March 2009

Don't you feel like crying every time you add another disc to your pile of scratched discs. Trashing that disc which contained your favorite songs, pics, files, games or videos is not easy.
Read-on, if you find yourself wishing for a miracle every time your fav CD is scratched:

Home Remedy:
Here's an easy home remedy, which might give you the desired results. Rub a small amount of toothpaste on the scratch and polish the CD with a soft cloth and any petroleum-based polishing solution (like clear shoe polish). Squirt a drop of Brasso and wipe it with a clean cloth.Read more..

Your rating: None Average: 3.3 (4 votes)

Harmful Email Subjects to Avoid

I. Emails from people trying to infect your system and steal your  friends' email addresses for spam

I.1. Pictures of Osama Bin Laden hanging or Arnold Schwarzenegger's
suicide note
I.2. Email that seems to come from your system administrator or
other familiar sender that says your email could not be
delivered, or some similar statement.
I.3. Email with subject "Against!" or "Revenge"
I.4. Email with subject Re_ and body with animals or foto or other

II. Emails from people trying to steal your identity (and your money)

II.1. Update Your Billing Information (from eBay)
II.2. Your account at eBay has been suspended
II.3. Your account at Wells Fargo has been suspended
II.4. Notification of US Bank Internet Banking
II.5. Attn: Citibank Update
II.6 Confirm AOL Billing Info

III. Emails from people trying to fool you into hurting yourself or  your friends and coworkers

III.1 Subject: "jdbg" Virus: how to detect and remove.

More Details About Each AttackRead more..

Your rating: None Average: 2 (1 vote)

Build a music-driven miniature laser light show using a laser pointer, an old speaker, and a coffee can. The motion of the laser will be directed by music that you play.
Your rating: None Average: 2 (2 votes)

In this article I am trying to explain what DDOS is and how it can be prevented. DDOS happens due to lack of security awareness of the network/server owners. On a daily basis we hear that a particular machine is under DDOS attack or NOC has unplugged the machine due to DDOS attack . So DDOS has become one of the common issues in this electronics world. DDOS is like a disease which doesn't have an anti-viral developed. So we should be carefull while dealing with it . Never take it lightly. In this article i am trying to explain the steps/measures which will help us defend from DDOS attack ,up to a certain extend .

What is a DDOS attack?
   Simply said, DDOS is an advanced version of DOS attack . Like DOS , DDOS also tries to deny the important services running on a server by broadcasting packets to the destination server in a way that the Destination server cannot handle it. The speciality of the DDOS is that, it relays attacks not from a single network/host like DOS. The DDOS attack will be launched from different dynamic networks which has already been compromised.
Read more..
Your rating: None Average: 2 (1 vote)

Blocking and preventing brute force attacks is one of the main things you want to do on your web server to add a layer of security. While someone might not be targeting your site or server specifically, they will have automated tools that will try to guess random usernames and passwords that are common against your system. They’re essentially forcing their way to user only authorized area’s of a system, such as FTP accounts, e-mail accounts, databases, script based administration areas and root or any shell access are most common attempts.
 They will try multiple login attempts, guessing usernames and passwords, trying to force their way onto your machine, This is a large topic with a lot of things to cover, I’ll try to do my best to help you understand how brute force attacks work, prevention, signs of an attack, and tools to help stop brute force attacks, This article will not cover session brute force attempts for web applications, in a future article I’ll cover that but for now we’re looking at main service daemons such as ftp and shell.

How the brute force attack works
Read more..
Your rating: None Average: 1 (1 vote)

So many people are getting their own dedicated servers but are completely clueless about security. Usually they leave it up to the company where they purchase it or hire someone. That's fine but make sure you have these 10 items covered.

Use a Firewall

Read more..
Your rating: None Average: 3 (2 votes)

How to crack things like FTP/SSH/POP3 etc. Well, here is a quick way to do this for all you Windows users out there, provided you have a decent sized password dictionary. I personally use one of about 3.16GB in size, but for this tutorial I'm only going to use a small password list, just so you get the feel of it. First step, download hydra either from it's homepage ([url=",as"],as[/url] that's what this tutorial is written for. Download the zip file, extract it, and make sure you see the files below


If you do, that's good. Go to Start > Run > cmd to open the command prompt. Then change to your hydra folder using the “cd” command. For example my hydra folder was on the desktop, so I did this

ImageRead more..

