BASICALLY MY BLOG IS BASIC OF COMPUTERS AND COMPUTER RELATED TECHS AND GADETS.....
I WILL LEARN FROM ANY ONE IN ANY WORLD PLEASE TELL YOUR OPINION ABOUT MY BLOG ......
I KNOW LESS COMPUTER ....,,,,,,,,..SO INEEDED MORE SO PLEASE TELL YOUR OPININ ABOUT BLOG AND TELL ME ABOUT NEW THINGS
This extension allows users to forward multiple emails
just click the link given below the picture this will allow you to add a extension in your chrome browser
Follow the steps given below.
STEP 1: Download the extension from google web store
STEP-2 :Restart the web browser or close the chrome browser and open it again.
STEP-3 :Open Your Gmail Account
And Login Into Your Gmail Account
STEP-4: Select the mails which you want to multi forward and click on the forwarding icon:
this will ask you to give access to the multi forwarding from the google
STEP-5 : Give the permission to access the extension to read the mail from your gmail accounts.
you can then have the access and can forward n-number of the mail accounts to one mail to another mail
STEP-6 : Select the N-number of the mails you want to forward from one gmail account to another account .
Click on the multi forwarding icon to forward the mails.
Add the number of recipients to forward from one mail to another.
this will take some time about a minute to forward from another
this is the simple procedure and i just know this procedure and i wanted
to share this information
hai guys
sorry for the delay post
there is new type of virus called WANNA CRY which released from north krea according to indians ,but according to the russaians due to the american agency NSA million of data bytes are stole from them and it id used to create this type of worm.
what is RANSOMWARE ?
according to wikipedia Ransomware is a type of malicious software that carries out the cryptoviral extortion attack from cryptovirology that blocks access to data until a ransom is paid and displays a message requesting payment to unlock it.
How to get your data back without paying the ransom
There hundreds of types of ransomware out there, but cyber security researchers are working around the clock to break the encryption that at least some of them use. Unfortunately, the most notorious families have proven to be unbreakable so far. In spite of this, there are many other cryptoware strains that are not that well coded and which specialists were able to crack.
We recommend you read about how these tools work beforehand so that you’re sure that this is the best solution for your case.
Do keep in mind that decryptors could become obsolete because of constant updates and new, enhanced versions released by cyber criminals. It’s a never-ending battle, which is why we urge you to focus on prevention and having multiple backups for your data.
the attack with this ransomware is massive and it uses the unsecured a patch file definition in the windows xp
most of the world level organisation uses windows xp .but the microsoft has officially closed the update still they pass many organisation to keep their data secured .
TO PREVENT THE WANNACRY
for the prevention of the wannacry virus we have to keep update of the syatem
windows xp user please update your firewall and keep your antivirus updated
It also drops a file named !Please Read Me!.txt which contains the text explaining what has happened and how to pay the ransom.
Source: Symantec
WannaCry encrypts files with the following extensions, appending .WCRY to the end of the file name:
.lay6
.sqlite3
.sqlitedb
.accdb
.java
.class
.mpeg
.djvu
.tiff
.backup
.vmdk
.sldm
.sldx
.potm
.potx
.ppam
.ppsx
.ppsm
.pptm
.xltm
.xltx
.xlsb
.xlsm
.dotx
.dotm
.docm
.docb
.jpeg
.onetoc2
.vsdx
.pptx
.xlsx
.docx
The file extensions that the malware is targeting contain certain clusters of formats including:
Commonly used office file extensions (.ppt, .doc, .docx, .xlsx, .sxi).
Less common and nation-specific office formats (.sxw, .odt, .hwp).
Archives, media files (.zip, .rar, .tar, .bz2, .mp4, .mkv)
Emails and email databases (.eml, .msg, .ost, .pst, .edb).
Ransomware is writing itself into a random character folder in the 'ProgramData' folder with the file name of "tasksche.exe" or in 'C:\Windows\' folder with the file-name "mssecsvc.exe" and "tasksche.exe".
