Monday, 14 July 2014

Ways to Encrypt Data to Store in Cloud

For very many people, security is one of the most important issues when it gets to sending their files into the cloud. They worry that their files will be seen or even compromised by other persons because that is what took place in the past. The user accounts used to be hacked, cloud storage systems failed and personal files and data were exposed. Therefore, how can you successfully prevent that from ever happening even when the account gets hacked or something happens to your provider of cloud storage?

The answer to that question is encryption

Encryption can be defined as the process of making one’s files unreadable with a pass phrase or an encryption key so that even when another person gains access to the files, it does not matter because the intruder will only be able to see gibberish. To be able to see very properly what is in the file, one must have a key.
This article contains the two different ways through which one can make his or her files secure and be able to safely use cloud storage without any worries.

Available options

Essentially, when it gets to encrypting files in the cloud, one has two options from which he or she can choose, that is:
  • He or she may choose the cloud storage with a built in encryption.
  • Make use of a service which encrypts folders and/or files for him or her.

Cloud storage service with built-in encryption

Regardless of your choice, both of the ways to encrypt data to store in cloud have advantages and disadvantages. If you decide to go with the dedicated secure cloud service, you might be required to change the entire setup of transferring files to that specific service, familiarize yourself with the way it works and probably give up on a certain third party support, mainly if you come from the most well-liked cloud storage and syncing service, that is “Dropbox”. Alternatively, you have got everything under one hood and you do not have to worry any more about file security and integrity.

Service for encryption only

If you are using a service which is dedicated to encrypting your files, you will be having more control over which files you would like to encrypt and where you would like them to be stored. For instance, you may choose Dropbox, if at all you like the service; and not give up after encrypting the files properly. Conversely, your files might take longer to be properly synced in case you are getting them encrypted using third party apps.


Either way, it is believed to be very necessary to protect one’s files using the most proper encryption, most especially if he or she is using Dropbox for managing his or her critical files such as contracts, password databases, or any other personal or business files which may be considered to be very important.
Depending on an individual, some would like to install another software on their computers just for the purpose of encryption, while others not. Those who don’t may take advantage of the idea of signing up for a dedicated cloud solution which has built-in local encryption for all the files. Some of such solutions available include SpiderOak, Wuala and Cubby. If online viruses are among the things troubling you, you may also consider making use of the Norton Contact Phone number so as to inquire about how you can be helped.

How to Spy on BBM Messages

Spy on BBM Messages
Just when we thought that BlackBerry was dead and gone, or perhaps on its last breath, the BlackBerry Corporation (formerly known as Research In Motion) released a new series of handsets at the beginning of the year with the latest version of their OS the BlackBerry 10 OS. As soon as the set was released the initial worldwide reception was enough to get just about any BlackBerry critic to admit the comeback.
So BlackBerry sets are being seen sported around again which consequently means that the company’s legendary BlackBerry Messenger service is kicking and roaring back into action. The service is an in platform messaging software which allows individuals who use the BlackBerry platform to communicate with each other through messages without incurring any extra data plan or package fee. If someone close to you owns a BlackBerry then you will be only too familiar with this service and might also get the itch to read the messages that are being exchanged. Whether you are a concerned parent or suspicious spouse, to know what’s happening in their life, you must know how to access their BBM messages. Here is how to go about it.
1. Look For BBM Spy Software: In order to get into their BBM messages, you will need the help of specially designed software that can retrieve the desired data. However, there is a dearth of good programs that will specifically target the messaging service. Many apps will allow you to access phone conversations or call logs but not the actual messages exchanged in BBM chat. So when looking for software to use, make sure it specifies itself as a Blackberry Spy app.
2. Evaluate the Options: Once you find software that can access BBM messages, pick one that suits your needs the best. If you are unable to figure out any at all, then there are two good apps for starters that you can try. Spyera is a good option that solves many problems when it comes to spying. With this one you can access BBM conversations, emails, texts and even ongoing phone calls. You can also try MobiStealth spy software. Like Spyera you can use it to access BBM messages, videos and photos but not live calls. Both of them allow for the user to monitor the target BlackBerry remotely. With MobiStealth you can receive the data from an online dashboard or private email account.
3. Download and Install: Once you have decided on BBM spy software, you need to purchase it. In order for it to work it needs to be accessed from the target’s phone. That means you must physically retrieve the BlackBerry you wish to monitor and access the Internet. Stealth would be required on your side of course. After that you proceed to downloading it from the source site. Once download is complete, begin the installation process. Once the notification of installation completion appears, you can be sure that the spy software is successfully in place. Simply wait for conversations to take place and then monitor them

