• Disaster Recovery Planning Keys to Success

    Disaster recovery planning is a great idea until someone actually has to do it. There are many reasons and events that will try and sabotage your disaster recovery planning project. Here are 10 keys to developing a successful disaster recovery plan and implementing it successfully.1. Set...
  • Start Recieving Checks Weekly!!!!

    Yeah its true !!!! You can start recieving checks weekly . Simply join us and start your earnigs!!!! U CAN JOIN US:* If u are student* If u are graduate* If u are jobless* If u are profetional* If u are web developer* If u want to start your buissness. No basic skill or knowledge is...
  • SQL Injection Tutorial

    How SQL Works: -Before you can perform an injection, you must first understand how SQL works. -When you register a new username and password on a website, the username and password you entered is kept in the site’s member table; the username and password are put in their separate columns. -When you...
  • ARP attek

    Virtual LAN Security Best Practices Independent security research firm @stake [9] recently conducted a Security Review [1] of the virtual LAN (VLAN) technology on the Cisco Catalyst 2950, Catalyst 3550, Catalyst 4500, and Catalyst 6500 series switches. Although no intrinsic security...
  • Check a login page is real or fake

    Hackers use this trick very often. They send you a link via email or other method. when you click on that link you find a login page there. They insist you t enter your personal information on it like email id, password etc. When you enter this detail in that login form your account can be hacked....
  • Increase Your Wi-Fi Security In 4 Steps

    Now a days many internet users have started using Wi-Fi internet connections as it is suitable for fastest possible internet connectivity any where. Wi-Fi connections are connected through a wireless network. If you a Wi-Fi device and you have an access to a Wi-Fi ISP or Wireless internet ...

Wednesday, December 28, 2011

1. Nmap Nmap  is a free open source utility for network exploration or security auditing. Its design to rapidly scan large networks, although it works fine against single hosts. Nmap uses raw IP packets in novel ways to determine what hosts are available on the network, what services (application name and version) those hosts are offering, what operating systems (and OS versions) they are running,...