Welcome to IToxy.com

Hi, Welcome to IT Oxy. This blog is primarily aim to share our information on Information Technology. I really appreciate if you are willing to give any input to this blog. If you want to share something, email at: admin@IToxy.com If you found any post interesting and useful, then please leave a comment and share with your friends.

Welcome to IToxy.com

Hi, Welcome to IT Oxy. This blog is primarily aim to share our information on Information Technology. I really appreciate if you are willing to give any input to this blog. If you want to share something, email at: admin@IToxy.com If you found any post interesting and useful, then please leave a comment and share with your friends.

Welcome to IToxy.com

Hi, Welcome to IT Oxy. This blog is primarily aim to share our information on Information Technology. I really appreciate if you are willing to give any input to this blog. If you want to share something, email at: admin@IToxy.com If you found any post interesting and useful, then please leave a comment and share with your friends.

Welcome to IToxy.com

Hi, Welcome to IT Oxy. This blog is primarily aim to share our information on Information Technology. I really appreciate if you are willing to give any input to this blog. If you want to share something, email at: admin@IToxy.com If you found any post interesting and useful, then please leave a comment and share with your friends.

Welcome to IToxy.com

Hi, Welcome to IT Oxy. This blog is primarily aim to share our information on Information Technology. I really appreciate if you are willing to give any input to this blog. If you want to share something, email at: admin@IToxy.com If you found any post interesting and useful, then please leave a comment and share with your friends.

Showing posts with label Security. Show all posts
Showing posts with label Security. Show all posts

Bypass lock screen PIN or pattern lock by SMS!

You may forget your android screen pattern lock or password, right? In such cases, this APP (APK) allows you to remotely bypass your phone's screen lock by sending a SMS from your friend’s, spare or wife’s mobile! It will removes your lock after receiving a preset keyword along with a secret code via SMS.

   

The app requires you to send a text message containing a preset code followed by ‘reset’ to your phone from another, upon which your phone will restart and your lock screen will be reset.

SMS Bypass APK required root access on your phone, so don’t expect anything to happen if you haven’t rooted your device yet. SMS Bypass APK is compatible with any device running Android 2.2 or newer, and it is a totally free app.

Follow below steps after install this APK.
  • First, make sure you give permanent root access to this app.
  • Change the secret code to your preferred choice. The default password is : 1234
  • To reset your screen lock, send the following message from another phone to your phone: 1234 reset
  • Your phone will restart and your lock screen will be reset.

Note: There is a space between your secret code and reset. Also the secret code is case sensitive. There is an option available to change the preset keyword. Default is : reset. If you see the lock pattern asking even after restarting, don't worry. Just try any random pattern and it should unlock.

You can download SMS Bypass APK from below link.

Download

Password: itoxy.com

there are some other option as well to remove screen lock in android like, recovery or is USB debugging is to go to file manager data>system and delete gesture.key and/or password.key. Thumbs up

If you like this post, please share with your friends and like IToxy ‘s Facebook page.

ഇമെയിലിന്റെ പാസ്സ്‌വേര്‍ഡ് ചോര്‍ന്നാലും ലോഗിന്‍ ചെയ്യാന്‍ പറ്റാതാക്കാം

ഒരു കാരണവും ഇല്ലാതെ പലരുടെയും ഇമെയിലുകള്‍ രഹസ്യമായി ചോര്‍ത്തുന്ന ഈ അവസരത്തില്‍ ഗൂഗിളിന്റെ 2-step verification നെ കുറിച്ചായിക്കോട്ടേ ഇത്തവണത്തെ പോസ്റ്റ്‌. ഗൂഗിളിന്റെ വളരെ അഡ്വാന്‍സ്ട് ആയിട്ടുള്ള ഒരു സൈന്‍-ഇന്‍ രീതിയാണ് 2-step verification. നമ്മുടെ ഇമെയില്‍ അഡ്രസ്സും പാസ്സ്‌വേര്‍ഡും ഒരാള്‍ക്ക് കിട്ടി എന്നിരിക്കട്ടെ, എന്നാലും ആ ആള്‍ക്ക് നമ്മുടെ ജിമെയില്‍ അക്കൗണ്ടിലേക്ക് കയറാന്‍ പറ്റില്ല എന്നതാണ് ഈ സംവിധാനം. അതായത് നമ്മുടെ ഇമെയില്‍ അഡ്രസ്സും പാസ്സ്‌വേര്‍ഡും കൂടാതെ നമ്മുടെ മൊബൈല്‍ ഫോണും ഉണ്ടെങ്കില്‍ മാത്രമേ നമ്മുടെ ജിമെയില്‍ അക്കൗണ്ടിലേക്ക് ഒരാള്‍ക്ക്‌ ലോഗ് ഇന്‍ ചെയ്യാന്‍ പറ്റൂ എന്ന്.

