ą¤Ŗą¤Øą¤¾ ą¤®ą„ˆą¤• MAC ą¤ą¤”ą„ą¤°ą„‡ą¤ø ą¤°ą¤¾ą¤Šą¤Ÿą¤° ą¤øą„‡  ą¤¶ą„‡ą¤Æą¤° ą¤•ą¤°ą¤¤ą¤¾ ą¤¹ą„ˆ ą¤œą¤æą¤øą¤øą„‡ ą¤°ą¤¾ą¤Šą¤Ÿą¤° ą¤•ą„‹ ą¤øą¤®ą¤ ą¤®ą„‡ą¤‚ ą¤†ą¤¤ą¤¾ ą¤¹ą„ˆ ą¤•ą„€ ą¤•ą„‹ą¤£ ą¤øą„‡ ą¤”ą¤æą¤µą¤¾ą¤‡ą¤ø ą¤øą„‡ ą¤°ą¤æą¤•ą„ą¤µą„‡ą¤øą„ą¤Ÿ ą¤† ą¤°ą¤¹ą„€ ą¤¹ą„‡? ą¤”ą¤° ą¤•ą„ą¤Æą¤¾ ą¤°ą„‡ą¤•ą„ą¤ą¤øą„ą¤Ÿ ą¤•ą¤° ą¤°ą¤¹ ą¤¹ą„ˆ ?

2.ą¤…ą¤—ą¤° ą¤†ą¤Ŗą¤•ą¤¾ Laptop ą¤•ą¤¹ą„€ ą¤–ą„‹ ą¤œą¤¾ą¤¤ą¤¾ ą¤¹ą„ˆ, ą¤Æą¤¾ ą¤šą„‹ą¤°ą„€ ą¤¹ą„‹ ą¤œą¤¾ą¤¤ą¤¾ ą¤¹ą„ˆ ą¤¤ą„‹ ą¤ą¤øą„‡ ą¤®ą„‡ą¤‚ ą¤†ą¤Ŗ MAC ą¤•ą„‡ ą¤¦ą„ą¤µą¤¾ą¤°ą¤¾ ą¤¬ą¤¹ą„ą¤¤ ą¤†ą¤øą¤¾ą¤Øą„€ ą¤øą„‡ ą¤…ą¤Ŗą¤Øą„‡ Laptop ą¤•ą„‹ Track ą¤•ą¤° ą¤øą¤•ą¤¤ą„‡ ą¤¹ą„ˆ|

3.ą¤…ą¤—ą¤° ą¤†ą¤Ŗą¤•ą„‡ ą¤Ŗą¤¾ą¤ø Router ą¤¹ą„ˆ ą¤”ą¤° ą¤•ą¤æą¤øą¤•ą„‹ ą¤†ą¤Ŗą¤•ą„‡ Router ą¤•ą¤¾ Password ą¤Ŗą¤¤ą¤¾ ą¤¹ą„ˆ, ą¤ą¤øą„‡ ą¤®ą„‡ą¤‚ ą¤…ą¤—ą¤° ą¤†ą¤Ŗ ą¤šą¤¾ą¤¹ą¤¤ą„‡ ą¤¹ą„‹ ą¤•ą„€ ą¤•ą„‹ą¤ˆ  ą¤†ą¤Ŗą¤•ą„‡ Router ą¤øą„‡ Connect ą¤Øą¤¾ ą¤•ą¤° ą¤Ŗą¤¾ą¤| ą¤¤ą„‹ ą¤ą¤øą„‡ ą¤®ą„‡ą¤‚ ą¤†ą¤Ŗ MAC Address Filter ON ą¤•ą¤°ą¤•ą„‡ ą¤‰ą¤ø particular ą„žą„‹ą¤Ø ą¤Æą¤¾ ą¤²ą„ˆą¤Ŗą¤Ÿą„‰ą¤Ŗ ą¤•ą„‹ ą¤Ŗą¤°ą¤®ą¤¾ą¤Øą„‡ą¤‚ą¤Ÿ Block ą¤•ą¤° ą¤øą¤•ą¤¤ą„‡ ą¤¹ą„ˆ|
4.ą¤œą¤¬ ą¤†ą¤Ŗ ą¤•ą¤æą¤øą„€ ISPs ą¤•ą¤¾ use ą¤•ą¤°ą¤¤ą„‡ ą¤¹ą„ˆ, ą¤¤ą„‹ ą¤ą¤øą„‡ ą¤®ą„‡ą¤‚ ą¤œą¤¬ ą¤†ą¤Ŗ Internet bill pay ą¤Øą¤¹ą„€ą¤‚ ą¤•ą¤°ą¤¤ą„‡ ą¤¹ą„ˆ| ą¤¤ą„‹ ą¤µą¤¹ ISPs ą¤†ą¤Ŗą¤•ą„‡ MAC Address ą¤•ą„‹ Block ą¤•ą¤° ą¤¦ą„‡ą¤¤ą„‡ ą¤¹ą„ˆ, ą¤œą¤æą¤øą¤øą„‡ ą¤†ą¤Ŗ Internet access ą¤Øą¤¹ą„€ą¤‚ ą¤•ą¤° ą¤Ŗą¤¾ą¤¤ą„‡ ą¤¹ą„ˆ|

