• ARP attek

    Virtual LAN Security Best Practices Independent security research firm @stake [9] recently conducted a Security Review [1] of the virtual LAN (VLAN) technology on the Cisco Catalyst 2950, Catalyst 3550, Catalyst 4500, and Catalyst 6500 series switches. Although no intrinsic security...
  • Fake Microsoft Updates pages Used in Attacks Targeting Firefox on Windows

    Cyber criminals are now using fake Microsoft update website to launch fake Antivirus attack targeted at users of FireFox on Windows.  Chester Wisniewski, a Senior Security Advisor at Sophos Canada is warning of the new “distribution model” of a fake antivirus which attempts to fool...
  • What is phishing?

    While phishing is starting to show up in many different forms, basically it's the practice of tricking someone on the Web in order to retrieve their sensitive personal information: passwords, banking information, etc. Most often, phishing takes the form of fraudulent emails that ask you to...
  • Download FlashGet 1.9.4

    .fullpost{display:inline;} If you’ve ever waited too long for your files to download from a slow connection, or been cut off mid-way through a download, or just can’t keep track of your ever-growing downloads, FlashGet can help you.FlashGet is specifically designed to address two of the...
  • 10 best Internet search techniques

    These days, everyone is expected to be up to speed on Internet search techniques. But there are still a few tricks that some users — and even savvy searchers — may not be aware of. Did you hate memorizing seemingly insignificant facts for tests at school? No photographic memory? Good news! Life...
  • Optimize Internet Speed – Trick to Increase Your Internet Speed

    It seems that Windows XP reserves 20% of the available bandwidth (i.e. 20% of your Internet available speed) to itself and that is one of the reasons that you will never reach your full download speed under this operating system. In this short tutorial we will teach you how to fix this and...

Tuesday, March 22, 2011

It is the most common type of Cyber crime being committed across the world. Hacking has been defined in section 66 of The Information Technology Act, 2000 as follows "whoever with the intent to cause or knowing that he is likely to cause wrongful loss or damage to the public or any person destroys or deletes or alters any information residing in a computer resource or diminishes its value or utility...

Thursday, March 17, 2011

Check out Ethical hacking: A great career opt...
  You have high speed ADSL broadband at PC,but still facing low speed in IE (INTERNET EXPLORER ) so here are few steps that will help your to get better speed in IE 1. Click start > Run 2. Type regedit > Enter 3. Browse folder HKEY_CURRENT_USERSoftwarem*cro$oftWindowsCurrentVersion InternetSettings 4. Right click @ windows right > New > DWORD 5. Type MaxConnectionsPerServer...
Friends, all of us want to send fake mail with others mail id here i’m posting the method which is used to send the fake mail using the Simple Mail Transfer Protocol(SMTP) SMTP is the protocol which is used to send mail over the internet. When we login to our account and send a mail the smtp protocol will send it to the smtp server which will send it to the pop3 server and then it gets to the...
Want to Spoof a identity of caller,we have brought some intresting trick. Call Forging is the trick by which you can spoof the identity of the caller and misguide the caller. By call forging the caller identity is spoofed and can be easily done by the folllowing way. This post is written for educational purpose and dont misuse it. Basics of Call Forging Firstly the voip is used to call via internet...
MySpace: Since this site relies on Web mail to solicit and accept friends and the blog moderating functions have been known to have XSS vulnerabilities in the past, it is recommended that to use this site for CDC communications, it be done so from specially designated hardware off the CDC network following guidelines developed in conjunction with OCISO. Facebook: Since this site allows blog...
Caller ID Forging the practice of causing the telephone network to display a number on the recipient's caller ID display which is not that of the actual originating station; the term is commonly used to describe situations in which the motivation is considered nefarious by the speaker. Just as e-mail spoofing can make it appear that a message came from any e-mail address the sender chooses,...
SMS forging is a relatively new kind of high-tech felony, which uses the short message service (SMS), which is available on most mobile phones and personal digital assistants, to spoof or impersonate another user. The spoofing is often used to send viruses that can be carried from phone to phone and which can cause destructive behavior. SMS spoofing became possible after many mobile/cellular...

Wednesday, March 16, 2011

Introduction to Networking A basic understanding of computer networks is requisite in order to understand the principles of network security. In this section, we'll cover some of the foundations of computer networking, then move on to an overview of some popular networks. Following that, we'll take a more in-depth look at TCP/IP, the network protocol suite that is used to run the Internet and many...
EthernetEthernet is the most popular physical layer LAN technology in use today. Other LAN types include Token Ring, Fast Ethernet, Fiber Distributed Data Interface (FDDI), Asynchronous Transfer Mode (ATM) and LocalTalk. Ethernet is popular because it strikes a good balance between speed, cost and ease of installation. These benefits, combined with wide acceptance in the computer marketplace...
This is always a huge topic and it seems simple to many of us but the fact of the matter is we have a lot of "new" people so we need to be clear about this sort of thing. (Note all commands should be run as root or with sudo) 1. To start networking in Backtrack 4 final issue the following command. /etc/init.d/networking start This will attempt to start all the interfaces in the /etc/network/interfaces...
You can reveal passwords hidden behind asterisks or ******* easily. For Windows users, they can see the hidden password quickly using the free software in which I will...
...

Tuesday, March 15, 2011

Introduction A Programing Language should be designed to support certain kind of data, such as numbers,characters,strings etc. To get useful output known as information. A program is a set of statements for a specific task, which will be executed in a sequential form. These statements/instructions are formed using certain words and symbols according to the rules known as syntax rules or grammar...