Thursday 29 September 2011

Posted by Unknown On 08:46
Posted by Unknown On 04:29

Brute Force Attack is the most widely known password cracking method. This attack simply tries to use every possible character combination as a password. To recover a one-character password it is enough to try 26 combinations (‘a’ to ‘z’). It is guaranteed that you will find the password


.. but when? How long will it take? The two-character password will require 26*26=676 combinations. The number of possible combinations (and therefore required time) grows rapidly as the length of the password increases and this method quickly becomes useless. Do you ready to wait for two months while your 9-character password is cracked? What about one hundred years for an 11-character password? Besides the maximal length of the character set you should also specify the character set i.e. the list of characters that will be included in the combinations. The longer the character set is, the longer the required period of time is. Here is the problem: usually you have no idea of what characters are present in the password. On the one hand, you should specify all possible characters. On the other hand, this can slow things down very much. Unfortunately, there are no common ways to determine what character set to use. It is more a question of luck and intuition. The only thing I can recommend is to begin with trying short passwords using the full character set. Then you can increase the length of password simultaneously decreasing the character set to keep the required time good acceptable.

Posted by Unknown On 04:21
One of the best ways to help you start windows faster quickly is to reduce the number of programs scuh as msn,yahoo etc that are loaded while Windows is “waking up.”To tweak the startup, you must use a utility called msconfig, as follows:




Start windows faster - Method:



Step 1:
Click the Start button in the lower-left corner of Windows.
Step 2:
Click Run.


Posted by Unknown On 04:17

Here are some windoes shortcut keys
Windows Shortcuts keys
Alt + E — Opens the Edit menu
Alt + Enter — Opens the Properties window
Alt + F — Opens the File menu
Alt + F4 — Closes the current program
Alt + Print — Screen Takes a screen shot of the current window or program
Alt + Tab — Switches between the programs currently in use
CTRL+TAB — SWITCHES BETWEEN TAB IN DIALOG BOX,I.E 7
Ctrl + A — Selects all text
Ctrl + C — Copies the selected object
Ctrl + End — Jumps to the end of the current document
Ctrl + Esc — Opens the Start menu
Ctrl + F4 — Closes the current program
Ctrl + Home — Jumps to the beginning of the current document
Ctrl + Insert — Copies the selected object

Monday 26 September 2011

Posted by Unknown On 04:12

Fatal error: the system has become unstable or is busy,” it says. “Enter to return to Windows or press Control-Alt-Delete to restart your computer. If you do this you will lose any unsaved information in all open applications.”
You have just been struck by the Blue Screen of Death. Anyone who uses Mcft Windows will be familiar with this. What can you do? More importantly, how can you prevent it happening?
1 Hardware conflict
The number one reason why Windows crashes is hardware conflict. Each hardware device communicates to other devices through an interrupt request channel (IRQ). These are supposed to be unique for each device.
For example, a printer usually connects internally on IRQ 7. The keyboard usually uses IRQ 1 and the floppy disk drive IRQ 6. Each device will try to hog a single IRQ for itself.
If there are a lot of devices, or if they are not installed properly, two of them may end up sharing the same IRQ number. When the user tries to use both devices at the same time, a crash can happen. The way to check if your computer has a hardware conflict is through the following route:

Posted by Unknown On 04:10

Well one of the famous, easy and easy to understand type of hacking is Net Bios. You can play with it as follows.
Disclaimer: We don’t take any responsibility for Illegal use of this tutorial.
Step 1
Get a IP (range) scanner. (superscanner is a fast one, get it here).
Scan the victim’s ip on TCP/IP port 139 (More info about TCP/IP port here)

Posted by Unknown On 04:08

With this tutorial u can translate almost any binary file to text. This is a type of cryptographic translation which is commonly used in password creating. Cryptography is a language where we encrypt secret data. And Binary is also one of its way.
This tutorial I used in initial stage of hacking and not completely written by me definitely. ( I am Not good in writing tutorials ! )
Hope this can be useful for aspiring coders and ethical hackers.

Introduction:

We’ve all seen binary code. We’ve come to think of them as a bunch of ones and zeroes in long strings…
010010101010101001101011


But these ones and zeros can also represent decimal numbers. First off, I will show you how to read these numbers as the decimal   numbers we’re used to in our daily life. Then, I will show you how to use those numbers and your keypad to translate them into text. Note that your computer doesn’t use the decimal system, so technically, when it converts binary to text, it doesn’t go through the process I will show you. This is just a diverting way of explaining you how the binary system works.


