Username: Save?
Password:
Home Forum Links Search Login Register
    News: Keep The TechnoWorldInc.com Community Clean: Read Guidelines Here.
Participate in the fastest growing Technical Encyclopedia! This website is 100% Free. Please register or login using the login box above if you have already registered. You will need to be logged in to reply, make new topics and to access all the areas. Registration is free! Click Here To Register.
  Show Posts
Pages: 1 2 3 [4] 5 6 7 8 9 ... 24
43  THE TECHNO CLUB [ TECHNOWORLDINC.COM ] / Orkut FunZone / Re: Hindi Scraps || Hindi Poetry on: February 25, 2008, 09:52:30 PM
एक लडकी थी दीवानी सी
मोबाईल लेकर चलती थी
नज़रें झुका के
शर्मा के
मोबाईल मे जाने क्या देखा करती थी
कुछ करना था शायद उसको
पर जाने किस से डरती थी
जब भी मिलती थी मुझसे
येही पूछा करती थी
ये ओन कैसे होता है?
ये ओन कैसे होता है?

और मै सिर्फ येही कहता था
ये मोबाईल नही टी.वी का रिमोट ह
44  THE TECHNO CLUB [ TECHNOWORLDINC.COM ] / Networking / Setting Up A Wireless Network With Windows Vista on: February 18, 2008, 11:56:19 AM
Setting Up A Wireless Network With Windows Vista

I recently purchased a Sony Vaio with a wireless capabilities. When I went to setup a wireless network with my desktop to share files and Internet access I ran into a few problems. For any of you out there that are having trouble setting up your Windows Vista network, you need not to worry as I went through all of the frustration that is involved so that you don't have to. So for all of my trouble, here is a step by step guide for you to follow.

Step 1

First and foremost you need to make sure that your computer or laptop has a wireless device either attached to it or installed internally. A lot of new computers and laptops now come with these preinstalled. On my latop I have the wireless technology preinstalled, whereas my desktop computer hadn't, so I had to buy a wireless router to connect it to a wireless network. If you are connecting to a wireless network with your wireless router make sure that you install the drivers for the router first.

Step 2

Once you have the the router and drivers installed you need to configure you access point or router to the correct settings. To do this you should follow your manual as routers can sometimes vary. For most routers if you type 192.168.1.1 into your browser it will give the router setup page. You will be prompted for a username and password, these can be found with your manual. Once you have loaded the setup page you can click on the wireless tab and setup the networks SSID, which is the networks name i.e. Home Network, James Network, to make it easier from here on in we will use the name WLANHome. Then set the password. When you are selecting the security type there are 2 different types WEP and WPA. If you have the option, select WPA as it is a newer and more secure form of protecting for you wireless network. Click the wireless network icon in the notification area in the task bar. You will be presented by the connect to a network window. Select the WLANHome network and click on connect.

Step 3

If your are connecting to a network that is unsecured you will get a warning screen. If you are connecting to a public network, such as in a hotel or public area that offers free wireless Internet, you are connecting to the network at your own risk as this is considered unsafe. Most public networks are like this otherwise users would not be able to connect to it. If you are sure that you want to connect to the network click "Connect anyway".

Step 4

Once you access your network you will be asked for a security key or passphrase. Enter the security key that you entered on the router setup screen. Click save this network so that the next time you power up your PC or laptop in the area it will automatically connect you. The computer will then verify the passphrase and then it will ask you if you are connected to a public network or a home network or a work network, select the option which best suits your situation. If you are in a public place select the public option as this will prevent other users from see your files. Now you are connected to the network, Congratulations!!

Sometimes you might run into a few problems, just follow the on-screen instructions and vista will sort the problem out itself or will advise you on how to do so.

For more great tips and advice visit mikefolan.com
45  THE TECHNO CLUB [ TECHNOWORLDINC.COM ] / Technical Terms / Prototyping on: February 18, 2008, 10:40:49 AM
Prototyping is the process of building a model of a system. In terms of an information system, prototypes are employed to help system designers build an information system that intuitive and easy to manipulate for end users. Prototyping is an iterative process that is part of the analysis phase  of the systems development life cycle.

    During the requirements determination portion of the systems analysis phase, system analysts gather information about the organization's current procedures and business processes related the proposed information system. In addition, they study the current information system, if there is one, and conduct user interviews and collect documentation. This helps the analysts develop an initial set of system requirements.

    Prototyping can augment this process because it converts these basic, yet sometimes intangible, specifications into a tangible but limited working model of the desired information system. The user feedback gained from developing a physical system that the users can touch and see facilitates an evaluative response that the analyst can employ to modify existing requirements as well as developing new ones.

    Prototyping comes in many forms - from low tech sketches or paper screens(Pictive) from which users and developers can paste controls and objects, to high tech operational systems using CASE (computer-aided software engineering) or fourth generation languages and everywhere in between. Many organizations use multiple prototyping tools. For example, some will use paper in the initial analysis to facilitate concrete user feedback and then later develop an operational prototype using fourth generation languages, such as Visual Basic, during the design stage.
46  THE TECHNO CLUB [ TECHNOWORLDINC.COM ] / Miscellaneous / Re: vob file on: February 15, 2008, 09:47:48 AM
Hi Pranay,
.vob is an extension of a DVD file. so obviously it is heavier than other video formats. Read http://www.technoworldinc.com/technical-terms/what-is-dvd-t700.0.html for more information.

