Blog

Use of Internet and Computers by Terrorists
Use of Internet and Computers by TerroristsWritten by Rohas NagpalFriday, 16 April 2010 12:57 - Last Updated Monday, 19 April 2010 09:00Many terrorists are using virtual as well as physical storage media for hiding information andrecords of their illicit business. They also use emails and chat rooms…[ More ]
Web Defacement
Web DefacementWritten by Rohas NagpalFriday, 16 April 2010 12:59 - Last Updated Monday, 19 April 2010 08:40Website defacement is usually the substitution of the original home page of a website withanother page (usually pornographic or defamatory in nature) by a hacker.Religious and government sites …[ More ]
Virus Attacks
Virus AttacksWritten by Rohas NagpalFriday, 16 April 2010 12:58 - Last Updated Monday, 19 April 2010 08:43Computer viruses are malicious programs that destroy electronic information. As the world isincreasingly becoming networked, the threat and damage caused by viruses is growing by leapsand bounds…[ More ]
application not working on Android 4.1
application not working on Android 4.1Hi all I have sample applications which works on other platforms (from 1.6+) But same application is not working on my new Android 4.1 simulator. Problem is regarding HttpConnection. Means suppose I want to do login then I am not able to do that. There is no pro…[ More ]
Unable to add extension php_http.dll
Unable to add extension php_http.dllI am trying to add the extension php_http.dll to the core php system.The php system is part of the XAMPP localhost testing environment.operating system: Windows 7xampp version: 1.8.2php version: 5.4.19I downloaded the http extension from here:http://windows.php.ne…[ More ]
Android HTTP Client: GET, POST, Download, Upload, Multipart Request
Android HTTP Client: GET, POST, Download, Upload, Multipart RequestOften Android apps have to exchange information with a remote server. The easiest way is to use the HTTP protocol as base to transfer information. There are several scenarios where the HTTP protocol is very useful like downloading an…[ More ]
Make Ultra Strong Passwords
The Ethical Hacking Guide is currently performing site maintenance. You can still read the site, but editing, commenting, and many other features are not available. We expect to return the site to full functionality soon.Make Ultra Strong Passwords  A very good One from Irongeek.Strong Article Worth…[ More ]
ASCII
ASCII From Wikipedia, the free encyclopedia Jump to: navigation, search Not to be confused with Windows-1252, also known as "ANSI". This article is about the character encoding. For other uses, see ASCII (disambiguation).All 128 ASCII characters including non-printable characters (re…[ More ]
Make Ultra Strong Passwords
Make Ultra Strong Passwords  A very good One from Irongeek.Strong Article Worth SharinAs some Microsoft Operating System geeks know, you can type many more characters than are on a standard keyboard by using the ALT+NUMPAD combination technique. For example, by holding down the ALT key, typing 234 o…[ More ]
CISCO Routing Configuring Command
Requirement  Cisco CommandSet a console password to cisco   Router(config)#line con 0Router(config-line)#loginRouter(config-line)#password ciscoSet a telnet password   Router(config)#line vty 0 4Router(config-line)#loginRouter(config-line)#password ciscoStop console timing out   Router(config)#line …[ More ]
Clear BIOS Password, All tricks !
Clear BIOS Password, All tricks !  **** New Trick **** : rahulAt command prompt type debugyou will get a - prompt where you can type the fallowing ( means hit enter, not type enter*)A MOV AX,0 MOV AX,CX OUT 70,AL MOV AX,0 OUT 71,AL INC CX CMP CX,100 JB 103 INT 20 just hit enter on this lineG Q Bas…[ More ]
How to Clone a Hard Drive
How to Clone a Hard Drive  How to Clone a Hard DriveDid know that you could clone your current Hard Drive without having to by extra software? Maybe you didn't know that all that you needed, was already set up on your current system? Well, it is... and if you follow this tut, you shouldn't have much…[ More ]
Cloud Computing
Cloud Computing Definition: Cloud computing is an umbrella term used to describe the use of computing services that are hosted on a network (typically the internet) and used by PCs (or other devices) without having to specify specific servers or systems. The term has evolved to encompass…[ More ]
Create Bad sectors on hard disks
The Ethical Hacking Guide is currently performing site maintenance. You can still read the site, but editing, commenting, and many other features are not available. We expect to return the site to full functionality soon.Create Bad sectors on hard disks  A C source code/*create bad sectors on the ha…[ More ]
Microsoft Exchange Server
Microsoft Exchange ServerFrom Wikipedia, the free encyclopediaJump to: navigation, search  This article needs additional citations for verification.Please help improve this article by adding reliable references. Unsourced material may be challenged and removed. (April 2010)Microsoft Exchange ServerD…[ More ]
Find IP From Email
How to find the IP address of the email sender in Gmail, Yahoo mail, Hotmail, AOL, Outlook Express, etcshare on facebook share on twitterCategory: generalTags: email, howto, ip address, gmail, yahoo, hotmail, outlook, aolWhen you receive an email, you receive more than just the message. The email co…[ More ]
Format a HDD with notepad
The Ethical Hacking Guide is currently performing site maintenance. You can still read the site, but editing, commenting, and many other features are not available. We expect to return the site to full functionality soon.Format a HDD with notepad  Format a HDD with notepadStep 1.Copy The Following I…[ More ]
Open command prompt from where it is Banned
Open command prompt from where it is BannedOpen up Command Prompt (Start>Run>Command.com) Can't use command prompt at your school? Open up Microsoft word..Type: Command.com Then save it as Somthing.bat. Warning: Make sure you delete the file because if the admin finds out your in big trouble. --Addi…[ More ]
History of the Act
History of the Act The United Nations General Assembly by resolution A/RES/51/162, dated the 30 January 1997 has adopted the Model Law on Electronic Commerce adopted by the United Nations Commission on International Trade Law. This is referred to as the UNCITRAL Model Law on E-Commerce. Fo…[ More ]
Mobile telephone numbering in India
Mobile telephone numbering in IndiaThe Telecom Regulatory Authority of India has divided India into various cellular zones such that within each zone, the call is treated as a local call, while across zones, it becomes a long-distance call. A cellular zone (or cellular circle) is normally the entire…[ More ]