Learn all "5 Hack Facebook Methods - Download Free
Hacking Tools, Algorithms, Tips/Tricks" Top 10 Passwords used by 60%
Facebook Users. Free Hacking Protection Guide
Hack Facebook for Free
There are so many software that aim
to hack of fb passwords online. These function differently, and it is important
that you understand the process so you can make the necessary actions that will
ultimately keep you safe and protected. Learning about these software also
gives you an idea how passwords are created, distributed and stored. The most popular free software facebook hacking tools
are - Hydra, Ophcrack, Dsniff, Rainbow Crack and John the Ripper. We
Provide their particular descriptions and mode of operation with Free Download
Link (No Credit Card Required). Many of them are available in both Windows and
Linux version along with 32 and 64 bit support.
Disclaimer :- Users are advised
to use these software responsibly. The main intention to share this
information is to create awareness about various hacking methods so
that Facebook users can protect them-self from Hacking.
Hydra
Hydra was
developed by a group called THC or The Hacker's Choice. It is a software
project that invests in dictionary attack to check for simple and weak
passwords on a single or more remote hosts that function on different services.
This was made as a proof-of-concept utility to show the convenience of hacking
simple and poorly selected passwords. The project also supports different
protocols and services, such as Firebird, AFP, HTTP, HTTPS, MS-SQL, RSH,
RLOGIN, SNMP, POP3, IMAP, Cisco auth, Cisco AAA, SMBNT and HTTP-PROXY among
others. THC ceased production of the software in 2007 in accordance with German
laws that prohibit the availability of hacking instruments to the public.
Ophcrack
cracks Windows passwords through LM hashes via rainbow tables. This is a free
open source software which is GPL licensed that also includes that importation
of hashes from different formats, including direct dumping from Windows SAM
files. On several coputers, Ophcrack can crack several passwords in just a few
minutes. Alphanumeric passwords via rainbow tables are given freely by
developers. Ophcrack is usually grouped with tables that let it hack passwords
that are no longer than 14 characters long. This is available for download in 2
Windows XP tables. Ophcrack can crack NTLM hashes.
Dsniff
Dsniff is a
password sniffer created by Dug Song. It is a package of utilities that include
code to parse several application protocols and acquire a variety of information.
Dsniff is a set of traffic analysis tools designed for many testings. It can
also crush the regular behavior of switched networks and trigger network
traffic from other hosts belonging to the same network segment to be visible.
It focuses on HTTP, POP, LDAP, Rlogin, NFS, Citrix ICA, NAI Sniffer, Microsoft
SQL protocols, OSPF, RIP, Telnet and FTP among others.
Rainbow
Crack
Download it free from here rainbowcrack-1.5-win32.zip rainbowcrack-1.5-win64.zip rainbowcrack-1.5-linux32.zip rainbowcrack-1.5-linux64.zip
RainbowCrack
is a computer software that produces rainbow tables that can be utilized in
password cracking. It is different from other brute force crackers because it
utilizes big pre-computed tables known as rainbow tables that minimize the
duration required to crack the password. The program was created by Zhu
Shuanglei and uses an ehnaced time-memory trade-off cryptanalysis attack that
started in Ophcrack. The purpose is to create rainbow tables and not to crack
passwords individually.
John the
Ripper
Download it
free from here
This is a
free software that cracks passwords. It runs on 15 platforms and was first developed
for the UNIX OS. It combines different password crackers into a single package
and autodetects hash types. It also includes a customizable cracker. It can run
against different encrypted password formats like crypt password hash types
found in many flavors.
Precomputation
and salting are two methods commonly used by hackers to hack facebook
by get into your system to try and manipulate, as well as acquire personal
data. You should know more about the processes and find out how these work so
you can stay safe and make use of the necessary precautions to keep everything
secure for a long period of time. Knowing the method and understanding how it
works will keep hackers at bay and your system safe.
