_How to avoid Cyber Attacks
Here are many ways to defeat java-script protected websites. Some are very simplistic, such as hitting
when the password box is displayed, to simply turning off java capability, which will dump you into the default page. You can try manually searching for other directories, by typing the directory name into the URL address box of your browser, ie: you want access to www.target.com .
Try typing www.target.com/images .(almost ever y web site has an images directory) This will put you into the images directory, and give you a text list of all the images located there. Often, the title of an image will give you a clue to the name of another directory. ie: in www.target.com/images, there is a .gif named gamestitle.gif . There is a good chance then, that there is a 'games' directory on the site, so you would then type in www.target.com/games, and if it isa valid directory, you again get a text listing of all the files available there.
Monitoring using Trojan
Trojans are nothing but a back door of a victim for an attacker
Using this an attacker can take full control of a victims computer
Generally trojans are detected during virus scans but there is a new one called prorat.This one is truly undetectable.The attacker even has an option to format your drives.All you have to do is click on a innocent looking file and :0.This software also provides an option using which you can blend in your trojan into another file so that the victim doesn’t even know that he is a victim.
How to check for Google vulnerabilities
The easiest way to check whether your web site & applications have Google vulnerabilities, is to use a Web Vulnerability Scanner. A Web Vulnerability Scanner scans your entire website and automatically checks for pages that are identified by Google searching queries. (Note: Your web vulnerability scanner must be able to launch Google searching queries).