Our amazing new site will launch in
Showing posts with label Security. Show all posts
Showing posts with label Security. Show all posts

Better Secure Your Facebook Account

How to better secure your Facebook account from being hijacked. Secure your Facebook account. Facebook try's to apply all of the most recent secure features to their website, but in some cases unless you enable the Facebook features yourself you will never be fully protected. Today I will show you how to enable some features in which can very easily protect your account.


Secure Your Facebook Account



  • Log into your Facebook Account
  • Click Account Setting 
  • On the left plane click the Security Setting
  • Under Security Setting locate secure browsing
  • Click edit and enable the feature
  • You can also change some other features, just read and determine if you'll need the setting enabled.

The Most Poweful Account In Windows

How to gain access to the most powerful account in windows. Windows "System Account" the most powerful. An account better and more powerful then the Administrator account. Believed to be similar to the root and/or superuser of the Linux/Unix world. Note: This is for Windows XP only! If you have Windows 7/Vista you can gain access to the Hidden Administrator Account!


The Windows XP System Account



This account is the highest account available for XP users, and with this account you get top level privileges over your system. You can also delete other admins accounts as well.

To quickly get the System Account please follow the below directions.
  • Start > Run > CMD Then click [ENTER] or Start > All Programs > Accessories > Then click Command Prompt.
  • Now create a schedule to run cmd.exe
  • To run the schedule you must know the 24-hour clock!
24-hour clock 12-hour clock
00:00 12:00 a.m.
01:00 1:00 a.m.
02:00 2:00 a.m.
03:00 3:00 a.m.
04:00 4:00 a.m.
05:00 5:00 a.m.
06:00 6:00 a.m.
07:00 7:00 a.m.
08:00 8:00 a.m.
09:00 9:00 a.m.
10:00 10:00 a.m.
11:00 11:00 a.m.
12:00 12:00 p.m.
12 noon
13:00 1:00 p.m.
14:00 2:00 p.m.
15:00 3:00 p.m.
16:00 4:00 p.m.
17:00 5:00 p.m.
18:00 6:00 p.m.
19:00 7:00 p.m.
20:00 8:00 p.m.
21:00 9:00 p.m.
22:00 10:00 p.m.
23:00 11:00 p.m.
24:00 12:00 a.m.
  • Now According to the time it is now (9:30 p.m.) I need to convert it to the 24-hour clock (21:30).
  • Once you've converted the time over simply give your self an extra 5mins to prepare the other procedures. now (21:35) or (9:35 p.m.)
  • Now in the command prompt type at 21:35 /interactive "cmd.exe" then click enter. Everything In Red!
  • Now type taskkill /f /im explorer.exe then click enter. Everything in Red!
  • Now exit out of that command prompt and wait for the time 21:35 or 9:35 p.m.
  • Once time reaches 9:35 p.m. another command prompt will open!
  • In that command prompt type explorer.exe then click enter once more. Everything In Red!
  • Now you are logged in as System User.

Related Posts:

Hide Your IP Address The Correct Way

Surf Anonymous. Hide My Ip Address. Change My IP Address. There are tons of videos online in which teaches you how to hide your IP address. But they only work most of the times for certain people with certain OS (Operating Systems), that really blows when you're trying to stay anonymous for a day! There are also tons of programs online which hides your IP address and displays a fake IP address, one such program is Hide IP Privacy.


Hide IP Privacy provides the quickest and easiest way to transition between your real and fake IP's. 

Change Your IP Address


To change your IP address you'll need Hide IP Address which you can download and install over at Brothersoft. Once you have the program installed, displayed will be you current IP address if you want to hide your IP and replace with a fake IP then click "Hide IP". (seen in the below image)


One you click "Hide IP" you will be assigned a fake IP address (seen in the below image)


If you want to confirm that it is working then see the following post Find Your IP Address With Google Search.

Source: Brothersoft


Random Posts:

Check Email For Authentication

How to check an email for authentication. Check the authentication of an email. Verify an email address. Online now-a-days 1000's of scams overflow our inbox with irrelevant messages and its really difficult to determine when real employees want to contact us about business proposals, their emails looks similar and in some cases we mark their emails as spam never to reply to them again, well thanks to the internet we can now check emails for authentication.


Verify Email Address To See If It Exists

If you quickly want to check a customer email address or a possible spammer email address then you can use Verify Email Address a free email tool in which you can use to verify any email address quickly to check if its even exists.

