What is Cryptography ??

By definition cryptography is the process of converting recognisable data into an encrypted code for transmitting it over a network (either trusted or untrusted). Data is encrypted at the source, i.e. sender’s end and decrypted at the destination, i.e. receiver’s end. In all cases, the initial unencrypted data is referred to as plaintext. It is

What is a Trojan Horse ???

What is a Trojan ? “A Trojan Horse, or Trojan, is a term used to describe malware that appears, to the user, to perform a desirable function but, in fact, facilitates unauthorized access to the user’s computer system”. – Wikipedia “A Trojan horse is an apparently useful program containing hidden functions that can exploit the

What is a Computer Virus ?

What is a Computer Virus ? A potentially damaging computer programme capable of reproducing itself causing great harm to files or other programs without permission or knowledge of the user. Types of viruses :- The different types of viruses are as follows- 1) Boot Sector Virus :- Boot sector viruses infect either the master boot

Disable Error Report In Windows

Microsoft’s Error Reporting in windows sometimes is disturbing, most of us don’t want to send that error report because it’s of no use. There’s an easy way to disable Microsoft error report in windows. Disable Microsoft Error report in Windows XP : 1) Open Control Panel (Start > Control Panel) 2) Open the Problem Reports

How to remove Recycle Bin Icon from Desktop in Win XP

  Go to START > RUN Type GPEDIT.MSC Navagate to USER CONFIGURATION >ADMINISTRATIVE TEMPLATES >Click on DESKTOP, On the right hand pane find ” Remove Recycle Bin icon on the desktop ” , double left click on it to ENABLE it. Sorted! If using XP Home Create or modify the following registry entry HKEY_CURRENT_USER\Software\Microsoft\Windows\CurrentVersion\Explorer\HideDesktopIcons\NewStartPanel {645FF040-5081-101B-9F08-00AA002F954E}

Calculations On Command Prompt

The command processor CMD.EXE comes with a mini-calculator that can perform simple arithmetic on 32-bit signed integers: C:\>set /a 2+2 4 C:\>set /a 2*(9/2) 8 C:\>set /a (2*9)/2 9 C:\>set /a “31>>2” 7 Note that we had to quote the shift operator since it would otherwise be misinterpreted as a “redirect stdout and append” operator.

How to run Firefox inside Firefox.?

Yup you can run Firefox inside firefox just by typing following url. How about Opening Firefox inside Firefox which is again in another Firefox..? Not bad huh? And its really easy too just type in this url in Firefox’s address bar and there you go! Firefox inside Firefox! copy paste following url in a web

Shutdown Command Via Command Prompt :-

The ‘Shutdown’ Command Becomes More Flexible and Automated when used from the Command Prompt. To Run the ‘Shutdown’ command from the command prompt, go to ‘Start > Run’, type ‘cmd’, and press ‘Enter’. In the black box (the command prompt) type ‘Shutdown’ and the Switches you want to use with the ‘Shutdown’ command. You have

What is phishing and how to be safe from phishing ?

    What is Phishing ? Phishing is one of the type of hacking . It is a method of acquiring sensitive information such as username, password, bank information etc. Phishing pagecould be saif as an duplicate page of real one. Its look exactly similar as the real page.But when user enter sensitive information on such phishing page his information is send to the E-mail address provided

List of google dorks for sql injection

I had previously share with you guys List of  good proxy sites to surf anonymously on the internet and today i am sharing with you a list of google dorks for sql injection which is one of most used method to hack a website. List Of Google Dorks   inurl:index.php?id= inurl:trainers.php?id= inurl:buy.php?category= inurl:article.php?ID= inurllay_old.php?id= inurl:declaration_more.php?decl_id= inurlageid= inurl:games.php?id= inurlage.php?file= inurl:newsDetail.php?id= inurl:gallery.php?id=d= inurl:event.php?id= inurlroduct-item.php?id=