A Closer Look at a Vulnerability in Gmail

Vulnerabilities in GmailGmail follows a strict rule that doesn’t allow its users to have their first or the last name contain the term Gmail or Google. That is, while signing up for anew Gmail account, the users cannot choose a first or last name that contains the term Gmail or Google.
You can see this from the below snapshot:
Google or Gmail cannot be used as first or last name
This rule is implemented by Gmail for obvious security reasons. If the users are allowed to keep their first or the last name that contains the term Gmail or Google, then it is possible to easily impersonate the identity of Gmail (or Gmail Team) and engage themselves in phishing or social engineering attackson the innocent users. This can be done by simply choosing the first and last name with the following combinations:
First Name        Last Name
Gmail                       Team
Google                     Team
Gmail                       Password Assistance
From the above snapshot we can see that, Gmail has made a good move in stopping the users from abusing its services. However this move isn’t just enough to prevent the malicious users from impersonating the Gmail’s identity. This is because, Gmail has a small vulnerability that can be easily exploited so that, the users can still have their name contain the terms Gmail or Google. You may wonder how to do this. But it is very simple:
  1. Log in to your Gmail account and click on Settings.
  2. Select Accounts tab.
  3. Click on edit info.
  4. In the Name field, select the second radio button and enter the name of your choice. Click onSave Changes and you’re done!
Now, Gmail accepts any name even if it contains the term Google or Gmail. You can see from the below snapshot:
Vulnerability in Gmail
Allowing the users to have their names contain the terms Gmail or Google is a serious vulnerability even though it doesn’t seem to be a major one. This is because, a hacker or a malicious attacker can easily exploit this flaw and send phishing emails to other Gmail users asking for sensitive information such as their passwords. Most of the users don’t even hesitate to send their passwords as they believe that they are sending it to the Gmail Team (or someone authorized). But, in reality they are sending it to an attacker who uses these information to seek personal benefits.
So, the bottom line is, if you get any emails that appears to have come from the Gmail Team or similar, don’t trust them! Anyone can send such emails to fool you and take away your personal details. Hope that Gmail will fix this vulnerability as soon as possible to avoid any disasters.

How to Hack Yahoo Messenger

How to Hack Yahoo MessengerYahoo Messenger is one of the highly popular and most widely used instant messaging service in the world offering a wide variety of features to its users, all for free. This has made it the right choice for all those who are waiting to chat and communicate with their far away friends and relatives.
However, while some people use Yahoo Messenger only to chat with their friends and known ones, many others use it to have fun by joining the chat rooms and chatting with the strangers. If you’re a similar person who would like to have fun during the chat, this post if for you!
In this post, I will show you some really interesting Yahoo Messenger hacks using which it is possible to play pranks with your friends and strangers during the chat. Below is a list of some cool hacks that you’re sure to enjoy:

1. Chat with Multiple Names Simultaneously

How about chatting with your friend with two or more different names at a time? Well, do not think that this is impossible! This can easily be done with a simple workaround which enables you to chat with as many different names as you can with the same or different people.
For example, you may chat with Person-A using one name and with Person-B using the other. You can also chat with the same person using different names or any other combination. All of this goes really unnoticed by the user on the other side, while you are sure to have some real fun.
Here is a step-by-step procedure to implement this hack:
  1. Sign in to your Yahoo Messenger. From the top, click on Messenger -> My Account Info. You will be taken to a web page where you need to log in to your account.
  2. Now, you should be on the Profile Settings page. Scroll down to see the option Account Settingsas shown below. From there, click on the link which says: “Manage your Yahoo! aliases”.
    Create Aliases in Yahoo
  3. From the Aliases page, click on: “Add an alias”. You can create as many aliases you want. Choose unique names for your alias and once you’re done, click on “close”.
  4. You need to sign out of Yahoo Messenger and sign in again to see the changes. Once you have done this, double-click on any name from your contact list or chat room to open a new chat window. You should now see a list of your aliases appearing in the chat window to choose from.
    Yahoo Chat with Multiple Names
  5. To chat with multiple names with a single person, just follow the steps below:
    • Double-click on the name of the person in the chat room or contact list.
    • Select any name from your “alias” list and ping the user with that name. Immediately close the chat window before you get a reply from that person.
    • Again double-click on the same person’s name and ping him/her with another name from your “alias” list. This time do not close the window.
    • Just wait a few seconds! When the person replies to both your pings, you will have two tabs in the same chat window from where you can chat with the same person using two different names. Enjoy!!!
Before you try this hack, make sure that you have not set any display image for your profile. If not, there are chances of other person identifying your prank.
To disable the display image, just click on Messenger -> My Display Image from the top menu of your YM window and set the option to “Don’t share a display image”.
I hope you like this hack. Now let us move forward to our next hack that is even more exciting!

