Welcome, Guest! Registration RSS

Shehab Hacking And Cracking Articles

Thursday, 2024-11-21
Main » 2011 » September » 20
Doxing is the process of getting information about a person by using the resources on the Internet using other skills. Doxing derived from the word "document" which in the brief that is making "Documents" on a person or company.

There are several ways to obtain personal information online. The most popular method is through a website called Pipl. Pipl allows you to search the full name, email, user name and even a phone number though. So that makes Pipl become a very useful tool for hackers.

Another source hackers can be used is through social networking site Facebook. But most hackers do not use Facebook to search for the name, they just use it to search their email address, since names are often in short or fake.

Doxing main objective is to find the email address of the target. Because, Email basically serves as a passport when registering at a website. There is personal infor ... Read more »
Views: 4285 | Added by: shehab3451 | Date: 2011-09-20 | Comments (0)

When installing USB Nokia cable driver, some users have trouble finding the right driver for cell phone type. Various output drivers in the trial, but to no avail and the phone still can not connect to the computer.

Driver Nokia Connectivity Cable Rel 6824 is perhaps appropriate to the type of your Nokia mobile phone USB. In several trials, the drive type is always compatible with any mobile phone type.

To Install are:
1. Unplug your phone and remove the cable driver and PC Suite Nokia phones are already installed on your computer through the Uninstall or also via the Control Panel -> Add Remove Programs.

2. Once the process is complete, download drivers Nokia here.

3. Install Driver has been downloaded earlier, and then re-install PC Suite.

4. Mobile Cable Install. Finish!
Views: 3421 | Added by: shehab3451 | Date: 2011-09-20 | Comments (1)

lash drive is currently a manual storage media are most effective. So do not be surprised if the flash drive is also a most effective medium for distributing viruses as well. Here's how to flash drives become immune to the virus.

1. Format the flash drive.

2. Create a folder in your flash drive, and give "autorun.inf" Name (without the quotes).

3. Go into the folder you just created and make a notepad document therein. Right click, select NEW> TEXT DOCUMENT. Give any name for the file you just created. This name will we replace with some special characters.

4. Then, we will open Character Map program that is in START> ALL PROGRAMS> ACCESORIES> SYSTEM TOOLS> CHARACTER MAP.

5. Select an existing font like Arial unicode, Unicode or Lucida Sans Unicode. Scroll down until you see the letters of the Japanese, Korean, Chinese, or other strange characters.

6. Select 4 or 5 characters that you want, then click copy.

7. R ... Read more »
Views: 3590 | Added by: shehab3451 | Date: 2011-09-20 | Comments (1)

With the click of a mouse on one computer, the screen of the laptop a few feet away flashes wildly as a flood of data flies silently across a private network cable connecting the two machines. Within a minute the laptop's file sharing password is compromised.

"The computer is having a bad day," says a reporter as he watches the effect of the attack on his machine. "Packets are coming at it so fast, the firewall doesn't know what to do."

Some hackers claim they can teach a monkey how to hack in a couple of hours. We asked two hackers, Syke and Optyx (at their request, we are using their hacking pseudonyms rather than their real names), to give us non-simian reporters a demonstration.

What we got was a sometimes-frightening view of how easily nearly anyone's computer--at home or at work, protected or not--can be cracked by a determined hacker. But we also found out that computer users can make a hacker's job m ... Read more »

Views: 3469 | Added by: shehab3451 | Date: 2011-09-20 | Comments (1)