­

Tuesday, 8 November 2016

How to recorgnize CHINA ANDRIOD PHONES(cloned phones)

Identifying original phones in is really a hard nut to crack for most people expecially in a chineese phone market like Nigeria
Although for some people who have been using andriod phones for a long time it quite easir identifying fake, cloned or what you popularly call CHINA PHONES in nigeria

Without wasting much of your time i will be given you the secrets of how to know if the phone you are holding can be trusted

The first original andriod manufacturers were the US developer's
Qualcom and
Snapdragon chipsets but later on the main developers of the andriod OS google gave out license to many other companies like
SPD(speadtrum) and the popular
MTK(mediatek) which is the popular chipsets maker,
The following phones are made by the mtk manufacturing company
TECHNO
INFINIX
GIONEE
INNJOO
ITEL
ELEPHONE
JIAYU
OPPSON
THL
PIPO
OPPO
CHUWI
YUSUN
But the mtk don't manufacture phones like
Samsung
Motorolla
Htc
And so on you might have bought or have seen a cloned Samsung phone the phone looks like a real samsung with an andriod OS but you notice there is just something strange about this phone merely looking at the packaging you should know if you are familier with real samsung phones

Now here are how to identify a real andriod phone
Firstly one of the fastest way to identify a real phone is through the camera and flash light,
Now this is the fastest and not the easiest expecially if you are not famillier with real phones
NOTE.
The so called china or cloned phone don't usually have a bright flash light or touch light by merely looking at their touch light you can identify if your samsung ,htc or which ever phone is a real one

Another way you can detect cloned phones from other manufacturer that mimicking original manufacturers like LG, Motorolla e.t.c can easily be detected using the following method

Step (1)
Using the andriod phone in question just open your andriod playstore app

Step (2)
Search and download the app called CPU-Z its a free app

=>while on the open app, you will see about 5 menu buttons at the top;  which are
AOC (System on Chips), System, Battery, Sensors and About menus.

Nevigate to the system menu
The models for MTK devices always start with  Mt frefix, while that of Spreadtrum often start with SPD or SC.YOu can use this app to detect other models and chipsets of any android device.

NOTE.
For those cloned Samsung devices, when you use this app and find out that the chipsets are  MTK, it should tell you that it is not from signed Samsung original products, as Samsung have their self-manufactured chipset as in the exynosand .

Hope you find this helpfull please drop your comments and share with friends

Wednesday, 28 September 2016

10 Ways to protect your facebook account from being hacked

(1)  DNS spoofing
This is a malicious cache poisoning where forged data is placed in the cache of the name servers. Spoofing attacks
can cause serious security problems for DNS servers vulnerable to such attacks,
In order to prevent many sources of Internet attacks, it is necessary to have the security built into DNS systems. To minimize the risk of a spoofing attack, every organization or individual responsible for a domain should first check which type of name server they are using and consult with its developer whether it is secure against DNS spoofing or not.

(2) Session Hijacking
Sessions highjacking alludes to the misuse of a substantial PC session, likewise called a session key, this helps hackers to gain unauthorised access to data or administrations in a PC framework.  HTTP cookies which are used to keep up a session on numerous sites can be effortlessly stolen by hackers who are using a mediator PC or with access to the spared treats on the casualty's PC
You can be easily exposed to session hacking which is also known as cokies hacking expecially when you are accessing Facebook or which ever site on a http connection. In Session Hijacking attack, a hacker steals the victims browser cookie which is used to authenticate the user on a website, and use it to access the victims account.
Session hijacking is usually used on LAN, and WiFi connections.
The popular method is using source-routed IP packets.
Note that HTTP protocol versions 0.8 and 0.9 does not have cookies and other important features necessary for session hijacking. Version 0.9beta of Mosaic Netscape, which was released on October 13, 1994, supported
cookies so this version will favour an attacker who's into session hijacking.
In conclusion:
(1) always try to use a secured connection instead of http while browsing
(2) be careful in clicking sites you see on Facebook or other platforms because some hackers can easily trick you in order to gain access to cokies store on your browser here is how it works
1. The attacker creates a PHP script and uploades it
to a webhosting site.
2. The attacker then asks or trick the victim to visit that
particular link containing the PHP code.
3. Once the victim visits it his/her authentication
cookie is saved in a .txt file.
Then afterwards you'll discover that your account have been hacked later on.

(3) Stealer's
Almost 80% percent people use stored passwords in their
browser to access the Facebook. This is quite convenient, but
can sometimes be extremely dangerous. Stealer's are
software's specially designed to capture the saved passwords
stored in the victims Internet browser.

(4)  Mobile spy apps
Millions of Facebook users access Facebook through their
mobile phones. In case the hacker can gain access to the
victims mobile phone then he can probably gain access to
his/her Facebook account. Their are a lots of Mobile Spying software's used to monitor a Cellphone. The most popular Mobile Phone Spying software's are: Mobile Spy, and Spy Phone Gold,Flexy spy, track my phone, easy spy, auto forward e.t.c
In other to not to fall victim
1. Always install a good antivirus in your mobile phone.
2. Never install unknown apps in your phone.
3. Always check your phone for suspicous apps

(5)  Phishing
Phishing is way by which hackers try to obtain sensitive information such as usernames, passwords, and
credit card details (and sometimes, indirectly, money), often for malicious reasons,
Phishing is still the most popular attack vector used for
hacking Facebook accounts. There are variety methods to
carry out phishing attack. In a simple phishing attacks a
hacker creates a fake log in page which exactly looks like the real Facebook page and then asks the victim to log in. Oncec the victim log in through the fake page the, the victims "Email Address" and "Password" is stored in to text file, and the hacker then downloads the text file and gets his hands on the victims credentials.
Precautions: Always diligently or carefully check the address bar when login in to Facebook or any other sites that requires passwo rds
Precautions:
1. Deploy a SPAM filter that detects viruses, blank senders, etc.
2. Keep your pc current with the latest security patches and updates.
3. Install an antivirus solution, schedule signature updates, and monitor the antivirus status on your pc
4. Deploy a web filter to block malicious websites.
5. Encrypt all sensitive company informat ion.

