Home / IT Security (page 25)

IT Security

Creating Simple Virus Via Notepad And JPS Virus Maker

How to Create a Virus Creating a virus is a process that can be very complicated or something that happens with a few button clicks. Advanced programmers may choose to code that malware from scratch. The less savvy or experienced may have to pursue other options, such as hiring to …

Read More »

Notes On Beginner Intermediate And Advanced Level Networking Docs/PDFs For Free

Beginner Intermediate And Advanced Level Networking Docs/PDFs For Free Notes on Networking For Beginners, Intermediate and Advanced Level students. You will probably learn very useful  topics in these 17 Different Docs/PDFs. You will also see Notes on Network Security & Networking. Content on Course Basic Networking Ch30 PowerPoint (Presentation) DDOS_ReadingNotes …

Read More »

Gaining Network Information

Gaining Network Information Via Whois And Nslookup An important step in foot printing is to gain information, where possible, about a target’s network. Fortunately, there are plenty of tools available for this purpose, many of which you may already familiar with. Whois    This utility helps you gain information about a …

Read More »

How To Find Serial Key Of Any Software

Let’s Find  Out The Serial Key of Any Software? The key 94FBR is a part of  Office 2000 Pro CD activation key that is widely distributed as it bypasses the activation requirements of Office 2000 Pro. By searching for 94fbr and the product name, you are guarantee that the pages that …

Read More »

Using Google Hacking

Using Search Engines One of the first step in the process of foot-printing tends to be using a search engine. Search engines such as Google and Bing can easily provide a wealth of information that the client may have wished to have kept hidden or may have just plain forgotten …

Read More »

SpyNote Android Trojan Builder Leaked

SpyNote is a Android (APK) which basically which facilitates remote spying. The builder, which creates new versions of the malware, recently leaked on several malware discussion forums. SpyNote is similar to OmniRat and DroidJack, which are RATs (remote administration tools) that allow malware owners to gain remote administrative control of …

Read More »