Here is an article which teaches you to install graphics packages in ubuntu or in any other linux operating system. Most of the coders would try their graphic codes in windows because MS DOS comes with a default graphics package called graphics.h. However the results of execution of graphics programs in linux operating system is far more better than in windows. and I've tried that in my ubuntu laptop. So the upcoming part of this article will contain the steps required to install graphics packages in ubuntu or in any other linux operating system.
Tuesday, August 28, 2012
Wednesday, August 22, 2012
Cracking WiFi in 11 Steps
Wifiway is a Live CD based on Unix Kernel, Mostly used to crack open WiFi networks. This tutorial corresponds the same. Codeknock is going to present a tutorial to Crack the WEP keys.
Mostely WiFi networks are secured with WEP encryption. i.e, The packets sent and received over the WiFi network are encrypted with this WEP Key. You cant connect to that WiFi network without knowing that key. It may be a 5 Digit ASCII or 13 Digit HEX and more based on the encryption seeding it follows. Let's Crack it!
Crack Windows Password with OHPCrack
OHP Crack is a Unix-Flavored Live CD.
Live CD means, It can boot directly from your BIOS without making disturbances to your HDD. When I said as Live-CD many of you might think that it is a Compact-Disk. Actually It's not. It's a CD Image. You can burn that Image to your Pendrive or to a Empty CD and you can boot ti up! Come on! I'll Explain...!
Live CD means, It can boot directly from your BIOS without making disturbances to your HDD. When I said as Live-CD many of you might think that it is a Compact-Disk. Actually It's not. It's a CD Image. You can burn that Image to your Pendrive or to a Empty CD and you can boot ti up! Come on! I'll Explain...!
Sunday, August 19, 2012
Thursday, August 16, 2012
GOLD-BUG Virus
Aliases: AU, GOLD, GOLD-FEVER, GOLD-MINE
V Status: New, Research
Discovery: January, 1994
Symptoms: CMOS checksum failure; Creates files with no extension. Modem answers on 7th ring; BSC but it is hidden; Most virus scanners fail to run or are Deleted; CHKLIST.??? files deleted.
Origin: USA
Eff Length: 1,024 Bytes
Type Code: SBERaRbReX - Spawning Color Video Resident and Extended HMA Memory Resident Boot-Sector and Master-Sector Infector
Detection Method: None
Removal Instructions: See Below
Wednesday, August 15, 2012
FIREFLY - More than A Smart Virus
Firefly is an encrypted, memory resident virus which infects
.COM files on load. It incorporates code from Proto-T,
LokJaw and YB-X viruses and, when in memory, attacks a large election of anti-virus programs as they are executed. Anti-virus programs identified by Firefly's execute/load handler are deleted.
Firefly incorporates simple code from previous issues of the newsletter signed to de-install generic VSAFE resident virus activity
filters designed for Microsoft by Central Point Software.
.COM files on load. It incorporates code from Proto-T,
LokJaw and YB-X viruses and, when in memory, attacks a large election of anti-virus programs as they are executed. Anti-virus programs identified by Firefly's execute/load handler are deleted.
Firefly incorporates simple code from previous issues of the newsletter signed to de-install generic VSAFE resident virus activity
filters designed for Microsoft by Central Point Software.
Tuesday, August 14, 2012
KEYSPY : Password Capturing Made Easy
A little something I cooked up when I was bored one afternoon ...
KEYSPY is a program which is intended to capture keystrokes when a password-protected or login program is run and save them in a hidden file in the root directory. This will enable the resourceful user to find plenty of login names and passwords.
By Sibidharan v 0.90
Monday, August 13, 2012
Sunday, August 12, 2012
Virus found in Middle East that can spy on finance transactions: Kaspersky
A new cyber surveillance virus has been found in the Middle East that can spy on financial transactions, email and social networking activity, according to a leading computer security firm, Kaspersky Lab.
