Thursday 27 September 2012

How to DECRYPT PASSWORDS


Probably if you’re looking at this tutorial is because you don’t know how to decrypt passwords to download keylogger, rats, etc.
First there are many ways that the people crypt password, examples:
U-ASCII Encode, T-ASCII Encode, F-ASCII Encode, AER-256 Encrypt, ARMON-64 Encrypt, ATOM-128 Encrypt, BASE-64 Encrypt, ESAB-46 Encrypt, EZIP-64 Encrypt, FERON-74 Encrypt, GILA7 Encrypt, HAZZ-15 Encrypt, MEGAN-35 Encrypt, OKTO3 Encrypt, TIGO-3FX Encrypt, TRIPO-5 Encrypt, ZARA-128 Encrypt, ZONG22 Encrypt.
All these types of encryptions are found at crypo.com
Now let’s say the password is:
S0Q5WGZoS3FUbWhmS3kwZw==
And he says encrypted method [TRIPO-5 -> ATOM-128 -> BASE-64].
You need to copy the password as exactly as it is, cause if you miss a letter or number it won’t be the same password, and start decrypting it from backwards since it was encrypted this way [TRIPO-5 -> ATOM-128 -> BASE-64] you need to decrypt it this way [BASE-64->ATOM-128->TRIPO-5]. The result should be Tutorial , if it wasn’t Tutorial you made an error and try again following the steps I told you. If he says decryption method is [TRIPO-5 -> ATOM-128 -> BASE-64] you just decrypt it like it says.
When people say in their encryption method HEX you need to decrypt it with HEX TO ASCII an example:
The password is:
NTQgNzUgNzQgNmYgNzIgNjkgNjEgNmM=
Encryption method was [HEX -> BASE-64] you need to decrypt it this way [BASE-64 -> HEX TO ASCII ], The result should be Tutorial, if it wasn’t Tutorial you made an error and try again following the steps I told you. HEX TO ASCII decrypting method can be found Click Here
There are other ways of encryptions such as Backwards also called Reverser/(ed), this is found two at crypo.com, lets say another example:
The password is:
BbaMCzGFsRA4
Encryption method was [BACKWARDS -> FERON-74] you need to decrypt it this way [FERON-74 -> BACKWARDS ], The result should be Tutorial, if it wasn’t Tutorial you made an error and try again following the steps I told you.
I’ve seen people that have also tried to confuse people by adding to the encryption method NORMAL TEXT, in this case you don’t need to do anything an example:
The password is:
BbaMCzGFsRA4
Encryption method was [NORMAL TEXT -> BACKWARDS -> FERON-74] you need to decrypt it this way [FERON-74 -> BACKWARDS] only, they add NORMAL TEXT to confuse noobs but really you just skip that way. The result should be Tutorial, if it wasn’t Tutorial you made an error and try again following the steps I told you.
A lot of people are asking what to do for binary look here:
For binary you just decrypt it Binary to ACSII and for Hex you decrypt it Hex to ASCII too, in example:
Code:
30 31 30 31 30 31 30 30 20 30 31 31 31 30 31 30 31 20 30 31 31 31 30 31 30 30 20 30 31 31 30 31 31 31 31 20 30 31 31 31 30 30 31 30 20 30 31 31 30 31 30 30 31 20 30 31 31 30 30 30 30 31 20 30 31 31 30 31 31 30 30
Encryped method:[ Binary -> Hex ]
To decrypt copy the code and then at Yellowpipe.com you select first the option Hex to ACSII then you copy the result, and then select the option Binary to ASCII,
The answer should be Tutorial if it’s not try again.
All these method of encryptions are found at: CRYPO.COM
Other encryptions methods can be found at: YELLOWPIPE.COM.
After you have learned out of this tutorial how to decrypt a password you should know NEVER scan Rat’s, Keylogger’s, etc. At Virustotal only scan them at Novirusthanks.org and don’t forget to check the Do Not Distribute box.
♥♥Thank you♥♥

Mobile Defense- A Free Mobile Phone Tracking System [Android]




silvershieldIt’s one of the most sought after mobile phone applications of them all – the ability to silently track the location and condition of a mobile phone. Many people would like to track a phone that doesn’t have GPS, using just cellphone tower triangulation. This is possible when you install apps like Latitude on the target phone. The thing is, now that I’ve purchased an expensive Motorola Droid, if I ever lose this baby, I’d really like to know exactly where it is so that I can quickly find it.
I took a look at some of the offerings described earlier at MakeUseOf like Mobiwee, which Grant covered. That app was pretty close to what I wanted. I decided to poke around a little more before making a decision, and I’m glad I did.

