Check out the Samsung Galaxy S5

There is not much that's more important than your well being...

What is Fiber Optics

and how does it works.

Temporary Social Media

messages that could quickly self- destruct could enhance the privacy of online communication...

Apple has released a new update

an improvement to touch ID fingerprint recognition and fix bug that hinders keyboard responsiveness.

Seal combat wounds in 15 sec.

When bullets or sharp nails strike a soldier, standard first aid call for stuffing gauze as deep as five inches into the wound and appying pressure.

Showing posts with label TUTORIALS. Show all posts
Showing posts with label TUTORIALS. Show all posts

Sunday, May 11, 2014

MAKE YOUR SKYPE EXPERIENCE MORE ENJOYABLE AND BETTER CONNECTED WITH THE FOLLOWING TIPS AND TRICKS

Skype lets you make free PC-to-PC calls anywhere in the world.
With a subscription, you can also make calls to external phones and receive phone calls using an online number.
The following Skype tips and tricks will help you make the most of the service:
1. Test your kit
The Skype welcome screen features a handy shortcut for testing your sound devices. Click 'Check your sound works', then click the button to test each device - speakers, microphone and video (if applicable) - in turn.
If the test fails, Skype will make some basic suggestions to remedy the problem, like making sure your headset port (typically the front mic) is selected as the default device. Follow the instructions to see if you can fix the problem.
Skype will offer to make a test call for you - you'll dial a number, hear a female voice and then attempt to record a message. This will let you check the sound quality of your microphone and ensure it's at the right volume.
Skype automatically adjusts your mic and headphone's volume to try to fix potential problems, but you can also tweak these settings yourself by selecting 'Tools | Settings | Audio settings'. You can click 'Show advanced options' to set default devices.
2. Try Bluetooth
Skype works with any microphone, speakers or headphones provided they're properly installed. This includes Bluetooth headsets as long as your computer has a Bluetooth receiver.
With your PC's Bluetooth receiver switched on and your headset in pairing mode, double-click the Bluetooth icon that appears in the notification area of the taskbar and click 'Add' under 'Devices'. Tick 'My device is set up and ready to be found', then click 'Next'.
Wait while Windows tries to locate the headset. When it appears in the list, select it and click 'Next'. Select the appropriate settings according to your headset's manual and, if necessary, enter the passkey. Click 'Next' to see the device connected and set up, then click 'Finish'.
3. Import contacts
Having a full list of contacts saved in Skype will make setting up calls a much simpler process. You can add an individual contact by choosing 'Contacts | Add a contact', then entering the relevant information manually.
If the person you're contacting is already on Skype, he or she will receive a contact request, but you can also import multiple contacts from a list or from an existing webmail or Facebook account.
Choose 'Contacts | Import contacts'. Now select the type of account you want to import from and provide your username and password to connect to that service and transfer the data.
If any of these people already have Skype accounts associated with their email addresses, they will be listed. Click 'Add those contacts' to send them a contact request. Names and phone numbers will be stored for you anyway.
4. Instant messaging
When you're signed into Skype, it can act as an instant messaging program similar to Yahoo or Windows Live Messenger. You can exchange text messages with online contacts or move to an audio call at any time.
Just select an online contact, type in your message and click 'Send' to start a conversation. In your settings you can choose whether other users can see an animated pencil while you're typing something.
You can also set Skype to receive messages from people in your contact list only, and you can opt to keep a history of all your conversations. Choose 'Tools | Options' and move to the 'IM and SMS' tab before clicking 'Show advanced options'. You can now change any of these settings to suit your preferences.
5. Start with Windows
