background preloader

Security + Articles

Facebook Twitter

How to use google for hacking(hack cameras,access secret documents) - Meet hackers. We all use GOOGLE daily almost and GOOGLE is famous search engine in the we can use Google search engine for hacking,its strange but its true.Today we will show how to use Google search engine for hacking.if you want to hack personal details(like NAME,ADDRESS,EMAIL AND MORE) ,secret documents,banks accounts,and credit cards numbers just simply open the Google search engine and type following keywords: intitle:”curriculum vitae” “phone * * *” “address *” “e-mail” filetype:xls inurl:”email.xls” intitle:index.of finances.xls.

How to use google for hacking(hack cameras,access secret documents) - Meet hackers

How Faraday Cages Work. Electricity is the lifeblood of many aspects of our world.

How Faraday Cages Work

Without volts and amps, many of our technological innovations would cease to exist. Even our bodies wouldn't function without an electrical charge zipping through our cells. But what electricity gives, electricity can take away. Although this form of energy is vital to so much of our lives, it's one of those things that are only good in the right amounts. Too much electricity can electrocute people. Faraday cage. Entrance to a Faraday room Faraday shield at Art Nouveau power plant in Heimbach, Germany.

Faraday cage

How To Use Netcat to Establish and Test TCP and UDP Connections on a VPS. Introduction Linux is known for having a great number of mature, useful command line utilities available out of the box in most distributions.

How To Use Netcat to Establish and Test TCP and UDP Connections on a VPS

Skilled system administrators can do much of their work using the built-in tools without having to install additional software. In this guide, we will discuss how to use the netcat utility. Often referred to as a Swiss army knife of networking tools, this versatile command can assist you in monitoring, testing, and sending data across network connections. We will be exploring this on an Ubuntu 12.04 VPS, but netcat should be available on almost any modern Linux distribution. General Syntax. 100+ Ways to Learn Anything on the Internet. Learn Anything...

100+ Ways to Learn Anything on the Internet

Thanks to this amazing collection of educational websites you can become a master in anything from home renovations to rocket science, maths to photography, art to computer programming. What are you going to master today? TED Talks TED is a global community, welcoming people from every discipline and culture who seek a deeper understanding of the world. TED believes passionately in the power of ideas to change attitudes, lives and, ultimately, the world. How does ATM skimming work? In 2008, more than $1 billion was stolen in ATM-related crimes [source: ADT].

How does ATM skimming work?

Sure, some thieves take the old-fashioned route and crack them right open, but there's a much quieter, high-tech form of theft targeting ATMs. It's called skimming. ATM skimming is like identity theft for debit cards: Thieves use hidden electronics to steal the personal information stored on your card and record your PIN number to access all that hard-earned cash in your account. Authentication. Authentication (from Greek: αὐθεντικός authentikos, "real, genuine," from αὐθέντης authentes, "author") is the act of confirming the truth of an attribute of a single piece of data (datum) or entity.


What is application whitelisting? - Definition from Application whitelisting is a computer administration practice used to prevent unauthorized programs from running.

What is application whitelisting? - Definition from

The purpose is primarily to protect computers and networks from harmful applications, and, to a lesser extent, to prevent unnecessary demand for resources. By submitting your personal information, you agree to receive emails regarding relevant products and special offers from TechTarget and its partners. You also agree that your personal information may be transferred and processed in the United States, and that you have read and agree to the Terms of Use and the Privacy Policy.

The Risks of Public Hotspots: How Free WiFi Can Harm You. Why Using a Public Wi-Fi Network Can Be Dangerous, Even When Accessing Encrypted Websites. “Don’t do your online banking or anything sensitive on a public Wi-Fi network.”

Why Using a Public Wi-Fi Network Can Be Dangerous, Even When Accessing Encrypted Websites

The advice is out there, but why can using a public Wi-Fi network actually be dangerous? And wouldn’t online banking be secure, as it’s encrypted? There are a few big problems with using a public Wi-Fi network. The open nature of the network allows for snooping, the network could be full of compromised machines, or — most worryingly — the hotspot itself could be malicious. Snooping Encryption normally helps protect your network traffic from prying eyes. How to check and remove virus from your computer without using any antivirus.

How to view and manage event logs in Event Viewer in Windows XP. This article describes how to use Event Viewer to view and manage event logs in Microsoft Windows XP.

How to view and manage event logs in Event Viewer in Windows XP

Event Viewer In Windows XP, an event is any significant occurrence in the system or in a program that requires users to be notified, or an entry added to a log. The Event Log Service records application, security, and system events in Event Viewer. With the event logs in Event Viewer, you can obtain information about your hardware, software, and system components, and monitor security events on a local or remote computer.

Event logs can help you identify and diagnose the source of current system problems, or help you predict potential system problems. Event Log Types A Windows XP-based computer records events in the following three logs: Application log The application log contains events logged by programs. How to View Event Logs. Heuristic analysis. This article is about antivirus software. For the use of heuristics in usability evaluation, see Heuristic evaluation. Heuristic analysis is a method employed by many computer antivirus programs designed to detect previously unknown computer viruses, as well as new variants of viruses already in the "wild".[1] Heuristic analysis is an expert based analysis that determines the susceptibility of a system towards particular threat/risk using various decision rules or weighing methods.

Public-key cryptography. An unpredictable (typically large and random) number is used to begin generation of an acceptable pair of keys suitable for use by an asymmetric key algorithm. In an asymmetric key encryption scheme, anyone can encrypt messages using the public key, but only the holder of the paired private key can decrypt. Security depends on the secrecy of the private key. In the Diffie–Hellman key exchange scheme, each party generates a public/private key pair and distributes the public key. Microsoft Baseline Security Analyzer 2.2 (for IT Professionals) <a id="b7777d05-f9ee-bedd-c9b9-9572b26f11d1" target="_self" class="mscom-link download-button dl" href="confirmation.aspx? Id=7558" bi:track="false"><span class="loc" locid="46b21a80-a483-c4a8-33c6-eb40c48bcd9d" srcid="46b21a80-a483-c4a8-33c6-eb40c48bcd9d">Download</span></a> The Microsoft Baseline Security Analyzer provides a streamlined method to identify missing security updates and common security misconfigurations.

MBSA 2.3 release adds support for Windows 8.1, Windows 8, Windows Server 2012 R2, and Windows Server 2012. Windows 2000 will no longer be supported with this release. How to Create an Effective Business Continuity Plan. We rarely get a head's up that a disaster is ready to strike. Even with some lead time, though, multiple things can go wrong; every incident is unique and unfolds in unexpected ways. Business_Continuity_Managment_Toolkit.pdf.