Don't you feel like crying every time you add another
disc to your pile of scratched discs. Trashing that disc which
contained your favorite songs, pics, files, games or videos is not easy.
Read-on, if you find yourself wishing for a miracle every time your fav CD is scratched:
Here's an easy home remedy, which might give you the desired results.
Rub a small amount of toothpaste on the scratch and polish the CD with
a soft cloth and any petroleum-based polishing solution (like clear
shoe polish). Squirt a drop of Brasso and wipe it with a clean cloth.Read more..
I. Emails from people trying to infect your system and steal your
friends' email addresses for spam
I.1. Pictures of Osama Bin Laden hanging or Arnold Schwarzenegger's
I.2. Email that seems to come from your system administrator or
other familiar sender that says your email could not be
delivered, or some similar statement.
I.3. Email with subject "Against!" or "Revenge"
I.4. Email with subject Re_ and body with animals or foto or other
II. Emails from people trying to steal your identity (and your money)
II.1. Update Your Billing Information (from eBay)
II.2. Your account at eBay has been suspended
II.3. Your account at Wells Fargo has been suspended
II.4. Notification of US Bank Internet Banking
II.5. Attn: Citibank Update
II.6 Confirm AOL Billing Info
III. Emails from people trying to fool you into hurting yourself or
your friends and coworkers
III.1 Subject: "jdbg" Virus: how to detect and remove.
More Details About Each AttackRead more..
In this article I am trying to explain what DDOS is and how it can be
prevented. DDOS happens due to lack of security awareness of the
network/server owners. On a daily basis we hear that a particular
machine is under DDOS attack or NOC has unplugged the machine due to
DDOS attack . So DDOS has become one of the common issues in this
electronics world. DDOS is like a disease which doesn't have an
anti-viral developed. So we should be carefull while dealing with it .
Never take it lightly. In this article i am trying to explain the
steps/measures which will help us defend from DDOS attack ,up to a
certain extend .
What is a DDOS attack? [adsense:468x60:7403224149] Simply said,
DDOS is an advanced version of DOS attack . Like DOS , DDOS also tries
to deny the important services running on a server by broadcasting
packets to the destination server in a way that the Destination server
cannot handle it. The speciality of the DDOS is that, it relays attacks
not from a single network/host like DOS. The DDOS attack will be
launched from different dynamic networks which has already been
compromised. Read more..
Blocking and preventing brute force attacks is one of the main things
you want to do on your web server to add a layer of security. While
someone might not be targeting your site or server specifically, they
will have automated tools that will try to guess random usernames and
passwords that are common against your system. They’re essentially
forcing their way to user only authorized area’s of a system, such as
FTP accounts, e-mail accounts, databases, script based administration
areas and root or any shell access are most common attempts. They will
try multiple login attempts, guessing usernames and passwords, trying
to force their way onto your machine, This is a large topic with a lot
of things to cover, I’ll try to do my best to help you understand how
brute force attacks work, prevention, signs of an attack, and tools to
help stop brute force attacks, This article will not cover session
brute force attempts for web applications, in a future article I’ll
cover that but for now we’re looking at main service daemons such as
ftp and shell.
So many people are getting their own dedicated
servers but are completely clueless about security. Usually they leave
it up to the company where they purchase it or hire someone. That's
fine but make sure you have these 10 items covered.
How to crack things like FTP/SSH/POP3 etc. Well, here is a quick way to
do this for all you Windows users out there, provided you have a decent
sized password dictionary. I personally use one of about 3.16GB in
size, but for this tutorial I'm only going to use a small password
list, just so you get the feel of it. First step, download hydra either
from it's homepage
that's what this tutorial is written for. Download the zip file,
extract it, and make sure you see the files below
you do, that's good. Go to Start > Run > cmd to open the command
prompt. Then change to your hydra folder using the “cd” command. For
example my hydra folder was on the desktop, so I did this
From time to time I am asked to break a password on an Adobe PDF
file. This mostly comes up when the user who created the pdf can’t
remember what their own password is. As annoying as that is, actually
recovering the password is simple using pdfcrack.
PDFCrack is a GNU/Linux application (or any other POSIX-compatible system) tool for recovering passwords and content from PDF-files. It is small, command line driven, and without external dependencies. PDFCrack is released under GPL.
Install pdfcrack on Ubuntu by typing: sudo aptitude install pdfcrack
Run a quick benchmark by entering the following at the command line: pdfcrack -b
Have you ever just finished something important and all of a sudden
the lights dim, your PC begins to sound like the clothes washer, and
then bam, your work is gone? Been there, done that,
got the t-shirt, right? Maybe I should have taken my watch off before
sticking my hand in that running PC after all.
Well, the thing that annoys me most is, not losing the work, but
knowing I’ll have to spend the next two days rebuilding the system just
in order to recover whatever I was working on. Like a good boy, I save
my work to multiple locations. If you care about it, don’t trust it to
a computer, I always say. Strange advice from someone who is a computer
Anyway, the solution to this problem has always been to ghost your
system. Ghosting your system means making a backup image, applications
and all, so that you can restore your system to a running state
quickly. Strangely enough the product most people use to do this is
called Ghost. Get it? Ghosting? If you have ever used the recovery CD
that may have come with your system then you have probably used Ghost
without knowing it.Read more..