By default, Skype is set to start when Windows launches. This is handy if you want to be available to talk at all times, but it can be an irritant if you need to get on with some important work without any interruptions. You can set Skype to only launch when you open it, by choosing 'Tools | Options | General settings' and clearing the box marked 'Start Skype when I start Windows'. Click 'Save'.
While here, you can also set the visual style of Skype. By default this is the Skype style, but you can choose Classic Windows instead. You can change the default sounds used by Skype by clicking the 'Sounds' icon and selecting the sound that you want to use.
6. Online number
To make calls to phones, you need to buy a Skype subscription or Skype credit. Click 'Skype | Account', then 'Buy more credit' or 'Get a subscription'.
Most subscriptions give you a number that lets people call you on Skype from landlines. Start by choosing 'Online number' and clicking 'Set up now'. Pick a country from the list - people calling you from that country are charged local rates, so it's perfect for keeping in touch with friends and family abroad.
There's a limited number of area codes available, so pick the one closest to you and then click one of the suggested numbers or try to pick one of your choice. Untick the box if you don't want this number to be displayed when you call phones through Skype, then click 'Activate number'.
7. Answer message
You can set up your voicemail to take messages when you aren't online. To do this choose 'Tools | Options | Calls | Show advanced options'. Now select 'Voicemail' from the left-hand pane. Tick the box marked 'Send unanswered calls to voicemail'. Click the 'Record' button and use your microphone to record your outgoing message.
If you don't record a message, a default one will be used instead, but it makes sense to record your own to give a more personal impression. You can also opt to send calls to voicemail if you reject an incoming call or if you're already on a call by ticking the relevant options. Finally, click 'Save' to store these settings.
8. Get extras
Extras let you add more functions to Skype via plugins. In the latest version of Skype the Extras Manager is disabled by default, so when you choose the Tools menu, the 'Extras' option is greyed out.
If this is the case, you need to uninstall and then reinstall Skype. Download the version of Skype provided on the Extras page. This is a slightly older version of the program. While the software is installing, click 'Options' on the Hello screen, tick 'Install Skype Extras Manager' and click 'I agree - Install'.
Once complete, sign back into Skype and choose 'Tools | Extras | Get extras'. Browse through the catalogue of extras and click the green button next to one to install it.
Some extras let you share a whiteboard or play games with people on your Skype contact list, while others provide handy recording facilities.
9. Recording calls
One such extra is MP3 Skype Recorder. This is a free program that automatically records all your Skype audio conversations and saves them in MP3 format. It can cover Skype-to-Skype calls and SkypeOut calls to a landline. It sits in the system tray monitoring Skype and starts recording automatically when you make a call.
You'll need to inform any other participants in the call that it's being recorded, especially if you plan to rely upon the recording later on. Each call is saved as a separate MP3 file and stored in the default save location.
MP3 Skype Recorder is even capable of recording multiple calls that take place at the same time while one of the calls is on hold.
10. Skype button
You can add a Skype button to your website or blog that lets visitors know if you're online. If they have Skype installed on their PC, they can call you with a single click. You can even add the button to an email signature so that the recipient of any of your mails can quickly click it to call you to discuss the contents of the email.
Get your own Skype button and enter your username. Select the button style that you want to use from those provided. Once you've provided these details, a preview of your button will be shown below them and alongside it the embed code that you can include in a web page or email. Copy and paste this code as HTML source into your website or email signature file.


