Skip to main content

Posts

Showing posts from July, 2014

How to Hack an Ethernet ADSL Router

Every router comes with a  username  and  password  using which it is possible to gain access to the router settings and configure the device. The vulnerability actually lies in the  Default username  and  password  that comes with the factory settings. Usually the routers come preconfigured from the Internet Service provider and hence the users do not bother to change the password later. This makes it possible for the attackers to gain unauthorized access to the router and modify its settings using a common set of default usernames and passwords. Here is how you can do it. Before you proceed, you need the following tool in the process: Angry IP Scanner Hacking the ADSL Router: Here is a detailed information on how to exploit the vulnerability of an ADSL router: Go to  whatismyipaddress.com . Once the page is loaded, you will find your IP address. Note it down. Open Angry IP Scanner, here you will see an option called  IP Range:  where you need to enter the range of

How to Bypass Right Click Block on Any Website

In order to block the right-click activity, most websites make use of JavaScript which is one of the popular scripting languages used to enhance functionality, improve user experience and provide rich interactive features. In addition to this, it can also be used to strengthen the website’s security by adding some of the simple security features such as  disabling right-click ,  protecting images ,  hiding or masking parts of a web page  and so on. How JavaScript Works? Before you proceed to the next part which tells you how to disable the JavaScript functionality and bypass any of the restrictions imposed by it, it would be worthwhile for you to take up a minute to understand how JavaScript works. JavaScript is a client side scripting language (in most cases), which means when loaded it runs from your own web browser. Most modern browsers including IE, Firefox, Chrome and others support JavaScript so that they can interpret the code and carry out actions that are defined in th

Tips to Enable or Disable Toast Notifications on Windows 8

Windows 8 is among the most incredible and interesting kind of Windows version from Microsoft. It has visually eye catching design, which is found in modern user interface that is meant for redesigning a number of operating systems, worked out for users. If you have used or seen someone using Windows 8 you could have noticed the toast notifications in this modern version of windows, which simply appears the moment you install or uninstall any application. There are many users who are well versed with the bubble notifications, which were found in the earlier versions of Windows seen via the taskbar. The new application platform in Windows 8 comes with an integrated notification system for installing or uninstalling a number of modern applications. The Windows 8 style application can employ a number of notifications types including the traditional toast notifications, live titles and lock screen. These can be managed by either disabling or enabling the notification of your applicatio

Proxy Server and How it Works?

How Proxy Server Works? An illustration of how a proxy server works is shown below: As shown in the above example, whenever the client connects to a web proxy server and makes a request for the resources (in this case, “Sample.html”) that reside on a remote server (in this case, xyz.com), the proxy server forwards this request to the target server on behalf of the client, so as to fetch the requested resource and deliver it back to the client. An example of client can be a user operated computer that is connected to the Internet. Types of Proxy Servers and their Uses: 1. Forward Proxies A forward proxy is the same one described above where the proxy server forwards the client’s request to the target server to establish a communication between the two. Here the client specifies the resources to be fetched and the target server to connect to, so that the forward proxy server acts accordingly. Except for reverse proxy  (discussed in the latter part of this article), all othe

remove the usb virus instruction

REmOVE VIRUS THAT CAUSES FILES IN REMOVBLE RIVE/PEN DRIVE/MEMORY CARD TO become shortcut. Hello friend You can easily remove VIRUS THAT CAUSES FILES IN REMOVBLE RIVE/PEN DRIVE/MEMORY CARD TO become shortcut. For this just download usbfix software here . Step 1:- UNRAR AND DOUBLE CLICK IT WILL  INSTALL ~~~~~~~~~~~~Plug in all your drive that are corrupted with virus ~~~~~~~~~~~~~~~~~ 2:- now first click on” research “button.~~~~~~~~~~~~~~~by RAAJ DUBEY~~~~~~~~~~~~~~~ ~~~~~~~~~~Be patient this step may take many time it will hang on 73 % for much time. Do not cancel here~~~~~~~~~~~~~~~~~~~~~`` 3:- now click on “deletion” button ~~~~~~~~~~usbfix window will close ~ now again double click on usbfix ico located at desktop~~~~~~~~~~~JINJAX TRICK ~~~~~~~~~~~~~~~~~~~` ~~~~~~~again it will scan and delete virus~~~~~~~~~~~~~~` 4:- now click on “lising” button t list all your files back in pd means all shortcut will be deleted and Original folder ,file will be sh

DOWNLOAD ADVANCED INSTALLER

DOWNLOAD FEATURES JAVA LICENSING PURCHASE SUPPORT FORUMS Caphyon Advanced Installer Advanced Installer The power of Windows Installer made easy Buy Download .MSI installs in Minutes Advanced Installers deploy products on millions of computers worldwide Powerful and easy to use  Windows Installer  authoring tool. Install, update and configure your products  safely, securely  and reliably . Freeware Windows Installer Free Installer Trial With Advanced Installer, packaging and deploying SourceTree is now just a simple part of our development process. We can focus our efforts on building new features in SourceTree and improving existing ones so that SourceTree becomes the best Windows interface to Git source repositories. Steve Streeting , Lead developer of SourceTree at  Atlassian Full story Windows Installer Software Windows Installer Software Windows Installer Software Windows Installer Software Windows Installer Software W