WARNING/DISCLAIMER

The Author/Blogger shall hold no liability for special, incidental, or consequential damages arising out of or resulting from the use/misuse of the information in this Blog. It is strictly mentioned that these are all for learning and awareness purpose. Most of the articles are collected from various sources and many of them are blogger's own which meant for helping people who are interested in security system or beginners help for security systems and various IT purposes. Some of the articles are solely intended for IT Professionals and systems administrators with experience servicing computer. It is not intended for home users, hackers, or computer thieves attempting to crack PC. Please do not attempt any of these procedures if you are unfamiliar with computer hardware, software and please use this information responsibly. Binod Narayan Sethi is not responsible for the use or misuse of these material, including loss of data, damage to hardware or personal injury. Information can help you to catch hackers and crackers and other cyber criminals. Information can help you to detect and manipulate the evil motives of these anti social intellectual peoples. Good use of the information protect you from evils and misuse of the information make you evil/criminal. Author of this site will not be responsible for use of material for any illicit mean or illicit act done by anybody in any means.

Binod Narayan Sethi

Binod Narayan Sethi
Programming,Web Development & Graphic Designing are my Hobbies.

All About Hackers

Know about the Hacker and their types. How they impact on society. Freedom of knowledge is harmful or dangerious it all talk about a Hacker. Let explore it...

Saturday, July 23, 2011

A simple way to run roadrash on windows 7 (without any graphics problem).

A simple way to run Roadrash on windows 7 (without any graphics problem). Many have problem with Road rash when play on Windows 7, when they open the road rash game may  display is abnormal and something like faded or oil paint like display. Here is a simple solution for that. 1. Right click of road rash icon go to properties and then open file location.2. Create a bat file and write down the following code: taskkill /f /im explorer.exe Rashme.exe start explorer.exe ortaskkill /f /im explorer.exe Roadrash.exe start explorer.exeHere Important is the *.exe file-name should be the same as game name.3. Run the bat file and enjoy the game without...

Change Windows 7 Startup Sound

First Method 1) For best results, boot out of Window 7 and into an alternative OS, such as XP. (This is assuming you dual boot.) 2) Locate the file "imageres.dll" in Vista's System32 folder. For instance, C:\Windows\System32\imageres.dll. Copy that file into a different location, i.e. your desktop. 3) Download ResHacker . 4) Open ResHacker. Open the imageres.dll file in ResHacker. 5) Find the folder that reads "WAVE" and expand everything below that. 6) Right click 1033 (this could have a different name depending on your locale), and click Replace Resource. Click "Open file with new resource", and find the wave file you want to replace it...

Monday, July 18, 2011

All about Hackers

All about Hackers When we say a Hacker we often think a bad guy who is a skilled person but wicked or mentally violative for technical exploitations in our prelim conscious! Let’s itself hack the word Hacker. Actually what does it mean? Originally its derived from verb HACK, which means "To cut into repeatedly and/or irregularly," or “physically cut at something with repeated blows” for usage as a Slang Term or Jargon for the act of breaking into (hacking into) to explore the extreme engineering implemented in them so that we can find demerits in them which can be used in two ways i.e. construct it further to make it more secure, advanced, beauty...

Sunday, July 17, 2011

Yahoo Cookie,Gmail Cookie,...Facebook Cookie Stealing And Session Hijacking Introduction

What are cookies and how are they used by websites and web admins? Cookies is a piece of code which identify you to the site. They store settings about your customized look and feel for the pages you view, your username and encrypted password or user id, who referred you to the site, profile preferences, and just about any kind of information the admins want them to store to customize your user experience. Cookies are most commonly used to give...

Legal aspects of computing

Legal aspects of computing are related to various areas of law. Cyberlaw is a term that encapsulates the legal issues related to use of communicative, transactional, and distributive aspects of networked information devices and technologies. It is less a distinct field of law than property or contract law, as it is a domain covering many areas of law and regulation. Some leading topics include intellectual property, privacy, freedom of expression, and jurisdiction. Information Technology Law (or IT Law) is a set of recent legal enactments, currently in existence in several countries, which governs the process and dissemination of information...

How to Hack an Email Account – Email Hacking

Wondering to know how to hack an email account? Well, before you can do that, you need to understand the real ways of hacking that actually work and also that are simply scam and do not work. So, here in this post, I am going to discuss some of the Real and Working Ways to hack emails; along with that, I am also going to make you aware of the common myths and scams associated with email hacking. On a regular basis, a lot of people contact me about suspecting their boyfriend or girlfriend of cheating, and ask me how to hack their email password so as to find out the truth. If you are in a similar situation where you want to hack into someone’s...

How to protect your email account from being hacked

Today in this post I’ll teach you how to protect your email account from being hacked. Nowadays I get a lot of emails where most of the people say “My Email account is hacked please help…”. Now one question which arises in our mind is: “Is it so easy to hack an email account? OR Is it so difficult to protect an email account from being hacked?”. The single answer to these two questions is “Absolutely NOT!”. It is neither easy to hack an email nor difficult to protect an email account from being hacked. If this is the case, then what is the reason for many people to lose their accounts? The answer is very simple. They don’t know how to protect...

Page 1 of 12712345Next

Binod Narayan Sethi

Binod Narayan Sethi
Binod Narayan Sethi

Share

Twitter Delicious Facebook Digg Stumbleupon Favorites More