WARNING/DISCLAIMER

The Author/Blogger shall hold no liability for special, incidental, or consequential damages arising out of or resulting from the use/misuse of the information in this Blog. It is strictly mentioned that these are all for learning and awareness purpose. Most of the articles are collected from various sources and many of them are blogger's own which meant for helping people who are interested in security system or beginners help for security systems and various IT purposes. Some of the articles are solely intended for IT Professionals and systems administrators with experience servicing computer. It is not intended for home users, hackers, or computer thieves attempting to crack PC. Please do not attempt any of these procedures if you are unfamiliar with computer hardware, software and please use this information responsibly. Binod Narayan Sethi is not responsible for the use or misuse of these material, including loss of data, damage to hardware or personal injury. Information can help you to catch hackers and crackers and other cyber criminals. Information can help you to detect and manipulate the evil motives of these anti social intellectual peoples. Good use of the information protect you from evils and misuse of the information make you evil/criminal. Author of this site will not be responsible for use of material for any illicit mean or illicit act done by anybody in any means.

Binod Narayan Sethi

Binod Narayan Sethi
Programming,Web Development & Graphic Designing are my Hobbies.

All About Hackers

Know about the Hacker and their types. How they impact on society. Freedom of knowledge is harmful or dangerious it all talk about a Hacker. Let explore it...

Sunday, February 9, 2014

The Basics of Fdisk

Primary partitions are the only one that are bootable. They're always the C: drive when active. Normally you can only have one (more with some special tricks etc.) Extended partitions are needed when you want more than one partition. You can only have ONE Extended partition. Logical Drives come into the Extended partition. They are handy since you know that you can only have one Primary and one Extended so you can get more than only two partitions. They would be your D:, E:, etc. drives.   First you need to reboot your system with the Boot Disk inserted. ...

Top 16 SSH hacking tips and tricks

So you think you know OpenSSH inside and out? Test your chops against this hit parade of 16 expert tips and tricks, from identifying monkey-in-the-middle attacks to road warrior security to attaching remote screen sessions. Follow the countdown to the all-time best OpenSSH command!SSH tips #16-14:Detecting MITM attacksWhen you log into a remote computer for the first time, you are asked if you want to accept the remote host's public key. Well how in the heck do you know if you should or not? If someone perpetrated a successful monkey-in-the-middle attack, and is presenting you with a fake key so they can hijack your session and steal all your...

Top 6 Websites To Learn Computer Programming Languages

Ever wanted to learn computer programming languages, but didn't know where to start? Well, those days are over. Today learning programming languages is not really a hard job. If you are a beginner and have aptitude to learn computer programming then you can accomplish this goal within a few months. Here are the top 6 websites, which are useful for learning programming.  1. W3schools.comIf you are a beginner or intermediate programmer, then w3schools is an excellent website for learning programming. W3schools offer tutorials for a variety of web programming and scripting languages such as html, html5, css, asp, Ajax, JavaScript, php, jQuery...

How To Remove All Your Google Web History?

Remove entire Google Web HistoryAs most of you already know, Google keeps a tab on pretty much everything you do on a Google site, provided that you signed in on any one of these websites. Everything you do is recorded, and can be used against you in the future. Search data can reveal particularly sensitive information about you, such as facts about your location, interests, age, religious views, and so on. You can, however, choose to not be so vulnerable, and can remove all of your Google web history to protect yourself from an unforeseen eventuality.In this post, I'll show you how to remove your entire Google web history.Before we begin,...

Hacking Someone's Facebook Password Using Some Software Or Website?

You might know that there are over thousands of websites and software that claim to hack Facebook password of any account? They'd ask you the victim's profile ID, maybe your credentials and some money too and will reportedly tell you the password which, to be honest, never works. Ever wonder why? Let me tell you why, they're FAKE! They're a scam which tricks you somehow in losing your money or your own Facebook account. Just give it a thought, why would Zuckerberg and his team spend Billions of Dollars on Facebook if one could hack it in less than a minute? The truth!Let me get this straight to you that the password hackers websites do nothing...

Wednesday, November 13, 2013

New china mobile security codes.

New china mobile security codes...Service codes "Chinese" models: default user code: 0000, 1122, 3344, 1234, 5678 Engineer mode: *#110*01# Factory mode: *#987# Enable test mode COM port: *#110*01# -> Device -> Set UART -> PS Config -> UART1/115200 Restore factory settings: *#987*99# LCD contrast: *#369# software version: *#800# software version: *#900# Service codes BenQ: software version: *#300# test mode: *#302*20040615# Service codes Pantech: software version: *01763*79837# service menu: *01763*476# reset defaults (phone/user code reset to default): *01763*737381# Service codes VK-Mobile 3xx, 5xx: software version: *#79# software...

Page 1 of 12712345Next

Binod Narayan Sethi

Binod Narayan Sethi
Binod Narayan Sethi

Share

Twitter Delicious Facebook Digg Stumbleupon Favorites More