• Internet Explorer Shortcut Keys

    Shortcut keys are very useful to do work on any application very easily. Here are some short cut keys of Internet Explorer (IE). To do this                                          ...
  • Hacking a website or its member section

    First of all,why you want to hack a webpage?Is it a certain webpage or any site at all? There are many reasons to hack a website, or a webmaster.Maybe you want to take a revenge or maybe you want to have fun or just learn how to do it ! You can deface the website which means replace the original...
  • Check out Ethical hacking: A great career option

    Check out Ethical hacking: A great career optionby admin
  • How to make INTERNET EXPLORER faster

      You have high speed ADSL broadband at PC,but still facing low speed in IE (INTERNET EXPLORER ) so here are few steps that will help your to get better speed in IE 1. Click start > Run 2. Type regedit > Enter 3. Browse folder ...
  • How To Create Strong Passwords?

    As you know that passwords are the only form of securityavailable now a days, Its really important for one to create a strong passwords, Keeping a weak passwords can make you vulnerable to attacks such as Brute force, Dictionary attacks, Rainbow Tables etc. So in this article I will tell you...
  • Fake Microsoft Updates pages Used in Attacks Targeting Firefox on Windows

    Cyber criminals are now using fake Microsoft update website to launch fake Antivirus attack targeted at users of FireFox on Windows.  Chester Wisniewski, a Senior Security Advisor at Sophos Canada is warning of the new “distribution model” of a fake antivirus which attempts to fool...

Thursday, February 24, 2011

This is an extreme example of Social Engineering technique, we need following things to do so. 1. Victim’s profile link ( you can get it easily ) 2. His/Her Email which he/she uses to sign in 3. His/Her birth date which he/she has used in the profile 4. Make an Email ID on gmail or yahoo with the first name and last name same as on victim’s facebook profile. * Now you will get this...
Yes Guys, this is now possible, I’m not joking. Many of us think that this is not possible or we have to spend some money for such services but believe me that we don’t have to spend any money for getting this done. Yes, PhoneOnMap makes it possible. It’s a service that provides a free application that has to be installed in GPS cell phone and you are ready to track the phone...
Your IP is exposed when ever you visit a website,when your Ip gets exposed it becomes easy to trace you and find out your personal information,Hackers can use your Ip to gain access to your personal files and documents and even can get into your paypal,alert etc accounts,Hide the Ip is a Software which masks your IP with one click and you can surf web anonymously,on the...
   http://www.ziddu.com/download/13003682/google_hack.pdf.html  http://www.ziddu.com/download/13003681/Email_Spoofing.pdf.html  http://www.ziddu.com/download/13003680/FTPExploitsByAnkitFadia.pdf.html   http://www.ziddu.com/download/13003679/.html   http://www.ziddu.com/download/13003678/DosAttacked.pdf.html   http://www.ziddu.com/download/13003677/Corporate-security-excerpt.pdf.html ...
Do you’ve some important data in your USB drive that you don’t want to share with anybody? It may be some documents, username/passwords or operating systems. Then why not encrypt the USB drive data with password? And if you’re using Windows7, you don’t even need any third party software for password protecting portable drives. Windows 7 includes a program called BitLocker...
With the sudden rise in the Internet usage across the globe over the past few years, there has also been a rise in the amount of online scams and frauds. Today most of the Internet users are unaware of the most prevailing online threats which pose a real challenge for their safe Internet usage. As a result, Online Security has become a questionable factor for the most...
If you're worried about email security, here is a step by step guide to help you check and determine if your Gmail account has been hacked or compromised in any way Step 1: Find the 'Last Account Activity' Section Your Inbox At the bottom of your Gmail inbox there is a 'Last Account Activity' section. Click on 'details' to launch the full blown monitor. ...
World's first hack-free software MELBOURNE: A team of Australia's ICT Research Centre of Excellence's spinout company Open Kernel Labs (OK Labs) developed a microkernel The 'seL4' and claimed it to be the the world's first hack-free software which can protect systems from failure or malicious attacks.  It is a small operating system kernel which regulates access to a computer's...
It only works on sites being hosted on Ms-IIS server. Now a days many boxes are patched so it'll not work on them !! Steps for Xp- open run type- %WINDIR%\EXPLORER.EXE ,::{20D04FE0-3AEA-1069-A2D8-08002B30309D}\::{BDEAD F00-C265-11d0-BCED-00A0C90AB50F} and press enter ! A new window name "WEB FOLDER" gets open Right click and click on New, Add Web Folder then enter your vulnerable website address. then...
Its a new type of Phishing attack!! How The Attack Works 1. A user navigates to your normal looking site. 2. You detect when the page has lost its focus and hasn’t been interacted with for a while. 3. Replace the favicon with the Gmail favicon, the title with “Gmail: Email from Google”, and the page with a Gmail login look-a-like. This can all be done with just a little bit of Javascript that...
Now that the hacker has a full list of services running on the target system, to be able to exploit them, he has to first figure out what software and version the service is. One way the hacker can get this information, is to telnet into service port. In the example below, we will use command prompt on Windows (Start -> Run -> Type “cmd” -> Enter). If you are on a Mac, you will be using...