2010-06-13 12:48
Steps Hack a Windows Password === 1Go to
Start-Run-cmd, and then press ENTER. 2 Type in Net User and then press ENTER.
3Look through the list for the user whose password you would like to reset. 4
Type in net user [UserNameHere]* (ex. net user Administrator *) 5Press ENTER
three times to blank out...
2010-06-13 12:41
areyou forgot your Windows 7 password when someday you
open your computer? Need someone to help but can’t find a expert? Don’t worry,
Today I will show you some ways to let you easy slove your problem. Password
Reset Disk Mircrosoft Windows allow you to create a lost or forgotten password.
The...
2010-06-13 12:36
Come and learn how to hack into Twitter accounts.
Personally, I think Twitter is probably the most ridiculous and also the most
insecure micro-blogging platform in the World Wide Web today. Believe me when I
say that it is not really hard to hack into Twitter accounts! What do you have
to do in...
2010-06-11 23:46
I have been quite impressed by the stability and speed
of my computer since removing Vista and installing various flavors of Linux.
Sometimes, however, there is software that I want to run that is only available
in Windows. For example, I...
2010-06-11
23:43
Wireless networking is convenient, fast, and provides
a lot of computing mobility. Wifi does, however, require extra measures if it is
to be as secure as hard-wired networks. And WPA is the standard to use.
SURVEILANCE OF WIFI NETWORKS Consider for a...
2010-06-11 23:34
This is the antenna to build when you want results
FAST and have just a few inexpensive tools and supplies available. It will
extend your wi-fi range well beyond the limits of the dipoles that accompany
most routers and some wireless adapters. When connected to a USB wireless...
2010-06-08 18:04
I wanted to be able to run Backtrack on my laptop,
without the worry of having it dual booted, and be able to save my data, such as
wallpaper, updates, and settings. Unfortunately all the walkthroughs I could
find either didn't work or ended up being a live cd on a flash drive.
So,...
2010-06-08 17:56
To increase BSNL broadband speed, just follow these 6
BSNL hacks: 1. Change BSNL DNS servers: The main reason for slow BSNL Broadband
connection speed is slow BSNL DNS servers. So, we can increase BSNL Broadband
connection speed by changing default BSNL DNS servers to fast BSNL DNS servers,
which...
2010-06-08
17:51
How to crack things like FTP/SSH/POP3 etc. Well, here
is a quick way to do this for all you Windows users out there, provided you have
a decent sized password dictionary. I personally use one of about 3.16GB in
size, but for this tutorial I'm only going to use a small password list, just so
you get...
2010-06-08 17:44
Disclaimer : The information provided below is for
educational purpose only. Bsnl DataOne Broadband continues to grow as one the
most popular broadband services in India with high speed facilities of upto 2
mpbs. But a large number of users of this service are vulnerable to hacker
attacks because...
2010-06-08 17:40
Theres plenty of papers out there that go into how to
obtain an IP Address from the preferred mark of your choice. So I'm not going to
go into that subject. Alright so say we got the targets IP Address finally. What
do we do with this IP Address. Well first ping the IP Address to make sure
that...
2010-06-08 12:46
Let's talk about the fun stuff. The first trick I will
discuss is an activity that is becoming quite prevalant, SIM cloning. If you
have paid attention to any cell phone related tutorials in the past, then you
may remember cloning being made popular by certain public figures like Kevin
Mitnick in...
2010-06-08 12:44
Thieves gain access to personal information in many
ways, but the most common method is to take it from the victim themselves. They
steal mail such as account statements, new checks and offers of credit left in a
mailbox, discarded in the trash or stored in an easy to access location in
your...
2010-06-08 12:36
Simply said, DDOS is an advanced version of DOS
attack . Like DOS , DDOS also tries to deny the important services running on a
server by broadcasting packets to the destination server in a way that the
Destination server cannot handle it. The speciality of the DDOS is that, it
relays attacks...
2010-06-06 09:41
You should know what a Automated Teller Machine (or
Automatic Teller Machine or cash machine) which commonly known as ATM is. Yes,
ATM is commonly used to access bank accounts in order to make cash withdrawals
or credit card cash advances, where after keying in your PIN number, ATM will...
2010-06-05
12:07
There is a far better way to get into Windows XP . It
is easy and it does not reset the password. Hack into a computer running Windows
XP without changing the password and find out all and any passwords on the
machine (including admin accounts). You do not need access to any accounts to
do...
2010-06-05 12:03
One thing any hacker should know is how to hack into
login account of any operating system. Major Operating Systems that are used
these days are Windows, Linux and Mac. So today I will show you how to hack into
these Operating Systems. Are you curious how easy it is for someone to gain...