The security solution that I’m going to focus on in this article is an application I discovered on the Android market while looking for one of the highest rated free mobile phone tracking systems available. Mobile Defense by Neevo, LLC is currently a beta app, easily recognizable on the market by being one of the few applications with five full stars on average from all users. Installation is fast and easy, with the plenty of customization options and a few features that simply blew my socks off.

Install A Free Mobile Phone Tracking System as Your Mobile LoJack Device

The cool thing about Mobile Defense is that you can install it and forget it. It acts like a little built-in safety feature that’s always there whenever you need it. Yes, it’ll tell you exactly where your phone is if someone steals it. However, in the much more likely scenario where you drop it somewhere, or you forget it someplace – all you have to do is fire up the Mobile Defense website, log into your account, establish a connection with your phone and you’ll immediately know where it is within just a few feet – along with a wide range of other active information about your phone, like battery power, what Wi-Fi network it’s connected to, and speed and direction. Like I said – it’s impressive.
mobile phone tracking system
When you first install Mobile Defense, this is the screen you’ll see. In order for the service to establish a connection with your phone, it sends your phone an SMS message in conjunction with your registration. Once you enter your number, the software will ask if you’re registered yet. If not, you can fill out the info right on your phone, or go to the website and do it there. Once you register, the Mobile Defense system will send a confirmation email to the email address you registered with. After you click the link in your email, the system sends the activation to your phone – that activation is reflected in the online status for your phone on your Mobile Defense account.
mobile phone tracking system
The moment your phone receives the activation signal, the Mobile Defense icon is no longer active – and the app starts running in the background and the icon no longer works (see pic below). For advanced users, you can install the application as a system app for true invisibility, however you need root access and the ability to understand and step through the configuration for system setup. Personally, I’m cool with taking my chances set up as a regular app that runs in the background.
mobile phone tracking system

Connect to Your Phone to Find It – No Matter Where It Is

Now that my phone has the software installed and running in the background, I was curious how well it would actually work. Testing this free mobile phone tracking system, I was sitting in my house with GPS turned off and on my Wi-Fi network – no cellular signal. In order to connect to the phone, the phone tracking system needs a data connection, either cellular or Wi-Fi. When you go to the Mobile Defense website and log in, right on your home page, you can select “Connect to Phone.”
mobile security software
The interesting thing is that as the system was trying to connect, I had the phone next to me on my coffee table. I read some of the reviews that said the app can’t enable GPS without root access. I installed the app without root access and as I watched, the GPS receiver started up automatically just fine, and within seconds the mobile phone tracking system had my exact location.
mobile security software
As though this isn’t enough information, you can click on “Details” and get even more. If your curious about how the phone tracking system is able to get such an exact location – don’t forget to check out Guy’s great article on GPS tracking technology.
free mobile security software
The potential for being able to access this level of information about the phone just blew my mind. It also made me decide that when my kids are old enough to have a mobile phone, this software is going to be running on it. Just imagine, you can connect at any time and know right away not only exactly where they are by Latitude and Longitude, but also how fast they’re driving, whether or not they’re using any data connection and what connection they’re using, and even how much battery power is left in their phone.
Now, you probably noticed in the mobile phone connection screen, next to “Details” there was an “Alert” link. When you click on that link, you’ll see the following screen.
track mobile phone
What this does is it allows you to make your phone start playing an alert sound, and it’ll flash the message you type on the screen. While it would be fun to scare a mobile phone thief, the sound alert feature is actually better for when you might have dropped your phone while you were running or biking, and need to find it in the bushes or if it’s hidden under the cushions of your couch! The last link labeled “Lock” lets you force the security pattern screen so that even if the thief has your phone, they’ll never be able to use it without the security pattern. This feature assumes, of course, that you’ve already enabled and configured the pattern (if you haven’t, you really should!) When I tested this feature, I immediately saw my security pattern screen, which locked out the phone.
track mobile phone
Even though I was only planning on installing and testing this application to write this article, I wasn’t sure if I really wanted to keep something running on my phone that could track me my every move. However, after seeing all of the features, and knowing deep down, based on my past history, that at some point I’m going to misplace or otherwise lose my phone – this software, running in the background, gives me the peace of mind and the security of knowing that no matter where my phone ends up, I’ll always be able to find it.