Your rating: None Average: 3.2 (9 votes)

From time to time I am asked to break a password on an Adobe PDF file. This mostly comes up when the user who created the pdf can’t remember what their own password is. As annoying as that is, actually recovering the password is simple using pdfcrack.

PDFCrack is a GNU/Linux application (or any other POSIX-compatible system) tool for recovering passwords and content from PDF-files. It is small, command line driven, and without external dependencies. PDFCrack is released under GPL.

Install pdfcrack on Ubuntu by typing:
sudo aptitude install pdfcrack

Run a quick benchmark by entering the following at the command line:
pdfcrack -b


Benchmark: Average Speed (calls / second):
MD5: 2616026.7
MD5_50 (fast): 146928.3
MD5_50 (slow): 107780.3

RC4 (40, static): 863985.7
RC4 (40, no check): 864661.2
RC4 (128, no check): 802203.0

Benchmark: Average Speed (passwords / second):
PDF (40, user): 653588.2
PDF (40, owner): 322317.1
PDF (40, owner, fast): 714278.6Read more..

Your rating: None Average: 1.5 (2 votes)

Have you ever just finished something important and all of a sudden the lights dim, your PC begins to sound like the clothes washer, and then bam, your work is gone? Been there, done that, got the t-shirt, right? Maybe I should have taken my watch off before sticking my hand in that running PC after all.

Well, the thing that annoys me most is, not losing the work, but knowing I’ll have to spend the next two days rebuilding the system just in order to recover whatever I was working on. Like a good boy, I save my work to multiple locations. If you care about it, don’t trust it to a computer, I always say. Strange advice from someone who is a computer professional.

Anyway, the solution to this problem has always been to ghost your system. Ghosting your system means making a backup image, applications and all, so that you can restore your system to a running state quickly. Strangely enough the product most people use to do this is called Ghost. Get it? Ghosting? If you have ever used the recovery CD that may have come with your system then you have probably used Ghost without knowing it.Read more..

Your rating: None Average: 2 (1 vote)

The following article will discuss ways that you can watch satellite TV on Your PC, via FTA (Free to Air) streams as well discusses the processes that people use to decode encrypted streams. (Think DirecTV and DishNetwork)

This guide describes actions that may or may not be legal in your location. I do not advocate, condone, or practice satellite TV piracy. It is not my fault if you use this information illegally.

Should you choose to watch signals from a "bird" with pay channels, and decrypt them, you legally can only watch the channels you pay for, meaning you have a set top box hooked up to your TV as well. I suggest deleting the channels you don't pay for from the channel list in the program I discuss below, so you aren't tempted to watch them illegally.

 Read more..

Your rating: None Average: 1 (1 vote)

Read more..
Your rating: None Average: 3.5 (2 votes)

Mobile devices are almost becoming as ubiquitous as email addresses - that is, almost everyone has one. So it makes sense to consider mobile group messaging using SMS.

Specifically - for special occasions, events, or just a quick way to keep in touch with a group of people, mobile group messaging is fun and informative.

TextMarks and Tatango are two services that allow anyone to use subscription-based messaging, right on the web. All you need is a mobile phone, and friends, family, or contacts also equipped with a mobile phone.

Setting up a subscription

Your subscription is useless without a keyword. Both TextMarks and Tatango offer custom keywords (for a price), or default ones for free. Let's say our keyword is "bakesale526" - which we have set up for a bake sale we are hosting on May 26.

Your group members can opt-in by sending a text message to 41411 (TextMarks) or 68398 (Tatango). The message should just be the keyword itself. It's that simple to subscribe.Read more..

