Monday, December 21, 2009

Know more

Key logger:
Keystroke logging (often called keylogging) is the practice of tracking (or logging) the keys struck on a keyboard, typically in a covert manner so that the person using the keyboard is unaware that their actions are being monitored. There are numerous keylogging methods, ranging from hardware and software-based to electromagnetic and acoustic analysis.

If someone installs the keylogger software on the system you are browsing they can get the processing that you have dne on the keyboard as mail for them they can trap your username and passwords and access your account.

once happened that internet owner did the same thing and hacked an hdfc bank accout opened by the customer in his internet shop and drawn the money from it about 10,000rs and the customer did not understood and gave a complaint  to the police and the internet shop owner had caught after investigation.

Hence be protected from this software by using on-screen keyboard you can protect your self from keylogger software when you are typing passwords etc..

Sunday, December 20, 2009

SPOOFING YOUR CALLER ID

How does caller ID spoofing work?
  •  Spoofing is a term in which basically means to change or spoof a number to something that is not the real one. With caller ID spoofing you can call someone and have the caller ID on their phone display what you want it to. A lot of times if a friend or partner is ignoring you they won't answer your call. BUT! if you spoof it to show up as something else or someone else they know they will answer it thinking its the other person.click here
  • In essence you can call a friend or company and have it show up as someone completely different than you and ultimately lead them to believe it is that caller. You can call a friend and say you are using another friends phone or you can use it for a large number of reasons from cheating spouses to just good old fun. These days caller ID spoofing services cost money. Fortunately it is not very much and they will give you a test call to determine if you want to use their service further.click here
  • How they work is they give you a card or number to call in with and a pin after payment along with a certain number of minutes to use. After you call their emailed number and enter your pin you will choose the number you wish to call and then the number you wish to have displayed on the other persons caller ID. One of the drawbacks with most of these companies is that they keep your personal information with them. They say they won't give this information out except by a subpoena to the police, so I personally don't think they need any of my information and will not give it to them. So then surfaces the question of how do I sign up with one of these companies anonymously?click here
  • Well first off I would highly suggest purchasing minutes with these companies with an American Express gift card that can be picked up at wallgreens. After you purchase that card with cash call their customer service number to have an address assigned and don't give them your real information. Give them a fake name and address and remember that so when you order your minutes it will match what they lookup.
  • Next I would suggest using the minutes with a prepaid cell phone that has been bought with cash and didn't require personal information to purchase. Another point to make is that if you can find an offshore caller ID spoofer take it, because if for any reason the police need to subpoena them it will take longer and it will be a bigger hassle to get log information from them depending on where the service is located. Another vital point that you must not forget to truly be anonymous is to either sign up with their service from a computer that is not yours such as a internet cafe or by using a proxy server to sign up with them as they keep IP address logs as well. If you don't know what an IP adress is please read the "How To Spoof Your IP Address" for a description on how to spoof it and what it is.
  • A lot of these services also include a voice changer and a call recording service as well.

FOR A FREE CALL click here
Here is a list of caller ID spoofing services:

Some services are:
www.calleridspoofing.info/
www.spoofcard.com/
www.spooftel.com/http://www.spoofapp.com/
caller id spoofing

Another way to spoof your caller ID is to have a call forwarding service like Google's Grand Central and you can call from that on your computer and it will display your call forwarding number. Another good way to spoof your caller ID is to do a little Op Diverting which is in essence you call an operator and tell them you are blind or can't dial the number and have them do it for you. And the old fashioned way and sometimes the best is to use a pay phone or get a cheap prepaid phone.

In today's world and with digital technology we are able to see the phone number of a caller before answering the phone. Though this is a great thing, especially for those who like to screen their calls, being the caller and exposing your number, and perhaps your location at the same time, can be a bit disturbing. However, you can change the phone number that others see when using the spoof caller system, with the help of the SpoofCard. You never have to worry about your number being seen again.

Saturday, December 19, 2009

WHAT ARE TEMPORARY EMAILS AND WHAT ARE ITS USES?

Are you tired of signing up with a website and having to give out your email? Well you don't have to anymore. I will discuss the reasons for having a temporary email and where to find one. I assume all of you have had spam and if you are like me you have been spammed to near death from different websites. Your information is collected online and sometimes sold to different companies and people so that they can offer to sell you something and so that they can advertise to your email address. If you have ever signed up with something online that is free or claims to be and shortly afterward you start finding your inbox flooded with spam and advertisements this is for you.click here




That one company you signed up with gave your information to another company and then they gave or sold it to another one. Also anonymity comes into the picture if you don't want every spam and advertising company in the world knowing your email and who you are. So in order to make it so this does not happen you would give a temporary email to them upon signing up or just use it whenever they ask for a email. It will not be your personal email and you will not have to worry about spam. The good thing about temporary email is that you can usually make it up along the way. Just keep in mind you might need to remember it for future use.click here



So when giving a email you would give bobsemail@mailinator.com.

