Thursday, October 30, 2014

Remove Shortcut Virus permanently from your Computer


Shortcut virus has become a common problem in almost all the computer users. actually its not a virus its a VBS Script. To get rid of this problem  You have to do some simple task on your computer system. so here's some method>>>>

Using CMD

1. Open CMD (Command Prompt – DOS, go to start then search cmd)
2. Type the command word foe word

attrib -h -s -r -a /s /d DriveName:*.*

Now Type the drive letter which you want to delete the short cut virus in stead of DriveName For example: if you want to make virus free C drive then it will be :  attrib -h -s -r -a /s /d c:*.*
3. Hit the Enter button
4. So you'll see that your computer is back to normal now.

Using .bat

Bat file is a executable file that is written in notepad. once it is cliked it will start its action.

1. Open Notepad
2. Copy this code :

@echo off
attrib -h -s -r -a /s /d 
attrib -h -s -r -a /s /d DriveName:*.*
attrib -h -s -r -a /s /d DriveName:*.*
@echo complete.

3. Now Type the drive letter which you want to delete the short cut virus in stead of DriveName 
4. Give this file's name removevirus.bat and save it in your convenient place of your PC
5. Now close the file and open it by double click
6. Now Your Computer is virus free (*not all kind of virus*)

To save from victimised pendrive

1. Go to RUN
2. Type wscript.exe  then press ENTER
3. Type 1 in  Stop script after specified number of seconds: and then APPLY .

To save victimised PC

1. Type CTRL+SHIFT+ESC from your keyboard
2. Go to PROCESS tab
3. Select wscript.exe file
4. Click End Process
5. Now Go to C:/ drive on your computer
6. search wscript in search box
7. SHIFT+DELETE all the file named wscript
8. skip those file which are not deleting
9. Now go to RUN
2. Type wscript.exe  then press ENTER
3. Type in  Stop script after specified number of seconds: and then APPLY .

Thats it! Now your computer is free from ShortCut Virus!

Monday, October 20, 2014

Brute-Force Attacks Explained: How All Encryption is Vulnerable

Brute-force attacks are fairly simple to understand, but difficult to protect against. Encryption is math, and as computers become faster at math, they become faster at trying all the solutions and seeing which one fits.
These attacks can be used against any type of encryption, with varying degrees of success. Brute-force attacks become faster and more effective with each passing day as newer, faster computer hardware is released.

Brute-Force Basics

Brute-force attacks are simple to understand. An attacker has an encrypted file — say, yourLastPass or KeePass password database. They know that this file contains data they want to see, and they know that there’s an encryption key that unlocks it. To decrypt it, they can begin to try every single possible password and see if that results in a decrypted file.

They do this automatically with a computer program, so the speed at which someone can brute-force encryption increases as available computer hardware becomes faster and faster, capable of doing more calculations per second. The brute-force attack would likely start at one-digit passwords before moving to two-digit passwords and so on, trying all possible combinations until one works.

A “dictionary attack” is similar and tries words in a dictionary — or a list of common passwords — instead of all possible passwords. This can be very effective, as many people use such weak and common passwords.

Why Attackers Can’t Brute-Force Web Services

There’s a difference between online and offline brute-force attacks. For example, if an attacker wants to brute-force their way into your Gmail account, they can begin to try every single possible password — but Google will quickly cut them off. Services that provide access to such accounts will throttle access attempts and ban IP addresses that attempt to log in so many times. Thus, an attack against an online service wouldn’t work too well because very few attempts can be made before the attack would be halted.

For example, after a few failed login attempts, Gmail will show you a CATPCHA image to verify you aren’t a computer automatically trying passwords. They’ll likely stop your login attempts completely if you managed to continue for long enough.

On the other hand, let’s say an attacker snagged an encrypted file from your computer or managed to compromise an online service and download such encrypted files. The attacker now has the encrypted data on their own hardware and can try as many passwords as they want at their leisure. If they have access to the encrypted data, there’s no way to prevent them from trying a large number of passwords in a short period of time. Even if you’re using strong encryption, it’s to your benefit to keep your data safe and ensure others can’t access it.


