Posts

Showing posts from June, 2018

New way to Attack on Password

Password Attacks   occur when an account is attacked repeatedly. This is accomplished by using applications known as  password crackers,  which send possible passwords to the account in a systematic manner. The attacks are initially carried out to gain passwords for an access or modification attack. There are several types of password attacks: Read:   USB Password Theft Brute-Force Attack:  A  brute-force  attack is an attempt to guess passwords until a successful guess occurs. As an example of this type of attack, imagine starting to guess with “A” and then going through “z”; when no match is found, the next guess series goes from “AA” to “zz” and then adds a third value (“AAA” to “zzz”). Because of the nature of this routine, this type of attack usually occurs over a long period of time. To make passwords more difficult to guess, they should be much longer than two or three characters (six should be the bare minimum), be complex, and have passwo...

Google releases iPhone hacking tool for security researchers

 Google Project Zero, released a proof-of-concept tool on Monday that allows security researchers and other developers to hack into iOS 11.1.2, a recent version of Apple’s operating system. This could open up the possibility of jailbreak for devices such as iPhones and iPads running iOS 11.1.2. For those unaware, Google’s Project Zero identifies bugs and exploits in all kinds of software of various companies to make them safer. According to Beer , the  tool released  takes advantage of an exploit called “tfp0”. Beer says the tool was tested on iPhone 6s, iPhone 7 and iPod touch 6G. However, he believes that with some tweaks, the tool should work on all devices. “tfp0 should work for all devices, the POC local kernel debugger only for those I have to test on (iPhone 7, 6s and iPod Touch 6g) but adding more support should be easy,” Beer  wrote  . The Google researcher last week teased this release in a tweet that asked the iOS 11 kernel security rese...

20 Run Commands Every Windows User Should Know

Run commands are one of the most useful things we can talk about. We are going to talk about ten useful ‘Run’ Commands that will help you to open anything. You just need to enter these commands in the Run command box to quickly access features and applications to customize operative system environment. 20 Run Commands Every Windows User Should Know We must admit that Microsoft’s Windows Operating system implements many features. That’s the reason why Windows is always the first preference of every regular user as it is easy to operate and implements lots of facilities. Well, Run commands are one of the most useful things we can talk about. Previously we have shared an article in which we have listed few methods to  create your own run commands  in Windows operating system. In this post, we are going to talk about ten useful ‘Run’ Commands that will help you to open anything. You just need to enter these commands in the Run command box to quickly access features...

How to Secure Your Computer By Blocking Dangerous IP Addresses Automatically

Image
Securing your computer or any digital device is an essential thing today. You have to protect your personal and professional information from hackers and other malicious users. In many ways you can protect your system such as using Antivirus products, Anti-Malware products and other security tools. However, If you are using internet to browse sites and download files, you may need another layer of protection to avoid the dangerous and malicious internet systems. There is a free tool called Bot Revolt will block the dangerous IP’s automatically and protect you. What is it and How it is Helpful Bot Revolt free is the security tool that helps your computer to block the dangerous (Malicious) IP address connections. That is, Bot Revolt will scan each and every connection that made by your computer to other and vice versa. The bot Revolt will compare all incoming and outgoing connections with Black list databases (sources include BlockList Pro, I-BlockList, FraudWatch International...

How to Activate ‘God Mode’ (All Settings) in Windows 10

Image
God Mode (for the naming fun) is a hidden Windows feature which is very much like the Control Panel, but more advanced.  God Mode exposes nearly every setting available in Windows 10 and hence makes locating and tweaking certain options easier. However, no matter how good it sounds, it still misses out on the settings which are only available via the Settings app. If you are interested in checking out God Mode on your Windows 10 PC, here’s how to get it activated. Accessing the All Settings mode or God Mode To access the list of settings or the God Mode you just need to create a folder with a special name (or extension) which will convert it into the gateway to the God Mode instead of being a regular folder. Right click on your desktop and select New> Folder. You can do this in any other location, but Desktop seems like the most appropriate place for such an option. Name the folder as following  (Copying and pasting works best): GodMode.{ED7BA470-8E54-465E...