Skip to main content

Posts

Showing posts from June 30, 2015
Top 10 Best Free Antivirus Software Of 2015   10. AdAware Free Antivirus   Platform : Windows XP or higher Lavasoft’s AdAware has been a pretty reliable spyware tool. It offers smooth installation, non  intrusive notifications along with detailed  custom scanning. The UI of the latest version has  been vastly improved as compared to the  previous version. Several features have been  incorporated such as Sandbox emulation,  scheduler and a command line scanner. That being said there is a lot of scope for  development of the rootkit detection and  phishing protection provided by the Antivirus. 9. FortiClient   Platform : Windows XP or higher; Mac OS X Snow Leopard (10.6) or higher; iOS 5.1 or higher; Android 4.0(ICS) or higher FortiClient is an effective and efficient Free Antivirus which boasts of web filtering, a firewall, network optimization and parental controls. It also provides very good phishing detection and even includes a VPN Client. With no per
One of the Best Anti-Virus Malwarebytes Offers Free 1-Year Premium Keys “The Internet is full of pioneers and cowboys. It’s also got its fair share of pirates and trolls.” P iracy is the biggest challenge faced by the software companies and they are coming up with new ways to tackle the issue. One of the biggest examples is Windows by Microsoft who is basically giving away free Windows to “everyone. ” One of the best anti-virus software for Windows has an Amnesty program for Windows users. In this program, the company Malwarebytes is offering a free key to make your Malwarebytes Anti-Malware (MBAM) pirated version genuine. If you’ve installed a counterfeit version of the software, the company is offering a replacement key. The company says: “Malwarebytes is offering a free replacement key for Malwarebytes Anti-Malware Premium customers who have been inconvenienced by piracy or abuse. This new key will be exclusive to you going forward.” How to get fre
45 Zypper Commands to Manage ‘Suse’ Linux Package Management   SUSE (Software and System Entwicklung (Germany) meaning Software and System Development, in English) Linux lies on top of Linux Kernel brought by Novell. SUSE comes in two pack. One of them is called OpenSUSE , which is freely available (free as in speech as well as free as in wine). It is a community driven project packed with latest application support, the latest stable release of OpenSUSE Linux is 13.2 . The other is SUSE Linux Enterprise which is a commercial Linux Distribution designed specially for enterprise and production. SUSE Linux Enterprise edition comes with a variety of Enterprise Applications and features suited for production environment, the latest stable release of SUSE Linux Enterprise Edition is 12 . You may like to check the detailed installation instruction of SUSE Linux Enterprise Server at: Installation of SUSE Linux Enterprise Server 12 Zypper and YaST are the Package Man
How to Easily Get Very In-Demand OpenStack Cloud Skills    How in demand are cloud computing skills in the job market? Consider these notes from Forbes, based on a report from WANTED Analytics: There are 3.9 million jobs in the U.S. affiliated with cloud computing today with 384,478 in IT alone. The median salary for IT professionals with cloud computing experience is $90,950 and the median salary for positions that pay over $100,000 a year is $116,950. The report also notes that IBM, Oracle and Amazon have the greatest number of cloud computing positions open. We've noted before that people with OpenStack skills, in particular, are doing well in the job market. Here are some details on training and certification programs for OpenStack that can make a difference for job seekers.  "OpenStack talent is a rarified discipline," Josh McKenty, who helped develop the platform, has told CRN, adding, "to be good with OpenStack, you need to be a systems engi
How to  Disable USB Devices:     The USB storage drive automatically detects USB flash or hard drives. You can easily force and disable USB storage devices under any Linux distribution. The modprobe program used for automatic kernel module loading and can be configured to not load the USB storage driver upon demand. This will prevent the modprobe program from loading the usb-storage module, but will not prevent root (or another program) from using the insmod program to load the module manually. many method is available for disable USB : Method 1 : run the following command:               # echo 'install usb-storage : ' >> /etc/modprobe.conf Method 2 : You can get rid of all USB devices by disabling kernel support for USB via GRUB. Open grub.conf and append "nousb" to the kernel line as follows:                 # vim /etc/grub.conf kernel /vmlinuz-2.6.18-128.1.1.el5 ro root=LABEL=/ console=tty0 console=ttyS1,19200n8 nousb
Break The Password In RHEL7 suppose you forget the root password what  need to be done to change the root password 1.first thing is that you need to physical access of the machine. 2. after the press the power button continuously press esc key. 3.select your OS and press “e”. 4. Go down and go to the last of following line. 5. after LANG=en_US-B  write   rd.break selinux=0 6. Press Ctrl+X. And machine will boot. 7. But here, you can’t give the passwd command. So you need the mount file system because mount For  the rights #mount –o remount,rw /sysroot #chroot  /sysroot 8. Now your shell is change and you can give passwd command . 9. Now you can change your password afterthat  do exit 2 times then your system will reboot. 10. Now login with your New password.