How To Speed Up A Slow Computer

First off in the bottom right hand corner of your computer if you see alot of icons start up there when you first start your computer then this is for you if you dont know already how to get rid of em.

Press your Start Button (bottom left) and go to "run"
now type in: msconfig
now you will get a box that pops up and will tell you bunch of stuff dont mess with anything else other than what I tell you otherwise you could do something really bad (possible) go to your "startup" tab on the top right of the screen where it usually is and click it.

Now you will have a closed in box with bunch of filenames n addresses and more boxes with checks in them. Now if your like me you dont want anything startin up when you start you computer up or while your even doing anything cause it slows you down. Now unless your like me right now 1 have 1 thing starting up when my computer starts up and thats my settin for my overclocked vid card. But other than that uncheck every box and then hit apply and ok. Then window you were jus in will now close and ask you if you want to restart or wait till later to restart.

Either way when you shut it off and then turn it back on the settins will kick in

5 Tricks For Maximizing Your Android Screen Space

No matter how tricked-out your Android layout is, you'll always find something new you want to do that takes one click too many to reach. Just as all projects go over budget, all your favorite apps and bookmarks are sure to spill over beyond your home screen. There's no one perfect solution for everyone, but there are a few habits and tools that can help keep your digital life close at hand.

Be ruthless. Clear your device of any applications you don't use, and clear your home screen of everything you don't either use every day (like Foursquare) or need to access instantly (like the QikCam photo widget). You shouldn't agonize over your choices--remember that you can always add apps or widgets back in if you miss them too much.

Organize. This is key. Just a few minutes of rearranging icons can save you time, energy, and frustration over the long term. You don't need to arrange everything alphabetically; just make sure that your screens make sense to you. Typically the home screen is best for frequently used apps, while other nearby screens are for apps you want to be able to access quickly (but don't need to access instantly). Having themed screens such as a media screen and a fitness screen often works well.


Use folders. If you don't mind two-click access, adding a folder or two to your home screen can add acres of virtual screen space. It's easy: just long-press the screen, select "Folders," and select a type, typically "New folder." To name the folder, open the folder by tapping it, then long-press the extra-boring default name ("Folder") and type in a new, memorable name. Organize these folders however you like, but it's best to keep each one down to 12 items for easiest access.

Rely on notifications and streams. Do you really need your e-mail or Gmail apps available on your home screen? Unless you're initiating new messages every day, the answer is probably no. In your account settings, just make sure that your apps check for e-mail frequently and deliver notifications to the top bar. This can also work well for Facebook and other services that deliver notifications in the top bar or can be accessed as streams on less valuable screen real estate.


Try SmartWidget or other app launchersSmartWidget is a useful, free app with a widget that takes up four slots on your screen, which seems like far too much until you learn its secret. It gives you access to the four most frequently used apps on your device--except those that are already on the home screen. This is a clever bit of wizardry that could save some time and effort for those of us who are constantly installing new apps. There are plenty of other app launchers out there, so find the one that works best for you.

Crossover Linux, Windows Application Seamlessly Integrated on Linux


CrossOver Linux allows you to install many popular Windows productivity applications, plugins and games in Linux, without needing a Microsoft Operating System license. CrossOver includes an easy to use, single click interface, which makes installing a Windows application simple and fast. Once installed, your application integrate seamlessly with your Gnome or KDE environment. Just click and run your application, exactly as you would in Windows, but with the full freedom of Linux.
CrossOver Linux lets you use many Windows plugins directly from your Linux browser. Plugins work on any x86 based Linux distribution and will integrate with most browsers including Firefox 1.x, Netscape 6.x, Konqueror, Mozilla, and Opera. CrossOver also integrates with Gnome and KDE to let you transparently open any Word, Excel or PowerPoint file. But even better, you can open these attachment types directly from any mail client.

One Application: Two Delicious Flavors!

We’ve created two versions of CrossOver Linux — Standard and Professional — to serve our home-user/enthusiast and corporate markets even better. CrossOver Linux Standard provides individual users with the ability to run a wide variety of Windows software cleanly and economically. CrossOver Linux Professional provides corporate users with the enhanced deployability and manageability features their environments demand.

