Tuesday, July 14, 2015

How to Recover Deleted Files from Windows

How to Recover Deleted Files from Windows


Recover Deleted Files
Here, in this post about "How to Recover Deleted Files from Windows" If you accidentally deleted your files from the hard disk? Do you desperately need to recover the deleted files back in the original form? Ok Don't Worry About it. you can Retrive Your Data. the deleted files or data back from the hard disk  (even after you have Shift+Deleted).

Recovering the deleted files in back in the original condition is very much dependent on the efficiency of the data recovery software you use. So, it is necessary to make a right choice when it comes to the selection of file recovery software.

there exists hundreds of data recovery tools and software programs on the market which boast to recover 100% of all the deleted files back in the original condition. But in reality, most of these programs are neither effective nor capable of recovering your files back. So, I have many used Software for Data Recovery Related and Now i have find out the Best Software. I recommend the following Software as the best.

Stellar Phoenix Windows Data Recovery.

About it
 "Stellar Phoenix Windows Data Recovery "

This immaculate Windows data recovery solution. The software comes as a rescuer in times when your precious photos, music, videos, documents, and other files get deleted accidentally or in a frenzy to free up storage

>    Recovers photos, videos, and other multimedia files

>   Supports efficient scanning of storage space greater than 2TB

>   Searches lost or deleted volumes on Windows hard drive

>   Supports recovery from Windows 8.1/ 8/ Windows 7/ Vista / XP

Monday, July 13, 2015

49 Corporate Email Phishers arrested in Operation Triangle


49 Corporate Email Phishers arrested in Operation Triangle

The Europen Union’s Judicial Cooperation Unit, EUROJUST, along with Europol’s European Cybercrime Center (EC3) and the Joint Cybercrime Action Taskforce (J-CAT) have announced one of their most successful cyber actions to date.   The case, known internally as Operation Triangle, involves three lead agencies – Italy’s Postal and Telecommunications Police through its office in Perugia, Spain’s Investigative Court no. 24 in Barcelona, and Poland.  (EUROJUST Press Release: “Eurojust and Europol in massive joint action against cybercriminals”)
(Click for article:J-CAT operations)
58 search warrants were executed in Spain, Poland, Italy, Belgium, Georgia, and the United Kingdom, resulting in 20 arrests in Italy, 18 arrests in Poland, 10 arrests in Spain, and 1 arrest in Belgium.  Most of those arrested were from Nigeria and Cameroon.
By gaining control of the email accounts of well-placed individuals in corporations across Europe, the criminals were able to alter requests for payment to send the payments to themselves rather than the business bank accounts that were the intended destinations.  In a short period of time, more than 6 million euros were transferred to accounts controlled by the criminals.
In the United Kingdom, where the J-CAT task force is headquartered, recent government reports indicated that 81% of large businesses (>250 employees) and 60% of small businesses (less than 50 employees) experienced an information security breach in 2013.
(Report available here)

Next week, many European governments will be represented in the Octopus Conference 2015: Cooperation Against Cybercrime. Through the work of Octopus and others, European agencies are gradually coming into agreement on how to address multi-jurisdictional cybercrime.  At last year’s Octopus conference, delegates were encouraged to work together through 18 Cybercrime Scenarios.  Fascinating puzzles that we NEED agreement on if we are truly going to stand a chance against the multi-national criminals who steal from our citizens.

For the convenience of my mostly English-speaking readers, I offer an English translation via Google Translate below.  This article is available to the Italian reader by clicking the story headline in Italian:

Phishing contro aziende: 62 arresti in Italia e all’estero, smantellata rete internazionale

Phishing Against Companies:  62 arrested in Italy and Abroad, International network dismantled: 
An operation that goes from Perugia to Turin and expands throughout Europe.  Here’s how the scammers did it.
Via “LaStampa” journalist Carola Frediani and Google Translate — 
It all started with a payment of 33 thousand euro. A routine, a transfer made ​​by a company of the Venetian food, which through its Spanish subsidiary had paid a supplier. Or rather, what he thought to be a provider, not suspecting that behind the request for a change of code Iban which paid the money was concealed an organization dedicated to computer fraud to the detriment of businesses and recycling. He had before hacked supplier and now he was impersonating online through email.
So that money, rather than to the real suppliers of the Veneto, end up on a postal account in Perugia made ​​out to a citizen of Cameroon. Which in turn has contacts with a criminal group based in Turin, specializes in money laundering and run by Nigerians, as revealed recently in an investigation of Europol and the Guardia di Finanza Piedmont.