Precomputation
Password cracking is also
known as precomputation, which is the method of recovering passwords from
information that has been saved or transmitted via a computer system. A very
common method includes repetitively trying to guess the password. Hackers will
make use of things that are related to you, such as your address, birth date or
second name. The goal of the password cracking will help the user recover a
lost or forgotten password, so that you can get unauthorized access to the
system or for system administrators to verify for passwords that might easily
be acquired and cracked. Even though putting a wholly different password is not
a security risk, you still get system administration privileges. Password
cracking is used to gain access to digital evidence in court cases.
Preventing
Precomputation
The ideal
method for preventing the cracking of password is to make sure that hackers do
not access the encrypted password. For instance, encrypted passwords on the
Unix operating system were first stored in a publicly accessible file. On newer
systems, these are stored within the file, and are accessible only to programs
that have enhanced privileges. However, several network protocols deliver
passwords in cleartext or still use weak response and challenge schemes. You
can stay protected by changing your password every now and then.
About
Salting
Salt is made up of random bits used as one of the many inputs to a key derivation function. The other input is usually a pass phrase or password in cryptography. The output of the key derivation
function is saved as the password's encrypted version. The salt can also become a part of a key in a cipher or another algorithm. The function usually uses a hash function. Other times, a value generated earlier, called the initialization vector, is also used as the salt. Salt information tends to complicate the dictionary attacks that invest in pre-encryption of dictionary entries, wherein every bit of salt used will double the amount of computation and saving required. The salt value should be kept secret for security purposes. A number of protocols let the salt transmit as cleartext, together with the number of iterations used in producing the key to strengthen it.
Salt is made up of random bits used as one of the many inputs to a key derivation function. The other input is usually a pass phrase or password in cryptography. The output of the key derivation
function is saved as the password's encrypted version. The salt can also become a part of a key in a cipher or another algorithm. The function usually uses a hash function. Other times, a value generated earlier, called the initialization vector, is also used as the salt. Salt information tends to complicate the dictionary attacks that invest in pre-encryption of dictionary entries, wherein every bit of salt used will double the amount of computation and saving required. The salt value should be kept secret for security purposes. A number of protocols let the salt transmit as cleartext, together with the number of iterations used in producing the key to strengthen it.
More on
Salting
Salt can
also keep you protected from rainbow tables, which will extend the complexity
and length of the password. If the rainbow tables do not get passwords that
suit the length and complexity of the salted password, the password will stay
secret. Once discovered, you will have to eliminate the salt from the password,
before usage.
Your
password can be the very thing that allows hackers and other unscrupulous individuals
into your system. It is important that you understand some of the complex
algorithms to see how these work, just so you can make the necessary
precautions and ensure that your facebook account and personal data stay safe
for long. You should determine which one is most commonly used in your area,
and try to invest in programs and methods that counter it.
Rule of
Thumb for Facebook
Generally,
if you pick a very easy password to remember, it will most likely be easier for
the hacker to guess. Guessing or brute force attack will easily let the hacker
into your computer, so the rule of thumb is to make passwords quite difficult
to decipher. However, you should also refrain from choosing passwords that are
very hard to remember, since these can minimize the safety of your computer and
system. Users will need to electronically store the password or write it down
for later use. Users might also have to use password resets all the time, if
they forget and users will also re-use the password time and again. Users tend
to subvert the system, by using very strict password strength requirements,
such as mixing upper and lowercase letters, including digits and using words
that are not readable.
Simple
Password Transmission
Passwords
are very prone to snooping or interception, while these are transmitted into
the authenticating person or system. Once the password is brought as an
electrical signal on an unsecured physical wiring between the central system
that controls the database and the user access point, wiretapping can easily
give out the facebook password. Any person who can watch the packets
that have the logon data can easily snoop around without being caught.
Email is
usually sent as cleartext, which makes it very easy to deliver to just any
person curious enough to find out more. The email will be saved in 2 computers
as cleartext, the recipient's and the sender's. Once it goes through
intermediate systems during delivery, it will most likely be saved in one of the
systems temporarily. Emailed passwords is a very unsafe way to distribute.
