Monday, 28 November 2011

How Windows Product Activation Works?

Windows Product Activation or WPA is a license validation procedure introduced by Microsoft Corporation in all versions of it’s Windows operating system. WPA was first introduced in Windows XP and continues to exist in Windows Server 2003, Windows Vista, Windows Server 2008 and Windows 7 as well. WPA enforces each end user to activate their copy of Windows so as to prevent unauthorized usage beyond the specific period of time until it is verified as genuine by Microsoft. How WPA really works was a closely guarded secret until GmbH analyzed WPA using a copy of Windows XP RC1 and published a paper on their findings.In this post you will find answers to some of the most frequently asked questions...

four Ways to Identify Safe Websites on the Internet

On the whole Internet, there are approximately more than 150 million active websites up and running. As a result, it often becomes a real challenge for the users to identify safe websites that are trustworthy and reputed. Have you ever wondered to know the reputation of a website before placing the order? Need to know whether a given website is child safe? Well, here are some of the ways to identify safe websites on the Web. 1. WOT or Web Of Trust (www.mywot.com):WOT is a great place to test the reputation of your favorite website. WOT gives real-time ratings for every website based on the feedback that it gets from millions of trustworthy users across the globe and trusted sources, such as phishing and malware blacklists....

How to Protect Your Computer from Key loggers

Keyloggers have been a major problem today as it does not require any prior knowledge of computers to use it. So hackers mainly use keyloggers to steal your passwords, credit card numbers and other confidential data. Below are some methods through which you can protect your computer from keyloggers: Keyloggers have been a major problem today as it does not require any prior knowledge of computers to use it. So hackers mainly use keyloggers to steal your passwords, credit card numbers and other confidential data. Below are some methods through which you can protect your computer from keyloggers:  Use a Good AntivirusThis is the first and basic step that you need to take in order to protect your computer from keyloggers. Use a Good...

Ten Tips to Avoid Getting Adware

 Adware, malware, spyware and viruses can bring your system to its knees. They are detrimental, lowering the performance of your computer. You might need to replace data. You might lose unique files. Keep the nasties away from your computer using these ten simple tips.1. Use Firefox: Internet Explorer is the most popular browser on the market, controlling over 50% of the market share. The virus and adware creators specifically look for exploitable vulnerabilities within IE because they know that they will receive the best return on investment. Your switch to Firefox prevents some adware from infecting your machine.2. Scan your PC once a week: Sometimes adware programmers take a sneaky approach. They will set up their...

How to Trace Mobile phone Numbers

With the rapid growth of mobile phone usage in recent years, we have often observed that the mobile phone has become a part of many illegal and criminal activities. So in most cases, tracing the mobile number becomes a vital part of the investigation process. Also sometimes we just want to trace a mobile number for reasons like annoying prank calls, blackmails, unknown number in a missed call list or similar.Even though it is not possible to trace the number back to the caller, it is possible to trace it to the location of the caller and also find the network operator. Just have a look at this page on tracing Indian mobile numbers from Wikipedia. Using the information provided on this page, it is possible to certainly...

How to Hide Data in Image Audio and Video Files: Steganography

Ever wondered to know how to hide secret messages in images, audioand video files? Well, in this post I will take you through a concept called steganography using which, it is possible to hide your secret information in image files, songs or any other file of your choice. At the end of this post, you can also download free stegnographic tools and start hiding your data.What is Steganography?Steganography is a means of obscuring data where secret messages are hidden inside computer files such as images, sound files, videos and even executable files so that, no one except the sender and the receiver will suspect the existence of stealth information in it. Steganography may also involve the usage...

Sunday, 27 November 2011

BROWSER FINGERPRINTING

In this post, I am going to introduce Browser Fingerprinting and I will also demonstrate on how theBrowser Autopwn exploit works. To introduce you first, that over the time, the privacy on the internet has become the prime concern of the users. So in how many ways you think you are carrying this privacy? Or that your activities aren’t being tracked on the web? It’s by-far very true that disabling cookies or using private browsing keeps you from being uniquely identified. But to bring it to your notice, lol! you can still be uniquely pointed out. Wondering how?“Its more like, hey dude! I don’t even need your damn IP and cookies to find you out.”Actually, the modern web browsers that we use, send too much of small bits...

Page 1 of 63123Next

linkwithin

Related Posts Plugin for WordPress, Blogger...

social networks


Twitter Delicious Facebook Digg Stumbleupon Favorites More

 
Design by Free WordPress Themes | Bloggerized by Lasantha - Premium Blogger Themes | Colgate Coupons