Tuesday, 1 May 2012

Botnets
The main drivers for botnets are for recognition and financial gain.
The larger the botnet, the more ‘kudos’ the harder can claim to have
among the underground community. The bot herder will also ‘rent’ the
services of the botnet out to third parties, usually for sending out
spam messages, or for performing a denial of service attack against a
remote target. Due to the large numbers of compromised machines
within the botnet huge volumes of traffic (either email or denial of
service) can be generated. However,...
Tuesday, 1 May 2012 by w4r-b0y · 0
Thursday, 5 April 2012

Htaccess File Explained
Intro
Hypertext Access,
commonly shortened to htaccess, is a configuration file
which controls the directory it is placed in and all the subdirectories
underneath it. It’s an incredibly useful feature which allows webmasters to control
how many aspects of their website works. You can redirect pages,...
Thursday, 5 April 2012 by w4r-b0y · 0
Saturday, 31 March 2012

First thing to keep in mind: If your computer hasn't crashed yet, it will in the future! So instead of waiting for fate to strike, take some precautions now:
1) BACK-UP! Buy some decent DVD-R discs and put everything useful in them. When you have more useful stuff, backup again. Do this often.
2) Keep your computer healthy. Use an...
Saturday, 31 March 2012 by w4r-b0y · 0
Tuesday, 20 March 2012

So say somehow somewhere we ended up choosing a target to start wreaking havoc upon. All we need is an IP Address. Theres plenty of papers out there that go into how to obtain an IP Address from the preferred mark of your choice. So I'm not going to go into that subject. Alright so say we got the targets IP Address finally. What do...
Tuesday, 20 March 2012 by w4r-b0y · 0
Monday, 19 March 2012
How to edit meta tags of audio and video files using VLC Player.
What are meta tags..??
In simple words, Audio and Video files contains some information about Title, Artist, Album, Genre, Date, Publisher, and more..
There are many meta tag editor available. But here is the way to edit them with VLC media player which is very popular...
Monday, 19 March 2012 by w4r-b0y · 1
Sunday, 18 March 2012

List of Some Basic BASH Commands:-
I'd like to point out to everyone before reading that this list is very far from completion and does not include all of the extendable possibilities. When I say this, nmap isn't a built-in command until you install nmap. These commands just stand for those that come with a Linux/UNIX BASH installation.
A
adduser...
Sunday, 18 March 2012 by w4r-b0y · 0
Saturday, 17 March 2012
Misconceptions About Computer Worms And An Insight Into There Creation
Intro
There are a few misconceptions that some members have about Internet Worms and their behavior.all too often i hear people saying "Oh it looks like you have been infected by some kind of worm" and almost 99% of the time they are completely wrong. So here goes...
Saturday, 17 March 2012 by w4r-b0y · 0

Q: What is hacking?
A: The terms "hack" are also used to refer to a modification of a program or device to give the user access to features that were otherwise unavailable, such as DIY circuit bending. It is from this usage that the term "hacking" is often incorrectly used to refer to more nefarious criminal uses such as identity theft,...
by w4r-b0y · 0
Subscribe to:
Posts (Atom)