The following article will discuss ways that you can watch satellite TV
on Your PC, via FTA (Free to Air) streams as well discusses the
processes that people use to decode encrypted streams. (Think DirecTV
This guide describes actions that may or may not be legal in your
location. I do not advocate, condone, or practice satellite TV piracy.
It is not my fault if you use this information illegally.
Should you choose to watch signals from a "bird" with pay channels, and
decrypt them, you legally can only watch the channels you pay for,
meaning you have a set top box hooked up to your TV as well. I suggest
deleting the channels you don't pay for from the channel list in the
program I discuss below, so you aren't tempted to watch them illegally.
Mobile devices are almost becoming as ubiquitous as email addresses
- that is, almost everyone has one. So it makes sense to consider
mobile group messaging using SMS.
Specifically - for special occasions, events, or just a quick way to
keep in touch with a group of people, mobile group messaging is fun and
TextMarks and Tatango
are two services that allow anyone to use subscription-based messaging,
right on the web. All you need is a mobile phone, and friends, family,
or contacts also equipped with a mobile phone.
Setting up a subscription
Your subscription is useless without a keyword.
Both TextMarks and Tatango offer custom keywords (for a price), or
default ones for free. Let's say our keyword is "bakesale526" - which
we have set up for a bake sale we are hosting on May 26.
Your group members can opt-in by sending a text message to 41411 (TextMarks) or 68398 (Tatango). The message should just be the keyword itself. It's that simple to subscribe.Read more..
This video tutorial teaches you how you can crack a window vista password.
Due to the lack of LM hashes, Vista passwords stored in the SAM file are harder
to crack. However, the NTLM hash is the same as always and can be cracked if the
password is weak. Warning:for home use only
Address resolution protocol or ARP is a protocol that is used to get
the hardware address (MAC) of a device on the network with its IP
address (Network Layer). RARP does the opposite of ARP; it will look up
the IP address with the MAC address. RARP works a little differently,
it will send out a broadcast asking who has the MAC address, a RARP
server will then respond with the nodes IP address. ARP is commonly
used in Ethernet networks but can also be used in other types of
networks. Ipv6 doesn’t use ARP, but rather NDP (Network Discovery
Protocol). In order for Ethernet to send data it needs the MAC address
of the receiving device.
A MAC address uniquely identifies a device
on the network and is in the Data Link level (level 2) of the OSI
model. These MAC addresses are burned into the network card by the
manufacture and are should be the only one in the world. The first 6
digits of the MAC address is assigned to the network interface card is
the manufacture ID and the last 6 is the cards serial number. You can
change your MAC at the software level (it wont change the burned in MAC
address on the NIC) fairly easily. Read more..
Download one of these iso files with or without default system upgrade. I have split this iso into six peices to facilitate easy download.
Mediafire.com supports download managers so don't worry. Read more..
Invite your friends using our tell a friend application.Its very
simple just login to any of your Mail/IM/Social network account using
our application and select all your contacts which you want to invite
and click on the send button
We will tell you how to connect two computers together to enable simple file and resource
sharing. This method is applicable only if you have wireless adapters
or Wi-Fi cards installed in both PCs.
To follow the wireless way, you just need a Wi-Fi card in each
computer. This method is also known as Adhoc wireless networking. If
you are using a laptop, chances are you already have Wi-Fi adapters
We refer to the two computers as PC1 and PC2.
We configure both the computers as given below,
1. Just right-click “My Computer” and click Properties.
2. Select the “Computer Name” tab and click the “Change” button.
3. Change the computer name to whatever you want, here we name it PC1.
Change the workgroup to WG. (The workgroup name should be the same in
4. Click OK.Read more..
If your company is like most companies, you have users running as
local administrators on their desktop. There are solutions to eliminate
this need, which is a direction every company should make. When users
run as local administrators, the IT staff has no control over that user
or their desktop. In order for you to secure the local Administrators
group on every desktop, you need to have some powerful tools to get the
job done. There are typically three different tasks that you need to
perform to secure this group, which we will cover in this article.
Windows Server 2008 and Windows Vista SP1 (with the RSAT installed)
provide amazing new controls that make these configurations a breeze!
Task 1 - Remove Domain User Account
The initial task of securing the local Administrators group is to
ensure that the user no longer has membership in the group. This is
easier said than done, since most companies have configured the user’s
domain account to have membership in this group at installation of the
user’s computer. Read more..
I love music. I don’t know many people who really don’t
enjoy music on their computer, especially while doing mundane tasks or
surfing. It just seems to make the time go by faster and make it
slightly more enjoyable. I found this little site called Filtermusic and it really has made my enjoyment of music that much greater.
What is it?
Essentially, Filtermusic is a listing of Interweb radio stations that stream in high quality (128Kbps) and feature uninterrupted play.
That’s one of the greatest features. To listen to their streams, they
just require that you have either iTunes, VLC, or Winamp. With some
additional tools you can record streaming music as MP3 files as well.Read more..