Image Source: babble   Majority of us have started using Internet not just for searching information, but to pay bills, buy things, money transfer, work from home and much more. Many hackers take advantage of this and are trying various...

Basic information of cryptography

Cryptography Cryptograthy is used for security. Simply Cryptography is converting the understanable text to not understanable text. Encryption means converting plaintext into cipher text. Decryption means converting cipher text into plain...

What is Hacking

How should a person start hacking?? That means what should be the first step of him in the world of hacking?? Hacking is not a thing which someone can learn from others. But, ya at first he should see how hackers work, and also have a look on the...

Viruses

    What is a Virus? A virus is a program that is able to replicate, that is create (possibly modified) copies of itself. Like biological viruses, computer viruses can spread quickly and are often difficult to eradicate. They can attach...

There some tricks with the use of which you can apply security and also will get some knowledge   1.) To see internal & external IP : a. Internal IPmethod 1st steps : a. My N/W Places [ right click ] b. properties c. Lan [ right click ] -->...

Mobile Power conservation

  MOBILE POWER CONSERVATION   INTRODUCTION:   · In today’s world of mobile communications, one of the most precious commodities is power. The mobile can only operate as long as its battery maintains power. · Most software-level techniques...

Password cracking

Password cracking is the process of recovering password from data that has been stored in or transmitted by a COMPUTER SYSTEM. A common approach is to repeatedly try guesses for the password. The purpose of password cracking might be to help a user...

AVG 9.0

  AVG 9.0 antivirus software is going to hit the markets this month. The improvements in the upcoming version can be seen in the speed and the levels of protection offered by it. The best of the free anti-malware products, AVG 9.0 will being to...

Surfing from an internet cafe

Now day’s internet hackers are using Internet cafes mainly so that it will be tougher to trace them. Most of us, who even have internet connection at home, uses internet cafes often, when it urgent and when we are away. But we must be careful while...

Hi Friends, We are all using Pen Drives now a days.  I do not think any one without a Pen Drive.  Pen Drive is very much useful to carry huge amount of data from place to place. There are pen drives having memory storage capacities ranging from 1...

http:// and https://

While browsing internet or more specificaly while opening internet sites all of you must have seen in the url's(uniform resource locator) say for eg.http://www.google.comis the url of google server.the url of a web server is same as we have home...

Got fed up with the virus in your sytem . now there is a fine solution to your problems. Do you belive that a 2 mb software clears all your viruses . but this is true. combofix software is the only fast solution. helping in solve my problems from...

Computer Virus Symptons... your computer runs more slowly than normal. your computer stops responding or locks up often. your computer crashes and restarts every few minutes. Applications on your system don't work properly. Disk or Disk...

Hi Friends I was facing a problem in my laptop cause of autorun.inf virus it is not harmful but when i open mycomputer and then any drive(C:,D:,etc.) then it was opened in new window every time. So the number of window opened in task bar is...

Protection from virus

hiiiiiiii this article tells u that how can u protect ur computer from virus from remaovable media.. so dont open ur removable media by double clicking,,open it from ur folders pane i.e. in ur left side of my computer window,,,,,,by this u...

Phishing

Recently now a days computer security became very predominant. Now the government websites are also getting attacked by the hackers. Hackers are cleverly hacking the sites and doing phishing. Why phishing ? Phishing is mainly done for stoling...

Anyone who works in ecommerce will tell you that one of the first priorities that you need to look after is data security. there are several reasons but one of the more immediate is the fact that threats are constantly looming on the internet that...

Lock And Hide Any Folder

Here i will show you how to lock and hide any folder in windows without using any software........ soo firstly open notepad copy this script cls@ECHO OFFtitle Folder Lockerif EXIST "Control Panel.{21EC2020-3AEA-1069-A2DD-08002B30309D}" goto...

What is Spam....? žSpam messages is a kind of message which is send by a machine to cell phones by generating the numbers randomly called as Brute-Force. žWe can stop spammers from intruding your private mobile by keeping unwanted text...

Social networking had grown a lot and now a days social networking sites became an inevitable part of internet.That's why hackers had changed the concentration to these sites. They like these sites because we spend many hours their online which...

Powered by CjBlog