background preloader

Security + Articles

Facebook Twitter

How to use google for hacking(hack cameras,access secret documents) - Meet hackers. We all use GOOGLE daily almost and GOOGLE is famous search engine in the we can use Google search engine for hacking,its strange but its true.Today we will show how to use Google search engine for hacking.if you want to hack personal details(like NAME,ADDRESS,EMAIL AND MORE) ,secret documents,banks accounts,and credit cards numbers just simply open the Google search engine and type following keywords: intitle:”curriculum vitae” “phone * * *” “address *” “e-mail” filetype:xls inurl:”email.xls” intitle:index.of finances.xls if you want hack into security cameras or cctv which are fixed at car parking plots,schools and in offices,watch the images which are captured by camera,for that type inurl:”viewerframe?

Mode=motion” intitle:”Live View / – AXIS” if you want download free stuff ,you can also do with the help of Google,just type “? “? Meet hackers How Faraday Cages Work. Electricity is the lifeblood of many aspects of our world. Without volts and amps, many of our technological innovations would cease to exist. Even our bodies wouldn't function without an electrical charge zipping through our cells. But what electricity gives, electricity can take away. Although this form of energy is vital to so much of our lives, it's one of those things that are only good in the right amounts. Too much electricity can electrocute people. Likewise, it can kill our modern electronics and machines. But thanks to Michael Faraday, the brilliant 19th-century scientist, and one of his namesake inventions, the Faraday cage, we humans have developed plenty of ways to control electricity and make it safer for our computers, cars and other inventions -- and for us, too.

Faraday cages shield their contents from static electric fields. These cages often look distinctly, well, cagelike. Electromagnetic radiation is all around us. Faraday cage. Entrance to a Faraday room Faraday shield at Art Nouveau power plant in Heimbach, Germany A Faraday cage or Faraday shield is an enclosure formed by conductive material or by a mesh of such material. Such an enclosure blocks external static and non-static electric fields by channeling electricity along and around, but not through, the mesh, providing constant voltage on all sides of the enclosure. Since the difference in voltage is the measure of electrical potential, no current flows through the space. Video of a Faraday cage shielding a man from electricity A Faraday cage operates because an external static electrical field causes the electric charges within the cage's conducting material to be distributed such that they cancel the field's effect in the cage's interior.

Faraday cages cannot block static or slowly varying magnetic fields, such as the Earth's magnetic field (a compass will still work inside). History[edit] Operation[edit] Examples[edit] Faraday cages[edit] Adaptations[edit] How To Use Netcat to Establish and Test TCP and UDP Connections on a VPS. Introduction Linux is known for having a great number of mature, useful command line utilities available out of the box in most distributions. Skilled system administrators can do much of their work using the built-in tools without having to install additional software. In this guide, we will discuss how to use the netcat utility. Often referred to as a Swiss army knife of networking tools, this versatile command can assist you in monitoring, testing, and sending data across network connections.

We will be exploring this on an Ubuntu 12.04 VPS, but netcat should be available on almost any modern Linux distribution. Ubuntu ships with the BSD variant of netcat, and this is what we will be using in this guide. Other versions may operate differently or provide other options. General Syntax By default, netcat operates by initiating a TCP connection to a remote host. The most basic syntax is: netcat [options] host port netcat -u host port netcat host startport-endport netcat -z -v 1-1000. 100+ Ways to Learn Anything on the Internet. Learn Anything... Thanks to this amazing collection of educational websites you can become a master in anything from home renovations to rocket science, maths to photography, art to computer programming. What are you going to master today?

TED Talks TED is a global community, welcoming people from every discipline and culture who seek a deeper understanding of the world. TED believes passionately in the power of ideas to change attitudes, lives and, ultimately, the world. On, they've built building a clearinghouse of free knowledge from the world's most inspired thinkers — and a community of curious souls to engage with ideas and each other, both online and at TED and TEDx events around the world, all year long. Chesscademy Chesscademy offers free online lessons for people around the world who want to learn how to play chess or improve their existing game.