How to Access Banned Websites


Surfing at school? Parents enabled website blocking? Stuck behind a strict firewall? There are lots of ways around the problem so that you can get to the sites you want to see without those cybernannies tying your hands…
phproxy is “dedicated to bringing you fast web browsing from behind web filters”. Simply tap in the URL of that banned site you really must see, it could be Facebook, MySpace, Youtube, or a renegade blogger behind enemy lines, and you will be able to access it with no problems. More seriously, the proxy allows you to visit a site anonymously because it is the proxy itself that is visiting the banned site not you, and so keeps your browsing hidden from prying eyes allowing you to protect your online identity.
Such a proxy also allows you to visit sites that have banned your IP. This might be a forum or just a website or blog from which you or other users on your IP range (whether on your school or company network or your ISP account) have been barred access. The proxy server is an open gateway between your web destination and you.

Other proxies exist, such as www.the-cloak.com (please make sure you include the hyphen in that URL or you will be in for a shock), and this page provides a shipload more.

More on an additional approach (Psiphon) here – http://en.wikipedia.org/wiki/Psiphon

Of course, we should add a disclaimer at this point, please don’t use proxies or anonymizers to break the law or to cause malice and please don’t abuse the service as they are usually free.

10 reasons why PCs crash U must Know


Fatal error: the system has become unstable or is busy,” it says. “Enter to return to Windows or press Control-Alt-Delete to restart your computer. If you do this you will lose any unsaved information in all open applications.”
You have just been struck by the Blue Screen of Death. Anyone who uses Mcft Windows will be familiar with this. What can you do? More importantly, how can you prevent it happening?
1 Hardware conflict
The number one reason why Windows crashes is hardware conflict. Each hardware device communicates to other devices through an interrupt request channel (IRQ). These are supposed to be unique for each device.
For example, a printer usually connects internally on IRQ 7. The keyboard usually uses IRQ 1 and the floppy disk drive IRQ 6. Each device will try to hog a single IRQ for itself.
If there are a lot of devices, or if they are not installed properly, two of them may end up sharing the same IRQ number. When the user tries to use both devices at the same time, a crash can happen. The way to check if your computer has a hardware conflict is through the following route:
* Start-Settings-Control Panel-System-Device Manager.
Often if a device has a problem a yellow ‘!’ appears next to its description in the Device Manager. Highlight Computer (in the Device Manager) and press Properties to see the IRQ numbers used by your computer. If the IRQ number appears twice, two devices may be using it.
Sometimes a device might share an IRQ with something described as ‘IRQ holder for PCI steering’. This can be ignored. The best way to fix this problem is to remove the problem device and reinstall it.
Sometimes you may have to find more recent drivers on the internet to make the device function properly. A good resource is www.driverguide.com. If the device is a soundcard, or a modem, it can often be fixed by moving it to a different slot on the motherboard (be careful about opening your computer, as you may void the warranty).
When working inside a computer you should switch it off, unplug the mains lead and touch an unpainted metal surface to discharge any static electricity.
To be fair to Mcft, the problem with IRQ numbers is not of its making. It is a legacy problem going back to the first PC designs using the IBM 8086 chip. Initially there were only eight IRQs. Today there are 16 IRQs in a PC. It is easy to run out of them. There are plans to increase the number of IRQs in future designs.
2 Bad Ram
Ram (random-access memory) problems might bring on the blue screen of death with a message saying Fatal Exception Error. A fatal error indicates a serious hardware problem. Sometimes it may mean a part is damaged and will need replacing.
But a fatal error caused by Ram might be caused by a mismatch of chips. For example, mixing 70-nanosecond (70ns) Ram with 60ns Ram will usually force the computer to run all the Ram at the slower speed. This will often crash the machine if the Ram is overworked.
One way around this problem is to enter the BIOS settings and increase the wait state of the Ram. This can make it more stable. Another way to troubleshoot a suspected Ram problem is to rearrange the Ram chips on the motherboard, or take some of them out. Then try to repeat the circumstances that caused the crash. When handling Ram try not to touch the gold connections, as they can be easily damaged.
Parity error messages also refer to Ram. Modern Ram chips are either parity (ECC) or non parity (non-ECC). It is best not to mix the two types, as this can be a cause of trouble.
EMM386 error messages refer to memory problems but may not be connected to bad Ram. This may be due to free memory problems often linked to old Dos-based programmes.
3 BIOS settings
Every motherboard is supplied with a range of chipset settings that are decided in the factory. A common way to access these settings is to press the F2 or delete button during the first few seconds of a boot-up.
Once inside the BIOS, great care should be taken. It is a good idea to write down on a piece of paper all the settings that appear on the screen. That way, if you change something and the computer becomes more unstable, you will know what settings to revert to.
A common BIOS error concerns the CAS latency. This refers to the Ram. Older EDO (extended data out) Ram has a CAS latency of 3. Newer SDRam has a CAS latency of 2. Setting the wrong figure can cause the Ram to lock up and freeze the computer’s display.
Mcft Windows is better at allocating IRQ numbers than any BIOS. If possible set the IRQ numbers to Auto in the BIOS. This will allow Windows to allocate the IRQ numbers (make sure the BIOS setting for Plug and Play OS is switched to ‘yes’ to allow Windows to do this.).
4 Hard disk drives
After a few weeks, the information on a hard disk drive starts to become piecemeal or fragmented. It is a good idea to defragment the hard disk every week or so, to prevent the disk from causing a screen freeze. Go to
* Start-Programs-Accessories-System Tools-Disk Defragmenter
This will start the procedure. You will be unable to write data to the hard drive (to save it) while the disk is defragmenting, so it is a good idea to schedule the procedure for a period of inactivity using the Task Scheduler.
The Task Scheduler should be one of the small icons on the bottom right of the Windows opening page (the desktop).