Via
Encrypted Channels
If you use
cryptographic protection, you reduce the snooping of passwords. The TLS or
Transport Layer Security feature made into several internet browsers will let
the user know of a SSL or TLS secure exchange with a serve by showing a closed
lock image. There are also hash-based challenge-response methods. This requires
the user to prove to the serve that the shared secret or password is already
known. The stored form is then acquired by the server.
On
Authentication
Remote
authentication is also done by several systems. The attacker usually needs only
the hash, instead of the original password so he can authenticate from a remote
source. Zero-knowledge password proof can also be done, wherein knowledge of
the password is proven without having to present it. There are also augmented
systems like SRP-6 and AMP which can get rid of the limitation of hash-based
methods. The hashed and unhashed password is used in this operation.
Your email account is one of the most common platforms where unscrupulous individuals can take advantage and try to get into your personal data and financial status. Facebook is another medium that has a lot of hackers lurking at different corners, considering that there are more than 500 million registered users worldwide. You have to consider the past incidences and try to find more ways to get ahead so you stay safe and secure for long.
Sending You
Emails
There are
several companies that send you mail and make it seem like it's originating
from Facebook to gain more credibility. However, you should be aware that most
of these are only after your password, so they can hack into your account and
manipulate your online activities. You might be wooed by lucrative and
seemingly unbelievable offers, but be wary of these because you might be
changing your password for the worse. For example, AT&T has been used by
hackers to get into the emails of different registered users. The email will
inform clients that they have to change and verify their password for security
purposes. In reality, the hackers are only waiting for users to change into the
new password so they can acquire this easily, thus easily getting into the
user's email account and other sites where he is registered online.
Another
Incident
There was
also another incident wherein an employee of the Texas Power Company hacked
into the system. The hacker logged into the VPN and sent emails to members of
the engineering group that mans the nuclear reactor. The hacker was posing
questions regarding the safety of the reactor, should the load be increased to
the maximum. The energy forecast system of the company had to be closed down
for a day, resulting to about $26,000 in losses.
Blackmails
You should
also be wary of emails that seem to blackmail or force you to change items in
your account. Usually, a pop-up window will appear and ask you to click on it
so you can log on to Facebook or another landing page where you can change your
password. The hacker created this window and page so he can view what you typed
in. The blackmail usually comes in the form of a message indicating that you
will lose your profile on Facebook or some data will be revealed to the general
public if you do not comply.
The Facebook
Password Change
This email
attack has forced millions of people worldwide to comply and change their
password. Some realized that information has been changed on their accounts,
while others simply can no longer log into their account. Others report having
their profiles used to sell or represent items they have no idea about.
Identity theft is usually the result of the stolen passwords. Make sure you
verify the source first and that it truly comes from Facebook, since a lot of
hackers bank on the popularity of the website to gain people's trust online to Hack Facebook.
People take
passwords for granted which might explain why too many also have their
identities and other personal information stolen through the internet. You
should be careful when picking passwords. Follow the right guidelines and make
sure that you only visit websites that are reliable and also invest in their
own security system and protection.
The Weak
Point
Hackers will
always try to find a weak point in the system to try and get through and
retrieve your password. Once the system uses a poorly made password scheme in
protecting stored passwords, the hacker can use the weak point and get even
well-chosen ones. Microsoft Windows divides the characters of the password into
two so that these are hashed separately. Thus, the hacker has to attack each
one separately, which will require more time and effort, compared to just
attacking a single password.
Making Your
Facebook Password
People make
the mistake of choosing passwords that are very obvious and easy to decipher.
You might realize that you can spend months or weeks choosing the right name
for your baby or your pet, but do not think twice when picking the right
password. You have to understand that passwords should almost never relate to
you. You have to also follow directions and suggestions by websites on how to
write your password. Some of the best passwords are no less than 12 to 15
characters in length, use a combination of letters and numbers, use a
combination of upper and lower case letters and use words that may not be
readable or understandable.