MAC ą¤•ą„‹ check ą¤•ą¤°ą¤Øą„‡ ą¤•ą„‡ ą¤²ą¤æą¤
Computer Laptop-
Simple command in cmd prompt
ā€œipconfig /allā€ ą¤Æą¤¾ ā€œgetmacā€

Android Phone ą¤®ą„‡ą¤‚ MAC Address check ą¤•ą¤°ą¤Øą„‡ ą¤•ą„‡ ą¤²ą¤æą¤,
Phone ą¤•ą„‡ Setting ą¤®ą„‡ą¤‚ ą¤œą¤¾ą¤Æą„‡, ą¤‰ą¤øą¤•ą„‡ ą¤¬ą¤¾ą¤¦ About Phone ą¤®ą„‡ą¤‚ ą¤œą¤¾ą¤Æą„‡ |
About Phone ą¤®ą„‡ą¤‚ ā€œStatusā€ option ą¤Ŗą¤° click ą¤•ą¤°ą¤•ą„‡ Android Phone ą¤•ą¤¾ MAC  check ą¤•ą¤° ą¤øą¤•ą¤¤ą„‡ ą¤¹ą„ˆ|

MAC Spoofing ą¤•ą„ą¤Æą¤¾ ą¤¹ą„‹ą¤¤ą¤¾ ą¤¹ą„ˆ
ā€œMAC Address Spoofing ą¤•ą¤¾ ą¤®ą¤¤ą¤²ą¤¬ ą¤¹ą„‹ą¤¤ą¤¾ ą¤¹ą„ˆ, ą¤•ą¤æą¤øą„€ ą¤­ą„€ ą¤”ą¤æą¤µą¤¾ą¤‡ą¤ø ą¤•ą¤¾ ą¤“ą¤°ą¤æą¤œą¤æą¤Øą¤² Original identity number ą¤•ą„‹ ą¤šą„‡ą¤‚ą¤œ ą¤•ą¤°ą¤Øą¤¾ ą¤Æą¤¾ą¤Øą¤æ MAC ą¤…ą¤”ą„ą¤”ą„‡ą¤ø ą¤•ą„‹ ą¤¬ą¤¦ą¤² ą¤¦ą„‡ą¤Øą¤¾ą„¤
ą¤¦ą„‹ą¤øą„ą¤¤ą„‹ą¤‚ MAC Address Change ą¤•ą¤°ą¤Øą¤¾ Legal ą¤¹ą„ˆ, ą¤†ą¤Ŗ ą¤…ą¤Ŗą¤Øą„‡ Computer, Phone ą¤•ą¤¾ MAC Change ą¤•ą¤° ą¤øą¤•ą¤¤ą„‡ ą¤¹ą„ˆ.
But MAC Address Change ą¤•ą¤°ą¤Øą„‡ ą¤•ą„‡ ą¤¬ą¤¾ą¤¦, ą¤²ą„‹ą¤— ą¤œą„‹ activity (ą¤¹ą„ˆą¤•ą¤æą¤‚ą¤—, ddos attack, )ą¤•ą¤°ą¤¤ą„‡ ą¤¹ą„ˆ, ą¤µą„‹ Illegal ą¤¹ą„ˆ 
Computer ą¤Æą¤¾ Phone ą¤•ą„‡ MAC Address ą¤•ą„‹ change ą¤•ą¤°ą¤Øą„‡ ą¤•ą„‡ ą¤¬ą¤¹ą„ą¤¤ ą¤øą„‡ Tools & Software ą¤†ą¤¤ą„‡ ą¤¹ą„ˆ, ą¤œą¤æą¤øą¤•ą„‡ Help ą¤øą„‡ ą¤¬ą¤¹ą„ą¤¤ ą¤†ą¤øą¤¾ą¤Øą„€ ą¤•ą„‡ ą¤øą¤¾ą¤„ MAC Address Spoofing ą¤•ą¤° ą¤øą¤•ą¤¤ą„‡ ą¤¹ą„ˆ|
