Sunday, 20 October 2013

Today We Will Discuss How To Secure Your Pc From Hackers First Off We Will Discuss That How Hackers Hack Your Pc ?

Hackers Use Many Methods We Will Dicuss How They Hack And How To Secure Your Self From This Kinds Of Attack I Hope You Will Feel Some Secure After Reading This Arricle And If U Still Have Any Questions You Guys Can Contact Us :

1 ) KeyLogger

Key Logger Is A Software Which Save All Your Keystroke , ScreenShot , And Any Activity You Do On Your Pc Its Send To The Attacker !

2 ) Password Stealer ( i Stealer )

Password's Stealer Can Still Your Hotmail , Netlog , Facebook , Wow , RapidShare , Yahoo , Any All Logins Saved In Your BrowserIts Steal From Browser !

3 ) Rat ( Remote Access Torjan )

Remote Access Torjan Is A Software To Control Your System He Can Do Basically Any Thing With Your Computer Using RAT !

4 ) BotNet

It Is Also Possible To Use WebBrowser Hacking To Infect Computers With Bot Malware . Hackers Can Attack On Big Target Website Using Your Pc To Take It Down !

5 ) Metasploit Framework

Its Open-Source Computer Security Project Actually Its Just Designed For Security Vulnerabilities To Find In System But Hacker Is Misusing It They Use It Exploiting System They Search Vulnerability In That System And Exploit It And Gained Access !

6 ) Crypter

Crypter Is A Kind Of Tool Which Make The Above Tools Undetectable From Anti Virus Didn't Detect It Thats Its A Virus .

We Have Discuses About Some Method's Which Hackers Mostly Used To Hack System . Now We Will
Discuses Hot To Secure Your Self From These Kinds Of Attack !

Hackers Create A Server File Using Keylogger , Password Stealer , Rat , BotNet , Software & They Send To User Download It And When The User Open It His Pc Became A Slave Of Attackers Always Send The File In Torrent Kinds Of Files , Games , Softwares , Or Some Hacking Software's People Search For This Kind Of Hack's And They Download Software And They Don't Know Its Infected And They Became A Slave Of Attacker Hackers Use Crypter To Make The File Undetectable From Antivirus But The File Will Be Detectable After 1 - 2 Week !

So If Some One Send You Link Or Asked To Download It Never Download It Or Downlaod It Wait For 2 Weeks After That Scan With Antivirus If Its Detect Thats Mean Its Contain Virus If Not Then Lunky  (^_^) !


Some Tips : )

1 ) Always Use Antivirus ( Paid Version ) .
2 ) Always Used Password For Antivirus .
3 ) Always Update Your Browser / AntiVirus ( If Any New Version Available ) .
4 ) Never Downlaod Any File If Any Unknow Send You .
5 ) Always Used Comodo Firewall It Help You Protect Your Pc From Hackers If Any Connection Incoming To You First Of All It Will Ask For Permission From You If You Think Its Any Unknown Ip Just Denied It Will Help You That Hackers Can't Connect To Your Pc Its Also Help In Closing All The Posts Attacker Try To Find Open Port And They Attack But This Software Help You To Close All Your Ports Which Make It Hard For Attacker To Exploit Your System Through MetaSpolit .
6  ) Always Used Anti KeyLogger .
7 ) Use Malwarebytes

0 comments:

Post a Comment

Subscribe to RSS Feed Follow me on Twitter!