Category Archives: ANTIVIRUS

Android security basics

Security is a comprehensive term which differs from time to time and it differs from devices to devices. In this article you will learn about how to secure your Android device and make it run virus free. First we will be talking about Android inside Samsung mobile phones.

Locating Method:

Go to settings and then privacy and safety and then go to privacy and then location and move the slider to switch it on. In the location method GPS Wi-Fi and mobile network GPS Wi-Fi and mobile networks to estimate your precise location. It is important for Google services to work in correct manner as it will use Wi-Fi and mobile networks good networks provide absolute security to your mobile device by connecting to Google servers all the time.

Two locating method such as Wi-Fi and mobile networks which uses Wi-Fi and mobile network to estimate your location. The last not the least is the GPS only locating method GPS to estimate your location.

lock screen and security:

Go to settings and then lock screen and security and then go to lock screen, here you have three options one is screen lock type and the second one is info an app shortcuts and the last one is notifications on lock screen. In the screen lock type there are 5 options. One is swipe, then pattern then pin then password and the last is none.

The fast screen lock type is swipe it is of no security. The second one is pattern it is of medium security and the third one I’d Pin, it is of job medium to high security. The fourth one is password it is for high security.

For better privacy inside Android devices you can enable or disable notificationson lock screen by choosing content on lock screen whether to choose or to hide. There are three options such as show content, hide content and do not show notifications. You can allow or disallow individual apps to show notification or disable them to show notification in lock screen also.

Find my mobile:

Find my mobile comes under security settings of Android device. In Samsung phones you will have to log in with your Samsung account to enable this feature. It comes in addition with Google’s find my device feature. It locate controller device remotely using your Samsung account. to protect your account and continue using this service you need to sign in with Samsung account time and again to confirm your password. Connect to internet and then sign into your Samsung account. Your internet data setting a job then automatically it will stand for Wi-Fi network. Internet setting data setting is on then it will show in progress symbol and then then it will log into your Samsung account.

Disallow installation of apps from sources other than Play stores. It will enable Google play protect inside your Android device and installation of apps from Play Store are scanned through sandboxing environment of Google Play protect. You can encrypt your device by protecting your device by encrypting its data. In this way you can encrypt accounts settings downloaded apps and their data media and other files

Encryption takes an hour or more depending on the size of your Android device. Before you starts ensure that the battery is fully charged and keep the device logged into do electric circuit until encryption is complete. Interesting encryption process may lead to the the loss of data or of the enter data that are stored inside system driver for Android device.

Encrypt your SD card to protect your SD card by encrypting its data. You can encrypt SD card. Encrypted SD cards can only be read on the device used to encrypt them. Tap encrypt SD card to start the encryption process. Encryption to take an hour or more. Before you start make sure that the battery is charged keep the device locked in until encryption is complete. During the encryption process the SD card cannot be used. Device is reset to factory default settings it will be unable to read encrypted SD card.

Other security settings includes change your father security settings such as those for security updates and credential storage. First is to set up sim card lock. Inside lock sim card you require your sim card pin to unlock and use your sim card.

Here, you can show password character briefly as you type them or make password invisible in this function. Next security setting age security policy update which increases the security of your device by updating the security policy periodically from Samsung Central server when you connect to the internet. This security policy updates are downloaded without your notice and installed with your device automatically.

It is a good idea to enable centre security reports Samsung wi-fi for free internet for live threat analysis. All the reports are encrypted to Samsung server so that year privacy of Android device stay secure. Then comes the device administrator find my device of default Android device which allowsfind my device to lock or erase the lost device.

These are some of the few options you can enable or watch out to make your device absolute secure. It is important to understand how your Android devices around and what are various hidden features that are inbuilt with it. Some of the original equipment manufacturers or of hardware manufacturers provides additional security settings so that you can find more security options to make your Android device secure and stop hackers from entering into your devices unknowingly.

Android phone security in the age of rise of Malwares in Google Play Store

in this age of mobile computing more and more people begin to use Android devices as the full-pledged computing system. Even Google in its Google App provides information about over 100 application that are inside Play Store provides millions of Malwares into so many of Android devices.

what this means is that now we have to install third party antiviruses in addition to googles play protect the online antivirus from Google and it is pre-installed Google Play services updated to its latest version. Despite this protection from Google now find more and more apps from Google Play Store are infected with large number of malwares which are infecting millions of Android devices worldwide.

in this situation xiaomi devices have there phone antivirus free installed with original equipment manufacturer and this removed plenty of mallwates and advertisements from devices. Now Samsung mobile phones comes free installed with a security system which has McAfee full antivirus installed and it is installed in its kernel version so that complete secure scanning app mobile device can take place without any difficulties.