Microsoft DreamSpark Programs How Stuff Works HowStuffWorks got its start in 1998 at a college professor's kitchen table. How does ATM skimming work? In 2008, more than $1 billion was stolen in ATM-related crimes [source: ADT]. Sure, some thieves take the old-fashioned route and crack them right open, but there's a much quieter, high-tech form of theft targeting ATMs. It's called skimming. ATM skimming is like identity theft for debit cards: Thieves use hidden electronics to steal the personal information stored on your card and record your PIN number to access all that hard-earned cash in your account. That's why skimming takes two separate components to work. The first part is the skimmer itself, a card reader placed over the ATM's real card slot [source: Krebs]. When you slide your card into the ATM, you're unwittingly sliding it through the counterfeit reader, which scans and stores all the information on the magnetic strip.

However, to gain full access to your bank account on an ATM, the thieves still need your PIN number. Some ATM skimming schemes employ fake keypads in lieu of cameras to capture PIN numbers. Authentication. Authentication (from Greek: αὐθεντικός authentikos, "real, genuine," from αὐθέντης authentes, "author") is the act of confirming the truth of an attribute of a single piece of data (datum) or entity. In contrast with identification which refers to the act of stating or otherwise indicating a claim purportedly attesting to a person or thing's identity, authentication is the process of actually confirming that identity. It might involve confirming the identity of a person by validating their identity documents, verifying the validity of a Website with a digital certificate, tracing the age of an artifact by carbon dating, or ensuring that a product is what its packaging and labeling claim to be.

In other words, authentication often involves verifying the validity of at least one form of identification. Methods[edit] Authentication has relevance to multiple fields. Authentication can be considered to be of three types: Attribute comparison may be vulnerable to forgery. Packaging[edit] What is application whitelisting? - Definition from Application whitelisting is a computer administration practice used to prevent unauthorized programs from running.

The purpose is primarily to protect computers and networks from harmful applications, and, to a lesser extent, to prevent unnecessary demand for resources. By submitting your personal information, you agree to receive emails regarding relevant products and special offers from TechTarget and its partners. You also agree that your personal information may be transferred and processed in the United States, and that you have read and agree to the Terms of Use and the Privacy Policy. The whitelist is a simple list of applications that have been granted permission by the user or an administrator. Blacklisting, the opposite approach to whitelisting, is the method used by most antivirus, intrusion prevention/detection systems and spam filters. There is no consensus among security experts over which technique is better. Continue Reading About application whitelisting. The Risks of Public Hotspots: How Free WiFi Can Harm You | ZoneAlarm Security Blog. Practically anywhere you go, you’ll come across public WiFi hotspots.

However, this free service could spell trouble. We explore the security risks of public hotspots and what to consider before connecting to public WiFi. Click on image to enlarge. Why Using a Public Wi-Fi Network Can Be Dangerous, Even When Accessing Encrypted Websites. “Don’t do your online banking or anything sensitive on a public Wi-Fi network.” The advice is out there, but why can using a public Wi-Fi network actually be dangerous? And wouldn’t online banking be secure, as it’s encrypted? There are a few big problems with using a public Wi-Fi network.

The open nature of the network allows for snooping, the network could be full of compromised machines, or — most worryingly — the hotspot itself could be malicious. Snooping Encryption normally helps protect your network traffic from prying eyes. When you connect to an open Wi-Fi network like one at a coffee shop or airport, the network is generally unencrypted — you can tell because you don’t have to enter a passphrase when connecting.

This was illustrated most sensationally with Firesheep, an easy-to-use tool that allows people sitting in coffee shops or on other open Wi-Fi networks to snoop on other people’s browsing sessions and hijack them. Compromised Devices Malicious Hotspots. How to check and remove virus from your computer without using any antivirus. How to view and manage event logs in Event Viewer in Windows XP. This article describes how to use Event Viewer to view and manage event logs in Microsoft Windows XP. Event Viewer In Windows XP, an event is any significant occurrence in the system or in a program that requires users to be notified, or an entry added to a log.

