Thursday 16 May 2019

How to delete and create a new partition on a drive / storage device



  1.  Open an elevated command prompt.
  2.  Run diskpart
  3. list disk
  4. Note the disk number that corresponds to your drive (it should be obvious going by size)
  5. select disk X where X is the number from step 4
  6. list partition - There should be two, numbered 0 and 1, each about 7 GB
  7. select partition 0
  8. delete partition
  9. select partition 1
  10. delete partition
  11. create partition primary
  12. exit
  13. Exit Command Prompt (type exit or just close the window)
  • In Windows, go to Computer and try to open the disk. It will ask you to format it. Format it with the default settings and give it a name if you want.
It should now have a single, unified partitioned drive.

How Can Hackers Hack Social Media Accounts?

We can not deny the importance of social media websites in our daily life. A social media or social networking site helps people to connect with their friends, family, brands and celebrities etc. We share a lot of information on these websites including our personal and financial details such as location, photos and messages etc. This is the reason why hackers prefer to hack social media accounts for their bad intentions.

How Can Hackers Hack Social Media Accounts?

Not every internet user is educated enough in a way to understand how to protect their social media accounts. So in this article, Im going to mention some of the most popular methods used by hackers to hack social media accounts and how to make sure that you wont get hacked using those methods.

1. Phishing
Phishing is very easy and considered as n00b technique but it is one of the most effective techniques to hack social media accounts. There is 50-50 chance for a hacker to get victims password using Phishing if your victim is not aware of basic internet terminologies. There are various ways of carrying out a phishing attack. The most common one is where a hacker creates a replica of a login page which looks like the real social media page. The victim will then think it's the usual login.
The most common Phishing to create a duplicate of a login page which looks like the real login page. The victim thinks it's the usual social login page so he enters his login details in phishing page. Once the victim is logged in through the fake page, the email address and password are stored in a text file or in hacker's database.

How to detect Phishing Page?
  • Check URL of the login page.
  • Never login your social media account on other devices.
  • Use Modern web browsers that identify the phishing page.
  • Avoid emails or text msgs that ask you to log into your social media account.

2. KeyLogging
Keylogging is one of the easiest ways to hack a social media account. A keylogger is a program that records and monitors the users input and keeps a log of all keys that are entered. The keylogger can actively send your inputs to hackers via the Internet. You have to be very careful while dealing with keyloggers because even the computer experts become victims of keylogging.

How to detect Keyloggers?
  • Scan your USB drives before using them
  • Download software from trusted sites only
  • Use a good antivirus

3. Man In The Middle Attacks
 In this method, the hacker secretly relays and possibly alters the communication between the server and victim who believe they are directly communicating with each other.

The hacker makes independent connections with the victims and relays messages between them to make them believe they are talking directly to each other over a private connection, when in fact the entire conversation is controlled by the hacker.

The Hacker must be able to intercept all relevant messages passing between the two victims and inject new ones. This is straightforward in many circumstances; for example, an attacker within reception range of wireless access point can insert himself as a man-in-the-middle.

How to avoid MIME attacks?
  • Use VPN services
  • A proxy server to access the internet
  • Use good antivirus with good firewall options

4. Social Engineering
Social engineering is a simple method that's based on collecting as much info from the victims as possible. The information may include the date of birth, phone number, security questions etc. Once a hacker gains access to this info, he can brute force the info or use recovery methods to get login passwords.

How to avoid Social Engineering?
  • Never share personal info via email or phone
  • Avoid links from unknown or suspicious sites

5. Session Hijacking
When you log in to your social media account, your browser and the social media’s server maintains a session for user authentication. The session details are saved in your browser's cookie files. In session hijacking, the hacker steals those cookies and then access the victim's account. Session hijacking is most common when accessing Social media websites on an HTTP (non-secure) connection and it is widely used on LAN and Wi-Fi connections.

How to avoid Session Hijacking?
  • Do not use Social media websites when connected to shared Wi-Fi or LAN.
  • Try to clear cookies every 2-3 days or if possible daily

6. Saved Passwords
Most of the time we share our login and credit card details in the web browser. Anyone can see your Social media account from your browser's password manager. A hacker can get physical access to your computer and insert a USB programmed to automatically extract or retrieve saved passwords in the Internet browser or any other information the hacker may need.

How to avoid Password Hacking?
  • Try not to save passwords in web browsers
  • Do not share your device with people
  • Block the device connectors

7. DNS Spoofing
If a hacker is on the same network which is connected to the Victim, he can change the original page and replace it with his own fake page and easily gain access to the victim's social media account.