(6)  Keylogging
Keylogging is the easiest way to hack a Facebook password. Keylogging sometimes can be so dangerous that even a person with good knowledge of computers can fall victim of it.
A Keylogger is basically a small program which, once is installed on victim's computer, will record every thing victim types on his/her computer. The logs are then send back to the attacker by either FTP or directly to hackers email address.
keyloggers can be legally used to monitor  network usage without their users' direct knowledge, can also be used  by I.T organisation to trouble shoot technical problems.
Solutions: 
Always used antivirus and anti rockrootskits and make sure you update them regularly you can also use malware rem over
Install a good antivirus in your computer.
2. Never open your facebook account on another computer.
3. Always download free software from trusted websites
4. Never download or get a software from untruste

(7)  Sidejacking attack
Sidejacking attack has been in existence for about sixteen years now , and it is still been used even today. Firesheep is widely used to carry out sidejacking attacks. Firesheep only works when the
attacker and victim is on the same WiFi network. A sidejacking attack is just another name for http session hijacking, but it's more targeted towards WiFi users.
Solutions:
1 . stick to secured LAN
2. Don't use sites that stick to or revert to HTTP.
Sites that log you in over unencrypted HTTP or revert to HTTP after SSL login are always prime targets. Anyone that can intercept that traffic can easily record and reuse the cookie, thereby hijacking your authenticated session Known-vulnerable sites include Amazon, Facebook, Flickr Google,Twitter, Windows Live, Wordpress, and Yahooe e.t.c
3. Avoid leaking cookies over Http HTTP
URL entered
without the https: prefix may cause your browser to send your cookie over HTTP before
getting redirected to SSL.
4. Avoid unscripted WiFi connections
5.  Use only trustworthy hotspots
6. Always use secured LAN
7. Insist on full time SSL instead of http
8. Protect everything with VPN

(8)  USB hacking
This can only be possible in a shared computer maybe at home or in the Caffè or business centre  USB hacking is only possible when an attacker has physical access to your computer, he will insert a USB programmed with a function to automatically extract saved passwords from your browser.
Most hacker's can easily hack your password after you are done browsing this happens expecially in a cyber Caffè so always remember to clear your browsing data expecially after logging in with a public computer.

(9) Man in the middle attacks hacking
This is only possible if the victim and attacker are on the same LAN and on a switch based network, a hacker can place himself between the client and the server, or he could act as a default gateway by doing this the hacker is now able to capture all the traffic in between.
Solutions: see session hijacking and sidejacking attack.

(10) Social Engineering
Social Engineering is simple attack made by hacker, in this method hacker can collect information about victim as much as he can from various methods. If victim uses simple password like his birthday date, mobile number, school name, girlfriend name and bike
number , a good hacker can easily guess your password and hack your facebook account.
Solutions:
1. Always use a strong passwords for facebook account or any Account login.
2. Avoid leaving the details of your account carelessly like writing your facebook account in any paper.
3 . People use the same password in different websites,        i will advise never to use same Password for many websites.
4. You can generate strong password from  websites that generates  Random Password you'll find them using Google

Tuesday, 27 September 2016

Amazing discovery: Nnamdi Kanu has sacked two chief judges and a defence lawyer since the emergence of his trial.


Mr Nnamdi Kanu who was arrested by DSS operative, led by Temisan John,  on October 14, 2015 at the Golden Tulip Essential  Lagos Airport Hotel in Lagos.

Although Mr Nnamdi Kanu could not have possibly sacked the chief judges but the outcome of events and his recent statements proved that the resignation of the chief Georges was influenced by Mr Kanu. 

Kanu who was born in Isiama Afara, Abia State, By HRM Eze Israel Okwu Kanu(JP) and his mother is Ugoeze Nnenne Kanu.
Mr kanu was to be arraigned on December 23, 2015 but he(Kanu) stalled the proceedings when he told Justice Ahmed Mohammed that he doubted the judge’s ability to ensure fair trial in the case, which prompted justice Ahmed Muhammad to withdraw from the case.

Mr Kanu had also sacked Barr. Nnamdi Ejiofor, one of his counsels for utterances which the defence lawyers made without consultation according to Barrister Emma Nmezu and Dr. Clifford Chukwuemeka Iroanya, spokespersons for IPOB,
Barrister Nnamdi Ejiofor at a press briefing had disowned the Niger Delta Avengers as well as MEND over their reported negotiation with the Federal Government.However, in the reaction they said new legal team would  be constituted.

“When will he (the judge) be sacked? I want him to be sacked as a judge.” 

This was one of Kanu‘ Recent quotes in court  .


Nnamdi Kanu who had accused a Federal High Court sitting in Abuja of committing judicial rascality over two different rulings given on his trial.

The judge, Justice John Tsoho is also alleged to have given conflicting rulings on the same issue raised during the trial of Kanu.
In his petition to the National Judicial Council, NJC, in a petition which he also called for an investigation into the rulings of the court over the permission granted the Department of State Services, DSS, to protect its witness in his trial.

The judge justice John Tsoho in his reaction resigned from kanu' s case.
In his ruling on Monday, September 26, Tsoho said: “I deem it unnecessary to allow the learned DPP (director of public prosecution) M. Labaran to make any response.”