Posted by Unknown On 04:07

How to create a bootable Windows XP SP1 CD (Nero):
Tip :You can replace XP SP1 with SP2 and 3 as mentioned in disk files.
Step 1
Create 3 folders – C:\WINXPSP1, C:\SP1106 and C:\XPBOOT
Step 2
Copy the entire Windows XP CD into folder C:\WINXPSP1

Posted by Unknown On 04:04

Follow The steps to block Pop up banners by changing settings in Internet Explorer.

1) Go to TOOLS and then INTERNET OPTIONS.

2) Click the SECURITY tab, move the slider up to HIGH and click APPLY.

This applies the highest security settings to IE, which blocks EVERYTHING, including JavaScript, Applets, and so on that pop-ups are based upon.

Posted by Unknown On 04:02

1. Open notepad.exe, type “del c:windowsprefetch tosboot-*.* /q” (without the quotes) & save as “ntosboot.bat” in c:

2. From the Start menu, select “Run…” & type “gpedit.msc”.
3. Double click “Windows Settings” under “Computer Configuration” and double click again on “Shutdown” in the right window.
4. In the new window, click “add”, “Browse”, locate your “ntosboot.bat” file & click “Open”.
5. Click “OK”, “Apply” & “OK” once again to exit.

Posted by Unknown On 03:58

Internet Protocol i.e IP addresses are unique and used for digital data communication for internet. Any mailing system or website technology works on the same principle of digital communication.
IP Spoofing
IP Spoofing
Every computer connected to Network have its unique IP address.
When Person A sends an email  to person B, The mail is assigned with the header which contains the IP’s of sender and Reciver so that mail can go to the same person B and not to some one else.
Now in a private network for security reasons limited mails are accpeted from reserved IP’s.
In Simple word only internal communication can be worked. Person from outside can’t send mail in that network.

Sunday 25 September 2011

Posted by Unknown On 10:57

1
10 minute guide to lotus notes mail 4.5

http://www.parsian.net/set1252/pages/books.htm
2
10 minute guide to Microsoft exchange 5.0

http://www.parsian.net/set1252/pages/books.htm
3
10 minute guide to outlook 97

Posted by Unknown On 10:43

Bluejacking is one of the type of Blue-tooth hacking. Bluejacking was first carried by the Malaysian IT consultant. In simple words Bluejacking means tempoarly hijacking someones device. Bluejacking allow the user to send business cards anonymously using Bluetooth wireless technology.


Bluejacking is carried only to the Bluetooth enable device that is cell phones, PDA’s , laptop’s . Bluejacking can take place just at a range of 10 meters. To start with the process of bluejacking ,the hacker search for device whose Bluetooth device is on.

Bluejacking
Bluejacking

Posted by Unknown On 10:19

Bluebugging is also one form of Bluetooth hacking .It was first discovered German researcher Martin Herfurt . He got the motivation from the Bluesnarf attack.
Bluebugging is very much different from the bluesnarfing. In bluebugging allows an individuals to access the mobile phone commands using Bluetooth wireless technology without knowing the phone’s user .The hacker can access the phone memory and connect internet without knowing the user . Hacker can also initiate phone calls, send and read SMS, listen the phone conversion. But here the hacker must be at range of 10 meters while in bluesnarf it is upto 100 meters.
 Bluebugging
Bluebugging

Posted by Unknown On 10:05

Bluesnarfing is one type of blue-tooth hacking. While it is similar to the bluejacking and bluebugging. It was discovered by Marcel Holtmann in october 2003.
Bluesnarfing is unauthorized access of information or data from wireless device through blue-toothtechnology. Connection is often between the desktop’s, LAP’s ,cellphones , PDA’s . Blue-tooth is very high speed but a short range wireless technology,in which exchanging of information between cellphones, deskstop’s. The most know device in which the blue-tooth is already installed is cellphones .
In this the attacker access the calendar, contact list and e-mail and text messages without leaving any evidence of the act. Other device is Laptop’s and computers ,they are having less frequency and more complex system than cellphones . The time required is attacking this device takes is more.
Bluesnarfing
Bluesnarfing