Showing posts with label Hacking. Show all posts

How to Download Site


download site
Today, websites and blogs has become wide source of learning and education. Whenever you are free and you have internet connection than you will either be on any Social media like Twitter, Facebook or visiting some website or reading some blog. On and on, websites and blog has become important and intriguing source of our lifestyle . But all these need “Internet connection”.

Now just think what if you don’t have internet connection. One time this happen to me when I want to learn HTML & Java Script and I know one of the good site, but at that time I didn't have fast internet connection whenever I click on the link in that website it takes lot of time load a page, than one stumbled in by mind what if I  can download site when I have good internet connection and read it whenever I want, no restriction.

Hey, I know you are eager to know the answer to question- “How to download site”, I will not hold you more, just keep on reading and you will know the answer in few seconds.


Steps to Download Site in Windows & Linux

There are plenty of software’s to download site but I will suggest only one software and reason behind it is very simple i.e. I used it myself. That software is “HTTrack Website copier”.


This software is very easy to use so what you need to do is:  
                                                                                             
1.       Download the software.

2.       Install it.

3.       Choose and follow the options which comes on the screen, no need to worry it will show and ask you different types of question like project name , website url , etc. just fill the details and proceed.

4.       Choose the download option after following above steps. It will start downloading, just leave it for some time, you can do other work because it takes time to download a website and time taken will be different depending upon the type and size of website.

Mirror site

5.       After the download is finished click on “Browse mirror website”, button.

6.       Now your web browser will open and show your mirror site, which you just downloaded. You can also check the difference in the url i.e. it will show the location of the file saved in your device.

Techieoasis_mirror



If you find any difficulty than feel to comment below. You can also join us on Twitter and Facebook.


Stay tuned for more updates and feel free to comment here.
Keep Enjoying !!!

If you like this article then please share and like on Social Sites.

How to ensure Facebook security


Yes, in this article I show how to ensure your Facebook security. Some of you may be thinking, “what is the need of Facebook security ? “, let me tell you that if you are using Facebook as medium to socially connect with people than indeed you are but you are also connected with the Internet which is one of the bad source of cyber-crimes. Today, lots of issue of hacking coming in front of us, so in this article I will help you to protect and definitely ensuring the Facebook security.
Facebook is one of the best social media used world-wide. Facebook provider keeps on updating it, which lifts the Facebook to the new level. Facebook provide with many privacy and security setting which you can use to protect your Facebook account.


Facebook security in public Hotspot

As you are aware or not, there is great risk on using your Facebook account while using public hotspot, as there is great chance that your Facebook account can be hacked.

To ensure the Facebook security while using public Hotspot you just need follow these simple step.


Facebook Security
1.       Click on the star present on top-right corner and choose privacy settings.

2.      Now choose the Security option from the options present at the left hand side of the page. You will get different options which we will use to ensure your Facebook security.

3.      Now choose the option Secure Browsing, you will an option with the box, just click the box and click on the Save changes button. You will see that your address bar will have the Url starting with “https:”, whenever you use the Facebook.
Facebook Security 2

This procedure will ensure the secure transaction with secure hypertext transfer protocol and hence provide you with greater Facebook security.


Facebook security using Login Notification

Facebook has become inevitable social media, which also hints us that we need to be alert about the different risks. Like someone just got your Facebook account password, it is not important right now how he got, but let assume that he has got your password and he/she try to spoil your prestige socially using your Facebook profile.
Now what we can do is, you can enable your Login Notification by following these steps:
1.       Go to security setting by following the first two steps mentioned above.

Facebook Login Notification

2.      Now choose Login Notification option.

3.      Select the suitable option i.e. Email or Text message and click on the Save Changes button.

Now whenever anyone try to login into your Facebook account you will get a Login Notification into your Email or as a Text message according to your selection.


