Saturday, May 11, 2019

GruntPy | A basic Grunt work tool for students of Penetration Testing and Networking

      For a brief introduction, I am myself a student of Penetration Testing. And my knowledge level is like a hay in a hay stack. You can't even find it. Anyways, standing today, 'Hacking', Python, Data Science, Machine Learning is probably the most hyped of words. Nobody seems to care about the inner workings of things or how and whys etc. Complex things are becoming more point and click. I beg to disagree if that's the way to success.
     
      A few days ago, I knew nothing of Python. I came to know Python, it's Sockets, and many more things are a great deal in real time penetration testing scenarios. So I decided to learn python, but instead of doing it the conventional way, that is by printing star programs and palindrome numbers, I thought to emulate more real world scenarios and make it work through lot's of hurdles and bugs. And finally, it came to it's semi-final completion. What did I do? A very basic Grunt Work tool for hackers and networking students. Basically a Port Scanner, which is not exactly a basic scanner like of those on the internet. i.e. with sockets and stuff. Socket's would have ofcourse done it, but I used a very powerful tool called 'Scapy' for the Scans. It can do half connect TCP scans, UDP and Ping scans.
Soon coming is banner grabbing, but until then, let's discuss the project.

      Now, The project could have been completed within 2 days, if I used Regular expressions, Netaddr module. But I challenged myself to do it manually. That is both going to help me with my logical thinking, and also the students that are going to use my tool the basics of IPv4 Addressing, Subnetting, and manual validations. The Netaddr module already has built in IPv4 and 6 format and subnet calculations. Also a lot can be done with IPs with this module, but What's the challenge in learning to code if I import every pre-cooked modules and just pass some numbers as arguments?
That's why, IP Validation, Subnet calculation is done completely from scratch. Looking at that code will help students understand subnetting, mentality of coding, and solving real world problems instead of printing stars. Also those subnet calculation and validation codes are written in modules, so anybody can import them as third party modules within their code and run it, and also as maybe a standalone application if need be.
       I have the 'Scapy' scripts written in another file, where the user can write or add their new scanning methods and call it from the main() function with a few lines of codes.
Also, I did not use system arguments, which means this will not function like NMap commands. This is I intentionally left as Interactive. You get asked to choose like a cellphone customer care menu and you choose what type of scan to do with this. So no need to memorize exact sequence of letters to make it work. As I said this is made to be helpful to new comers in this field. One new comer is uncomfortable with CLI arguments. So that's why I made it as easy as possible. So no need to memorize and can be better concentrated into the inner workings.
      Also, I added an option to save the results of the scan afterwords in an HTML file which upon completion will automatically launch the page from your default browser of choice.

      So, now I am going to share the GitHub link for the project for you to download, study and use. Feel free to comment, post bugs on Git and whatever you like to.
Do share for others for them to do the same. Stay knowledgeable.

~ Budhaditya Bose ~


Monday, May 16, 2016

Recording and Mixing good vocals with headphone attached microphone


     



          If You are like me, then You do not have a good or any Microphone, or an Audio Interface, or a Beastly PC, or Mixers, Pre-Amps, Midi Keyboards, Studio Monitors at all, and not even the money to buy it, But made a little track to sing on, But moaning about not having a microphone, I am here to give You good eager musicians little hope. Its possible to beef up the quality and production of the vocals recorded in a headphone attached microphone, pretty better than it should.
     
           Let me assume You have a headphone with a microphone attached to it, I assume that atleast thats a good one, say a Sennheiser or something like that. Now I accept that they are little bit better than the others to listen to a bullet or footsteps in a computer game. Nothing more than that.
Please remember, It will not nearly become the mix to be submitting somewhere serious. Its not a neumann of course, But a lot better than Your expectations.