Strong hashing algorithms can slow down brute-force attacks. Essentially, hashing algorithms perform additional mathematical work on a password before storing a value derived from the password on disk. If a slower hashing algorithm is used, it will require thousands of times as much mathematical work to try each password and dramatically slow down brute-force attacks. However, the more work required, the more work a server or other computer has to do each time as user logs in with their password. Software must balance resilience against brute-force attacks with resource usage.

Brute-Force Speed

Speed all depends on hardware. Intelligence agencies may build specialized hardware just for brute-force attacks, just as Bitcoin miners build their own specialized hardware optimized for Bitcoin mining. When it comes to consumer hardware, the most effective type of hardware for brute-force attacks is a graphics card (GPU). As it’s easy to try many different encryption keys at once, many graphics cards running in parallel are ideal.

At the end of 2012, Ars Technica reported that a 25-GPU cluster could crack every Windows password under 8 characters in less than six hours. The NTLM algorithm Microsoft used just wasn’t resilient enough. However, when NTLM was created, it would have taken much longer to try all these passwords. This wasn’t considered enough of a threat for Microsoft to make the encryption stronger.

Speed is increasing, and in a few decades we may discover that even the strongest cryptographic algorithms and encryption keys we use today can be quickly cracked by quantum computers or whatever other hardware we’re using in the future.

Protecting Your Data From Brute-Force Attacks

There’s no way to protect yourself completely. It’s impossible to say just how fast computer hardware will get and whether any of the encryption algorithms we use today have weaknesses that will be discovered and exploited in the future. However, here are the basics:

 Keep your encrypted data safe where attackers can’t get access to it. Once they have your data copied to their hardware, they can try brute-force attacks against it at their leisure.

● If you run any service that accepts logins over the Internet, ensure that it limits login attempts and blocks people who attempt to log in with many different passwords in a short period of time. Server software is generally set to do this out of the box, as it’s a good security practice.

 Use strong encryption algorithms, such as SHA-512. Ensure you’re not using old encryption algorithms with known weaknesses that are easy to crack.

● Use long, secure passwords. All the encryption technology in the world isn’t going to help if you’re using “password” or the ever-popular “hunter2″.

Brute-force attacks are something to be concerned about when protecting your data, choosing encryption algorithms, and selecting passwords. They’re also a reason to keep developing stronger cryptographic algorithms — encryption has to keep up with how fast it’s being rendered ineffective by new hardware.

Wednesday, October 15, 2014

Things to do after being Hacked ? part 2


You opened an e-mail attachment that you probably shouldn't have and now your computer has slowed to a crawl and other strange things are happening. Your bank called you saying there has been some strange activity on your account and your ISP has just "null routed" all traffic from your computer because they claim it is now part of a zombie botnet. All this and it's only Monday.

If your computer has been compromised and infected with a virus or other malware you need to take action to keep your files from being destroyed and also to prevent your computer from being used to attack other computers. Here are the basic steps you need to perform to get back to normal after you've been hacked.

1. Isolate Your Computer

In order to cut the connection that the hacker is using to "pull the strings" on your computer, you need to isolate it so that it can't communicate on a network. Isolation will prevent it from being used to attack other computers as well as preventing the hacker from continuing to be able to obtain files and other information. Pull the network cable out of your PC and turn off the Wi-Fi connection. If you have a laptop, there is often a switch to turn the Wi-Fi off. Don't rely on doing this through software, as the hacker's malware may tell you something is turned off when it is really still connected.

2. Shutdown and remove the hard drive and connect it to another computer as a non-bootable drive

If your computer is compromised you need to shut it down to prevent further damage to your files. After you have powered it down, you will need to pull the hard drive out and connect it to another computer as a secondary non-bootable drive. Make sure the other computer has up-to-date anti-virus and anti-spyware. You should probably also download a free rootkit detection scanner from a reputable source like Sophos.

If you don't feel comfortable removing a hard drive yourself or you don't have a spare computer then you may want to take your computer to a reputable local PC repair shop.To make things a little easier, consider purchasing a USB drive caddy to put your hard drive in to make it easier to connect to another PC. If you don't use a USB caddy and opt to connect the drive internally instead, make sure the dip switches on the back of your drive are set as a secondary "slave" drive. If it is set to "master" it may try to boot the other PC to your operating system and all hell could break loose again.

