Thursday, 26 February 2015

How To Find Lost iPhone 2015

Steps To Find Lost iPhone 2015 :-

First of all when you purchase iDevice you must enable Find my iPhone enabled on your iPhone device.

Now if your device is lost or stolen then you can trace it just by going to or you can simply download free Find My iPhone app.

Now there you should see map of all your iOS devices. Here you have to just select you lost/stolen iphone device keep on It’s tracking location.

Now the next step is to put your device on Lost mode. For this simply click on Lost mode.
Now by activating Lost mode you can do following things.

Lost Mode will automatically turn on the location services even if the location service disabled on your device.

You can also displays a message on lock screen.

You can also erase all data on your device remotely just by clicking on Erase iPad, iPhone etc. but by doing so, you will not able to trace it further.

If you did not enable Find My iPhone on your missing device in this case simply change your iCloud password so that no one delete or make changes to your iCloud data.

If you are unable to find your device by tracking then simply report your lost or stolen device to local law enforcement and your wireless carrier. You can simply go to to know the serial numbers of all devices registered with your Apple ID.

Ethical Hacking Tools for PC 2015

Here are the top best Ethical Hacking Tools 2015

1) Nmap – Ethical Hacking Tools 2015

I think everyone has heard of this one, Nmap (Network Mapper) is a free open source utility for network exploration or security auditing. It was designed to Nmap rapidly scan large networks, although it works fine against single hosts.Many systems and network administrators also find it useful for tasks such as network inventory, managing service upgrade schedules, and monitoring host or service uptime. Nmap uses raw IP packets in novel ways to determine what hosts are available on the network, what services (application name and version) those hosts are offering, what operating systems (and OS versions) they are running, what type of packet filters/firewalls are in use,and dozens of other characteristics. It may be used to discover computers and services on a computer network, thus creating a “map” of the network.Nmap runs on most types of computers and both console and graphical versions are available. Nmap is free and open source.Can be used by beginners (-sT) or by pros alike (packet_trace). A very versatile tool, once you fully understand the results. Ethical Hacking Tools 2015

2) Nessus Remote Security Scanner

Recently went closed source, but is still essentially free. Works with a client-server framework.Nessus is the worlds Nessus Remote Security Scanner most popular vulnerability scanner used in over 75,000 organizations world-wide. Many of the worlds largest organizations are realizing significant cost savings by using Nessus to audit business-critical enterprise devices and applications.

3) Wireshark – Ethical Hacking Tools 2015

Wireshark is a GTK+-based Wiresharknetwork protocol analyzer, or sniffer, that lets you capture and interactively browse the contents of network frames. The goal of the project is to create a commercial-quality analyzer for Unix and to give Wireshark features that are missing from closed-source sniffers. Works great on both Linux and Windows (with a GUI), easy to use and can reconstruct TCP/IP Streams.

4) SuperScan
Effective TCP port scanner, pinger, resolver. SuperScan 4 is an upgrade of the extremely popular Windows port scanning tool, SuperScan. If you require an option for nmap on Windows with a good user interface, I recommend you check this out, it’s rather good. You can also use Angry IP Scanner which is a respectable replacement for it.

5) Cain and Abel

The swiss knife of hacking tools..Cain & Abel is a password recovery tool for Microsoft Operating Systems. It allows easy recovery of various kind of passwords by sniffing the network, cracking encrypted passwords using Dictionary, Brute-Force and Cryptanalysis attacks, recording VoIP conversations, decoding scrambled passwords, revealing password boxes, uncovering cached passwords and analyzing routing protocols.The program does not exploit any software vulnerabilities or bugs that could not be fixed with little effort.

6) Kismet

Kismet is an 802.11 layer2 wireless network detector, sniffer, and intrusion detection system. Kismet will work with Kismetany wireless card which supports raw monitoring (rfmon) mode, and can sniff 802.11b, 802.11a, and 802.11g traffic. A good wireless tool as long as your card supports rfmon.

7) NetStumbler

Yes a decent wireless tool for Windows! Sadly not as powerful as it’s Linux counterparts, but it’s easy to use and has a NetStumbler nice interface, good for the basics of war-driving. NetStumbler is a tool for Windows that allows you to detect Wireless Local Area Networks (WLANs) using 802.11b, 802.11a and 802.11g. It has many uses:

Verify that your network is set up the way you intended.
Find locations with poor coverage in your WLAN.
Detect other networks that may be causing interference on your network.
Detect unauthorized rogue access points in your workplace.
Help aim directional antennas for long-haul WLAN links.
Use it recreationally for WarDriving.

Detect Keylogger With Keylogger Detection 2015

Method to Detect Keylogger In A Computer 2015

#1 Method: Keylogger Detection 2015 Using Taskmanager:-

Steps To Detect Keylogger With TAsk Manager

Press SHIFT+ALT+DELETE of your keyboard.
Select Task Manager from the given options.
Now a task manager dialog box will open select processes at the top.
Now scroll down the list and you will see winlogon.exe process.
If there are two such processes  that is with winlogon.exe and winlogon(1).exe then right click on second one.
And click end process.
There is one keylogger process out of two winlogon process, By ending the other process will stop the keylogger program and you will become safe from hackers attack.

#2 Method: Keylogger Detection 2015 In Installed Programs:-

Sometime keylogger can be found in the installed program if they are not get hidden by the hackers

Steps To Detect Keylogger In Installed Programs.

Click on Start->Control Panel.
Select Programs and Features OR Uninstall a program .
Now have a look on all the installed program.
If there is a program you have not installed by you then that can be a keylogger installed by hacker.
Right click on it and select Uninstall.
The uninstalling process will go on and them keylogger will be removed.
By this process keylogger will be removed permanently from your computer and you become safe from the hacker attack.

As i already discussed how much these keyloggers are dangerous so you have to be safe from these keyloggers. Time to time detection of the keylogger is important as it can come from internet by many software that are downloaded from many unofficial sites.