Thursday, 17-01-2019, 3:59 AM
Welcome Guest | RSS

Basic Understanding:

INTRODUCTION:

... Read more »

Views: 1382 | Added by: rjc09 | Date: 22-09-2012 | Comments (1)

::::OLD BUT WORKING TRICK::::

Forgot memory card password???
... Read more »
Views: 383 | Added by: Kais | Date: 15-05-2012 | Comments (0)

Cracking Zip Password Files

Tut On Cracking Zip Password Files..
What is FZC? FZC is a program that cracks zip files (zip is a method of compressing multiple files into one smaller file) that are password-protected (which means you're gonna need a password to open the zip file and extract files out of it). You can get it anywhere - just use a search engine such as altavista.com.
FZC uses multiple methods of cracking - bruteforce (guessing passwords systematically until the program gets it) or wordlist attacks (otherwise known as dictionary attacks. Instead of just guessing passwords systematically, the program takes passwords out of a "wordlist", which is a text file that contains possible passwords. You can get lots of wordlists at www.theargon.com.).
Views: 885 | Added by: Kais | Date: 04-05-2012 | Comments (0)

~~~~~~~~~COMMON FTP ERROR CODES~~~~~~~~~~

# Description

110 Restart marker reply. In this case, the text is exact and not left to the particular implementation; it must read: MARK yyyy = mmmm where yyyy is User-process data stream marker, and mmmm server's equivalent marker (note the spaces between markers and "=").

120 Service ready in nnn minutes.

125 Data connection already open; transfer starting.

150 File status okay; about to open data connection.

Views: 427 | Added by: Kais | Date: 04-05-2012 | Comments (0)

Keep Folders Hidden

first create a new folder somewhere on your hard drive
when you name it hold down "Alt" and press "0160" this will create and invisible space so it will apper as if it has no name.
then right click in and select "Properties" select the tab "coustimize" and select "change icon" scroll along and you should a few blanc spaces click on any one and click ok when you hav saved the settings the folder will be invisible to hide all your personal files
Views: 372 | Added by: Kais | Date: 21-04-2012 | Comments (0)

BIOS Update Procedure

All latest Motherboards today, 486/ Pentium / Pentium Pro etc.,ensure that upgrades are easily obtained by incorporating the system BIOS in a FLASH Memory component. With FLASH BIOS, there is no need to replace an EPROM component. Once downloaded, the upgrade utility fits on a floppy disc allowing the user to save, verify and update the system BIOS. A hard drive or a network drive can also be used to run the newer upgrade utilities. However, memory managers can not be installed while upgrading.

Most pre-Pentium motherboards do not have a Flash BIOS. The following instructions therefore do not apply to these boards. If your motherboard does not have a Flash BIOS (EEPROM) you will need to use an EPROM programmer to re-program the BIOS chip. See your deale ... Read more »
Views: 448 | Added by: Kais | Date: 21-04-2012 | Comments (0)

Backtracking EMAIL Messages  

Ask most people how they determine who sent them an email message and the response is almost universally, "By the From line." Unfortunately this symptomatic of the current confusion among internet users as to where particular messages come from and who is spreading spam and viruses. The "From" header is little more than a courtesy to the person receiving the message. People spreading spam and viruses are rarely courteous. In short, if there is any question about where a particular email message came from the safe bet is to assume the "From" header is forged.

So how do you determine where a message actually came from? You have to understand how email messages are put together in order to backtrack an email message. SMTP is a text based proto ... Read more »
Views: 8924 | Added by: Kais | Date: 21-04-2012 | Comments (0)

  ***********************************************
     *                                             *
     * Advanced Shellcoding Techniques - by   Kay  *
     *                                             *
     ***********************************************

Introduction

This paper assumes a working knowledge of basic shellcoding ... Read more »
Views: 431 | Added by: Kais | Date: 21-04-2012 | Comments (3)

20 Great Google Secrets



Google is clearly the best general-purpose search engine on the Web (see

www.pcmag.com/searchengines

But most people don't use it to its best advantage. Do you just plug in a keyword or two and hope for the best? That may be the quickest way to search, but with more than 3 billion pages in Google's index, it's still a struggle to pare results to a manageable number.

But Google is an remarkably powerful tool that can ease and enhance your Internet exploration. Google's search options go beyond simple ke ... Read more »
Views: 7564 | Added by: Kais | Date: 15-03-2012 | Comments (0)

10 Fast and Free Security Enhancements 

Before you spend a dime on security, there are many precautions you can take that will protect you against the most common threats.

1. Check Windows Update and Office Update regularly (_http://office.microsoft.com/productupdates); have your Office CD ready. Windows Me, 2000, and XP users can configure automatic updates. Click on the Automatic Updates tab in the System control panel and choose the appropriate options.

2. Install a personal firewall. Both SyGate (_www.sygate.com) and ZoneAlarm (_www.zonelabs.com) offer free versions.


Views: 391 | Added by: Kais | Date: 15-03-2012 | Comments (0)

« 1 2 3 4 »