USBkill – Code That Turns USB Drives Into PC Killing Weapon   SBkill turns your USB into a kill switch once activated. It’s a program – a computer code that will disable the computer if there’s any activity at the USB port. This weapon could be kept in the USB drives and attached to the computers with sensitive information. Recommended for you: This “Killer USB” Flash Drive Will Explode Your Computer Hephaestos, the programmer who wrote the USBkill script, says that USBkill is an anti-forensic USB. He says that it will be of utmost important in case the police busts your bunker, or steals your laptop. USB waits for some change at USB ports and then suddenly kills your computer. He writes: The police will use a mouse jiggler to keep the screensaver and sleep mode from activating. If this happens you would like your computer to shut down immediately. Additionally, you may use a cord to attach a USB key to your wrist. Then insert the key into your computer and
Hack Password Through USB Pendrive Today I will show you how to hack Passwords using USB Pen Drive. As we all know, Windows stores most of the passwords which are used on a daily basis, including instant messenger passwords such as MSN, Yahoo, Windows messenger etc. Along with these, Windows also stores passwords of Outlook Express, SMTP, POP, FTP accounts and auto-complete passwords of many browsers like IE and Firefox. There exists many tools for recovering these passswords from their stored places. Using these tools and an USB pendrive you can create your own rootkit to hack passwords from your friend's/college Computer. We need the following tools to create our rootkit. MessenPass: Recovers the passwords of most popular Instant Messenger programs: MSN Messenger, Windows Messenger, Yahoo Messenger, ICQ Lite 4.x/2003, AOL Instant Messenger provided with Netscape 7, Trillian, Miranda, and GAIM. Mail PassView: Recovers the passwords of the following email programs: Outlook Ex
8 Tips To Crack A Coding Interview   1. How To Code Algorithms If you are applying for job of software engineer, it is obvious that you need to know how to code. Writing day-to-day coding scripts is little different than coding an algorithm to solve software problem. Hiring team might ask questions like, ‘Write an algorithm to find an element in a linked list and move that element to the end of that list.’ A candidate must know how to program algorithms. If you have little
How To Remove Gphone Virus Well gphone.exe is nowadays one of the most dangerous virus spreading very rapidly. It is a Trojan and changes your IE homepage and sends tries to open gtalk and yahoo messenger. It even sends messages to gtalk contacts. Its icon is just like that of folder icon and people thinking of folder click on it get infected by the virus. Gphone virus basically is a 260 kb .exe file which looks like a folder and it can take any name of any other folder if you have clicked on the virus folder which looks like a folder but it is not. If you have a folder name ―movies‖ in your D drive it will make a exe file in the folder named movies.exe and if you click on that exe file it too work as a virus. It makes .exe files in all the folders you have with the name of the folder. How to remove this virus Method 1 1. Go to Task Manager then Processes and then click on gphone.exe and click on end process. 2. Manually go to folder where gphone.exe is present and delete it. 3
If you want to know more about your Linux system. Where can you get detailed information? The best way to obtain information about your Linux system is by running the ‘uname’ command with various options. Here are the details of the available options… Execute ‘uname’ without any options to display the kernel name: # uname -s Linux Execute ‘uname’ with the -r option to display the kernel release… # uname -r 3.8.0-23-generic Execute ‘uname’ with the -v option to display the kernel version: # uname -v #34-Ubuntu SMP Wed May 29 20:22:58 UTC 2013 Execute ‘uname’ with the -m option to display the machine hardware: # uname -m x86_64 Execute ‘uname’ with the -o option to display the operating system: # uname -o GNU/Linux What if you want to read only the first or last few lines of a file? You can use ‘head’ and ‘tail’ commands for this. # tail -5 output /etc/brltty/en-nabcc.ttb /etc/brltty/brl-al-abt_small.ktb /etc/brltty/brl-al-abt_basic.kti /etc/acpi