HERE ARE 20 FACEBOOK PRIVACY SETTING TIPS

Privacy on Facebook can be complex, but if you're prepared to put in some effort, you can exercise a fine degree of control over who can and can't see your personal information.
Facebook privacy settings are constantly developing as new features arrive, so you need to keep on top of things. Here are our top Facebook tips for managing your privacy while still being sociable.
1. Privacy settings
You can access Facebook's main privacy settings by logging in and then choosing 'Account | Privacy settings' from the menus in the top-right corner of the page. Most – but not all – of your account settings can be accessed from here. There's a summary of your current privacy levels, along with links to modify them.
2. Quick privacy level
On the 'Privacy settings' page, there are three quick privacy levels that you can set in a single click. These are shown to the left of the summary, and include 'Everyone', 'Friends of friends' and 'Friends only'.
The 'Everyone' setting is the equivalent of broadcasting all your information as widely as possible and should be avoided. 'Friends of friends' isn't much better, because you have no control over who your friends connect with. 'Friends only' is a reasonable starting point for protecting your information, but bear in mind that you'll need to make some tweaks to customise it.


QUICK CONTROL: Choose 'Friends only' to adjust your settings quickly. This is a good basic level of privacy, but it's worth fine-tuning it a little.
3. Basic directory
From 'Privacy settings', choose 'View settings' under 'Connecting on Facebook'. This displays the information that's available to everyone, and the functions that enable people to find and contact you. If you want to be able to receive messages from anyone, set 'Send me messages' to 'Everyone'.
It makes sense to limit 'Education' and 'Work' to 'Friends only', and set 'Friend requests' to 'Friends of friends'. If you find yourself receiving inappropriate requests you can choose it lock it down to 'Friends only', although this eff ectively prevents you from gaining any new friends.
4. Customise settings
Avoid the 'Recommended' level in your privacy settings. This leaves details such as relationships and your birthday open to pretty much anyone. To alter each setting individually, click 'Customise settings' at the bottom of the summary. Here you can set a privacy level for each of the items you share, plus those others share about you and your basic contact information.
5. Preview profile
You can preview your Facebook profile as a general user by choosing 'Customise settings' from your 'Privacy settings' page. At the top of this page, click the button marked 'Preview my profile'. This will display your profile as it appears to a Facebook user who isn't listed as one of your friends. Use the preview to check information that's publicly available.
6. Preview as someone else
In this preview page, you can also choose to view your profile as a specific user might see it. Enter a username in the box marked 'Preview how your profile appears to a specific person'. Select the completed name to see this person's view of your profile. You can use this to help you tweak your privacy settings for friends.



PROFILE PREVIEW: Preview your profile as it can be seen by any named Facebook user to check what information that person can access.
7. Facebook search
If you'd rather not be found in a general search, you can set everything to 'Friends only', but if you've modified any settings or just want to double check, try the following. Go to 'Account | Privacy settings' and then choose 'View settings' under 'Basic directory information'. Next to 'Search for you on Facebook', ensure that the setting is 'Friends only'.
8. Web search
The default setting for web searches enables search engines such as Google to pick up your Facebook profile. Again, the global 'Friends only' setting should prevent your profile being available this way, but it's a good idea to double check to make sure. In 'Privacy settings' choose 'Edit your settings' under 'Applications and websites'. Next to 'Public search', click 'Edit settings' and ensure that the box marked 'Enable public search' isn't checked.
9. Places
You can limit who has access to geolocation information by choosing 'Customise settings' on the 'Privacy settings' page. Now set 'Places I check into' to 'Friends only'. Also clear the box marked 'Include me in people here now after I check in' to prevent other people who are checked in nearby seeing your location.
10. Friends lists
You may be comfortable sharing some information with close friends, but not work colleagues. You can add greater flexibility by setting up friends lists. From your homepage, choose 'Friends' in the left-hand column and click 'Edit friends' at the top of the page. Now select 'Create a list'. Enter a name for the list and select each of the friends you want to add to it, then click 'Create list'. Repeat for each list you want to create.


FRIENDS SEARCH: Set the people who can search for you on Facebook to 'Friends only' to stop people finding and contacting you out of the blue.
11. Control visibility by list:
You can now send updates to people on a particular list. Enter an update as normal, click the padlock below it and choose 'Customise'. Under 'Make this visible to' choose 'Specific people' and enter your list name. Under 'Hide this from', enter the name of the list you want to exclude. You can do the same with individual privacy settings. Go to 'Customise settings' and select 'Customise' for one of the items. You can now enter lists to make it visible or hide it from in the same way.
12. Chat privacy
You can also manage your chat availability using lists. Click the chat window and choose 'Friends lists'. Now tick each of the lists that you want to be visible in chat to and clear any that you don't want to be displayed. Within the chat window, click the button next to each list to appear offline to those people. You can be online to some lists and offline to others.
13. Delete an update
If you want to remove a previous status update, you can do so on your wall. Go to your profile and select the wall. Now scroll down to the update that you want to remove. Move your mouse over the update and click the 'X' to the right of it. Choose 'Remove post' and click 'Remove post' again to confirm.
14. Photo privacy
When you're uploading photos to Facebook, remember that you could be inadvertently invading someone else's privacy. Make sure that you have their permission to post images of them. Also be aware that anyone can tag a photo if they have access to it. You can set your photos to 'Friends only', but it only changes future albums. You need to change the settings of existing albums individually.


SHARING: Choose 'Applications and websites' from the 'Privacy settings' page to remove apps and control data available to other sites.
15. Event privacy
If you create an event from your homepage, it becomes public by default and appears in your feed. You might want to avoid this if the event is a surprise. Instead, click 'What are you planning?' under 'Events' on your homepage. Click the padlock and choose 'Private' before entering any details or inviting anyone. Only invitees will be able to see the details.
16. Messages reply to all
The default setting for replaying to a message on Facebook is 'Reply to all'. If a message is sent to a lot of recipients, you can be caught out by sending a private message to everyone. Click the name of the person you want to respond to in the thread and choose 'Reply' to respond to that person only.
17. Liking
Be sparing with your likes. Every time you click 'Like' on a fan page, it shows up on your profile so everyone can see that you've liked it. Also bear in mind that updates from any page you've liked will appear in your feed, and it can become cluttered.