Some lockups and screen freezes caused by hard disk problems can be solved by reducing the read-ahead optimisation. This can be adjusted by going to
* Start-Settings-Control Panel-System Icon-Performance-File System-Hard Disk.
Hard disks will slow down and crash if they are too full. Do some housekeeping on your hard drive every few months and free some space on it. Open the Windows folder on the C drive and find the Temporary Internet Files folder. Deleting the contents (not the folder) can free a lot of space.
Empty the Recycle Bin every week to free more space. Hard disk drives should be scanned every week for errors or bad sectors. Go to
* Start-Programs-Accessories-System Tools-ScanDisk
Otherwise assign the Task Scheduler to perform this operation at night when the computer is not in use.
5 Fatal OE exceptions and VXD errors
Fatal OE exception errors and VXD errors are often caused by video card problems.
These can often be resolved easily by reducing the resolution of the video display. Go to
* Start-Settings-Control Panel-Display-Settings
Here you should slide the screen area bar to the left. Take a look at the colour settings on the left of that window. For most desktops, high colour 16-bit depth is adequate.
If the screen freezes or you experience system lockups it might be due to the video card. Make sure it does not have a hardware conflict. Go to
* Start-Settings-Control Panel-System-Device Manager
Here, select the + beside Display Adapter. A line of text describing your video card should appear. Select it (make it blue) and press properties. Then select Resources and select each line in the window. Look for a message that says No Conflicts.
If you have video card hardware conflict, you will see it here. Be careful at this point and make a note of everything you do in case you make things worse.
The way to resolve a hardware conflict is to uncheck the Use Automatic Settings box and hit the Change Settings button. You are searching for a setting that will display a No Conflicts message.
Another useful way to resolve video problems is to go to
* Start-Settings-Control Panel-System-Performance-Graphics
Here you should move the Hardware Acceleration slider to the left. As ever, the most common cause of problems relating to graphics cards is old or faulty drivers (a driver is a small piece of software used by a computer to communicate with a device).
Look up your video card’s manufacturer on the internet and search for the most recent drivers for it.
6 Viruses
Often the first sign of a virus infection is instability. Some viruses erase the boot sector of a hard drive, making it impossible to start. This is why it is a good idea to create a Windows start-up disk. Go to
* Start-Settings-Control Panel-Add/Remove Programs
Here, look for the Start Up Disk tab. Virus protection requires constant vigilance.
A virus scanner requires a list of virus signatures in order to be able to identify viruses. These signatures are stored in a DAT file. DAT files should be updated weekly from the website of your antivirus software manufacturer.
An excellent antivirus programme is McAfee VirusScan by Network Associates ( www.nai.com). Another is Norton AntiVirus 2000, made by Symantec ( www.symantec.com).
7 Printers
The action of sending a document to print creates a bigger file, often called a postscript file.
Printers have only a small amount of memory, called a buffer. This can be easily overloaded. Printing a document also uses a considerable amount of CPU power. This will also slow down the computer’s performance.
If the printer is trying to print unusual characters, these might not be recognised, and can crash the computer. Sometimes printers will not recover from a crash because of confusion in the buffer. A good way to clear the buffer is to unplug the printer for ten seconds. Booting up from a powerless state, also called a cold boot, will restore the printer’s default settings and you may be able to carry on.
8 Software
A common cause of computer crash is faulty or badly-installed software. Often the problem can be cured by uninstalling the software and then reinstalling it. Use Norton Uninstall or Uninstall Shield to remove an application from your system properly. This will also remove references to the programme in the System Registry and leaves the way clear for a completely fresh copy.
The System Registry can be corrupted by old references to obsolete software that you thought was uninstalled. Use Reg Cleaner by Jouni Vuorio to clean up the System Registry and remove obsolete entries. It works on Windows 95, Windows 98, Windows 98 SE (Second Edition), Windows Millennium Edition (ME), NT4 and Windows 2000.
Read the instructions and use it carefully so you don’t do permanent damage to the Registry. If the Registry is damaged you will have to reinstall your operating system. Reg Cleaner can be obtained from www.jv16.org
Often a Windows problem can be resolved by entering Safe Mode. This can be done during start-up. When you see the message “Starting Windows” press F4. This should take you into Safe Mode.
Safe Mode loads a minimum of drivers. It allows you to find and fix problems that prevent Windows from loading properly.
Sometimes installing Windows is difficult because of unsuitable BIOS settings. If you keep getting SUWIN error messages (Windows setup) during the Windows installation, then try entering the BIOS and disabling the CPU internal cache. Try to disable the Level 2 (L2) cache if that doesn’t work.
Remember to restore all the BIOS settings back to their former settings following installation.
9 Overheating
Central processing units (CPUs) are usually equipped with fans to keep them cool. If the fan fails or if the CPU gets old it may start to overheat and generate a particular kind of error called a kernel error. This is a common problem in chips that have been overclocked to operate at higher speeds than they are supposed to.
One remedy is to get a bigger better fan and install it on top of the CPU. Specialist cooling fans/heatsinks are available from www.computernerd.com or www.coolit.com
CPU problems can often be fixed by disabling the CPU internal cache in the BIOS. This will make the machine run more slowly, but it should also be more stable.
10 Power supply problems
With all the new construction going on around the country the steady supply of electricity has become disrupted. A power surge or spike can crash a computer as easily as a power cut.
If this has become a nuisance for you then consider buying a uninterrupted power supply (UPS). This will give you a clean power supply when there is electricity, and it will give you a few minutes to perform a controlled shutdown in case of a power cut.
It is a good investment if your data are critical, because a power cut will cause any unsaved data to be lost.

