Author: vipul_1614   |   5 June 2010   |   comments: 0
COMPLETE DETAILS ABOUT The TROJON HORSE

The TROJON HORSE


What is a Trojan ?

"A Trojan Horse, or Trojan, is a term used to describe malware that appears, to the user, to perform a desirable function but, in fact, facilitates unauthorized access to the user's computer system". - Wikipedia

"A Trojan horse is an apparently useful program containing hidden functions that can exploit the privileges of the user [running the program], with a resulting security threat.". - CERT Advisory

Types of Trojan :-
  Author: vipul_1614   |   5 June 2010   |   comments: 1
ClickJacking attacks

ClickJacking


Definition :-

"Clickjacking is a malicious technique of tricking web users into revealing confidential information or taking control of their computer while clicking on seemingly innocuous web pages." - Wikipedia

Introduction :-
  Author: vipul_1614   |   5 June 2010   |   comments: 1
Bypassing Windows-XP Firewall

Bypassing Windows-XP Firewall


There is a technique using which we can bypass windows-xp service pack-2 firewall.
This techniques is nothing but the vulnerability found in windows-xp sp2 firewall.
This is explained here in detail with exploit code.

Windows XP Firewall Bypassing (Registry Based) :- Microsoft Windows XP SP2 comes bundled with a Firewall. Direct access to Firewall's registry keys allow local attackers to bypass the Firewall blocking list and allow malicious program to connect the network.
  Author: vipul_1614   |   5 June 2010   |   comments: 0
Address Resolution Protocol (ARP) Attacks

Address Resolution Protocol (ARP) Attacks


-: Address Resolution Protocol (ARP) Attacks :-

What Does ARP Mean?
Address Resolution Protocol (ARP) is a stateless protocol, was designed to map Internet Protocol addresses (IP) to their associated Media Access Control (MAC) addresses. This being said, by mapping a 32 bit IP address to an associated 48 bit MAC address via attached Ethernet devices, a communication between local nodes can be made.
  Author: vipul_1614   |   5 June 2010   |   comments: 0
Access Free Airtel GPRS Using TeaShark Browser

Access Free Airtel GPRS Using TeaShark Browser


TeaShark, a mobile browser like Opera Mini, allow you to access Airtel GPRS for FREE.
Shockingly it has nothing to do with modifying any Airtel settings or any kind of hack.

Here is how I used this…
  Author: vipul_1614   |   5 June 2010   |   comments: 0
How to lock your computer

How to lock your computer


Creating a desktop shortcut for locking your computer
If you use your computer in an area where others may have access to it, and there are things on your system you would rather have kept confidential, locking your desktop when you leave the computer is an essential task. Here's a recipe for a desktop shortcut that will lock your computer in two easy clicks:
  Author: vipul_1614   |   5 June 2010   |   comments: 0
How To Create A Hidden User Account

How To Create A Hidden User Account


This tweak allows an account that is normally displayed on the Welcome screen to be hidden from view. To log on using the account it's necessary to use the Log On To Windows dialog box similar to the one in Windows 2000.

#[Start] [Run] [Regedit]

#Registry Key: HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\WindowsNT\CurrentVersion\Winlogon\SpecialAccounts\UserList

#Modify/Create the Value Data Type(s) and Value Name(s) as detailed below
.
#Data Type: REG_DWORD [Dword Value] // Value Name: Type Name of Account to be Hidden
  Author: vipul_1614   |   5 June 2010   |   comments: 3
Hack Admin Password From User Mode

Hack Admin Password From User Mode


Hack Admin Password From User Mode

Disclaimer: Use this article for eductational purpose ONLY.

Follow these steps:
1. Open command prompt (Start->Run->cmd),

2. Enter the following command, then press ENTER

3. Enter the followin command, then press ENTER:
compmgmt.msc
  Author: elite1   |   5 June 2010   |   comments: 0
Speed up your PC

Speed up your PC Clean Ur RAM love love
  Author: Michael   |   4 June 2010   |   comments: 15
Be Careful Before You ‘Like’ This on Facebook

Warning: If you receive news feed carrying any of the following links ‘Liked’ by any of your Facebook friends, don’t click on the link to check it out. It’s a clickjacking worm attack spreading through the ‘Like’ option and has affected hundreds of thousands of users.

These messages include: “LOL This girl gets OWNED after a POLICE OFFICER reads her STATUS MESSAGE,” “This man takes a picture of himself EVERYDAY for 8 YEARS!!,” “The Prom Dress That Got This Girl Suspended From School” and “This Girl Has An Interesting Way Of Eating A Banana .Check It Out!”
  Author: vipul_1614   |   3 June 2010   |   comments: 3
Hack Youtube To Watch the Best Quality Videos

Hack Youtube To Watch the Best Quality Videos


Whenever you connect to my youtube channel (http://www.youtube.com/),
if you see some videos can not watch with high quality, you can use this TIPS ...


Step1: Click to video that you want to see, the link will display on Address bar. E.x: http://www.youtube.com/user/wildminer?blend=6&ob=4

Step2: Add &fmt=6 to the end of that string. That address like:
http://www.youtube.com/user/wildminer?blend=6&ob=4&fmt=6
  Author: elite1   |   3 June 2010   |   comments: 0
Firefox Tricks & Tweaks

You may have installed countless add-on in Firefox to enhance your using experience, but if you want to get the most out of Firefox, you really have to hack your way into the about:config. love love
  Author: vipul_1614   |   3 June 2010   |   comments: 0
Useful Direct Links

Useful Direct Links


Kaspersky

http://dnl-eu10.kaspersky-labs.com/devbuilds/



Bitdefender

http://download.bitdefender.com/windows/

http://download.bitdefender.com/updates/

http://download.bitdefender.com/SMB/
  Author: vipul_1614   |   3 June 2010   |   comments: 0
Join 001, 002...files without HJSplit

Join 001, 002...files without HJSplit


When you want to join .001, .002 ... files, you have to use Install HJSplit and run it.

But with this TIPS, you can join all files without any tools ...

Step1: Start > Run > Type CMD to run Command Prompt

Step2: Use CD to connect to the folder that contain your .001, .002, ... files.
  Author: vipul_1614   |   3 June 2010   |   comments: 3
Nokia Security Code Trick

Nokia Security Code Trick


Way 1: This's the easiest way to use a mobile if you don't know its Security Code (password).

Remove the battery & Plug it Immediately, you can control that mobile as you are owner.

Way 2: Connect to http://nfader.z-host.ru and type your IMEI.
The result is your Security code (password).
Home        |        Register        |        Forums        |        RSS        |        Rules        |        DMCA Policy        |        Contact Us
DISCLAIMER
None of the files shown here are hosted or transmitted by this server. The links are provided solely by this site's users. The administrator of this site (Dl4All.com) cannot be held responsible for what its users post, or any other actions of its users. You may not use this site to distribute or download any material when you do not have the legal rights to do so. It is your own responsibility to adhere to these terms.

Copyright © 2006-2012 Dl4All. All rights reserved.