How to Avoid DNS Spoofing?
  • Always configure it to be secure against cache poisoning
  • Manage your DNS servers securely

8. Botnets
Basically, botnets are networks made of remote-controlled computers or bots. These bots have been infected with malware that allows them to be remotely controlled. It's expensive to set up botnets and this makes them be minimally used in cases of hacking login accounts. Some very popular botnets include spy eye and Zeus.

How to avoid Botnets?
  • Keep all your software up to date
  • Ensure that your firewall is always on

Saturday 11 May 2019

DO U WUISH TO UNHIDE FILES ON AN EXTERNAL DRIVE?

FolLoW ThIs SiMpLe StEps

SIMPLY ENTER THESE COMMANDS AT “CMD”: attrib -h -r -s /s /d g:\*.*

Having problems copying files from or to ur drive after even setting the permissions correctly?


Follow this simple procedure
Press the windows key + R and type in this command “secpol.msc” and click enter
Navigate to ‘local policies’ ‘security options’ ‘user account control:run alladministrators in admin approval mode’ ‘disable’ 


*After that restart the marchine and ur all set-up...
***Hope this helps***

KAMAtech I.T SerViCeS & OrGanIzAtiOnAl SySteMs!


Organizational software rendering, Networking, and system maintenance as well as Web development, at a cheaper rate!

Friday 10 May 2019

FIXING TOUCH SCREEN ISSUES ON WINDOWS 8, 8.1 & 10

  • Goto Device Manager by searching it through the search box and hit enter, and then click Device Manager, when it appears as an option.

  • Scroll down to Human Interface Devices (HID) and expand tree by clicking on arrow head to the left of HID.
    • Scroll down to HID - Compliant Touch Screen.
  • If there is a red cross next to the entry, right click on it and select the enable option. This should restore the touchscreen.
*If there is a yellow exclamation mark next to the entry, right click on it and select the Update Driver Software and follow the prompt Search Automatically for Updated Driver Software. This should find and install the driver software for your Touchscreen
*note: sometimes the system has to restarted for the changes to take effect and always make sure that your device drivers are always up-to date.
Hope this help's you out to resolve your touch issues.Cheers!!!

tip on speeding up internet connectivity on windows :)

Click Start then Run and type “gpedit.msc” without quotes. This opens the group policy editor.

 Then go to: –> Local Computer Policy
  –> Computer Configuration
   –> Administrative Templates
    –> Network
     –> QOS Packet Scheduler
      –> Limit Reservable Bandwidth.

Double click on Limit Reservable bandwidth.
It will say it is not configured, but the truth is under the ‘Explain’ tab i.e.” By default, the Packet Scheduler limits the system to 20 percent of the bandwidth of a connection, but you can use this setting to override the default.”
So the trick is to ENABLE Reservable bandwidth, then set it to ZERO. This will allow the system to reserve nothing, rather than the default 20%.
It works on Win XP, Windows 7, Windows 8 and as well as Win 2000. ENJOY!

Telemarketing/Online markting services

Get your products marketing on track

Services

Bring all your deals

KAMAtech Business Services

Call us for your web-development,organizational Network installation & maintenance, system optimization as well as Graphic design services!

Thursday 9 May 2019

Having problems with your windows store apps! Well then here is a fix for those nasty issues. Enjoy :)

1.goto https://mywindowshub.com/troubleshoot-fix-store-app-issues-windows-8-1/ and download Appsdiagnostic.diagcab file.

2. Run the AppsDiagnostic.diagcab file.

3. In the Windows Store Apps troubleshooter, click/tap on the Advanced link. (see screenshot below)



4. Click/tap on Run as administrator. (see screenshot below)

5. If prompted by UAC, then click/tap on Yes.

6. Click/tap on the Advanced link again. (see screenshot below step 3)

7. Do step 8 or 9 below for what you would like to do. (see screenshot below)

8. To apply repairs automatically
A) Check the Apply repairs automatically box, and click/tap on Next. (see screenshot below step 7)B) Follow any other instructions until completed, and go to step 10 below.

9. To select repairs you want to have done
A) Uncheck the Apply repairs automatically box, and click/tap on Next. (see screenshot below step 7)B) After the scan completes, you will be able to select (check) what you would like to be fixed, and click/tap on Next. (see screenshot below)NOTE: If you like, you can click/tap on the View detailed information link for more details. The options you get will vary depending on what the troubleshooter finds.

C) Follow any other instructions until completed, and go to step 10 below.

10. When finished, click/tap on Close or explorer additional troubleshooting options if you like. (see screenshot below)NOTE: If you like, you can click/tap on the View detailed information link for more details.