Monday, February 28, 2011
If you have lost the Administrator password, you must have the following to recover:
A regular user account that can logon locally to your Windows NT Workstation, Server, or PDC whichever you are recovering. If you already have an alternate install of NT, skip to The Process, Set 02.
The Windows NT CD-ROM and setup diskettes (winnt /ox to make them from the CD-ROM).
Enough room...
A hacker is a computer user who, for either negative or positive motivations, will manipulate and break into computer systems. You will see the "hacker" term spelled creatively in different ways, such as "haxor", "Hax0r", and "H4X0R", all of which mean the same thing.
Originally, a hacker of the 1980's was strictly evil and dishonest: a criminal who would illegally and unethically take control...
While phishing is starting to show up in many different forms, basically it's the practice of tricking someone on the Web in order to retrieve their sensitive personal information: passwords, banking information, etc. Most often, phishing takes the form of fraudulent emails that ask you to "confirm your password", or "verify your account", or "confirm your identity." You might've gotten an email...
Sometimes we just want to be left alone. It's just plain creepy to think that somewhere in a bunch of digital data warehouses there are files containing our search habits, buying preferences, socio-economic status, etc. It's gotten to the point where Amazon knows what I want to buy before I even start searching for it.
How do we get our anonymity-sexy back? I'm going to give you a few tips that...
I will cover 4 methods over here:
1. Facebook Phishing
2. Keylogging
3. Social engineering
4. Primary email address hack
Facebook phishing:
I have taken this method first because i think this is the most popular method/way of hacking facebook. I studied various facebook surveys taken on web about hacking facebook. The results of these surveys show "Phishing" as the most used method to hack...
Facebook has become the Google of social networks. If you're not updating your status right now, chances are that you are uploading photos or taking some sort of odd quiz. We post tons of intimate details about our lives that we normally wouldn't share with anyone. We think that as long as we make sure our privacy settings are set correctly that we are safe and snug within our circle of friends.
The...
Ping
PING is used to check for a response from another computer on the network. It can tell you a great deal of information about the status of the network and the computers you are communicating with.
Ping returns different responses depending on the computer in question. The responses are similar depending on the options used.
Ping uses IP to request a response from the host. It does not use...
An IP (Internet Protocol) address is a unique identifier for a node or host connection on an IP network. An IP address is a 32 bit binary number usually represented as 4 decimal values, each representing 8 bits, in the range 0 to 255 (known as octets) separated by decimal points. This is known as "dotted decimal" notation.
Example: 140.179.220.200
It is sometimes useful to view the values in...
Device ServersA device server is defined as a specialized, network-based hardware device designed to perform a single or specialized set of server functions. It is characterized by a minimal operating architecture that requires no per seat network operating system license, and client access that is independent of any operating system or proprietary protocol. In addition the device server is a...
A firewall is a system or group of systems that enforces an access control policy between two networks. The actual means by which this is accomplished varies widely, but in principle, the firewall can be thought of as a pair of mechanisms: one which exists to block traffic, and the other which exists to permit traffic. Some firewalls place a greater emphasis on blocking traffic, while others...
Ethernet Switches:Ethernet switches are an expansion of the concept in Ethernet bridging. LAN switches can link four, six, ten or more networks together, and have two basic architectures: cut-through and store-and-forward. In the past, cut-through switches were faster because they examined the packet destination address only before forwarding it on to its destination segment. A store-and-forward...
The standards and technology that have just been discussed help define the specific products that network managers use to build Ethernet networks. The following text discusses the key products needed to build an Ethernet LAN.
TransceiversTransceivers are used to connect nodes to the various Ethernet media. Most computers and network interface cards contain a built-in 10BASE-T or 10BASE2 transceiver,...
Ethernet is a shared media, so there are rules for sending packets of data to avoid conflicts and protect data integrity. Nodes determine when the network is available for sending packets. It is possible that two nodes at different locations attempt to send data at the same time. When both PCs are transferring a packet to the network at the same time, a collision will result.
