How to protect PC from autorun.inf Virus

Every computer users know about the word Virus. Viruses can damage your important data in your computer. We use antivirus to protect our computer from viruses, but antivirus has a limitation to identify viruses.     Mostly viruses come to PC through Internet, Pen-drive and Floppy (Nowadays most of the people are not using floppy). And we

How to Bypassing Windows-XP Firewall

There is a technique using which we can bypass windows-xp service pack-2 firewall. This techniques is nothing but the vulnerability found in windows-xp sp2 firewall. This is explained here in detail with exploit code. Windows XP Firewall Bypassing (Registry Based) :- Microsoft Windows XP SP2 comes bundled with a Firewall. Direct access to Firewall’s registry

What is Denial Of Service (DoS) Attacks ??

A denial of service (DoS) attack is an attack that clogs up so much memory on the target system that it can not serve it’s users, or it causes the target system to crash, reboot, or otherwise deny services to legitimate users.There are several different kinds of dos attacks as discussed below:- 1) Ping Of

What is Cryptography ??

By definition cryptography is the process of converting recognisable data into an encrypted code for transmitting it over a network (either trusted or untrusted). Data is encrypted at the source, i.e. sender’s end and decrypted at the destination, i.e. receiver’s end. In all cases, the initial unencrypted data is referred to as plaintext. It is

What is a Trojan Horse ???

What is a Trojan ? “A Trojan Horse, or Trojan, is a term used to describe malware that appears, to the user, to perform a desirable function but, in fact, facilitates unauthorized access to the user’s computer system”. – Wikipedia “A Trojan horse is an apparently useful program containing hidden functions that can exploit the

What is a Computer Virus ?

What is a Computer Virus ? A potentially damaging computer programme capable of reproducing itself causing great harm to files or other programs without permission or knowledge of the user. Types of viruses :- The different types of viruses are as follows- 1) Boot Sector Virus :- Boot sector viruses infect either the master boot

How to run Firefox inside Firefox.?

Yup you can run Firefox inside firefox just by typing following url. How about Opening Firefox inside Firefox which is again in another Firefox..? Not bad huh? And its really easy too just type in this url in Firefox’s address bar and there you go! Firefox inside Firefox! copy paste following url in a web

What is phishing and how to be safe from phishing ?

    What is Phishing ? Phishing is one of the type of hacking . It is a method of acquiring sensitive information such as username, password, bank information etc. Phishing pagecould be saif as an duplicate page of real one. Its look exactly similar as the real page.But when user enter sensitive information on such phishing page his information is send to the E-mail address provided

List of google dorks for sql injection

I had previously share with you guys List of  good proxy sites to surf anonymously on the internet and today i am sharing with you a list of google dorks for sql injection which is one of most used method to hack a website. List Of Google Dorks   inurl:index.php?id= inurl:trainers.php?id= inurl:buy.php?category= inurl:article.php?ID= inurllay_old.php?id= inurl:declaration_more.php?decl_id= inurlageid= inurl:games.php?id= inurlage.php?file= inurl:newsDetail.php?id= inurl:gallery.php?id=d= inurl:event.php?id= inurlroduct-item.php?id=

List of some good proxy sites

  Below is the list of some good proxy site which you can use to surfanoymously on the internet . Even you can use this proxy sites to open block website in school or offices. For example you can use facebook if it is block at your school oroffice. List Of Top Proxy Sites