• Browse the Internet Anonymously

    .fullpost{display:inline;} Image Surfing on the net is not as secure as the average internet user may think. Your identity and what you are doing can be monitored easily. This is especially true for those with Wireless networks, those who browse the internet from their work computer and...
  • Basics of C Language

    Introduction A Programing Language should be designed to support certain kind of data, such as numbers,characters,strings etc. To get useful output known as information. A program is a set of statements for a specific task, which will be executed in a sequential form. These...
  • How To Remove Windows Activation So You Can Install It On A Different Computer

     With piracy a constant concern for computer software companies, methods of registering and validating software are now the norm. Operating systems are no different. Microsoft Windows has long used a product key that validates the operating system. The complexity of the validation...
  • The Hacker’s Underground Handbook | ebook on hacking

    The Hacker’s Underground Handbook The Hacker’s Underground HandbookLearn What it Takes to Crack Even the Most Secure SystemsBy: David Melnichuk The Hacker’s Underground Handbook will guide you through password hacking, windows hacking, malware, phising, web hacking, network hacking and Linux...
  • Introduction to Network Security

    Introduction to Networking A basic understanding of computer networks is requisite in order to understand the principles of network security. In this section, we'll cover some of the foundations of computer networking, then move on to an overview of some popular networks. Following that, we'll...
  • 17 years old hacker will demonstrate Linux ELF Virus at 'The Hackers Conference 2012'

     The Biggest Hacking Mania has arrived - 'The Hackers Conference 2012'.  In this first of its kind conference in India, Blackhat hackers drawn from around the world will demonstrate how they access a victim's personal information, and even confidential data available on the...

Tuesday, March 1, 2011

Disaster recovery planning is a great idea until someone actually has to do it. There are many reasons and events that will try and sabotage your disaster recovery planning project. Here are 10 keys to developing a successful disaster recovery plan and implementing it successfully.1. Set Expectations for The Disaster Recovery PlanEveryone will agree that your company needs a disaster recovery...
Whether you're a home PC user or a network administrator, you always need a plan for when the unexpected happens to your computers and/or network. A Disaster Recovery Plan (DRP) is essential in helping to ensure that you don't get fired after a server gets fried in a fire, or in the case of the home user, that you don't get kicked out of the house when momma discovers you've just lost years worth...
What is Hacking? Computer hacking is the practice of modifying computer hardware and software to accomplish a goal outside of the creator’s original purpose. Hacking is the art of exploiting the flaws/loopholes in a software/module. Since the word “hack” has long been used to describe someone who is incompetent at his/her profession, some hackers claim this term is offensive and fails to give...
One of the coolest capabilities enabled by the Internet is that when you’re using it, you’re not bound by geographical location. This is especially handy when you’re shopping. Before the Internet, you were pretty much stuck with the selection and prices in the stores around your home. Now, you can shop anywhere, anytime, and you can be competitive about it. Of course, there are some risks that...
Whether you're a home PC user or a network administrator, you always need a plan for when the unexpected happens to your computers and/or network. A Disaster Recovery Plan (DRP) is essential in helping to ensure that you don't get fired after a server gets fried in a fire, or in the case of the home user, that you don't get kicked out of the house when momma discovers you've just lost years worth...
Whether you’re shopping the holiday sales, or just looking to avoid the craziness at the mall, shopping safely online can be a challenge, especially if you stray from the larger e-tailers to get a better deal from a lesser known site. Here are 10 tips to help you gain some peace of mind while shopping online.1. Check the seller’s customer satisfaction ratings. Other people’s experiences with the...
Laptops are becoming more common than desktop computers. An increasing number of business and personal travelers bring along their laptops on flights. You should be prepared to remove your laptop from your laptop bag or carrying case to send it through the airport security checkpoint in its own bin. More importantly for travelers though is the need to protect the laptop throughout the trip. The...
One of the problems with passwords is that users forget them. In an effort to not forget them, they use simple things like their dog’s name, their son’s first name and birthdate, the name of the current month- anything that will give them a clue to remember what their password is. For the curious hacker who has somehow gained access to your computer system this is the equivalent of locking your...
Kids are more tech savvy than we can ever hope to be. We block a web site and they find a way around our blocking software. We put up a firewall, they go through it. What's a parent to do? We can never be sure that any of our parental controls will work, but we try our best to keep kids safe. Here are 8 things you can do to make your internet parental controls a little more effective and harder...