          Now lets cut to the chase.
  • Recording : In a proper studio, You are getting engineered Room Acoustics and Sound Proofing, Glass partitions to barely allow air to crash within themselves, a costly Plop Filter, Mixers, Pre-Amps, costly Audio Interfaces, High Quality Audio Cables, Mic Stand, and here all you get is a headphone attached microphone with a poor cables and a poor copper plug. 
You have to get around all this. So lets talk about it. When you start to record, make sure that Your ceiling fans, computer fans, water pumps are off and all the doors and windows closed. Make sure that the jack is plugged in the PC pretty tight and optimal, so a little movement wont spark within. To make sure of that, introduce a weight or a clip to hold the wire firm to something. Next, These mics are super high sensitive to air plops and hisses, So, now where the hell would You get that, I have an idea, Use any filters, Best be a tea filter coz it has a handle to hold like this.
Now, It works very good with handling air blasts when singing avoiding plops. This is my tool of trade, my trick. You can thank me later. You have to hold both the mic and this filter with both the hands, and keep it very steady. Remember this filter also cuts the gain and depth of the voice, so hold them very close. 
Now, These mics are also very sound sensitive. So when You are recording, It tends to capture all the sounds from your reference headphones, like the metronome, backing track sounds, which disturbs the tracks and make it near to impossible to insert effects and cure the vocal track later. To decrease the anomaly, just reduce all these metronome, and backing tracks volumes to minimum, only for the reference to sing. Start recording.....
So the recording phase is completed.
Now it comes to post recording.
  • Post Recording, Editing and Mixing : Make sure, No effects were on the inserts, when recording, because it effects performance, its like an illusion to the singer himself that he is doing good when actually not. Plus, I use ASIO4ALL as an emulated virtual audio interfaces, so pre recording effects effects performance of audio engine, CPU, and increases latency.
    So I recorded this empty. Now comes post recording effects. I used all of Steinberg Cubase 5's plugins. No external apps used. 
1) First comes Auto Tuning. For starters Its a good misconception that auto tune is used solely to correct notes and nothing. Its also used for pitch straightening. In a pop or a balled, modulated voice doesn't go great. Its not possible for humans to sing de-modulated. So pitch straightening gives a smooth and appealing sound. I will give an example...
This one is un- straightened.

This one is straightened


This straightening really makes a lot of difference. Now after the straightening done, we will concentrate into hiss sounds. due to a poor recording gear, and not being an acoustics room, The recording will contain a fair amount of hiss sounds and specially the portions where there is a gap within words. When amplified, compressed, this hiss sounds also amplifies and becomes too much annoying.  I will be mentioning the left over Hisses within the words later, But we have to first cut off the within words hisses. But cutting them off completely will give a glitchy start and stop in the mix. So we just have to decrease the gain of the hisses to the minimum. Lets see an example...


First lets mark the points of the spaces and hisses, then we will zoom in and lower the gains.
Example : 


Look, I have minimized the volumes already. Now comes the inserts part.
2) Compression : I used cubase's default compressor. I used low threshold with very tight compression ratio, Automatic release, with an increased make up to fill up the compressed section and increased to attack for the punch in the face word throw. 
3) Maximizer : I used a maximizer insert to make up the compressed part of the vocals.
4) EQ : As I said, recording with a filter and cheap gear takes away a lot of depth. So we have to manually compensate the loss. I completely minimize the lowest frequency, and Increase the lower mid frequencies, and also increase the higher ends a little for the crispy vocals.
5) DE-ESSER : An awesome plugin to reduce the excessive throws of the "S" sound in a vocal track. Really an awesome plugin to use.
6) De-Noiser : It helps reducing all the additional blips, and pops even after using de-plop filter. Now for the special purpose, Select white noise, and reduce it, White noise is the poor quality HISS sound lying in the words. The white noise denoiser decreases it. Now all this denoiser also affects the high ends a little bit, so remember to compensate the high end frequencies with the EQ.
7) Digital Harmonics with auto tune : We all love harmony, but it doesn't goes exactly the same way. But doing it the same way is sexier. To do this, duplicate the vocal track, and shift upto 5 notes in the auto tune. Now the voice becomes glitchy, female y, and bad, but is hardly noticable when the volume is decreased with the original track playing. It sounds just great. 
8) Analog synchronize : Notice all the keywords of the song. They generally are the ending words of a line, Re record them in a separate vocal track and apply a different EQ if possible, according to your taste. I use "Telephonic Voice" for example. 
9) Delay and Reverb: Apply delay and Reverb as per needs and feel of the song. Try not to give much reverb to the main vocal track. It looses its punch.