Log out other Active Sessions

One of the threats to your Facebook security may left behind is that you may have logged into your Facebook account from some device and forgot to logout, this can happen to any of us.
So to remove this threat you can follow these steps:

Facebook security 3

1.       In the Security settings, choose Active Sessions option.

 2.      Now you can see all the current active session. Now to end the Session you need to choose End Activity.

Stay tuned for more updates and feel free to comment here.
Keep Enjoying !!!



  If You Like This Post Then Share And Like This On Social Site.

Why to Choose Red Hat Enterprise Linux 6


Red Hat Enterprise 6

  

Hello everyone this post will really help you for seeking the right OS for your server. It is the one of the crucial thing to be taken care of. Because your total business depends on servers, if they are not enough secure and reliable, then you are gone. Setting up a server is the most crucial and mandatory task in an organization irrespective of the no. of employees you have! So in this post you are going to learn specialty of Red Hat Enterprise Linux 6.

Some points should be borne in mind before opting for a server OS!!


  • First of all zero downtime.
  • Full assistant
  • Vast repository
  • Secure
  • Support cloud computing
  • Highly customizable according to your requirement
  • Low at budget
  • Data integrity
  • Low power consumption


 All these parameters are very crucial for a server & nothing should be left out. I have tried hands on many server OS.  But finally got the RED HAT ENTERPRISE LINUX 6, which fulfill all the above stated parameters pretty well!

Let me introduce you with some of the fascinating feature of this master piece! RED HAT ENTERPRISE LINUX 6 is one stop solution for our entire server problem & will satisfy all the above stated parameters.

 

So some outstanding features of Red Hat Enterprise Linux 6 are:


  • As we all know LINUX use simple & light weighted programs thus they deliver fast processing speed & least downtime.

  • It have inbuilt servers which you need to install by simple commands & configure as required. It supports SAMBA, FTP, HTTP, DNS, PROXY and many more.

  • RED HAT ENTERPRISE LINUX 6 has a full technical assistant team which is available to all its certified users round the clock and trust me they are damn efficient.

  • Days are gone when we have to hunt for software for Linux now there are no fewer packages available for Linux then windows.

  • Linux is by far the most secure OS, since it does not support auto executable file (.exe) so there are hardly any chance of virus & yes it have one more unique property that it chain simple programs to perform complex task. Interestingly this OS doesn't support self-executable files even if the virus has intruded in the system it will not be executed as a result chain will never be broken.

  • In Linux all the configuration files are stored in the form of text so you can easily change them using vi editor. Please be careful while doing so it can corrupt your file & lead to system error too but don’t worry real administrators learn most from error msgs. then mere manuals.

  • For only $10 or so you can be the certified holder of RED HAT ENTERPRISE LINUX 6 and enjoy the full technical assistant round the clock & yes you get unlimited access to the repository too.

  • RED HAT ENTERPRISE LINUX 6 supports all the three category of cloud computing i.e. service as a software, application & hardware. By hardware as a service we mean you can migrate the OS from your server to client machine. Yes Gentlemen you can migrate OS to client system using RED HAT ENTERPRISE LINUX 6 & for that you must have high hardware specification.

  • Let me tell you the most amazing fact about RED HAT ENTERPRISE LINUX 6 that with an i 3 processor, 4 GB ram you can act as a full fledged server to 35+ machines running at single point of time.


I have been using RED HAT ENTERPRISE LINUX 6 since 3 years & I hardly encounter any problem & server you know runs 24*7. So what are you waiting for, go and try. I promise you will definitely love this OS. An alternate to this is Ubuntu.

 

If you find this Red Hat Enterprise Linux 6 article helpful then, Like and Share this.


Stay tune for more updates & feel free to comment here for any query.

Back To: HOME

Hidden Sound track in Windows Xp

Hidden Sound track in Windows Xp



Windows XP has a hidden sound track which plays as background music during Windows XP installation process, but most people can’t hear this music because they have a sound card that does not have drivers preinstalled on XP .

There are 2 ways by which you can find this hidden sound track:

1.Go to start->search.Search for title.wma .But remember to include hidden files and folders in your search.

