‘Fake Payment Confirmation’ scam emails



A series of new spam emails that target computer users and attempt to infect them with a variant of a ZBOT trojan have been discovered.

The e-mail attempts to persuade a recipient to open an attachment and claims that the said attachment contains a payment confirmation for the recipient. However, the “TTcopy.zip” attachment contains a malicious “TTcopy_pdf.exe” file that, when executed, attempts to infect the system with malicious code.

The e-mail message contains the following “Subject” and “Message Body”:
Subject: TT copy of payment

Message Body:
Hello,
Kindly find attached TT copy of payment made to your account today as balance payment on behalf of your customer and the documents, pls sign/stamp and send back to me asap. Kindly confirm that the amount/bank details are correct as and the same with
the one your colleague gave us to make payment with. I await your urgent confirmation and response.
Thanks and best regards.
Management.

If you come across such emails, DO NOT open the attachment. Instead, delete the email and keep your antivirus updated. Antivirus (like Quick Heal) detects the malicious attached file as TrojanSpy.Zbot.gfld; 


So My dear users do not open such attachments from any other unknown emails as well.

Kaspersky TDSSKiller 2.8.13.0 Portable



TDSSKiller is a handy portable tool that can detect and remove both known and unknown rootkits.

The program scans only the most likely areas of infection - your services, drivers and boot sectors - and so may miss some rootkits. It's good enough to detect many known infections, though (TDSS, Sinowal, Whistler, Phanta, Trup, Stoned).

TDSSKiller also looks for suspicious objects, like hidden files or services, that may indicate some other form of malware has infested your PC. And as the entire scan only takes a few moments (14 seconds on our test PC), it's easy to run on a regular basis, just as a second line of defence for your system. (It can even be automated via command line switches, as Kaspersky's TDSSKiller page explains.)

You do have to be careful with TDSSKiller, though, as occasionally it will identify legitimate files as suspicious. So don't automatically assume that every "suspect object" is actually a rootkit: head off to Google, search for the file name, and try to find out more about it first.

And even attempting to repair or remove a genuine rootkit can be problematic, and may damage your PC to the point that it won't boot. Be sure you know how to handle that, and have all your data backed up, before you click on the Quarantine or Delete button.

Verdict:TDSSKiller provides a very quick and easy way to detect rootkits


Download Link :  http://bit.ly/Ts3RmX

uTorrent Ultra Accelerator





How about getting that uTorrent download speedrocket high? uTorrent Ultra Accelerator is an valuable add-on module for one of the most in demand p2p clients worldwide. This plug-in fits flawlessly into uTorrent native client to ensure extra augmentation to its central features. Though very small, its architecture allows it to upgrade your searching and squeeze the maximum of speed from your file-sharing program. Another reason for uTorrent Ultra Accelerator being requisitory is the bandwidth of your Internet connection which gets a proper management. So – better Internet connection, faster downloads and more sources to download from in a single package! And let’s be honest – who doesn’t want their download speed even faster than it already is?




uTorrent Ultra Accelerator is the perfect tool for downloading your favourite movies, music, games and other files at an incredible speed. You can check the info about the status of your downloads in the main window. The app will quickly find its deserved place on your PC and you won’t even have to bother with it – it’s efficient, discreet and takes extremely small space on your computer. Even its interface is neat, compact and practical for both novices and advanced users.

You can download and use Torrent Ultra Accelerator for FREE and save your worries – the app is 100% CLEAN! NO ads, adware, spyware, Trojans or any other malware hidden!



Download Link : http://bit.ly/XRY37y

GOOGLE DORKS TO FIND UNSECURE WEB ADMIN PANELS



These are some of the  Google Dorks which can be used to find unsecured website admin panels and break into them without using login creditials,
type any on one in google search and hit enter and have fun..