All these analog and digital synchronizing gives the track a good amount of depth.
Hear for your self. I made a partial cover of DRAKE's HOT LINE BLING cover, Just with my headphone attached MIC, and all the parameters I explained above.....
Here is the video : 



Find me on : 
Twitter : https://twitter.com/TheBoseSounds

T H A N K   Y O U

Sunday, May 24, 2015

postgresql Error || ssl.key || server.key || access denied || FIX || - level - Intermediate

Hi, I am Budhaditya, The tech fellow once more, And I am here to talk about some truly carriage issue on Kali Linux here. Its a moderate level post, so in the event that you don't know anything about Linux/CLI/Kali, I would propose to pull out, as you won't comprehend a thing.
|
Its about Postgresql. Postgresql is an open source DBMS which is utilized as a part of Kali linux to keep up its database. Recently I had a hopeless night altering a sudden issue with postgresql startup. It said that it is having issues with getting authentication to server and ssl keys. I never had this issue nor I am myself a genius to see every one of these things. So discovered each web journals, discussions and so on however discovered nothing straight forward and helpful except for got a thought regarding what to do. Its a basic issue on evolving authorizations.
|
Databases and SSL manages encoded private keys, which I don't know much about, however I will say, that, as it is private, they doesn't permit everybody to utilize it. the Root client, or the Postgresql Administrator will just have the privilege to utilize it. So the principle mystery is, you need to discover those keys and change the Permissions. Presently in Linux frameworks, there are various indexes, containing comparative documents which is elusive without great experience. Today was hellfire of an affair, so I am sharing it.
|
You need to go to filesystem -> var -> lib -> postgresql -> Version -> Main -> And here you will discover, Server.Key file. Change its consents to - Owner as postgresql administrator, and authorization to Read and Write,
Furthermore, for next step, go to and so forth -> SSL -> private -> change ssl-cert-snakeoil.key 's consent to again - proprietor as postgresql administrator and authorizations as Read and Write.
|
Tweek here is, other than proprietor account, Both Group and Other Account's authorizations must be set to NONE. At that point just postgresql will work.

In the wake of doing this, My postgresql is currently opening effectively once more.

THANK YOU

Wednesday, May 20, 2015

Computer Lab? || In a big room? || Or in a computer Itself?

 Introduction to Virtual Machines.


Hey, Its Budhaditya the Tech guy again, And I am here today to introduce you to something awesome here. Its every tech guy's dream to have multiple computers interconnected in a room, May be software testing, Different OS choices, Penetration testing etc. But what if you don't have funds like me?
|
Here I come to introduce you to Virtual Machines....
|
So What are they? They are emulated hardware platforms where you can install almost all existing operating systems without even paying a penny (Optional).
Two years ago, I wandered what Virtual Machines were? You know techie movies always have these names? For example, Untraceable, Hackers, Algorithm. etc. Now I am the one using 4 Virtual Machines at a time.
|
Some Names, - Oracle Virtual Box - Free, VMWare Workstation - Free Player and Payed Full version Workstation, Windows Virtual PC - Also free.
|
Requirements, -You Need 3 Main Things - Good Hard Drive Space, Great Processing Power, Intel - i5 - i7 Would be great, and a hell lot or RAM. Preferred 16 GB.
|
Another thing you must have is a Virtualization enabled CPU. You must enable it from Bios. It will be on bios as either VT-x (Intel) or AMD -V (AMD).
|
What I Personally use? - Oracle Virtual Box. Why? its Free.
|
How to set it up?
- Setting up any Virtual Host Platforms are pretty same. I will be showing today's example with Virtual Box.
Download link - Click Here
We need another addon called Virtual Box Extension for USB2/Intel PXE Rom/Guest Options etc - Talking about this later.
Extension Download Link - Click Here
|
Installation - Installation is pretty easy. Just run the Setup.exe and follow on screen instructions until successfully installed, And after The main package is done, Install the Extension pack, And now you are all set.
|
Creating and Installing a Virtual Machine. -
Download the OS Image file you wish to try/work/test. Or You can use bootable USB, Or just an old school CD/DVD. I Suggest using Image options for better speeds.
|
Follow The Images.

