Wednesday, 9 April 2014

How Can U Add Extra Space When Ur C: Drive Running Short of Space...

Magic partition manager - EaseUS Partition Master

As magic partition manager, EaseUS Partition Master can extend system partition, resize/move partition, convert partition, convert dynamic disk to basic disk, copy partition, copy disk, copy dynamic volume, split partition, merge partitions, etc. under Windows 2000/XP/2003/Vista/2008/Windows 7/8 both 32 bit and 64 bit, with MBR and GPT disk supported. EaseUS Partition Master Free Edition is free partition manager to add disk space to C drive for Windows 2000/XP/Vista/7/8, both 32 bit and 64 bit Home users.

How to add space to C drive with EaseUS Partition Master?

EaseUS Partition Master can add space to C drive with simple operations by its "Resize/Move partition" feature. Want to extend system partition (C: drive)? Just follow the steps below.
Add space to system c drive partition
Launch EaseUS Partition Master. When there is unallocated space behind the system partition (C: drive), you only need two steps to add space to system C drive partition:
  • First, right click the system partition and choose "Resize/Move partition" to extend it.
  • Second, apply all changes.
When there is no unallocated space behind the system C drive partition, you need to add one step before extend it. That is shrinking the partition behind C: to make unallocated space by using "Resize/Move partition". After this operation, you can use the method mentioned above to finish adding space to system partition safely.
Besides Partition Manager, EaseUS Partition Master provides Partition Recovery and Disk and Partition Copy features. It is a complete solution to solve your MBR and GPT disk and partition problems. Of course, EaseUS Partition Master provides different editions to different users, please refer to Edition Comparison.

Saturday, 2 February 2013



Password cracking doesn't always involve sophisticated tools. It can be as simple as finding a sticky note with the password written on it stuck right to the monitor or hidden under a keyboard. Another crude technique is known as "dumpster diving," which basically involves an attacker going through your garbage to find discarded documentation that may contain passwords.
Of course attacks can involve far greater levels of sophistication. Here are some of the more common techniques used in password cracking:


  • Dictionary attack
    A simple dictionary attack is by far the fastest way to break into a machine. A dictionary file (a text file full of dictionary words) is loaded into a cracking application (such as L0phtCrack), which is run against user accounts located by the application. Because the majority of passwords are often simplistic, running a dictionary attack is often sufficient to to the job.
  • Hybrid attack
    Another well-known form of attack is the hybrid attack. A hybrid attack will add numbers or symbols to the filename to successfully crack a password. Many people change their passwords by simply adding a number to the end of their current password. The pattern usually takes this form: first month password is "cat"; second month password is "cat1"; third month password is "cat2"; and so on.
  • Brute force attack
    brute force attack is the most comprehensive form of attack, though it may often take a long time to work depending on the complexity of the password. Some brute force attacks can take a week depending on the complexity of the password. L0phtcrack can also be used in a brute force attack
    .






TOP TEN CRACKING METHOD

1. Dictionary attack

"This uses a simple file containing words that can, surprise surprise, be found in a dictionary. In other words, if you will excuse the pun, this attack uses exactly the kind of words that many people use as their password..."
2. Brute force attack

"This method is similar to the dictionary attack but with the added bonus, for the hacker, of being able to detect non-dictionary words by working through all possible alpha-numeric combinations from aaa1 to zzz10..."

3. Rainbow table attack

"A rainbow table is a list of pre-computed hashes - the numerical value of an encrypted password, used by most systems today - and that’s the hashes of all possible password combinations for any given hashing algorithm mind. The time it takes to crack a password using a rainbow table is reduced to the time it takes to look it up in the list..."

4. Phishing

"There's an easy way to hack: ask the user for his or her password. A phishing email leads the unsuspecting reader to a faked online banking, payment or other site in order to login and put right some terrible problem with their security..."

5. Social engineering

"A favourite of the social engineer is to telephone an office posing as an IT security tech guy and simply ask for the network access password. You’d be amazed how often this works..."

6. Malware

"A key logger or screen scraper can be installed by malware which records everything you type or takes screen shots during a login process, and then forwards a copy of this file to hacker central..."

7. Offline cracking

"Often the target in question has been compromised via an hack on a third party, which then provides access to the system servers and those all-important user password hash files. The password cracker can then take as long as they need to try and crack the code without alerting the target system or individual user..."

8. Shoulder surfing

"The service personnel ‘uniform’ provides a kind of free pass to wander around unhindered, and make note of passwords being entered by genuine members of staff. It also provides an excellent opportunity to eyeball all those post-it notes stuck to the front of LCD screens with logins scribbled 

Tuesday, 25 September 2012

Best 10 books.......for learning or building a basic block on hacking or security build up............


1. Hacking exposed 6


2. The hacker's underground handook


3. Spunkins virues revealed


4. Networking Bible


5. The art of Deception


6.secrets of super hacker


7. Counter hack reloaded


8.Byte of python


9.Linux newbie administrator guide


10. HTML & XHTML :The complete refrence

Friday, 31 August 2012

CCNA Course

Networking -  when we  connects two or more  computers to each other  and shares resources
                      for example:- Printers, scanner, files etc........ is called networking .


Types of Network - 1) LAN (Local Area Network)

                         
                            2) PAN (Personal Area Network)

                          3) MAN (Metropolitan Area Network)


                         4) WAN (Wide Area Network)

Friday, 23 March 2012

Hide Drives Explorer


How to Hide Your Drives In the Explorer (In Windows 7)………… (With excess from Run or Command Prompt)