Source: http://www.verifyemailaddress.org/

Related Posts

Install Your Favorite Software In One Download - Ninite

So you've just set up and or reinstalled a newer version of windows on your computer, now you have to spend count less hours downloading and installing the software you need for day to day use. Well before you really begin to be more productive you'll need more software installed on your system, and some of the files we use everyday depends on the software we need. Introducing Ninite a web-based app which combines numerous software into one download. We've reviewed such similar software see our post labeled "Download All Web Apps Free One Source - All My Apps".


 

Ninite


 Ninite is one of the best hassle free web-based installers that you will ever find on the internet. Ninite comes equip with numerous software ranging from some of the best Web Browsers, Messaging Software, Media, Run Times such as Adobe Flash Player, Imaging, Documents, etc.

Some Features of Ninite.

  • Never click, next, next, next - The process is fully automatic.
  • No Toolbars - no extra software (sponsor toolbar junk) installed on your system, gives you more control.
  • Always updated with the latest version.
  • No sign-ups.
  • Ninite decides whats best for your system 64bit or 32bit
  • International - Determines your default language and install the corresponding software.
  • and Ninite does much more.
  • http://ninite.com/
 Ninite is very simple and easy even newbie's can get the job done!

Create Expriring Links That Keeps Secrets

We've shared numerous amounts of online security apps (Disposable Emails Address | Self Destructing Messages), Which indeed lets one share super secret messages over the internet, Now their is such a site in which you can generate Expiring Links - that can keep a secret and or share links privately.

Expiring Links


Expiringlinks.co is a link generator which can be used to create easy simple links with an expiation date. To use the site simply start by filling in the link you want to have expiring date (expiration date) on. see below image.
















  • Once you filled out the above information about you link click Create Link. see below image

Know of any other sites that may interest our readers? One Day Till 9/11/11 :)

Best Guide To Speed Up The Internet With Out Software or Programs

So whats the best way to speed up your internet without any software and or programs? Tired of your internet speed? Want to know the best way to speed up the internet? Well stop searching and start learning! I remember numerous of times when I spent hours on the internet trying to find a solution, I even though deleting every file on the computer (even operating system files) would speed up the process of the internet, doing so I ended up braking our family laptop (screen of death), my mom was mad and I was in trouble, but you learn form your mistakes, that's why I've created this website, so people could learn how to do things the correct way. [GEEK SKILLS...]



Google Public DNS
Back in 2009 Google introduced an Experimental Public DNS Resolver, made to help improve security and the speed up web browsing. An efficient DNS server in which would load faster on a webpage that generates content from multiple domains. Google Public DNS Resolver plans to be an efficient committed server in which you can rely on. This server also helps unblock sites that your ISP blocked. (see also TOR to unblock websites)

To replace your current DNS server with Google DNS server follow the below directions.
  • Navigate to:  Control Panel \ Network and Internet \ Network and Sharing Center
  •  Under:  view your basic network information and set up connections
  •   Click the network connection your connected to. (see below image)
  • Click Properties
  • Now under Networking tab search for Internet Protocol Version 4 (TCP /IPv4)
  • Now click Properties. (see below image)
  • Under the General Tab search for Use the following DNS addresses.
  • Now type the setting you see in the below image.
  • OR.
  • Preferred DNS Server. 8.8.8.8 
  • Alternate DNS Server. 8.8.4.4
  • Click OK then restart your computer. 


What other hacks and or tricks you guys use to speed up your internet.

Using Google as a Hacking Detective Tool

Google is the most popular online search engine in the world, they serve more than a million of all search queries on the internet. We all use search engines to find specific things in our interest, but what if a specific file was to be put online with out your permission, how would you go about finding it, how far are you willing to go to get rid of it. Well Google can be used as both hacking tool and detective tool, for this purpose we will be using it as both, we can use it to find vulnerabilities within websites to detect images of specific things and or of things in our interest for hacking needs and search things such as similar images and files for our detective needs. Knowing this we can now get started with testing your hacking and detective skills. Doing this tutorial we will be showing you how to use Google to your advantage.



Find Similar Images | Detective


Use images of your self or some one else to detect whether or not someone else is using them, there are cases where as some people claim to be you but their aren't, and there are even some other cases where as nude pictures of one self is leaked online, stolen from home computers and desktops, see if your data have been leaked to the online world. Read More >>

Security Camera | Hacking

This is true, you can view unsecured Security Cameras from your home computer using your internet and Google's search engine. You can even control some of these security cameras. Note: You must have java installed to view theses cams. http://www.java.com/
  • Type the below codes into Google's Search and click the returned search results
  • inurl:"viewerframe?mode=motion"
  • intitle:"Live View / – AXIS" 

Google For H4x0r'5 | Hacking

Yes there's even a version of Google for hacker's written in elite, and you may remember the world elite or 1337 from the following post http://www.theemolab.com/2011/06/when-to-change-your-password.html. If you want to learn more about 1337 I recommend reading the 1337 H4X0R Handbook.