"inurl:admin/addproduct.asp"
"inurl:admin/user.asp"
"inurl:admin/addpage.php"
"inurl:admin/gallery.asp"
"inurl:admin/image.asp"
"inurl:admin/adminuser.asp"
"inurl:admin/productadd.asp"
"inurl:admin/addadmin.asp"
"inurl:admin/add_admin.asp"
"inurl:admin/add_admin.php"
"inurl:admin/addnews.asp"
"inurl:admin/addpost"
inurl"inurl:admin/addforum.???"
"inurl:admin/addgame.???"
"inurl:admin/addblog.????"
"inurl:admin/admin_detail.php"
"inurl:admin/admin_area.php"
"inurl:admin/product_add.php"
"inurl:admin/additem.php"
"inurl:admin/addstore.php"
"inurl:admin/add_Products.???"
"inurl:admin/showbook.???"
"inurl:admin/selectitem.???"
"allinurl:admin/addfile.???"
"inurl:admin/addarticle.asp"
"inurl:admin/addfile.asp"
"inurl:admin/upload.php"
"inurl:admin/upload.asp"
"inurl:admin/addstory.php"
"inurl:admin/addshow.php"
"inurl:admin/addmember.asp"
"inurl:admin/addinfo.asp"
"inurl:admin/addcat.asp"
"inurl:admin/cp.asp"
"inurl:admin/productshow.asp"
"inurl:admin/addjob.asp"
"inurl:admin/addjob.???"
"inurl:admin/addpic.???"
"inurl:admin/viewproduct.???"
"inurl:admin/addaccount.php"
"inurl:admin/manage.php"
"inurl:admin/addcontact.???"
"inurl:admin/viewmanager.???"
"inurl:admin/addschool.???"
"inurl:admin/addproject.???"
"inurl:admin/addsale.???"
"inurl:admin/addcompany.???"
"inurl:admin/payment.???"
"inurl:user/emp.???"
"inurl:admin/addmovie.???"
"inurl:admin/addpassword.???"
"inurl:admin/addemployee.???"
"inurl:admin/addcat.???"
"inurl:admin/admin.???"
"inurl:admin/admincp.???"
"inurl:admin/settings.???"
"inurl:admin/addstate.???"
"inurl:admin/addcountry.???"
"inurl:admin/addmedia.???"
"inurl:admin/addcode.???"
"inurl:admin/addlinks.???"
"inurl:admin/addcity.???"


Enjoy Hacking..!!!


List of Command Prompt Tricks you might not Know



The best thing about Windows is the GUI, its user interface is so easy to use that nobody wish to use the command prompt for their work. However there are occasions when we want to use the command prompt. We all know the basic commands but here is a list of some command prompt tricks you might not be aware of:

1. Copy output of command to clipboard

There are some commands that we use to view the result and then copy their output like the ipconfig. Well, you don’t need to copy the output manually as you can use the clip command on this command and have the output copied to the system clipboard automatically.

Just add clip with a pipe ( | ) after the command and the command will be copied automatically to the clipboard.
like this : ipconfig | clip

2. See all the commands previously typed at the same time


When you wish to see some of the previous commands used by you then you would use the upper arrow button to surf through them but this may take some time if the command was used way back. Hence you can use the doskey command with the history option to get the list at the same time.

Like This : doskey /history

3. Execute multiple cmd commands one after another

If you are sure of the order in which you are going to execute some commands then you don’t need to wait for one command to finish execution and then type another. Just club them with a && operator as shown, and they will execute one after another.

Like This : ipconfig && doskey /History

4. Run cmd from a specific folder location

There are several times when we need to type the location of some folder in thecommand prompt. Instead of typing the location manually you can visit the folder in explorer and have the cmd run from there.



Just press Shift button and then right click on the folder, you will see a new option ofopening cmd from there. Clicking this option will open the command prompt from this location.

5. Drag and drop folder to navigate to that location


Also, if you are already working in cmd and now if you need to type some folder location then instead of doing this, you can directly drag and drop the folder onto the cmd and it will take the folder address automatically.

You might know some of these tricks (or all of them) but it is better to share with those who don’t, isn’t it? Well if you know more of these, then you can leave a comment below too.

