This is default featured post 1 title

Go to Blogger edit html and find these sentences.Now replace these sentences with your own descriptions.

Saturday, 25 February 2012

How Does Secure Sockets Layer (SSL) Works?.

Secure Sockets Layer (SSL) is the most widely used technology for providing a secure communication between the web client and the web server. Most of us are familiar with many sites such as Gmail, Yahoo etc. using https protocol in their login pages. When we see this, we may wonder what’s the difference between http and https. In simple words HTTP protocol is used for standard communication between the Web server and the client. HTTPS is used for a SECURE...

How To Get a Serial key or Crack of Any Software!.

 Once Again i am back with a worth article for my ICA members, This time i am going to explain you that how you can "Find Serial Key / Cracks for Any Software !".I assume that most of you use pirated software. Not everyone can afford buying a program like Photoshop, which costs $699. In this case you can use alternative, free software or you can download a pirated, cracked version of the program. There is a vast number of websites out there, where you can find serial numbers and...

Friday, 24 February 2012

What is BOT?.

BOT is a malicious program with the purpose of fraudulent use of computer. Once your computer is infected with BOT, the malicious attacker (referred to "attacker" hereinafter) remotely controls your computer from the external. This attack causes serious harm of making public nuisance such as "sending numerous number of mails" and "attacking a particular website", as well as of stealing information stored in your computer, i.e., "spying activities. As this external control...

Tuesday, 21 February 2012

How Does Intrusion Detection System(IDS) Works?.

What is an IDS? A system that tries to identify attempts to hack or break into a computer system or to misuse it. IDSs may monitor packets passing over the network, monitor system files, monitor log files, or set up deception systems that attempt to trap hackers.¹ With that being said you get the basic idea. While a firewall should always be your first line of defense, an IDS should be next. I use a simple analogy. Think of your network as a prison. The outside is protected by a large...

what's happening in A Minute on the internet !.

hello guys, do you know what's happening on internet in every minute  ? so according to Shanghai Web Designers what's happening in A Minute on the internet : world's most popular Search engine Google serves more than 694,445 queries ! 168,000,000+ emails are sent 370,000+ minutes of voice calls done by Skype users 320 new accounts and 98,000 + tweets on twitter Popular web browser FireFox is downloaded more than 1700 times iPhone applications are downloaded more than13,000...

FBI shutdown rogue DNS servers on 8th March! .

FAQ : DNSChanger Trojan, Impact and Solutions Two days before (THN) Reported that FBI will shutdown Internet on 8th March, Title seems to be more Attention seeking , Why ? Well ! Our job is to aware you about the Internet Security. If we are looking for some extra attention from our Readers then its part of our small effort to make Internet more secure space for all. Today we are going to Explain all about DNSChanger Trojan, its Impact on Internet users and the biggest challenge for FBI to...

Friday, 17 February 2012

Tenable Release Nessus 5.0 vulnerability scanner .

Tenable Network Security announced Nessus 5.0 vulnerability and configuration assessment solution for enterprises and security professionals. Nessus version 5.0 introduces key features and improvements, separated into the four major phases of the vulnerability scanning process:  Installation and management (for enhanced usability) - Nessus 5.0 simplifies the installation and configuration for non-technical users. Configuration and management: Nessus v5.0 configuration and...

10 unique but intresting linux distro.

Linux has more flavors than (Mountain Dew + Gatorade)*Baskin Robbins. Of course, some of those distributions are far more valuable than others. But besides the Ubuntus, Fedoras, Linux Mints, PCLinuxOSes, and OpenSuSEs, which versions are actually worth your time? Believe it or not, worthy Linux distributions are not limited to the big guns. There are plenty of obscure distributions worth looking at. Here are a few lesser-known Linux distributions that could have a positive effect on your...