Google Tronica | Google Loco

These two hacks are just some cool sites which are not affiliated with Google in any way. Just another way to spice up your search. Block Time Wasting Sites In Google Chrome.

Weather "YourZipCode"
To see the weather for many U.S. and worldwide cities, type “weather” followed by the city and state, U.S. zip code, or city and country.
  • Weather "YourZipCode"
  • Weather 80435
  • Weather San Francisco, CA

Stock Quotes
To see current market data for a given company or fund, type the ticker symbol into the search box. On the results page, you can click the link to see more data from Google Finance.
  • CSCO

Time
To see the time in many cities around the world, type in “time” and the name of the city.
  • time London

Sports Scores
To see scores and schedules for sports teams type the team name or league name into the search box. This is enabled for many leagues including the National Basketball Association, National Football League, National Hockey League, and Major League Baseball.

All sports data provided by STATS LLC
  • san francisco 49ers

Sunrise & Sunset
To see the precise times of sunrises and sunsets for many U.S. and worldwide cities, type “sunrise” or “sunset” followed by the city name.
  • sunrise New Orleans

Calculator
To use Google’s built-in calculator function, simply enter the calculation you’d like done into the search box.
  • 5*9+(sqrt 10)^3=

Book Search
If you’re looking for results from Google Book Search, you can enter the name of the author or book title into the search box. Then, click on “Books” from the left-hand navigation to view book content. You can click through on the record to view more detailed info about that author or title.
  • Henry Wadsworth Longfellow

Earthquakes
To see information about recent earthquakes in a specific area type “earthquake” followed by the city and state or U.S. zip code. For recent earthquake activity around the world simply type “earthquake” in the search box.
  • earthquake

Unit Conversion
You can use Google to convert between many different units of measurement of height, weight, and volume among many others. Just enter your desired conversion into the search box and we’ll do the rest.
  • 10.5 cm in inches

Public Data
To see trends for population and unemployment rates of U.S. states and counties, type "population" or "unemployment rate" followed by a state or county. You can click through to a page that lets you compare different locations.
  • population FL

People Profiles
If you’re looking for someone you just met or a long-lost friend, enter the name of that person plus some identifying words about him or her to see a list of people with that name.
  • jon wiley

Synonym Search
If you want to search not only for your search term but also for its synonyms, place the tilde sign (~) immediately in front of your search term.
  • ~fast food

Dictionary Definitions
To see a definition for a word or phrase, simply type the word “define” then a space, then the word(s) you want defined. To see a list of different definitions from various online sources, you can type “define:” followed by a word or phrase. Note that the results will define the entire phrase.
  • Define philosophy

Spell Checker
Google’s spell checking software automatically checks whether your query uses the most common spelling of a given word. If it thinks you’re likely to generate better results with an alternative spelling, it will ask “Did you mean: (more common spelling)?”. Click the suggested spelling to launch a Google search for that term.
  • expolsion

Local Search
If you’re looking for a store, restaurant, or other local business you can search for the category of business and the location and we’ll return results right on the page, along with a map, reviews, and contact information.
  • Italian food 02138

Movie Showtimes
To find reviews and showtimes for movies playing near you, type “movies” or the name of a current film into the Google search box. If you’ve already saved your location on a previous search, the top search result will display showtimes for nearby theaters for the movie you've chosen.
  • movies 94705

Health Conditions
To see information about a common disease or symptom, enter it into the search box and we’ll return the beginning of an expert summary. You can click through to read the entire article.
asthma


Medications
To see information about most generic and brand name prescription drugs in the U.S., enter the drug name into the search box, and we’ll display a summary and description of that medication. You can click through links from the National Institutes of Health to get more information about side effects, how to take the medication, precautions, dietary instructions, and what to do if you miss a dose.
  • Ambien

Poison Control
You can quickly find the U.S. poison control hotline (1-800-222-1222) by entering “poison control” or similar phrases into the search box.
  • poison control

Suicide Prevention
You can quickly find the phone number for the National Suicide Prevention Lifeline (1-800-273-8255) by entering "suicide prevention" or similar phrases into the search box.
  • suicide prevention

Flu Vaccine Finder
During flu season, search for “flu” to find tips on how to stay healthy from U.S. Health and Human Services and a flu shot locator which uses Google Maps to show you nearby locations offering seasonal and/or H1N1 flu vaccine
  • flu

Flight Tracking
To see flight status for arriving and departing U.S. flights, type in the name of the airline and the flight number into the search box.
  • american airlines 18


Flight Schedules
To see flight schedules to or from a particular destination, type “flights from” or “flights to” followed by the city or airport of interest. You can also add another location with “to” or “from” and view the schedule for a specific route.

