Changing Web Hosting Services Provider in Jamnagar

There are many reasons why individuals or companies want to change to a new web hosting company. It could be as simple as not enough storage space or bandwidth, or it could be due to its customer service, or lack thereof.

Easier said than done? Changing to a new web hosting company may sound like a daunting task, but it doesn’t have to be that complex – there are just a few things to keep in mind.

You can find the best deal of hosting at Mehta Websolution.
Keep your web hosting account with your existing host open

It is recommended that you keep your existing web hosting account active until you have completed the transition steps (ie. new account setup, file transfer, email creation and setup, DNS modification and propagation). This will ensure that your website and domain email accounts will be running during the transition

Choose a suitable new web hosting provider

Considerations include:

a) Type of OS (Windows vs. Linux) – it depends on the technologies your website requires. For example, if your website requires ASP, MSSQL, MSACCESS or other Microsoft-specific technologies, then you will need to find a Windows-platform web hosting plan.

b) Bandwidth and disk space requirements

Make a backup copy of your existing website: download old account files

Ideally, files should be downloaded in the same tree structure in which you want to upload it later. Also look for any file or chmod permissions that you might to set on any folder or file. This is a fairly easy task and can easily be accomplished by FTP.

However, some free web hosting providers do not offer FTP access. This is especially true if you’re currently using a free Flash/drag-and-drop website creation service (ie. Weebly.com, WIX.com).

If this is the case, you will not be able to download your existing web files and will have to re-create your new web files. You should check to see if your new web hosting provider offers a free website creator.

To avoid running into the same problem in the future, make sure your new web hosting provider offers FTP access.

Setup new (same) email addresses

To ensure that emails are properly received, it is important to keep the same email addresses, including email aliases and forwarders.

DNS changes and propagation

Once you have uploaded your web files to the new web hosting server and re-created your email accounts, you can go ahead and make the necessary domain name server (DNS) changes.

DNS is usually obtained once you have signed up with the new web hosting provider. You will need to replace your existing DNS settings with the new one – this is usually done via your domain management panel (your domain registrar).

The new DNS will take anywhere between 24-48 hours to propagate, therefore the old web host is responsible for website and email in the meantime. This is why canceling the old service should be the very last thing to do.

Cancel your old account.

Once your new account has been activated and your website and email services at your new web hosting provider are up and running, you can proceed to have your old account canceled.

What is Ransomware? What is WannaCry Ransomware? How it spreads? What can you do to prevent infection?

What is Ransomware?

Ransomware is a malicious software that encrypts the files and locks device, such as a computer, tablet or smartphone and then demands a ransom to unlock it. Recently, a dangerous ransomware named ‘Wannacry’ has been affecting the computers worldwide creating the biggest ransomware attack the world has ever seen. This has affected computers in India also.

What is WannaCry Ransomware?

WannaCry ransomware attacks windows based machines. It also goes by the name WannaCrypt, WannaCry, WanaCrypt0r, WCrypt, WCRY.It leverages SMB exploit in Windows machines called EternalBlue to attack and inject the malware. All versions of windows before Windows 10 are vulnerable to this attack if not patched for MS-17-010. After a system is affected, it encrypts the files and shows a pop up with a countdown and instructions on how to pay the 300$ in bitcoins to decrypt and get back the original files. If the ransom is not paid in 3 days, the ransom amount increases to 600$ and threatens the user to wipe off all the data. It also installs DOUBLEPULSAR backdoor in the machine.

How it spreads?

It uses EternalBlue MS17-010 to propagate. The ransomware spreads by clicking on links and downloading malicious files over internet and email. It is also capable of automatically spreading itself in a network by means of a vulnerability in Windows SMB. It scans the network for specific ports, searches for the vulnerability and then exploits it to inject the malware in the new machine and thus it spreads widely across the network.

What can you do to prevent infection?

  • Microsoft has released a Windows security patch MS17-010 for Windows machines. This needs to be applied immediately and urgently.
  • Remove Windows NT4, Windows 2000 and Windows XP-2003 from production environments.
    Block ports 139, 445 and 3389 in a firewall.
  • Avoid clicking on links or opening attachments or emails from people you don’t know or companies you don’t do business with.
  • SMB is enabled by default on Windows. Disable smb service on the machine by going to Settings > uncheck the settings > OK
  • Make sure your software is up-to-date.
  • Have a pop-up blocker running on your web browser.
  • Regularly backup your files.
  • Install a good antivirus and a good anti ransomware product for better security
  • Below is a consolidated list that we need to block on your firewall/antivirus

