Top 10 Evil Ways to Use Technology

sasf

Like other powerful tools, technology can be used for great good or for great evil. Learn how people use technology for wrongdoing so you can protect yourself—or use their tricks to actually do good. Here are the top 10 “evil” ways you can use technology.

 

10. Spoof Caller ID

1498356558990664083Pranksters and scammers use caller ID spoofing to take advantage of us—in common telephone scams, for example, where “Microsoft” calls to warn you your computer has a virus and they’ll help you fix it (for a fee). There are legitimate reasons why you might want to make your phone number show up differently on caller ID (e.g., place a call to a young kid as Santa or Cinderella), and there are lots of spoofing apps and services to help you do this.

9. Uncover Blurred Information in Photos

blurPeople blur out the information in photos to make sure sensitive information isn’t readable to others, but it turns out this strategy isn’t that secure—particularly when you’re trying to hide numbers. The takeaway: Don’t use simple mosaics to blur your image.

8. Create a USB Password Stealer

usb stealer.png

It’s bad enough that major password leaks happen so often, hackers can steal our passwords with just a USB flash drive and a single script, grabbing our cache of passwords stored in our browser and elsewhere. You might want to test your vulnerability to this trick yourself, but either way, to protect yourself, remember the security basics: always have physical control over your computer, use a secure password manager and turn on two-factor authentication.

7. Get into a Private BitTorrent Tracker or Usenet Indexer

bittorrent.pngPrivate trackers and usenet indexers are great communities, but they take dedication and they’re hard to get into. While some of our strategies for getting into one aren’t necessarily “evil,” you’ll be working your way into exclusive private file sharing communities.

6. Spoof an Email Address

spoof.pngCaller ID isn’t the only thing spammers spoof. If you’ve ever gotten a strange, spammy email from a friend—or, worse, your email account just spammed all of your contacts—you know how annoying spoofed emails can be. Here’s how data thieves spoof email addresses to phish for information or con us into sending money to Nigerian princes. If you think you’ve been impersonated, you’ll need to take some advanced steps to secure your account.

5. Snoop on Someone’s Phone or Computer Without Them Knowing

snoop

Is your company monitoring you? Possibly. The NSA? Your ISP? Yeah. But it’s pretty easy too for a friend or family member to dig into your phone or computer without you knowing—whether by gaining physical access to your phone or computer or using remote monitoring tools. Parents might snoop on their kids, significant others might snoop on their partners out of insecurity or suspicion, whatever the reason, covering those snooping tracks isn’t that hard. If you think you might be the one being snooped on, look for signs any of those stealthy steps weren’t followed. If you share a computer with someone else, learn how you can still protect your privacy with this guide.

4. Crack a Wi-Fi Password

crackWEP passwords are too easy to crack with tools like BackTrack making it super simple to get into a WEP-”protected” router. That’s why everyone recommends using WPA—or really, WPA2, the latest encryption standard.WPA can be cracked too, though! That is, if your router has WPS turned on. So disable WPS if you can or try open-source router firmware like DD-WRT, which doesn’t support WPS.

3. Hack a Wi-Fi Network

hack wifi.pngWhy would someone want to steal your router’s password? Besides stealing your Wi-Fi bandwidth, to spy on everything going on over your network, of course. It’s amazing the DIY creations hackers can use to sniff out network packets. Fake routers and networks, created with the help of Kali Linux, for example, can be used to trick machines into connecting, and then eavesdrop on network communications. (Yes, there’s a lot of spoofing going on in this article!) This is a good time to remind you to check your router’s settings—especially these top security settings.

2. Sniff Out Passwords and Cookies

This is somewhat related to hacking a Wi-Fi network, but it’s more about the dangers of using public Wi-Fi. It’s really easy for hackers to steal your logins and snoop on your browsing session, when the network is not secure or you’re connecting to sites that don’t use HTTPS. To protect yourself, your best bet is to use a VPN whenever you’re using public Wi-Fi or follow some of these other safety precautions.

1. Break into a Computer

breakFinally, you might shudder to know it’s pretty easy to break into a computer, whether it’s a Windows PC or a Mac—even if your computer is password protected. If your computer is encrypted, however, such as with BitLocker (for Windows) or FileVault (on Mac), you’ll be protected from some of the more common methods hackers use to steal data from a computer. You’ll also want to make sure you have a very strong, unique password for your computer login. If you get locked out of your computer, however, and forgot your password, well, now you know how to get back in.

