Are you ready to unlock a lucrative avenue within the realm of mail order business? Look no further – the key lies in selling high-value information folios to those seeking new opportunities. Imagine gaining access to a treasure trove of folios available in generous quantities at unbelievable wholesale rates. Alternatively, entrust your supplier to seamlessly […]
All posts by
Proxies … proxies … proxies …
What is a Proxy Server? A proxy server is a kind of buffer between your computer and the Internet resources you are accessing. The data you request come to the proxy first, and only then it transmits the data to you. I know many are looking for IP Maskers or Scramblers, but honestly, it aint […]
NetBIOS Full Explained
The Magic of NetBIOS In this guide you will learn how to explore the Internet using Windows XP and NetBIOS: How to Install NetBIOS <beginnine2a.shtml> How to Use Nbtstat <beginnine2b.shtml> The Net View Command <beginnine2c.shtml> What to Do Once You Are Connected <beginnine2c.shtml> How to Break in Using the XP GUI <beginnine2d.shtml> More on the […]
How to use the Web to look up information on hacking
Want to become really, really unpopular? Try asking your hacker friends too many questions of the wrong sort. But, but, how do we know what are the wrong questions to ask? OK, I sympathise with your problems because I get flamed a lot, too. That’s partly because I sincerely believe in asking dumb questions. I […]
An Architectural Overview of UNIX Network Security
1. Introduction The goal of this paper is to present my concept of a UNIX network security architecture based on the Internet connectivity model and Firewall approach to implementing security. This paper defines several layers of a firewall, which depict the layers of vulnerability. This paper also provides some subjective comments on some of the […]
How to Stop Network Attacks: A Comprehensive Guide
Discover how to stop network attacks with our comprehensive guide on firewalls, VPNs, and best practices. Learn about essential security measures, firewall types, and VPN benefits to protect your network from threats.
Anonymous FTP FAQ
How to Set up a Secure Anonymous FTP Site The following is a FAQ on setting up a secure FTP Site. FTP sites are known for much abuse by transferring illegal files. They also open many opportunities for intruders to gain access via misconfigured setups. And lastly many versions of ftp servers have had security […]
How To Remove and Add Right-Click Menu Items from Files and Folders
Removing Items A lot of programs you install will add themselves to the right-click menu of your files and/or folders. And most times, you have no choice in the matter and, as a result, your right-click menu can get very long with added items you don’t even use. The last person I was helping with […]
How to Change the Text on the XP Start Button
Step 1 – Modify Explorer.exe File In order to make the changes, the file explorer.exe located at C:\Windows needs to be edited. Since explorer.exe is a binary file it requires a special editor. For purposes of this article I have used Resource Hacker. Resource HackerTM is a freeware utility to view, modify, rename, add, […]
How to Disable the Windows Key
I was recently playing games and this nasty windows logo key keeps annoying me , cause i often accidentally clicked it , and i started to search for a solution to solve my problem, and found the following article in Microsoft website, and it did work, hope this helps, thanks! CODE http://support.microsoft.com/?kbid=181348 or in other […]