• About Hacking

    What is Hacking? Computer hacking is the practice of modifying computer hardware and software to accomplish a goal outside of the creator’s original purpose. Hacking is the art of exploiting the flaws/loopholes in a software/module. Since the word “hack” has long been used to describe ...
  • Web App Attacks: Sneaking in the Front Door

    Anatomy of an ARP Poisoning Attackby Corey Nachreiner, WatchGuard Network Security AnalystHackers lie. Skillful hackers lie well. And well-rounded hackers can lie both to people and to machines.Lying to people, known as "social engineering," involves tactics (detailed at length by convicted...
  • hack closed pc on cyber cafe

    1. As you all must have know these days all Cyber cafe owners have a program for administration to control all PC’s in local area network. So all files can be inter transmitted.  2. First of all press Ctrl+Alt+Del the task manager or any controlling application, will open. Then from...
  • How To Create Strong Passwords?

    As you know that passwords are the only form of securityavailable now a days, Its really important for one to create a strong passwords, Keeping a weak passwords can make you vulnerable to attacks such as Brute force, Dictionary attacks, Rainbow Tables etc. So in this article I will tell you...
  • How to make INTERNET EXPLORER faster

      You have high speed ADSL broadband at PC,but still facing low speed in IE (INTERNET EXPLORER ) so here are few steps that will help your to get better speed in IE 1. Click start > Run 2. Type regedit > Enter 3. Browse folder ...
  • 3G technology vulnerable to cyber crime

    As 3G mobile services are set to be rolled out soon in the country, cyber experts sound a word of caution about the high tech enabled mobile phones, which they say are more vulnerable in the world of technology related crimes.While the next generation technology aims to make life simpler enabling...