3. Scan your drive for infection and malware

Use the other host PC's anti-virus ,anti-spyware, and anti-rootkit scanners to ensure detection and removal of any infection from the file system on your hard drive.

4. Backup your important files from the previously infected drive

You'll want to get all your personal data off of the previously infected drive. Copy your photos, documents, media, and other personal files to DVD, CD, or another clean hard drive.

5. Move your drive back to your PC

Once you have verified that your file backup has succeeded, you can move the drive back to your old PC and prepare for the next part of the recovery process. Set your drive's dip switches back to "Master" as well.

6. Completely wipe your old hard drive (repartition, and format)

Even if virus and spyware scanning reveals that the threat is gone, you should still not trust that your PC is malware free. The only way to ensure that the drive is completely clean is to use a hard drive wipe utility to completely blank the drive and then reload your operating system from trusted media.

After your have backed up all your data and put the hard drive back in your computer, use a secure disk erase utility to completely wipe the drive. There are many free and commercial disk erase utilities available. The disk wipe utilities may take several hours to completely wipe a drive because they overwrite every sector of the hard drive, even the empty ones, and they often make several passes to ensure they didn't miss anything. It may seem time-consuming but it ensures that no stone is left unturned and it's the only way to be sure that you have eliminated the threat.

7. Reload the operating system from trusted media and install updates

Use your original OS disks that you purchased or that came with your computer, do not use any that were copied from somewhere else or are of unknown origin. Using trusted media helps to ensure that a virus present on tainted operating system disks doesn't reinfect your PC.

Make sure to download all updates and patches for your operating system before installing anything else.

8. Reinstall anti-virus, anti-spyware, and other security software prior to any other programs.

Before loading any other applications, you should load and patch all your security related software. You need to ensure your anti-virus software is up-to-date prior to loading other applications in case those apps are harboring malware that might go undetected if your virus signatures aren't current

9. Scan your data backup disks for viruses before your copy them back to your computer

Even though you are fairly certain that everything is clean, always scan your data files prior to reintroducing them back into your system.

10. Make a complete backup of your system

Once everything is in pristine condition you should do a complete backup so that if this ever happens again you won't spend as much time reloading your system. Using a backup tool that creates a bootable hard drive image as a backup will help speed up future recoveries immensely.

Sunday, October 12, 2014

What's a verified facebook profile or Page and How To Get Verified on Facebook ?


Some well-known public figures and Pages with large followings are verified by Facebook as having an authentic identity. You'll see a blue badge next to a verified profile or Page's name. These profiles and Pages may include:

◄ Celebrities

◄ Journalists

◄ Government officials

◄ Popular brands and businesses

Facebook Inc.verify profiles and Pages to help you be sure that they are who they claim to be. Keep in mind that not all authentic profiles and Pages are verified and that you can't request to have your profile or Page verified. You can report fake accounts that are impersonating you, your business or your brand.

If your profile or Page isn't verified, there are other ways to help your followers or the people who like your Page know that your identity is authentic. For example, you can:

Link to your Facebook profile or Page from your official website
Complete the About section of your profile or Page to provide more information

* How To Get Verified ?

If your profile or any Page whose your are official representative and also based on above mention categories then their are chances of your page to get verified. Actually Facebook does not have any request form to claim verified this is totally automatic process done from Facebook side. So to become verified in future you should have to do some changes in your Profile or Page

◄ Your page should be official represent your local business or any personality and may be have some popularity on Facebook.
For Facebook claiming process your page or profile must have minimum details because if you add full details accurately then Facebook automatically check your provided information if they find your page or profile details accurate and helpful then verify your page here are two parts mention by Facebook to become verified

◄ Link To Your Profile or Page From Official Website and also link website on your page or profile.

◄ Provide accurate information in details about your business in About Section of Page or Profile
In About section must add significant long and short description, keyword who represent your business, Email, Website, Products and verified page location with claimed business address and other details in Page Info tab.

In About section must add significant long and short description, keyword who represent your business, Email, Website, Products and verified page location with claimed business address and other details in Page Info tab

Thursday, October 2, 2014

What is Ello? Ello vs. Facebook !


