Saturday, January 22, 2011

Critical vulnerability found in Opera browser

A critical vulnerability has been found in Opera browser by security researcher Jordi Chancel. The vulnerability can be used by an attacker to execute arbitrary code on vulnerable machines.The bug affects the latest version of Opera running on Windows 7, as well as Windows XP SP3. The vulnerability was confirmed and released by a French Security firm VUPEN.  The vulnerability exist in the current release of Opera i.e. 11.0 0 as well as in the previous release 10.63 and others.

Thursday, January 20, 2011

Beware Fake Antivirus Worm on Twitter

Twitter and Twitter users are being targeted by a malicious worm. The worm sends out tweets with a shortened URL link directed to a rogue antivirus application. The attack demonstrates once again how URL shortening can be a Pandora's box as users click on links with no clue where they might lead.

Saturday, January 15, 2011

How do i change my ip address

Trace ip address

What is an ip address?
Every device connected to the public Internet is assigned a unique number known as an Internet Protocol (IP) address. IP addresses consist of four numbers separated by periods (also called a 'dotted-quad') and look something like

Since these numbers are usually assigned to internet service providers within region-based blocks, an IP address can often be used to identify the region or country from which a computer is connecting to the Internet. An IP address can sometimes be used to show the user's general location.

Friday, January 14, 2011

How to create Fake login page for any website

Fake login page

A Fake Login Page is a page that exactly resembles the original login page of sites like Yahoo,Gmail etc.However, these Fake login pages are created just for the purpose of stealing other’s passwords.

How To Hack Facebook Chat Application

In this post I will tell you how you can hack facebook chat application to run it from any windows, Using this hack you will be able to chat with your freinds on other browser pages, So here is the step by step guide to hack facebook chat application.

An overview of Intrusion Detection System

An intrusion detection system (IDS) is used to monitor the entire network, it detects intruders; that is, unexpected, unwanted or unauthorized people or programs on network.
An intrusion detection system has a number of sensors that is used to detect unwanted or unexpected flow of network traffic, the major sensors as follows:

  • A sensor monitor log files
  • A sensor monitor TCP ingoing or outgoing connections
How Intrusion Detection System Works?

Intrusion detection system works by collecting information and then examining it. IDS collects data from it sensors and analyze this data to give notice to the system administrator about malicious activity on the network.

Wednesday, January 12, 2011

Restoring lost partitions using Ubuntu live CD

The below problem is to be solved out under this section....

How do I restore my lost partition table? I accidentally deleted my partition table, how do I recover my data? How to recover deleted partitions and data in them? Recover data from deleted drives."