Skip to main content

Posts

Showing posts with the label Computer

Computer viruses

Computer viruses—just the thought of your trusty PC catching one is probably enough to make you sick. Thanks to the cyber-sickies who persist in coming up with new strains, there’s a major new cyberattack nearly every day. Viruses sneak in, usually through e-mail. Fortunately, there are ways to inoculate and protect your computer. Computer Viruses For Dummies helps you: Understand the risks and analyze your PC’s current condition Select, install, and configure antivirus software Scan your computer and e-mail Rid your computer of viruses it’s already caught Update antivirus software and install security patches Use firewalls and spyware blockers Protect handheld PDAs from viruses Adopt safe computing practices, especially with e-mail and when you’re surfing the Net Written by Peter H. Gregory, coauthor of CISSP For Dummies and Security + For Dummies, Computer Viruses For Dummies goes beyond viruses to explain other nasty computer infections like Trojan horses, HiJackers, worms, phis...

-Practical Packet Analysis: Using Wireshark to Solve Real-World Network Problems

-Practical Packet Analysis: Using Wireshark to Solve Real-World Network Problems- It's easy to capture packets with Wireshark, the world's most popular network sniffer, whether off the wire or from the air. But how do you use those packets to understand what's happening on your network? With an expanded discussion of network protocols and 45 completely new scenarios, this extensively revised second edition of the best-selling Practical Packet Analysis will teach you how to make sense of your PCAP data. You'll find new sections on troubleshooting slow networks and packet analysis for security to help you better understand how modern exploits and malware behave at the packet level. Add to this a thorough introduction to the TCP/IP network stack and you're on your way to packet analysis proficiency. Learn how to: Use packet analysis to identify and resolve common network problems like loss of connectivity, DNS issues, sluggish speeds, and malware infections Build...

Advance Matrix Code . . .

                    Advance Matrix Code . . . Save in Note pad:-        @echo off color 0A :A echo b r E w e 4 e T r 8 M e F r a c h a S t 3 D a C r a  s p e s T e 4 h 2 w r e G 2 ping -w .9 >nul echo R E 9 8 8 R a t r e g 6 n u m A b R E X e Y A T u C  7 a D R a c r u C e B E p e ping -w .9 >nul echo c E B E s A d R u B R 3 H e R u D 7 g u d U 7 T a b  u T 5 e p E 2 a v e 6 8 a Z ping -w .9 >nul echo n u r A X a j a s t a 9 h a 6 e h e G a s u t r a t  r A y a f E q u 8 u b R u d ping -w .9 >nul echo k u v e 4 E 6 3 e t r a d r e f e y e q e 6 U H e z  U b r u R a s 2 4 3 r A N a ping -w .9 >nul echo v u P R a b R u c e d U s w a h a c r a t h U 7 r a  h u t u h u V e 7 U k u S a ping -w .9 >nul echo T e D r e 8 A p r a d a b u f U c u c E h E t 7 c r  5 s P a f r e t h u t 9 u t   pi...

Metasploit:-Beast Unleashed:-Information Gathering

Information Gathering The foundation for any successful penetration test is solid information gathering. Failure to perform proper information gathering will have you flailing around at random, attacking machines that are not vulnerable and missing others that are.  We will next cover various features within the Metasploit framework that can assist with the information gathering effort.

Metasploit:-Beast Unleashed-Introduction

                        Introduction:- "If i'd 10 hours to chop down down a tree,i'd spent  the first six hours sharping my axe."                 - Abraham Lincoln What makes an Man perfect?? The answer is practice , their is a popular quote :-"Practice makes man perfect" All What We have to Do is practice and their will be Good result . . I consider the MSF to be one of the single most useful auditing tools freely available to security professionals today. From a wide array of commercial grade exploits and an extensive exploit development environment, all the way to network information gathering tools and web vulnerability plugins. The Metasploit Framework provides a truly impressive work environment. The MSF is far more than just a collection of exploits, it's an infrastructure that you can build upon and utilize for your custom needs. This...

Best 101 Softwares Best of you Can use

Good things in life do not necessarily cost you a  bomb. Below I have compiled a list of the top  100  101 free computer software you can make use of. Enjoy! Office Suite OpenOffice.org  – OpenOffice.org is a viable alternative to Microsoft Office – even for professional use. It can do just about anything Office can. AbiWord  – A lightweight version of Microsoft Office. Simple, straightforward interface; easy to use. Jarte  – A word processor based on the Microsoft WordPad. It can be run directly from a USB flash drive. Notepad++  – A free source code editor and Notepad replacement, which supports several programming languages, running under the MS Windows environment. EditPad Lite  – A general-purpose text editor, designed to be small and compact, yet offer all the functionality you expect from a basic text editor. Security avast! 4 Home Edition  – A complete antivirus solution that is able to find computer viruses, create and c...