Skip to main content

Cyber Security


Information Security & Ethical Hacking

All tutorials and articles on this site are for Educational purpose only.
Do not misuse it. Articles are just for your knowledge and protect your self from 
Black-Hat Hackers and Internet threats. Enjoy n feel free to ask questions...


Are you unknowingly letting hackers steal your data?

1) Security feature to disable any virus or malware running in hidden mode inside ur pc
you should perform the following action daily after u start your pc

Steps:
Start > Run > msconfig ENTER
click on start up > click on enable all > then click on disable all >
click apply > after that click on services >
at bottom click on hide all microsoft services > then click on disable all
> apply > ok > click exit without restart



2) If your task manager or registry is disabled by any virus infection,
then follow the steps below : (for Vista,Windows 7,8)

1st you have to run the following vbs script. For that u have to copy
and paste the script in notepad :
Option Explicit
Dim WshShell, strUserName, strDomain, strSID
Dim objWMIService, colItems, objItem, arrName, objAccount
Set WshShell = WScript.CreateObject("WScript.Shell")
Set objWMIService = GetObject("winmgmts:\\.\root\cimv2")
Set colItems = objWMIService.ExecQuery("Select * From Win32_ComputerSystem")
For Each objItem in colItems
arrName = Split(objItem.UserName, "\")
strDomain = arrName(0)
strUserName = arrName(1)
Next
Set objAccount = objWMIService.Get _
("Win32_UserAccount.Name='" & strUserName & "',Domain='" & strDomain & "'")
strSID=objAccount.SID
If trim(strSID) <> "" then
WshShell.RegDelete ("HKEY_USERS\" & strSID & "\Software\Microsoft\Windows\CurrentVersion\Policies\System\DisableRegistryTools")
Msgbox "Completed!"
End if
and then go to file > save as > type file name
e.g. Enable-Registry.vbs (the extention must be .vbs) > save as type
(there change text documents to all file by clickin the drop down box at right)
> then click on save > then check for the file u have just saved
> u can save it in desktop > after that double click Enable-Registry.vbs
> u will get a message "Completed!"
Now u can check if ur registry is enabled again?
Start > Run > regedit.exe ENTER :-)
After your registry is open u have to check for the following link in registry :
HKEY_CURRENT_USER\Software\Microsoft\Windows\CurrentVersion\Policies\system
inside registry goto > click HKEY_CURRENT_USER > click Software > click Microsoft
> click Windows > click CurrentVersion > click Policies > click system
> there at the right side search for "DisableTaskMgr" or "TaskMgr" there right click
and delete it n u are done. :-)
check ur task manager by clicking Ctrl+Alt+Del together :-)



Comments

Popular posts from this blog

Password Crackers

There are password crackers for almost every password-protected system available. A quick search on the Internet identifies password crackers for Windows NT, UNIX, Novell, PGP, Word, VNC, pcAnywhere, Lotus Notes, Cisco routers, WinZip, and many others. Password crackers can be effective tools to use during penetration testing to help ensure users are selecting strong passwords. If a strong password is used, password crackers can take weeks, months, or even years to crack it. If a weak password is used, the cracker could succeed in hours, minutes, or even seconds. In this chapter we concentrate on OS-specific password crackers and describe their use during testing. L0phtCrack URL: www.L0pht.com Client OS: Windows 9x/NT Target OS: Windows NT Price: Under $100 Description:  L0phtCrack is the premier NT password cracker. The first version provided administrators the ability to extract user names and encrypted password hashes from the SAM database and perform a dictionary and brute for...

How AI can change the world?

There are many ways in which AI (artificial intelligence) can change the world, both positive and negative. Some potential impacts include: Improved decision-making: AI algorithms can analyze large amounts of data quickly and accurately, allowing businesses and governments to make more informed decisions. Increased efficiency: AI-powered systems can automate tasks and processes, freeing up human workers to focus on more complex tasks. Enhanced healthcare: AI can be used to analyze patient data and diagnose diseases more accurately, improving patient outcomes and reducing healthcare costs. Increased safety: AI can be used in transportation, such as self-driving cars, to reduce accidents and improve safety on the roads. Environmental benefits: AI can be used to optimize energy usage, reducing waste and helping to reduce greenhouse gas emissions. However, there are also potential negative impacts of AI, such as job displacement and the potential for AI to be used for nefarious purposes, s...

Nmap

URL: www.insecure.org/nmap/ Client OS: UNIX, Windows NT (ported by eEye Digital Security) Target OS: TCP/IP networks Classification: Discovery tool Price: Free Description:  While Nmap is a most powerful port scanner, it can also serve as a more sophisticated ping sweep utility. In this chapter, we discuss only Nmap's ping capability. If the target network is blocking ICMP ECHO requests and replies, Pinger and other normal ping utilities will not be able to identify any active systems. Additionally, the target network may have the most crucial systems configured to not respond to ICMP ping but may allow some nonessential systems to respond to ICMP ping to trick attackers. By finding some interesting hosts that respond to ping, the attacker may not think to use a more sophisticated ping tool to identify hosts not responding to ICMP ping. Nmap provides the capability to perform TCP pings on TCP ports rather than the usual ICMP that everyone associates w...