1 Imagine ur cell battery is very low, u r expecting an important call and u don't have a charger.
Nokia instrument comes with a reserve battery. To activate, key is "*3370#"
Ur cell will restart with this reserve and ur instrument will show a 50% incerase in battery.
This reserve will get charged when u charge ur cell next time.
*3370# Activate Enhanced Full Rate Codec (EFR)-Your phone uses the best sound quality but talk time is reduced by approx. 5%#3370# Deactivate Enhanced Full Rate Codec( EFR...
Top 10 Tricks to exploit SQL Server Systems
Whether it is through manual poking and prodding or the use of security testing tools, malicious attackers employ a variety of tricks to break into SQL Server systems, both inside and outside your firewall. It stands to reason then, if the hackers are doing it, you need to carry the same attacks to test the security strength of your systems. Here are 10 hacker tricks to gain access and violate systems running SQL Server.
1. Direct connections via the Internet
These connections can be used to attach to SQL Servers sitting naked without firewall protection for the entire world to see (and access). DShield's Port Report shows just how many systems are sitting out there waiting to be attacked. I don't understand the logic behind making a critical server like this directly accessible from the...
13 Awesome, Must Try Notepad Tricks
In on of my previous post, i shared notepad trick allowing the user to test Anti-Virus just clicking a file created using notepad ! In this post, however i have decided to compile the entire list of notepad tricks instead of writing separate posts for each one of them. Here goes the top 10 notepad tricks .1.This App Can BreakThis is one of the most popular notepad tricks because of its mysterious nature. In order to get an idea as to what this trick does, just follow the steps given below:· Open Notepad.· Type “this app can break” (without quotes).· Save that file with any name and close it.· ...
Top 10 Windows Built-In Command Line Tools
For many Windows users, the thought of using the Command Prompt is either a scary experience or something that they will never need. But for some, the command prompt is a powerful tool that can be far more useful than many graphical tools available in Windows.
Being a System Administrator, I constantly use the command prompt, mostly because I access systems remotely and many tasks can be performed quickly with out the graphics over head (even though connecting via Terminal Server is very convenien...
JSKY - Free Vulnerability Scanner
With hordes of vulnerability scanners and frameworks launching everyday (mostly commercial) Jsky makes an impressive attempt to set itself apart by keeping it free and keeping it real by packaging everything in a small package. Don't be fooled by its small size, it packs quite a punch when compared to other professional packages considering its release version.Good vulnerability scanner ? check ! Web backdoor and SQL Injection? Check ! Directory traversal,sensitive directory and file scan? check ! Jsky is quite promising in its features..Jsky packs powerful web spider and multi-threaded scanner which crawls hundreds...
Microsoft Visual Studio 2008 Professional Edition
Professional Edition was engineered to support development projects that target the Web (including ASP.NET AJAX), Windows Vista, Windows Server 2008, The 2007 Microsoft Office system, SQL Server 2008, and Windows Mobile devices. The number of platforms that developers must target to meet business needs is increasing rapidly. Visual Studio 2008 Professional Edition provides the integrated toolset for addressing all of these needs by providing a superset of the functionality available in Visual Studio 2008 Standard ...
Basics of Javascript Injection
JavaScript is a widely used technology within websites and web based applications. JavaScript can be used for all sorts of useful things and functions. But along with this comes some additional security issues that need to be thought of and tested for. JavaScript can be used not only for good purposes, but also for malicious purposes.JavaScript injection is a nifty little technique that allows you to alter a sites contents without actually leaving the site.This can be very usefull when say, you need to spoof the server by editing some form options.JavaScript injection is a fun technique that allows you to change a websites content without leaving the site, reloading the page, or saving the site to your desktop. It can be very useful when you need to change hidden data before...
A website tells u if your computer ports are hacked or not
Normal 0 false false false EN-US X-NONE X-NONE
/* Style Definitions */
table.MsoNormalTable
{mso-style-name:"Table Normal";
mso-tstyle-rowband-size:0;
mso-tstyle-colband-size:0;
mso-style-noshow:yes;
mso-style-priority:99;
mso-style-qformat:yes;
mso-style-parent:"";
mso-padding-alt:0in...