Flight schedule data is provided by OAG and QuickTrip by Innovata.
  • flights from denver to chicago

Currency Conversion
To use our built-in currency converter, simply enter the conversion you’d like done into the Google search box and we’ll provide your answer directly on the results page.
  • 150 GBP in USD

Maps
Looking for a map? Type in the name or U.S. zip code of a location and the word “map” and we’ll return a map of that location. Clicking on the map will take you to a larger version on Google Maps.
  • Seattle map

Plus (+) Operator
Google ignores common words and characters such as where, the, how, and other digits and letters that slow down your search without improving the results. If a common word is essential to getting the results you want, you can make sure we pay attention to it by putting a “+” sign in front of it.
  • peanut butter +and jelly

Related Search
To search for web pages that have similar content to a given site, type “related:” followed by the website address into the Google search box.
  • related:www.cnn.com

Fill in the Blank
Sometimes the best way to ask a question is to get Google to ‘fill in the blank’ by adding an asterisk (*) at the part of the sentence or question that you want finished into the Google search box.
  • Isaac Newton discovered *

Package Tracking
You can track packages by typing the tracking number for your UPS, Fedex or USPS package directly into the search box. We’ll return results that include quick links to easily track the status of your shipment.
  • 1Z9999W99999999999

Patent Numbers
To search for U.S. patents, enter the word “patent” followed by the patent number into the Google search box and hit the Enter key or click the Google Search button.
  • Patent 5123123

Gain Access To Private Information

With Google it is possible to gain private information to CV, PDF documents including one's personal information such as DOB, Education, Phone, Address, Bank Accounts etc. In which can be found using the following search terms.
  • intitle:”curriculum vitae” “phone * * *” “address *” “email”
  • filetype:xls inurl:”email.xls”
  • intitle:index.of finances.xls


Use Google For Pirating "Getting Paid Files Free" | Hacking
Google even makes it available for us to get things for free such as PDF, EXE, MP3, Zip, RAR etc. In other words books, PDF documents, Music etc. Most likely any file you can think of, you just gotta learn to use Google Search. Learn More About Pirating!
  • For Music “?intitle:index.of?mp3 artist name“
  • For PDF “?intitle:index.of?pdf“
  • For RAR “?intitle:index.of?rar“
  • For Zip “?intitle:index.of?zip“ 
  • For Every Thing Else “?intitle:index.of?“
  • For Any Other File Extension Type It Just After The Last Question Mark (Seen In Red) “?intitle:index.of?“ 

Hack Gmail Password Phishing
Phishing is basically when you make a clone of a real website, the user logs in and you direct him to the real site or you direct him to another fake page. This is the method we will be using to hack Google's Gmail Accounts. Learn More!

Prevent Gmail Account Hacked
Instead of hacking gmail accounts, prevent you gmail account from being hacked don't be a victim of gmail phishing, learn the rows of a hacker. Read More >>

Set Your Gmail Account To Prevent Hacking
We talked about Phishing scams here on TheEmoLab! Article Hacking-FaceBoook-Password-Method-Phishing we suggest you take a quick look there. So what are Phishing Scams? Phishing scams are non legitimate sites or clones of other sites, that claims to be the organization of the site and are response-able for more than 1-Million Hacked Accounts world wide. Read More >>

Hopefully you guys read this post through, and hopefully you didn't if you didn't I recommend bookmarking this post for future references, share it with friends and others, keep the knowledge flowing. Please see our Disclaimer | Privacy Policy

Should I Change My Password Or Not?

Wanna know when is it the right time to change your password or not? Well I do, because their are tons of sites of which every day their database gets hacked and your information somehow get's leaked to the online world, just as Twitter accounts was hacked back in 2009, so it's recommend to change your password every few months, and I will show you some of the techniques I myself have been using over the pass months, these techniques are the best and it's recommend to give them a try. To help to see if your passwords haven't been compromised of keep reading.

Should I Change My Password?


