Here you can find every thing about Hacking. Latest NEWS, Buzz, tips & tricks and much more.. Keep reading Enjoy.

What on your side in my way....

Thursday, July 30, 2009

Use Proxies in Windows...

Go to control panel
1)phone modem options
2)advanced
3)In Providers, click Microsoft H.323 Telephony Service Provider, and then click Configure.
4)In Configure H.323 Service Provider
5)To specify an H.323 proxy, select the Use H.323 proxy, and then type the server name or IP address for the proxy.

Try google for available proxy IP /servers...
Or
try www.proxy4free.com
this is a easy way of using private proxy with windows...

Booting process unleashed..

Booting process is the fundamental step of any computer system. Booting of a system technically refers to loading of certain system programs and files in a working memory of a computer system in a sequential build up to bring computer in a working state. After finishing the initial startup process the specific operating system will load. Systems that are able to run Microsoft or Linux operating system follows the same boot up process whereas Macintosh have different set of Booting process.

The Basic Input Output System (BIOS) is Boot firmware, designed to be the first code run by a PC when powered on. The initial function of the BIOS is to identify, test, and initialize system devices such as the video display card, hard disk, and floppy disk and other hardware. This is to prepare the machine into a known state, so that software stored on compatible media can be loaded, executed, and given control of the PC. This process is known as Booting.

Thursday, July 16, 2009

Computer Hacking Forensic Investigator




Computer hacking forensic investigation is the process of detecting hacking attacks and properly extracting evidence to report the crime and conduct audits to prevent future attacks. Computer forensics is simply the application of computer investigation and analysis techniques in the interests of determining potential legal evidence. Evidence might be sought in a wide range of computer crime or misuse, including but not limited to theft of trade secrets, theft of or destruction of intellectual property, and fraud. CHFI investigators can draw on an array of methods for discovering data that resides in a computer system, or recovering deleted, encrypted, or damaged file information.
This is one of blooming field of IT industry. To get CHFI certified you have to clear exam from any vendor, preferably from ec-council. This test covers all important field. I am working on the Preparation kit of the same course, so i will keep posting new blogs about this course.