Monday, September 6, 2010

How to Recover Hacked Email Accounts?







It can be a real nightmare if someone hacks and takes control of your email account as it may contain confidential information like bank logins, credit card details and other sensitive data. If you are one such Internet user whose email account has been compromised, then this post will surely help you out. In this post you will find the possible ways and procedures to get back your hacked email account. 

For Gmail: 
It can be a big disaster if your Gmail account has been compromised as it may be associated with several services like Blogger, Analytics, Adwords, Adsense, Orkut etc. Losing access to your Gmail account means losing access to all the services associated it with too. Here is a list of possible recovery actions that you can try. 

Step -1: 
Try resetting your password since it is the easiest way to get your account back in action. In this process Google may ask you to answer the secret question or may send the password reset details to the secondary email address associated with your compromised account. You can reset you password from the following link 
Gmail Password Reset Link
If you cannot find success from the Step-1 then proceed to Step-2. 

Step-2: 
Many times the hacker will change the secret question and secondary email address right after the account is compromised. This is the reason for the Password Reset process to fail. If this is the case then you need to contact the Gmail support team by filling out the account recovery form. This form will ask you to fill out several questions like
  • Email addresses of up to five frequently emailed contacts
  • Names of any 4 Labels that you may have created in your account
  • List of other services associated with your compromised account
  • Your last successful login date
  • Account created date
  • Last password that you remember and many more… 
You need to fill out this form as much accurately as possible. It is obvious to forget the dates of last login, account creation and similar terms. However you need to figure out the closest possible date/answers and fill out this form. This is your last chance! The more accurate the information filled out in the recovery form, the more the chances of getting your account back. You may reach the account recovery page form the following link 

For Yahoo and Hotmail: 
Unfortunately for Yahoo/Hotmail there is no second option like filling out the form or contacting the support team. All you need to do is either answer the secret questions that you have setup or reset the password using the secondary email option. 
To initiate the password reset process just click on the Forgot password link in your login page and proceed as per the screen instructions. 

I hope this post will help you recover the lost account.

Saturday, August 14, 2010

How to use New Rupee Symbol of India in Computers







Recently, after long wait the symbol for Indian Rupee was finalized. With this India has finally stepped in the list of privileged countries having the symbol for their currency and has made a remarkable history. However, as claimed by the Government of India that typing the Indian Rupee Symbol and its universal availability will not be possible for now and it would take more than a year for the symbol to become available worldwide.


Though for a while, you cannot have the Indian Rupee Symbol on your keyboards but still you can type it. Yes! To satisfy your curiosity, you can now do it using the Indian Rupee font. One of the Mangalore-based Foradian Technologies Pvt Ltd has newly created a font called “Rupee Foradian” which allows you to type the Indian Rupee symbol on the computer.

To get started using the Indian Rupee Symbol on your computer, you first need to download the Indian Rupee font from here. To install the font, go to the control panel and paste the downloaded font in the Fonts item of control panel. Once the font has been installed, you can press the “ ` ” key, the key located Above TAB to insert the Indian Rupee Symbol right in to your document files.

Nevertheless, this Indian Rupee font has given us a way to quick start using our New Rupee Symbol on the computer. However, to use the symbol universally we have to wait till it’s incorporated in the “Unicode Standard”.

To guide you on how to type Indian Rupee symbol on your computer, I have embedded some tutorials that will help you in installing the font and then guiding you how to type it on your computer after the installation. The Linux and Mac users can check this link for a detailed tutorial.

Download Indian Rupee Font



Saturday, July 24, 2010

Common Email Hacking Methods...









 Gone are the days when email hacking was a sophisticated art. Today any body can access hacking tips through the Internet and start hacking your gmail, yahoo or hotmail account. All that is needed is doing a search on google with keywords like "how to hack gmail", "how to hack yahoo", "hack yahoo messenger", "hotmail hack program" etc. The following article is not an effort to teach you email hacking, but it has more to do with raising awareness on some common email hacking methods.

Hackers can install keylogger programs in the victim’s computer. This program can spy on what the user types from the keyboard. If you think that you can just uninstall such programs, you are wrong as they are completely hidden. After installation, the hacker will use a password and hot keys to enable the keylogger. He can then use the hot keys and password to access your key entry details.

A keylogger program is widely available on the internet.some of them are listed below 
  • Win-Spy Monitor
  •  Realtime Spy
  •  SpyAgent Stealth
  •  Spy Anywhere

Even if direct access to your computer is not possible, hackers can still install a key logger from a remote place and access your computer using Remote Administration Tools (RATs).

Another way of getting your password is the use of fake login pages that look exactly like the real one. So, beware of the web pages you visit. Also if you find your computer behaving oddly, there is a chance that some spy program is running. On such occasions it is better to try and remove the malware or reformat the entire hard disk.