Guessing by
Hackers for How to Hack Facebook ?
Guessing
involves linguistically deriving words until hackers get into the system.
Dictionary attack is the most common and describes all attacks. Examples of
passwords that can be guessed include not using any or just putting blank,
using the words "admin" or "password", using the numbers
"123" or "12345" and using "qwerty or asdf". You
should never use your log in or user name. You should also refrain from using
your middle or last name. Avoid using words or terms that relate to you, such
as the name of your favorite pet or mother, your place of birth or your car
license plate. Also, do not reverse the letters of your name or use your
initials. Hackers can easily guess these.
Below is the Top 10 list of most commonly used facebook passwords:
1. password
2. 123456
3. qwerty
4. abc123
5. letmein
6. monkey
7. myspace 1
8. password 1
9. blink182
10. (your first name)
The Best Way to
avoid being a target or identity theft, you should keep the hacker from
reaching even your encrypted password. Encrypted passwords used to be saved in
an accessible file. Now, these are kept within the file and can only be
accessed by programs that have improved privileges. This will be very difficult
for unscrupulous individuals to get during the initial stages. New Unix systems
have changed traditional DES-based hashing of passwords with enhanced methods
founded on Blowfish and MD5.
Other methods include changing your password every now and
then. You can stay protected from brute forcing, wherein the hacker tries to get
into your system within one shift. It is advisable that you change password
every week or month.
Below is a quick stats to proof potential risk involved by using simple passwords.
Below is a quick stats to proof potential risk involved by using simple passwords.
How do you protect your account from
hackers?
An unauthorized person who has
access to your account can wreak havoc, even if it is just a social networking
site like Facebook. For that you need to have a strong password, because a weak
password can act as a key for hackers to hack their way into your account.
To secure your password:
- Avoid using
words, digits or names that are directly connected with you.
- Avoid
default passwords, and change the given passwords as soon as you activate an
account.
- Have lengthy
passwords.
- Avoid using
alphabets or numbers in a sequence.
- Mix the
upper and lower cases in your password, to make it complicated, taking care to
remember your capitals.
- Adding
symbols can further secure your password.
Thus by providing maximum strength
to your passwords, you can protect your Facebook and other personal as well as
business accounts. Remember, safety should always be your first pre-requisite.
People using Zip to compress their files beside compression
they are trying to lock their important data with password(s).
Now let suppose if you do this same thing with your important
files and now you have forgotten password, now what to do now its time to crack
it.
This article will teach you how to crack the password of Zip
files.
For this purpose we will use Linux based operating system and
a tool FCrackZip for this purpose, FCrackZip is a fast and free-ware tool and
it is easy to use Zip cracker tool it is similar to fzc and zipcrack. It has
been written in assembler and it uses brute force
and dictionary
based attack to crack or find-out the passwords.
By using a
simple Linux terminal and command you can easily crack the Zip password, you
can download FCrackZip from your software manager.
Use this
command to get FCrackZip from terminal
$
sudo apt-get install fcrackzip
After
installing this
you have options to attack on your zip file, either choose brute force attack or dictionary attack.
Here is the
simple usage example.
$
fcrackzip -v -b -p aaaaaa -u your_zip_file.zip
By looking the
above picture you can easily see the brute force attack against a zip file that
is password protected, it took around 30 minutes to find the password for this
zip.
A virus is malicious software or a malicious program which hides in other program and execute when you open this program. A virus is inactive until you execute an infected program. If you want to know more about viruses or if you want to create your own virus than click here.
Technology has
been changed and changing rapidly, different viruses has an ability to destroy
your anti-virus software so in this case a online virus scanner probably a good
choice to use.
Here are the
list of some more common anti-virus software vendors online scanner web link.
