Archive for tutorials

Playing With Dns And Domain Names

Introduction
============
Information gathering on a target is a very important step in the process of evaluating the security of a remote host. This article will deal with many details you can get on a host starting from a simple domain name.
Note: This article will only deal with the information gathering part and won’t go in the [...]

Share and Enjoy:

How To Get A Person Ip Via Msn Or Yahoo Ect.

there are basically 2 methods you can use to get the Ip of the person
1. you need to make a direct connection with the person so you can get the Ip of the . here are the simple steps to follow
first goto command prompt and type in netstat -n it will give you the ips [...]

Share and Enjoy:

Modify Your CD-ROM to Watch DVD Movies

There are two types of CD-ROM drives we can mod:
24x to 40x
40x or higher
Drives slower than 24x are too old to be modded.
24x to 40x CD ROMs
Laser Head Adjustments:
The track pitch of CDs is 1.6 microns, and the track pitch of DVDs is only 0.8 microns. The minimum length of track pits of CDs is [...]

Share and Enjoy:

Top 10 Tricks to exploit SQL Server Systems

Whether it is through manual poking and prodding or the use of security testing tools, malicious attackers employ a variety of tricks to break into SQL Server systems, both inside and outside your firewall. It stands to reason then, if the hackers are doing it, you need to carry the same attacks to test the [...]

Share and Enjoy:

Turn Your Mobile Cam Into WEBCAM

If Guys don’t have a Web Camera and Still want to chat with friends on Yahoo and Skype then have a look at what we have got for you.
If you have a s60 Nokia Cell Phone with Camera you can use it like your Web Camera. The SmartCAM Application connect the PC to your mobile [...]

Share and Enjoy:

200 Best Hacking Tutorials

Hacking-Truths.net

http://depositfiles.com/files/ubdjayg2l

Share and Enjoy:

Share and Enjoy:

New Folder.exe Virus remove

Hello Friends, We all know about viruses.Virus is a computer program that can copy itself and infect a computer without permission or knowledge of the user. Trojan Horse, Backdoor are very harmful viruses which affect your computer as well as your important data in drives.It creates New Folder.exe or New Folder in every drive and [...]

Share and Enjoy:

Hacking Windows Administrator Password

u know why is it a “user” account because it lacks come service layer than that in “administrator” account
Using simple command line tools on a machine running Windows XP we will obtain system level privileges, and run the entire explorer process (Desktop), and all processes that run from it have system privileges. The system run [...]

Share and Enjoy:

What is port scanning?

What is port scanning?
It is similar to a thief going through your neighborhood and checking every door and window on each house to see which ones are open and which ones are locked.
TCP (Transmission Control Protocol) and UDP (User Datagram Protocol) are two of the protocols that make up the TCP/IP protocol suite which [...]

Share and Enjoy:

Removing Windows Messenger

1. For current user:
start -> run -> regedit
In : HKEY_CURRENT_USER\Software\Microsoft\Windows\CurrentVersion\Run
delete the key “MSMSGS”, then the Messenger will not start up for this user.
[When users logon, the Messenger will still start up]
2.use the “Group Policy Editor” (Start -> Run -> mmc, and then click OK)
File -> Add/Remove Snap-in -> Add -> Available Stand-alone Snap-ins -> Group [...]

Share and Enjoy: