• Do You Have a Disaster Recovery Plan (DRP)?

    Whether you're a home PC user or a network administrator, you always need a plan for when the unexpected happens to your computers and/or network. A Disaster Recovery Plan (DRP) is essential in helping to ensure that you don't get fired after a server gets fried in a fire, or in the case of the...
  • Test Your Windows XP Security

    .fullpost{display:inline;} Security is becoming more and more important as new viruses and worms (Lovesan Worm, Blaster Worm...etc) keep being unleashed. That's why it's important to make sure your system is protected.Put your system to the test. Here are some great websites that will...
  • My Website is infected with Malware - What's next?

    Legitimate websites are being targeted for malware infections. Reason, large number of users visit their websites and hence these websites can be misused to easily spread or distribute malware to large number of users. If a website is infected with malware it may belong to one of the following...
  • Network Architectures

    EthernetEthernet is the most popular physical layer LAN technology in use today. Other LAN types include Token Ring, Fast Ethernet, Fiber Distributed Data Interface (FDDI), Asynchronous Transfer Mode (ATM) and LocalTalk. Ethernet is popular because it strikes a good balance between speed, cost...
  • BSNL 3G Hack! Browse Internet at 120 Kbps For Free

    Today I am going to show how to hack BSNL 3G hack and browse unlimited internet at high speed up to 120 Kbps. I am not sure whether this hacking is still working or not, members from other forums are posting that this hack is working fine for them. #fullpost{display:inline;} Before you...
  • Web Services Security - The Basics

    Wiki defines Web services as “Application programming interfaces (API) or web APIs that can be accessed over a network, such as the Internet, and executed on a remote system hosting the requested services”. So putting this down in simpler words, it is a function of the application that can be...

Wednesday, April 13, 2011

What to do if your Google/gmail account is hacked? It will be a nightmare for you if your google account gets hacked,Most of the people in these cases waste their money contacting the password recovery services wasting their money,I dont say they dont get back password,But you can do it by putting in some efforts I will begin with Google. it's a pity thing your...
I was asked by many people to tell me the way to protect your orkut account.PLese reply and show your feed backThis Simple Tutorial will Save you from Spam mails and Hacking Tricks used by Many hackers. As you know you can hide your primary email address from non-friends but if by mistake you add a unknown person to your friend list, then he/she will be able to see your primary email...
Keyloggers have been a major problem today as once they get installed in your computer the hacker can get almost any information, I have written couple of posts on keylogging and reviewed some of the best keyloggersavailable now a days The program which are specially used to detect and protect your computers from keyloggers are Antiloggers, I have tested lots of Antiloggers and found Zemana...
The area of Mac security software is fairly broad to Mac users. The primary aspects of security software for the Mac are antivirus programs, patches and updates for the Mac OS X, and updates from commonly used applications such as web browser Safari, Adobe Shockwave, and Google Chrome. In general, Mac users should be kept up-to-date on security fixes for all of the listed primary...
As you know that passwords are the only form of securityavailable now a days, Its really important for one to create a strong passwords, Keeping a weak passwords can make you vulnerable to attacks such as Brute force, Dictionary attacks, Rainbow Tables etc. So in this article I will tell you to create a strong password so you can secure your account from getting hacked  What makes a strong...
Security is a topic I’ve yet to cover here at darkshadow-hacker.blogspot.com, but is a topic that will be the focus of many future articles. If you are involved in the darkshadow-hacker group, it is especially important to be aware of the security of the programs you are investing into and to take measures to keep your personal information secure. The first thing I want to talk about is DDoS...
XSS known as Cross Site Scripting involves the injection of code. What Code? This website (Link) gives great examples of the actual code. By studying this code, a webmaster can get a thorough understanding of the code that can be injected. Without viewing this site negatively, it is a great learning tool.  Security is always going to be a concern for both developers and ecommerce business...
Strong passwords should have a significant length and cannot contain normal words. Only random digits and letters of different case. Such passwords are extremely hard to remember and it takes time to enter. But, even strong passwords have their weaknesses. When you type a password, it can be intercepted by a spy program that logs all your keystrokes. Others can see what you type (even if...
DoS Protection via APF, BFD, DDOS and RootKit Being a web host, your servers are constantly being attacked by hackers by denial-of-service (DoS) and other brute force attacks. There is no foolproof method to stop 100% of all attacks, but there are ways to protect your servers by applying firewall rules, and detecting and banning attacking IPs. This article makes use of the APF, BFD, DDoS Deflate...