The Event Log Service records application, security, and system events in Event Viewer. With the event logs in Event Viewer, you can obtain information about your hardware, software, and system components, and monitor security events on a local or remote computer. Event logs can help you identify and diagnose the source of current system problems, or help you predict potential system problems. Event Log Types A Windows XP-based computer records events in the following three logs: Application log The application log contains events logged by programs.

How to View Event Logs To open Event Viewer, follow these steps: Click Start, and then click Control Panel. How to View Event Details How to Interpret an Event Event Header Event Types. Heuristic analysis. This article is about antivirus software. For the use of heuristics in usability evaluation, see Heuristic evaluation. Heuristic analysis is a method employed by many computer antivirus programs designed to detect previously unknown computer viruses, as well as new variants of viruses already in the "wild".[1] Heuristic analysis is an expert based analysis that determines the susceptibility of a system towards particular threat/risk using various decision rules or weighing methods. MultiCriteria analysis (MCA) is one of the means of weighing. This method differs from statistical analysis, which bases itself on the available data/statistics. How it works[edit] Another common method of heuristic analysis is for the anti-virus program to decompile the suspicious program, then analyze the source code contained within.

Effectiveness[edit] Heuristic analysis is capable of detecting many previously unknown viruses and new variants of current viruses. References[edit] External links[edit] Public-key cryptography. An unpredictable (typically large and random) number is used to begin generation of an acceptable pair of keys suitable for use by an asymmetric key algorithm. In an asymmetric key encryption scheme, anyone can encrypt messages using the public key, but only the holder of the paired private key can decrypt. Security depends on the secrecy of the private key. In the Diffie–Hellman key exchange scheme, each party generates a public/private key pair and distributes the public key.

After obtaining an authentic copy of each other's public keys, Alice and Bob can compute a shared secret offline. The shared secret can be used, for instance, as the key for a symmetric cipher. Public-key cryptography, also known as asymmetric cryptography, is a class of cryptographic algorithms which requires two separate keys, one of which is secret (or private) and one of which is public. Message authentication involves processing a message with a private key to produce a digital signature.

Understanding[edit] Microsoft Baseline Security Analyzer 2.2 (for IT Professionals) <a id="b7777d05-f9ee-bedd-c9b9-9572b26f11d1" target="_self" class="mscom-link download-button dl" href="confirmation.aspx? Id=7558" bi:track="false"><span class="loc" locid="46b21a80-a483-c4a8-33c6-eb40c48bcd9d" srcid="46b21a80-a483-c4a8-33c6-eb40c48bcd9d">Download</span></a> The Microsoft Baseline Security Analyzer provides a streamlined method to identify missing security updates and common security misconfigurations.

MBSA 2.3 release adds support for Windows 8.1, Windows 8, Windows Server 2012 R2, and Windows Server 2012. Windows 2000 will no longer be supported with this release. How to Create an Effective Business Continuity Plan. We rarely get a head's up that a disaster is ready to strike. Even with some lead time, though, multiple things can go wrong; every incident is unique and unfolds in unexpected ways. This is where a business continuity plan comes into play. To give your organization the best shot at success during a disaster, you need to put a current, tested plan in the hands of all personnel responsible for carrying out any part of that plan. The lack of a plan doesn't just mean your organization will take longer than necessary to recover from an event or incident.

How Business Continuity, Disaster Recovery Plans Differ Business continuity (BC) refers to maintaining business functions or quickly resuming them in the event of a major disruption, whether caused by a fire, flood, epidemic illness or a malicious attack across the Internet. For example, if the building that houses your customer service representatives is flattened by a tornado, do you know how those reps can handle customer calls? Business_Continuity_Managment_Toolkit.pdf.