Go to the right site. A function "password Recovery" at the present time available in many email servers. In order to use it, just visit the following link, located near the entrance to the user. Usually electronic boxes have an automatic password retrieval system, and as needed, by entering your email address, you can get forgotten password. If such a system doesn't help, then remember the forgotten word will help you control questions. They were asked upon check email, for example, the name of your pet or mother's maiden name. The answer to this question will be your access to the server.
After entering the answer in the proposed row will navigate to the page of your profile where you will be prompted to name the new name of the password. Some of the existing e-mail services can provide for its recovery through a mobile service. Your phone receives a message with the access code or recommendations.
If you do not remember the answer to the survey or encounter any problems that are associated with the restoration of the character set, contact the technical support service of the corresponding service.
Please have your email address, the date of its registration, the applicable service provider. It is desirable to specify and date of last attendance email. You can specify a sample name, password, and have you changed the password for the last period. Give more accurate data about your registered email and wait for an answer from the experts web-resource. They will contact you very soon and will provide the necessary assistance.
To restore access to your email fast enough. All steps to recover the password, you will spend less than 5 minutes.
Advice 2: How to know if you are in the box
Email has become an integral part of our communication on the Internet. There are many websites that can provide you with a mail box. In this regard, there is a need to periodically check the correctness of the email address before sending the letter.
If you are interested in a box, created by one of the free email services, try to register the email with the same name. Existing mail box , you cannot register again. In this case, issued an error message and the impossibility of registration.
Write a letter for any you postal address on the required box. The letter can be with text or without. It doesn't matter. Sending it, check after some time a mailbox for new emails. If you received a letter, which refers to the desired mail box, it means that your message did not reach the addressee. It is possible that this mail box does not exist.
If you are looking for a mail box to the domain mail.ru, inbox.ru, list.ru or bk.ru sign up in the social network "My world". Then use one of the searches according to the accounts of other users. You can simply dial the desired mailbox in the search box in the upper right corner of the page or click on the word "People" next to "My мир@mail.ru". By doing this, you will be taken to a page of search accounts by different criteria. Enter your e-mail in the input field located under "Search" word. Click "Find". After that, if a postal address exists, you will see the avatar and other details of the owner of the box.
If you know the first part of the name of the mail box, but do not know the address of the website on which it is located, try to look for information known in the search engine. For these purposes use search engine www.nigma.ru. Unlike other similar systems, she finds information in multiple search engines and gives it in the list.
Check for the existence of the website, if the desired mail box is not registered on a free mail service. To do this, type into the address bar of the browser-the part names boxa, which comes after the symbol "dog". If the site loads, it is likely that the box exists.
Advice 3: How to know the server password
Hacks servers happen every day. Hackers are aware of hundreds of loopholes through which you can obtain a particular level of access to the server. In some cases, vulnerabilities could allow access to sensitive user data, sometimes a hacker does gets full control over the resource. How to protect yourself from hacker attacks?
To protect the server from hacking, you must know the main methods of hacker attacks. Closing possible loopholes, you greatly increase the security of your resource. All the following is of no interest to hackers (they know everything about that), but can be useful for server operators.
How is the attack on the server? First of all a hacker is trying to understand what software is installed on it. For this purpose, he may access located on the server site and enter an incorrect query. In response to this request is incorrectly configured server issues an error message and accompanies him about this text: Apache/2.2.14 (Unix) mod_ssl/2.2.14 OpenSSL/0.9.8 e-fips-rhel5 mod_auth_passthrough/2.1 mod_bwlimited/1.4 FrontPage/126.96.36.19935 Server at www.имя_server.com Port 80.
For a hacker this information can be very useful – it sees the version of the installed the HTTPserver (Apache/2.2.14) and versions of other programs and services. Now he can look for exploits (malicious codes) under the vulnerability of the versions of these services. And if your system administrator has not closed the existing loopholes, the hacker can access the computer. A properly configured server should not give any information, or can display deliberately distorted.
One of the simplest ways of hacking, often giving the result, is the view of the server folders. Very often administrators forget to set rights to view them, so the hacker, identifying the structure of the site with appropriate tools, easily opens not intended for viewing folders. If the administrator is a newbie, a hacker can find these folders contain a lot of useful information. For example, the username and password of the administrator. The password is usually encrypted with md5 algorithm, but there are a lot of services for decryption. As a result, the hacker has full control over the site. Conclusion: expose read permissions on the files and opening folders.
Very often, hackers break into the database, using found sql vulnerability. There are special utilities, greatly facilitate the "work" of a hacker. With their help, in a matter of minutes is determined by the vulnerability, then the definition of the name of the database, we calculate the table name and column, then the hacker has full access to data stored in the database of information – such as logins and passwords, data, credit cards, etc.
Be sure to test your resources for the presence of sql vulnerabilities, for this you can use a hacking program. For example, NetDeviLz SQL Scanner. Enter in the program the address of your website, click. If there is a vulnerability site address appears in lower window.
Fairly common situation, when an administrator uses a very simple passwordwhich is easy to selecting. For this purpose, special programs bruteforcer, searching password using dictionaries or according to special algorithms. Your password must be at least 8 characters to be entered in different registers and include letters, numbers, and special characters@,$, etc.
Check your resources for the presence of XSS vulnerabilities, they are very common. Using this loophole, the hacker can get your cookies. Substituting them instead of my own, it is easy to enter the site under your account. To check your resources for possible vulnerabilities take advantage of a completely legal program XSpider.