ShouldIChangeMyPassword.com has been created to help the average person check if their password(s) may have been compromised and need to be changed.
This site uses a number of databases that have been released by hackers to the public. No passwords are stored in the ShouldIChangeMyPassword.com database.



Password Techniques

Here is my idea of the best password possible, if you follow this guide your account will probably never get hacked.

Use the elite alphabets *Also know as 1337.
  1. A = @ | a = 4 | b = 8 | E = 3 | e = 3 | G = 6 | g = 9 | l = 1 | m = m | O = 0 | S = 5 | T = 7 | Z = 2
  2. For Example | Pie = P13 | Computer = C0mpu73r | TheEmoLab = 7h33m0l4b | Password = P455W0rd | Google = G00Gl3 | Yahool = Y4h00l | 
  3. Make the password longer then 8 characters long.
  4. This isn't the best method but its probably better then the method you're using now.

Check Your Antivirus Software

For beginners who want to know weather or not there antivirus software is currently working, and you have reason to believe your antivirus program isn't reliable and that you currently have a virus on your computer, you may want to test your antivirus software for further investigation. Some antivirus programmers use this method to help test their software, they even make their own viruses to see if they developed their software correctly. Checking your antivirus software can be easily done by creating a simple ".com" file.



Check if your antivirus program is working or not!
To start your own virus, follow the below steps.
1.Begin a new text document (open notepad)
2.Paste the below code into text document (notepad)
X5O!P%@AP[4\PZX54(P^)7CC)7}$EICAR-STANDARD-ANTIVIRUS-TEST-FILE!$H+H*
3. Save this file as EICAR.com "All Files"

Within a couple of seconds your antivirus software should pick up the virus, if it doesn't you may need to update and or find another antivirus program.

Anonymous Browsing In Google Chrome

Learn how to securely browse the internet anonymously, leaving no trace at all. In the past we learned about 26 disposable email addresses and also using Tor to browse the Internet Anonymously.

Image Credit


Browse Google Chrome Anonymously
There are days when everything you do online you want kept private, you want your work and private data untraceable. Today learn how to browse the internet in Google Chrome anonymously, leaving any trace of cookies, history and keeping you identity concealed.(Quarantined) This doesn't means that sites you visit want have records of you. This means any website visited, your computer will not have any records of such.
Learn to stay anonymous in Chrome, Follow The Steps Below.

In Chrome click the tool symbol located at the top to the far right.
A menu will appear scroll down the list and click "New incognito Window".
Now you are done, everything in this window will not be saved, all history will be deleted. Its also cool, see the picture at the top to the far left, Cool Right!

The Ultimate Windows 7 Collection

Welcome To the ultimate Windows 7 Guide, here are some tweaks and tips I posted over the past month that have made to help others secure and hide things in windows 7.I really hope this post is useful for you guys.


On Screen Keyboard
On Screen Keyboard is a utility that displays a virtual keyboard on the computer screen that allows people with mobility impairments to type data by using a pointing device or joystick, It can also helps to learn typing.



 To use On Screen Keyboard
  • Open Start Menu Type Run in the search bar in Windows 7, Vista
  • In Windows XP Open Start Menu And Search For Run or
  • Start All Programs, Accessories, Run
  • Once The Run Dialog Box Appears Type OSK Then Press Enter
  • Done

Improve Startup Performance
When your system starts and it takes a long time to load, you may have a-lot of start up programs which may slow the over all speed of your system.To avoid this and speed up your system load time tweak the registry.You can enable Boot-Only Fetching, which is just another remarkable tweak for windows 7.

To Improve Startup Performance
Tested Only On Windows Vista, Xp

About Tweak Prefetch
Disabled: Disables Fetching.
Applications Only: fetching only user started applications.
Boot Only: fetching only boot files (Important Only).
Applications & Boot: fetching both applications and boot files (Important and User Applications Files).
Disabling the prefetch will only slow your computer and clearing the prefetch will only make it slower, these options are available for only experience users only.

In Windows 7
Click START and navigate to the Search programs and files search box and enter regedit.In the left pane navigate to HLKM\SYSTEM\CurrentControlSet\Control\SessionManager\MemoryManagement\PrefetchParameters and in the right pane click EnablePrefetcher change the value to 2 and click EnableSuperfetch and change the value to 2 and restart your computer.

