SERVFORU

Social engineering ; A career

social engineering is method of retrieving password or answer of security question simply be quering with the victim. You have to be very careful while using this as victim must not be aware of your intention. Just ask him cautiously using your logic. When most people hear "Social Engineering," they think of the criminal aspects of the term. But the practice also has professional applications for security practitioners who want to help test......
 

Facebook Privacy : keep Your Account Protected

Your name, your profile picture, your gender, your current city, the networks you’re in, who you’re friends with, and the pages you’re a fan of are available to anyone. These are known as publicly accessible information (PAI). You have no control over this. Any other piece of content marked visible to “Everyone” in your privacy settings is available to anyone. You have control over this. Any Facebook application or web site using Facebook......
 

How to choose the best laptop that suits your needs

With a multitude of brands and models in the market combined with the very fast turnover in technology, it can really become such a headache when choosing what laptop to purchase for your mobile computing needs. Now since these devices can be quite expensive, it is extremely important that the laptop you get will suit your needs as well as last at least 3 to 5 years or until you have money to upgrade on a newer model. With all these in mind, here are some ideas that you can tinker with and keep in mind when shopping around for laptops Evaluate your needs. People purchase laptops......
 

Essential Network Security Tools for Hacking

  Wireshark Wireshark (known as Ethereal until a trademark dispute in Summer 2006) is a fantastic open source multi-platform network protocol analyzer. It allows you to examine data from a live network or from a capture file on disk. You can interactively browse the capture data, delving down into just the level of packet detail you need. Wireshark has several powerful features, including a rich display filter language......
 

BackTrack 5 . 13 tips do after installation

If you are using backtrack 5 and having some problems like sound problem, social media software problem, software manager problem and so many more. Some of the blog readers has send a request about these things, if you have used Ubuntu than you must have an idea about tweaks and software manager in Ubuntu. How easy and user friendly Ubuntu is, for backtrack5 you can also do all these stuffs because it is based on Ubuntu. For this tutorial......
 

Howto: Sniff or Hack someone’s username and password over an SSL encrypted connection with Ubuntu Linux

Do you think you're safe if you type https :// before gmail.com or paypal.com? I hope you'll think twice before you login from a computer connected to a wireless network after reading this guide. Let's start at the beginning. Let's say you have an evil neighbour who wants your paypal credentials. He buys himself a nice laptop with a wireless card and, if you are using a wep encryption, he cracks your wep code (click here to see how). After......
 

Facebook Is Using You

LAST week, Facebook filed documents with the government that will allow it to sell shares of stock to the public. It is estimated to be worth at least $75 billion. But unlike other big-ticket corporations, it doesn’t have an inventory of widgets or gadgets, cars or phones. Facebook’s inventory consists of personal data — yours and mine. Facebook makes money by selling ad space to companies that want to reach us. Advertisers choose key words......
 
 
Support : Ebin EPhrem | Ebin Ephrem | #Gabbarism
Copyright © 2011. Services | Embedded Support | Reviews | Virtual Technologys - All Rights Reserved
Template Created by ebinephrem.com Published by Ebin Ephrem
Proudly powered by Blogger