Sep 22, 2008
Okay my Communication blackout was just a 24 Hour. Thank god I bought a new phone now. So just want to keep a memory of my Nokia 3500 its service in my blog.
Sep 17, 2008
Guys DRP site got hacked again. This is the 2nd Time the site go hacked. Still up to this time, they have not fixed it. You can see this photo. And if you are lucky u can check the link Clink Here to see if for your self.
Due to upgrade work on my server. My Blog was inaccessible for some time. And now my blog is up n running. N now i have fix many issues.
The First thing is It’s was not Hack lol…... Now you can view the site using Firefox, Opera and Internet Explorer (IE). Many other PHP cording has been down. Just to make it Perfect.
If you have any comments or idea's Plz let me know.
Enjoy....
= !rEy =
The First thing is It’s was not Hack lol…... Now you can view the site using Firefox, Opera and Internet Explorer (IE). Many other PHP cording has been down. Just to make it Perfect.
If you have any comments or idea's Plz let me know.
Enjoy....
= !rEy =
Sep 16, 2008
When back to office, was very happy to go to office again. But not so happy because still my brother was
Sep 14, 2008
Unless you actually watch them use it, they may be secretly grabbing every piece of your information on the device, even deleted messages. If you leave your phone sitting on your desk, or in the center console of your car while the valet parks it, then you and everyone in your contacts list may be at risk, to say nothing of confidential e-mails, spread sheets, or other information. And of course, if you do not want your spouse to see who you are chatting with on your phone, you might want to use extra caution.
There is a new electronic capture device that has been developed primarily for law enforcement, surveillance, and intelligence operations that is also available to the public. It is called the Cellular Seizure Investigation Stick, or CSI Stick as a clever acronym. It is manufactured by a company called Paraben, and is a self-contained module about the size of a BIC lighter. It plugs directly into most Motorola and Samsung cell phones to capture all data that they contain. More phones will be added to the list, including many from Nokia, RIM, LG and others, in the next generation, to be released shortly.
I recently attended and lectured at the Techno-Security conference in Myrtle Beach, Fla. About 1,500 law enforcement and security professionals participated and were briefed on the latest in cybersecurity vulnerabilities from participating federal agents, manufacturers, and cyber-consultants. The CSI Stick caught my attention because of the potential to rapidly and covertly download all of the information contained in many cell phones.
This device connects to the data/charging port and will seamlessly grab e-mails, instant messages, dialed numbers, phone books and anything else that is stored in memory. It will even retrieve deleted files that have not been overwritten. And there is no trace whatsoever that the information has been compromised, nor any risk of corruption. This may be especially troublesome for corporate employees and those that work for government agencies.
The good news: the device should find wide acceptance by parents who want to monitor what their kids are doing with their phones, who they are talking to and text messaging, and where they are surfing. It could also be valuable in secure areas where employees need to be randomly monitored to insure that sensitive information is not compromised through the use of a cell phone as a memory device.
The CSI Stick sells for $200 and requires an added piece of software to mine the data and do sophisticated processing on your computer. So now, in addition to worrying about your conversations or data being intercepted through your Bluetooth headset, there is a new threat, and it is very real.
The rule: if your phone contains sensitive data, do not leave it unattended. If you loan it to someone to use because they tell you theirs is not working, make sure you actually see them using the phone and there is nothing connected to it.
Still today many new system brought today come with windows Vista. A research so that more than 30 % downgraded their new system from windows Vista to Windows XP Pro. Up to today many Leading IT company still stick with XP and waiting for the next windows.
To get more information about Windows 7 visit Blog of Engineering of Microsoft Windows 7
Sep 13, 2008
Here's a list of 5 free security tools you can and should be using to help protect, disinfect and manage your Windows computer.
Number one is the Secunia Personal Software Inspector, quite possibly the most useful and important free application you can have running on your Windows machine.
It can be used to scan all the installed applications on the PC to determine which programs are missing security patches/updates.
The tool works by by examining files on your computer (primarily .exe, .dll, and .ocx files) for meta information on specific software builds installed. After examining all the files on the machine, the collected data is sent to Secunia’s servers and matched against the Secunia File Signatures engine determine the exact applications installed on your system.
It can be used to flag insecure/end-of-life software and find direct download links to missing security updates.
1# Secunia Personal Software Inspector
It can be used to scan all the installed applications on the PC to determine which programs are missing security patches/updates.
The tool works by by examining files on your computer (primarily .exe, .dll, and .ocx files) for meta information on specific software builds installed. After examining all the files on the machine, the collected data is sent to Secunia’s servers and matched against the Secunia File Signatures engine determine the exact applications installed on your system.
It can be used to flag insecure/end-of-life software and find direct download links to missing security updates.
Sep 9, 2008
Then i did some Digging, then I found out that Microsoft have fixed Loop hole they have in Vista Activation. So I tried many ways to find a way to Crack it. You all may think why don't just uninstall the SP1. It won't fix it. Guys don't worry I found out a way to crack it. Its really easy. Just download the file and just run it with administrator right then you are done. click here to download the file.
Life is Good, Share it.......
When ever you try to sign up for a email account or anything think our the internet you are required to fill a form. In this form you have to provide a password to protect it from unortharised access. Well "password" guess a simple word. but if a hacker got Your pass he can do lot of things and i mean" lot". so good passwords are extremely important to prevent unauthorized access to your accounts. when choosing a password is to make it as difficult as possible for a would be intruder (Hack) to guesses about what you've chosen as a password.
In order to make your password strong u need to use combination of letters, numbers, and punctuation etc.
so the following are something the things you should do:
1. use a password with mixed-case alphabetics.
2. use a password with nonalphabetic characters, e.g., digits or punctuation.
3. use a password that is easy to remember, so you don't have to write it down.
4. use a password that you can type quickly, without having to look at the keyboard. This makes it harder for someone to steal your password by watching over your shoulder.
So guys go and change your password.
In order to make your password strong u need to use combination of letters, numbers, and punctuation etc.
so the following are something the things you should do:
1. use a password with mixed-case alphabetics.
2. use a password with nonalphabetic characters, e.g., digits or punctuation.
3. use a password that is easy to remember, so you don't have to write it down.
4. use a password that you can type quickly, without having to look at the keyboard. This makes it harder for someone to steal your password by watching over your shoulder.
So guys go and change your password.
Subscribe to:
Comments (Atom)