Importance of Strong Passwords

The use of strong passwords can slow or often defeat the various attack methods of compromising a terminal’s security.

All of us live in a password driven world.Without password protection, nothing is safe.It  protect our identities on websites, discussion groups, e-mail accounts and more.It is not easy to  remember them all.If  your password is weak,hackers try to break into a computer or secure account by guessing passwords one at a time.

If you use the same password everywhere, increases the risk of your accounts being compromised.Many of us are just recycling the same password for multiple accounts.A new study by security firm Trusteer found that 73 percent of Web users take their online banking password and use it at other Web sites.So always  remember to Use Different Passwords Everywhere.You should change them often, don’t share them,don’t leave them out for others to see.Thus make your password a total mystery to others.

How to create an ideal password?

An ideal password is long and has letters, punctuation, symbols, and numbers.

  • Whenever possible, use at least 8 characters or more. Remember, the longer the password, the stronger it is.
  • The greater the variety of characters in your password, the better.
  • Use the entire keyboard, not just the letters and characters you use or see most often
  • Use special characters such as ! " ? $ ? % ^ & * ( ) _ - + = { [ } ] : ; @ ' ~ # | \ < , > . ? /
  • Use both UPPER and lower case letters
  • Do not begin or end the password with a number
  • The characters should be random, and not follow from words, alphabetically, or from your keyboard layout.

 

There are plenty of tools  available in net which  will  create strong passwords for you. The PC Tools Secure Password Generator, for example, makes one based on your criteria: how long,include (or don’t) mixed case, numbers,punctuation, similar character replacement,etc. It even provides a phonetic pronunciation guide.

http://www.pctools.com/guides/password/

 

The Bit Mill  another password generator tool , which can create passwords from one to 128 characters in length, although the default is set to eight. You can vary capital letters, numbers and punctuation

http://www.thebitmill.com/tools/password.html

Others:-
To check your password — is it strong?

How to Protect Your Flash Drive Data with TrueCrypt

Are worry about your confidential files which is you are always carrying on your flash drive? here is the solution.

With the help of TrueCrypt, you can easily protect the data stored your flash drive so that if it is lost or stolen, nobody will be able to get to your sensitive files.

Creating a TrueCrypt Volume

Plug in the flash drive you want to protect data on copy any data you want to protect onto a folder on your hard disk. We will move them to the encrypted volume once we are done.

The process of creating an encrypted file container for a flash drive is no different from the normal TrueCrypt process. If you are familiar with how to do this already, you can skip this section or just scroll through it for a quick refresher.

From the Tools menu, select Volume Creation Wizard.

Select the option to Create an encrypted file container.

We do not want to select the option to encrypt a non-system partition/drive because this would prevent us from loading the files required to mount a TrueCrypt volume on our flash drive. This would mean the computer we plug our flash drive into would have to already have TrueCrypt installed in order to access our data.

Select the option to create a Standard TrueCrypt volume.

Set the destination to a file located on your flash drive.

Set your encryption options. The default values will do nicely.

Set the size for the encrypted volume. Make sure you leave at least 10 MB free so there is room for the TrueCrypt files required for mounting and dismounting the volume.

Set a strong password.

Wait patiently while the TrueCrypt volume is created.

Loading the TrueCrypt Binary Files on Your Flash Drive

In order to access your encrypted volume on systems which do not have TrueCrypt loaded, you must load the required binary files needed to mount the container on the host system. Thankfully, TrueCrypt has a function which makes this easy.

From the Tools menu, select Traveler Disk Setup.

We will come back to what this notice means a bit later.

Browse to the drive letter of your flash drive under the File Settings.

Under AutoRun Configuration, select the option to Auto-mount the TrueCrypt volume and then set the following options:

  • Enter the file name only of the TrueCrypt volume file.
  • Select First available as the drive letter.
  • Select the option Open Explorer window for mounted volume.