2. Play Prank with Your Friends Using a Fake Webcam

Ever wanted to fool your friends with a fake web camera? If so, here is a cool hack using which it is possible to fool users on Yahoo Messenger with a fake webcam on your computer. Below is a step-by-step procedure to configure the fake webcam on your computer:
  1. Download Fake Webcam software from the following link:
  2. Install Fake Webcam on your computer and configure it as follows.
  3. From your Yahoo Messenger window, click on “Messenger” at the top and select the option “My Webcam”.
  4. You should now get a blank Webcam Broadcast window. From there, click on File ->Preferences to open the “Yahoo! Messenger Preferences” window as shown below. From the “Category” list, select the option “Webcam Broadcast”.
    Configure Fake Webcam
  5. As shown in the above snapshot, click on “Camera Source”, select “Fake Webcam Source” as your source of camera and click on “OK”.
  6. Now, open the Fake Webcam application, load your favorite video and click on play button. You should now see the same video appearing on the Yahoo Messenger video broadcast window as show below:
    Fake Webcam in Action
  7. Click on “Broadcast” button on the Yahoo Messenger webcam window to start broadcasting the video.
If you are using aliases, you can change your webcam profile from File -> Change Profile option on the webcam window to enable the webcam for the current alias.
That’s it! You now have the fake webcam running on your computer.

3. Yahoo Messenger Invisible Hack

Most users on Yahoo Messenger hide their presence by activating the “invisible mode”, so that they appear as offline to everyone. But, how do you find out their true status? Well, here is a Yahoo Messenger invisible hack to catch those users who are hiding their true status by activating the “invisible mode”.
There are many tools out there to do this job, but most of them are found to have been infected with trojan and other malware. However, I have found some of the free online services that help you identify the true status of Yahoo users:
Just visit any of the above mentioned websites, enter the target Yahoo ID or screenname that you want to check and press the search button. With in a few seconds you will find out the true status of the user.
I hope you all enjoy this post. Pass your comments and share your experiences

How to Send Spoofed Emails Anonymously

How to Send Anonymous EmailsMost of us are very curious to know a method to send spoofed emails to our friends and family for fun. But the question is, is it possible to send spoofed emails in spite of the advanced spam filtering technology adopted by email service provides like Gmail, Yahoo etc?
The answer is YES, it is still possible to bypass their spam filters and send spoofed emails anonymously to your friends or family members. For example, you can send an email to your friend with the following sender details.
From: Bill Gates <>
The art of sending this kind of email is known as Email Spoofing. One of the easy way to send a spoofed email is by using our own local SMTP server. In the past, I have tried SMTP servers like QK SMTP server. This method used to work successfully in those days, but as of now, it has a very low success rate since Gmail and Yahoo (all major email service providers) blocks the emails that are sent directly from a home computer.

How to Send Spoofed Emails?

In this post, I have come up with a new method of sending spoofed emails to anyone without having to worry about being blocked or filtered as spam. In order to accomplish this, all you’ve to do is use a “relay server” while sending the spoofed emails.

What is a Relay Server?

In simple words, a relay server is an SMTP Server that is trusted by major companies as an authorized sender of the email. So, when you send an email using a relay server, the email service providers like Yahoo and Gmail blindly accept the emails and deliver it to the inbox of the recipient. If the SMTP server is not authorized, Google and Yahoo will reject all the emails sent from this SMTP server. This is the reason for which using our own SMTP server to send emails fail.

So, How to Find a Relay Server?

Now, all we have to do is find a trusted SMTP server so as to send spoofed emails successfully. Usually, all the emails that are sent from web hosting providers are trusted and authorized. So, you have to find a free web hosting provider that allows you to send emails. But, most of the free web hosts disable the Mail feature and do not allow the users to send emails. This is done just to avoid spamming. However, all the paid hosting plans allow you to send any number of emails. Once you find a hosting service that allows to send emails from their servers, it’s just a cakewalk to send anonymous emails. All we have to do is just modify the email header to insert a fake From: address field into it.
I have created a PHP script that allows you to send emails from any name and email address of your choice. Here is a step-by-step procedure to setup your own anonymous email sender script:
  1. Go to X10 Hosting  and register a new account.
  2. Download my script from the following link:
  3. Login to your FreeWebHostingArea Account and click on File Manager.
  4. Upload the sendmail.php, pngimg.php and bg1.PNG files to the server.
  5. Set permissions for sendmail.php, pngimg.php and bg1.PNG to 777.
  6. Now type the following URL:
    NOTE: yoursite must be substituted by the name of the subdomain that you have chosen during the registration process.
  7. Use the script to send spoofed emails anonymously to your friends and have fun. Enjoy!!!
Tell me whether it worked or not. Please pass your comments.