Saturday 18 August 2012

CHECK LIST FOR PROTECTION

A protection check list


Here is a checklist of things you can do to make password cracking more difficult:
  1. Audit your organization! Do a walk through and make sure passwords are not stuck to monitors or under keyboards.
  2.  Set up dummy accounts. Get rid of the administrator (or admin) account or set it up as a trap and audit it for attempts.
  3.  Use strong, difficult to guess passwords, and never leave a console unlocked.
  4.  Backups are necessary in case you are compromised. You need a working set of data, so make sure you have it. Keep the tapes secure too, or the data there will be compromised as well.
  5.  Prevent dumpster diving. Don't throw sensitive information away; shred it or lock it up.
  6.  Check IDs and question people you don't know. When you have visitors, check them out and make sure they belong.
  7. Educate your end users. Make sure they aren't prone to social engineering and educate and remind internal users of the company's security policies.

ABOUT HACKING TOOLS

Tools of the trade


One of the most popular tools is L0phtCrack (now called LC4). L0phtCrack is a tool that allows an attacker to take encrypted Windows NT/2000 passwords and convert them to plain text. NT/2000 passwords are in cryptographic hashes and cannot be read without a tool like L0phtCrack. It works by attempting every alphanumeric combination possible to try to crack passwords.

METHODS OF HACKING

Password cracking doesn't always involve sophisticated tools. It can be as simple as finding a sticky note with the password written on it stuck right to the monitor or hidden under a keyboard. Another crude technique is known as "dumpster diving," which basically involves an attacker going through your garbage to find discarded documentation that may contain passwords.


Of course attacks can involve far greater levels of sophistication. Here are some of the more common techniques used in password cracking:

Friday 17 August 2012

Steganography

 NEW TRICK FOR HIDING FILE

Encrypting and decrypting any data has been very old fashion in today’s era. Technology has developed so much that these are something in reach of every Tom, Dick and Harry. So, to be an odd one out in this era, we have to do something new…like Steganography. This is an art of hiding data into data. Merely Steganography is an idea developed in 1950 by a chemical engineer who invented a new way to write with invisible ink between the lines, by scientist Morse. From that era, till today much more have been developed.

Steganography is the science of hiding information. Whereas the goal of cryptography is to make

ABOUT HACKERS

TYPES OF HACKERS

White hat
A white hat hacker breaks security for non-malicious reasons, perhaps to test their own security system or while working for a security company which makes security software. The term "white hat" in Internet slang refers to an ethical hacker. This classification also includes individuals who perform penetration tests and vulnerability assessments within a contractual agreement. The EC-Council, also known as the International Council of Electronic Commerce Consultants has developed certifications, course ware, classes, and online training covering the diverse arena of Ethical Hacking.

Thursday 16 August 2012

C PROGRAM

 C PROGRAM FOR CREATING A SIMPLE CLOCK

This is a simple program which will show you the current time and the clock will keep ticking.

It actually picks the time from the system clock and then display it on the console.

 

Here is the code of the your home made clock.

CHEAT ENGINE

 ABOUT CHEAT ENGINE

Download Cheat Engine 5.5Cheat Engine is an open source tool designed to help you with modifying single player games running under windows so you can make them harder or easier depending on your preference(e.g: Find that 100hp is too easy, try playing a game with a max of 1 HP), but also contains other useful tools to help debugging games and even normal applications.

Download Cheat Engine from

PHISHING


ABOUT PHISHING


The problem with phishing is that most of the people are unaware of the whole issue of phishing. Web users, who are already in threat from various elements like virus, spyware etc, are facing a larger threat than any of them, but what is phishing? And how can it harm you? These are the questions, which will be answered in the next few lines.

Phishing

Phishing is an online scam, where people associated with it pose as legitimate website or links and ask for the details of the user, like the personal, contact and financial details. Then they

YOUR NAME ON YOUR WELCOME SCREEN

SET YOUR NAME ON YOUR WELCOME SCREEN

Open Notepad
Paste the bellow code in NpDim speaks,

speechspeaks="Welcome Back, Username"Set speech=CreateObject("sapi.spvoice")speech.Speak speaks

Replace Username with your Name