Wednesday, 2018-09-19, 5:46 AM
TechGeenix MainRegistrationLogin
Welcome Guest | RSS
Site menu
Section categories
Computer tricks and tips [5]
Advanced Computing [6]
H4ckers' Z0n3 [8]
Statistics

Total online: 1
Guests: 1
Users: 0
Login form
 Home page 

Social engineering is a term that describes a non-technical kind of intrusion that relies heavily on human interaction and often involves tricking other people to break normal security procedures.
A social engineer runs what used to be called a "con game." For example, a person using social engineering to break into a computer network might try to gain the confidence of an authorized user and get them to reveal information that compromises the network's security. Social engineers often rely on the natural helpfulness of people as well as on their weaknesses. They might, for example, call the authorized employee with some kind of urgent problem that requires immediate network access. Appeal to vanity, appeal to authority, appeal to greed, and old-fashioned eavesdropping are other typical s ... Read more »
Category: H4ckers' Z0n3 | Views: 10899 | Added by: geenix | Date: 2012-09-12 | Comments (6)


Social engineering is a term that describes a non-technical kind of intrusion that relies heavily on human interaction and often involves tricking other people to break normal security procedures.
A social engineer runs what used to be called a "con game." For example, a person using social engineering to break into a computer network might try to gain the confidence of an authorized user and get them to reveal information that compromises the network's security. Social engineers often rely on the natural helpfulness of people as well as on their weaknesses. They might, for example, call the authorized employee with some kind of urgent problem that requires immediate network access. Appeal to vanity, appeal to authority, appeal to greed, and old-fashioned eavesdropping are other typical social engineering techniques.
Social engineering is a component of many, if not most, types of exploits. Viru ... Read more »
Category: H4ckers' Z0n3 | Views: 5215 | Added by: geenix | Date: 2012-09-12 | Comments (1)


You guys must be aware of Portal attack for hacking a website. Portal hacking A.K.A. DotNetNuke(DNN) attack.
So here it is, let’s start:
1.   Open google.com and type”inurl:fcklinkgallery.aspx” (this is for searching sites which are vulnarable to this attack.
2.   Now select any website from the list.
... Read more »
Category: H4ckers' Z0n3 | Views: 19738 | Added by: geenix | Date: 2012-09-10 | Comments (32)


Every once in a while, some new video game technology is released that could change the way games could be played. We’ve already seen the announcement from Microsoft with their Project Natal, and Sony is chiming in with its own great advancement. Sony has recently announced that the  ... Read more »
Category: Advanced Computing | Views: 3950 | Added by: geenix | Date: 2012-09-06 | Comments (1)


Method 1 
Boot up with DOS and delete the sam.exe and sam.log files from Windows\system32\config in your hard drive. Now when you boot up in NT the password on your built-in administrator account which will be blank (i.e No password). This solution works only if your hard drive is FAT kind.
Method 2
Step 1. Put your hard disk of your computer in any other pc .
Category: Computer tricks and tips | Views: 1221 | Added by: geenix | Date: 2012-09-05 | Comments (1)


Sometimes we delete the files permanently, and realize that deleting them is like a Blunder...
For all those folks,
Here is the solution
Software called "Kissass Undelete" , can bring those files from the hard disk or your flash drive.
Conditions : Only if the data on that drive is not re-occupied(or written). that means the space which was available after the deletion is not been occupied after the deletion.
Click Here  to download the .
1)
To start searching for the files,
Select the drive from the Left panel of the Windows and Click the scan button.
the Scan might take upto 10 secs.
2)
When the files search has been ... Read more »
Category: Computer tricks and tips | Views: 1181 | Added by: geenix | Date: 2012-09-05 | Comments (2)


Today we are releasing a very interesting whitepaper which describes a DNS poisoning attack against stub resolvers.
It discloses two vulnerabilities:
  1. A vulnerability in Java (CVE-2011-3552, CVE-2010-4448) which enables remote DNS poisoning using Java applets. This vulnerability can be triggered when opening a malicious webpage. A successful exploitation of this vulnerability may lead to disclosure and manipulation of cookies and web pages, disclosure of NTLM credentials and clipboard data of the logged-on user, and even firewall bypass.
    ... Read more »
Category: H4ckers' Z0n3 | Views: 1485 | Added by: geenix | Date: 2012-09-02 | Comments (1)


Cloud computing is a general term for anything that involves delivering hosted services over the Internet. These services are broadly divided into three categories: Infrastructure-as-a-Service (IaaS), Platform-as-a-Service (PaaS) and Software-as-a-Service (SaaS). The name cloud computing was inspired by the cloud symbol that's often used to represent the Internet in  ... Read more »
Category: Advanced Computing | Views: 1128 | Added by: geenix | Date: 2012-09-01 | Comments (1)


Just thinking about likely near-term innovations in computing is exciting, but slowly a longer-term vision is coming into focus.
Down the road we're probably going to have access to something approaching all information all the time. Our lives - much longer by then because of the implications of this for medical care - will be enriched, even as our behavior will be very unlike how we live today.
The other huge, and related, move of the moment is toward ultimate mobility. Several trends are taking us there. The cellphone is becoming more like a PC while the PC is becoming more like a cellphone. In short, the next great era of computing - succeeding the PC one - will likely be about smaller, cheaper, more-powerful portable devices.Already much of our softwa ... Read more »
Category: Advanced Computing | Views: 1175 | Added by: geenix | Date: 2012-09-01 | Comments (0)


It is very easy to hack a human brain and pluck things such as bank details from the head using technology that costs only a few hundred dollars, scientists claim.A team of researchers from the University of Oxford in Geneva and the University of California in Berkeley explained the process using an off-the-shelf Emotiv brain-computer interface that only cost a few hundred dollars. Volunteers for the security experiment were asked to wear an Emotiv BCI head piece and sat in front of a computer screen that showed images of maps, banks and card PINS. The researchers then tracked the P300 brain signal, which is given off when the brain registers meaningful stimuli. The team found they could consistently reduce the random data in each variable by 15 to 40 per cent, a marked advantage over random guessing. Subjects were essential ... Read more »

Category: H4ckers' Z0n3 | Views: 1164 | Added by: geenix | Date: 2012-08-31 | Comments (1)

1 2 »
Search
Calendar
«  September 2018  »
SuMoTuWeThFrSa
      1
2345678
9101112131415
16171819202122
23242526272829
30
Entries archive
Site friends
  • Create a free website
  • Online Desktop
  • Free Online Games
  • Video Tutorials
  • All HTML Tags
  • Browser Kits
  • Copyright k4ll0l © 2018