Windows 7 GodMode
Need the ultimate way to tweak and manage your Operating System? Yes! Then use windows 7 God-Mode. This quick one stop folder has almost every thing a windows geek would love. See The Full Post>>

Windows 7 Shortcut Keys
One of the best ways to interact and speed up your browsing in windows is through Shortcut keys. Above is a list of some shortcut keys. See The Full Post>>

Get Vista Sidebar Back In Windows 7
Has Windows Vista sidebar disappear from your newly installed Windows 7 system? If so let me let you in on a little secret, it was never there! Turns out Microsoft removed it complete, that's kind of a mean thing, for people who really loved the Vista sidebar. See The Full Post>>

Add A Folder To The Send To Menu
Whats the Send To menu? The send to Menu was designed to easily send multiply files from one place to another.To use the Send To menu, simply right click a file of folder to transport that item to a folder in the menu. Why Would IWant To Change My Send To Menu? See The full Post>>

Hide Files Inside Of Pictures
Steganography is the art and science of writing hidden messages in such a way that no one, apart from the sender and intended recipient, could be aware of the hidden data stored. To hide files in side of pictureswinrar or any other extract program.
See The Full Post>>

Unblock Facebook, Yahoo At School Or Work

A while ago we showed you how to gain access to blocked websites and we also wrote on how to block web sites.Now the most simplest and easy way to access Facebook, Yahoo, and any other website that's blocked.We call this the most simplest form because of the process, Download, Install, then Surf.
TOR Project LOGO

Introduction
We will be using TOR or TOR Project.TOR is a Project made to help improve your privacy and security over the internet.Tor creates an idea place for developers to create new communication tools, with built-in privacy features.Over all TOR provides the foundation that allow organizations and individuals to share information over public networks anonymously. View The Full Review

How To Use
Although TOR can be used for multiple reasons, we will be using it to access blocked websites at school/work.To use one must head over to the TOR Project website, and Download TOR Project.TOR is available for Windows, Apple OS X, Linux/Unix, And some Smart Phones.Download the file and run the exe application, the files will extract, open the Tor_Browser Folder and Run Start_Tor_Browser.exe, within seconds a portable version of firefox will appear, browse the internet as though you are using your home network.

Ideas
I Recommend if using school/work computer to copy over the files to a usb stick(Thumb-Drive), Then run the files as normal.This could be very high-risk and foolish if you don't know what you are doing.I also recommend after finishing up on school/work computers delete the files. Be Anonymous!

Secure Your Gmail Account Using 2-Step Verification For Best Protection

Learn to keep your work secure.Using gmail 2-step verification, This is an advanced gmail setting.

 If you are using Google for business reasons there are multiple reasons why you should enable the feature.Enabling this feature will improve your security, and decrease hacking vulnerability.This feature allows you to verify your account not once but twice(when signing-in).This will indeed add an extra shield of security needed to protect your account from Phishing, and any other ways of hacking.

The Idea
The idea of having your cell phone available is great, considering although this so called hacker has your email and password ids, he/she's not that close, to have your phone.

Before Getting Started
Before getting started using 2-step verification please note to have your phone beside you at every log-in. Your Phone is used to generate a random key made when signing up with 2-step verification.After logging into your account their will be a second screen, Prompting you for a verification code, which you'll get from your phone.

 Another thing to point out is when using 2-step verification any Iphone app by Google which uses username/password will not work. That goes for any other Non-browser app which uses username/password.

Requirements
Here's the list of the supplies you will need to get started!
  • A Phone
A phone always available for you this could be a landline phone, or mobile
and any other smartphone or ipod and ipad that can run the Google Authenticator application.
  • A Backup Phone
A phone used if your primary phone is stolen, lost, or unavailable.This can be a work or home phone, and or one family/friend you trust.

Getting Started
To get started navigate to your Account Setting Page and look for Using 2-Step Verification.


 Setting up 2-Step Verification may vary, depending on what phone you use as primary, rather it be mobile or home phone.I personally recommend using mobile as primary considering your mobile is portable, and using home for backup due to not being portable.

 After setting up your primary phone you'll need to set up a backup phone recommended.Adding a backup phone is very important if your primary phone is unavailable.Your backup phone should be easy to access, such as a home phone.DO NOT USE YOUR PRIMARY PHONE AS BOTH PRIMARY AND BACKUP.The backup phone will only be used if you cannot log-in using Verification Code.

 When finishing up you will be given 10 backup codes. These codes can be used to Backup your account, access your account when traveling, and more.Keep in mind that these codes are one time use only.Print them out and store them some where save.

Signing-In
When signing in use your username and password and click Stay signed in if not using a public or shared computer.This option is used only on your computer to prevent you for frequently logging in.