ą¤ą¤‚ą¤”ą„ą¤°ą¤¾ą¤‡ą¤” ą„žą„‹ą¤Ø ą¤•ą¤¾ MAC ą¤•ą„ˆą¤øą„‡ change ą¤•ą¤°ą¤¤ą„‡ ą¤¹ą„ˆ:
Android Phone ą¤•ą„‡ MAC Address ą¤•ą„‹ change ą¤•ą¤°ą¤Øą„‡ ą¤•ą„‡ ą¤²ą¤æą¤ ą¤Ŗą¤¹ą¤²ą„‡ Phone ą¤•ą„‹ root ą¤•ą¤°ą¤Øą¤¾ ą¤Ŗą„œą¤¤ą¤¾ ą¤¹ą„ˆ, ą¤‰ą¤øą¤•ą„‡ ą¤¬ą¤¾ą¤¦ ą¤†ą¤Ŗą¤•ą„‹ Play Store ą¤Ŗą¤° ą¤ą¤øą„‡ ą¤¬ą¤¹ą„ą¤¤ ą¤øą„‡ App ą¤®ą¤æą¤² ą¤œą¤¾ą¤Æą„‡ą¤‚ą¤—ą„‡| ą¤œą¤æą¤Øą¤•ą„‡ Help ą¤øą„‡ ą¤†ą¤Ŗ ą¤ą¤‚ą¤”ą„ą¤°ą¤¾ą¤‡ą¤” ą„žą„‹ą¤Ø ą¤•ą¤¾ MAC Address Change ą¤•ą¤° ą¤øą¤•ą¤¤ą„‡ ą¤¹ą„ˆ| ą¤œą„ˆą¤øą„‡ ą¤•ą„€..
Computer ą¤•ą¤¾ MAC change ą¤•ą„ˆą¤øą„‡ ą¤•ą¤°ą„‡:
Laptop ą¤Æą¤¾ Computer ą¤•ą¤¾ MAC Address Change ą¤•ą¤°ą¤Øą„‡ ą¤•ą„‡ ą¤²ą¤æą¤ ą¤†ą¤Ŗ ā€œTechnitium MAC Changerā€ Software download ą¤•ą¤°ą¤•ą„‡ ą¤¬ą¤¹ą„ą¤¤ ą¤†ą¤øą¤¾ą¤Øą„€ ą¤•ą„‡ ą¤øą¤¾ą¤„ ą¤…ą¤Ŗą¤Øą„‡ Computer ą¤•ą¤¾ MAC change ą¤•ą¤° ą¤øą¤•ą¤¤ą„‡ ą¤¹ą„ˆ|
Conclusion:
ą¤¦ą„‹ą¤øą„ą¤¤ą„‹ą¤‚ ą¤‡ą¤ø ą¤Ŗą„‹ą¤øą„ą¤Ÿ ą¤®ą„‡ą¤‚ MAC & MAC Spoofing  ą¤•ą„‡ ą¤¬ą¤¾ą¤°ą„‡ ą¤®ą„‡ą¤‚ ą¤¬ą¤¤ą¤¾ą¤Æą¤¾ ą¤—ą¤Æą¤¾ ą¤¹ą„ˆ, ą¤‰ą¤®ą„ą¤®ą„€ą¤¦ ą¤¹ą„ˆ ą¤Æą„‡ ą¤Ŗą„‹ą¤øą„ą¤Ÿ ą¤†ą¤Ŗą¤•ą„‹ ą¤Ŗą¤øą¤‚ą¤¦ ą¤†ą¤Æą¤¾ ą¤¹ą„‹ą¤—ą¤¾ ą¤”ą¤° ą¤†ą¤Ŗą¤•ą„‡ ą¤²ą¤æą¤ Helpful ą¤°ą¤¹ ą¤¹ą„‹ą¤—ą¤¾, ą¤…ą¤—ą¤° ą¤†ą¤Ŗą¤•ą„‡ ą¤Ŗą¤¾ą¤ø ą¤‡ą¤ø ą¤Ŗą„‹ą¤øą„ą¤Ÿ ą¤•ą„‡ ą¤¬ą¤¾ą¤°ą„‡ ą¤®ą„‡ą¤‚ ą¤•ą„‹ą¤ˆ ą¤­ą„€ ą¤øą¤µą¤¾ą¤² ą¤Æą¤¾ ą¤øą„ą¤ą¤¾ą¤µ ą¤¹ą„‹, ą¤¤ą„‹ ą¤Øą„€ą¤šą„‡ Comment ą¤•ą¤°ą¤Øą¤¾ ą¤Øą¤¾ ą¤­ą„‚ą¤²ą„‡|



