//]]>
  • Gary McKinnon

    USA declared him as the biggest military computer hacker ever. He hacked the security system of NASA and Pentagon. This made him one of the great black hat hacker celebrities and got his name into the hacker's community.He has illegally accessed 97 computers and has caused around $700,000 damage to the economy.

  • Kevin David Mitnick

    This is slide 2 description. Go to Edit HTML and find this content. Replace it your own description.

  • Kevin Poulson

    This is slide 3 description. Go to Edit HTML and find this content. Replace it your own description.

  • Robert Tappan Morris

    This is slide 4 description. Go to Edit HTML and find this content. Replace it your own description.

  • Robert Tappan Morris

    This is slide 5 description. Go to Edit HTML and find this content. Replace it your own description.

  • This is Slide 6 Title - NewBloggerThemes.com

    This is slide 6 description. Go to Edit HTML and find this content. Replace it your own description.

Tuesday, 30 July 2013

Posted by Unknown
4 comments | 11:34 pm
 A phishing technique was described in detail in 1987, and the first recorded use of the term "phishing" was made in 1995 by Jason Shannon.

* Phishing is the act of attempting to acquire information such as usernames, passwords, and credit card details by masquerading as a trustworthy .

* Communications should be from popular social web sites, auction sites, online payment processors or IT administrators.

* Phishing emails may contain links to websites that are infected with malware.

* Phishing is typically carried out by email spoofing or instant messaging and it often directs users to enter details at a fake website which looks similar to real one.

List of phishing techniques:

Spear phishing:

* Phishing attempts directed at specific individuals or companies have been termed spearphishing.Attackers may gather personal information about their target to increase their probability of success.

Clone phishing:

* A type of phishing attack whereby a legitimate and previously delivered email containing an attachment or link  had its content and recipient address and it is used to create an almost identical or cloned email.
* The attachment or Link within the email is replaced with a malicious version and then sent from an email address spoofed to appear to come from the original sender. It may claim to resend the original information.

Whaling:

* Several recent phishing attacks have been directed specifically at senior executives and other high profile targets within businesses, and the term whaling has been coined for these kinds of attacks.

Website forgery:

* Once a victim visits the phishing website, the deception is not over. Some phishing scams use JavaScript commands in order to alter the address bar.This is done either by placing a picture of a legitimate URL over the address bar, or by closing the original address bar and opening a new one with the legitimate URL.
* [note] The fake URL also shows HTTPs and security symbol in address bar.

Phone phishing:

* Not all phishing attacks require a fake website. Messages that claimed to be from a bank, told users to dial  a phone number regarding problems with their bank accounts. Once the phone number (owned by the  phisher, and provided by a Voice over IP service) was dialled, it prompts users to enter their account  numbers and PIN.
* Vishing (voice phishing) sometimes uses fake caller-ID data to give the appearance that calls come from a trusted organization.

              I hope you will be acquainted with phishing......be aware of it.


Monday, 10 June 2013

Posted by Unknown
2 comments | 10:30 am

now  we will see how to play puzzle game with your video In VLC player.
While playing a video in vlc you can puzzle up your video and try to unpuzzle it with fun.

so lets check how it is done, Follow the below steps:

1) First open any video in vlc player.

2)Now the trick begins, Now Navigate to  Tools –> Effect & Filters –> Video Effects –> Geometry.
Now you will see a box like this :



3)Tick mark The Puzzle game as shown in the above picture. Thats it.... now click on close.

4)Thats it you will see your video is now puzzled and start solving the puzzle and have fun.
    we can also change the rows and columns of the puzzle.  


5)To Undo this you will have to do the same procedure and uncheck the Puzzle game and close, Everything is back to normal.

I hope you learnt something new today and had fun with this cool trick.

Saturday, 4 May 2013

Posted by Unknown
4 comments | 6:47 pm



If you been using someones Pc in guest account and want to have Admin privilage then don't worry,here is a trick for you to Gain Admin Privilage .
lets get started with it.


Method 1.

1) Go to C:/windows/system32.

2) Copy cmd.exe and paste it on desktop.

3) Rename cmd.exe to sethc.exe.

4) Copy the new sethc.exe to system 32,when windows asks for overwriting the file,then click yes.

5) Now Log out from your guest account and at the user select window,press shift key 5 times.

6) Instead of Sticky Key confirmation dialog,command prompt with full administrator privileges will open.

7) Now type “ NET USER ADMINISTRATOR "zzz" where “zzz" can be any password you like and press enter.

8) You will see “ The Command completed successfully" and then exit the command prompt and login into administrator with your new password.


9) Bravo !! Now You have hacked admin through guest account.



