This protocol allows third-party applications to grant limited access to an HTTP service, either on behalf of a resource owner or by allowing the third-party application to obtain access on its own behalf. Access is requested by a client, it can be a website or a mobile application for example.Version 2 is expected to simplify the previous version of the ...
Facebook is a most common and great way to share photos with your friends and family members. There has been a huge rise in the number of photos shared on Facebook with more than 60 billion photos shared by its members already. Everyday we see our friends and family members sharing pictures on Facebook as albums and there are times ...
One of the most important requirements of malicious code analysis is the understand of advanced code evolution techniques.There are common techniques used by malicious code developers and writers to evade detection and destruction: Common Techniques: 1. Self-Encryption and Self-DecryptionMalicious code may encrypt the virus body. Even using several layers of encryption and decryption and/or using random keys (Oligomorphic Viruses) in ...
There is no way to convert a .vbs files or .bat files into an executable (.exe file) because they are not a compiled language. The process of converting source code into native executable code is called "compilation", and it's not supported by scripting languages like VBScript or Batch Files.Alternatively, there are ways to wrap VBScript and BAT code files in ...
1. Open Notepad and type :Set wshShell = wscript.CreateObject("WScript.Shell")dowscript.sleep 100wshshell.sendkeys "You are FOOL"loop2. Save it as "Anything.VBS" and send it to your friend.3. When he runs the file it will begins to type "You are Fool" simultaneously. He will kill you. But This one not harmful. We can stop the script;To stop the Script:1. Open "Windows Task Manager".2. Hit the ...
If you have installed IDM you don't need to worry. This is an alternative and instant way to download videos from the web. KeepVid is the number one website for downloading streaming videos from websites. It allows you to download videos from almost all popular video sharing network; fromYoutube, GoogleVideo, Break.com, Dailymotion, Blip.tv, Groper, Current TV, and dozens of other ...
Google Drive is a file storage and synchronization service by Google(Released on April 24, 2012). It is a place where you can create, share, collaborate, and keep all of your stuff. It giving you another option for stashing your stuff in the cloud. CollaborationGoogle Drive is tight integration with Google’s productivity apps. Google Docs is built right into Google Drive. ...
Internet Download Manager(IDM) is a tool that enhance downloading speed. It increases download speeds by up to 5 times. IDM offers download scheduling, resuming and recovery for broken downloads. Internet Download Manager was designed to integrate into all the major browsers. It has a smart download logic accelerator that features intelligent dynamic file segmentation and safe multipart downloading technology to ...
Port Scanners are important to network security technicians because they can reveal possible security vulnerabilities on the targeted system.CurrPorts is a portable executable that list down all currently opened TCP/IP and UDP ports on local computer. And also it displays information about the process that ports are opened for, including the process name, full path of the process, version information ...
What would you do if someone steals your notebook or smart phone with its precious or sensitive data that comprises your digital, personal and work life?Prey is a lightweight tracking software that helps you find, lock and recover your device when stolen or missing. It is open-source and available for Windows, Mac OS X, Linux and Android. How Prey works:Prey ...
1. Create a new folder on your HDD, Example: I create a folder in my D: drive and rename it as "Lesson". ( D:\Lesson )* It better you follow my blue colored examples if you are a n00b. 2. Then drop the file(s) that you need to hide, into that folder. And also, place the image that you'll be using ...
Surfing the internet securely through VPN or web proxy might do the tactic for some individuals who concern about the online privacy. Tor is a tool bundle for organizations and individuals that want to improve their safety & security on the web. It is enable online anonymity. You can perform anonymous web surfing, publishing, instant msging, and any other utility ...
Windows 7 has a built-in administrator account but its disabled by default for security purposes.This built-in administrator account is an account that has full unrestricted access and permission on the computer, and will not be prompted by UAC. You might want to enable it for troubleshooting or to get rid of the annoying UAC prompts while tweaking your system. It ...
Hackers typically approach an attack using five common phases. Reconnaissance, Scanning, Gaining Access, Maintaining Access and Clearing Tracks. After erasing tracks the hacker terminates the connection. This information is useful for network administrators, and essential for network security consultants.Reconnaissance(rattling the door knobs" to see if someone is watching and responce)This is the Preparatory Phase. Attacker seeks to gather as much ...
Ever wondered who your friend secretly likes/ loves? Is your girlfriend or boyfriend really true to you?With this Love Calculator, you can finally find it out. Only thing you should do is send an email or chat message to your friend, including customized Love Calculator link (This link will generate from CrushBit.com for your e-mail address) saying that you tried ...
TrueCript is a free open-source disk encryption software for Windows 7/Vista/XP, Mac OS X, and Linux. It is a ultimate freeware encryption program, TrueCrypt is loaded with powerful features that users concerned with protecting data from prying eyes will find robust and comprehensive. It has 11 algorithms for encrypting your private files in a password-protected volume. You can store your ...
Cryptography is a method of transmitting or storing secret messages where only intended recipient can read and process them. It is the science of writing in secret code and is an ancient art. It can be used to ensure Confidentiality, Integrity and Authenticity. The readable data(Clear Text/ Plain Text) converts into unreadable format(Cipher Text) using Encryption/Enciphering Algorithm. Encryption/Enciphering Algorithm is ...
Elk Cloner is the first virus on microcomputers were on the Apple II, circa 1982.It is a "boot sector" virus. Rich Skrenta, who was ninth-grade student wrote this virus.Elk Cloner was stored on floppy diskettes. When a computer booted from a floppy disk infected with Elk Cloner, the virus would start, and would subsequently copy itself to any uninfected floppy ...
Millions of Facebook accounts are being affected by a virus subjecting viewers to hardcore porn and violent images. They are appearing as updates in Facebook’s News Feed. It gets posted in your name to all your friends if you click on it.The virus we’re talking about :Obviously it spreads once you click on it, so avoid clicking on it at ...