Pages

Wednesday, July 27, 2011

How To Find Who Is Connected To Your WiFi Connection

If you are using a WiFi router, then I know you would always be worried who is connected to your WiFi connection no matter how secure your whole setup is. This question always pops up in your head if you are using a WiFi connection to connect your devices to Internet.
There is tool namely, Wireless Network Watcher which actually scans your WiFi network and displays you with the details of all the devices that are connected to the network. It gives you with all the required information which include IP address and MAC address of the device, network card installed in it and the device or computer name.
So it wont be hard for you to find out if any outsider is connected to your WiFi connection without your knowledge. And the fact that using this tool is so very easy makes it far more efficient. You can even spool the result into an Excel sheet or may be CSV and HTML format.
Wireless Network Watcher does not require any kind of installation. You can simply unzip the file and run the executable file. And then it would scan the wireless network to which the computer is connected from which you are running this program. And then you can easily find who is connected to your WiFi connection.

Hacking Using Doxing -Doxing Complete Hacking Tutorial

Definiton of Doxing:
Doxing is derived from Document Tracing. Doxing is tracing the information from internet resources about particular person.

Usually internet users left their information(like gender,name,city,..) in some websites(like social network,..).  So using some searching Techniques, we can gather complete data about a person.  This type of searching(tracing) is known as Doxing. This data can be used to hack their account or trace them.



What you can find using Doxing?
  • Real Name, age,gender
  • Email id, registered websites
  • Social Network Page(facebook,twitter links)
  • Address, Phone Number
  • Parent's Names and their Jobs
  • Place of Education (School/University etc.)
  • Relatives
  • and more data
From where you are going to start?
Yes, if you know person real name, then start from his name.  If you know the username then start from there. or if you know any other data, start from there  Using name or username , search for other information in google.


How to do Doxing? 
Just assume you want to gather information about one of forum member.  Let us assume his username is peter.  If you search in google as "peter" , you will get thousands results about peter. So what you are going to  do?

You have to some other information about peter in that forum itself.  For example , You got his birthday.  Now you can continue your searching with "peter xx/xx/xxx".  This will reduce the resutls.

Not only birthday, you can use some other info like signature.  For example if he put signature in forum as "Dare Devil".  You can continue searching using "Peter Dare Devil".  This will reduce the Results.

Sometime your target person registered in multiple forums, websites,social networks... So while searching ,you will get result of registered website of him using that username or info.

Read Each posts of target person, he might left some more information about him any one of forums or websites.

Using Email Address for Tracing:
If you got the email address of target person, it is much easier to trace the person. You can search using in the following sites. you may get some data.

Websites that will be useful for Doxing:
www.myspace.com
www.bebo.com
www.facebook.com
www.google.com
www.pipl.com
www.wink.com
www.123people.com
www.zabasearch.com
...
You can find any other site related to target person and search for his data.

Doxing needs Intelligence: 
Doxing needs Intelligence and searching ability.  You have to guess where to search and what to search about person.  Depending on searching ability, you will get what you required.

Security Question:
 Hacker can get the victim's security question answer using doxing.

For example, if your questions is "What is your pet?", he may guess. He will search with email or username . you may left your my pet is xxx. So now you are the victim.

Dictionary Attack:
Hackers can gather information about the victim and create a dictionary file(wordlist) for a target person alone.  Using that dictionary file , he can crack your passwords.

Conclusion: 
Doxing is one of powerful hacking method.

Security Tips of Users: 
Don't use Internet.  This is best security tip because your data can be traced by anyone.  sounds crazy?! No one like to leave the Internet.  So  i am giving some other tips for you.
  • Becareful when you give information in internet.
  • Use very Strong passwords .
  •  Don't set Stupid security Question for account. 

How To Share Spotify Playlists On Facebook

Yes, the present world is bitten and smitten by Facebook. People have started sharing so much of stuff on Facebook, then why not tell the world you are listening to. Yes, if you want to share Spotify playlists on Facebook, then you can do that without any third party tool.
Because of the Facebook effect, each and every web service is now integrated with Facebook. And this is the reason that Spotify too integrates Facebook with it. So, once you login to Spotify, you need to click on the Facebook badge to connect both of them. And once done, it would display you with list of your friends on the right side of the screen.
Since it extracts information from Facebook, you need no explicitly your friends here. And there are few ways to share tracks or Spotify playlists on Facebook. If you wish to share any particular song, you can copy the whole URL and message the same on Facebook to share it with your friends.
And the other way to share the track you are listening to is simply right click and share it using the in built feature. And if you want to check your friend’s Spotify Playlist, just click on the friend’s name which would display what your friend has been listening to. This is how you can share Spotify Playlists on Facebook.

The Secrets of Search Engine Optimization SEO

S . E . O .

Search Engine Optimization, or S.E.O., is an important, and in fact vital, part of any business’s online presence. Put simply, S.E.O. is the “tweaking” of a website so that it’ll be displayed right at the top of a search engine’s results pages (y’know, on that first page of results you get on Google, Yahoo! or Bing etc. when you key in a search phrase or words and hit “Search”). This optimization is an important aspect of any kind of search engine marketing that you do; the ultimate aim being to achieving the highest ranking possible for your targeted keywords and phrases.
Basically, it works like this: When an Internet user runs a search using a search engine they’ll more than likely only look over the first page of results laid out before them. Typically, they’ll then either follow a link they found on that first page or they’ll have another go and try another search. They’d only very, very rarely make it as far as the barren wastelands of Page 3. What this means is, if your website is not among the first listed in the search results, its chances of being found by potential customers are actually quite slim. Basically, there is little point in making a website submission to search engines if your site will never appear in the first few pages of results. Sorry.

How To Start Email Marketing

eMail Marketing Simplified!!!

One of the essential steps to a truly successful e-mail marketing campaign is creating your very own mailing list.
Every e-mail marketer knows that the key to online marketing is building a well-targeted, relevant and responsive opt-in mailing list. This is because they know that success comes from building relationships with a very large subscriber base. The relationship you build here is important and that’s why today I am going to tell you the difference between the Opt-In and Opt-Out mailing lists and how to create your very own mailing list using AWeber.
Building a strong, relevant mailing list can take hard work and effort but the rewards are worth it. Ask any successful marketer to name his most valuable business asset and he will, more than likely say ” My Opt-in Mailing List!”
If you want to succeed in emailing, you should always create your own list with valid and up-to-date email addresses on it. How? Keep on reading…