Hey all, If some of you get the message saying “Guess who your admirer is… goto ‘yourcrushisreal.com’ (Don’t Click Just Read) Or “omg! you have a secret crush!! see who it is now goto your crushisreal.com Don’t go to it, Just delete ! (I got this message of alert from
Basic Terms: Vulnerability: Drawback of a system through which hackers intrude in a network and get space to try attacks on administrators. Vulnerability is also known as Security Hole. Exploit: By taking advantage of the vulnerabilities when the attack is performed is called as exploit of the vulnerability. There can
Many BIOS manufacturers have provided backdoor passwords that can be used to access the BIOS setup in the event you have lost your password. These passwords are case sensitive, so you may wish to try a variety of combinations. Keep in mind that the key associated to “_” in
Understanding the concept of proxies first need little introduction about IP Address structure. IP Address: It is assigned when you connect to internet and gives idea about where your locality can be. Means if you perform some attack on private network your geographical location can be traced quickly with the
When you use internet, you are connected to millions of PC’s out there. And each PC have its own unique address known as Static IP Address. This gives your identification by locality. Without a firewall, on a typical computer, even if well maintained, a remote person will still be able
Ethical Hacking Series : Chunk 1 Ethical hacking basically means preventing criminal hackers from stealing information of any personal computer r corporate network. Ethical hackers use same technology – software and tool that criminal hackers uses. But they use them for preventing crimes. Penetration testing and vulnerability assessing are the
Imagine , You have a computer system or a network. You have plenty of anti viruses and firewalls installed on your system for security. Still there is a security flaw, and it is biggest through which hackers or viruses attacks. All these security softwares are
Well one of the famous, easy and easy to understand type of hacking is Net Bios. You can play with it as follows. Disclaimer: We don’t take any responsibility for Illegal use of this tutorial. Step 1 Get a IP (range) scanner. (superscanner is a fast one, get it here).