Due to large scale use up 4G network more and more phones are getting infected with viruses due to high speed internet connectivity. Google Play Store and play services failing to stop these viruses many popular apps. We need to install third party antivirus so that the second level of security inside your phone security complete.

Generally mobile antivirus cost about 500 to 800 rupees per annum. If you purchase antivirus for your computer windows system then it’s mobile was free. If you have Jio or Airtel 4 G sim then they have collaboration with Norton antivirus to provide full antivirus version free to their customers. Use both antiviruses that is one from Google Play services and the other one either from original equipment manufacturers or from yours 4G sim provider so that your phone uses both antivirus simultaneously check hackers from taking over your phone completely.

The difference between Microsoft windows computer and Google’s Android mobile phone is that in Microsoft windows computer only one antivirus on accesss protection should be there. With Android operating system one pre-installed antivirus Google play protect is there in addition to it other anti- Malwares can be used simultaneously.

So hurry up it is time to install an additional antivirus in your Android mobile operating system to secure mobile from Advertisements and viruses. I hope at some time Google fix so called popular apps which are in the guise of their popularity sending advertisements and melvis directly into your mobile devices. before that it is your duty to secure your phone completely by adding additional level of protection which we can find most of times free with 4G sim provider or you can find with some of the original equipment manufacturers xiaomi Samsung mobile phones.

Cracking a Hash with Rainbow Crack

Ethical hacking is the process to understand everything in the perspective of reverse engineering where the entire process of configuration and its related synchronization of ideas carefully considered and understood so that everything should be generalized and created in the perspective of understanding what a hackers could possess and provide you with and that generates huge bunch of ideas and provisions to pave the way forward.

In order to crack the hash mechanisms and knowing the understood passwords involved with it provides the rainbow crack mechanisms which should be done with the help of hashing mechanisms. In the utility of “rtgen” we need to reconsider and find out the hashing algorithm of these character set where the revelation of the passwords lengths and the password mechanisms carefully considered and analyzed.

Hash algorithms should be used for generating the concerned tables where the performance of Windows and its related hacks could be carefully considered and managed with. Generally, the character set for the supported passwords and user names could be in the form of numeric, alphanumeric, alpha, lower alpha,, lower alphanumeric, mic alpha, mix alphanumeric, ASCII characters, symbols and spaces.

Most of these can be intertwined to entertain to find the relevant passwords. Most of the times the revelation of a user name are there and it is the continued passwords that matter the most. Here, we should carefully consider the presence of obvious parameters which could be in the term of plain text or minimise plain text and it is the configuration parameters which we do have to find about in detail.

Here the minimum and the maximum lengths of parameters could be well known and obvious while considering the performance output of these characters. Here, the signs of minimum and maximum plain texts could be known in clarity. The single most combinations of these character sets could be well known from the point of view of understanding the entire process where the obvious presence of these parameters does indicate the performance improvement output of the number of passwords is being used thereupon.

With the added advantages of knowledges about bringing the most synchronised parameters, where more and more table indexing in terms of chain parameters with the numerical presentations of indexing could provide the most obvious attachments of indexing the complex passwords in its present and that does indicate the most difficult part of understanding entire cycle of processes in its present term. In each stored chain, the number of hash reduced cycles is carefully considered and managed with while the discovery of the final hash in each chain can be carefully considered.

Processes involving the creation of algorithms can be created while using dlls while configuring and managing hash algorithm, charset, chain numerals and others. While detecting the perfection attached with table indexes where each process can be carefully considered with the help beginning from zero to five and then the core system outlook can be carefully considered with.

While detecting all these specimens and parameter the single most important considerations could be in relations with table collections and the amount of RAM to be used in detecting the exact character set in perfect length and sizes. From here, the sizes of character set can be detected and managed as with the increase in the number of characters the size, length and its measurements can go up drastically to create the exact point passwords.

After getting the number of possible character sets the resulting rainbow tables could provide the unsorted list of numerical was finding each and every numerical becomes difficult for the first instances. The next step is to sort all these forms of numerical so that one series of processes could be learned from all these specimens.

Rainbow tables are already compressed so there is no other need for decompressing these rainbow tables and the process of entire documentation and ideas could be well learned and understood without going deeper into the set of mathematical reasoning to find out the exact set up of passphrases out there.

