Ethical Hacking Series : Chunk 1 Ethical hacking basically means preventing criminal hackers from stealing information of any personal computer r corporate network. Ethical hackers use same technology – software and tool that criminal hackers uses. But they use them for preventing crimes. Penetration testing and vulnerability assessing are the
Imagine , You have a computer system or a network. You have plenty of anti viruses and firewalls installed on your system for security. Still there is a security flaw, and it is biggest through which hackers or viruses attacks. All these security softwares are
How to create a bootable Windows XP SP1 CD (Nero): Tip :You can replace XP SP1 with SP2 and 3 as mentioned in disk files. Step 1 Create 3 folders – C:\WINXPSP1, C:\SP1106 and C:\XPBOOT Step 2 Copy the entire Windows XP CD into folder C:\WINXPSP1 Step 3 You will
With this tutorial u can translate almost any binary file to text. This is a type of cryptographic translation which is commonly used in password creating. Cryptography is a language where we encrypt secret data. And Binary is also one of its way. This tutorial I used in initial stage
Well one of the famous, easy and easy to understand type of hacking is Net Bios. You can play with it as follows. Disclaimer: We don’t take any responsibility for Illegal use of this tutorial. Step 1 Get a IP (range) scanner. (superscanner is a fast one, get it here).