How to Increase uTorrent Downloading Speed


My best utorrent trick to improve torrent download speed
hi frends
i am using these setting for increase
utorrent download speed.
it is use full for all

here are:-

Port forwarding :

To achieve the top speed in uTorrent your port must be forwarded. The forwarded port in uTorrent then the status bar in uTorrent will show Green icon. Else it will be exclamation mark.
If it is forwarded then it is fine, else you need to change the port number to get the correct port.Choose a port number greater than 10,000. Currently I am using port number “43081 & 45682 & 46868″ and it is forwarded.
Choose any number and check if it is forwarded or not. You can change the port number through clicking on that icon or by pressing “CTRL+G”.
Save your port Once you got the perfect port number, make sure your option in Option >> Preference >> Connection >> “Randomize port each start” is unchecked.
Tell windows, uTorrent is working for me Windows firewall may try to block the uTorrent connection with the network, thats why make sure your option in Option >> Preference >> Connection >> “Add windows firewall exception” is checked.
Dont tell your ISP that you are using uTorrent
Many ISP’s block uTorrent downloads, that’s why make sure your
option in Option >> Preference >> BitTorrent >> Protocol Encryption is Enabled. This will surely increase your
speed. 
Firewall, let the flow come in If you are using any firewall software, add uTorrent in “allowed application” or “allowed programs” so that they will allow uTorrent to work to get maximum speed.
Window Firewall Allow to u Torrents Start >>>control panel>>>windows firewall>>>allow a program or feature through windows firewall>>>change setting>>>check mark on home &
public network for u torrents>>>ok
Upload : Download – Ratio
I suggest keep changing the ratio as
per speed, i try to keep this ratio at
0.5 i.e. if my download speed us
100KB ps then I will keep my upload
speed near to 50KB/ps. keep changing
this speed. NEVER make upload speed
to ZERO. Many torrent trackers ban
the IPs who do not upload so keep
this option at least close to 50%.
There are many other options in
uTorrent, I recommend you don’t play
with them. They will not affect your
speed, but may cause lesser speed
problem.
First go to
Options>Preferences>Network
1. Under ‘Port used for incoming
connections’, enter any port number.
It is best to use a port number above
10000. I use 65535.
2. Randomize port each time utorrent
starts: UNCHECKED. I leave this
unchecked because I have a router. If
you do not have a router or a firewall,
and want extra security
,check this option.
3. Enable UPnP port mapping
(Windows Xp
or later only): UNCHECKED. I leave
this unchecked because I have
experienced it slowing down speeds. It
is not needed if you manually port
forward.
4. Add utorrent to Windows Firewall
exceptions (Windows XP SP2 or later
only): UNCHECKED (do this only if
you have windows firewall disabled)
5. Global Maximum upload rate (kb/
s): [0: unlimited]: 22 (for 256k
connection)
6. Protocol Encryption: ENABLED. I
would recommend everyone to enable
this. This can help increase speeds
with many ISPs.
7. Allow incoming Legacy
Connections: CHECKED
Options>Preferences>Torrents
1. Global Maximum Number of
Connections: 130 (for 256k
connection)This number should not be
set too low or the number of
connections made to your torrents will
be limited. Setting it too high may
cause too much bandwidth to be used
and can cause slowdowns.
2. Maximum Number of connected
peers per torrent: 70 (for 256k
connection)If you see that the peers
connected to a specific torrent are
exactly this number, or very close,
increase this number to improve
speeds.
3. Number of upload slots per torrent:
3 (for 256k connection)This depends
on how much you want to upload to
other users. Do not set too low or it
may affect download speeds.
4. Use additional upload slots if
upload speed <90%: CHECKED
5. Maximum number of active
torrents: 2 (for 256k connection)
6. Maximum number of active
downloads: 1 (for 256k connection)
7. Enable DHT Network:
CHECKEDThis is recommended to be
checked to improve speeds. More
people will be available for sharing if
this is checked.
8. Enable DHT for new torrents:
CHECKED
9. Enable Peer Exchange: CHECKED
10. Enable scrapping: CHECKED
11. Pre-allocate all files: CHECKED
12. Append .!ut to incomplete files:
UNCHECKED
The website Even if you downloaded the best torrent file, if it is not giving speed then there may be problem is site which provides it. Searching for high seeder torrent is not easy but the information about number of seeders must be correct and recent so that the file will give best of its speed. That’s why choosing the best torrent site is important.
Even after you tweaked your uTorrent for higher speed if your torrent is not good then how you can get the maximum speed ? Choosing the best torrent site plays important role to get
the use it and get max utorrent download speed.
if it is use full for you then leave a comment.

thanks

good day

Some Mouse Tricks you might not know



Using mouse is very easy and comfortable which is why we use it daily in our lives. But there are some mouse tricks that not all people know, so here is a list of few of them.

