Thursday, August 13, 2009

For The Help of Police Officers

Police Officers Take a Note Please

Hi friends,
We posted here earlier about the hacking of Pay Pal Account and how to remain safe from that and now we are going to post a very useful comment of one of our reader, who is now in CBI. We think we need not to introduce you what is CBI. So please everybody read it and know that you are secured from cyber criminals who hack your Pay Pal Account as they may be caught with the help of Pay Pal by the police. And here is the Valuable command of Mr. Sanjoy Goutam of CBI India:-

Blogger Gautam said...

PayPal is pleased to collaborate with the Government judicial authorities for repression of crimes committed by or to the detriment of their users.

Requests for information from law enforcement and the orders of
acquisitions data the court should be directed to PayPal (Europe)
s.àr.l. et Cie S.C.A, 5th Floor 22-24 Boulevard Royal L-2449. These
can be sent to the Fraud Investigation Team

Requests for information by the police include:

• Send by fax on letterhead of the applicant
• Sign in charge of the investigation
• Direct to PayPal (Europe) s.àr.l. et Cie S.C.A.
Each request for information should include the following information:

• The e-mail address.
• All addresses and telephone numbers of the person you investigated.
• Your name, address, department, telephone and fax.
• Specific details about the information you need and how they are
needed for your investigation
*** Please note that PayPal has more than 70 million users and thus
more details
you provide will be more easy for us to identify the information you
have requested ***

PayPal (Europe) Ltd is an institution for the issuance of electronic
money regulated by the Financial Services Authority of the United
Kingdom and must abide by the Data Protection Act in accordance with
the laws. Therefore, for the release of financial details or
information on transactions carried out by our members, you must order
expressed by the court.


So many many thanks to Mr. Sanjoy Goutam from the heart of Urproblemmysolution Team.

What is File Binding

What is File Binding

Dear Friends,

Now we will tell you that dangerous thing of internet and computer science which is enough to damage your dear computer by coming to your computer home as your invitee and now you have started your guess what it is. We will not keep you in suspense and so now we will tell you what it is and why we are discussing about this. But friends we are discussing about this for informing you how danger it is. Do you know paper filing? We thing most of you know this as this is part and parcel of official work and our personal job. When we keep different papers in a file in a office and then bind it or we can keep the papers serially in a file and bind it its called file binding in our regular life. And same activity is done by the cyber criminals when they use this conception to hack or damage your computer. Now lets explain it to you in a easy way so that you can understand and keep yourself aware from this danger.

Two or more file bind together in a single file is called file binding. Lets take an example. Suppose you have downloaded a picture from Internet. You double click on it to view the picture. As you double click on the picture, it will open in your default picture viewer and an executable file starts running in background silently. That may be a virus, worm, spy ware and add ware or Trojan.

That’s mean picture. jpg + virus. exe = picture1.jpeg or it may be game.exe + virus.exe = fungame.exe

File binding can be done with JAVA programming easily. But the simplest way to bind two or more files in a single file is by using winrar, where we can bind many files into a single file. . And this is the most dangerous for them who downloads movies , ebooks and so on. Not only that we can also set the program priority, means which program to run first.

So we think we have made you clear why we have discussed this before you as in our next discussions we will discuss about different types of wares.

With Love

Urproblemmysolution Team

How To Prevent Attack Of File Binding

How to prevent attack of file binding?


Dear Friends,

We have told you what is file binding and now we are going to tell you how to prevent the attack of file binding as this will help you to know your file which you have collected from internet.

1. Always keep your anti virus updated.

2. Disable “ Hide Extension For Known File Types”

3. Use utility program like Registry Change Tracker.

4. Use a isolated folder in a different drive to stores downloads from internet

5. Always check the properties of the downloaded file before double click on it.


With Thanks

Urproblemmysolution Team

Saturday, August 8, 2009

How to understand your email id is spoofed




How to understand your email id is spoofed

Dear Friends,

We would request you to read it carefully as here you will find a point about a link on point no (2) and through that we have tried to tell you how to understand a dangerous link which is vulnarable to your computer as now a day the cyber criminals are not directly sending viruses due to strong antivirus programs but they are using links(url) to trap the netizens and spreading viruses and for that we would request you to read it be cautious.

Spoofed Email – Spoofing refers to email that appears to have been sent from someone other than the real sender. Virus writers and individuals who send junk email or "spam", typically want the email to appear to be from an email address that is not their own. Thus, the email cannot be traced back to the originator.

It is often impossible to know if you have received a spoof however to the careful observer there are several clues that help to separate a spoof from a legitimate communication.

Typically, you will know that your email has been spoofed if:

1) An email is from a commercial entity and the message requests that you provide your log in ID or your account will be suspended it is likely a spoofed email. Reputable commercial entities regularly contact their customers by email but they don't ask for log in ID because they already have it.

2) By highlighting links within the suspect email with the mouse cursor and to then looking at the status line at the bottom left of the screen. If the URL in the status line and the link your mouse is highlighting do not match up a spoofer is likely at work. Note that because JavaScript can be used to change the status line this method is not fool proof. Overall, this is a good technique because a lot of spoofers do not bother to use the JavaScript to change the status line.

3) You receive an email with a text file indicates a virus had been detected and removed/replaced

4) You receive a reply to an email from someone you never sent a message to

5) You receive an error message from a system administrator that you sent an infected file or that your message could not be sent to a particular user

6) You receive an email with a blank message.


With Thanks

Urproblemmysolution team

Tuesday, August 4, 2009

Fake SSL

Dear Friends,
Here is a good comment from one of our reader and we think that this will help our other readers to enrich their knowledge in this field and they will also be cautios in future by reading this. So thanks to Mr. Sitangshu for sharing his knowledge with us and as it is a good one we have decided to bring it before all of you in the main posting of our blog. Again thanks to Mr. Sitangshu and here is his comment for all:-


Blogger Sitanshu said...


There were some very interesting guidelines on this title. I still thought that you may like to mention to your visitors about "Trusted Sites".

Trusted Sites are those sites that have a trusted securities certificate. Companies like VERISIGN for example issue "Trusted Security Certificates". That certificate means that the site is protected by SSL (Secured Socket Layer). To obtain such a certificate "VERISIGN" company would thoroughly investigate the ownership and history of the site. Once the site has received such a certification, their clients could be rest assured that they are opening a "Original Site" and not a "Fake Site".

But the irony is that hackers have managed to find a flaw even with the way a browser could be fooled into clicking into a site that is not SSL certified.

During a MITMA (Man in the middle attack phase), an attacker could wait for a person to click on a site that has an SSL certfication. But that site is a bogus site (meaning the person sending the link inserted the trusted site certificate, but the really is not SSL certified" . It has a "Site name that contains a Proper SSL certified site name followed by a blank followed by the rest of the name which is "the complete fake site name".

FAKE SITE = GOOD SITE PARTNAME + NULL + FAKE SITE NAME

Browser stops reading at the NULL character

So when you click on the link with that kind of site name with a null character in the middle of the name followed by the fake site address, you are really conned into entering into a fake site that the browser could not catch. Here you start entering your personal data like credit card number etc. and you become a victim.

I tried explaining a difficult concept in a few words. For more clarity please visit this link on a recent news item...

http://www.msnbc.msn.com/id/32258426/ns/technology_and_science-security/

Please keep writing. We are all indebted to you and your blog.

Sitanshu

August 4, 2009 8:41 AM