Your rating: None Average: 3 (2 votes)

This video tutorial teaches you how you can crack a window vista password.
Due to the lack of LM hashes, Vista passwords stored in the SAM file are harder to crack. However, the NTLM hash is the same as always and can be cracked if the password is weak.
Warning:for home use only
Your rating: None Average: 3.7 (3 votes)

       Address resolution protocol or ARP is a protocol that is used to get the hardware address (MAC) of a device on the network with its IP address (Network Layer). RARP does the opposite of ARP; it will look up the IP address with the MAC address. RARP works a little differently, it will send out a broadcast asking who has the MAC address, a RARP server will then respond with the nodes IP address. ARP is commonly used in Ethernet networks but can also be used in other types of networks. Ipv6 doesn’t use ARP, but rather NDP (Network Discovery Protocol). In order for Ethernet to send data it needs the MAC address of the receiving device.

A MAC address uniquely identifies a device on the network and is in the Data Link level (level 2) of the OSI model. These MAC addresses are burned into the network card by the manufacture and are should be the only one in the world. The first 6 digits of the MAC address is assigned to the network interface card is the manufacture ID and the last 6 is the cards serial number. You can change your MAC at the software level (it wont change the burned in MAC address on the NIC) fairly easily. Read more..
Your rating: None Average: 3 (2 votes)


Download one of these iso files with or without default system upgrade.
I have split this iso into six peices to facilitate easy download. supports download managers so don't worry.
Read more..
Your rating: None Average: 3.7 (3 votes)

Invite your friends using our tell a friend application.Its very simple just login to any of your Mail/IM/Social network account using our application and select all your contacts which you want to invite and click on the send button

We will tell you how to connect two computers together to enable simple file and resource sharing. This method is applicable only if you have wireless adapters or Wi-Fi cards installed in both PCs.

To follow the wireless way, you just need a Wi-Fi card in each computer. This method is also known as Adhoc wireless networking. If you are using a laptop, chances are you already have Wi-Fi adapters built in.

We refer to the two computers as PC1 and PC2.

We configure both the computers as given below,


1. Just right-click “My Computer” and click Properties.
2. Select the “Computer Name” tab and click the “Change” button.
3. Change the computer name to whatever you want, here we name it PC1. Change the workgroup to WG. (The workgroup name should be the same in both computers)
4. Click OK.Read more..

Your rating: None Average: 3 (3 votes)

If your company is like most companies, you have users running as local administrators on their desktop. There are solutions to eliminate this need, which is a direction every company should make. When users run as local administrators, the IT staff has no control over that user or their desktop. In order for you to secure the local Administrators group on every desktop, you need to have some powerful tools to get the job done. There are typically three different tasks that you need to perform to secure this group, which we will cover in this article. Windows Server 2008 and Windows Vista SP1 (with the RSAT installed) provide amazing new controls that make these configurations a breeze!

Task 1 - Remove Domain User Account

The initial task of securing the local Administrators group is to ensure that the user no longer has membership in the group. This is easier said than done, since most companies have configured the user’s domain account to have membership in this group at installation of the user’s computer. Read more..

Your rating: None Average: 3 (2 votes)

Learn how to get free electricity from your home telephone line just by watching this video. Save money on your power bill, and [email protected] into the electricity coming out of the phone jack. The phone company doesn't monitor electricity usage, so you can probably get away with this con. Check out this video tutorial and learn how to tap into the electrical energy source in your phone line.
Free Hidden Electricity! - video powered by Metacafe
Your rating: None Average: 3.7 (3 votes)

I love music. I don’t know many people who really don’t enjoy music on their computer, especially while doing mundane tasks or surfing. It just seems to make the time go by faster and make it slightly more enjoyable. I found this little site called Filtermusic and it really has made my enjoyment of music that much greater.

What is it?

Essentially, Filtermusic is a listing of Interweb radio stations that stream in high quality (128Kbps) and feature uninterrupted play. That’s one of the greatest features. To listen to their streams, they just require that you have either iTunes, VLC, or Winamp. With some additional tools you can record streaming music as MP3 files as well.Read more..

Your rating: None Average: 4 (2 votes)



Sponsered links

Bookmark Us!


Page Rank


A fundamental rule in technology says that whatever can be done will be done.

Explore Tags

Follow Us