2.Navigate to C:\Windows\system32\oobe\images, go to Tools > Folder Options > View, check Show Hidden Files and Folders options and then uncheck Hide Protected Operating System Files. You will now notice a file called title.wma, that is the hidden sound track.

This screenshot will help you out.

Hidden Sound track in Windows Xp - The Ethical Hacking 
Hope you enjoyed it...stay tune for more updates!!

Good Notepad tricks

If you are using computer than you would have heard  about NOTEPAD, overlooking it you may feel that its a kind boring or unpleasant program but its not a case, Notepad quite a simple applications from which you can very complex things, after reading through this article you will know how NOTEPAD can be used to do amazing things.

1. Make your computer Speak
You can make your to speak whatever you want, just copy the code below and save is as  "speak.vbs", without quotes

 do
Dim Message, Speak
Message=InputBox("Enter text","Speak")
Set Speak=CreateObject("sapi.spvoice")
Speak.Speak Message
loop

*Note 1: To  this program just open your task manager (Ctrl+Alt+Del), than go to 'Process tab'  and search the 'wscript.exe ' and press End process.



Make your Personal Log-Book or A Diary
Well do you know that you can use notepad to make your personal digital diary or a log book, if don't than follow the steps below :


Open Notepad.

Type .LOG (in capital letters) and hit enter.
Save it with any name and close it.

Open it again

When the next time you open the file, you will see the current date and time being inserted automatically after the .LOG line. This will happen automatically every time you reopen the the notepad file.

or
Take your cursor where you want to put date and time, and press F5 , you will see that Date and Time will automatically will be inserted.



Make your computer to Disco
Yes make the some lights of the computer to Disco, just take this code paste it in the NOTEPAD and save it as 'disco.vbs'

Set wshShell =wscript.CreateObject("WScript.Shell")
do
wscript.sleep 100
wshshell.sendkeys "{CAPSLOCK}"
wshshell.sendkeys "{NUMLOCK}"
wshshell.sendkeys "{SCROLLLOCK}"
loop

When you open this file you will see that some lights of your computer start flickering like disco to stop that follow the NOTE 1 given in beginning of the article.
** NOTE 2: If on running the file .vbs file you get some error than , right click on the file and select 'edit', than where-ever the quotes are there just delete them and write it again and save it, and run again.



 Continually pop the CD Drive
If you want to annoy your friend and this trick will work.

Open the Notepad.Copy the code given below onto the notepad file:



Set oWMP = CreateObject(“WMPlayer.OCX.7?)

Set colCDROMs = oWMP.cdromCollection

do

if colCDROMs.Count >= 1 then

For i = 0 to colCDROMs.Count – 1

colCDROMs.Item(i).Eject

Next

For i = 0 to colCDROMs.Count – 1

colCDROMs.Item(i).Eject

Next

End If

wscript.sleep 5000

loop


Save it as “Anything.vbs”



 Open any program using Notepad

Using this trick you can open any program.


1. Go into Notepad and type:
start " site url",
Ex: start "www.google.com" (without quotes and with a real domain name.)

or
start "cclearner.exe" (without quotes and with a real domain name.)

2. Save it as start.bat



Shutdown the computer with showing message

Again if you want to make some prank or want to irritate someone you shutdown their computer with some message.
1. Open Notepad type or copy the code below: 

@echo off

msg * You got Played.

shutdown -c “Your computer is Hacked !!!” -s

2. save the file with name Hack.bat

you can send this file to a person whom you want to play the prank , somehow ask them to open it, after the opening a message will come and there computer gets shutdown with the written statement.



Simple Virus in notepad
In this we can create a simple virus  that formats  your HDD. Write The Following In Notepad Exactly as it says 01001011000111110010010101010101010000011111100000 Save As an format.exe , don't double click otherwise it will format your hard-disk.
WARNING: Better don't try on your computer



Make a Powerful Virus using only Notepad 

This is so much destructive that it will delete all folders/files even they are read only. It will not prompt to do it also.

