FAKE E-MAILING
Send
, identify , trace Fake/Spoofed Email | Email Bombing | Email Spamming
Basics of working of Email
Email stands for Electronic Mail. Email
sending and receiving is controlled by the Email servers.Email service
providers configure Email Server before anyone can Sign into his or her
account and start communicating digitally.Users from across the
world register...
Zero-size Intelligence
Computer brains (or chips) have diminished in size -- some powered by just five atoms, and one-atom developments about 10 to 20 years down the road.
Robot doctors, online lawyers and automated architects: the future of the professions?
Technology is set to challenge traditionally safe professions.
More than 300k systems 'still vulnerable' to Heartbleed attacks
Security experts say people are running vulnerable systems owing to 'simple ignorance'
Google's Android L: 'One of the most comprehensive releases we have done'
New features for smartphone and tablet software include enhanced notifications and 'material design'
Fin is a trendy gadget you can wear on the thumb and make your whole palm as a digital touch interface.
Fin presents a thumb ring that turns your hand into a universal motion-based input
Wednesday, 13 August 2014
How to Reveal Hidden Passwords (Asterisks) in Web Browsers
23:23
No comments
How to Reveal Hidden Passwords (Asterisks) in Web Browsers
Remember the situation, signing into
your account with just a single click because browser is saving all your
passwords for you. We know this is convenient but since you’re not typing your
passwords any-more, eventually you’ll forget your password in a few days.
For security reasons, the password
field in all browsers...
Hyper-V 2012 & boot-from-SAN - installation
22:53
No comments

Hyper-V 2012 & boot-from-SAN - installation
Had a devil of a time trying to get Hyper-V 2012 installed on one of our spare servers (HP DL360 G5). Was installing from a DVD (iLO was not online originally) and using a USB key for the Qlogic drivers. iSCSI HBA is a Qlogic 4062c.Note this was an ESX 3.5 host when I started.The error: "We couldn't create a new partition or locate an existing one. For more information, see the...
Avast email alerting with Gmail
22:46
No comments
.jpg)
Avast email alerting with Gmail
Since I'm the IT person, I'm setting up everyone on Avast (unfortunately MSE is going away).
Avast has a handy 'hay IT guy, you have a virus' alerting system, but it's a teensy bit buggy. Mostly silent timeout periods that make it look like nothing is working. Here's how to get it working with Gmail.
Here's what you need:
E-mail (SMTP) address, username@gmail.com or whatever your Gmail account...
How to recover root password in RHEL 6 ?
22:40
No comments
How to recover root password in RHEL 6 ?
STEP 1 :
Boot the system and log i n into grub.
STEP 2 :
Press ‘e’ on the selected entry.
Then select the ‘kernel /vmlinux’ entry and press ‘e’ on it.
Insert the ‘single’ keyword after rhgb quiet.
Press enter
Then press b after selecting the ‘kernel /vmlinux’ entry.
Then on the root prompt issue the following...
Top 12 Android Apps to Turn Your Smartphone into a Hacking Device
22:33
1 comment
.jpg)
Top 12 Android Apps to Turn Your
Smartphone into a Hacking Device
Mobile devices is now very
common now a days and mobile devices has changed the way of bi-directional
communication. There are many operating system for mobile
devices available but the most common and the best operating system for
mobile is Android, it is an OS means you can install other applications
(software's)...
Subscribe to:
Posts (Atom)