IPs

116.0.5.10:135
16.0.5.10:49
10.132.0.38:80
1.127.169.36:445
1.34.170.174:445
74.192.131.209:445
72.251.38.86:445
154.52.114.185:445
52.119.18.119:445
203.232.172.210:445
95.133.114.179:445
111.21.235.164:445
199.168.188.178:445
102.51.52.149:445
183.221.171.193:445
92.131.160.60:445
139.200.111.109:445
158.7.250.29:445
81.189.128.43:445
143.71.213.16:445
71.191.195.91:445
34.132.112.54:445
189.191.100.197:445
117.85.163.204:445
165.137.211.151:445
3.193.1.89:445
173.41.236.121:445
217.62.147.116:445
16.124.247.16:445
187.248.193.14:445
42.51.104.34:445
76.222.191.53:445
197.231.221.221:9001
128.31.0.39:9191
149.202.160.69:9001
46.101.166.19:9090
91.121.65.179:9001
2.3.69.209:9001
146.0.32.144:9001
50.7.161.218:9001
217.79.179.177:9001
213.61.66.116:9003
212.47.232.237:9001
81.30.158.223:9001
79.172.193.32:443
38.229.72.16:443
Domains:

• iuqerfsodp9ifjaposdfjhgosurijfaewrwergwea[.]com
• Rphjmrpwmfv6v2e[dot]onion
• Gx7ekbenv2riucmf[dot]onion
• 57g7spgrzlojinas[dot]onion
• xxlvbrloxvriy2c5[dot]onion
• 76jdd2ir2embyv47[dot]onion
• cwwnhwhlz52maqm7[dot]onion

File Names:

•@Please_Read_Me@.txt
•@WanaDecryptor@.exe
•@WanaDecryptor@.exe.lnk
•Please Read Me!.txt (Older variant)
•C:\WINDOWS\tasksche.exe
•C:\WINDOWS\qeriuwjhrf
•131181494299235.bat
•176641494574290.bat
•217201494590800.bat
•[0-9]{15}.bat #regex
•!WannaDecryptor!.exe.lnk
•00000000.pky
•00000000.eky
•00000000.res
•C:\WINDOWS\system32\taskdl.exe

Sources :  Kerala Police Cyberdome

 

One Click Extension Manager: Manage Chrome extensions

If you have multiple extensions installed in Google Chrome browser, whose icons take up a considerable amount of space on the computer screen, then this simple trick will help you disable them in an instant. Google Chrome doesn’t support one click disable feature. Every time you want to disable a extension you manually need to navigate to settings. However, there exists a way to hide multiple extension icons in Google Chrome browser using One Click Extension Manager.

Download One Click Extension Manager. It is a useful extension to disable extensions installed in google Chrome. Once installed, Chrome Extension Manager silently resides on the side adjacent to your address bar and assist you to disable the extensions at command. Earlier, the extension was known by the name “Disable all extensions”.

If you want to disable the extension, simply click the switch-off icon.A tab will appear on your screen prompting you to disable all the extensions. Chose this option to disable all extensions tab. At any time you can also enable the extensions. After you chose the “Disable all extensions option, it displays “Re-Enable all extensions” option. simply click it to undo the changes made earlier.

One Click Extensions Manager also provides individual remove or toggle option from the same menu.

Left-clicking on an extension enables or disables its active behavior, while right-clicking allows you to uninstall it from your web browser. It does ask you to confirm the uninstall action twice to prevent you from accidentally removing an extension.

Increase Icon Cache size in Windows 10/8/7

If you feel that your desktop or explorer icons load slow when they start the PC  you may want to increase Icon Cache size and see if it helps you.

To Increase Icon Cache Size first create a system restore point. Should something go wrong, you will be able to restore your computer back to this point.

Having done that, open WinX Menu and select Run. Type regedit and hit Enter to open the Registry Editor.

Now navigate to the following registry key:

HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer

Now right-click and create a new REG_SZ (String Value) and name it Max Cached Icons.

Give it a value of 4096 (4MB) or 8192 which is 8MB.

Save and exit the Registry Editor and restart your computer.

If the results are not to your expectation, you may delete the created REG_SZ (String Value) or change its value to 500, which is the default value. You may also restore your computer to the created restore point, if you wish.

 

Amazon granted patent for authorizing payments with selfies

Online retail Amazon was granted a US patent on using selfies instead of passwords  for shopping when using smartphones.

Seattle-based Amazon reasoned that combining sensor and camera capabilities in smartphones with face and gesture recognizing software results in higher security than passwords or identification numbers.

Such approaches provide for user authentication without the user having to physically interact with a computing device, which can enable a user to access information by looking at a camera, performing a simple gesture such as a smile, or performing another such action,  Amazon said in a patent application filed late last year.

Such an authentication can be user friendly, particularly with respect to conventional approaches such as typing and remembering long passwords, and can provide enhanced security because it can be difficult for another person to replicate a user’s face in three dimensions.

Smartphone cameras would capture video snippets to avoid being duped by a fraudster using someone’s picture to impersonate them in an online transaction, according to the patent application with the USPTO.