Open up Virtual Box, And Create NEW by clicking it.


In the Create New Virtual Machine Menu,
Name your VM,
and Select Kernel type and version
Select adequate amount of RAM,
based on OS requirements
Create a new Drive.
 There are other options for adding a drive manually later.
Choose VDI (default)
VDMK will also be compatible VMWare
Rest are rare and developing based.
I suggest to go with Dynamic Allocation,
Advantage on Dynamic over fixed is, After you setup a specific disk space, Dynamic Allocation will limit the drive to that space, but will fill up as per Data usage unlike Fixed. Fixed will just cut off a specific size from the HDD, which is not very economical.
Set the dynamically or fixed allocated disk space,
according to OS requirements.
After you click the last "create" button,
Your VM is now ready to be setup.
Click and go to the newly created VM's properties, and setup according to following images.
Until you want to leave your VMs completely unattached with host,
Enable these. Shared clipboard means, You can copy paste from host to guest or vice - versa
And Drag'n drop means, you can transfer files with simple Drag and Drop.
Leave rest options as default.
Boot Order is pretty important, As you need CD/DVD to boot your VM up
RAM adjustment can also be done here.
On to the next tab, is the Processor.
Leave execution cap as default. 
Now, If you have multi core CPU, and if you are going to do heavy CPU consuming jobs on VM, I suggest to increase Core count. 2 cores for Windows 7 is okay. 
Very Important - Enable PAE/NX. 
PAE lets to Above 4 GB usage of RAM on 32 Bit Operating Systems.
NX protects RAM From Random execution of Malicious Codes.
Some OSes need it, Some Don't. If OS Boots up without PAE/NX then no need to enable it.
If you are gonna use GUI VMs and t do basic Graphical jobs, I suggest to enable 3D Acceleration and Giving the full video memory. If you want to use multiple monitors, Just increment the monitor count.
This Part is important.
Networking - NAT means Network Address Translation which breaks down one IP Address to several internal IP Addresses to be used by multiple terminals. VirtualBox has NAT Built in.
Bridged will be another main option, Bridged will make your VM another machine on your Router.
So before you select Networking modes, Know what you want to do.
And You can also use multiple adapters, and can use both NAT and Bridged.
Others are Host Only, Internal NAT, etc. which are not for Web Connections.
In this Shared folders stage, You can define a specific folder/drive to be used as network drive from VM. You can check read only, So you can just read/ and copy files from Shared drive to VM, But in unchecked mode, You can read/write the drive. And Checking Auto-mount will automatically mount the drive for VM use.
After you are done with settings, Start your VM and it will wait for Disk. Select Real DVD/CD or virtual image drive. And after that. You are ready for as usual OS installation like as it would have been in a real host machine.


After Installation - After installation, Mount Guest Additions Disk from devices tab and install required drivers including Guest. Its easy on Windows systems, And if you want the same in linux,
This is the link to another of my blog posts about just "Installing Guest Additions on Linux"
Link - Click Here

Conclusion - Until your computer is Super fast, Do not expect to get smooth Virtual Experience. Virtual Machines will not be as fast as host, Host will be slowed down, Processor will be at peak, But you got your own lab right in your PC. 
|
This tutorial was a request from a fellow friend RKZ. 

THANK YOU


Wednesday, April 29, 2015

ASUS Chrome Box Review | Failed to impress

Well Hello! I am Budhaditya the Tech Guy, And I am here to demonstrate briefly about the new revolutionary Asus Chrome Box, and state my reasons on why it failed to impress me.

Well, You might say I am a complete moron to tell this product not good, but I will give you my reasons,
But first, I am gonna give whats good about it.
Well, just looking at it, anybody can say that this is small. In reality, It will just fit on your palms, Its light, and it still contains a whole nearly desktop level hardware. It contains a 16 GB SSD which means it runs crazy fast, CPU varies on different products on different prices, that is, it has celeron, i3, and i7 processors. And the price ascends respectively. DDR3 Memory from 2 - 4 GB with 2 DIMM Slots. Intel HD Graphics of 4000 or 4400, with a power requirement of  65 Watts which will be available from the adapter supplied from the vendor. And the OS - It runs on Chrome OS. 
All USBs are USB 3 And what is more interesting is, it has passive cooling, means no fans, And it doesn't heats up also.



