Sign by Danasoft - For Backgrounds and Layouts

Search This Blog

Monday, 30 July 2012

Shut Down Your Computer With a Cell Phone

  ...

Windows User Account Hacking

Windows user Account can be Hacked by using Command Prompt.This type of Hacking is done  in order to gain  illegal access to the user account and steal the data in the system. Note:This type of Hacking can be done only on User Accounts which have Administrative rights. Commands Used For User Account Hacking 1.To See all the account present on the Computer. Net user 2.To change the password of a User account without knowing the old password. Net user administrator * 3.To make a new user account. Net user hacker /add   4.To Delete the existing user account. Net user hacker /delete 5.To make a hidden...

Saturday, 21 July 2012

10 Reasons Why PC's crash

Fatal error: The system has become unstable or is busy," it says. "Enter to return to Windows or press Control-Alt-Delete to restart your computer. If you do this you will lose any unsaved information in all open applications."You have just been struck by the Blue Screen of Death. Anyone who uses Microsoft Windows will be familiar with this. What can you do? More importantly, how can you prevent it happening?1 Hardware conflictThe number one reason why Windows crashes is hardware conflict. Each hardware device communicates to other devices through an interrupt request channel (IRQ). These are supposed to be unique for each device.For example,...

Wednesday, 18 July 2012

EMAIL HACKING

Email hacking  is illegal access to an email account or email correspondence.Email on the internet is now commonly sent by the Simple Mail Transfer Protocol (SMTP). This does not encrypt the text of emails and so intercepted mail can be read easily unless the user adds their own encryption. The identity of the sender or addressee of an email is not authenticated and this provides opportunities for abuse such as spoofing. Email Spoofing Email spoofing is a technique used by hackers to fraudulently send email messages in which the sender address and other parts of the email header are...

Sunday, 8 July 2012

Working of an ethical hacker

Obeying the Ethical Hacking Commandments Every Ethical Hacker must follow few basic principles. If he do not follow, bad things can happen. Most of the time these principles get ignored or forgotten when planning or executing ethical hacking tests. The results are even very dangerous.  Working ethically The word ethical can be defined as working with high professional morals and principles. Whether you’reperforming ethical hacking tests against your own systems or for someone who has hired you, everything you do as an ethical Hacker must be approved and must support the company’s goals. No hidden agendas are allowed!Trustworthiness...

Thursday, 5 July 2012

Prevention from Hackers

What can be done to prevent Hackers from finding new holes in software and exploiting them? Information security research teams exist to try to find these holes and notify vendors before they are exploited. There is a beneficial competition occurring between the Hackers securing systems and the Hackers breaking into those systems. This competition provides us with better and stronger security, as well as more complex and sophisticated attack techniques.Defending Hackers create Detection Systems to track attacking Hackers, while the attacking Hackers develop bypassing techniques, which are eventually resulted in bigger and better detecting and tracking systems. The net result of this interaction is positive, as it produces smarter people, improved security, more stable software,inventive...

Introduction To Hacking

An Introduction Video  To Hacki...

Tuesday, 3 July 2012

Google At A Glance

Click here to Download  a  Powerpoint  Presentation about Google&nbs...

Ethical Hacking

Ethical Hacking is testing the resources for a good cause and for the betterment of technology. Technically Ethical Hacking means penetration testing which is focused on Securing and Protecting IT Systems. Ethical Hacker The term 'Ethical Hacker' refers to Security Professionals who apply their hacking skills for Defensive purposes....

Types of Hackers

Coders The Real Hackers are the Coders, the ones who revise the methods and create tools that are available in the market. Coders can find security holes and weaknesses in software to create their own exploits. These Hackers can use those exploits to develop fully patched and secure systems.Coders are the programmers who have the ability to find the unique vulnerability in existing software and to create working exploit codes. These are the individuals with a deep understanding of the OSI Layer Model and  TCP/IP Stacks. Admins Admins are the computer guys who use the tools and exploits prepared by the coders. They do not develop their own techniques, however they uses the tricks which are already prepared by the coders. They are generally System Administration,...

Hacker vs. Cracker

What Is the Difference Between a Hacker and a Cracker? Many articles have been written about the difference between Hackers and crackers, which attempt to correct public misconceptions about hacking. For many years, media has applied the word Hacker when it really means Cracker. So the public now believe that a Hacker is someone who breaks into computer systems and steal confidential data. This is very untrue and is an insult to some of our most talented Hackers. There are various points to determine the difference between Hackers and crackers Hacker Definition - A Hacker is a person who is interested in the working of any computer Operating system. Most often,Hackers are programmers. Hackers obtain advanced knowledge of operating systems and programming languages....

Hacker

Hacker is a word that has two meanings:Traditionally, a Hacker is someone who likes to play with Software or Electronic Systems. Hackers enjoy Exploring and Learning how Computer systems operate. They love discovering new ways to work electronically.Recently, Hacker has taken on a new meaning — someone who maliciously breaks into systems for personal gain.Technically, these criminals are Crackers as Criminal Hackers. Crackers break into systems with malicious intentions.They do it for Personal gain, Fame, Profit and even Revenge. They Modify, Delete and Steal critical information,often making other people's life miserable.Hacking has a lot of meanings depending upon the person’s knowledge and his work intentions. Hacking is an Art as well as a Skill. Hacking is the knowledge...

What Is Hacking

The Art of exploring various security breaches is termed as Hacking.Computer Hackers have been around for so many years. Since the Internet became widely used in the World, We have started to hear more and more about hacking. Only a few Hackers, such as Kevin Mitnick, are well known.In a world of Black and White, it’s easy to describe the typical Hacker. A general outline of a typical Hacker is an Antisocial, Pimple-faced Teenage boy. But the Digital world has many types of Hackers.Hackers are human like the rest of us and are, therefore, unique individuals, so an exact profile is hard to outline. The best broad description of Hackers is that all Hackers aren’t equal. Each Hacker has Motives, Methods and Skills. But some general characteristics can help you understand...
Page 1 of 41234Next

 
Design by Free WordPress Themes | Bloggerized by Lasantha - Premium Blogger Themes | Lady Gaga, Salman Khan
Creative Commons License
Ethical Hacker's Zone by Thomas Rajasekar is licensed under a Creative Commons Attribution 3.0 Unported License. Twitter Bird Gadget