If your anti-virus do not work properly or if you have any doubt that your
computer has been infected by a virus so scan your computer online.
BitDefender
Bitdefender
is going to be a popular anti-virus solution, BitDefender Online Scanner is an on-demand antivirus and
antispyware tool that lets you see just how safe your PC is for yourself. It
detects and remove any virus and spyware on your computer online. Click here to scan.
Kaspersky
Kaspersky
is one of our favorite online virus scanner tool, it detect the virus and
spyware using the same method as in the fully-functional anti-virus solution
provides.It allows malware detection and to compare your result with the
malware database for effective result. Click here to scan.
Panda Active Scan
Panda
ActiveScan is Panda Software’s online antivirus, that works directly over the
Internet. With a simple click from your browser you can scan all your files and
e-mail for viruses. Click here to scan.
ESET
Online Scanner
ESET Online
Scanner is a user friendly, free and powerful tool which you can use to remove
malware from any PC utilizing only your web browser without having to install
anti-virus software. ESET Online Scanner uses the same ThreatSense® technology
and signatures as ESET Smart Security/ESET NOD32 Antivirus, and is always
up-to-date. Click here to scan.
OneCare Online Scanner
Windows Live OneCare safety scanner is a free service
designed to help ensure the health of your PC. Click
here to scan.
There are
different computer tips and tricks available to impress anyone, If you are
looking for some tips and tricks than read this article.
Lock A Folder In XP Without Any Software
- For doing create a folder in C drive, suppose folder name is xyz.
- Now open command prompt from start menu.
- Now in command prompt type "attrib +s +h C:\xyz" without quotes and press enter.
- This command will make your folder invisible and it will never seen by anyone even in the hidden file and folder.
- If you want to make it visible again type "attrib -s -h C:\xyz"
- By doing this you can lock any folder of your choice.
Hide
Your Drive
This is a small but cool trick to hide
your drive/partition of your choice, if you have a personal data in on a
partition and you dont want any other to see this data than you can hide this
partition in on XP,Vista,7 and 2000 too.
- Open registry editor by going on start than run and type regedit.
- Find this
HKEY_CURRENT_USER\Software\Mcft\Windows\CurrentVersion\Policies - Click on explorer
- Click on "nodrives" key on the right column.
- You will see something like this "0000 00 00 00 00"
- After the four set of zero ("0000") you have to write your partition name
- The first column is for drives A-H, the second for I-P, the third for Q-X, and the fourth for Y-Z.
- The value(s) of drive as follow:
- 1 - A I Q Y
2 - B J R Z
4 - C K S
8 - D L T
16 - E M U
32 - F N V
64 - G O W
80 - H P X - So, let's say you want to hide drive D. In the first column you would put "08"
Make
An Invisible Folder
- Create a folder when you have to enter the name of the folder.
- Press ALT + 0160 if you do this exactly than your folder has no name.
- Right click on the folder > properties > Change Icon .go through the list of icons and then you'll see an invisible icon choose it and then click OK.
- Now your folder will be invisible and it can see only when you select it.
Note: If you enjoyed this post, you might
want to subscribe our RSS feed and Email Subscription or become our Facebook
fan! You will get all the latest updates at both the places.
Remote
Administration tools also known as RAT are windows Trojans or in simple terms
programs used by a Hacker to get administrative privileges on the victim’s
computer. Using a RAT you can do a lot of cool things such as “Upload, delete
or modify data” , “Edit registry”, “Capture victim’s screen shot”, “Take
control of victim’s Computer”or “Execute a virus” just with a click of a
button.
Throughout
this article I will teach you how to use Lost Door, a Windows RAT, to control
and monitor a victim’s computer remotely.
Disclaimer: Coder and related sites are not
responsible for any abuse done using this software.
Follow the
steps below to setup a server for Lost Door.
- Download Lost Door from here . (Update: In case the given download link doesn’t work, use this secondary download link. The password to unzip this file is “ehacking.nethungry-hacker.com” without double quotes.)
