Results for Email

What is Email Header ? View email header in Gmail.

Many people open there inbox in-order to check their email or send a email and then sign-out but what we do not know that there are indeed lot of things are carried out when we simply send or receive a email. There is a detail report/history of all those things  that are carried out and are attached with the...
What is Email Header ? View email header in Gmail. What is Email Header ? View email header in Gmail. Reviewed by Satyajit (Admins,a.k.a Satosys) on Monday, October 28, 2019 Rating: 5

Reduce spam by using DKIM authentication in Google Apps

Spam is a common word these days as our mailbox is flooded with these stuffs every day.Spammers use these trick to promote their product and sometimes compromise an account.Gmail is using the DKIM authentication in the email header to authenticate a mail from a real sender.Now the google has again come up with a new step...
Reduce spam by using DKIM authentication in Google Apps Reduce spam by using DKIM authentication in Google Apps Reviewed by Satyajit (Admins,a.k.a Satosys) on Monday, January 10, 2011 Rating: 5

XSS Vulnerability threat in Google Web Optimizer

Recently Google has reported a XSS vulnerability security issue with its Web Optimizer code.So,it has requested its users to update the code in their site immediately.Though the level of threat is low but it is recommended to update the code.The  attacker may exploit this vulnerability and execute malicious code...
XSS Vulnerability threat in Google Web Optimizer XSS  Vulnerability threat in Google Web Optimizer Reviewed by Satyajit (Admins,a.k.a Satosys) on Wednesday, December 08, 2010 Rating: 5

More Secure is Google Account -Two Step Authentication.

Google has planned for the first time to introduce "A Two-Step Authentication/Verification" for logging into google account.It is really a very innovative way where maximum security can be ensured to the users. This new feature will be first available to Google Apps Premiere, Education, and Government edition customers...
More Secure is Google Account -Two Step Authentication. More Secure is Google Account -Two Step Authentication. Reviewed by Satyajit (Admins,a.k.a Satosys) on Monday, October 04, 2010 Rating: 5

New Gmail Phishing scam on roll.

Gmail is again hit by a new phishing scam, which is warned by the Security researchers from Sunbelt.This is almost similar to the old phishing scam that is using a spoof page(a.k.a fake page) along with the blend of social engineering inorder to fool the users.Dont know what is phishing visit here. What is new about...
New Gmail Phishing scam on roll. New Gmail Phishing  scam on roll. Reviewed by Satyajit (Admins,a.k.a Satosys) on Wednesday, September 15, 2010 Rating: 5

A Beginner's Guide to Ethical Hacking(By Rafay Baloch)

A Beginners Guide to Ethical Hacking Download Why you should buy this book? Are you interested in ethical hacking but donot know where to start then this book by Rafay Baloch is the most reliable source and i too also recommend it.  "A Beginners Guide to Ethical Hacking" is really a great book for newbie...
A Beginner's Guide to Ethical Hacking(By Rafay Baloch) A Beginner's Guide to Ethical Hacking(By Rafay Baloch) Reviewed by Satyajit (Admins,a.k.a Satosys) on Sunday, August 29, 2010 Rating: 5

How to Spy a Remote PC using RATS ?(General Tutorial)

Note: Earlier CompufreakS.blogspot.com is now SECURITYHUNK. Spying on Remote PC can be done in many ways....but today we are going to see how it can be done using RATS(Remote Administration Tools).This tutorial is a general one which can be followed for installing server of all types of RATS.Only thing that you have...
How to Spy a Remote PC using RATS ?(General Tutorial) How  to Spy a Remote PC  using  RATS ?(General Tutorial) Reviewed by Satyajit (Admins,a.k.a Satosys) on Monday, July 26, 2010 Rating: 5

Tabnabbing:Email & Online Banking Vulnerabilities and Countermeasures

In many of my post I have pointed out the concept of  "Phishing" in  Email hacking,where the attacker sends a fake/spoof  login page to the victim having manipulated the url to create some sort of illusion.Few months back "Aza Raskin" the Creative Lead  of Mozilla Firefox describes  a new form...
Tabnabbing:Email & Online Banking Vulnerabilities and Countermeasures Tabnabbing:Email & Online Banking Vulnerabilities  and Countermeasures Reviewed by Satyajit (Admins,a.k.a Satosys) on Tuesday, July 20, 2010 Rating: 5

How to protect your ORKUT account from being Hacked....?

"Orkut" is  the social networking site powered by  Google.Most of the attackers nowadays use orkut  for advertising there work and product through the victim's account.I have come across few incidents where accounts are being  hacked then some pornographic content and vulgar language are displayed this...
How to protect your ORKUT account from being Hacked....? How  to  protect  your  ORKUT  account  from  being  Hacked....? Reviewed by Satyajit (Admins,a.k.a Satosys) on Friday, July 16, 2010 Rating: 5

Old Captcha vs New Captcha

CAPTCHAs(Completely  Automated Public Turing  test to tell Computers and Humans Apart ) are in use for many years to prevent  automated  Sign-ups into email accounts and  websites requiring signups or like.Here the users have to identify the scrambled/distorted letters or words in an image and...
Old Captcha vs New Captcha Old Captcha vs New Captcha Reviewed by Satyajit (Admins,a.k.a Satosys) on Friday, July 02, 2010 Rating: 5

How to know the IP Address of a person by sending an E-mail?

IP Address holds a lot of  importance in the hacking world!!! once an attacker  grab hold of an IP Address of a person he/she  can  initiate  different  types of attack which is very unethical  whereas  tracking email and thereby  get the IP Address of the user is even more...
How to know the IP Address of a person by sending an E-mail? How to  know the IP Address of  a person by sending an E-mail? Reviewed by Satyajit (Admins,a.k.a Satosys) on Tuesday, June 22, 2010 Rating: 5

How to protect your Twitter Account?

In my last post I told how to protect your email account but few days back one of my friend asked me how to protect a twitter account so i have come up with this post.The twitter account can be hacked in different methods as under Email hacking.Once the twitter account is hacked it can hit badly to a person's online...
How to protect your Twitter Account? How to protect your Twitter Account? Reviewed by Satyajit (Admins,a.k.a Satosys) on Sunday, June 20, 2010 Rating: 5
Powered by Blogger.