Hacker gets $15000 reward for finding bug in Facebook

Bengaluru-based Anand Prakash found a vulnerability on Facebook which could have been used to hack into any user account easily without any user interaction. This could give full access to view messages, credit/debit cards stored under payment section, personal photos and much more.

According to a post on Prakash’s blog, he stated that, “Whenever a user forgets his password on Facebook, he has an option to reset the password by entering his phone number/email address and Facebook will then send a 6 digit code on his phone number/email address, which can be used in order to set a new password.” He added that he tried to brute the 6 digit code on Facebook and was blocked after 10-12 invalid attempts.

Prakash looked out for the same issue on beta.facebook.com and mbasic.beta.facebook.com and found that rate limiting was missing on ‘forgot password’ endpoints. He tried to takeover his own account and was successful in setting new password for it as well. With this method, he could then use the same password to login in the account.

Facebook, on its part, acknowledged the issue promptly and fixed it. The hacker was rewarded $15,000 (approximately Rs 10 lakh) considering the severity and impact of the vulnerability.

Restrict/set Time Limit for User Account in Windows 10-8-7

To Restrict Time Limit for User Account use the Net User command. Net User is a command-line tool that helps system administrators add or modify user account behavior.

While you can always use Parental Control or Microsoft Family Safety to do this and more. But in Windows 10, this built-in feature is tied to your Microsoft Account.

If you use a Local Account to sign in to your Windows 10 PC, then this command can be of great help to you.

To begin, run cmd as administrator. Now copy-paste the following command and hit Enter, replacing username with the name of the user account:

net user username /times:M-F,10:00-18:00;Sa-Su,10:00-14:00

This means that the selected user will have access to his account from Monday to Friday, from the times 10 am to 6 pm and on Saturday and Sunday from 10 am to 2 pm.

When you set a time limit for a particular user, then that user will be able to log in and access the PC only between that times. The usage syntax is as follows:

net user <username> /times:{day[-day][,day[-day]] ,time[-time][,time[-time]] [;] | all}

To restore default and allow the user access at all times, use:

net user username /time:all

 

BSNL to set up 40,000 Wi-Fi hotspots

Public sector telecom major BSNL said it is working on setting up 40,000 Wi-Fi Hotspots in the country to counter its inadequacy in providing 4G data services.

“We are at present neither a 4G service provider, nor do we have the relevant spectrum to launch this service. But to deal with this challenge, we are working on a scheme to set up 40,000 Wi-Fi Hotspots in the country, as it (Wi-Fi Hotspot) is faster than 4G services,” BSNL CMD Anupam Shrivastava told reporters.

Shrivastava said under the scheme, 500 Wi-Fi Hotspots have been set up in the country, and the company plans to increase them to 2,500 in the current financial year.

He apprised that in order to improve its telecom service, the BSNL would be setting up around 25,000 mobile towers in the country, with an investment of Rs 5,500 crores.

Flipkart : first Indian app to cross 50 million install

Flipkart recently announced that its Android app had crossed the 50 million installs landmark on the Google Play Store in the first week of February 2016. With a rating of 4.2 it is currently ahead of its competitors Snapdeal and Amazon which both have a rating of 4.1. Flipkart is now the first Indian app across all genres including- communication, social, entertainment, to cross the 50 million install benchmark.

The company launched its android app in Sep 2013 and has achieved the feat in less than 30 months.

A SimilarWeb report ranked Flipkart as India’s number one shopping app with 47% of the share of visits. The report also stated that the combined traffic share of Flipkart and Myntra stood at 63%. Amazon was in the third position with 15.86% followed by Snapdeal with 13.84%.

The Morgan Stanley report on ‘E-commerce in India for 2016’ placed Flipkart as the number one e-commerce company in India with a dominant market share of 45%. According to the report, Flipkart’s market share of 45% is equivalent to the combined market share of the next three players (Snapdeal, Amazon and Paytm).

Truecaller : Third-party apps use caller profiles for verification

Truecaller has launched a user verification SDK (Software Development Kit) for third-party apps which will allow apps to verify users based on their information with Truecaller. As of now the SDK is only on Android and is available to registered third party apps on that platform.

The company has partnered with 12 Indian apps including Quikr, Mobikwik, redBus, CarDekho, BharatMatrimony.com, ixigo, OYO Rooms, TO THE NEW Digital, FreshMenu, Terraa, Cash Care and ShopClues. TrueSDK will help users utilise their Truecaller credentials to log in to third-party apps and verify their phone numbers. TrueSDK is also free for developers to use and has no plans to charge them for the service any time soon.

The company, which generates revenue only from premium subscriptions, is also planning a lot of partnerships to increase their consumer base. Currently, Truecaller has partnerships with Airtel, Tata Docomo, Gionee, Obi, Celkon, Micromax, Microsoft, Cyanogen among others.