Password cracking – a quick guide to success
Password cracking – a quick guide to success This article will give you an insight on password cracking and you will learn the basic approaches of this process. If you are new to this subject you will see that this article was meant to help you understand better the principles of password hacking. Password cracking is the procedure of retrieving a password from data that was saved onto or sent by a computer system. There are various reasons why one would want ...
Help Desk Software – beginner’s guide
Help Desk Software – beginner’s guide If you work in a big company (like me for example) you know that things are a little more complicated when it comes to it help desk because all requests are processed through help desk software. Back in the days when I was working as a network administrator things were different. My mobile phone and my desk phone rang like crazy. I was running from one office to another helping my colleagues with their technical problems. ...
Linksys WRT54G – A successful wireless router saga – Part 1
The WRT54G, WRT54GS, WRT54GL and WRTSL54GS are members of a very popular series of wireless routers produced by the American company Linksys, which in 2008 was bought by another American company, Cisco. The WRT54G was first released in 2003, based on a Linux OS firmware. Since 2005 the WRT54G manufactured devices work on the VxWorks OS. To provide support for Linux-based firmware, Linksys has renamed the original type routers with Linux in WRT54GL from WRT54G. These routers are suitable for sharing Internet ...
Fing (former Look@Lan network monitoring tool)
Fing (former Look@Lan network monitoring tool) Created from the ashes of Look@Lan, Fing is the supreme command line software for network and service discovery. With the support of the brand new cross-platform network engine, it delivers an astonishing discovery sharpness and speed. It doesn't matter if you already are a Look@Lan user or not, make sure you take Fing for a ride. It is totally worth. You will have a great view of the entire network in a mere of seconds and then ...
How To – Handling a Cyber Breach
Most cyber breaches into your online presence will be directed at your website server and its accompanying databases or accounts. And, if you’ve been the victim of a server hack, it probably occurred through one of two different means. The first would be an attack at some sort of weakness in third party web applications, or at addons/plugins that are attached to them and working from within your hosting server; the attack could even have taken place against your LAMP software ...
Font apps from Google Play contain spyware
Analysts discover more BadNews on Google Play
An old Android Trojan got downloaded from Google Play by millions
Beware of Android malware spreaded by Cutwail botnet
Aggressive Android adware and malware on an uptrend
How to defend your Android apps
Watchout for fake Candy Crush apps from Google Play
Researcher discovered critical Samsung Android smartphone vulnerabilities
Android botnet delivers SMS spam due to SpamSoldier infection
Read More Posts From Android
Battle of the Immortals Patch 1309090
Heroes of Might and Magic 3 Unofficial HD Patch 3.57f
Dark Souls Internal Rendering Resolution Fix (DSFix) 2.1
Euro Truck Simulator 2 Patch 1.5.2
Conquer Online Cumulative Patch All to 5787
Grand Theft Auto IV Patch 126.96.36.199
Crusader Kings 2 Patch 1.10
GodsWar Online Patch 2.49.021 to 2.49.022
Might and Magic Heroes VI Patch 2.1
Read More Posts From Software patches