Search This Blog

Sunday, 9 February 2014

Fast file transfer between Mobile

You Can Check Original Installation date of OS in Windows

You Can Check Original Installation date of OS in Windows + Loads of More information about your System in Windows.

Check this Easy Step by step Tutorial and get to know More about your System (Things that you must know)

Must Check here > http://bit.ly/1dHHJgn

What is HACKING?

What is HACKING?
(Must read all)

It's hard to argue about the true meaning of a word 'Hacking'.

A word means whatever people use it to mean.
Still, understanding the etymological history of the word "hacker'' may help in understanding the current social situation.

The concept of hacking entered the computer culture at the Massachusetts Institute of Technology in the 1960s.
Popular opinion at MIT posited that there are two kinds of students, tools and hackers.

A "tool'' is someone who attends class regularly, is always to be found in the library when no class is meeting, and gets straight As.

latest hacking news relaunch

latest hacking news relaunch on this link
http://latesthackingnews.com/?p=49

Worlds top ten hacker and thier story ..

Worlds top ten hacker and thier story ..
may inspire hackers.

http://www.technotification.com/2014/02/top-10-black-hat-hacker-and-thier-story.html

▒ CMD tutorial ▒

▒ CMD tutorial ▒
~jS
‪#‎cmd‬ ‪#‎cmdH01‬
║What is Command Prompt?
» The Command Prompt program allows you to work in an environment that looks more like a traditional operating system as opposed to the icon based Windows environment. In Command Prompt, you will use your keyboard. You won't use your mouse at all. Command Prompt works at a lower level than Windows. This means that you will have more control over the machine. The disadvantage is that it is less user-friendly.
。To launch Command Prompt selectStart -> Runand typecmdin the box.
▒ next post will describe about useful commands.

What is vulnerability and how to prevent from occurin vulnerability in system.?


Vulnerabilities are what information security and information assurance professionals seek to reduce. 

Cutting down vulnerabilities provides fewer options for malicious users to gain access to secure information. 
Computer users and network personnel can protect computer systems from vulnerabilities by keeping software security patches up to date. 
These patches can remedy flaws or security holes that were found in the initial release. 
Computer and network personnel should also stay informed about current vulnerabilities in the software they use and seek out ways to protect against them.