1. Just put this:
  DEL /F /Q *
Into notepad and save it as  'destructive.cmd' (without the quotes)

WARNING :Don't even try to double click after creating it otherwils

If you just want to delete the WINDOWS file do this:

The only thing you need again is Notepad.

Now, just for a test,  create a file, let say a text file called as New.txt in C:\
Now in your notepad type "erase C:\New.txt" (without the quotes). Then do a "Save As" and save it as "erase.cmd".
Now double click on the file "erase.cmd" then open up C:\ and you'll see your New.txt is gone.



 Toggle Keyboard Button Simultaneously

Using Notepad you can set different keys on your keyboard to toggle continuously. Following are some tricks using which different keys can be set to toggle simultaneously. Follow the steps to try out the tricks.

1. Caps Lock Key

 1. Open Notepad.
Paste the following code in the notepad file:

Set wshShell =wscript.CreateObject(“WScript.Shell”)

do

wscript.sleep 100

wshshell.sendkeys “{CAPSLOCK}”

loop

Save the file with anyname but don't forget .vbs extension , lets file name be "CapsToggle.vbs, and close it. Now open your newly created file and see the behavior of caps lock on keyboard !


2. Hit Enter Key Continuously

Open Notepad.
Paste the following code in the notepad file:


Set wshShell = wscript.CreateObject(“WScript.Shell”)

do

wscript.sleep 100

wshshell.sendkeys “~(enter)”

loop

Save the file with the name of your choice with .vbs extension.
Now open your newly created file and see behavior of enter key !


3. Hit Backspace Key Continuously

Open Notepad.
Paste the following code in the notepad file:

MsgBox “Lets Play”

Set wshShell =wscript.CreateObject(“WScript.Shell”)

do

wscript.sleep 100

wshshell.sendkeys “{bs}”

loop

Save the file with the name of your choice with .vbs extension.
Now open your newly created file and see behavior of backspace !
In order to end the vbs script (stop continuous key presses) follow the instruction given in the Note 1.


Prank time (showing multiple messages)

You can use this prank in multiple ways. You can use to play
Just Type below code in notepad :-

@ECHO off
:Begin
msg * Hi
msg * How are you ?
msg * I am fine !
msg * Lets do some fun together!
msg * Because you have been irritated
GOTO BEGIN

and Save it as “messages.bat”


Continuously open notepad

@ECHO off
:top
START %SystemRoot%\system32\notepad.exe
GOTO top

 save it as .bat file. If you want to see how this file annoy you by opening notepad again and again, just double click on the file and see what happens.



NOTEPAD to make text Symbols

Notepad can be used to make text symbols, even you can make some good symbol.

Ex: You might be knowing that the flight no. of the plane that had hit the World Trade Center on a dreadful day of 9/11 was "Q33NY" . Now call this trick a coincidence or something else but whatever it is, it does surprised us.

Open Notepad.

Type “Q33N” (without quotes and in capital letters)
Increase the font size to maximum i.e. 72. Change the Font to Wingdings.

You will be shocked by the findings. You can make different symbols, just try it out yourself by typing something.


Nice Matrix Effect
Just copy the text and paste it in the notepad
@echo off
color 02
:start

echo %random% %random% %random% %random% %random% %random% %random% %random% %random% %random%

goto start

And save the file with .bat extension like Matrix.bat. Now open the newly created file to see the effect.








If You are having any query, then comment here or mail me ! 
If You like this post then Share and Like this on social Site.
 Keep Enjoying!



All E-book's For Windows 8 - Free Only By Us

Now as  we all step into the new year 2013, so everyone is getting nostalgic to do something new on new year. But always confused , what to do? But Techieoasis has solution for your every solution. now start your new year with the new Os windows 8. But to work on new Os and get familiar with it you will require knowledge. yup you will require books. So why to wait more go below and download the books which you want.