Now It is cool with a user who would just surf the internet, write some documents, take it to office for presentations, But coming on a little higher level, that is a hot blooded home user, Chromebox doesn't suffice.
The main problem with this device, that it holds a middle position of both a portable and a non portable device. Which means you can use some of it's features as both, Some of aspects not.
As I said, It also has an i7 varient, which means its a both costly and performance device, But in another hand it has an OS which is very limited.
For 1 brief review, Its like using a very costly, advanced, performer android phone which doesn't have a touch interface, Doesn't have a battery, a display, and in one word, Un-usable at complete portability conditions. On another side, It has a desktop like setup, where there is a lite Operating System installed i.e Chrome OS, which is based on linux but is mainly a web application system. Very Light. Also feels like running blue stacks or Virtual Android Machine on a very hi-def PC.
Now whats the use of using a Lite Chrome OS on an i7 Architecture? Is not this an over kill? Plus You basically can't do anything except than word processing, surfing, youtube and all. Android store, Android Apps not supported (TILL NOW) , Windows Applications Not Supported (TILL NOW) , No external devices can be installed, Specially the once with driver packs, because Drivers cannot be installed, Which also means you can't connect an advanced USB WiFi adapter to it. (It has wifi, But an adapter is needed for a few things). Only option is chrome store, Which is still new, and not very versatile. 

Everything I just said is for a regular computer lover user. For geeks, Nothing is impossible. Chorme OS will support android Apps soon. With Developer mode, Complete OS Change, Running Pure Linux, Installing Drivers, and Almost everything possible with a desktop PC is possible. But it wont be a typical ChromeBox any more. ChromeBox is very very limited.

Final Comments : If you are yourself a super lite user, who can work with a lite web based system, Chromebox is Good,
If you are a computer lover but not a geek, who bought this by its looks, performance, portability and a different OS experience, You will find this device super boring.
And If you are a geek, Who can alter ChromeBox to a Pandora's Box, Its also a good go.
But, as I said, Of you are looking for a review on "How CHROMEBOX is? I wanna Use it." I would just say - Boring.

THANK YOU

T

Sunday, December 21, 2014

Tech Talk Today - Phones

Hi guys, I am back after many days, and came back with some tech talk and news about phones.

Well First to say, This year, iPhone 6 and iPhone 6 plus came out, and like every time, we techies do not seem to care. Its really a question to me how iPhone is top searched tech device globally (According to Google Search Statistics 2014). Because even non techies and regular Joe can understand Android. Not deeply enough, but to work with, Android is fine enough. Android is of course open source, Can be debugged by user, And many things, but a regular Joe doesn't needs to know all these. Android is pretty easy. But Still iPhone holds both Market value and top searched device. Us Indians are quite responsible for this disaster. How? Because, In our country, iPhone is not a symbol of simplicity or anything. Its just a status. The one who owns an iPhone indirectly tells people "Look, I have an iPhone, which means, I can afford it". To them, Android is cheap, so they won't buy, but they don't realize, that The phone's hardware is the main investment here. Android OS is by itself free. Anyways, If we stop speaking of
wannabes and rich douche-bags, Another reason for apple's top form may be, as follows,

1)Android versions changed and got updated several times within the iPhone 5 - 6 came out.
So time for new ROMs, new Updates, New customizations,  and even new Phones. One Techie man buys minimum of 2 - 3 phones within the time iPhone versions change.

2)Android is for many many phone companies. iPhone is only one of its kind. Which means, if suppose 100 people wants to buy iPhone, He goes only for iPhone, But if 100 people want to go for Android, He/She have to choose between various phone companies namely Sony, HTC, Samsung, Micromax etc.

Conclusion - The number of Android OS users is the total number of android phone users. So if we do sum of them, iPhone statically wound't come to the list :)

Anyways, Lets leave talking of stuff techies already know of, Lets talk about some new phones I prefer Phone freaks should buy.

