Saturday 27 April 2013

As my first Post thought You something about Hacking(I hope).Now this is a quiz post Answer this if you can


 Question Number:1

Connect if you can:


                                            

                                            

                                            

ANS:They are Gottleib Daimler,Karl Benz and the car is Benz Patent Motorwagon N1 invented by them.                          

Dumblyyyyy!!!! Wimblyyyyy!!!!


What is the full name of the man in the picture???

                                              


ANS:Albus Percival Wulfric Brian Dumbledore

Flick Sick


What are these????

                             

                        ANS:Owl Pellets

Welcome to the Fantastic site of Quizmasters

Warning: This page contains Mind-Blowing Movies, Quizzing, Trivia, Hacking, Phishing, 
Internet Security, Computers Stuff That are To Hot to Handle.Join Now and Enjoy The Experience.

This is my First Post, Here are the ways To hack an Email account:-


Ever wonder how hackers actually hack into any email account? you might be thinking that it is a very difficult task. yes? not really. Remember Anyone can do this, its a myth that it is done by geeky nerds with incredible technical knowledge. some of you might also think that it is impossible, Yes it is impossible unless the victim is noob or has very poor knowledge of internet.



And if your account gets hacked, only you are responsible for that. for example:-
“In real life, consider a Car with a single matching key. Now you cannot Unlock this Car Unless you have the duplicate key and the duplicate Key can be made only if you get a chance to trace the original key. And this is possible only if the Car’s owner is careless.”
The same is applicable here. when your Account gets hacked, that’s only because of your carelessness. Believe it. Now a days hackers are targeting social networking profiles like facebook, twitter, etc. rather than email accounts. the same methods are used to hack social networking profiles. Anyways lets see how email hacking works. though there are many ways to do it, i will discuss 3 basic methods.
1) Phishing
2) keystroke capturing
3) Password Guessing 
lets discuss each of them in detail:-



1 Phishing

Phishing is a type of Social Engineering. this is the most widely used hacking technique just because it is really simple and affordable. This can be the simplest way of fooling someone to give you their login details or private information. Phishing is a criminal process of attempting to steal sensitive information such as usernames, passwords,credit card details by disguising as a trustworthy website.
[*]The only clear identification of a website is its URL.



Phishing is typically carried out by e-mail or instant messaging, and it often directs users to enter details at a fake website whose look and feel are almost identical to the legitimate one. The hacker usually sends an e-mail that appears to come from a a bank, or credit card company — requesting “verification” of information.
Please note that any email provider or any Bank Website will never ask you to validate your account by Mail, nor will they ask for verification information without a support request being processed.





Password Guessing is also a type of Social Engineering which deals with manipulating someones mind to figure-out his personal information. it requires good social engineering skills and thinking power. here the hacker knows the victim very well, rather hacker is a friend of victim. hacker could be your girlfriend, boyfriend or sometimes family member. also he might be your online friend with whom you share your your profile details including ‘date of birth’, ‘cellphone no’, and other favorite things such as cuisines,music,movies..etc. this information is enough for a hacker to start guessing the security question of the email account and in that way reset the password and put his own password and login into the account. and There is 0-20% chances that he will guess your security question and answer correctly.

Beware!
There are many fake ways of email hacking, you will see all over the internet. Most of these fake ways tell you something like “you need to send an email to account_recovery@yahoo.com with your password in the subject line” ,..etc etc .which is some fake Yahoo account owned by some hacker that just stole your password.

Symptoms:

People listed in your e-mail contacts report being flooded with spam messages sent from your account. Or, you start receiving a bevy of "bounced" e-mails from random addresses you don't know. You aren't able to log into your account or change its settings, or you've discovered the settings have been altered. You attempt to use e-mail, and find it has been blocked by your provider.

Diagnosis:

Start with the obvious: If your password no longer works for your e-mail account (and it's definitely the correct password), you can be almost certain that someone else has taken control of it. And if your e-mail provider has blocked you completely, it's probably because your account was spewing out spam by the millions, forcing your provider to shut it down until you regain control. This is a good thing, and you'll get it back. Likewise, learning from friends that your account has let loose a firehose of spam (which sometimes can be verified by checking the Sent messages folder in your account) pretty much confirms that some scumbag has figured out your password. Losing control of your mail and password combo can be especially calamitous if, like far too many people, you use the same ones for all the online sites and services you use, such as social networking, banking and PayPal. Even the dumbest hacker will do a quick e-mail search in your account to scrape for login info on other sites, and, in no time, will assemble a pretty good portfolio on you. Depending on the ambition and skill set of the hacker, on the time between when your account was compromised and when you discovered it, and on how secure your various online accounts are, your level of pain may fall anywhere between minor annoyance to personal and financial meltdown. Time is of the essence, and don't underestimate how deep this thing can go. 

Bounced messages are the digital equivalent of "return to sender, address unknown." On their own, bounced e-mails from strangers usually mean that a professional spammer has been sending spam with your e-mail address in the reply-to field (a process called "spoofing"), and hasn't actually breached your e-mail account. It's a crucial difference; having your account password compromised means your entire collection of e-mail correspondence has been exposed, while a spammer spoofing your address doesn't actually control anything. Unfortunately, while it's often possible to take back control of an infiltrated e-mail account (see below), once a spammer begins spoofing, you have no real recourse.

Causes:

While there aren't any hard and fast figures on what the number one cause of e-mail infiltration is, the overarching theme usually points to one extremely weak link: user behavior. Despite the many ways an e-mail account can be hacked, the one common element is that you, the owner, essentially allow it.

Every few years, studies show that the one reason spam is still so prevalent is because it actually works -- a percentage of knuckleheads can always be expected to open a spam message, read it, and be tempted by whatever wares or schemes are offered. Of course, many of those e-mails (and sometimes pop-up windows from strangers on IM, Skype and similar apps) are actually phishing attacks that dupe recipients into believing they've been sent a legitimate message from a business or friend. Naive users will then reply with the requested login information.

A fair number of people also think nothing of checking their e-mail on a public computer -- in a library, electronics store or Internet cafe -- and simply neglect to log out. It's a momentary lapse of reason (particularly since we don't recommend checking e-mail on any public computer), and can be the equivalent of walking away from an ATM right after entering your password.

The other gargantuan user misstep is having weak, easily determined passwords, or using the same combination of login e-mail addresses and passwords across different sites. If a hacker breaks into one site, they can quickly try the same logins on all the popular sites -- to potentially devastating effect. But, before you beat yourself up, it's also possible that your login information has been stolen because your PC, or one you've used, has been infected with spyware or some other assorted malware.