Saturday 22 September 2012

How to protect yourself against phishing ?


1. What is phishing?
  • Phishing is the method of stealing login info(usernames and passwords) by directing the slave to a clone(fake) login page, that logs the login info without the knowledge of the slave.
  • Such clone website is known as a phisher.
2. How to protect yourself against phishing?
  • Use your login info in the correct places only.
    Don’t ever put your login info anywhere else than the page you registered to, unless it’s a trusted service you know(such as youtube or blogger asking for your google account’s info).
  • Make sure the website you’re logging in isn’t fake.
    Whenever you login to a website, if you didn’t type the URL(address) of the website yourself, i.e. if you clicked a link that led you to the login page(from message, website, search engine results), always check the url(address) to see if you’re in the right place.
    For instance, if you’re logging in your facebook account, make sure the url appears as http://www.facebook.com/…
    Where a phisher page would look like http://www.facebook.freewebs.com/…or http://www.facebook.spam.com/… or any url whose part before the .com isn’t exactly the same as the page you want to login to.
  • Make sure the links you’re clicking aren’t fake.
    Whenever you’re clicking a link, check where the link goes before clicking it. Links can be masked to appear as something else than the page they’re leading to. For example, www.google.com leads to yahoo instead of google. Fortunately, in most browsers, whenever you point your mouse cursor over the link, the true location of the link is displayed on the bottom left part of the screen. Try it with the above link.
    This is particularly important because it can protect you from another, rarer but more dangerous method called cookie stealing, which is basically automatically stealing your account if you’re previously logged in the website.
  • Know that links to phishing pages are usually spread via email, and often represent impersonating trusted services and persons, such as making the email appear as it’s sent from the website you’ve registered to, or a friend of yours whose account has been compromised.
3. What to do if you have spotted a phisher?