Dubbed Gauss, the virus may also be capable of attacking critical infrastructure and was built in the same laboratories as Stuxnet, the computer worm widely believed to have been used by the United States and Israel to attack Iran's nuclear program, Kaspersky Lab said on Thursday.
Dubbed Gauss, the virus may also be capable of attacking critical infrastructure and was built in the same laboratories as Stuxnet, the computer worm widely believed to have been used by the United States and Israel to attack Iran's nuclear program, Kaspersky Lab said on Thursday.
Saturday, August 11, 2012
Key facts about virus that can steal banking credentials
A new computer virus, dubbed Gauss, has been discovered in the Middle East. Researchers say can it steal banking credentials and hijack login information for social networking sites, email and instant messaging accounts.
Cyber security firm Kaspersky Lab said Gauss is the work of the same "factory" or "factories" that built the Stuxnet worm, which attacked Iran's nuclear program. Here are some key facts about Gauss, according to Kaspersky Lab.
Hack A Remembered password in a browser & Find Out the Password behind The Stars !!
I am going to show you a simple trick with which you can find all the passwords that are remembered on a browser .This post will teach you how to find out the password behind the stars ! *******
.
This post may be Silly for a computer genius or a network hacker .Anyway I recommend them to stop reading this post !
It feels ridiculous and may arise a question in your mind for sure ... "Is this Possible ?"
Yes ! It is . And the best part is that it takes less than 20 seconds to unwrap the mask!
.
This post may be Silly for a computer genius or a network hacker .Anyway I recommend them to stop reading this post !
It feels ridiculous and may arise a question in your mind for sure ... "Is this Possible ?"
Yes ! It is . And the best part is that it takes less than 20 seconds to unwrap the mask!
Doing It With GI :
Almost all the browsers have this feature ...Chrome Chrome:
Wrench menu > SettingsThursday, August 9, 2012
Inbuilt Screenshot Taker in Windows (Problem Step Recorder)
All of us now that we can easily take up screenshots using the print screen button .Most of the linux users are familiar with that ...
And now , if you mess up working with any program in windows and you want a help from your friend .
What will you do ??
This problem makes me to think of the phrase " Windows 7 , your PC simplified"
Yes , the answer is very simple . windows 7 has a inbuilt screenshot taker that records your actions and keystrokes
PROBLEM STEP RECORDER (PSR)
And now , if you mess up working with any program in windows and you want a help from your friend .
What will you do ??
This problem makes me to think of the phrase " Windows 7 , your PC simplified"
Yes , the answer is very simple . windows 7 has a inbuilt screenshot taker that records your actions and keystrokes
PROBLEM STEP RECORDER (PSR)
Wednesday, August 8, 2012
How To Post a Profile Picture in Facebook Chat
Monday, August 6, 2012
Sunday, August 5, 2012
Facebook Phishing Protection
This week, you may have heard about some new phishing websites that were created to look identical to authentic Facebook pages. Phishing is common across the Internet, but the security team at Facebook has been working to halt the spread of these latest malicious sites.
The fake sites, like the one below, use a similar URL to Facebook.com in an attempt to steal people's login information. The people behind these websites, known as "phishers," then use the information to access victims' accounts and send messages to their friends, further propagating the illegitimate sites. In some instances, the phishers make money by exploiting the personal information they've obtained.
The fake sites, like the one below, use a similar URL to Facebook.com in an attempt to steal people's login information. The people behind these websites, known as "phishers," then use the information to access victims' accounts and send messages to their friends, further propagating the illegitimate sites. In some instances, the phishers make money by exploiting the personal information they've obtained.
Saturday, August 4, 2012
Thursday, August 2, 2012
How to read the content from the RAM (Random Access Memory)
How to read the content from the RAM (Random Access Memory)
RAM Stands for "Random Access Memory,". RAM is made up of small memory chips that form a memory module. These modules are installed in the RAM slots on the motherboard of your computer.
RAM Stands for "Random Access Memory,". RAM is made up of small memory chips that form a memory module. These modules are installed in the RAM slots on the motherboard of your computer.
Subscribe to:
Posts (Atom)