- On executing the download file, you will see the following screen. Accept it
- After it is open, right click on the window and click on create server
- Now enter your IP address and DNS here. Leave the rest of the field as it is.
- Now click on the ‘Options’ tab and choose the options as you want. To activate an offline keylogger is a good practice.
- Now go to ‘Advanced’ Tab. There will options related to spreading. This will be used in case you have more than 1 victim.
- Now just go to the ‘Create’ tab and click on create server. Your server is ready for use now and now send it to the victim.
Sending the
server file to your victim
This is the most important thing
after you have created your server file. If you want to take control on a
single computer than you have to send this server file to the desired victim
but if you want to affect more and more people than you have to use some
spreading techniques.
- If you have physical access to the victim’s computer then take the server file in a pen drive and just double click on your server file once you have injected the pen drive into that computer.
- For those who don’t have physical access can use social engineering in order to get the victim execute that file on his computer.
Using
Spreading to affect multiple victims
If you have more than one victim, then
you have an option of using spreading technique. You might think that by
creating multiple server files you can control multiple users. But here is a
secret about spreading. When you select the spreading option, the server file
will act as a worm which will spread itself across different computers via
Email or any other channel. So your burden will be only to get one victim to
execute that file on his computer, the remaining job of getting other victims
will be done on its own.
Hello
Friends,
The
popularity of Twitter has increased tremendously in past few years. As a result
a lot of Twitter Desktop applications are available to the users for download
these days. These applications allow you to receive and post Tweets from your
desktop without visiting your Twitter.com page. To reduce your burden of
finding the appropriate app for you from such a big pool of apps, we have
compiled a list of Best Twitter Desktop apps available in the market. Earlier
I had compiled a list of 20 Best Twitter Desktop Apps for
Windows. Today I give you 9 Best Twitter Apps for Mac.
1. EventBox
This just-for-Mac app is a favorite of many because it
supports Twitter, Facebook, Flickr integration, feed reading with Google Reader
and internet trend watching with Reddit and Digg . Keyboard shortcuts, hotkeys, Instapaper integration, and photo uploads to
Flickr and Facebook make EventBox pretty nifty. It’s also got a very slick
interface with a navigation menu on the left-hand side.
2. Mac Lounge
This app is incredibly
appealing for its dead simple, single column interface and respectable feature
set. We, of course, love the multiple account support, but also appreciate
saved searches, quick access to view followers and following, and tweet options
to link to tweet, copy tweet, or copy tweet URL. There’s also an accompanying iPhone app, which syncs with the desktop version and greatly improves the app’s
relevance.
3. Nambu
This really sophisticated Mac app
should be more than enough for any and all of your Twitter needs. You’ve got
access to your followers and friends, custom groups, search (integrated with
FriendFeed and One Riot), trends, tr.im and pic.im
integration, multiple accounts, Ping .fm integration, filters, and three view options
for a one or many column view of tweets.
4. Sideline:
Sideline is just a search
and trending topic app from Yahoo, but it does a darn good job at satisfying
those specific needs. You can view current Twitter trends, select to see the
three latest tweets or pop out as its own saved search, and create custom
search groups as tabs.
5. Skimmer:
It’s hard not to love this app. Not
only is it beautiful to look at it, but it also tracks your favorite social
sites. Skimmer’s certainly not an application for the
social media beginner, but power users of Facebook, Flickr, YouTube, Blogger,
and Twitter, will appreciate the aggregation of content, filtering options,
view types, and enhanced content viewing experience.
6. Tweetie
A full-featured Twitter client which
is available in free ad supported and ad-free versions. This Desktop app lets
you view not only the tweets but also the entire conversation history leading
to that tweet. It provides you with an independent compose windows that stay
out of your way until you need them. Tweetie for Mac also has search trends to let
you find out the hottest trend in Twitter. Other features include threaded DMs,
user details, torn off search, bookmarklet, and preferences.