Regards
TWI Admin
why a .vob file size is not more than 0.99 GB ?
47  THE TECHNO CLUB [ TECHNOWORLDINC.COM ] / Techno Images / Die Eletric Plugs on: February 08, 2008, 08:11:52 PM
Die Eletric Plugs





















Source: Die Eletric & tekenstein
48  THE TECHNO CLUB [ TECHNOWORLDINC.COM ] / Ethical Hacking / Security / Viruses / Re: IP Question. on: February 08, 2008, 10:22:39 AM
There is an option for adding a ban on that ip range in the Control Panel of the website..

When an administrator find out that an user had hack on the site and he/she block the user's account.... Does he/she block the account itself or the IP address (usually)?
49  THE TECHNO CLUB [ TECHNOWORLDINC.COM ] / Ethical Hacking / Security / Viruses / Re: IP Question. on: February 07, 2008, 07:48:04 PM
IP is the Internet protocol address which is unique for all networks and computers. Read the article here http://www.technoworldinc.com/technical-terms/what-is-an-ip-address-t207.0.html

Sorry if I sound to naive, but....

1. What exactly is the "IP"? What does it do?
2. How (knowing this) can help me hack someone's computer or install a keylogger?
50  THE TECHNO CLUB [ TECHNOWORLDINC.COM ] / Messengers / Chats / Re: Hidden Emoticons in Yahoo! on: February 07, 2008, 05:10:52 PM
nice emoticons..Smiley
51  THE TECHNO CLUB [ TECHNOWORLDINC.COM ] / Ethical Hacking / Security / Viruses / Re: A Remote Key-logger Question? on: February 07, 2008, 04:37:11 PM
buddy, u'l get the log files in your mail only that only u can access those logs in the log viewer..The e-mail subject will be something like  "Log File on date --" victim will not be able to know about what is happening in his system.
I ask 'cause you know that the emails will show the entire name.... Example: anime.exe
Also, I tried with the Avant Anti-virus and it got detected (after I installed it on my computer to taste it).

I dont think the e-mail matters. i've used it with yahoo mail.
In my case, the email I have is a normal email... Can it be sent to a gmail email? Does it has to look as an ".exe" file?
52  THE TECHNO CLUB [ TECHNOWORLDINC.COM ] / Ethical Hacking / Security / Viruses / Re: A Remote Key-logger Question? on: February 07, 2008, 04:28:59 PM
I dont think the e-mail matters. i've used it with yahoo mail.
In my case, the email I have is a normal email... Can it be sent to a gmail email? Does it has to look as an ".exe" file?
53  THE TECHNO CLUB [ TECHNOWORLDINC.COM ] / Ethical Hacking / Security / Viruses / Re: A Remote Key-logger Question? on: February 07, 2008, 04:27:17 PM
you can only change the icon of the keylog file while the extension of that file will be .exe only. So u can set the music icon to that file so that i looks like a music file.

Ah.... Can it be sent to make it look like it's a picture of a music file?
54  THE TECHNO CLUB [ TECHNOWORLDINC.COM ] / Ethical Hacking / Security / Viruses / Re: A Remote Key-logger Question? on: February 07, 2008, 04:25:22 PM
ScKeylog is not detected by many antiviruses like Norton. I've personally used it with norton and it works fine. I dont know about AT&T Anti-virus. You can probably test it on your own system first then send it to the victim.
Cool, many answers and informations that will help me with my problem...

Hi Vastal.
I downloaded one of the programs that Mark David suggested and I'm wondering...
Just for asking. Is it possible that the program (SC-Keylog Pro)  can get through the AT&T Anti-virus?
I ask 'cause I know that that Anti-virus is pretty strong. And I want to do all that I can to make sure my husband doesn't suspect a thing. (My whole situation is written on the start of this Post.)
55  THE TECHNO CLUB [ TECHNOWORLDINC.COM ] / Ethical Hacking / Security / Viruses / Re: A Remote Key-logger Question? on: February 07, 2008, 02:51:20 PM
You're welcome CRichards..Smiley
56  THE TECHNO CLUB [ TECHNOWORLDINC.COM ] / Ethical Hacking / Security / Viruses / Re: A Remote Key-logger Question? on: February 07, 2008, 02:43:29 PM
Hi CRichards,
you will need to disable the anti virus while using this program as it is based on the trojan horse keylogging mechanism. just disable and use the program to create a key log file and then re-enable your antivirus.

Mark David... I was downloading the trial of the "SC-KeyLog PRO" and both the Windows Defender and my Antivirus warn me not to do it. Why? I mean isn't that mainly a program?

You need to buy the keylogger package which u need to install in your system and it helps creating you a keylog engine file which you can send to the victim by e-mail or messenger. For More Information on features you can read http://www.soft-central.net/keylog.php

How do you do it? Do you install the program you buy in your computer and go from there...?

Yes i've personally used them. While creating the keylog engine, you'll get an uninstaller file too..u just need to run that file on the victims computer to uninstall it. u can even set the time when the program will be uninstalled automatically after a few days.

I like your suggestions. I will check them out too.

Questions:
Have you use any of these keyloggers or any keylogger?
Also, how can someone uninstall a keylogger from his/her computer?


yes after opening, it will be installed automatically.
and its not possible to send the file invisibly.
Pages: 1 2 3 [4] 5 6 7 8 9 ... 24
Copyright © 2006-2023 TechnoWorldInc.com. All Rights Reserved. Privacy Policy | Disclaimer
Page created in 0.087 seconds with 23 queries.