1. Vertical Text Selection

This is one trick which 90 % people dont know about this so i am sharing this as not all people know that it is possible to select text vertically in a word editor like MS Office. This trick does not work in simple text editors like Notepad.


Just hold the Alt button before selecting the text with the mouse and this will enable you to select it vertically.

2. Multiple Text Selection

Similar to the tip above, if you hold Ctrl before selecting the text in a powerful text editor like MS Word, you can actually select multiple lines of texts independently.


The selected text will be appended when you hit the paste button.

3. Use of Right Mouse Button for Dragging file/folder

  

While dragging the files/folders using the left mouse button, there is couple of different options that we get like if you drag a file inside the same Drive, left button will actually move the file whereas if you drag it on to a different drive, then it will copy the file.


But if you use Right mouse button in place of the left, then you will get a hidden option asking you to either move or copy the file.

4. Close or Open Tabs quickly with Middle Mouse Button

Wondering what’s the use of the middle mouse button (or the scroll wheel click in newermouses)? Well you can quickly open a new tab if you middle click on a link without the need of actually right clicking and selecting the option of “open in a new tab”



Similarly if you middle click on a tab, it will get closed instantly. Don’t believe me, try it.

Note: Scroll wheel also acts as a middle mouse button, just click the wheel to record the middle click.

5. Hidden Context options

Whenever you right click on any file/folder you come across some standard options but do you know if you hold the Shift button before clicking the right mouse button, you will actually come across lot many hidden options.


Not only the context menu, there will be more options in the each context menu option like send to etc.

Facebook Web Search Coming Soon?



The web is all about the queries and the results. For all those who like to spend most of the time on internet, surfing and searching Google, you might get a new search enginesoon. Whether or not you like Google, you were supposed to use it to make queries and get a pile of results but not now as it seems like competition in search engines is now growing and we now might see a new competitor soon.

Recently, Mark Zuckerberg, the founder of famous social website Facebook indicated that the users might see a new web search engine developed by them. According to him, people are already using the Facebook search feature to find the social details of others and they are handling lots of queries daily. He also added saying that, they have a team of people working on developing the so called Facebook Search Engine, and at some point they will do it.


According to him, there is something that Google and current search engines are missing. Instead of producing a pile of results, they should correctly and aptly answer a query just by proving a specific answer to a specific query made.

So if we are to see this new Facebook SE, we should expect some major change how the search engines have been working till now. It won’t be wrong either to expect a major difference between Google and Facebook SEs. At least there is one thing that is clear, with all the info Facebook already has, they should not find it difficult to establish than any other new startup.

We will have to wait and see what the company plans about this initiative but users are sure to get benefitted. Well there could be a new era of internet with the advent of Facebook web search, who knows it could be Facebook Ads next. [Via]

Erase Cookies, History and Temp Files Automatically on Browser Exit (Chrome)



Maintaining security and privacy while working on internet is very important and this is why we have erasing/deleting browser data in each browser as this helps in running a problem free computer and browser. The feature is almost present in every browser and one should delete this data periodically but we are so busy in our daily work that we always forget to do so, isn’t it?

In Chrome too we can manually click the option from the Tools menu and delete the data starting any point of time. It also allows us to select what data we need to remove. But the problem here with Chrome is that there is no option of deleting the data automatically each time the browser is closed. To rescue this situation i have found an extension that will help.


The extension is called Click&Clean which, other than deleting the temp files, history, cookies and other things automatically can delete system useless data (like Recycle Bin data, recently opened files) every time the Chrome browser is exited. Here is a list of features that you will get with this extension:

• Scan your PC for Malware
• Delete your browsing history,
• Remove download history,
• Erase temporary files,
• Clear cookies and Empty cache,
• Delete client-side Web SQL Databases
• Remove Flash Cookies (LSOs)
• Protect your privacy by cleaning up all traces of your internet activity,
• Clean up your hard drives and Free up more disk space, icluding secure file deletion using external applications, like CCleaner or Wise Disk Cleaner.
• Watch flash videos offline, without being connected to the Internet!