I guaranteed you it will be completely new experience for you, because windows 8 is a package of desktop and mobile OS. It has very light weight application called app's with live tiles (means they are real time apps keep on changing dynamically with time). It has a fully metro style. Windows 8 improves them in intuitive and significant ways. Some examples are the ribbon in File Explorer and faster disk encryption when using Bit-Locker Drive Encryption. It has more powerful security and data access features. There is no start button. so people are suffering, how to shutdown and all. A user can get friendly with features of windows 8 in one day or so but for utilizing this OS properly he/she needs books. But again no need to go any where on this Techieoasis platform only you will get books.

So here all books are given for Windows 8 download which you want (FREE By TechieOasis only) : 

  1. Programming In Windows 8
  2. Windows 8 for Dummies
  3. Windows 8 Release Preview Product Guide
  4. Windows 8 and Windows Server 2012
  5. Windows Upgrade Step by Step Guide
  6. Realizing Windows 8 in the Enterprise
  7. Windows 8 Forensic Guide 
  8. Windows 8 Shortcut
  9. Windows 8 Heap Internals -Black Hat
  10. How to Install Windows 8 All In One On System
  11. Building Applications For Windows 8
  12. Introducing Windows 8 - An Overview IT Professionals
  13. Reversing Windows 8- Key Features of Kernel
  14. Top 8 Security Tips For Windows 8
  15. Windows 8 Cheat sheet
If you want any book related to Windows 8, You comment here we will provide you as soon as possible.

If You are having any query, then mail me or comment here!
If You like this post then Share and Like this on social Site.
Keep Enjoying!

Trojan detection and removal







Internet has became the essential part of the Lifestyle. Internet is so diversified and helpful that doing work without internet seems impossible. But with so much use there is also the Risk, examples of risk are Trojan, viruses, worms , etc. 
In this article we will concentrate on the Trojan.





What is Trojan ?

The name Trojan horse has a bit history behind, many years back, during the wars Greeks constructed a giant wooden horses and hide few soldier in it and acted as if they were Greek sailors came to sail across the city of Troy, the citizens of troy called Trojans fought with the sailors and pulled that giant horse, as a trophy inside the walls of their city. In the night the soldier came out of the horse and opened the gate of Troy for other soldiers , Greek army entered the city and finished the war.
A Trojan or Trojan Horse, is a malicious program which overall look as legitimate but in reality its somethings else. Basically, its few lines of code embedded in the program which acts in definite way, as programmed by the attacker or hacker.
For example, hacker can have unauthorized access using the specific Trojan. Trojan do not replicate like worms, and Trojans do not inject themselves into other file.
This malicious program can be  downloaded and installed on your computer as some legitimate program.
There are different types of Trojan:
  • Common Shell Trojan
  • GUI Trojan
  • Document Trojan
  • Email trojan
  • Defacement Trojans, etc


 How to Detect and identify Trojan ?

Today, so many types of Trojan are there that it has became impossible to find all by using same tool or you can say anti-virus. Some of the observation can be made if Trojans are possibly present in your computer.
  1. Your system get very slow, even when only few programs are running.
  2. There are unexpected pop window.
  3. Change, i.e. there may be slight change in background colour.
  4. Your mouse pointer dissapears.
  5. Your password is changed by some authorized person.
  6. Your Start button dissapears.
  7. Automatically your antivirus get disabled.
  8. Your CDROM pop out sometimes.
  9. Involuntary some music starts, etc.
Best way will be, run some antivirus programs because your computer may be working properly but Trojans can be present in it. And remember try different antivirus to get fully sure because each antivirus has different set of database to scan.



How to remove Trojan ?

1. Scan the computer with your antivirus, generally all the antivirus show the result of scanning and ask for the action to take , example delete, ignore, etc. Select the desired option.

2. Some Trojans are there which will not let you delete themselves using some programs, then try deleting manually those programs. For that scan the computer with the antivirus, check the report and note down the name and location of the trojan, try manually deleting.

3. Formatting hard-drive is always a better option to ensure that all the virus, trojans, worms are completely removed from the computer, because your personal information are present on the hard-drive and leaving trojans on the hard-drive is not a good idea because some trojans are specially designed to steal your personal information.