CUSTOM SETTINGS: Use custom settings to apply different privacy levels to each kind of information stored in your profile.
18. Your wall
You have little control over who can write on your wall. You can choose your friends or set it to no one. Go to 'Account | Privacy settings | Customise settings'. Scroll down to 'Things others share' and tick or clear the box marked 'Friends can post on my wall'. You can change who can see postings on your wall just below this setting.
19. Comments
If you want to limit who can comment on other people's wall postings or your status updates, go to 'Customise settings' under 'Privacy settings' and then scroll down to 'Can comment on posts' under 'Things others share'. You can set this to 'Friends only' or choose 'Customise' to allow or exclude specific people or groups.
20. Picture tagging
You can't prevent people from uploading and tagging pictures of you, but you can control who gets to see them once they're tagged. In the 'Things others share' section of 'Customise settings', select 'Custom' next to 'Photos and videos I'm tagged in'. Choose 'Specific people' next to 'Make this visible to' and set people or lists who you want to allow to see tagged images. Next to 'Hide this from', enter the names or lists that you want blocked from seeing your tagged photos.

YOU MAY ALSO LIKE SKYPE TIPS...


TECHRADAR

Friday, May 2, 2014

HOW TO CHANGE OR REMOVE THE "SUBSCRIBE TO ATOM" LINKS IN BLOGGER

Blogger blogs publish a site feed in Atom format. Atom feeds work in a very similar way to RSS, and there is very little difference for either publishers or those who choose to subscribe.
Default Blogger templates (and indeed, many third party templates), each page will feature a link to subscribe to the Atom feed. On the main pages, this will link to the main site feed, whereas on post pages, this will link to the comments feed for a particular post, like this:
Atom feed link on a post page
Most blog readers are familiar with feeds in RSS format, though not with Atom feeds. Therefore this link can be confusing, and may well discourage readers from subscribing!
In this post, I’ll explain how you can change the wording of this link which ensures a more appealing link to potential subscribers, and even how to remove this altogether!

How the “Subscribe to (Atom)” links are formed

The “feed links” which appear in your Blogger template are constructed in three parts:
  • The <b:includable if=’feedlinks’ > section, which includes the dynamic code used to generate links to the appropriate feed.
  • The <b:includable id=’feedlinksbody’ var=’links’> section, which generates the text and link code for the appropriate feed link.
  • The <b:include id=’feedlinks’/> line, which tells Blogger the position in the template where these dynamic links should be displayed
We can change these sections of code to ensure these links are friendlier, and encourage readers to subscribe to our blogs, and can even remove the links altogether!

How to change the feed links message

There are many ways you could alter the message used for links to your feeds. Here are the main things you may prefer to change:

Remove “(Atom)” from the link text

As I mentioned earlier, many readers may be confused if a blog feed is offered in Atom (rather than RSS) format.
We can easily remove the “Atom” part of the feed link, so the message will read “Subscribe to: Posts” on the main page and “Subscribe to: Post Comments” on post pages.
Here is how this can be achieved:
  1. Go to the Layout>Edit HTML page in your blog’s dashboard, and check the “expand widget templates” box.
  2. Using the search function of your web browser, locate this phrase: (<data:f.feedType/>)
  3. Delete this phrase! Then preview your template. You should now see on the home page that the (Atom) text is removed from the feed link, and can proceed to save your template.

To alter or remove the “Subscribe to” text

The “Subscribe to” text is generated by this line of code:
<data:feedLinksMsg/>
You can replace this line with a message of your own choosing, or simply delete it if you prefer this text not to be displayed at all.

How to remove the feed links altogether

If you display a link to your blog feeds elsewhere in your template, you may prefer to remove the feed links beneath your posts entirely.
This is very easy to achieve! Simply find this line of code in your Blogger template (make sure you have checked the “Expand widget templates” box:
<b:include name=’feedLinks’/>
And delete it!
To be sure this has worked, you can preview your blog template before saving it: the “Subscribe to: Posts (Atom)” link should now be removed from your layout, on post pages as well as the main page.
I hope this tutorial has helped you understand how to change or remove the subscription links from your Blogger template. Please feel free to share your thoughts on this method by leaving your comments and opinions below.

