Pages

Wednesday, 22 May 2013

Backdoor for window xp and win 7.

Lets assume that you have just cracked victim's windows password.  or simply got access to his windows for some time.Can you make some changes in windows so that you could access the windows again even if victim changes the password ?? or Can you make any changes in your own windows so that you could access it anytime even if anybody sets/changes password ?
Simply Can we set a backdoor in windows ?
Yes we can :) .
Backdoor actually means maintaining access.
okay lets do one thing first. Open your command prompt (run as administrator in win 7/vista).

How to Hack WiFi Password ?


First of all you need to scan for available wireless networks.

you can use“NetStumbler” or “Kismet” for Windows and Linux and KisMac for Mac.

It’ll also show how the Wi-fi network is encrypted. The two most common encryption techniques are:

1) WEP (Wire Equivalent Privacy )

2) WAP(Wireless Application Protocol)

Sunday, 19 May 2013

File system

When you format a hard drive or a flash drive, you prepare it for its use as a storage medium by an operating system. During this process a file system is set up and all information previously stored on the drive is removed.
You may have heard of computer file systems like FAT or NTFS before, but do you actually know what they do and which ones you are using? This article explains how they work and what their differences are.

E-mail..working,travelling,sending fake email.

Email stands for Electronic Mail. Email sending and receiving is controlled by the Email servers.Email service providers configure Email Server before anyone can Sign into his or her account and start communicating digitally.Users from across the world register in to these Email servers and setup an Email account.

Shortcut Keys For Windows 8.



1) Windows key : Access the Start screen
2) Windows+D : Access the Desktop.
3) Windows+C : Show the Charms.
4) Windows+Q (or just start typing when you are on the Start menu) : Search
5) Windows+H : Share
6) Windows+K : Start Windows Devices

Friday, 17 May 2013

difference between core i3,i5,i7

Core i3:
* Entry level processor.
* 2-4 Cores
* 4 Threads
* Hyper-Threading ­ (efficient use of processor resources)
* 3-4 MB Catche

Wednesday, 15 May 2013

TCP/IP model

The TCP/IP Model separates networking functions into discrete layers. Each layer performs a specific function and is transparent to the layer above it and the layer below it.The TCP/IP model is one of the two most common network models, the other being the OSI Model.
The TCP/IP network model breaks down into four (4) layers:
  • Application Layer
  • Transport Layer
  • Internet Layer
  • Network Access Layer