Add To Google BookmarksStumble ThisFav This With TechnoratiAdd To Del.icio.usDigg ThisAdd To RedditTwit ThisAdd To FacebookAdd To Yahoo

Monday, November 20, 2017

Step-by-step guide to read deleted text messages on WhatsApp

The 'delete for everyone' feature on WhatsApp has been cracked and now a user can read the text messages that were deleted by the sender. There are a couple of ways to retrieve deleted texts on Android phone and there are several limitations to the process as well.



When instant messaging app WhatsApp rolled out its newest feature ā€˜delete for everyoneā€™, it seemed like the days of wrongly sent texts were over but no, there are loopholes in the feature. Apparently, even after the sender deletes a text, it still can be read by the recipient.A Spanish tech blog has cracked couple of ways to retrieve the deleted texts and they are plain simple. One can either do it from the phone settings or a dedicated app can be downloaded from PlayStore.
As per the Spanish blog, if the message sent by another user has generated a notification in the receiverā€™s handset then the message can be retrieved from the notification log of Android phone. But if the receiver was already in the chat with the sender or was active on WhatsApp then, in that case, there will no notification, hence the message cannot be recovered. So following are the two methods to recover the deleted message:


Method One
Go to Google PlayStore.
Download Notification History application.
After installing, open the app and tap the WhatsApp icon in it.
You can access all the Whatsapp texts there.


Method Two
Long press on the home screen of Android phone.
Select the Widgets option.
Scroll down to Settings widget in the list.
Drag the Settings widget on the home screen.
Multiple options will pop up and select notification history option.
Once the log is open, all the texts of WhatsApp can be seen, along with other details.


Things to know
Only texts can be retrieved and any other picture, audio or video messages will be permanently deleted.
If the user runs any cleaner on the phone then the messages cannot be recovered even from the notification log, because then they will be permanently deleted.
Upon recovery, only 100 characters will be visible out of the entire message.
The notification log can save the messages for a couple of hours, after that the messages cannot be recovered.

Add To Google BookmarksStumble ThisFav This With TechnoratiAdd To Del.icio.usDigg ThisAdd To RedditTwit ThisAdd To FacebookAdd To Yahoo

Tuesday, October 31, 2017

How to Block/Stop Cryptojacking Using Adblock

You probably read about how The Pirate Bay was testing out a new system that would dig into your CPU to fuel a cryptocurrency mining operation for itself. Maybe youā€™re cool with that. Probably youā€™re not.
If not, you can add a filter to Adblock Plus that will keep your computer from becoming a crypto-mule.
Just take these steps:
1. Go to your list of extensions, or click on the Adblock Plus stop sign.
2. Find Adblock Plus and click on Options.
3. Click the Add your own filters tab at the top. In the text field that appears, enter ||coin-hive.com/lib/coinhive.min.js
4. Click +Add Filter
Youā€™re done!

Add To Google BookmarksStumble ThisFav This With TechnoratiAdd To Del.icio.usDigg ThisAdd To RedditTwit ThisAdd To FacebookAdd To Yahoo

What is cryptojacking?

What is cryptojacking?

Cryptojacking: Surprise, youā€™re mining cryptocurrency for a hacker!
 
Cryptojacking, also called in-browser mining, is using a computerā€™s resources to mine cryptocurrencies for othersā€™ benefit. Cryptojacking is quite clever and has a distinct advantage over and virus-based mining malware in that nothing needs to be installed on the host computer for the attacker to set your computer to work.

