The Flow of Packet Swithching
Data is transmitted from source to destination by packet switching. So what exactly is packet switching. In simple words when you send message through an email the message is broken into chunks of small size and then they travel to destination and again get recombined there, and message
Debug: Learn how to crack windows, programs ect manually
Debug is a program that comes with modern versions of DOS (I do not know when I started shipping out with DOS). Anyway, all Windows users should have it already. It’s a great tool for debuging programs, unassembling and cracking, and reading “hidden” memory areas like the boot sector, and
Burning BIN/CUE Images with Nero Burning Rom
BIN/CUE image format is quite common on the Internet. It might seem that finding an appropriate software for burning these images is quite hard. Luckily, it’s not. In addition to Golden Hawk CDRWin, the original software for BIN/CUE format, you can also use Nero Burning Rom to burn the images.
Auto End Tasks to Enable a Proper Shutdown
This reg file automatically ends tasks and timeouts that prevent programs from shutting down and clears the Paging File on Exit. 1. Copy the following (everything in the box) into notepad. QUOTE Windows Registry Editor Version 5.00 [HKEY_LOCAL_MACHINE\SYSTEM\CurrentControlSet\Control\Session Manager\Memory Management] “ClearPageFileAtShutdown”=dword:00000001 [HKEY_USERS\.DEFAULT\Control Panel\Desktop] “AutoEndTasks”=”1” [HKEY_LOCAL_MACHINE\SYSTEM\CurrentControlSet\Control] “WaitToKillServiceTimeout”=”1000” 2. Save the file
How to Attack IIS – Buffer Overflow
The Internet Information Server Attack – Remote buffer overflow exploit. By r00tsec from Security Espionage Community. Revised 03/16/00. This site is also available in plain text. Forewords: This text goes out to all those NT hackers out there. It is based on the info I have from eEye Digital Security
Announcing Green Planet Campaign – Amol Wagh
www.hackersenigma.com is announcing a green planet campign with three of partners named www.geniushackers.com, www.hackingethics.com and Youth Hackers Club. Under this campign we are creating a website named www.greenplanetcampaign.com This website will providing you database about green Buildings and other construction techniques. With this threre is also a section about green
Vulnerability Assessment
Basic Terms: Vulnerability: Drawback of a system through which hackers intrude in a network and get space to try attacks on administrators. Vulnerability is also known as Security Hole. Exploit: By taking advantage of the vulnerabilities when the attack is performed is called as exploit of the vulnerability. There can
Proxies Demystified
Understanding the concept of proxies first need little introduction about IP Address structure. IP Address: It is assigned when you connect to internet and gives idea about where your locality can be. Means if you perform some attack on private network your geographical location can be traced quickly with the
Hiding Your Computer on the Internet
When you use internet, you are connected to millions of PC’s out there. And each PC have its own unique address known as Static IP Address. This gives your identification by locality. Without a firewall, on a typical computer, even if well maintained, a remote person will still be able
How to Block Pop-Ups and Banner Ads
Follow The steps to block Pop up banners by changing settings in Internet Explorer. 1) Go to TOOLS and then INTERNET OPTIONS. 2) Click the SECURITY tab, move the slider up to HIGH and click APPLY. This applies the highest security settings to IE, which blocks