Moreover if you wish to deliberately keep some of this data like the cookies or data for some of your favorite website, then this can be done too. You just need to add the website to the whitelist and this data will not be deleted with others.

This extension works well on Chrome on Windows.

Download Click&Clean

Domain Hijacking





Domain hijacking is a process by which Internet Domain Names are stolen from it’s legitimate owners. Domain hijacking is also known as domain theft. Before we can proceed to know how to hijack domain names, it is necessary to understand how the domain names operate and how they get associated with a particular web server (website).





The operation of domain name is as follows



Any website say for example gohacking.com consists of two parts. The domain name (gohacking.com) and the web hosting server where the files of the website are actually hosted. In reality, the domain name and the web hosting server (web server) are two different parts and hence they must be integrated before a website can operate successfully. The integration of domain name with the web hosting server is done as follows.



1. After registering a new domain name, we get a control panel where in we can have a full control of the domain.



2. From this domain control panel, we point our domain name to the web server where the website’s files are actually hosted.



For a clear understanding let me take up a small example.



John registers a new domain “abc.com” from an X domain registration company. He also purchases a hosting plan from Y hosting company. He uploads all of his files (.html, .php, javascripts etc.) to his web server (at Y). From the domain control panel (of X) he configures his domain name “abc.com” to point to his web server (of Y). Now whenever an Internet user types “abc.com”, the domain name “abc.com” is resolved to the target web server and the web page is displayed. This is how a website actually works.





What happens when a domain is hijacked



Now let’s see what happens when a domain name is hijacked. To hijack a domain name you just need to get access to the domain control panel and point the domain name to some other web server other than the original one. So to hijack a domain you need not gain access to the target web server.



For example, a hacker gets access to the domain control panel of “abc.com”. From here the hacker re-configures the domain name to point it to some other web server (Z). Now whenever an Internet user tries to access “abc.com” he is taken to the hacker’s website (Z) and not to John’s original site (Y).



In this case the John’s domain name (abc.com) is said to be hijacked.





How the domain names are hijacked



To hijack a domain name, it’s necessary to gain access to the domain control panel of the target domain. For this you need the following ingredients



1. The domain registrar name for the target domain.



2. The administrative email address associated with the target domain.



These information can be obtained by accessing the WHOIS data of the target domain. To get access the WHOIS data, goto whois.domaintools.com, enter the target domain name and click on Lookup. Once the whois data is loaded, scroll down and you’ll see Whois Record. Under this you’ll get the “Administrative contact email address”.



To get the domain registrar name, look for something like this under the Whois Record. “Registration Service Provided By: XYZ Company”. Here XYZ Company is the domain registrar. In case if you don’t find this, then scroll up and you’ll see ICANN Registrar under the “Registry Data”. In this case, the ICANN registrar is the actual domain registrar.



The administrative email address associated with the domain is the backdoor to hijack the domain name. It is the key to unlock the domain control panel. So to take full control of the domain, the hacker will hack the administrative email associated with it.



Once the hacker take full control of this email account, he will visit the domain registrar’s website and click on forgot password in the login page. There he will be asked to enter either the domain name or the administrative email address to initiate the password reset process. Once this is done all the details to reset the password will be sent to the administrative email address. Since the hacker has the access to this email account he can easily reset the password of domain control panel. After resetting the password, he logs into the control panel with the new password and from there he can hijack the domain within minutes.





How to protect the domain name from being hijacked



The best way to protect the domain name is to protect the administrative email account associated with the domain. If you loose this email account, you loose your domain. So refer my previous post on how to protect your email account from being hacked. Another best way to protect your domain is to go for private domain registration. When you register a domain name using the private registration option, all your personal details such as your name, address, phone and administrative email address are hidden from the public. So when a hacker performs a WHOIS lookup for you domain name, he will not be able to find your name, phone and administrative email address. So the private registration provides an extra security and protects your privacy. Private domain registration costs a bit extra amount but is really worth for it’s advantages. Every domain registrar provides an option to go for private registration, so when you purchase a new domain make sure that you select the private registration option.