computer-tricks-tron.blogspot.com
computer tricks: Test Your Internet Speed
http://computer-tricks-tron.blogspot.com/2011/08/test-your-internet-speed.html
Test Your Internet Speed. All of us have Internet Connections. At our places. and pay for costly Hi-Speed. But never thought of checking the speed that you actually get? Well I made an application to serve the purpose. Application Size = 208 KB. It checks the Internet Speed. From a Calcutta Server. Downloads a 128 KB. It calculates your inernet Speed for you. What you need to have :. Net Framework 2.0. Or higher (Vista has it preloaded). On Saturday, August 27, 2011. Subscribe to: Post Comments (Atom).
computer-tricks-tron.blogspot.com
computer tricks: Keep Your Internet Alive
http://computer-tricks-tron.blogspot.com/2011/08/keep-your-internet-alive.html
Keep Your Internet Alive. These days Broadband connections. We are always connected. This annoys the ISP. Recently, I made some changes in my internet connection and faced the following problem and came out with a solution. S( Internet Service Providers. The connection after some time in case of absolute inactivity. This reduces the load on their servers. This is irritating for the user, as he has to login every now and then. You are reading an article and after 10 mins. as you turn to next page? Hack Wi...
computer-tricks-tron.blogspot.com
computer tricks: Understanding the Snort architecture
http://computer-tricks-tron.blogspot.com/2015/08/understanding-snort-architecture.html
Understanding the Snort architecture. Snort first started as a packet sniffer. Another common example of a packet sniffer is tcpdump, or its graphical big brother Wireshark. In order to evolve into the IDS software that it is today, Snort added a few things in its architecture. It currently functions as a core with plug-ins system, where its primal component (the sniffer) is the core and the other elements act as plug-ins. The other elements are the preprocesors, the detection engine and the output.
computer-tricks-tron.blogspot.com
computer tricks: Create a Standard Ghost Bootup
http://computer-tricks-tron.blogspot.com/2011/08/create-standard-ghost-bootup.html
Create a Standard Ghost Bootup. This trick shows you how create a standard Symantec Ghost bootup floppy set (i.e. without Network). The " Standard Ghost Boot Disk. Option from Symantec Ghost allows you to create a set of 2 bootable floppy disks to use with Ghost tools for backup/restore hard drives and partitions. The " Standard Ghost Boot Disk. If you're looking for the instructions how to create a Network Ghost Bootup, click Here. Use this trick at your own risk. Open the " Symantec Ghost Boot Wizard.
computer-tricks-tron.blogspot.com
computer tricks: August 2011
http://computer-tricks-tron.blogspot.com/2011_08_01_archive.html
Keep Your Internet Alive. These days Broadband connections. We are always connected. This annoys the ISP. Recently, I made some changes in my internet connection and faced the following problem and came out with a solution. S( Internet Service Providers. The connection after some time in case of absolute inactivity. This reduces the load on their servers. This is irritating for the user, as he has to login every now and then. You are reading an article and after 10 mins. as you turn to next page? Option ...
tron-about-me.blogspot.com
About Me: August 2011
http://tron-about-me.blogspot.com/2011_08_01_archive.html
Hey it's Naivedya Pandey (naivi) the Author and owner of this blog, An Ethical Hacker. When I Completed Engineering I got interested in the field of. I asked stupid questions from people on hacking,. After getting negative responses from them I decided to do it own my own, I watched lots of videos, read lots of tutorials and I have done it below listed certification in my career. 1ASEH (Appin Certified Ethical Hacker). 2CEH (Certified Ethical Hacker). 6CCSA(Checkpoint Certified Security Administrator).
naivi-hacking-tips.blogspot.com
Hacking Tips: How To install Tor in backtrack4
http://naivi-hacking-tips.blogspot.com/2011/08/how-to-install-tor-in-backtrack4.html
How To install Tor in backtrack4. So you’ve been checking out BackTrack 4, and you want to get your anonymity on? This is assuming you have either installed BT4 to your hard drive or you’re using the VMWare version. You can do this on a LiveCD too of course, but your changes won’t stay unless you do some fancy lzm voodoo and burn a new copy of your CD. At the bottom of this file, add these two lines:. Deb http:/ mirror.noreply.org/pub/tor intrepid main. Gpg - fingerprint 94C09C7F. Now we need to disable ...
naivi-hacking-tips.blogspot.com
Hacking Tips: SQL Injection Samples
http://naivi-hacking-tips.blogspot.com/2011/09/sql-injection-samples.html
Bypassing Login Screens (SMO ). SQL Injection 101, Login tricks. Login as different user (SM*). UNION SELECT 1, 'anotheruser', 'doesnt matter', 1-. Old versions of MySQL doesn't support union queries. Bypassing second MD5 hash check login screens. Bypassing MD5 Hash Check Example (MSP). Password : 1234 ' AND 1=0 UNION ALL SELECT 'admin', '81dc9bdb52d04dc20036dbd8313ed055. Error Based - Find Columns Names. Finding Column Names with HAVING BY - Error Based (S). In the same order,. ORDER BY N- so on. Hack W...
computer-tricks-tron.blogspot.com
computer tricks: Windows XP Secrets
http://computer-tricks-tron.blogspot.com/2011/08/windows-xp-secrets.html
On the very first line, type in " .LOG. Without quotes) then press Enter for a new line. Now you can type in some text if you want, then save the file. Next time when you open the file, notice its contents. Notepad automatically adds a time/date log everytime you open the file. On the very first line, type in " dont eat the donut. Without quotes) then save and close the file. Note. The file should have only one line of the text above. Create a trail image. Then open an image. Now hold the " Shift. This r...
naivi-hacking-tips.blogspot.com
Hacking Tips: Hack Windows 7 with Metasploit using Kali Linux
http://naivi-hacking-tips.blogspot.com/2015/08/hack-windows-7-with-metasploit-using.html
Hack Windows 7 with Metasploit using Kali Linux. Today i am gonna show how to exploit any windows OS using metasploit. Exploiting a windows vulnerability to logging into the system with out username and password using Metasploit. Before Hacking, you want to know about metasploit framework. If your are new one to hacking, its less possible to know about Metasploit. The Metasploit Project is well known for its anti-forensic and evasion tools, some of which are built into the Metasploit Framework. Supported...