Method 2


1. Right-click on the “My Computer” icon on the desktop OR in the Start Menu.


2. Select the option “Manage”.

3. On the left pane expand the “Computer Management (Local) tree (if it is not already expanded)


4. Double click “Local Users and Groups” option From “System Tools” tree.


5. Click the “Users” option.


6. Now you will see the list of users on the right side pane, such as Administrator, Guest etc.


7. Right click the “Administrator” and select the option “Set Password” option.


8. Now you will see a warning message, Click on proceed.


9. Now the system asks you for “New Password” and “Confirm Password” .


10. After entering the password click on “OK”. The password is changed. That’s It!..


you have now successfully changed admin password without knowing it.

Thursday, 18 April 2013

Posted by Unknown
2 comments | 8:25 pm

Bitlocker  helps you to Password protect and Encrypt Your Content in Usb Drives.

 Steps :

Step 1 : Insert Pendrive which you want to password Protect.

Step 2: Right click on your Removable drive and Select"Turn On Bitlocker"



Step 3: After you click on Turn On bitlocker, Wizard will be open, Choose "Use a password to Unlock the Drive"
Step 4 : Now type In the Password you want and Click Next.

Step 5: Then save the recovery key to one removable disk

Step 6 : Atlast Click on Start Encrypting, Encrypting Process Will start.

Now Whenever you Want to use it, plugin the encrypted Drive in you Computer it will give you a notification With it is Bitlocker Protected, You have to just click on it,  Enter your password and click on Unlock Button.

Tuesday, 9 April 2013

Posted by Unknown
7 comments | 8:30 pm


Ever wanted to set cool videos as your computers Desktop Wallpaper, then you came to right place. Today in this post i will teach you how to set videos as your Desktop Wallpaper with a simple nice little trick using small tool or software that mostly every one has installed on their computer or laptop. This trick works on  windows xp as well as it works on windows 7. Go through below post to learn this simple trick.

STEPS:

  1. Open VLC Media Player.
   2. Then Go to Tools > Preference Or press CTRL + P and Select video from left panel
   3. Then Choose DirectX video output from output dropdown list
      as shown in below image .



  
4. Save the changes and restart VLC Media Player.
   5. Play any video you would like to set as your desktop wallpaper.
   6. Then click on Video and select DirectX Wallpaper from the dropdown list as show in below image.

Thursday, 4 April 2013

Posted by Unknown
4 comments | 7:39 pm


(1)Gary McKinnon:


USA declared him as the biggest military computer hacker ever. He whacked the security system of NASA and Pentagon. This made him one of the great black hat hacker celebrities and got his name into the hacker's community. The nerd is now facing 70 years of imprisonment and is deprived from accessing internet. He has illegally accessed 97 computers and has caused around $700,000 damage to the economy.

(2)Robert Tappan Morris:



He is the creator of first internet worm ?Morris worm? he was a student at Cornell and from that where he started writing codes to create worms as he wanted to know how large the internet world is. But the worm lead to the slow speed of internet and made the systems no longer usable. There was no ways to know how many computers were affected but the experts alleged that around 6000 machines. He was sent to 3 years imprisonment, 400 hours of community service and was fined $10,500. At present he is a professor at Massachusetts institute of technology, computer science and artificial intelligence laboratory. He was the first person prosecuted under the 1986 Computer Fraud and Abuse Act. 

(3)Kevin David Mitnick:

 The computer security consultant, author and a hacker was accused of many cases. He broke into the computer of top technology and telecommunications like Nokia, Motorola, Fujitsu Siemens and sun Microsystems. He termed his activity as social engineering to legalize his acts. He hacked the Los Angeles bus transfer system to get free rides the biggest hacking was the breaking into the DEC system to view the VMS source code (open virtual memory system which lead to the clean-up cost of around $160,000. He also gained the full administration privileges to IBM minicomputers at the computer learning institute in Los Angeles for a bet.

(4)Kevin Poulson:
He is best known for his takeover of the KIIS-FM phone lines, a Los Angeles based radio station. He was also known as dark Dante. The former black hat hacker is currently a senior editor at wired news

(5)  Jonathan James: 

He is maestro of all hackers who broke into the server of department of defense in the year 1999 which gave him a nick name c0mrade at the age of 16. He also got into the hacking of NASA. Stealing softwares of NASA and DoD later put him into big trouble. As he was a minor the punishment was for  6 months imprisonment and has to pledge that he wont be using computers forever.


Thursday, 28 March 2013

Posted by Unknown
7 comments | 9:49 am
Secret codes for Android mobile operating system:


Phone and Battery information Code:      *#*#4636#*#*

Factory Data reset Code: *#*#7780#*#*

Full Factory Format Code: *2767*3855# (Dangerous)

GTalk Service Monitor Code: *#*#8255#*#*

Camera Firmware settings Code: *#*#34971539#*#*

Service mode Codes:

*#*#197328640#*#* 

 This code can be used to enter into Service mode. You can run various tests and change settings in the service mode.

WLAN, GPS and Bluetooth Test Codes:

WLAN test (Use "Menu" button to start various tests) :  *#*#232339#*#* OR *#*#526#*#* OR *#*#528#*#*

Blogroll

About