 

If you like our post please like us on facebook and support us.

Please share your views in comments

Boost your Wi-Fi easily!!!

 

Are you bogged down by your slow Wi-Fi internet connection, chances are most of you are, since speed can never be enough for most of us. Jokes apart, there might be some issues interfering with your Wi-Fi network leading to slow speeds. However, if you’re 100 per cent sure of your network and are looking for manual tweaking of the network to increase your speed, well, we have got some tricks just for you!

 

1.Using that handy tinfoil!


This is a quick and easy way to get more range for pennies. Did you know you can use a little tinfoil to increase your signal strength by several decibels. Cheack the following video out by clicking here

 

2.Sharing your Mac’s internet connection wirelessly

System Preferences > Sharing > Internet > Add Source (Ethernet) and the way the other computer will connect (Wi-Fi) > Check Internet Sharing to create a Wi-Fi hotspot

3.NetStumbler

NetStumbler (also known as Network Stumbler) is a tool for Windows that facilitates detection of Wireless LANs using the 802.11b, 802.11a and 802.11g WLAN standards.

4.Turn off SSID broadcasting

Access point admin page > Uncheck ‘Enable SSID Broadcast’ to prevent devices from listing your network as one of the detected options.

5.Limit devices that can connect to your wireless network

Create a device access list of MAC addresses that can access your network.

6.WPA Encryption

Wi-Fi Protected Access (WPA) and Wi-Fi Protected Access II (WPA2) are two security protocols and security certification programs developed by the Wi-Fi Alliance to secure wireless computer networks. The Alliance defined these in response to serious weaknesses researchers had found in the previous system, WEP (Wired Equivalent Privacy).

To switch to WPA: Access point’s admin page > set your WPA passphrase to something difficult to crack.

7.Wireshark

Wireshark is a free and open-source packet analyser. It is used for network troubleshooting, analysis, software and communications protocol development, and education. Wireshark is cross-platform, using the GTK+ widget toolkit in current releases, and Qt in the development version, to implement its user interface, and using pcap to capture packets; it runs on GNU/Linux, OS X, BSD, Solaris, some other Unix-like operating systems, and Microsoft Windows.

8.Wireless signal repeater

A wireless repeater takes an existing signal from a wireless router or access point and rebroadcasts it to create a second network. When two or more hosts have to be connected with one another over the IEEE 802.11 protocol and the distance is too long for a direct connection to be established, a wireless repeater is used to bridge the gap. It can be a specialiSed stand alone computer networking device. Also, some WNICs optionally support operating in such a mode. Those outside of the primary network will be able to connect through the new “repeated” network.

Google going to Cover Earth In Wi-Fi by Spending $1 Billion On Satellites

 

The Wall Street Journal is reporting that Google plans to spend over $1 billion on a fleet of satellites that will be used to provide internet to parts of the world that currently lack digital connections.

According to “people familiar with the project,” Google will use 180 “small, high-capacity satellites” that will orbit the Earth at low altitudes. Led by Greg Wyler, who set up satellite startup O3b Networks Ltd, Google has been on a hiring spree to recruit engineers from satellite company Space Systems/Loral LLC, claims the Journal.

Now, if the report is accurate, Wuler is heading up a team of “between 10 and 20 people,” ultimately reporting to Larry Page. The project is scoped to provide internet to areas around the world without wired connections, and cost between $1 billion to more than $3 billion, depending on the network’s final design and size. The Journal claims that a later phase “could double the number of satellites. ”

Aside from organizational details, information about the project remains scant. But it’s not Google’s only drive to deliver internet from the skies: it’s already running tests with internet providing balloons, and it’s bought a drone company to cover the world in Wi-Fi, too.

While previous attempts to smother the world in internet via satellite have proved unsuccessful, that’s largely been due to escalating costs. If the the report is accurate, Google is now working on three high-profile projects to use airborne craft to connect the world. Clearly, cost isn’t too much of a concern for Page & Co..

Why? Well, aside from the obvious-being filthy rich-the provision of internet to currently unconnected locations across the globe opens up vast new markets. Google clearly wants it products and services to be the default option; we’ll just have to wait and see if it can pull it off. [Wall Street Journal]