The next page will ask you to enter a Verification Code, This Code is to be found on your mobile phone app(Google Authenticator), send to you by txt message or, called to you.You'll have to enter a Verification Code every 30-days according to your settings.Remeber you can always sign-in using your backup codes.



Signing Into Applications
How can I sign-into applications such as Outlook Express, Gmail on Your Phone, Google Talk, and more.To access these accounts you will be using application-specific password.To turn this option on navigate to Authorizing Applications & Sites Page. Under Application-Specific Passwords enter a descriptive name for the application you want to authorize, such as "AdWords Editor – Desktop," then click “Generate application-specific password".It then generates the application password, use it to sign-into that application.

Turning off 2-step verification
If for some reason you don't need this extra security, you can turn it off, just visit the Using 2-step verification Page sign in with username/password and verification code if asked.Click Turn off 2-step verification a pop up window will appear just click ok to confirm.
For More Information Please Be Sure To Visit This Link

Keep Your Internet Work Safe

















 Keep your work safe while at home, office place, or any other place. Do you feel as though your information might leak out at any second, or are you on a banned site at school or work, do you fill guilty for visiting adult sites or need to quickly hide your work, with out leaving a trace. Then what you need is called a Panic Button.

Panic buttons help with most of the problems. Panic buttons are made to instantly hide private internet information, such as the site you are viewing now. Panic buttons are buttons made to be pushed for emergency's, the reasons are endless. I'm sure we all have a reasons to install Panic button's on our browser to quickly hide work and private sites from everyone else.

Chrome users can install the extension Panic Button while as Firefox users can install Panic or Panic Button.
Share, Learn, And Hack. Recommend Something!

Best Free Secure Desktop Password And File Manager

On-The-Fly-Encryption
 So whats the best way to secure your files, such as passwords, documents, projects, receipts and every thing else you pass through thumb drives.  The best way so far to secure your documents and files are through True Crypt. True Crypt is a free program used to encrypt an secure laptops, desktops, and notebooks. It's opensource for Windows 7/Vista/XP, Mac OS X, and Linux, and uses some of the strongest algorithms and best stealth techniques. True Crypt is used by Hackers, Government's and some Research University's. 
 (Sponsors:(Increase Testosterone) (American Deluxe Telecaster).)

File Encryption. Let's Encrypt Your Files/Passwords.

File encryption is done easy, download True-Crypt http://www.truecrypt.org/downloads
and install the free software.

Once Installed
  • Run True Crypt
  • Navigate To "Create Volume"
  • Check "Create An Encrypted File Container"
  • Click "Next" And Select "Standard TrueCrypt Volume"
  • Click "Next" Once More And click "Select File"
  • Navigate To Your "Desktop" And Save The File As "containerfile" And Click Save 
  • (See Below Image)

























  • Now Click "Next" 2 Times
  • Now Create The Volume Size We Recommend 1GB For Easy Moving From One PC To Another.
  • Create A Volume PasswordIt Must Contain More Than 20 Characters. Click "Next"
  • Move Your Mouse Like Crazy To Generate A Random Key Then Click "Format"




    How To Use The Encrypted File Container.

    • Open True Crypt Once More And Select "Select File" And Open The Container File We Saved Earlier On The Desktop And Select It.
    • Once Selected There Will Be A List Of Aviable Drive Letters, Select One And Click Mount.
    • Enter Your Password And Click OK.
    • Now Navigate To My Computer And Find The Drive Letter You Used, In This Case We Used X.
    • Now Save You Most Important Information There. 
    • Once Done, Open True Crypt Once More And DisMount Your Drive Letter We Used X.


    Note: To Access Your Files Everywhere You Must Have True-Crypt Installed On Every Computer You Use.

    Secure Your Computer With USB Flashdrive



    Want to leave your computer, but don't want to shutdown or press the lock button? Well lucky you, there's a program available for download, which when installed locks your computer with your unique flash drive. This program is called USB Desktop Lock.

    USB Desktop Lock is an ultimate solution for locking your computer without a password! With this program, you just stick in the USB flashdrive, open the Main window, browse for your flashdrive, and pull it out to lock up your computer! USB Desktop Lock is a very intuitive interface that allows you to turn any USB flashdrive into a "key" to unlock your computer.[Read More & Download]

    Best Way To Secure Your Laptop 2011





    How much does your laptop cost? Do you think it work getting it stolen? Put some GPS Tracking software on your computer! The free way. I know many people who has gotten there laptop stolen and has had sensitive information stolen. Believe it or not your laptop is your identity, you keep your photos, music, poems, diaries post, and much more files on your computer. These files can tell a lot about you. Why not take the time and secure your system. Prevent This From Ever Happening!




