Social engineering is a term that describes a non-technical kind of intrusion that relies heavily on human interaction and often involves tricking other people to break normal security procedures. A social engineer runs what used to be called a "con game." For example, a person using social engineering to break into a computer network might try to gain the confidence of an authorized user and get them to reveal information that compromises the network's security. Social engineers often rely on the natural helpfulness of people as well as on their weaknesses. They might, for example, call the authorized employee with some kind of urgent problem that requires immediate network access. Appeal to vanity, appeal to authority, appeal to greed, and old-fashioned eavesdropping are other typical s
...
Read more »
|
Social engineering is a term that describes a non-technical kind of intrusion that relies heavily on human interaction and often involves tricking other people to break normal security procedures. A social engineer runs what used to be called a "con game." For example, a person using social engineering to break into a computer network might try to gain the confidence of an authorized user and get them to reveal information that compromises the network's security. Social engineers often rely on the natural helpfulness of people as well as on their weaknesses. They might, for example, call the authorized employee with some kind of urgent problem that requires immediate network access. Appeal to vanity, appeal to authority, appeal to greed, and old-fashioned eavesdropping are other typical social engineering techniques. Social engineering is a component of many, if not most, types of exploits. Viru ... Read more » |
You guys must be aware of Portal attack for hacking a website. Portal hacking A.K.A. DotNetNuke(DNN) attack. So here it is, let’s start: 1. Open google.com and type”inurl:fcklinkgallery.aspx” (this is for searching sites which are vulnarable to this attack. 2. Now select any website from the list. |
Every once in a while, some new video game technology is released that could change the way games could be played. We’ve already seen the announcement from Microsoft with their Project Natal, and Sony is chiming in with its own great advancement. Sony has recently announced that the ... Read more » |
Method 1 Boot up with DOS and delete the sam.exe and sam.log files from Windows\system32\config in your hard drive. Now when you boot up in NT the password on your built-in administrator account which will be blank (i.e No password). This solution works only if your hard drive is FAT kind. Method 2 Step 1. Put your hard disk of your computer in any other pc .
...
Read more »
|
Sometimes we delete the files permanently, and realize that deleting them is like a Blunder... For all those folks, Here is the solution Software called "Kissass Undelete" , can bring those files from the hard disk or your flash drive. Conditions : Only if the data on that drive is not re-occupied(or written). that means the space which was available after the deletion is not been occupied after the deletion. Click Here to download the . 1) To start searching for the files, Select the drive from the Left panel of the Windows and Click the scan button. the Scan might take upto 10 secs. 2) When the files search has been ... Read more » |
Today we are releasing a very interesting whitepaper which describes a DNS poisoning attack against stub resolvers. It discloses two vulnerabilities:
|
Cloud computing is a general term for anything that involves delivering hosted services over the Internet. These services are broadly divided into three categories: Infrastructure-as-a-Service (IaaS), Platform-as-a-Service (PaaS) and Software-as-a-Service (SaaS). The name cloud computing was inspired by the cloud symbol that's often used to represent the Internet in
...
Read more »
|
Just thinking about likely near-term innovations in computing is exciting, but slowly a longer-term vision is coming into focus. Down the road we're probably going to have access to something approaching all information all the time. Our lives - much longer by then because of the implications of this for medical care - will be enriched, even as our behavior will be very unlike how we live today. The other huge, and related, move of the moment is toward ultimate mobility. Several trends are taking us there. The cellphone is becoming more like a PC while the PC is becoming more like a cellphone. In short, the next great era of computing - succeeding the PC one - will likely be about smaller, cheaper, more-powerful portable devices.Already much of our softwa
...
Read more »
|
|