 Operation Phishing 2.0

This episode started then the footage of another Italian international investigation, codenamed Phishing 2.0, which has once again at the center of the fraud against companies, and this morning has resulted in 62 arrest warrants in various countries, including 29 issued by prosecutors in Perugia.
An investigation then born and coordinated in Perugia, bounced on Turin had already been identified where a hub of illicit proceeds, and extended between Italy, Spain and Poland, with the support of Europol and Eurojust, the judicial cooperation unit of ‘European Union.

The victims

Fifty (7 of which are Italian) companies all over the world were victims of digital fraud, 800 scam transfers were identified, 800 thousand euro taken away from businesses and recovered during the investigation, around 5 million euro estimate of the economic damage caused by the group in its business that dates back to 2012. The offenses: unauthorized access to computer systems, impersonation, aggravated fraud, and receiving stolen property.

How did it work

The mechanism of the scam started with a series of computer intrusions in the mailboxes of the companies targeted – characterized by having many foreign relations – through an advanced form of phishing, a technique that consists of sending email fake trying to trick the recipient, and then infect and / or [carpirgli] information. After obtaining the credentials of the emails of employees of a company, cybercriminals were monitoring the exchange of mail identifying commercial relationships, creditors and debtors; then they sent an email to the debtor to turn communicating a change of Iban [online payment destination address?]. Iban that actually corresponded to an account managed by a member of the organization.

To manage the assets of phishing was a network of Nigerians, Cameroonians and Senegalese, some of whom were residents in Italy. Once at the bank, also on many giro Italian, the money were taken quickly and redistributed abroad through various systems, including money transfer. “There was a division of roles,” he told La Stampa Anna Lisa Lillini, assistant chief of the police post Umbrian added. “Who identified the victims took 50 percent of the amount; who was offering the bill received 30%; and the mediator that the hacker got in touch and took the 20%. “ The amount stolen went from 800 up to 250 thousand euro. “In one case we have intercepted one wire of 300 thousand euro from America to  Turin,” explains Lillini.

Between Umbria and Piedmont

Turin made ​​from recycling center, and here the investigation Perugia converges with what we previously reported from Turin, [LaStampa’s article “Nigerian Drops: Women and Companies Cheated Online“] . In that system, the money stolen from the companies were sent to other parties, with dozens of credit transfers and of people involved, up to a stage where cash was taken piecemeal. A branched system, which were scattered in many streams ([ribattezzatto] precisely Nigerian Drops by investigators) and that has been traced through some specific analysis tools used by Europol. “In one case, one person has taken 150 thousand euro in eight hours making dozens of drops in different branches,” says La Stampa Captain David Giangiorgi of the Financial Police of Turin. “The fraud was perpetrated by persons residing in Nigeria. The money was sent in the form of assets purchased with the proceeds of the scam and then shipped to the African country. “

A growing phenomenon

This kind of scams are increasingly common. “Just this week, carrying out a survey of defense on behalf of an Italian company that had lost many thousands of euro through a similar system, we were able to triangulate who had sent the phishing emails, and these seem to come just from Lagos (Nigeria) “, explains Paolo Dal Checco, the Turin studio of computer forensics, Digital Forensics Bureau (Di. Fo. B) that has long followed precisely such cases.

The interesting aspect is that the story in question fraudsters had been in touch with the company through Skype, as well as email. And through the program of VoIP (and with some tracking systems of the email), computer forensic experts have identified the IP address of the interlocutors.“By now using increasingly sophisticated techniques,” says Dal Checco. “In some cases they go even to call pretending to be a creditor of the company contacted.

How to Spy on Text Messages Popular Ways to Spy on Text Messages

How to Spy on Text Messages

Popular Ways to Spy on Text Messages

The following are some of the commonly used methods to spy on text messages like as SMS, IM chat conversations and Emails.

1. Using a Spying App: The Easiest Way

Today, even though there exists a large number of mobile apps to spy on text messages, many are simply overpriced and some will never really stand up with the competition at all. However, there are a few spy apps that are really worth stating and mSpy is one among them. When it comes to spying on text messages, mSpy is my favorite one. In addition to SMS, this app is capable of spying on various text messaging apps like WhatsApp, Viber, Snapchat, iMessage, Skype and many more.
The following are some of the exciting features of mSpy which makes it a perfect choice for spying on text messages:
  • Spy on call logsSMS and Contacts
  • Secretly record emails, web history and bookmarks.
  • Spy on Internet activity including social media like FacebookTwitter and Gmail.
  • Spy on text messaging apps like WhatsApp, iMessage, Viber, Snapchat, Skype, LINE and more.
  • Track GPS locations in real-time.
  • Record keystrokes, photos and videos.
  • Operates in a complete stealth mode and remains undetected!.
For parents and employers, mSpy can offer an additional help as it supports a handful of control features as well:
  • Block access to unwanted apps and calls.
  • Remotely lock the phone or restrict its usage.
  • Remotely delete unwanted contacts, call logs, SMS and photos if desired.
  • Get instant alerts when profane language is typed or viewed.