Saturday, April 26, 2014

Email spoofing: The story of “Congratulations you have won a lottery” like spam emails

Mail vs E-mail
Back in old days when internet was not so common, we had to rely only on the postal/courier services. The only thing that bugs me about the traditional mail is their speed. This is when email comes. It offers numerous benefits, like its blazing fast, most of the time its free,  you can attach from pictures to videos, from management point of view you don’t have to maintain a hard folder, last but not least its environment friendly. In short, email is one of the greatest inventions of all time.
What is a spam?
I’m not that old, but again back in those dial-up connection days, there was no such thing as Gmail, most of people either used Hotmail or Yahoo mail for the emails. The problem with these two email service providers is the spams. Spams are irrelevant emails coming to you, mostly used for marketing a product/service, but they are cases where spam emails have hacked a person through social engineering attack or session hijacking. Phishing is also associated with spoofed emails, phishing is “the fraudulent practice of sending emails purporting to be from reputable companies in order to induce individuals to reveal personal information, such as passwords and credit card numbers“.
If you only use Gmail, you are a lucky person, because Google has got some very intelligent and sophisticated spam filtering mechanism. And frankly speaking I don’t get spams at all in my Gmail, but in case of Ymail or Hotmail … let’s just not talk about it.
What is e-mail spoofing?
In today’s article I will focus on Email spoofing. So, the first question you may ask is what is spoofing? Spoofing in simple terms is when Alice tries to be Bob. Email spoofing is when Alice sends an email to Eve but she keeps her identity to be Bob. When Eve receives an email she thinks that Bob has sent the email but it’s not. 
*PLEASE NOTE THIS TUTORIAL IS FOR EDUCATIONAL PURPOSES ONLY. GENERATING SPOOFED EMAILS OR SPAM IS ILLEGAL AND PUNISHABLE UNDER THE LAW. YOU WILL BE RESPONSIBLE FOR YOUR ACTIONS.*
Platform: Windows 7 (also works on MAC and Linux)
How to spoof an e-mail ?
There can be different ways of spoofing an email, but I am going to use “sendmail” program for it. Sendmail is a simple command line program used to send emails via SMTP protocol.
1. Go to Google and type “sendmail google code”. Open the page highlighted below.
2. This is what sendmail on google code looks like.
3. Go to the download section and download the appropriate file, as I m on windows so, I will be downloading the “.exe” file.
Open the command line and call the program “mailsend”. As soon as you type mailsend, the first thing it will ask for is SMTP server. This is a very critical part, if you don’t provide the right SMTP server your email will not be sent. You have to chose a SMTP server that doesn’t require authentication. I will be using PTCL’s SMTP server i.e “smtp.ptcl.com.pk“, this server runs on port 25.
Next in “from”, enter the email ID of the person you want to spoof, In this case I m making a spoof email of Bill Gates i.e “billgates@microsoft.com“
Provide the email id of receiver, I m giving my own email id.
Enter subject and then write your message, after you have completed your message.
Press enter, then press dot button and again press enter, a message will pop that your email has been sent.
Here you can see my inbox has got that spoofed email.
Inbox overview.

 Author: This Article Written by Fowz Masood who has completed his bachelor’s in Electrical Engineering (Comp Engg) He is pursuing a master’s degree in Computer Communications and Security from SEECS-NUST, Pakistan. He has wide variety of interests Computer security/Network security

HOW TO PING TO IMPROVE TRAFFIC OR YOU BLOGS OR WEBSITES.

So here’s how you ping.

When you have published your post, go to your main page.
From there you copy your blog URLNOT your post URL.
In otherwords:
This: http://hubtechsearch.blogspot.com/
Not thishttp://hubtechsearch.blogspot.com/2014/04/why-is-it-important-to-do-internet.html

Then  you open the site you want to ping to, paste and click submit. 
Depending on the ping site you use, it may have an additional step in the form of word captcha so don’t be surprised. 
You then wait while the site submits your URL to different engines and you’re done. The process can take anything from 1 to 5 minutes. 
I use only two ping sites, one which submits to 1568 engines and another with about 30.

Here they are:


Ping My URL (1568 engines)
Google Ping (about 30 engines)


I’m happy with these two because I have not received any spam on my blog since I started using them about  3 months ago and you should worry about spam, especially if you are using Wordpress. 
The moment you ping on Wordpress it seems you invite spammers galore, not sure why but i do have a remedy for it that I can share on another post if you let me know you want it in comments.

MAJOR WARNINGS!

