• Main Menu
    • VLAN Hopping

      VLAN Hopping

      VLAN Hopping is one of the primary VLAN based attacks used by hackers to infiltrate network security. VLAN hopping is used to attack a network by sending packets to a port which is generally not accessible. VLAN hopping attacks are mainly conducted in the Dynamic Trunking Protocol and, in some cases; the attacks are targeted

    • How to Delete Recent Searches

      How to Delete Recent Searches

      Deleting recent searches–be they from Bing, Google or Yahoo–is an easy thing to do. While the steps vary a little from Internet Explorer to FireFox, for the most part, they take the same amount of time and can be found in the same place. Deleting Recent Searches in Internet Explorer Click on the tools button.

    • Using the Systems Management Server Installer

      Using the Systems Management Server Installer

      Systems Management Server (SMS) Installer Overview SMS Installer can be used to create self-extracting software installation files. These executable files contain the identical files and settings which were created when a specific application was installed. The SMS Installer reproduces all the components required to install the software. This includes an installation script as well, which

    • UMASK

      UMASK

      umask is a Unix shell built-in command that automatically sets file permissions on newly created files. The umask command can be confusing to use because it does work as a mask. In other words, the user sets the permissions that he/she does not want in the umask. To calculate permissions that will result from specific

    • How to Uninstall Nero Scout

      How to Uninstall Nero Scout

      Nero Scout is a small utility that is bundled with the recent versions of the popular program, Nero. It is a tool used for cataloging various media files and images for easy referencing. Uninstalling Nero Scout Click Start, Run and input the following line: regsvr32 /u “%COMMONPROGRAMFILES%AheadLibMediaLibraryNSE.dll” Restart your computer and check to see if

    • How a Nuclear Bomb Works

      How a Nuclear Bomb Works

      A nuclear bomb uses a nuclear reaction to generate energy (heat and radiated particles). The energy released is millions or in some cases billions of time stronger than TNT; the whole process is carried out in a very short time, providing huge destructive power. There are two types of nuclear reactions, fission and fusion. During

    • User Authentication in IIS

      User Authentication in IIS

      Authenticating users in IIS is one of the initial steps in securing IIS. When a user attempts to access a website or an FTP site on an IIS machine, authentication is the process that verifies whether the user can indeed access the site. Authentication and permissions are closely coupled. After a user is authenticated, NTFS

    • Who Links to Me?

      Who Links to Me?

      If you have a web site, you can find out who links to your web site by searching for that information on one or more of the popular Internet search engines. To find out who links to you, just enter your URL in one of the search boxes below and click the “Who Links to

    • Power Line Networking

      Power Line Networking

      Power line networking is one of the options in connecting computers to form a home network. This technology powers a "wireless" and "power free" home network. Power line networking does not require the user to install additional cables and power-consuming networking hardware to set up a home network. Instead, power line networking, uses the existing

    • How to Capture a Unix Terminal Session

      How to Capture a Unix Terminal Session

      One of the best methods to capture a Unix terminal session is to use the `script` command. In this example we start a script session, run a couple of commands, and then use the `exit` command to stop capturing the terminal session: $ script Script started, output file is typescript $ pwd /home/will $ ps

    174 queries in 0.547 seconds.