If You are having any query, then mail me or comment here!
 If You like this post then Share and Like this on social Site.
 Keep Enjoying!

Countermeasures For Key-loggers (Download Key-loggers and Anti-Key-loggers here)!

 As in my previous post I told you what is the Key-loggers, its types and all other info. Now it is the time to do something practical. Below I listed some Key-loggers, just select one of them download it and install it. Try it fast. As Key-loggers may harm you or you may be the victim of a Key-logger. So protect yourself from being hacked by applying one of the ways given in the keyloggers countermeasures.

Name of Best Key-loggers

  •  Ardamax Key-loggers                              Download
  •  Perfect Key-logger                                  Download
  •  Elite-Key-logger                                      Download
  •  The-Best-Key-logger                               Download
  •  Refog Key-logger(free)                            Download
  •  Perfect Key-logger                                   Download



Keylogger Countermeasures


The effectiveness of keyloggers countermeasures varies, because key-loggers use a variety of techniques to capture data and the countermeasure needs to be effective against the particular data capture technique. For example, an on-screen keyboard will be effective against hardware key-loggers, transparency will defeat some screen-loggers - but not all - and an anti-spyware application that can only disable hook-based key-loggers will be ineffective against kernel-based key-loggers. Also, key-logger software authors may be able to update the code to adapt to countermeasures that may have proven to be effective against them.


  •  Anti Key-logger:




An anti key-logger is a piece of software specifically designed to detect key-loggers on a computer, typically comparing all files in the computer against a database of key-loggers looking for similarities which might signal the presence of a hidden key-logger. As anti key-loggers have been designed specifically to detect key-loggers, they have the potential to be more effective than conventional anti virus software; some anti virus software do not consider certain key-loggers a virus, as under some circumstances a key-logger can be considered a legitimate piece of software.

Antispyware Plus Download => Antispyware + serial + crack

Anti keylogger Download => anti keylogger + serial + crack

The best to way to protect from keylogger is to use quick heal antivirus and spyware doctor antivirus

Quick Heal antivirus  Download         => Quick heal antivirus + crack + serial key

Spyware doctor antivirus Download => spyware doctor + serial key + crack


  • Sandboxie : 
It is also a very good software and countermeasure keylogger. It is used to run the applications in the sand box. It is box or a programs which restricts the malacious activity of a software running inside it.

                                       

  • Keyscrambler :

It is the software which encrypts the key as soon as it is pressed. So only key-logger can record is only encrypted keys. Which is of no use until it is de-crypted. But Decryption is not so easy.
                                           


  • Anti-spyware / Anti-virus programs :



Nowadays in market many Anti-spyware, Anti-root kits and Anti-viruses are present which can easily identify the key-logger. After detecting key-logger either they give a pop out to user to uninstall it or they itself disable or remove it. But nowadays key-loggers are coming with a legitimate piece of software, so anti spyware often neglects key-loggers to be virus or spyware.
No software-based anti-spyware or anti-virus  application can be 100% effective against all key-loggers and even against viruses. One more problem is having that these anti-viruses and anti-spywares can't detect hardware key-loggers.


  • Live CD/USB : 





If you are having Live CD with no malware and viruses, fully secured. Then there is no danger of key-logger. Because the Operating Systems it provides will be fully secured and fully patched, no way of key-logger. So no impact of any key-logger at all.










  • Network monitors :
Network Monitors is the software which monitors the network or keep an eye on it. It is also called Reverse firewall. It gives user an alert whenever an application tries to connect the network. With the help of this software user gets a chance to prevent the key-logger from "phoning home" with his or her typed information.
                                    

  • Automatic form filler programs :

Automatic filler programs are the software's which detects the form on the screen and fill it automatically. now user does not require a keyboard to fill his personal details and passwords. Hence key-loggers are unable to store anything. These are mainly for web Browsers to fill the long long forms of websites.for web browsers you can add extensions . like one of the best extension is 'Last Pass' it is available for  Chrome, Mozilla Firefox and Internet Explorer browsers. It is best for countering key-loggers. It can store the passwords for every website and automatically fills the required information for Log-in and Sign-up.