  • DO NOT REFRESH YOUR BROWSER WHILE PINGING. Sometimes you get bored and start fidgeting if you have the attention span of a gold fish like me. Read email in another window or something.
  • In a 24 hour period only ping when you have added new content if you need to ping more than once. If you ping with no fresh content on your blog search engines will declare your blog a spam site very quickly. You do not want that so do not over spam.
  • I am giving you a list of other ping sites in case you are interested but PLEASE, if any of these site wants your email address or for you to embed a code in your blog HTML, DO NOT DO THIS. It gives them permission to do certain things on your blog (e,g put in adverts) or send you newsletters and other nonsense. Very phi-shy and invasive (as with everything, not all are ping sites are of good quality or ethics). Been there, done that, got the migraine scars in brain.
Those I believe are the only words of caution applicable.

Friday, April 25, 2014

6 MOST COMMON PASSWORD CRACKING METHODS AND THEIR COUNTERMEASURES

6 method used to crack passwords
There are number of methods out their used by hackers to hack your account or get your personal information. Today in this post i will share with you guys 6 Most commonly used method to crack password and their countermeasures. You must check out this article to be safe and to prevent your online accounts from hacking.

1. BruteForce Attack

brute force attack
Any password can be cracked using Brute-force attack. Brute-force attacks try every possible combinations of numbers, letters and special characters until the right password is match. Brute-force attacks can take very long time depending upon the complexity of the password. The cracking time is determined by the speed of computerand complexity of the password.

Countermeasure: Use long and complex passwords. Try to use combination of upper and lowercase letters along with numbers. Brute-force attack will take hundreds or even thousands of years to crack such complex and long passwords.
Example: Passwords like "iloveu" or "password" can be cracked easily whereas computer will take years to crack passwords like "aN34lL00"

2. Social Engineering

Social engineering is process of manipulating someone to trust you and get information from them. For example, if the hacker was trying to get the password of a co-workers or friends computer, he could call him pretending to be from the IT department and simply ask for his login details. Sometime hackers call the victim pretending to be from bank and ask for their credit cards details. Social Engineering can be used to get someone password, to get bank credentials or any personal information.

Countermeasure: If someone tries to get your personal or bank details ask them few questions. Make sure the person calling you is legit. Never ever give your credit card details on phone.

3. Rats And Keyloggers

keylogger
In keylogging or RATing the hacker sends keylogger or rat to the victim. This allows hacker to monitor every thing victim do on his computer. Every keystroke is logged including passwords. Moreever hacker can even control the victims computer.

Countermeasure: Never login to your bank account from cyber cafe or someone elsecomputer. If its important use on-screen or virtual keyboard while tying the login. Use latest anti-virus software and keep them updated. 

4. Phishing

phishing hacking
Phishing is the most easiest and popular hacking method used by hackers to get someone account details. In Phishing attack hacker send fake page of real website like facebook, gmail to victim. When someone login through that fake page his details is send to the hacker. This fake pages can be easily created and hosted on free web-hosting sites.

Countermeasure: Phishing attacks are very easy to avoid. The url of this phishing pages are different from the real one. For example URL of phishing page of facebook might look like facbbook.com (As you can see There are two "b"). Always make sure that websites url is correct. 

5. Rainbow Table

A Rainbow table is a huge pre-computed list of hashes for every possible combination of characters. A password hash is a password that has gone through a mathematical algorithm such as md5 and is transformed into something which is not recognizable. A hash is a one way encryption so once a password is hashed there is no way to get the original string from the hashed string. A very commonly used hashing algorithm to store passwords in website databases is MD5. It is almost similar to dictionary attack, the only difference is, in rainbow tables attack hashed characters are used as passwords whereas in dictionary attack normal characters are used as passwords. 

Example: ‘hello’ in md5 is 5d41402abc4b2a76b9719d911017c592 and zero length string ("") is d41d8cd98f00b204e9800998ecf8427e

Countermeasure: Make sure you choose password that is long and complex. Creating tables for long and complex password takes a very long time and a lot of resources

6. Guessing

password guessing
This seems silly but this can easily help you to get someones password within seconds. If hacker knows you, he can use information he knows about you to guess your password. Hacker can also use combination of Social Engineering and Guessing to acquire your password.

Countermeasure: Don't use your name, surname, phone number or birthdate as your password. Try to avoid creating password that relates to you. Create complex and long password with combination of letters and numbers.


CREDIT FROM COOL HACKING TRICK.