        First of all speaking of, - There are already great companies like Sony, HTC etc, But from India, We get Micromax from Gurgaon here with almost as same specifications of Branded imported phones in less than half of their price. But to be honest, as low is the price, is same as low build quality. Micromax serves as the device for all bellow average, average, and fair money income society, thats why Micromax has to degrade some of its quality. For visual problems, The Camera quality, Sound quality, Sound recording quality, Display quality is not given as promised. But when it comes to Hardware, CPU and SoC, Micromax is not under high priced phones.
To me, Micromax is not the phone to serve personal purposes. Its not highly reliable like Sony or HTC. But as I said, this blog is mainly for Techies, So Who cares, Micromax serves for Developers and testers, who likes to play around with ROMs, Recoveries, Partitions, and pure technical stuff. Who needs a good camera to install new ROM? LoL . Jokes apart, Another phone brand came in mind called "XIAOMI", so called the device of all humanity, Low priced and hi def hardware. Later we all came to know that It was pre installed with backdoors, and Many configuration problems, where you have to stay with MIUI ROM, and with viruses. DONT BUY EVER. Anyways,
 
      Micromax spoke of a new phone yesterday, which is yet to be released, named as Yureka.
Owners of Micromax confirmed some days ago, that this new Yu series will be the device specially targeted for developers. They said, that they will provide warranty even after rooting and customizing device. And for Hardware, The phone is packing a BEAST, - Qualcomm 615 SoC. And default ROM from Cyanogen - Cyanogen 11 with just the price of 8,999/- INR. Which will be exclusively sold on Amazon.

THE MICROMAX YUREKA

So for SoC, It packs with a Qualcomm Snapdragon 8 cored 64 Bit CPU clocked at 1.5 GHz, 2GB of DDR3 RAM, Adreno 405 Graphics Processor, 4G LTE modem.


Next it offers Android 4.4.4 Kitkat within Cyanogen 11 OS, which is optimized for greater battery backup, security and reliability. Micromax promises Android updates in the future.


For other features, Lets talk about Camera. Now I am not fond of Micromax Camera, but What? this time they are offering Sony's CMOS sensor. My favourite brand of all time. Yu is equipped with a 13 Mega Pixel Primary camera, with Sony CMOS Sensor, and 24 FPS full. And a 5 Megapixels camera at front.




Moreover it has an IPS display of 5.5 Inch with a resolution of 720 x 1280, with 267 PPI protected with Corning Gorilla Glass 3.

To note, that to power all of those beast, the power source is not enough. It only packs with 2500 mAH. Where imported phone specifications of even nearer to this phone, packs with 3K + mAH. But as said, Developers, from when did they need great talktimes? LOL.

A very important point for developers, It has an internal memory of 16 GB, where 12 GB is free for internal apps. And rest upto the hands of developers.

So, To me, This is a great phone for developers, and both Personal use to a little extent, with a good build quality too. If I get some money this year, I am going for this phone genuinely.

The final image -

Thank you

Good bye


Monday, July 28, 2014

Social Security Awareness : How are you possibly get hacked?

YOU ARE BEING HACKED!



So? What up viewers? I am Budhaditya here again with some discussion about social security awareness. Today I will discuss about how newbie and less experienced internet users, or even the experienced ones, get "Hacked" . You guys are important to me, So I felt to write some lines about how can you possibly protect yourself from loosing your personal information, your Bank accounts, your Facebook, Gmail, Twitter accounts. And how you are possibly get trapped.