Ransomware is granting full access to all files by using the command: Icacls . /grant Everyone:F /T /C /Q
Using a batch script for operations: 176641494574290.bat
use endpoint protection/antivirus solutions to detect these files and remove the same
Network Connections The malware use TOR hidden services for command and control. The list of .onion domains inside is as following:
gx7ekbenv2riucmf.onion
57g7spgrzlojinas.onion
Xxlvbrloxvriy2c5.onion
76jdd2ir2embyv47.onion
cwwnhwhlz52maqm7.onion
sqjolphimrr7jqw6.onion
Note: For update on latest Indicators of Compromises, please see references to security vendors given in references section
Specific Countermeasures to prevent Wannacry/WannaCrypt Ransomware:
Users and administrators are advised to take the following preventive measures to protect their computer networks from ransomware infection/ attacks:
In order to prevent infection users and organizations are advised to apply patches to Windows systems as mentioned in Microsoft Security Bulletin MS17-010
Perform regular backups of all critical information to limit the impact of data or system loss and to help expedite the recovery process. Ideally, this data should be kept on a separate device, and backups should be stored offline.
Establish a Sender Policy Framework (SPF),Domain Message Authentication Reporting and Conformance (DMARC), and DomainKeys Identified Mail (DKIM) for your domain, which is an email validation system designed to prevent spam by detecting email spoofing by which most of the ransomware samples successfully reaches the corporate email boxes.
Don't open attachments in unsolicited e-mails, even if they come from people in your contact list, and never click on a URL contained in an unsolicited e-mail, even if the link seems benign. In cases of genuine URLs close out the e-mail and go to the organization's website directly through browser
Restrict execution of powershell /WSCRIPT in enterprise environment Ensure installation and use of the latest version (currently v5.0) of PowerShell, with enhanced logging enabled. script block logging, and transcription enabled. Send the associated logs to a centralized log repository for monitoring and analysis.
Application whitelisting/Strict implementation of Software Restriction Policies (SRP) to block binaries running from %APPDATA%, %PROGRAMDATA% and %TEMP% paths. Ransomware sample drops and executes generally from these locations. Enforce application whitelisting on all endpoint workstations.
Deploy web and email filters on the network. Configure these devices to scan for known bad domains, sources, and addresses; block these before receiving and downloading messages. Scan all emails, attachments, and downloads both on the host and at the mail gateway with a reputable antivirus solution.
Disable macros in Microsoft Office products. Some Office products allow for the disabling of macros that originate from outside of an organization and can provide a hybrid approach when the organization depends on the legitimate use of macros. For Windows, specific settings can block macros originating from the Internet from running.
Configure access controls including file, directory, and network share permissions with least privilege in mind. If a user only needs to read specific files, they should not have write access to those files, directories, or shares.
Maintain updated Antivirus software on all systems
Consider installing Enhanced Mitigation Experience Toolkit, or similar host-level anti-exploitation tools.
Block the attachments of file types, exe|pif|tmp|url|vb|vbe|scr|reg|cer|pst|cmd|com|bat|dll|dat|hlp|hta|js|wsf
Regularly check the contents of backup files of databases for any unauthorized encrypted contents of data records or external elements, (backdoors /malicious scripts.)
Keep the operating system third party applications (MS office, browsers, browser Plugins) up-to-date with the latest patches.
Follow safe practices when browsing the web. Ensure the web browsers are secured enough with appropriate content controls.
Network segmentation and segregation into security zones - help protect sensitive information and critical services. Separate administrative network from business processes with physical controls and Virtual Local Area Networks.
Ensure integrity of the codes /scripts being used in database, authentication and sensitive systems, Check regularly for the integrity of the information stored in the databases.
Restrict users' abilities (permissions) to install and run unwanted software applications.
Employ data-at-rest and data-in-transit encryption.
Carry out vulnerability Assessment and Penetration Testing (VAPT) and information security audit of critical networks/systems, especially database servers from CERT-IN empaneled auditors. Repeat audits at regular intervals.
Individuals or organizations are not encouraged to pay the ransom, as this does not guarantee files will be released. Report such instances of fraud to CERT-In and Law Enforcement agencies
Today iam going to post you about backing up the data from your phone.
nowadays every one has their own gadgets like i pads , iPhone,maybe androids.etc....