Now the @mailinator.com is the temporary email address service. All you have to do is go to mailinator.com and type into the box "bobsemail" and it will pull up your email. There are many of these services and some are so well known that websites will not accept emails with that format. So the best way to use this is know a few that you can use. Some of these services and usually most of them delete the email after a period of time. Use your imagination when thinking of an email to give and you will have endless email accounts that never give out personal information about you and never get you spammed to death. Use these and you will be even further untraceable. Here is a list of my personal favorite temporary email services:

www.guerrillamail.com/
www.mailinator.com/
http://www.mintemail.com/
http://www.mailinator.com/

COOKIES AND TEMPORARY INTERNET FILES

The Temporary Internet Files (or cache) folder contains Web page content that is stored on your hard disk for quick viewing. This cache permits Internet Explorer or MSN Explorer to download only the content that has changed since you last viewed a Web page, instead of downloading all the content for a page every time it is displayed. To delete the files in the Temporary Internet Files folder, follow these steps:.

Friday, December 18, 2009

How to spoof text messages?

In this article we will talk about SMS spoofing. SMS means "Short messaging service" and is the protocol cell phones use to send text messages to eachother. In other words SMS is your technical name for text messaging. To spoof means to appear from somewhere or someone else than the original and true number so basically by spoofing a SMS message the receiver of it will not know it is from you and basically you can make it appear to come from any number you want. Use your imagination with this one because it is quite fun. The real problem is that they usually cannot respond to your message as most of the SMS spoofing services are offered online. If you want them to be able to respond I would suggest using a fake email to send them a SMS message and then they can respond and you can talk back and forth with the cell phone you are sending messages to.


How to spoof text messages?

  • SMS Spoofing occurs when a sender manipulates address information. Often it is done in order to impersonate a user that has roamed onto a foreign network and is submitting messages to the home network. Frequently, these messages are addressed to destinations outside the home network – with the home SMSC essentially being “hijacked” to send messages into other networks.
            click here



The impact of this activity is threefold:



  • The home network can incur termination charges caused by the delivery of these messages to interconnect partners. This is a quantifiable revenue leakage.

  • These messages can be of concern to interconnect partners. Their customers may complain about being spammed, or the content of the messages may be politically sensitive. Interconnect partners may threaten to cut off the home network unless a remedy is implemented. Home subscribers will be unable to send messages into these networks.

  • While fraudsters normally used spoofed-identities to send messages, there is a risk that these identities may match those of real home subscribers. The risk therefore emerges, that genuine subscribers may be billed for roaming messages they did not send. If this situation occurs, the integrity of the home operator’s billing process may be compromised, with potentially huge impact on the brand. This is a major churn risk.

The legitimate use cases for SMS spoofing include:



  • A sender transmits an SMS message from an online computer network for lower more competitive pricing, and for the ease of data entry from a full size console. They must spoof their own number in order to properly identify themselves.

  • A sender does not have a mobile phone, and they need to send an SMS from a number that they have provided the receiver in advance as a means to activate an account.

  • An SMS Spoofing attack is often first detected by an increase in the number of SMS errors encountered during a bill-run. These errors are caused by the spoofed subscriber identities. Operators can respond by blocking different source addresses in their Gateway-MSCs, but fraudsters can change addresses easily to by-pass these measures. If fraudsters move to using source addresses at a major interconnect partner, it may become unfeasible to block these addresses, due to the potential impact on normal interconnect services.
Here are some SMS spoofing services that you can use for free:


Fakemytext.com
Hoaxmail.co.uk
spranked.com
smsspoofing.com


There are others if you do a google search and look around for a bit.




Now the other way to do this is with a temporary of separate email than yours. You will send the message to their cell phone and they will see the email but not know who's it is. How do you send a SMS to a phone number you are asking. Well it is pretty simple actually. It all depends on their provider. This requires you to know their cell phone provider. If it is verizon for example you would send the message to 1234567890@vtext.com and the first part is their number followed by the providers texting service address. By doing this they can respond to the message sent and you can have a conversation. Below are listed the different providers services you would send the message to.



Verizon: 1234567890@vtext.com



Sprint: 1234567890@messagin.sprintpcs.com



Tmobile: 1234567890@tmomail.net



Virgin mobile: 1234567890@vmobl.com



Cingular: 1234567890@cingularme.com



Nextel: 1234567890@messaging.nextel.com



And this is the simple way to spoof SMS.