The menu entries do come in the form of adding and subtracting of hashtags where he ancillary comment links could exist out there. It is the rainbow crack or learning the reverse engineering form to find out the most relevant and the most correct passphrase already was used with your system logging. Then, comes the series of decryption plain texts of rainbow tables through the entire processes of reverse engineering with relevant hash generating with lower cases.

Generally, in the minds of ethical hackers, the series of system testing to be done to see whether the security parameters of the system are high or not and these could be checked with the help of hacking into networking zones through the process of network hacking.

Generally, in the entire phenomenon of networks, the hackers generally did not belong to the same set of networks and he has to trespass these networks to find more pieces of information about it. In a simple manner, the system you wish to hack into should not be the physical system and you should not be part of that complete networking of that system. Generally, a practice involving ethical hacking comes to the fore in terms of some other local networks or some remote computer located on some other networks.

Ethical hacking does not come on a single day. It requires through researches and continuous understanding of the physical state of mind where the remote computer, networking and software access needs to be physically looked into greater detail so as have to find the most perfected part of understanding the process of implementation and the requisition to find it for better should be looked into in greater detail.

First and foremost part of the process is to find out the requisite lot of information so as to find the most vibrant and well defined part to understand the process and its defined state of system where every part of implementations and the processes involved with it needs to be properly scrutinised so as to understand the entire processes in terms of reverse engineering so as to find the entire mind of the said user which needs to be hacked into.

It is important to understand and prepare everything before you make the attempt to ethical hack any remotely located computer as you should be knowing that it is the first and the last chance as when there has been repeated failed attempts then the system administrator should be knowing about it in greater detail.

One should always know that even if you have the securest form of passwords as well as best password policies but still there is no such system which is on the networking can be fullest of securest form as these can be hacked into and could be providing the deepest form of hacker’s paradise and for this it is important to be aware of such and such developments.

First know the vulnerabilities as well as the processes that deeply embedded within system to understand the entire possibilities of providing the deepest and the safest form of entire system to know where are the potential vulnerabilities exists and where there are the system mechanisms that need to be completely patched and secure so as to stop the entrances of any such hackers making hardware into system.

Ethical hackers keep track of all such vulnerabilities and patch the system before the advent of hackers hacking into it. Ethical hackers look into the system as if they are hacking into it and find the vulnerabilities and network hacks and patch them and make the entire system completely secure. These are the task that is related to footprinting of the faults existed within the system and finding out the most sophisticated form of faults and patch the system before the advent of anyone entering into it.

It is by itself the most non-intrusive but still, these are the single most difficult part and it needs to be carefully observed and the entire process of pieces of information needs to be preserved and maintained well in advance. It does not involve actively engaging with the target but processing the pieces of information and keeping the shadows identities in order to find the real possibilities for ethical hacking into computers.

Footprinting, scanning and enumeration:

Searching pieces of information about the perspective of the arena of the network to be hacked in ethical manners and in this first process the prime importance is to gather so much of information as you can and this can be done from Google itself. Google is the repository of a vast amount of knowledge base and from here all these pieces of information can be gathered and collected.

In this manner, you could also understand about how much of pieces of information are being shared in public and in the future course of actions you could delete such one so that these should not be falling in the hands of hackers. In this manner, you could get extra knowledge about the way the pieces of information are one public domain and could control the flow of pieces of information on these parameters.

Most of the big enterprises enable to access the internet through routers as these are well competent to handle such large pressures efficiently. Most of these routers do have its own web configuration interfaces, which could be accessible if it is known to outsiders. If these routers are not set up into its security configurations which can be due to lack of knowledge than in the long run, there could be hacked by third persons if they by chance got an internet protocol address.

There are some hacking tools which generate and find out the presence of such a large number of common vulnerable internet protocol addresses of such unsecured routers. This means to say that hackers without utilising any such high degree of knowledge base could easily hack into such routers and find the information about it and then they could wreak havoc on these larger internet arenas.

What it is meant to say is that all such information is invaluable for hackers before initiating cyber attacks on any network security. So, we can prevent such attacks by completely securing routers and checking whether the internet protocol address of your router is there or not as well as continuously thinking about what is the best possible mode of hackers can get into your network security and making the entire route bulletproof by seeing the processes of attacks in its entirety.

Make Google search about your website and for sure you could be surprised by the number of pieces of information that has been there about your network and it is important to work out the complete strategy and thinking about reverse re-engineering so as to make entire network security perform better.

It is important to perform some actual and real-time testing that involved with the presence of a large amount of entirely documented processes which should involve networking activities involving the presence of different parameters of network security. It is important to find the keyguard and entire processes of information sharing that could effectively bring back the prospect of understanding the parameters involving the entire intrusive system mechanisms to point out further what should make the entire process the most vulnerable for the first instances.