Create traveler disk with the set options.

This is an important notice.

In order for TrueCrypt to mount a volume on a host system, one of the following conditions must be met:

  1. TrueCrypt must be installed natively on the host system already.
  2. You must have administrative rights on the host system.

The reason you need administrative rights if TrueCrypt is not installed natively is due to the requirement that a system driver must be loaded on the host system in order to mount the encrypted volume. Since only administrators can load and unload system drivers, you must have this level of access or you will not be able to mount the TrueCrypt driver.

On the other hand, if the driver is already present on the host (i.e. TrueCrypt is installed natively), you should be able to mount your encrypted driver with normal user level access.

Once the traveler disk setup is complete, you should see your flash drive shows with a TrueCrypt icon in Windows Explorer.

Easily Opening the TrueCrypt Volume on the Host Machine

Once you have configured your flash drive as a TrueCrypt Traveler Disk, opening the contents in Windows Explorer should look something like the screen below.

Notice there is an autorun.inf file which was created during the setup. Getting back to the message box we said we would discuss later, this is intended to run automatically when the flash drive is plugged into the host machine, however most Windows machines have the AutoRun option disabled (as they should), so this will never execute. Because of this, you will have to mount and dismount your TrueCrypt volume manually.

Of course, doing it manually isn’t acceptable so with a couple of batch scripts we can easily mount and dismount the TrueCrypt volume with a double-click.

Open the autorun.inf file in Notepad and copy the text following the line which begins with “open=”.

Create a new text file called MountTC.bat and paste what you previously copied into this file. When run, this batch file will mount the TrueCrypt volume stored on the flash drive onto the host system.

Back in the autorun.inf file, copy the text following the line which begins with “shell\dismount\command=”.

Create a new text file called DismountTC.bat and paste what you previously copied into this file. When run, this batch file will dismount all the TrueCrypt volumes on the host system.

When finished, you should see the two batch files we created in your flash drive.

Opening the TrueCrypt Volume

After you plug in the flash drive to the host machine if the TrueCrypt volume does not attempt to mount itself automatically, simply run the MountTC.bat file. Remember, TrueCrypt must be natively installed or you have to have administrative rights on the host machine. You will get a UAC prompt if TrueCrypt is not natively installed, so confirm you want to continue.

Enter your password for the TrueCrypt volume.

Your volume will be mounted and your encrypted files will now appear.

Copy any files you want to protect inside of your TrueCrypt volume and nobody will be able to access them without the password.

Once you are finished, simply run the DismountTC.bat file and your TrueCrypt volume will be gracefully dismounted.

Important Security Notice

It is important to understand that while your files are encrypted on the flash drive, once you mount the TrueCrypt volume on the host machine, they are at the mercy of this machine. As a result, you should be careful where you decide to access your files.

 

Download TrueCrypt

Download

How to Remove Win 7 Anti-Spyware 2011 (Fake Anti-Virus Infections)

If your PC is infected with the Win 7 Anti-Spyware 2011 malware or something similar, you’ve come to the right place, because we’re going to show you how to get rid of it, and free your PC from the awful clutches of this insidious malware (and many others)

Win 7 Anti-Spyware 2011 is just one of many fake antivirus applications like Antivirus Live, Advanced Virus Remover, Internet Security 2010, Security Tool, and others that hold your computer hostage until you pay their ransom money. They tell you that your PC is infected with fake viruses, and prevent you from doing anything to remove them.

This particular virus goes by a lot of names, including XP Antispyware, Win 7 Antispyware, Win 7 Internet Security 2011, Win 7 Guard, Win 7 Security, Vista Internet Security 2011, and many, many others. It’s all the same virus, but renames itself depending on your system and which strain you get infected with.

The What Now?

If you aren’t familiar with this one, it’s time to take a look at the face of an awful scam. If you are infected, scroll down to the section where we explain how to remove it.

Once a PC is infected, it’ll display this very official-looking window, which pretends to scan your PC and find things that are infected, but of course, it’s all a lie.

The really crazy thing is that it pops up a very realistic looking Action Center window, but it’s actually the virus.

