We run a script on boot that will disable the firewall and security centre with the following registry edits. Maybe this will help ... Read More »
Saturday, July 9, 2011
How to disable and remotely remove Antivirus?
I wanted to remove the antivirus programs remotely because the computers are too far away and my chair is rather comfortable having been moulded to my ample behind. I also wanted to do this removal silently to both allow the end users to continue working undisturbed and as an added bonus I don't have to talk to them and have them put me... Read More »
Free download Award Keylogger - full version...
Award Keylogger allows you to monitor all users' activity on any computers in real time and record each computer's usage history. Award Keylogger makes it easy to view, in real time, the screenshots of the any computers, all typed keystrokes, visited Web sites, used programs. You can view a list of running processes and terminate undesirable ones. ... Read More »
Thursday, July 7, 2011
How to delete Autorun.inf virus?
Once it happened to a friend of mine, when his newly bought laptop was infected with this autorun.inf virus. This virus corrupted almost all the drives on the Hard disk, and when ever he tried to double click on the drive or opening any drive it opened in a new window. In some cases, when your drive is infected with this Autorun.inf virus,... Read More »
How to hack Ubuntu ROOT password?
Here is a way to reset or hack superuser password, provided you have physical access to reboot the system and username. All you need to do is just reboot the system and then follow these instructions. ... Read More »
How to get your lost yahoo email password?
If you lose or forget your Yahoo email password, there are three basic methods for you to regain access to your Yahoo email account: ... Read More »
Recover mail passwords from Web Browser...
Here i describe ways to recover passwords from Internet Explores, Netscape Navigator n Mozilla... So, lets check it ... Read More »
Tuesday, July 5, 2011
How to hack Facebook/Twitter accounts (Stealing Cookie)?
In this tutorial i will explain how to hack a Facebook/twitter accounts by stealing cookies. This method works only when the victims computer is in a LAN (local area network ).Best place to try out this is in schools ,collages ,cafes . where computers are connected in LAN .Before i proceed let me first explain "cookies " ... Read More »
Wire Shark...
Today i will be writing an article on Wire Shark -Network Protocol Analyzer so read on... ... Read More »
What is ARP Spoofing n How to implement it?
What is ARP spoofing? ARP spoofing also known as ARP poisoning or ARP attack is a technique in which a host in a LAN can "poison" the ARP table of another host causing it to send packets to the wrong destination. The attacker can modify the traffic in the network such a way that it will redirect all traffic to go through it. ARP Spoofing will... Read More »
Man in middle attack using Ettercap
Ettercap is a suite for man in the middle attacks on LAN (local area network ). It features sniffing of live connections, content filtering on the fly and many other interesting tricks.It supports active and passive dissection of many protocols (even ciphered ones) and includes many feature for network and host analysis. In this tutorial i will explain how to sniff (user names,passwords) in LAN using Ettercap ... Read More »
How to hack remote router using Telnet?
Telnet is a legacy remote terminal TCP/IP application used for remote administration , Telnet is notorious for transmitting communications in plain text and has long since been superseded by SSH that uses encrypted channels so it is rare to see telnet in use on the Internet . But you will be surprised to know that most of the routers have telnet serveries running on them by default even today... Read More »
Hacks with Google...
Google serves almost 80 percent of all search queries on the Internet, proving itself as the most popular search engine. However Google makes it possible to reach not only the publicly available information resources, but also gives access to some of the most confidential information that should never have been revealed. In this post I will show how to use Google for exploiting security... Read More »