    ~ Links

    Prevent Gmail Account hacked

    Here's a quick gmail(Google) guide to protect your account from being hacked. If you really worry about email security then its recommend you follow this guide. Its normal to want to protect your gmail account, most Google user use their gmail account for their primary email address. Also Google provides many more apps and social websites associated with your gmail(Google) account. Their is no doubt you'll want to protect it now.




    1. Prevent Session Hijacking Using https

    Signing into gmail over non-secure networks makes your account easy target to session hijacking. "In computer science, session hijacking refers to the exploitation of a valid computer session—sometimes also called a session key—to gain unauthorized access to information or services in a computer system"

    • Taking Steps To Prevent This.
    • Sign into your gmail account.
    • Click Settings at the top of the gmail page.
    • Set 'Browser Connection' to 'Always use https' if not already there.
    • Click Save Changes
    • Or Change http://mail.google.com to https://mail.google.com
    • Other Similar Post How To Browse Google Safely

    2.Disable Forwarding POP/IMAP
    For Google user who currently don't use IMAP/POP any more.
    "IMAP, or Internet Message Access Protocol, lets you download messages from Gmail's servers onto your computer so you can access your mail with a program like Microsoft Outlook Express or Apple Mail, even when you aren't connected to the Internet."


    • Taking Steps To Prevent This.
    • Sign into your gmail account.
    • Click Settings at the top of the gmail page.
    • Navigate to 'Forwarding and POP/IMAP
    • Set 'Forwarding' To 'Disable'
    • Set 'IMAP Access' To 'Disable IMAP
    • Click 'Save Changes

    3.Accounts and Import
    This is a useful tool, it lets you login to multiple gmail accounts at once.
    Access two Gmail accounts at once in the same browser - Official Gmail Blog

    • Taking Steps To Prevent This.
    • Sign into your gmail account.
    • Click Settings at the top of the gmail page.
    • Navigate To 'Accounts and Import
    • Make sure no accounts are listed 'Grant access to your account:'
    • If any accounts are listed and you didn't list them 'Disallow Access'



    Tips


    • Always Check The URL before Logging in to Gmail
    • Avoid checking Emails at Public Places
    • Regularly Monitor Gmail Account Activity
    • Choose a Strong Password

    Avoid Phishing Scams



    We talked about Phishing scams here on TheEmoLab! Article Hacking-FaceBoook-Password-Method-Phishing we suggest you take a quick look there. So what are Phishing Scams? Phishing scams are non legitimate sites or clones of other sites, that claims to be the organization of the site and are response-able for more than 1-Million Hacked Accounts world wide. Phishing is a attempting to acquire sensitive information from sites such as FaceBook, gmail(Google), ymail(Yahoo), Myspace, etc. The term "Phishing" that derives from “fishing” that refers to the act of “fishing” users by means of increasingly sophisticated baits in order to obtain financial and password information. Those involved in this act are known as “phishers”.



    What does a Phishing scam look like?
    This Following image is what a scam will look like with social websites


    Phishing scams can come in a majority of styles, but hackers choose the most popular. some other forms of phishing scams can be sent to your email. Such as...

    1. verify your account
    2. ads that tell you have mail in your inbox
    3. others If you don't respond to this email your account will be suspended.
    Most people take action right away with-out first identifying and verifying the company. Watch the short video below to identify these sites.




    If any of you guys want to share your experience on this topic please share them in the comments.


    >>More Tips To Avoid Phishing Scams

    • Immediately after you identify that it's a fake delete it and report it as spam.
    • Avoid clicking the links and images in the email.
    • Check the from email address.
    • Check the url for "https://www.Facebook.com/" Not "http://www.FaceBook.t35.com".
    • Check for an addon for phishing blockers for your browser
      .

    Source For Almost Every Hack!

    About Me

    Powered by Blogger.

    Blog Archive

    About Us

    TheEmoLab - sponsored by IntenseNetwork

    Welcome to TheEmoLab, a blog which started in the technology field in May 2010, Here we are committed to focusing on post covering How To Guides, Cool and Useful Websites, Computer Tips, Hacking, Mobile, Social Networking, and other fields of interest. Launched in May 14, 2010 by Melvin Corney, we still consider our self a developing site, growing and expanding each and every day. Earning respect and reputation by different authors and readers.Read More>>

    Recommend us on Google!