2010-06-05 11:54
There are so many reasons why having a Linux
distribution on a USB drive can come in handy. From having a "rescue” OS on your
keyring to being able to install a new distribution on your EeePC, a "thumb
drive” Linux has many uses. But getting Linux onto a USB drive can’t be simple.
Right? Wrong....
2010-06-05
11:48
Over the years, we've written about loads of different
ways to hide and encrypt your private data from others, but if you're really
serious about protecting your data, you can actually hide your entire operating
system. Here's exactly how to do it. To accomplish this task, we'll be using...
2010-06-05 11:32
you'll notice that household assets are usually locked
in to prevent theft, banks have their high-security surveillance systems in
place and classified documents are usually stored in ultra-secure lockers.
Similarly our computers and networks need several levels and layers of security
in order...
2010-06-03 10:23
you can learn the basics of HTML (HyperText Markup
Language) to produce your own web page, you can spread the word of your product
or service to millions of potential customers or contacts online--without
needing to pay someone else to do the work! Once you learn the basic codes which
allow...
2010-06-02 09:08
Strong password is increasingly important in modern
computing era in order to protect and secure an user account. An online account
accessible from Internet is more prone to hacking and brute-force attacking,
however, it doesn’t mean a Windows computer which requires physical access to
the...
2010-06-02 08:57
On a Windows 7 computer with just a single user, or
only one main principal user although with multiple user accounts, it may be
more convenient and have faster booting time if the Windows 7 automatically logs
on or logs in the preferred user account. By default, if only a single user
account...
2010-05-29 20:26
The Important document in Ms Office is necessary for
protection in order to no easily accessed by wrong users. However, if we put a
password on Ms Word expesially with a simple password combination, it will be
easily broken by a program called passware, a tool designed to recovery
forgotten or...
2010-05-29 20:23
Method of data theft on facebook is a lot of
interesting things in the discuss and the search. The following ways are usually
used by hackers to obtain personal information of facebook account: 1. Social
engineering tools: how to trick the victim to deceptive telephone and internet
media, 2....
2010-05-29 20:18
Google is a treasure trove full of important
information, especially for the underground world. This Potential fact can also
be utilized in the data for the username and password stored on a server. If the
administrator save important data not in the complete system authentifikasi
folder, then...
2010-05-27 18:05
We are seeing various trends in the distribution of
malware. It is now getting more organized. In the past people were developing
viruses just for fun. Then there were cyber criminals who were independently
developing malware for financial gain. Now they operate in groups. Today this...
2010-05-27 17:58
In the last few months, we have seen updates to two
standards. One is Hi-speed USB 2.0, which has been the interface standard for
peripherals and external storage devices since almost a decade, and the other is
SATA 3 Gb/s, which has been around for five years or so. With the upgrade to
version...
2010-05-27 17:53
Budget graphics cards are more capable today than they
have ever been. Apart from games, an entry-level graphics card can handle tasks
that make the CPU's work easier. For instance, all current generation GPUs can
decode high-definition videos, provided you use a player that utilizes them...
2010-05-27 17:51
Videos are really popular on the web, so it should
come as no surprise that sites like YouTube, Dailymotion and Vimeo are among the
first few sites to integrate the new HTML5 standard. HTML stands for Hypertext
Markup Language, the language in which the basics of the Internet are written.
The...
2010-05-27 17:47
Netbooks have made their mark in the PC segment and
are here to stay. What makes them worth the buy is the unquestionable
portability that they offer over their laptop counterparts. They are small,
light and are definitely easy to lug around. They might not have the processing
power to execute...
2010-05-26 09:27
Who would have ever thought that Microsoft would come
out with a search-based feature faster than Google? Well, that’s exactly what
Bing has done with the new addition of Twitter updates, becoming the first
search engine to integrate so tightly with the micro-blogging service. So now
when you...
2010-05-26
09:09
talking about making life simpler and easier, the
internet has now made inroads into the television space with internet protocol
television (IPTV). IPTV is the latest among the digital TV transmission.
Initially, only a handful companies in India provided this service. However,
with the ...
2010-05-25 18:40
I have been asked the following questions a lot of
times or seen them posted on the Internet (with many variations of them)... How
do I unblock MySpace at work / school? How do I bypass my work / school Internet
filter to unlock Facebook? How do I get YouTube at work / school? Help! They...
2010-05-25 10:04
Processor speeds can be enhanced by moving circuits
closer together and by utilizing new semi-conductor materials. A number of
strategies are being used to make computers faster. The simple steps below will
enable you to become proficient as to upgrading the speed of your computer.
When...
2010-05-25 10:01
Computer Scientists Create System That Gives Users A
Sense Of Touch A non-mechanical haptic interface allows computer users to
manipulate a three dimensional object on screen and receive immediate tactile
response from the surroundings of that object. The interface uses a device
shaped like an..
|