How it Works?

After you order mSpy you will need to install the app onto the target phone which will only take 2-3 minutes to complete. If you need any assistance, the support team is ready to help you out any time you need.
Once the installation is complete, all of the recorded text messages and data will show on your online dashboard which can be accessed from any web browser across the world.
Compatible Phones: Android, BlackBerry, iPhone, iPad, Windows Mobile and Tablets.

2. Using a SIM Card Reader to Recover Text Messages

If you can’t really afford a spying app, you can buy a cheap SIM card reader from the market and use the target person’s SIM to recover text messages, phone contacts and email addresses stored on it. This can be done using the following steps:
  1. Switch Off the target phone and remove the SIM card from it.
  2. Insert the SIM card into the SIM card reader and plug-in the SIM card reader to the USB port on your personal computer.
  3. If your SIM card comes with a software CD/DVD, install it on your computer. This will help you recover any of the stored text messages from the SIM and store it on your PC for later review.
It is needless to mention that this method has clear drawbacks as there are chances of text messages from being deleted from the SIM before you get access to it. Also this method can only recover SMS (stored on SIM) and not other text messages from messaging apps like as WhatsApp, Viber, Snapchat etc
.

How to Track Lost Android Phone and Tablet

How to Track Lost Android Phone and Tablet

Your Android gadgets are the most important things in your life. It contains all your important contacts and information. If you lose your equipment, you will be losing all those sweet memories with the photos and video. But there is some good news to android phone/tablet users, you can now easily find or at least know where your missing phone is with or without using android application.
Let’s first look at the way of finding your lost phone which doesn’t contain any app installed on it.

Use the IMEI Number

Every android phone carries a unique IMEI number (International Mobile Equipment Identity Number). It will be printed at the back of your device. If you are unable to find the number, you have to launch your phone app and dial the number *#06#. This will give you the IMEI number of your phone. Store this number in a safe place so that it helps you in locating your phone when it is lost.
When you file a complaint, this number has to be added in the report. Your service provider uses this number to track your phone and tell you where it is. No matter if the person using the phone is using a different SIM card or has switched off the phone. Once the device is traced, you can request your service provider to block it from using.
This is one of the easy ways of locating your lost Android phone or tablet.

Plan B

Another way of tracking your lost Android gadget in no time is through Plan B app. This app does not require you to install any recovery software previously but still helps in finding your lost phone. All you need to do is log on to your Google play account. Lookout mobile security offers free software called Plan B. Download the software from play store to your phone. This will be possible only if your phone is within the Internet coverage area. Wait for some time and then send the keyword “locate” without the quotes through SMS to your phone. And a map showing where your equipment is will be sent to your Gmail account. This app is very much useful in situations where you don’t have IMEI number.
If you have installed and configured any of these below android software previously, there is good chance of finding it.
You can log on to Google Play store > My Android Apps, on your computer and check if you have installed any of the following apps previously.

Lookout Security and Antivirus

Lookout is the best android app for security and antivirus. So far, it has received millions of downloads. Just recall if you have installed this on your phone.
If you have activated the option “Missing Device” in this app, it is easy to find your device. If you have also enabled “Signal Flare” option, you can trace the last known location of your android device. This is helpful in case your phone battery is dead or tablet is switched off.
Now sign in Lookout to locate your device. The map shows the location of your phone. If you are at a short distance from the tablet, you can choose Scream option to make a loud noise to find it.

Android Device Manager

Google has recently released a new locator feature for Android gadgets called Android Device manager, which helps its users locate their lost or stolen phones and tablets. It functions in the same way as Lookout and Samsung’s “Find My Mobile”. Here’s how to use Android Device Manager.
Go to the Google Settings app, then select Android device manager. By default the locator feature is activated but to activate remove data wipe, select the box next to “Allow remote factory reset”, then select “activate”.
To use this feature, open the site https://www.google.com/android/devicemanager and sign in to your Google account. You may be prompted for permission to allow Android Device Manager to use location data. Select the Accept tab to continue.
Now you will be provided with a map that shows the location of your device along with other details such as the name of the place, when it was last used and more. The location data doesn’t help you if your phone is misplaced somewhere in your home. Instead of making a call to your phone using other’s phone, you can call your phone directly from Android Device Manager. This will make your device to ring with high volume for 5 minutes, even if it’s in silent or vibrate mode.
One feature that is missing in Android Device Manager is remote locking, which can be useful in preventing a stranger from accessing your data, while you’re tracking its location.
Apart from these, there are other apps such as Android Lost, Where do My Droid and GadgetTrak that help you in finding your lost Android phone/Tablet
.

Spoofing MAC Address on Android Devices

Spoofing MAC Address on Android Devices

Media Access Control address (MAC address) is a 12-character unique identifier assigned to a specific piece of hardware such as the network adapter of your WiFi device. In simple words, a MAC address can be used to uniquely identify your Android phone on the Internet or the local network.
Spoof MAC Address

Spoofing MAC Address on Android Devices

Even though MAC address is embedded on the hardware device during manufacture, it can still be spoofed to input a new one of your choice. Here is a detailed instruction on how to spoof MAC address on your Android phone.
Before you spoof the MAC address, you need to record the original/current MAC address of your device which can be done according to the instruction below:
  • On the Home Screen of your phone, tap Menu button and go to Settings.
  • Tap About Device and go to Status
  • Now scroll down to record the 12-digit code shown under Wi-Fi Mac address. An address would read something like:


    Example MAC address: E5:12:D8:E5:69:97

Requirements for Spoofing the MAC Address

  1. Rooted Android Phone
  2. BusyBox app installed on your phone
  3. Once BusyBox is installed, you need to install Terminal app
Once the above requirements are satisfied, follow the instructions below to spoof your MAC address:
  1. Open the Terminal app and type the commands as listed below:


    su [HIT ENTER]


    busybox iplink show eth0 [HIT ENTER]
    (This will show your current MAC address, just for your confirmation)
  2. Now, type the following command:


    busybox ifconfig eth0 hw ether XX:XX:XX:XX:XX:XX [HIT ENTER]
    (In the above command, replace XX:XX:XX:XX:XX:XX with your new MAC address)
  3. You have now spoofed your MAC address successfully. To check for the change enter the following command again:


    busybox iplink show eth0 [HIT ENTER]
    (Now you should see your new MAC address)

Friday, July 10, 2015

How To Create A Invisible Account In Windows XP

How To Create A Invisible Account In Windows XP



A really Quick tutorial on for windows XP on How To Create A Invisible Account In Windows Xp. What we have do in this hack is really simple just create a DWORD value in the windows registry and hack the windows user accounts .

Steps :-

1. Open Start menu then click on RUN.
2. Type in the Run Window Regedit
3. Windows Registry editor will open then navigate from the left panel :
HKLM\Software\Microsoft\WindowsNT\CurrentVersion\Winlogon\SpecialAccounts\UserList
4. Create a new DWORD, setting its name to the name of the account you wish to hide.
5. Then set its value to to hide it.
6. Enjoy its Hidden !!

NOTE : This account isn’t completely hidden because it is visible to administrators in Local User and Groups and also the profile is visible in the Documents and Settings.
Now How To Login In it after you have hidden the account : 
1. At Welcome screen, and you want to login to this account.
2. Press Ctrl+Alt+Delete twice and it will display the log-on promt.
3. Type the username, and the password and hit enter
.

Thursday, July 9, 2015

How To Block Specific Website on Windows 7

How To Block Specific Website on Windows 7


Hello...we learn that how to block any specific website at your home. Friends it will also possible on your office and your friends computer. here today i will show one tips. this tips for blocking website using Ip address of website. we learn how to get IP address and How it work. So now i m not taking more time. So Let's Start.
You have simply Follow Instruction that i will give you.OK !!

Here we  assume that i have block Facebook. so No one can open Facebook and Access  them and if any User trying that Open the Facebook, 
they Will showing Error like blow image when open Facebook.

so First we find How to find Ip address of Facebook.

Please Visit and show  " How to Find IP address of any Website ". 

Open Run and type  " firewall.cpl "

Click on the Advanced Setting as left side of the window. then open one another window like blow image.



Then

Now 1. Click On " Outbound rules" 
2. Click On New Rule...


Then

3. Click on Option "Custom" 
4. Click on Scope.



5.Select Ip address option " blow the Remote Ip address does this rule apply to ? "
6. Ok. 


7. Enter the Ip address of Website that you want to block Here Given ip address of Facebook.com
8. Press Ok and then Go to Next and Next After That asking Name of youe session thier type name and save it.

It will done.

If you access that Facebook site simply Disable the Rules that you Created.