acid-burninfo.blogspot.com
acid-burninfo(in update status): January 2011
http://acid-burninfo.blogspot.com/2011_01_01_archive.html
Sunday, January 23, 2011. Performing Active Reconnaissance:with Nmap. Download the most current version of Nmap. Http:/ nmap.org/download.html. Open a command prompt and go to the directory that you have installed Nmap in. Run Nmap ] from the command line to see the various options. Perform a full connect scan on one of the local devices you have identified on your network. The syntax is. Perform a stealth scan on one of the local devices you have identified on your network. The syntax is. I-Newswire) Ap...
acid-burninfo.blogspot.com
acid-burninfo(in update status): Penetration Testing
http://acid-burninfo.blogspot.com/2011/04/penetration-testing.html
Thursday, April 7, 2011. Test one of the security assessments that perform on a computer system in which the person performing the assessment attempts to hack into the system. The main purpose is to find out whether or not person with malicious intent can enter the system, and what that person can access once the system has been penetrated. Offered by a number of security firms which specialize in the security of computer systems. Host Assessments is meaning. When doing the penetration testing, pentest t...
acid-burninfo.blogspot.com
acid-burninfo(in update status): July 2010
http://acid-burninfo.blogspot.com/2010_07_01_archive.html
Thursday, July 29, 2010. Unix and Linux File Permissions Octet (8). Rwx - 4 2 1 = 7. Permission concept for filesystems. When you install xampp there will include their file. Go to local c apache file. Try to search httpd.conf. In that file you will see like this or fine this line. Listen [: ].80. Listen 80 - change this line try to changes to others port like 85 or something. Labels: xampp port changes. Thursday, July 1, 2010. Well Known Trojans and Their Ports. Well Known Trojans and Their Ports. 1269 ...
acid-burninfo.blogspot.com
acid-burninfo(in update status): March 2010
http://acid-burninfo.blogspot.com/2010_03_01_archive.html
Wednesday, March 17, 2010. Source http:/ news.discovery.com/tech/my-favorite-hackers.html. Thu Dec 3, 2009 05:30 AM ET content provided by Ryan Draga. As a self-proclaimed hacker, who means you no harm, I stand on the shoulders of giants. The following people have set the standard for hacking and have given all of us newbies something to the strive for. These are some of the Great Ones, the ones we admire, emulate. These are my favs. Robin may be new to the scene, but he's definitely been talked about...
acid-burninfo.blogspot.com
acid-burninfo(in update status): November 2010
http://acid-burninfo.blogspot.com/2010_11_01_archive.html
Wednesday, November 3, 2010. How to protect password screen sever. 1press the window R keystrokes to open the run command. 2type in gpedit .msc and click ok. 3Expand user configuration Administrative Templates Control Panel. 4Click the Display container. 5In the details pan,doubles click password the screen saver. Labels: how to protest password screen sever. Subscribe to: Posts (Atom). 10 reasons why PCs crash U must Know. Advantages and Disadvantages of FTK and EnCase. Gerix Wifi Cracker Tutorial.
acid-burninfo.blogspot.com
acid-burninfo(in update status): April 2011
http://acid-burninfo.blogspot.com/2011_04_01_archive.html
Thursday, April 7, 2011. Test one of the security assessments that perform on a computer system in which the person performing the assessment attempts to hack into the system. The main purpose is to find out whether or not person with malicious intent can enter the system, and what that person can access once the system has been penetrated. Offered by a number of security firms which specialize in the security of computer systems. Host Assessments is meaning. When doing the penetration testing, pentest t...
iphelp.be
Inside Parts Support :: De basis voor een virus- en spyware controle
http://www.iphelp.be/basiscontrole.html
Anti-malware software and tools. Basis virus- en spyware controle. Meer informatie over spam. Meer informatie over hoax. Hoe een printscreen nemen. Basis virus- en spyware controle. De basis voor een virus- en spyware controle. Laatste update van deze pagina: 15/11/2014. Indien u vermoedt dat uw pc besmet is met malware (virussen, spyware, .), dan doet u best meteen een aantal controles. In de meeste gevallen begint u met 3 virus/spyware scans te doen:. Zoekt vooral naar spyware. Staat in detail uitgeleg...
acid-burninfo.blogspot.com
acid-burninfo(in update status): Gerix Wifi Cracker
http://acid-burninfo.blogspot.com/2011/05/gerix-wifi-cracker.html
Sunday, May 22, 2011. GerixWiFiCracker is GUI for Aircrack-ng suite, is designed for pentesting in a realworld with efficent and userfriendly graphic interface. Usually Gerix Wifi Cracker can be found in any backtrack version ,gerix quit fun easy to use . In next section i will show the demo about gerix. Labels: Gerix Wifi Cracker. Subscribe to: Post Comments (Atom). 10 reasons why PCs crash U must Know. Advantages and Disadvantages of FTK and EnCase. Common Mistakes Made During a Computer Forensic.
acid-burninfo.blogspot.com
acid-burninfo(in update status): February 2010
http://acid-burninfo.blogspot.com/2010_02_01_archive.html
Sunday, February 28, 2010. Nikto is an Open Source web server scanner. You can download in web that i have write in recent post. After your download you can get this file. Before your start run nikto first thing you must do is install the ActivePerl in your computer ,in this case i have install ActivePerl-5.10.1.1007-MSWin32-x86-291969 into my computer. Just run it like usual . After that copy file nikto and put it into drive c or d ,depend on you. Open program Accessories Command prompt. In nikto file .
acid-burninfo.blogspot.com
acid-burninfo(in update status): Common Mistakes Made During a Computer Forensic
http://acid-burninfo.blogspot.com/2011/04/common-mistakes-made-during-computer.html
Thursday, April 7, 2011. Common Mistakes Made During a Computer Forensic. A company suspects data on a computer and believes that it will be important to their case. The organization's lawyers subsequently ask the IT technician to print, download, and/or save the data to portable media. The technician goes to the site, turns on the computer, opens the files, prints the data, and saves the data on a CD. From forensic investigator’s perspective, discuss mistakes that happen in the above scenario. Of turnin...