...
Monday, 30 July 2012
Windows User Account Hacking
09:01
Thomas Rajasekar
99 comments
Windows user Account can be Hacked by using Command Prompt.This type of Hacking is done in order to gain illegal access to the user account and steal the data in the system.
Note:This type of Hacking can be done only on User Accounts which have Administrative rights.
Commands Used For User Account Hacking
1.To See all the account present on the Computer.
Net user
2.To change the password of a User account without knowing the old password.
Net user administrator *
3.To make a new user account.
Net user hacker /add
4.To Delete the existing user account.
Net user hacker /delete
5.To make a hidden...
Saturday, 21 July 2012
10 Reasons Why PC's crash
10:30
Thomas Rajasekar
14 comments
Fatal error: The system has become unstable or is busy," it says. "Enter to return to Windows or press Control-Alt-Delete to restart your computer. If you do this you will lose any unsaved information in all open applications."You have just been struck by the Blue Screen of Death. Anyone who uses Microsoft Windows will be familiar with this. What can you do? More importantly, how can you prevent it happening?1 Hardware conflictThe number one reason why Windows crashes is hardware conflict. Each hardware device communicates to other devices through an interrupt request channel (IRQ). These are supposed to be unique for each device.For example,...
Wednesday, 18 July 2012
EMAIL HACKING
10:11
Thomas Rajasekar
357 comments
Email hacking is illegal access to
an email account or email correspondence.Email on the internet is now commonly sent by
the Simple Mail Transfer Protocol (SMTP). This does not encrypt the text
of emails and so intercepted mail can be read easily unless the user adds their
own encryption. The identity of
the sender or addressee of an email is not authenticated and this provides opportunities for
abuse such as spoofing.
Email Spoofing
Email spoofing is a
technique used by hackers to fraudulently send email messages in which the
sender address and other parts of the email header are...
Sunday, 8 July 2012
Working of an ethical hacker
09:32
Thomas Rajasekar
22 comments
Obeying the Ethical Hacking Commandments
Every Ethical Hacker must follow few basic principles. If he do not follow, bad things can happen. Most of the time these principles get ignored or forgotten when planning or executing ethical hacking tests. The results are even very dangerous.
Working ethically
The word ethical can be defined as working with high professional morals and principles. Whether you’reperforming ethical hacking tests against your own systems or for someone who has hired you, everything you do as an ethical Hacker must be approved and must support the company’s goals. No hidden agendas are allowed!Trustworthiness...
Thursday, 5 July 2012
Prevention from Hackers
10:18
Thomas Rajasekar
11 comments
What can be done to prevent Hackers from finding new holes in software and exploiting them? Information security research teams exist to try to find these holes and notify vendors before they are exploited. There is a beneficial competition occurring between the Hackers securing systems and the Hackers breaking into those systems. This competition provides us with better and stronger security, as well as more complex and sophisticated attack techniques.Defending Hackers create Detection Systems to track attacking Hackers, while the attacking Hackers develop bypassing techniques, which are eventually resulted in bigger and better detecting and tracking systems. The net result of this interaction is positive, as it produces smarter people, improved security, more stable software,inventive...
Tuesday, 3 July 2012
Google At A Glance
07:44
Thomas Rajasekar
3 comments
Click here to Download a Powerpoint Presentation about Google&nbs...
Ethical Hacking
04:55
Thomas Rajasekar
70 comments
Ethical Hacking is testing the resources for a good cause and for the betterment of technology. Technically Ethical Hacking means penetration testing which is focused on Securing and Protecting IT Systems.
Ethical Hacker
The term 'Ethical Hacker' refers to Security Professionals who apply their hacking skills for Defensive purposes....
Types of Hackers
04:46
Thomas Rajasekar
20 comments
Coders
The Real Hackers are the Coders, the ones who revise the methods and create tools that are available in the market. Coders can find security holes and weaknesses in software to create their own exploits. These Hackers can use those exploits to develop fully patched and secure systems.Coders are the programmers who have the ability to find the unique vulnerability in existing software and to create working exploit codes. These are the individuals with a deep understanding of the OSI Layer Model and TCP/IP Stacks.
Admins
Admins are the computer guys who use the tools and exploits prepared by the coders. They do not develop their own techniques, however they uses the tricks which are already prepared by the coders. They are generally System Administration,...
Hacker vs. Cracker
04:29
Thomas Rajasekar
28 comments
What Is the Difference Between a Hacker and a Cracker?
Many articles have been written about the difference between Hackers and crackers, which attempt to correct public misconceptions about hacking. For many years, media has applied the word Hacker when it really means Cracker. So the public now believe that a Hacker is someone who breaks into computer systems and steal confidential data. This is very untrue and is an insult to some of our most talented Hackers.
There are various points to determine the difference between Hackers and crackers
Hacker
Definition - A Hacker is a person who is interested in the working of any computer Operating system. Most often,Hackers are programmers. Hackers obtain advanced knowledge of operating systems and programming languages....
Hacker
04:13
Thomas Rajasekar
172 comments
Hacker is a word that has two meanings:Traditionally, a Hacker is someone who likes to play with Software or Electronic Systems. Hackers enjoy Exploring and Learning how Computer systems operate. They love discovering new ways to work electronically.Recently, Hacker has taken on a new meaning — someone who maliciously breaks into systems for personal gain.Technically, these criminals are Crackers as Criminal Hackers. Crackers break into systems with malicious intentions.They do it for Personal gain, Fame, Profit and even Revenge. They Modify, Delete and Steal critical information,often making other people's life miserable.Hacking has a lot of meanings depending upon the person’s knowledge and his work intentions. Hacking is an Art as well as a Skill. Hacking is the knowledge...
What Is Hacking
02:03
Thomas Rajasekar
6 comments
The Art of exploring various security breaches is termed as Hacking.Computer Hackers have been around for so many years. Since the Internet became widely used in the World, We have started to hear more and more about hacking. Only a few Hackers, such as Kevin Mitnick, are well known.In a world of Black and White, it’s easy to describe the typical Hacker. A general outline of a typical Hacker is an Antisocial, Pimple-faced Teenage boy. But the Digital world has many types of Hackers.Hackers are human like the rest of us and are, therefore, unique individuals, so an exact profile is hard to outline. The best broad description of Hackers is that all Hackers aren’t equal. Each Hacker has Motives, Methods and Skills. But some general characteristics can help you understand...