• Introduction of Hacking

    What is hacking?Hacking used to be defined as "One who is proficient at using or programming a computer; a computer buff." However, this use has been turned around now, to mean that of a cracker - "One who uses programming skills to gain illegal access to a computer network or file." This...
  • Download FlashGet 1.9.4

    .fullpost{display:inline;} If you’ve ever waited too long for your files to download from a slow connection, or been cut off mid-way through a download, or just can’t keep track of your ever-growing downloads, FlashGet can help you.FlashGet is specifically designed to address two of the...
  • The Top 30 Internet Terms for Beginners

    As you strive to make sense of the Internet and the World Wide Web, these 30 terms are bound to be very helpful. 1. The Web vs. the InternetThe Internet is a vast 'interconnection of computer networks' that spans the globe.  It is comprised of millions of computing devices that trade ...
  • Send Fake Mail using SMTP

    Friends, all of us want to send fake mail with others mail id here i’m posting the method which is used to send the fake mail using the Simple Mail Transfer Protocol(SMTP) SMTP is the protocol which is used to send mail over the internet. When we login to our account and send a mail the smtp...
  • Change STARTUP and SHUTDOWN sounds in XP

    .fullpost{display:inline;} Have you ever felt bugged-up with the Start-up and Shutdown jingle of your Windows XP or Vista ? If yes, here is the solution, now you use any of your favorite voice or music or dialogue as your PC’s shutdown and start up. It’s a simple 4 step...
  • Boot sector virus repair and Removal tool

    What is a boot sector? All disks and hard drives are divided into small sectors. The first sector is called the boot sector and contains the Master Boot Record (MBR). The MBR contains the information concerning the location of partitions on the drive and reading of the bootable operating system...

Wednesday, March 16, 2011

Introduction to Networking A basic understanding of computer networks is requisite in order to understand the principles of network security. In this section, we'll cover some of the foundations of computer networking, then move on to an overview of some popular networks. Following that, we'll take a more in-depth look at TCP/IP, the network protocol suite that is used to run the Internet and many...
EthernetEthernet is the most popular physical layer LAN technology in use today. Other LAN types include Token Ring, Fast Ethernet, Fiber Distributed Data Interface (FDDI), Asynchronous Transfer Mode (ATM) and LocalTalk. Ethernet is popular because it strikes a good balance between speed, cost and ease of installation. These benefits, combined with wide acceptance in the computer marketplace...
This is always a huge topic and it seems simple to many of us but the fact of the matter is we have a lot of "new" people so we need to be clear about this sort of thing. (Note all commands should be run as root or with sudo) 1. To start networking in Backtrack 4 final issue the following command. /etc/init.d/networking start This will attempt to start all the interfaces in the /etc/network/interfaces...
You can reveal passwords hidden behind asterisks or ******* easily. For Windows users, they can see the hidden password quickly using the free software in which I will...
...