Hereā€™s how cryptojacking works

  1. A hacker gains control of a website
  2. Malicious JavaScript mining code is installed on web pages
  3. When visitors land on an infected web page, the Javascript is loaded into their web browser
  4. The JavaScript starts mining cryptocurrency leveraging the visitorā€™s computing resources and electricity
  5. Cryptocurrency coins, or tokens, are deposited into the hackerā€™s wallet

How it all started: Coinhiveā€™s Monero script

The Pirate Bay caught Cryptojacking
The Pirate Bay was one of the first to cryptojack visitors.
A few weeks ago a company called Coinhive released JavaScript code that, when loaded by a web browser, could mine a cryptocurrency called Monero. The code, behaved just as outlined in the section above. Once installed, computers visiting infected pages of a web site would be put to task mining Monero with their CPU. CPU stands for Central Processing Unit. Normal humans refer to it as a processor. 

The script was quickly adopted by The Pirate Bay who later stated they installed the mining script to generate revenue without serving advertisements to site visitors. 

Why arenā€™t the hackers mining Bitcoin?

Hackers would make nearly nothing if they attempted to mine Bitcoin. Bitcoinā€™s algorithms require far more computing power than Monero.
Monero is a secure, private, and untraceable cryptocurrency. It is open-source and accessible to all. With Monero, you are your own bank. Only you control and are responsible for your funds. Your accounts and transactions are kept private from prying eyes.

The original script cited itā€™s selection of Monero because it can easily be mined by a computerā€™s CPU. Most cryptocurrencies are best mined with a computerā€™s graphics card

The Pirate Bay isnā€™t mainstream, but some infected sites are

Itā€™s unclear how many websites have been coopted to stealthily mine cryptocurrencies, but itā€™s clearly beyond sites with pirated music and software. 
Since the release of Coinhiveā€™s in-browser miner, several malicious scripts have surfaced on websites including PolitiFact, CBSā€™ Showtime and Real Madrid soccer star Cristiano Ronaldoā€™s official web site.

In-browser mining WordPress plugins

WordPress plugins including Coin Hive Ultimate Plugin and Simple Monero Miner. 
Thatā€™s right, WordPress site owners with zero coding experience can now easily add coin mining scripts to their websites, with or without the knowledge of site visitors.

How can you tell if youā€™re computer has been cryptojacked?

A slow or unresponsive computer
A hot or overheating computer

If you think youā€™re computer is mining, one thing you can do is to check your computerā€™s resource usage.

 Look at what applications are heavily using the CPU. If itā€™s the web browser you were surfing the web with this may confirm your fears.
If your CPU is highly tasked, but by anther hungry application, like Photoshop or video editing software, youā€™re probably not mining, but instead simply pushing your computer too hard. Try closing applications that are consuming large amounts of CPU power and see the computer starts responding normally again.

If your computer was cryptojacked. Hereā€™s how to stop it.

If your computer is suffering from one of the above tell-tale signs when browsing the web, we recommend you take the following steps:
  1. Close your web browser ā€“ Since these malicious scripts are on webpages, closing your web browser should stop them in their tracks.
  2. Restart your computer ā€“ If youā€™ve closed your browser youā€™re probably safe, but we still recommend restarting your computer.
  3. Run a virus scan ā€“ Cryptojacking currently occurs when visiting websites, and hasnā€™t been found to put any code on your computer. But, just to be sure, we recommend running a virus scan for good measure.
That should take care of it, for now. If it doesnā€™t either things have evolved since writing this or your computer has a bigger problem.

Stopping in-browser mining before it starts


  • Block suspicious websites ā€“ Some browsers have built-in site blocking functionality where you can supply a list of sites you do not wish anyone on the computer to be able to visit. 
    • Others, like Googleā€™s Chrome browser, donā€™t have built-in functionality and recommend third-party extensions such as Block Site. Either way, if youā€™ve found a website that you believe to be cryptojacking, block it.
  • Install ad blocking software ā€“ Some ad blocking software can stop cryptojacking. One specific ad blocker, AdGuard, has integrated CoinHive mining detection into their desktop software.
There is one option we arenā€™t going to recommend: disabling JavaScript. Yes, it would stop the mining dead in its tracks, but it would also make browsing most mainstream websites next to impossible.

Add To Google BookmarksStumble ThisFav This With TechnoratiAdd To Del.icio.usDigg ThisAdd To RedditTwit ThisAdd To FacebookAdd To Yahoo