Ello is a simple, beautiful, and ad-free social network created by a small group of artists and designers.

here is the link: 

 ======== Ello vs. Facebook=========

originally built Ello as a private social network. Over time, so many people wanted to join Ello that we built a public version of Ello for everyone to use.

The eight-week-old social network Ello has a manifesto: no ads, no data-mining, no algorithms that make decisions about what you should see, no turning users into products. If you hit the “I agree” button after the manifesto, the site puts you on the waiting list for an invitation. If you click “disagree,” it sends you to Facebook’s privacy page.

The site’s creator, Paul Budnitz, initially comes across as the male version of the ‘Manic Pixie Dream Girl.’ “I create beautiful things that change the world,” he says in his Ello profile. He lives in Burlington, Vermont selling the “most beautiful city bicycles in the world.” He founded Kidrobot, which makes designer toys such as a silver Homer Simpson buddha statue. According to his personal biography, he writes books, makes films, and collects “cultural wearable artifacts,” such as a classic pair of Air Jordans that he sold for $16,000. His eyes shoot lasers.

"We see Facebook as an advertising platform not a social network,” says Ello creator Paul Budnitz.
“We see Facebook as an advertising platform not a social network,” says Ello creator Paul Budnitz.

Right now, those lasers are aimed at Facebook. “We see Facebook as an advertising platform not a social network,” says Budnitz. “Users are products at Facebook. They want to know as much as possible to advertise to you.”

Ello has garnered a huge amount of media attention and a desperate stampede to get on the site thanks to a huge misstep by Facebook: last month, it booted drag performers such as Sister Roma and Lil Hot Mess off the site for not using their real names. Budnitz says the booted performers’ protest triggered a flood of requests to Ello last week from the LGBTQ community who wanted to know if they could use whatever names they wanted. “On Sunday or Monday, we got 50 emails over several hours, and we were looking at sign-ups and they were going up and up and up.”

Budnitz said they started getting 4,000 interested new users per hour. It’s snowballed from there. Budnitz won’t release user numbers, “because I don’t want to play that game,” but has been telling people Ello is now getting “50,000 sign-ups per hour.” But that’s a bit hyped; when I asked him if that meant 50,000 new users per hour, he says the number is actually a combination of people creating new accounts, sending out invites and requesting invitations. At this point, Ello is basically only honoring invitations from existing users to control its growth and “not melt our servers.” If nothing else, it’s a great way to make Ello the hot club with a red velvet rope and a long line out front. I suspect there are more people talking about Ello right now than actually using it.

Facebook realized the mistake it made, leading Chief Product Officer Chris Cox to apologize Wednesday. “The spirit of our policy is that everyone on Facebook uses the authentic name they use in real life,” explained Cox, saying that Facebook now realized that for the hundreds of users who got booted, the names they were using weren’t their legal names but were their “authentic” ones. So drag queens are back on Facebook, but Budnitz hopes that his site will continue to serve a need.

“It is beautiful and uncluttered,” he says. “Everything is in chronological order. People will only see what they want to see.”

Budnitz initially launched Ello in the summer of 2013 as a private social network for 90 friends because he was sick of existing social networks. “Facebook thinks I’m a middle-aged women of color, based on the ads I was seeing for high heels, stockings and African-American women magazines,” he says. “I wanted something simple and beautiful.”

He says other friends started clamoring to join, so he took the site down, got $435,000 in venture funding, and then relaunched an invitation-only site on August 7. “We thought we’d be where we are in 6 months and it happened in 6 days,” he says. As for the making-money part, Budnitz plans to charge users for features. For example, recent users have been clamoring for the ability to maintain multiple profiles with one log-in. “We’ll introduce that and then charge $1 or $2 for it to those power users who want it.”

Budnitz sees the site as a true beta one, a work in progress. Early users complained that they couldn’t block other users. This week the site will introduce block and mute features, he says. “We’re testing them now.”

The site has a feature list that explains what’s been added and what’s coming. Hilariously, I can’t link to it because some enterprising user stole its url by establishing a profile named “Feature List.” The site definitely has some bugs, and I wouldn’t be surprised if “Ello Just Got Hacked” appears in the headlines in the near future.