დდ●๋•lσ√є ιร иσт (manage) | May 15 (1 day ago) Information on hacking!!!▒ ▒ Information on hacking!!!▒ Apparently the activity of hackers is on the rise nowadays, so i thought it might be helpful to provide some general information on the subject.
The primary methods of hacking are making you leave your password at a fake log -in page, or stealing your orkut cookie.
A)Losing your orkut cookie:
One loses his orkut cookie by one of two methods:
1)Going to a pishing site 2)Running a cookie stealing script
Examples of the pishing site is newsonfocus.com - they are the most common spams at present and because of them many users have lost their accounts.
B)Fake login page:
When you leave information at a fake login page, it will send an email to a person with the information that you have submitted, allowing him to access your account whenever he receives that mail. | |
დდ●๋•lσ√є ιร иσт (manage) | May 15 (1 day ago) Keep your cookie jar safe... If the person somehow manages to get your orkut cookie (by one of these 2 methods), then he can access your account whenever he wishes even without your password.
The extent of it varies between scripts, but if you lose your orkut cookie, your account is most likely FINISHED! If you change your cookie, it is most likely that he will get your new cookie as well.
Therefore, extreme care must be taken against this.
Though not much can be done after being hacked, you can prevent cookie theft simply by being EXTREMELY CAREFUL!
1)Do NOT run any javascripts unless you trust the source, and are aware of what the script does.
2)Do NOT click on any suspicious website or download links!!!
3)Beware of sites like tinyurl.com. They are most often either the sites or the scripts that have been condensed to hide their nature.Either expand the link before clicking on it, or do not click on it at all.
If you think your orkut cookie has been stolen, check your "sent items" box under messages, there might be a mail to the hacker with some strange symbols.
Translated, those symbols probably mean "HA HA! You are screwed now!!!
If you are sure that your cookie has been hacked, my advice would be to delete your account and start over from scratch. | |
დდ●๋•lσ√є ιร иσт (manage) | May 15 (1 day ago) Fake log in pages. These are better (from your viewpoint) in some respects, but worse in others.
If you realize what has happened before you get the mail (or rather, while you are still able to access your account), then you just need to quickly change your password, and all will be fine. The password that he has in hand is redundant, and he can not do a thing.
However, if he gets the password, there will be NOTHING that he can not do. He can steal your communities, delete your account, and by changing the password,even bar you from using your own account. (things that can not be done if he just has your cookie)
Preventive measures:
1)Be careful what pages you give your password at.Check the url bar everytime that you are suspicious.
2)If you are worried that you have lost your password, CHANGE IT IMMEDIATELY! | |
დდ●๋•lσ√є ιร иσт (manage) | May 15 (1 day ago) Community protection. If you have communities that you want to safeguard, i would suggest doing this:
Create a seperate profile purely for the ownership of your communities. Transfer your communities, and then forget about it.Do not log in, do not accept friend requests, and NEVER click on any links.
To make moderating those communities easier, give moderation powers to your REAL profile. | |
დდ●๋•lσ√є ιร иσт (manage) | May 15 (1 day ago) Community recovery. Worst case scenario. You're id was hacked, and your communities were stolen.
Method of recovery:
Write to orkut.
http://help.orkut.com/support/bin/request.py?contact=contact_us_troubleshoot
After this, there you will recieve a mail in a few days. REPLY TO THAT MAIL!!!!
Keep replying. Reply everyday, and hopefully you will get your communities back in time.
The problem with hacking is that orkut has no way to verify whether or not you are telling the truth right away. So they need to go through their records....a manual,highly time consuming process. Even after this, there is still no guarentee of getting your communities back.
Still. Reply to the mail that you get.Do so AGAIN and AGAIN!!! With luck, you will get your communities back. | |
Shazada (manage) | May 15 (1 day ago) thanx it was helpfull | |
¤UФ ORKUT DON™ (manage) | May 15 (1 day ago) neat work | |
დდ●๋•lσ√є ιร иσт (manage) | May 15 (1 day ago) okay.... there was this software out which could be used to Hack Id's
it could only hack Id's with Simple Password......I mean weak password...
My advise is to keep a Strong password..No one can crack he strong Password....
Now about the Hacking thing People do.... This can be done by making a Fake Orkut Page....
there r thousands of Orkut fake pages....
My advice to keep safe from it is to Make sure when u give ur password to orkut the Site address on the address bar is : http://www.orkut.com/GLogin.aspx
Make a Fake Page of Orkut....
And give the Link to ur friends...
The one who clicks the Link.....and enter his Password and Username...his Name and Password Wi;l be stored Inside Adn only u can get it......
open www.orkut.com
right click anywhere and click on view source
a file will open in notepad.... it is the source code of orkut login page.. save it and use it to make any new page...... | |
დდ●๋•lσ√є ιร иσт (manage) | 4:38 pm (17 hours ago) hacking tutorial for u .... for hacking u must have a complete knowledge bout networking... so lets talk bout networking .... in Networking there is a word come ip address [ip stands for internet protocol] lets see whts this...
Ip is the particular address given to ur system to connect u throught internet... if u wanted to know whts ur ip address click on...
www.whatismyip.com
.........if u dont know the person's ip u wanna hack u can't get into their system........
how to know othere ip... Introduction::[Tracing ip address]
In here I have figure out some very easy but cool ways to trace out the geographical location and various other infos like ISP details etc of a remote computer using its IP.
Well I guess its one of the most important must learn manul for boys out there if you want to impress your friends particularly gals whom you’ll meet online in a chat room and tell them their geographical locations and ISP details and make them surprised and impressed J.
In the practical execution of this manual you don’t have to work much as it is very simple only you have to use your brain to understand some symbols and some format of expressions and use your IQ to execute things the right way. | |
დდ●๋•lσ√є ιร иσт (manage) | 4:39 pm (17 hours ago) how to get the IP of a remote system.. Getting the IP or Internet Protocol of a remote system is the most important and the first step of hacking into it. Probably it is the first thing a hacker do to get info for researching on a system. Well IP is a unique number assigned to each computer on a network. It is this unique address which represents the system on the network. Generally the IP of a particular system changes each time you log on to the network by dialing to your ISP and it is assigned to you by your ISP. IP of a system which is always on the network remains generally the same. Generally those kind of systems are most likely to suffer a hacking attack because of its stable IP. Using IP you can even execute system commands on the victim’s computer. Lets take the example of the following IP address: 202.144.49.110 Now the first part, the numbers before the first decimal i.e. 209 is the Network number or the Network Prefix.. This means that it identifies the number of the network in which the host is. The second part i.e. 144 is the Host Number that is it identifies the number of the host within the Network. This means that in the same Network, the network number is same. In order to provide flexibility in the size of the Network, here are different classes of IP addresses:
Address Class Dotted Decimal Notation Ranges Class A ( /8 Prefixes) 1.xxx.xxx.xxx through 126.xxx.xxx.xxx Class B ( /16 Prefixes) 128.0.xxx.xxx through 191.255.xxx.xxx Class C ( /24 Prefixes) 192.0.0.xxx through 223.255.255.xxx
The various classes will be clearer after reading the next few lines.
Each Class A Network Address contains a 8 bit Network Prefix followed by a 24-bit host number. They are considered to be primitive. They are referred to as "/8''s" or just "8's" as they have an 8-bit Network prefix. In a Class B Network Address there is a 16 bit Network Prefix followed by a 16-bit Host number. It is referred to as "16's". | |
No comments:
Post a Comment