7. Twibble Desktop
Twibble is a bit of a riddle. It’s not a bad app
when it comes to feature set, but it’s also not the most intuitive. You can
manage multiple accounts, but all tweets are merged together in one stream. You
can reply, DM, fav, RT, and copy tweets, but you’ll have to hover over the
tweet to even know those behaviors are possible. You can also use keyboard
shortcuts, filter your tweets for keywords, or conduct searches that open up in
new windows, but Twibble just doesn’t seem to flow as easily as we’d like it
to.
8. Twitterific
Lets you both read and publish posts
or “tweets” using a clean and concise user interface designed to take up a
minimum of real estate on your Mac’s desktop. The app shows a scrolling list of
the latest tweets from your friends, or public feeds. Its features include
multiple Twitter account support, auto refreshing, inline display of replies
and DMs, shows no. of unread tweets, quickly delete tweets, auto show/hide new
tweets, single click access to user pages and more.
9.
TwitterPod:
This app isn’t known for its
sophistication or advanced Twitter functionality. TwitterPod is a basic
single column Twitter app with an inline browser and the ability to filter for
just tweets with links. Its heyday has long since passed, but original fan boys
and girls may still be using this for their twittering.
Facebook, the biggest social network with 500 million users, provides an interface to hit an unsuspecting crowd with malware and viruses. These viruses aren’t very difficult to detect if you are cautious enough. These Facebook viruses appear on your wall in forms of a bizarre or eye-catching stories and videos and once the user has clicked/liked the link, it is already late. The next step will be getting rid of your Facebook virus which is a time-consuming process. Its better to avoid spam messages and trojan viruses in the first place.
How to avoid
it?
1. Think before you Act. Viruses on Facebook are sneaky.
The hackers and cybercriminals who want your information know that Facebook
users will often click on an interesting post without a moment’s thought. If a
post sounds a bit over-the-top like a headline out of a tabloid, this is your
first warning sign.
2. Try to avoid Links and videos
with Catchy words like “funniest ever,” “most hilarious video on Facebook,” or
“you’ve got to see this.” Do some keyword research to see if the post in question
comes up in a search engine with information about a current
virus or trojan.
3. Check the poster of the Suspicious
content. If you
receive a message from someone you do not know, this is an obvious red flag.
Facebook video viruses also tend to pop up in your news feed or on your wall
from friends you haven’t talked to in a while. Unfortunately, it’s likely this
friend has already fallen victim to the latest virus on Facebook. After
clicking on the story themselves, the message was sent out to all of their
friends as well.
4 Avoid messages that have been
posted by multiple users as the virus spreads among your friends who were not so
cautious. If a link with title such as “Sexiest video ever” shows up all over
your feed from all kinds of people (perhaps friends you would not expect to
make such a post), this is another warning sign. Similar direct messages are a
likely variant of the notorious Facebook Koobface virus which has used this
approach in the past.
5. Do not fall for the “typical”
money-transfer schemes. Chat messages from friends needing funds will usually sound
suspicious. Everything can’t be screened before posting, so money transfer
scams and hoax applications still find their way on to
Facebook. You should also avoid applications that claim to do a full “Error
check” or fix security problems related to your profile.
6. Update your anti-virus software
frequently. If you do accidentally click on a post before realizing it
is a hoax, do not click on any further links or downloads. If it’s too late and
you have already been infected, the Facebook virus removal process may be
effortless if you have a good anti-virus program to catch the virus, trojan or
other malware early on.
What’s Next?
These were few important tips to
safeguard your facebook account but your job isn’t done yet. Once you have
detected that the link/post on your facebook wall is Malicious you should Mark
it as SPAM so that the facebook support will stop it from spreading further and
infecting other users.
If you have ever fallen victim of
any such Malicious Scheme, please share your experience with all the users in
form of comments so that others don’t fall victim of it.
No comments:
Post a Comment