Removing Rogue Fake Antivirus Infections (General Guide)

There’s a couple of steps that you can generally follow to get rid of the majority of rogue antivirus infections, and actually most malware or spyware infections of any type. Here’s the quick steps:

  • Try to use the free, portable version of SUPERAntiSpyware to remove the viruses.
  • If that doesn’t work, reboot your PC into safe mode with networking (use F8 right before Windows starts to load)
  • Try to use the free, portable version of SUPERAntiSpyware to remove the viruses.
  • Reboot your PC and go back into safe mode with networking.
  • If that doesn’t work, and safe mode is blocked, try running ComboFix. Note that I’ve not yet had to resort to this, but some of our readers have.
  • Install MalwareBytes and run it, doing a full system scan. (see our previous article on how to use it).
  • Reboot your PC again, and run a full scan using your normal Antivirus application (we recommend Microsoft Security Essentials).
  • At this point your PC is usually clean.

Those are the rules that normally work. Note that there are some malware infections that not only block safe mode, but also prevent you from doing anything at all. We’ll cover those in another article soon, so make sure to subscribe to How-To Geek for updates (top of the page).

Removing Win 7 Anti-Spyware 2011

Download a free copy of MalwareBytes, copy it to a thumb drive, and then install it on the infected PC and run through a scan. You might have better luck doing this in Safe Mode.

You may have better luck installing MalwareBytes first, if the virus will let you. In my case, it did not. When I scanned through the first time using SUPERAntiSpyware, it detected the viruses and removed the files just fine.

At this point, you should hopefully have a clean system. Make sure to install Microsoft Security Essentials, and don’t be fooled by these viruses again.

Can’t Open Any Applications After Deleting the Virus?

The next problem was that once the virus was removed, you couldn’t open anything—in fact, I still wasn’t even able to install MalwareBytes. Hopefully you have better luck.

Why couldn’t I open anything? Because the virus had rewritten the registry to force all applications to open the virus instead—which meant you couldn’t even open the registry editor to fix the problem. This problem might have been avoided had I properly completed the scan, but I interrupted it before it was done.

On a normal PC, there’s a registry key under HKEY_CLASSES_ROOT that specifies what happens when you double-click on an executable file (*.exe) – but on a virus-infected system, this value is rewritten with the virus executable. That’s how it prevents you from opening anything.

To fix the problem, I exported a clean registry file from another PC, and did a little extra hacking to it, and problem solved! All you have to do is download, extract, copy the .reg file to the infected PC, and double-click it to add the information into the registry.

Protect Your PC from Keyloggers

When you are online ,Keyloggers are extremely dangerous and can be used to steal personal information such as your social security number, credit card number, web-based email accounts,and passwords to just about everything.Since Keyloggers are designed to be as invisible as possible in the list of processes, so it is not easy to  find the existence.So how to protect your PC?

KeyScrambler Personal is a  browser add-on, protects all your inputs in Internet Explorer, Firefox, and Flock, which prevents keylogger from capturing the data you type into login boxes, search engines, web mail (Gmail, Yahoo etc.), including your login credentials, credit card numbers, passwords, search terms, Java, Flash, PDF Forms, web email and a lot more.It encrypts  your keystrokes at the keyboard driver level, deep within the operating system. This tool is very easy to use and protects you automatically whenever you launch your browser .

KeyScrambler encrypts your keystrokes deep in the kernel, as they enter the computer.When the encrypted keystrokes reach your browser, itr then decrypts them so you see exactly the keys you've typed. Keyloggers can only record the encrypted keys, which are completely indecipherable.

KeyScrambler | FirefoxAddon | Windows 2000, 2003, XP, Vista, Windows 7 (32-bit and 64-bit).

SpyDLLRemover - Advanced Spyware Detection and Removal Tool

Sometimes you have problem with high CPU utilization by System process .For example malicious trojan horse  like Graybird.1.,once it has gained entry, that  will start it's mischief by creating a start-up registry entry. Hereafter, the symptoms include the infected system producing unusual amounts of outbound traffic.febb.dll ,9dd1.dll and wqrgizey.dll  are some of the dll files related to this.SpyDLLRemover is the standalone tool to effectively detect and delete such spywares from the system. It comes with advanced spyware scanner which quickly discovers hidden Rootkit processes as well suspcious/injected DLLs within all running processes.