Minimizing collisions...
What is a Network topology?A network topology is the geometric arrangement of nodes and cable links in a LAN,
There are three topology's to think about when you get into networks. These are the star, rind, and the bus.
Star, in a star topology each node has a dedicated set of wires connecting it to a central network hub. Since all traffic passes through the hub, the hub becomes a central point...
In the network you will commonly find three types of cables used these are the, coaxial cable, fiber optic and twisted pair.
Thick Coaxial CableThis type cable is usually yellow in color and used in what is called thicknets, and has two conductors. This coax can be used in 500-meter lengths. The cable itself is made up of a solid center wire with a braided metal shield and plastic sheathing protecting...
Introduction to TCP/IP Networks:TCP/IP-based networks play an increasingly important role in computer networks. Perhaps one reason for their appeal is that they are based on an open specification that is not controlled by any vendor.
What Is TCP/IP?TCP stands for Transmission Control Protocol and IP stands for Internet Protocol. The term TCP/IP is not limited just to these two protocols, however....
EthernetEthernet is the most popular physical layer LAN technology in use today. Other LAN types include Token Ring, Fast Ethernet, Fiber Distributed Data Interface (FDDI), Asynchronous Transfer Mode (ATM) and LocalTalk. Ethernet is popular because it strikes a good balance between speed, cost and ease of installation. These benefits, combined with wide acceptance in the computer marketplace...
Network can be divided in to two main categories:Peer-to-peer.
Server – based.
In peer-to-peer networking there are no dedicated servers or hierarchy among the computers. All of the computers are equal and therefore known as peers. Normally each computer serves as Client/Server and there is no one assigned to be an administrator responsible for the entire network.
Peer-to-peer networks are good...
LANs (Local Area Networks)A network is any collection of independent computers that communicate with one another over a shared network medium. LANs are networks usually confined to a geographic area, such as a single building or a college campus. LANs can be small, linking as few as three computers, but often link hundreds of computers used by thousands of people. The development of standard...
A network is any collection of independent computers that communicate with one another over a shared network medium.A computer network is a collection of two or more connected computers. When these computers are joined in a network, people can share files and peripherals such as modems, printers, tape backup drives, or CD-ROM drives. When networks at multiple locations are connected using services...
Sunday, February 27, 2011
Hack Facebook password is using Keyloggers.
Today i will explain you how to hack Facebook password using keylogger.
how to create your Facebook hacker keylogger, its a 100% Fully undetectable keylogger you can check this file using Virus total. Its a 100% FUD remote keylogger with several advanced features.
its so easy that anyone can do it. On my website you will never get any infected tool....
CVE Identifiers (also called "CVE names," "CVE numbers," "CVE-IDs," and "CVEs") are unique, common identifiers for publicly known information security vulnerabilities. CVE identifiers have "entry" or "candidate" status. Entry status indicates that the CVE Identifier has been accepted to the CVE List while candidate status (also called "candidates," "candidate numbers," or "CANs") indicates that the...
The operating system is the most fundamental program that runs on your computer. It serves as the basis for how everything else works. What is an operating system?An operating system (OS) is the main program on a computer. It performs a variety of functions, including
determining what types of software you can install
coordinating the applications running on the computer at any given...
Saturday, February 26, 2011
Although in many situations it may be appropriate to list email recipients in the To: or CC: fields, sometimes using the BCC: field may be the most desirable option. What is BCC?BCC, which stands for blind carbon copy, allows you to hide recipients in email messages. Addresses in the To: field and the CC: (carbon copy) field appear in messages, but users cannot see addresses of anyone you...
Although free email services are convenient for sending personal correspondence, you should not use them to send messages containing sensitive information. What is the appeal of free email services?Many service providers offer free email accounts (e.g., Yahoo!, Hotmail, Gmail). These email services typically provide you with a browser interface to access your mail. In addition to the monetary...
Subscribe to:
Posts (Atom)