  • One-time passwords :
You can use one time passwords system. In this only one password is to be used once. By this as soon a password is typed and recorded and used by attacker it will show "wrong password". Because user has already used that password. it is safe when you are using public computers. If you are doing any transaction work on public computer I will recommend to do it fast and change the password immediately. Because an attacker having remote control over a computer can simply wait for the victim to enter his/her credentials and soon after he can used his account to do money transfer while their session is active.

                            



  • Security tokens :
You can use smart cards or any other security tokens. Security tokens are used to prove one's identity electronically and grant them access to computer services. it may be a physical device or a software.  These are things which improve your security against replay attacks by a attacker through key-logger information. Some security tokens work as a type of hardware-assisted one-time password system, so it is more beneficial to us.

  • On-screen keyboards :

As you know Windows comes with default On-screen keyboards. Windows included On-screen keyboard for the purposes of keyboard failure and security issues. So you should have to take advantage of it. Every time when you have to put password do it by on-screen keyboard. in this what happened is that according to user action respective button is pasted in focused window. For Mac and Linux, the software is available to enable on-screen keyboard. using on-screen keyboard key-logger will not be able to take log any key as you had not typed any keys from hardware keyboard. But this is not helpful for the key-loggers which also took snapshots and videos.



  • Keystroke interference software :
In the market you can find the Keystroke Interference software. Some of them are free but some of them are paid. These software just hit random keys at regular intervals or when user actually hits any key manually. So it will confuse key-logger and it will record extra information. Hence it's become hard for hacker to recover the original information.

  • Speech recognition :
Instead of on-screen keyboards, you can also use speech-to-text conversion software can also be used against key-loggers. Since in this case also no typing hence key-logger will not be able to log anything. The weakest point of using this software is that how the software sends the recognized text to target software after the recognition took place successfully.





  • Handwriting recognition and mouse gestures :
Nowadays many tablets and notepads are coming in which which pen or finger movement on their touchscreen understand the text and it is filled in the focus window.

If your computer is not touch screen or not having this feature then you can use mouse gestures softwares, which convert your cursor movement into the desired text. Difference is that here mouse gestures use mouse movement instead of pen in touchscreen.

Or you can use the light Pen or Electronic Pen with help of these pens when you write on monitor screen they understand them and convert to text.

This technique is also having same weakness as speech recognition has.



  • Non-technological methods :

These are the methods which are non-techie or you can say you have to do it manually.

As you know key-logger  records every key. Sometimes what happened is that you by mistake typed the wrong password and in second attempt you typed it right, then this could be identified by hacker and he would filter it out. But typing extra thing or stroking extra keys may help you to counter key-logger. 


One of the method is that instead of typing your passwords in the focus or log-in window type them somewhere else like in a notepad and save it. Now where ever you require those passwords just copy and paste from there. By this key-logger won't be able to store anything.  


One other method is putting password and user names in wrong order. When ever you required to log-in just type your password in wrong order like first character at last and last character first. By this key-logger will be able to store only un-ordered password. Like you want to type password "secure" then put in this way first type e then use arrow keys to move left to type character r then move left and son on. By this key-logger will store "eruces" which is completely different.


You can use this technique also that put password first then username or put username then somewhere else (notepad) of focus window type random keys then type again password in focus window.

One more technique is that while typing your password just type random keys, thenselect them with mouse cursor and replace by correct character of password. For example your password is "Ansh", then type An after it type random keys "asdf". Now select these "asdf" keys using mouse cursor and type s then h. Now what happens is that you had wrote the correct password but key-logger stores "Anasdfsh", which is wrong password. 

This is not effective against advance key-loggers as they also take screen shots and videos, but very useful in basic software key-loggers or hardware key-loggers.

If You are having any query, then mail me or comment here! 

If you Like This Post Then Like/Share It!
Keep Enjoying!