The DLL search feature helps in finding DLL within all running processes using partial or full name. Then user can choose to remove the DLL from single process or from all loaded processes with just one click.One of the unique feature of SpyDLLRemover is its capability to free the DLL from remote process using advanced DLL injection method which can defeat any existing Rootkit tricks. It also uses sophisticated low level anti-rootkit techniques to uncover hidden userland Rootkit processes as well as to terminate them.

Features

  • Advanced Spyware Scanner which efficiently discovers hidden Rootkit processes as well as suspicious/injected DLLs within all running processes in the system.

  • Detection and removal of hidden userland Rootkit processes using sophisticated techniques such as Direct NT System Call Implementation, Process ID Bruteforce Method (PIDB) as first used by BlackLight and CSRSS Process Handle Enumeration Method

  • State of art technique for completely freeing the injected DLL from remote process based on advanced DLL injection method using low level implementation which defeats any blocking attempts by Rootkits.

  • Sophisticated DLL auto analysis which helps in separating out the legitimate modules/DLLs from the malicious ones. Such DLLs are displayed using different colors representing various threat levels for quicker and easier identification.

  • Integrated online verification mechanism through ProcessLibrary.com to validate any suspicious DLLs. This makes it easy to differentiate between the spyware & legitimate DLLs.

  • ‘DLL Tracer’ feature to search for DLL within all running processes using partial or full name. Then user can choose to remove the DLL from single process or from all loaded processes with just one click.

  • Sort the process/DLL in the list based on various parameters for easier and quicker analysis.

  • Detailed report generation of Spyware scanning result as well as process/DLL list in standard HTML format for offline investigation.

  • View the process/DLL properties for more information by just double clicking on the process/DLL entry in the list.

  • Feature to show all running processes in the system which has loaded the selected DLL. Also user can click on “Remove DLL from ALL’ button to quickly remove any such malicious DLL from all loaded processes.

  • Termination of suspicious or hidden process based on low level implementation which makes it very effective against any Rootkit techniques.

  • Displays detailed information about all running processes on the system

  • Shows detailed information about each loaded DLLs within process to make it easier for manual analysis.

  • It is standalone tool which does not require any installation and can be executed directly.

  • Enriched user interface along with more user friendly options makes it the cool tool.

Download Spy DLL Remover |1.03MB|OS: Windows XP, 2003, Vista, Longhorn and Windows 7.

Free Optimization Software For Windows 7

PC Brother System Care is an all-in-one software for Windows 7 that helps you protect and optimize Windows in a few steps.  The application packs-in various tools required to keep your system in top notch condition.

On the first run it will scan your system for performance related issues and suggests the areas that can be optimized to improve overall performance of your PC. Here are the key features of PC Brother System Care:

# Optimize – Speeds up PC quickly and easily by using one-click- optimize

# Security – Automatically detects  security risks and reminds users to solve them in time

# Tools- Managers autorun, running processes, services, network connections and more

# PC info – Displays system software and hardware details

There are some other features such has Hardware Management an Software Management that are available only in the paid version. So, you can only clean and optimize your PC with this free version.

The Network Optimization section looks pretty impressive as it offers you view and modify IP configuration, repair network, correct and restore connection, speedup network and manage system applications which are accessing network.

The only thing we didn’t like about this software is that it displays some false suggestions related to your Antivirus software. For instance, it might ask you to turn on Antivirus software even if the Antivirus software is running.

Download PC Brother System Care

WinGuard Pro Free: Password Protect Files, Drives, Programs & Windows Explorer

WinGuard Pro is a free application to password protect programs, files, drives and other items on a Windows machine. WinGuard Pro uses triple layer locking system to secure your PC. 

Other than the usual encrypt file, folder and drive features, you can find many advanced options such as password Internet Explorer browser, lock installed programs, lock native Windows programs, lock Task Manager, and Windows Explorer.

Installing and setting up the tool is pretty simple. Once installed, you need to assign a password to start using WinGuard Pro.

Key features:
    # Lock any program with a password
    # Encrypt files, folders & drives from Windows Explorer
    # Disable software installation
    # Password protect Windows Explorer
    # Password Internet Explorer
    # Restrict Registry and Task Manager
    # Works alongside any Antivirus/Spyware program

WinGuard Pro offers complete protection for your PC as you can even password protect the Windows Explorer. If you are looking for an all-in-one tool to secure your files, drives and programs with password, this is the right tool for you. Also read how to hide files and folders in Windows 7.

Download WinGuard Pro

 
Copyright 2008 IToxy