TRENDING NEWS

POPULAR NEWS

Getting Mailer Daemon Notices Off An On To Same Destination

MAILER-DAEMON hack? PLEASE HELP?

This is not usually a hacker, this is usually caused by malware on your computer. Read Yahoo Help's page about this common problem
http://help.yahoo.com/kb/index?y=PROD_MS...
A hacker would have changed your password so you could not access your account

You need to do ALL of the following and it should normally stop
1 - change your email password
2 - run full scans for viruses, spyware and malware. A virus scan alone is not enough. You also need to run an anti-malware scan. If you don't have one, Malwarebytes is very good and free to download. Then delete all infected files
3 - after running the scans, delete your browsing history and cookies and empty your cache
4 - restart your computer

This stops it most of the time

What happens if you reply to an email sent by a "noreply@something.com"?

AFAIK, it won't bounce. You'll most probably get an automated reply right away. And your email will go unnoticed.

What is the best feature of Windows 8 ?

As you have asked about the best feature of Windows 8, i would tend to think of the fast boot-up and shut-down and the preinstalled drivers. Its really too quick mann. 8secs to boot(to be precise). I can list down the cool new features incorporated:Installation (of Windows 8) is too damn fast.Boot-up and shutdown times are pretty amazing.One needs to manually install the graphic card drivers(NVIDEA or ATI ) only. Rest have already been done for you..The synchronization with Microsoft Account is worth talking about. Making a Microsoft account is very useful and is quite easy as you don't need any extra email. You can make it with an already existing one like mine i have my gmail live id. You can synchronize it with your Facebook account and all sorts of accounts that you have. Once you have linked your microsoft account to your computer, your life will be made easy. You will get all the calenders(FB birthdays, google calender, etc) in the calender app. Your mailbox will itself get created. Your messaging accounts, etc all get synced by itself.All the settings(even the minor ones like the position of taskbar) gets synced to your account and if you want to configure Windows 8 on another device or if you reinstall it, you just need to sync your Microsoft account and all your settings, wallpaper, themes, etc will be back.You can view all your photos(from skydrive, Fb to flickr) at one place under the Photos appNo need of Daemon Tools or other iso mounting software. Win 8 has got its own capacity to create a virtual drive once you double-click on the iso file. It opens in a second.The task manager has quite interactive interface and you have got the Startup options there itself. No more opening "RUN" to go to msconfig.The amazing collection of awesome apps(some really are) make your life peaceful as you don't need to browse anymore and you've got apps for many commonly used websites like Wikipedia, Makemytrip, wordpress, cricinfo, ebay, engadget, and the amazing integration of XBOX.This has got cons too. Not actually negatives but just that their presence would have made it better.No provision to make ad-hoc(yes, you can't make an ad-hoc but can only join one)The new version of windows update is not informative. Old one is still present though and is accessible only through Action Center.

What can a hacker do with an IP address? How do hackers obtain such confidential information?

well , lets dive straight into heart of the question . Rather than hackers , lets do it with me :p . what will i do if i get your ip address ?? lets starti will ping your ip to check if its up or not . After that , i will nmap (port scanner and much more) you to find all the services running on your system. With nmap by my side , I can find out which OS you are using and all possible daemons with ports.Then comes judging part which port to target or what outdated services are you running (vulnerable services) . After making a list of that ,my attack will differ .If you are a website or web-server ,then i may use nikto or vega to scan for vulnerabilities in web-applications. Some common but major flaws are :SQL injection or blind as wellcross site scriptingcross site forgeryinvalid password or form submissionshell injection and many othersHere comes attack phase ,where i can use popular tools like metasploit to launch myriads of attacks or even use social engineering to trick you into opening spammed emails containing trojans or malwares. If am persistent enough , I may get inside your computer using any methods .Even , password crackers can used for breaking authentication against ftp , ssh or telnet protocol .Common ones are hydra , john the ripper and so.After getting inside , i may wreck your pc and it depends on mindset on hacker for why is he hacking ?!.Then comes post exploitation phase where cleaning up the log files and other suspicious tracks and maintaining persistence for re-visiting may be doneAll these from just ip address :)

TRENDING NEWS