Sunday 22 November 2015

get IP in the network

in order to get the ip address and all the device connected in the network just go for a software and scan the ip range 

get the software here and you are done
this is the software i prefer there are lot more software available in internet but this is simple,powerful and free too....

tip: by using this software you can easily get the access to all the files shared on the network... you can easily download it to your syatem and can hav access to it 

getting MAC of remote device

To determine the MAC address of a remote device:
its quit easy to get the MAC of a remote device in order to get the MAC of any remote device with the known ip address just follow a simple step and you are done





HOW TO GET THE IP ADDRESS OF SYSTEM CONNECTED TO THE NETWORK

Open the MS-DOS prompt (From the Run... command, type "CMD" and press Enter).
Ping a remote device that you want to find the MAC address (for example: PING 192.168.0.1).
Type "ARP -A", and press Enter.
here you are  DONE...!!! with it

Sunday 1 November 2015

About Linux

What is Linux

Linux is, in simplest terms, an operating system. It is the software on a computer that enables applications and the computer operator to access the devices on the computer to perform desired functions. The operating system (OS) relays instructions from an application to, for instance, the computer's processor. The processor performs the instructed task, then sends the results back to the application via the operating system.
Explained in these terms, Linux is very similar to other operating systems, such as Windows and OS X.

Wednesday 28 October 2015

A Guide To Better Google Search Techniques

The Internet is so full of information that it’s nearly impossible to check its limits. That’s why, search engines were developed to maintain a search-able database of the web’s content. People employ the use of search engines to look up for information on the web.

In the midst of all search engines lies Google, the most popular and powerful search engine. 


Tuesday 27 October 2015

Linux:Beginners guide

What is Linux

Linux is, in simplest terms, an operating system. It is the software on a computer that enables applications and the computer operator to access the devices on the computer to perform desired functions. The operating system (OS) relays instructions from an application to, for instance, the computer's processor. The processor performs the instructed task, then sends the results back to the application via the operating system.

Monday 26 October 2015

How To Turn Wikipedia Pages Into Ebooks

If you are like me, you probably love binge-reading Wikipedia, everyone’s favorite web encyclopedia. It contains a huge database of content on almost any topic under the Sun, and in a variety of languages. If you are preparing for a trip, you’d probably save some of these reading materials to read later, offline, but what if you could turn it into an ebook?

There is in fact a way to create an ebook from inside Wikipedia. You can create or arrange the


NGFW

There are a lot of changes going on within the enterprise, including many shifts related to how applications are used and transported. While this change is an advantage from a usability perspective, it can also quickly become a nightmare to the information security staff.
To deal with these changes, vendors in the enterprise firewall market have created a new generation of firewall devices dubbed the Next Generation Firewall or NGFW. These devices differ from traditional firewalls in a number of different areas. Let's take a look at these differences and how they affect the security of an enterprise network. 

Spice Up Your Google Search Background [On Chrome]


The trend these days is that if you want the answer to something, you don’t ask a grown up, you ask Google. I’m sure for most of you the Google search page is your start page, especially if your favorite browser is Chrome. Notice that the background of the Google search page is a blank sheet of nothingness, well, apart from the search bar of course.

Saturday 24 October 2015

Top 15 Hacking Tool For Hackers 2015


Before you proceed to the list of top 15 hacking tools you should know the circumstances of using this tools, we quite sure that peoplearound the world are using need to publish or being infamous themselves in front of their respectives but the word hacking also consider the terms of illegal which means without the prior permission of the representative doing so may face you law enforcement.
Below this 15 tools will basically determine your basic knowledge of what kind of the tool is it and what this tools usually does!

Thursday 22 October 2015

How to Root Android with Kingo Android Root

Prerequisite for rooting any Android powered device 

  • Device powered ON
  • At least 50% battery level
  • Internet connection necessary
  • USB Cable (the original one recommended)

10 Hidden Features You Can Find In Android Developer Options

Do you notice that your Android device has a "developer options" feature hidden somewhere? There are many things you can do on your Android but there’s more you can do when you have this option enabled. From speeding up your device by turning animations off, to obtaining higher quality rendering for a good gameplay, there are plenty of features you can enable from the Android Developer Options section.


Tuesday 13 October 2015

Some Cool Registry Tricks

The registry is a hierarchical database that stores the value of variables in windows and the application and services that run on windows.

The operating system and the other programs also uses the registry to store about user and about the current configuration of the system and its components.

SUBTREE:Subtree are the root, or primary divisions, of the registry.

he registry is divided into five subtrees. Subtree contains the keys, subkeys, ans enteries in which the data is stored.


Hirte Attack – Easily Method To Hack Wirless Password

Hirte is a type of attack that aims to crack the WEP key of wireless networks that are not reachable but the client device (laptop, mobile, etc.) is in the area of the attacker. This can be achieved because the WEP key and the configuration details are still stored in the wireless device.
The only requirement for this attack is to setup a fake access point with the same SSID of the WEP network. When the client device will try to connect automatically then ARP packets will be sent from the fake access point (attacker machine) to the device and the other way around which they will contain part of the keystream.

Download only audios from videos of YOUTUBE

There would have been many times when you wanted to download just the audio of a YouTube video, but not finding any way on how to extract just the audio. You had to download the whole video, which took a lot of bandwidth as well as time to download.
There are many ways you could just download the mp3 of a video. You could use IDM, or Down Them All Firefox Plugin etc. But I found a way to download the mp3 without using any third party tool or plugin.I found a website called listentoyoutube. Just go to it. On the homepage, you will find a form where you can enter the URL of the video you want to download . Find a Youtube video and copy the URL link into it.

Saturday 10 October 2015

GOD MODE IN WINDOWS 10..!!


Microsoft's Windows 10, the latest version of Windows Operating System, has been creating waves since it rolled out, and reached to 110 million devices within just 2 months.

If you are a long-time Windows user, you may remember a trick called, 'God Mode'.

God Mode is an inbuilt, but hidden feature of Windows that provides additional customization options for the operating system.

Friday 25 September 2015

SINS OF CYBER SECURITY


Criminals have taken the cyber route to steal from your wallets. Cyber crime has evolved in terms
of both nature and scope. Cyber security is inresponse mode and growing in significance. This blog focuses on sins of cyber security.