But did you even think of the phone is gone like ka-boom..
the problems in the touch phone are they are so thin and lighter in according to their screen,So this makes the phone exposure to many of our personal problems.
The smart phone may be dead due to the malfunction in the circuitry or due to a some biological or physical matters like water.
the another problem is the display works but the touch does not work.
if this happen the phone is dead.
so how to recover the data...
simple ways
METHOD-1
if your phone works finer like it does on and it it makes the sound if some one calls it is easy to take backup..
step1: use OTG cable to connect with mobile
step2: connect the mouse with the OTG cable
step3: using the mouse you can actually scroll down like a monitor in a computer
METHOD-2
use some software
Connect your device to the PC using a standard USB cable. If your PC is configured to automatically install device drivers and this is the first time you connect the device, Windows will start installing the default device drivers for the device. Allow the device driver installation to finish before going forward. If your PC is configured not to automatically install device drivers, proceed to the next step right away.
Download the USB Mobile Monitor installation package usbmmInst.zipFollow the installation instructions. The screen will flicker during the installation of the drivers which is normal.The installer will ask you to unplug the device and plug-it back again, please do so.
Click on Close to finish the installation. If the Android App is already installed on the device, your PC screen will appear on the device, if not proceed to the device installation step
METHOD-3
1 Once you have all the necessary files downloaded, getting everything set up is super easy. Since the iDisplay installation is basically automated on your Android device (just grab it from the Play Store), let’s focus on how to set it up on the computer. I’ll be using a PC for this example, but the process should be similar enough on a Mac.First, double-click thedownloaded driver fileto start the process. Depending on what version of Windows you’re using, you may or may not see a warning screen—if you get this, go ahead and click “Yes” to allow the program to install.
2 then install the software as like any other softwares
3 After restarting, the iDisplay driver should automatically start—check the system tray to make sure. If it didn’t start, just hit the Windows key on your keyboard and start typing “iDisplay.” It should show up in the menu, and you can launch it from there.
4 it uses a hybrid connection, so it works with Wi-Fi and/or USB. It’s rad. If you’re in a place where the Wi-Fi is slow (or it’s a public connection), just plug in a USB cable. At home? Wi-Fi should do the job just fine. Between the two, I noticed very little latency on Wi-Fi versus a USB connection, so I feel comfortable recommending both.
5 Once iDisplay has found the computer you want to connect to, go ahead and tap it. If you have multiple computers, you can swipe to cycle through them. A warning will pop up on the PC when it’s trying to establish a connection—if you’re using your personal computer (which I assume that you are), just click “Always allow” so this warning won’t show up again for that particular Android device.
6 adjust your monitor display according to the setup and the size of your need
7 Once you’re finished doing that, disconnecting the display is just as easy as connecting it. First, tap the green action button in the bottom right corner (you have to tap it—this can’t be clicked with the computer’s mouse).
8 This will open the menu in the left side, where you can select “Disconnect.” Once you tap that, your computer screen will flicker once again as the server disconnects, and everything will go back to normal.
today iam going to show you guys that how to stop anyone using your laptop drives without your permission.
many of our friends just want's to copy the details and data in our laptop or your PC
to do that many of our friends just plug in their pendrives and all other secondary storage devices
into our system and the data just like that.
For the persons who have the internet centers and system admins they will find you did tey to copy that.they find that using ubutu operating system which will monitor the computers which we are using at the school or colleges and internet centers
for the students and admins I will upload you a software to disable or enable or usb drivers his software is created by Intelliadmin
a simple software to disable or enable the usb drivers
today iam going to show how to download videos while you are watching online
we can use many ways to download a video from phone .but in computer it is totally different there are different ways to download a video a discription is given for software
KeepVid is quite simple to use. Just enter the video URL (video’s page address) and click the Download button. You will then be shown the various formats the video can be downloaded in, along with their download links.
Click on the appropriate link and the video will get downloaded. You can use it for Youtube, DailyMotion, Google Video, Vimeo etc. It also has a KeepVid program you can download for Windows but you need to buy a license to activate its use.
SaveVid is an online downloader which supports downloading videos from many other video websites. The process of downloading is simple: enter the video’s page URL in the input field and press Download button.
Then you’ll see the download options – click on your desired format and download will begin.