Generally, the mass pinging processes could entertain to make understand which are the processes that are alive and which systems of the networks are working properly and this could provide the idea to network system administrator to understand the processes that are involved with the pinging of network security and the concerns that are involved with the process of understanding it further and make it more watertight to full proof entire system mechanisms further.

Generally, hackers dig into recognising the live systems within networks and then there are many such utilities such s “Nmap” and others to see the entire process in clear cut and lucid manners. From these tools, everything could be seen in a comprehensive perspective to understand the way entire network systems run and the specialised pinging tool makes it more observable and understandable to move towards extreme coincidence of understanding of the entire processes to succeed.

What this handy tool should do be to scan entire live systems of networks and then it scans what are the open ports of these live systems and that provides the real route traces to hackers to gain complete control over network security. It performs network scans across all types of systems such as Linux, Microsoft server and so on in order to enable the most vital part of understanding the entire processes where the entire network vulnerability should be seen and can be completely analysed.

All these tools were meant for hackers to utilize and gather the colossal pieces of information for it so as to attack the system whenever the need arises. It is important to understand the importance attached to the entire processes of pieces of information sharing and that is why the system administrator should constantly scan for such system vulnerabilities so as to secure the system completely.

After the complete process of through researches, we slowly understand the system that could be hacked and we know at what time the hacking parameters should be at all-time high. All these processes that involve footprinting, scanning, enumeration lead to the gathering of pieces of information in order to initiate attacks on network vulnerabilities.

In these circumstances a well guarded and guided, the system administrator should look deeply into the performance and the security vulnerabilities of systems in order to understand which are the areas that need to be well protected and guarded. All these processes that involve the gathering of the entire gamut of data did not need any high amount of data processed and all these could be done without the knowledge of system administrators and without being detected by security systems.

After getting all these pieces of information slowly you could try to actively connect into the system and try to be at the state of stealth ones so as to evade any other chances of being recognised or detected from network security. By constantly intruding into the remote system for some days or even for some months, you could have pieces of information about the normal behaviour involving of the movement of the entire system and this could probably provide you with the most detectable ideas to understand what should have been the best time to attack the remote system.

Slowly the pieces of information related to FTP servers and its related databases could be retrieved if these were run with insecure servers and then the processes of the remote network to be hacked could be done easily. In this way by utilising these pieces of information the system exploits could be easily discovered and then by analysing the processes involving these excepts the hackers do get relevant pieces of information from out here.

Out of all these the most difficult part is the processes that involves with enumerations where the patterns and the entire gamut of pieces of information need to be easily configurable and compared within the most complex manners in relation with web server, networking, mail server and entire processes and the database management that need to be properly configured with so as to find the real trace route of database.

Mostly advanced hackers dwell into the processes that involve the process of enumeration so as to find the unnecessary services that are not being used but still gaining the administrative rights inside of a computer. In order to secure the system from the ill effects gaining from the enumeration, it is important to detect which are the services that had not been gaining any such importance in the process and these services need to be shut down or should be given limited rights so as to stop presenting the trespassing route to hackers.

By stopping all such routes hackers could not find the version number of network server, database so that it could not initiate the entire process of database attacks and by seeing entire perspective involving with the management of how these hackers run into system one as system administrator could easily plugins the patches that exist around system so as to protect it completely and stop the prying eyes of hackers and shut down any trespassing routes of hackers to create havoc within network security.

Sources & References:

  1. https://www.ukessays.com/essays/information-systems/importance-of-ethical-hacking.php
  2. https://resources.infosecinstitute.com/voip-network-recon-footprinting-scanning-and-enumeration/
  3. https://www.apriorit.com/dev-blog/364-how-to-reverse-engineer-software-windows-in-a-right-way
  4. https://www.wikihow.com/Stop-Hackers-from-Invading-Your-Network
  5. https://blog.prepscholar.com/the-best-prep-books-for-sat-writing
  6. https://www.codeproject.com/Articles/30815/An-Anti-Reverse-Engineering-Guide

Related Posts:

How to stop heart bleed virus of android?

Life has been somewhat misled with all undesired intentions of not writing article for today but somehow the schema of mind is propelling it as if it is one such automatic filter movement and I have to write article for sure as all these schemas of moments passing to me as if some compelling anonymously is stopping me to write for it today. I have chosen not to write an article for today, as I am feeling tired and want to have some sort of rest times, but sadly I have to write one as there is enough time for me to utilize this opportunity to its greatest.

Continue reading
1 2 3