Pages

Wednesday 22 May 2013

Backdoor for window xp and win 7.

Lets assume that you have just cracked victim's windows password.  or simply got access to his windows for some time.Can you make some changes in windows so that you could access the windows again even if victim changes the password ?? or Can you make any changes in your own windows so that you could access it anytime even if anybody sets/changes password ?
Simply Can we set a backdoor in windows ?
Yes we can :) .
Backdoor actually means maintaining access.
okay lets do one thing first. Open your command prompt (run as administrator in win 7/vista).

How to Hack WiFi Password ?


First of all you need to scan for available wireless networks.

you can use“NetStumbler” or “Kismet” for Windows and Linux and KisMac for Mac.

It’ll also show how the Wi-fi network is encrypted. The two most common encryption techniques are:

1) WEP (Wire Equivalent Privacy )

2) WAP(Wireless Application Protocol)

Sunday 19 May 2013

File system

When you format a hard drive or a flash drive, you prepare it for its use as a storage medium by an operating system. During this process a file system is set up and all information previously stored on the drive is removed.
You may have heard of computer file systems like FAT or NTFS before, but do you actually know what they do and which ones you are using? This article explains how they work and what their differences are.

E-mail..working,travelling,sending fake email.

Email stands for Electronic Mail. Email sending and receiving is controlled by the Email servers.Email service providers configure Email Server before anyone can Sign into his or her account and start communicating digitally.Users from across the world register in to these Email servers and setup an Email account.

Shortcut Keys For Windows 8.



1) Windows key : Access the Start screen
2) Windows+D : Access the Desktop.
3) Windows+C : Show the Charms.
4) Windows+Q (or just start typing when you are on the Start menu) : Search
5) Windows+H : Share
6) Windows+K : Start Windows Devices

Friday 17 May 2013

difference between core i3,i5,i7

Core i3:
* Entry level processor.
* 2-4 Cores
* 4 Threads
* Hyper-Threading ­ (efficient use of processor resources)
* 3-4 MB Catche

Wednesday 15 May 2013

TCP/IP model

The TCP/IP Model separates networking functions into discrete layers. Each layer performs a specific function and is transparent to the layer above it and the layer below it.The TCP/IP model is one of the two most common network models, the other being the OSI Model.
The TCP/IP network model breaks down into four (4) layers:
  • Application Layer
  • Transport Layer
  • Internet Layer
  • Network Access Layer

OSI model--open system interconnect

The Open Systems Interconnect (OSI) model has seven layers.The layers are stacked this way:
  • Application
  • Presentation
  • Session
  • Transport
  • Network
  • Data Link
  • Physical

Tuesday 14 May 2013

login in window xp without knowing password:


if u forgot password or want to log on in others computer just follow this trick....
1) Start computer
2) When it asks for password press ctrl+alt+delete ­ keys twice

networking -questions & answers

1)Wi-Fi is a -
a) type of computer
b) type of network cable
c) set of popular technologies and standards for wireless computer networking
d) set of computer programs that help people make money on the Internet

DBMS-question & answers

1) The DBMS acts as an interface between what two components of an enterprise-class database system?
a) Database application and the database
b) Data and the database
c) The user and the database application
d) Database application and SQL

hack the window password using the backdoor

Now I am going to teach you how to hack windows password with use of a backdoor. You should already know that you can change the password on windows, without knowing the old one, using CMD.
the only problem with this method, is that you can’t open it on logon-screen.

Friday 10 May 2013

Immunity Debugger


Immunity Debugger is a powerful new way to write exploits, analyze malware, and reverse engineer binary files. It builds on a solid user interface with function graphing; the industry's first heap analysis tool built specifically for heap creation, and a large and well supported Python API for easy extensibility.

Browse hijacking




Browser hijacking is a type of online fraud. Scammers use malicious software to take controlof your computer's Internet browser and change how and what it displays when you're surfing the web.

How do you know if your browser has been hijacked?

•Home page or other settings change on your computer. Links are added that point to websites that you'd usually avoid.

Some facts about computers and IT Field.



1.A byte means 8 bits and a nibble means 4 bits.
2.First harddisk available was of 5MB
3.Ethernet is the registered trademark 0f Xerox.
4.google uses over 10000 network computers to crawl the web
5.Google can be queried in 26 languages
6.The floopy disk was patented by allen shugart in 1946.
7.More than 80% of web pages are in english.

how to become hacker?



1. Have the 'hacker' attitude
2. Improve your logical thinking
3. Practice your English
4. Learn programming languages

errors meaning while browsing.

Most of us come across the internet errors, during browsing.. Here i give the correct meanings or the mistakes which we have done..

Error 400 - Bad request.
Error 401 - unauthorized
request.
Error 403 - forbidden.
Error 404 - Not found.
Error 500 -Internal error.
Error 501 - Not Implemented
Error 502 - Bad Gateway
Error 503 -Service unavailable.
Error 504 - Gateway Time-Out
Error 505 - HTTP Version not supported/DNS Lookup Fail/unknwn host
Error 500-599 - Server Errors.

full form of hacker


H - Hide IP
A - Aim Victim
C - Crack Encrypt
K - Kill Firewall
E - Enter into Database
R - Return Anonymous

Thursday 2 May 2013

hiding data behind images.

The art and science of hiding information by embedding messages within other, seemingly harmless messages. Steganography works by replacing bits of useless or unused data in regular computer files (such as graphics, sound, text, HTML, or even floppy disk ) with bits of different, invisible information. This hidden information can be plain text cipher text or even images.