Monday, February 28, 2011

If you have lost the Administrator password, you must have the following to recover: A regular user account that can logon locally to your Windows NT Workstation, Server, or PDC whichever you are recovering. If you already have an alternate install of NT, skip to The Process, Set 02.   The Windows NT CD-ROM and setup diskettes (winnt /ox to make them from the CD-ROM).   Enough room...
A hacker is a computer user who, for either negative or positive motivations, will manipulate and break into computer systems. You will see the "hacker" term spelled creatively in different ways, such as "haxor", "Hax0r", and "H4X0R", all of which mean the same thing. Originally, a hacker of the 1980's was strictly evil and dishonest: a criminal who would illegally and unethically take control...
While phishing is starting to show up in many different forms, basically it's the practice of tricking someone on the Web in order to retrieve their sensitive personal information: passwords, banking information, etc. Most often, phishing takes the form of fraudulent emails that ask you to "confirm your password", or "verify your account", or "confirm your identity." You might've gotten an email...
Sometimes we just want to be left alone. It's just plain creepy to think that somewhere in a bunch of digital data warehouses there are files containing our search habits, buying preferences, socio-economic status, etc. It's gotten to the point where Amazon knows what I want to buy before I even start searching for it. How do we get our anonymity-sexy back? I'm going to give you a few tips that...
I will cover 4 methods over here: 1. Facebook Phishing 2. Keylogging 3. Social engineering 4. Primary email address hack Facebook phishing: I have taken this method first because i think this is the most popular method/way of hacking facebook. I studied various facebook surveys taken on web about hacking facebook. The results of these surveys show "Phishing" as the most used method to hack...
Facebook has become the Google of social networks. If you're not updating your status right now, chances are that you are uploading photos or taking some sort of odd quiz. We post tons of intimate details about our lives that we normally wouldn't share with anyone. We think that as long as we make sure our privacy settings are set correctly that we are safe and snug within our circle of friends. The...
Ping PING is used to check for a response from another computer on the network. It can tell you a great deal of information about the status of the network and the computers you are communicating with. Ping returns different responses depending on the computer in question. The responses are similar depending on the options used. Ping uses IP to request a response from the host. It does not use...
An IP (Internet Protocol) address is a unique identifier for a node or host connection on an IP network. An IP address is a 32 bit binary number usually represented as 4 decimal values, each representing 8 bits, in the range 0 to 255 (known as octets) separated by decimal points. This is known as "dotted decimal" notation. Example: 140.179.220.200 It is sometimes useful to view the values in...
Device ServersA device server is defined as a specialized, network-based hardware device designed to perform a single or specialized set of server functions. It is characterized by a minimal operating architecture that requires no per seat network operating system license, and client access that is independent of any operating system or proprietary protocol. In addition the device server is a...
A firewall is a system or group of systems that enforces an access control policy between two networks. The actual means by which this is accomplished varies widely, but in principle, the firewall can be thought of as a pair of mechanisms: one which exists to block traffic, and the other which exists to permit traffic. Some firewalls place a greater emphasis on blocking traffic, while others...
Ethernet Switches:Ethernet switches are an expansion of the concept in Ethernet bridging. LAN switches can link four, six, ten or more networks together, and have two basic architectures: cut-through and store-and-forward. In the past, cut-through switches were faster because they examined the packet destination address only before forwarding it on to its destination segment. A store-and-forward...
The standards and technology that have just been discussed help define the specific products that network managers use to build Ethernet networks. The following text discusses the key products needed to build an Ethernet LAN. TransceiversTransceivers are used to connect nodes to the various Ethernet media. Most computers and network interface cards contain a built-in 10BASE-T or 10BASE2 transceiver,...
Ethernet is a shared media, so there are rules for sending packets of data to avoid conflicts and protect data integrity. Nodes determine when the network is available for sending packets. It is possible that two nodes at different locations attempt to send data at the same time. When both PCs are transferring a packet to the network at the same time, a collision will result. Minimizing collisions...
What is a Network topology?A network topology is the geometric arrangement of nodes and cable links in a LAN, There are three topology's to think about when you get into networks. These are the star, rind, and the bus. Star, in a star topology each node has a dedicated set of wires connecting it to a central network hub. Since all traffic passes through the hub, the hub becomes a central point...
In the network you will commonly find three types of cables used these are the, coaxial cable, fiber optic and twisted pair. Thick Coaxial CableThis type cable is usually yellow in color and used in what is called thicknets, and has two conductors. This coax can be used in 500-meter lengths. The cable itself is made up of a solid center wire with a braided metal shield and plastic sheathing protecting...
Introduction to TCP/IP Networks:TCP/IP-based networks play an increasingly important role in computer networks. Perhaps one reason for their appeal is that they are based on an open specification that is not controlled by any vendor. What Is TCP/IP?TCP stands for Transmission Control Protocol and IP stands for Internet Protocol. The term TCP/IP is not limited just to these two protocols, however....
EthernetEthernet is the most popular physical layer LAN technology in use today. Other LAN types include Token Ring, Fast Ethernet, Fiber Distributed Data Interface (FDDI), Asynchronous Transfer Mode (ATM) and LocalTalk. Ethernet is popular because it strikes a good balance between speed, cost and ease of installation. These benefits, combined with wide acceptance in the computer marketplace...
Network can be divided in to two main categories:Peer-to-peer. Server – based. In peer-to-peer networking there are no dedicated servers or hierarchy among the computers. All of the computers are equal and therefore known as peers. Normally each computer serves as Client/Server and there is no one assigned to be an administrator responsible for the entire network. Peer-to-peer networks are good...
LANs (Local Area Networks)A network is any collection of independent computers that communicate with one another over a shared network medium. LANs are networks usually confined to a geographic area, such as a single building or a college campus. LANs can be small, linking as few as three computers, but often link hundreds of computers used by thousands of people. The development of standard...
A network is any collection of independent computers that communicate with one another over a shared network medium.A computer network is a collection of two or more connected computers. When these computers are joined in a network, people can share files and peripherals such as modems, printers, tape backup drives, or CD-ROM drives. When networks at multiple locations are connected using services...