Basic Terms: Vulnerability: Drawback of a system through which hackers intrude in a network and get space to try attacks on administrators. Vulnerability is also known as Security Hole. Exploit: By taking advantage of the vulnerabilities when the attack is performed is called as exploit of the vulnerability. There can
Understanding the concept of proxies first need little introduction about IP Address structure. IP Address: It is assigned when you connect to internet and gives idea about where your locality can be. Means if you perform some attack on private network your geographical location can be traced quickly with the
When you use internet, you are connected to millions of PC’s out there. And each PC have its own unique address known as Static IP Address. This gives your identification by locality. Without a firewall, on a typical computer, even if well maintained, a remote person will still be able
Follow The steps to block Pop up banners by changing settings in Internet Explorer. 1) Go to TOOLS and then INTERNET OPTIONS. 2) Click the SECURITY tab, move the slider up to HIGH and click APPLY. This applies the highest security settings to IE, which blocks
Open a dos prompt and type the command convert d: /fs:NTFS This command would convert your d: drive to NTFS If the system cannot lock the drive, you will be prompted to convert it during next reboot. Normally you should select yes. Conversion from fat/fat32
1. Click on “Start” in the bottom left hand corner of screen 2. Click on “Run” 3. Type in “command” and hit ok You should now be at an MSDOS prompt screen. 4. Type “ipconfig /release” just like that, and hit “enter” 5. Type “exit” and leave the prompt 6.
Dear friends finding problem for Compaq drivers please click the link below http://h10025.www1.hp.com/ewfrf/wc/softwareList?os=228&lc=en&cc=in&dlc=en&product=3446906&lang=en.
Dear friends, Sometimes you face a problem regarding opening of applications.They are drives or .exe files but still they prompt us to open with.The main cause to this problem is that your application is infected with a virus AUTORUN.INF.This virus can be deleted manually by exploring the application.The other solution
a)Keep the wireless LAN when not required. b)Charge the laptop battery only when completely drained. c)Please keep the laptop on the minimal power management option from the following path:Start->Control panel->Power options->minimal battery battery mode. d)Defragement your hard drive regularly. e)If you have a graphics card but rarely use it then
Ethical Hacking Series : Chunk 1 Ethical hacking basically means preventing criminal hackers from stealing information of any personal computer r corporate network. Ethical hackers use same technology – software and tool that criminal hackers uses. But they use them for preventing crimes. Penetration testing and vulnerability assessing are the