Results for Security

What is Email Header ? View email header in Gmail.

Many people open there inbox in-order to check their email or send a email and then sign-out but what we do not know that there are indeed lot of things are carried out when we simply send or receive a email. There is a detail report/history of all those things  that are carried out and are attached with the...
What is Email Header ? View email header in Gmail. What is Email Header ? View email header in Gmail. Reviewed by Satyajit (Admins,a.k.a Satosys) on Monday, October 28, 2019 Rating: 5

Katana | A portable multi-boot security suite

Katana a tool which holds over 100 applications under it which can be run a USB/flash drive.As the new v2 has come up with a major addition called "Forge",which helps in further addition of new applications to the booting list. >>>>>Learn how to use portable applicaions from your PC. Portable Applications: 1.BackTrack 2.Computer...
Katana | A portable multi-boot security suite Katana | A portable multi-boot security suite Reviewed by Satyajit (Admins,a.k.a Satosys) on Wednesday, February 09, 2011 Rating: 5

More Security for Firesheep from Mozilla | HSTS

Firesheep was a buzz word few months ago then came the blacksheep to counter protect users from it. The firesheep tutorial I demonstrated in a post shows how an attacker can gain access to any account(Twitter,Facebook,Gmail etc) with out even knowing the password using Sidejacking. Now with the increase of threats...
More Security for Firesheep from Mozilla | HSTS More Security for Firesheep from Mozilla | HSTS Reviewed by Satyajit (Admins,a.k.a Satosys) on Wednesday, February 02, 2011 Rating: 5

New Inguma |A free Penetration and Vulnerability Research Toolkit

Inguma is a free penetration and vulnerability research tool kit written in python, recently the new version has been released after 3 years and with a very user friendly Graphical user interface. 1.Learn more about it here. 2.Visit there blog for more updates. Download Inguma 0.2 : 1.Inguma-0.2.tar.gz 2.You can use...
New Inguma |A free Penetration and Vulnerability Research Toolkit New Inguma |A free Penetration and Vulnerability Research Toolkit Reviewed by Satyajit (Admins,a.k.a Satosys) on Monday, January 31, 2011 Rating: 5

Computer Security Threats | Infographics

Source:http://www.onlineschools.org/blog/computer-threats This is a Guest Post by Suresh Peters a Computer Science student from Chennai,India. He is a cool person and a part time blogger at Softwarebuzzer,you can catch him he...
Computer Security Threats | Infographics Computer Security  Threats | Infographics Reviewed by Satyajit (Admins,a.k.a Satosys) on Saturday, January 29, 2011 Rating: 5

Few Online Tools for Computer and Online Security

Computer security is of foremost importance these days even more than our physical security..lol.There are few online tools available through which we ensure our security to certain extent.We cannot say our PC will be 100% secure but to some extent we will be benefited  for sure. File scanner: 1.Kaspersky: It can...
Few Online Tools for Computer and Online Security Few Online Tools  for Computer  and Online Security Reviewed by Satyajit (Admins,a.k.a Satosys) on Thursday, January 06, 2011 Rating: 5

How to change Mac Address manually and spoof using tool.

Computers talk or communicate over the network using Mac address(Media Access Control Address ) which is unique for each and every machine.Here in this post we will see how we can spoof or change the Mac Address manually and using tools. Procedure: Using Registry: Step 1. Type "Regedit" in run and press enter.In...
How to change Mac Address manually and spoof using tool. How to change Mac Address manually and spoof  using tool. Reviewed by Satyajit (Admins,a.k.a Satosys) on Wednesday, January 05, 2011 Rating: 5

Monitor Facebook activity and increase Security

Facebook is one of the most widely used social networking site these days.So,if your account get compromised in any way for example by session hijacking etc then it may result in a big headache.Here in this post i will tell you how you can monitor your account activity details like location,OS type and time of access. Read...
Monitor Facebook activity and increase Security Monitor Facebook activity and increase Security Reviewed by Satyajit (Admins,a.k.a Satosys) on Monday, January 03, 2011 Rating: 5

Prevent access to Google Apps and reset sign-in cookies.

Google Apps has indeed added a bit of ease to most of the people those who are on move,they can access there favourite google service from anywhere any time if they have access to internet.Suppose the device from where they are accessing the Google Apps account get stolen then the person possessing the device can open...
Prevent access to Google Apps and reset sign-in cookies. Prevent access to Google Apps and reset sign-in cookies. Reviewed by Satyajit (Admins,a.k.a Satosys) on Sunday, January 02, 2011 Rating: 5

How to boot Backtrack from USB?

I am sure that many of you must have heard of Backtrack and its functionality.So I will not go in detail into what is back track but here I will tell you how you can use it from your USB. What is Backtrack? It is a Linux distribution and unix like OS made for pentesting and forensic analysis.It contains all the tools that...
How to boot Backtrack from USB? How to boot Backtrack from USB? Reviewed by Satyajit (Admins,a.k.a Satosys) on Friday, December 31, 2010 Rating: 5
Powered by Blogger.