TECHIES PORTAL

Now this is the portal for techies you can comment and ask your doubts to our techies around the globe and i am going to introduce one of our techie from US he is very well in calculas and programming languages you can find him in at facebook Robert he is one of our administrator in at our facebook group
 You can find more techies and hackers in at our facebook  group

 Lets talk about security threats What all are they ? And how it be? How can you help poor peopels using social meedia and much more
SECURITY THREATS

When a computer connects to a network and begins communicating with other computers, it is essentially taking a risk. Internet security involves the protection of a computer's Internet account and files from intrusion of an unknown user. Basic security measures involve protection by well selected passwords, change of file permissions and back up of computer's data.
Security concerns are in some ways peripheral to normal business working, but serve to highlight just how important it is that business users feel confident when using IT systems. Security will probably always be high on the IT agenda simply because cyber criminals know that a successful attack can be very profitable. This means they will always strive to find new ways to circumvent IT security, and users will consequently need to be continually vigilant. Whenever decisions need to be made about how to enhance a system, security will need to be held uppermost among its requirements.

The methodology and common ways of stealing datas and using softwares

1)Email hijacking and tricks
First one is spamming Spam is the abuse of electronic messaging systems (including most broadcast media, digital delivery systems) to send unsolicited bulk messages indiscriminately Mostly spamming containing two parts first one is email harvesting  then send emails to harvested emails with out permission read theese  E-mail spoofing ,e-mail bomb ,


Most common ways to hack email accounts 
Pretexting
Pretexting is the act of creating and using an invented scenario (the pretext) to engage a targeted victim in a manner that increases the chance the victim will divulge information or perform actions that would be unlikely in ordinary circumstances. It is more than a simple lie, as it most often involves some prior research or setup and the use of a priori information for impersonation (e.g., date of birth, Social Security Number, last bill amount) to establish legitimacy in the mind of the target.
Diversion theft
 Diversion theft, also known as the "Corner Game" or "Round the Corner Game", originated in the East End of London.(under study)upload later
Phishing
Phishing is a technique of fraudulently obtaining private information. Typically, the phisher sends an e-mail that appears to come from a legitimate business — a bank, or credit card company — requesting "verification" of information and warning of some dire consequence if it is not provided. The e-mail usually contains a link to a fraudulent web page that seems legitimate — with company logos and content — and has a form requesting everything from a home address to an ATM card's PIN.
you can download a most wanted e mail phishing application and learn how to use it gmail hacker

 

Baiting

Baiting is like the real-world Trojan Horse that uses physical media and relies on the curiosity or greed of the victim.

Quid pro quo

Quid pro quo means something for something:
  • An attacker calls random numbers at a company claiming to be calling back from technical support. Eventually they will hit someone with a legitimate problem, grateful that someone is calling back to help them. The attacker will "help" solve the problem and in the process have the user type commands that give the attacker access or launch malware.
  • In a 2003 information security survey, 90% of office workers gave researchers what they claimed was their password in answer to a survey question in exchange for a cheap pen. Similar surveys in later years obtained similar results using chocolates and other cheap lures, although they made no attempt to validate the passwords.