• Fake Microsoft Updates pages Used in Attacks Targeting Firefox on Windows

    Cyber criminals are now using fake Microsoft update website to launch fake Antivirus attack targeted at users of FireFox on Windows.  Chester Wisniewski, a Senior Security Advisor at Sophos Canada is warning of the new “distribution model” of a fake antivirus which attempts to fool...
  • 10 tips to succeed in IT

    Everyone seems to agree that IT is a tough field. But what does it take to overcome the adversities and become a successful IT pro? These qualities may be the key. I recently wrote a string of articles discussing various reasons to leave IT — and various alternative careers for dissatisfied IT...

Monday, March 14, 2011

.fullpost{display:inline;} A modern PC with Vista Home Edition takes about one and a half minutes to boot. An older machine with XP is about the same. That’s 30 seconds for the PC itself (the BIOS) to boot up, plus a minute for the Windows operating system to boot. Sometimes, you need to reboot Windows (e.g. when installing new software), but there is no need to restart BIOS, too. However,...
.fullpost{display:inline;} Have you ever felt bugged-up with the Start-up and Shutdown jingle of your Windows XP or Vista ? If yes, here is the solution, now you use any of your favorite voice or music or dialogue as your PC’s shutdown and start up. It’s a simple 4 step process. 1.Choose the track which you want to play at start-up and shutdown jingles, 2.Now rename these files as...
.fullpost{display:inline;} If you’ve ever waited too long for your files to download from a slow connection, or been cut off mid-way through a download, or just can’t keep track of your ever-growing downloads, FlashGet can help you.FlashGet is specifically designed to address two of the biggest problems when downloading files, speed and management of downloaded files. Download FlashGet...
.fullpost{display:inline;} Image Surfing on the net is not as secure as the average internet user may think. Your identity and what you are doing can be monitored easily. This is especially true for those with Wireless networks, those who browse the internet from their work computer and those that browse dodgy (red flag) websites. The solution is to use an anonymizer when you surf the...
.fullpost{display:inline;} Security is becoming more and more important as new viruses and worms (Lovesan Worm, Blaster Worm...etc) keep being unleashed. That's why it's important to make sure your system is protected.Put your system to the test. Here are some great websites that will test your security: Hackerwhacker.com GRC Testmyfirewall Auditm...
#fullpost{display:inline;} An Excellent software to recover data for your Sim card, Sim Card Data Recovery Software recovers your mobile phone sim card accidentally deleted text SMS messages. Data Doctor Sim Card Recovery Software is read only and non-destructive utility restore all lost message. Utility retrieve all deleted contact numbers (phone numbers), unreadable messages, corrupt phone...
Today I am going to show how to hack BSNL 3G hack and browse unlimited internet at high speed up to 120 Kbps. I am not sure whether this hacking is still working or not, members from other forums are posting that this hack is working fine for them. #fullpost{display:inline;} Before you start learning how to hack you need to have BSNL 2G SIM and ultimately 3G support mobile phone. Just...
#fullpost{display:inline;} I really don't know whether this trick is working or not, but I found in some forums that members are posting that this trick is still working fine! IF you want to browse internet for free of cost using Airtel Live. All you need to have a free mobile browser Opera 4.2 or 5 Beta 2 and some GPRS setting in Airtel Live IF your Airtel Live is not active, call the customer...
We usually set password for our memory card for privacy and security, but the common mistake every one does at least once in out life time forgetting password. If you set password for mobile memory card, then you should be not forget the password. If you does then the only option is to formate your memory card with the help of the card reader and eventually the loss of all your data stored on it....
We would like to congratulate Social-Engineer.Org for their official release of the book, Social Engineering : The Art of Human Hacking. The book has proven to be a huge success and being marked by the community as the official social engineering book. We are excited to see Social-Engineer.org lead the way in evloving social engineering’s reputation from the world of scammers and...
This method of installation is the simplest available. The assumption is that the whole hard drive is going to be used for BackTrack. Boot BackTrack on the machine to be installed. Once booted, type in “startx” to get to the KDE graphical interface. Double click the “install.sh” script on the desktop, or run the command “ubiquity” in console. Select your geographical location and click “forward”. ...
The goal is to unify all of the good information found in various bits and pieces into 1 large document. This document is for people who want to learn to the how and why of password cracking. There is a lot of information being presented and you should READ IT ALL BEFORE you attempted doing anything documented here. I do my best to provide step by step instructions along...
This is always a huge topic and it seems simple to many of us but the fact of the matter is we have a lot of "new" people so we need to be clear about this sort of thing. (Note all commands should be run as root or with sudo) 1. To start networking in Backtrack 4 final issue the following command. /etc/init.d/networking start This will attempt to start all the interfaces in the /etc/network/interfaces...
This is always a huge topic and it seems simple to many of us but the fact of the matter is we have a lot of "new" people so we need to be clear about this sort of thing. (Note all commands should be run as root or with sudo) 1. To start networking in Backtrack 4 final issue the following command. /etc/init.d/networking start This will attempt to start all the interfaces in the /etc/network/interfaces...
Pentest on BT4 R1 GUIDE EXPLANATION: Text in {} = Titles # In front of text = Info Text in [] = Your Input # Here are some examples on [] from the guide beneath: # set LHOST [IP ADRESS INT.] = set LHOST 192.168.1.15 # rdesktop [IP]:[port] -u "[USERNAME]" = rdesktop 192.168.1.15:1337 -u "John" # search -d "[DRIVE:\\FOLDER\\FOLDER]" -f *.jpg = search -d "C:\\windows\\New...