So lets start about newbies a bit. :- When someone gets internet first, everything comes with the white RJ45 Cable or the wifi tower is the universe. That writing on a white page called G O O G L E is everything you ever wanted. Now before getting internet connection, every one has a a mega list about how and what to download. And Whenever you get the connection, its like "what the hell I thought about?" Any ways. Lets say the first you write is "google chrome free download" And as soon as you hit the enter button, you are listed with a big number of links to download it. For the truth let me say, the first 5 links may have nothing harmful, because they are most probably hosted by very legitimate websites. Now after 5 or 6 links? you may get stuff like : "Ultra Speed Google Chrome Available for Free download, /or a crossed 30$ as free, available for download for today only. 100% discount" You hopefully go for that, download a 456 KB, or even 15 or 100 MB of file instead of just 26 MB, double click it, May a google chrome installer really opens OR the file just vanishes from the desktop? You know you are dead man. Now you see a series of hangs and crashes, Your friends tell that its a virus and you have to format? you do it and never download chrome from that link, or go for modded Chromes again. What you gained here is a little bit of experience. Now what was that? This is called "SOCIAL ENGINEERING" The uploader knew that newbies like you will open it. Now what has the Hacker got and what can he do with it. 1st of all, He will make a permanent connection to your Computer, so no matter what, He gets a connection commenced automatically when you start your PC. In this case he will make his virus run at start up. Now as he is secured of his connection, he will try to make sure that you are not trying or installing any security measure to detect whats wrong with Victim's PC. Now he is kind of an owner of your PC. He can make guest account enable, grab or change your OS Login passwords, Make a new account for himself, Transfer files, Steal every single data you have in your PC. And the most important is, he can even use your computer to hack other big things, so he is not in the process directly. So the security would have a hard time finding him. This activity is called "PIVOTING" . He can also use it for "DDoS" i.e "Distributed Denial of Service" attacks. So you guys got a Hint right? about what these people can do?

Lets state some examples now to demonstrate how you are trapped every time.

Suppose, for the most common one, you simply type on google, "abcd.mp3 free download" you will find many links as well. Any links will have many fake download buttons now a days. One will be genuine or even not one. You will/or already have seen, that, when you click the "Download Now" button, They redirect you to a page where you have to download a downloader first to download the song. Who knows if that page doesn't have a Virus? Also, these adverts may have browser hacks, which will lead all of your browser data to be stolen by Hacker.

Again,  you see a video on Facebook stating, "The cancer you may already have", you click the link, either you are being re directed to a downloader, or an advert, or a "fake facebook page" (Talking about this later), wanting you to log in. And the most common, as soon as you open that video, you will see a confirmation box for saving the video file. Majority of the users will download the file, and Boom. you are down. Actually what happens is, majority of people have "show file extensions" feature turned off, so if you see the video as ABCD.mp4 ? its actual form is ABCD.mp4.exe that mp4 is just a decoy. So I prefer not to even go to that page which states "The cancer you may already have" until shared by a science alert or a medical page.

Phishing - One of the oldest techniques and the most foolish techniques. I am here to aware you how can you avoid this simple foolishness just by staying aware. Either your friend will send you a link like - 223.223.xxx.xxx and say new facebook for 2015 Theme preview. You went there, logged in, Kaboom. your username and password is in Hacker's hand. More professional and efficient hackers can even make a domain to hack you. They may send you an email from and like - security.facebook.com - your password is way too vulnerable, So we advice you to change your password now. you went there, entered login credentials, Kaboom. In this case, I advice you to give wrong information first in the suspicious link. because the phishing page have nothing to do with your right or wrong info. If the page goes back to the same login section, or displays "Page not available", then you will know thats a phishing page. If it states wrong username/password. Then you are sure its a real page.

Another big and the most popular Hacking mechanism is Pirated GAMES and SOFTWARES. Saying as me myself a gamer, I may trust big Game uploaders, But there are uploaders too who inject backdoors into the exe file of a Game or a software. This is a kind of illusion, where gamers are bound to execute the Virus. And Kaboom.

Self Defense : I always prefer to have an original copy of Internet security software like Kaspersky, Quickheal to detect viruses. Though advanced Backdoor Mechanisms will simply bypass the Security. In this context I will advice you to install Firewalls. I will advice everyone here to study about ports and what services they normally Run. When you scan yourself, Any Suspicious port you see open? TERMINATE. When a virus gets executed, it opens a doorway ie. port for hackers to come in. I will also advice to install a very efficient free tool called Malwarebytes Anti malware, which is actually very capable of catching malwares and viruses which Anti Viruses can't detect. Bitcoin Miner is one example of Malwarebytes detection.

So these are some easy steps for anyone who sits on computers and want to be free when surfing the internet. I felt to post this because, Being a Computer geek, sitting all day long, Loving her like hell, I still don't trust her. So I thought of this Awareness post.....

Thank you for bearing with me and reading this. Highly Obliged.

 THANK YOU