systemtipsntricks.blogspot.com
Tips N Tricks: Free-IQTest.net
http://systemtipsntricks.blogspot.com/2008/11/free-iqtestnet.html
Friday, November 21, 2008. Free-IQTest.net - IQ Test. Posted by Khadime ALI's Den. Subscribe to: Post Comments (Atom). Learn From The Links. Windows Server 2008 Facts. Var googleSearchIframeName = cse-search-resul. Var googleSearchIframeName = cse-search-resul. Simple Person.Meet me.and Tell. View my complete profile.
cmdtricksbuild.blogspot.com
System Tips And Tricks For Learning Purpose
http://cmdtricksbuild.blogspot.com/2011/08/rootkit-rootkit-is-software-system-that.html
System Tips And Tricks For Learning Purpose. Friday, August 5, 2011. Rootkit.TDSS is a rogue rootkit application that has the backdoor ability to permit an attacker to gain remote unauthorized access. Rootkit.TDSS conceals its presence in the user’s computer system which makes it unable to be detected by security software and applications. Rootkit.TDSS is a serious threat that could result in identity theft and financial loss. How To Remove Rootkit.TDSS. Remove the "Rootkit.TDSS". Trojan.Win32.Ro...HKEY ...
cmdtricksbuild.blogspot.com
System Tips And Tricks For Learning Purpose: November 2010
http://cmdtricksbuild.blogspot.com/2010_11_01_archive.html
System Tips And Tricks For Learning Purpose. Thursday, November 18, 2010. Find out what your Windows Hotfixes do. Every now and then my Windows XP automatically updates. Usually these are to plug holes in the system (as you know, Windows XP is a work in progress). But what exactly do all those hotfixes do? Well, I discovered a way to find out. First, you need to go to your Control Panel, Add/Remove Programs. Next, scroll down toward the bottom and you will see "Windows XP Hotfix.". Win XP Pro Tips. Learn...
cmdtricksbuild.blogspot.com
System Tips And Tricks For Learning Purpose: August 2011
http://cmdtricksbuild.blogspot.com/2011_08_01_archive.html
System Tips And Tricks For Learning Purpose. Wednesday, August 31, 2011. What's a QR code? A QR code (Quick Response Code) is a specific matrix barcode (or two-dimensional code) that is machine readable and designed to be read by smartphones. The code consists of black modules arranged in a square pattern on a white background. The information encoded may be text, a URL, or other data. In fact, it's their ability to hold significantly more information, as well as their user-friendliness which makes QR co...
cmdtricksbuild.blogspot.com
System Tips And Tricks For Learning Purpose: Google pulls out malicious apps from Android Market
http://cmdtricksbuild.blogspot.com/2011/08/google-pulls-out-malicious-apps-from.html
System Tips And Tricks For Learning Purpose. Saturday, August 20, 2011. Google pulls out malicious apps from Android Market. Google has removed at least 10 applications from its Android Market. That remote server returns a URL pointing to an executable file for the device to download. Once downloaded, the jar file is dynamically loaded. In this way, the payload evades static analysis and is difficult to detect. Analysis of the payload shows that the virus does not provide root exploits, but supports a nu...
cmdtricksbuild.blogspot.com
System Tips And Tricks For Learning Purpose: FDIC notification malware attack spammed out | Naked Security
http://cmdtricksbuild.blogspot.com/2011/08/fdic-notification-malware-attack.html
System Tips And Tricks For Learning Purpose. Tuesday, August 30, 2011. FDIC notification malware attack spammed out Naked Security. FDIC notification malware attack spammed out Naked Security. Subscribe to: Post Comments (Atom). There was an error in this gadget. Helping Tips For Your Systems And Servers. Command Line For Win Xp And Vista. File Extension Problem Solution. Link For Windows Software. Short Commands For Applications. This is the site where will you get all the other links of my website.
cmdtricksbuild.blogspot.com
System Tips And Tricks For Learning Purpose: July 2009
http://cmdtricksbuild.blogspot.com/2009_07_01_archive.html
System Tips And Tricks For Learning Purpose. Thursday, July 16, 2009. Services Used By Malware. A common misconception when working on removing malware from a computer is that the only place an infection will start from is in one of the entries enumerated by HijackThis. For the most part these entries are the most common, but it is not always the case. Lately there are more infections installing a part of themselves as a service. Some examples are Ssearch.biz and Home Search Assistant. When a service is ...
cmdtricksbuild.blogspot.com
System Tips And Tricks For Learning Purpose: May 2009
http://cmdtricksbuild.blogspot.com/2009_05_01_archive.html
System Tips And Tricks For Learning Purpose. Sunday, May 31, 2009. How to install and use the Recovery Console in Windows XP. How to install and use the Recovery Console in Windows XP. How to install the Recovery Console. Although you can run the Recovery Console by starting directly from the Windows XP CD, it is generally more convenient to set it up as a startup option on your startup menu. To run the Recover Console directly from the CD, see the "How to use the Recovery Console" section. 3 In the Open...
cmdtricksbuild.blogspot.com
System Tips And Tricks For Learning Purpose: First malware using Android Gingerbreak root exploit
http://cmdtricksbuild.blogspot.com/2011/08/first-malware-using-android-gingerbreak.html
System Tips And Tricks For Learning Purpose. Thursday, August 25, 2011. First malware using Android Gingerbreak root exploit. It did not take too long to find out about the discovery of Gingermaster. The first Android malware to use the Gingerbreak exploit. To acquire a sample which was still available from a Chinese alternative Android Marketplace. The package downloaded uses the following permissions:. Android.permission.READ PHONE STATE. Android.permission.READ LOGS. The malware purports to be an appl...
cmdtricksbuild.blogspot.com
System Tips And Tricks For Learning Purpose: March 2009
http://cmdtricksbuild.blogspot.com/2009_03_01_archive.html
System Tips And Tricks For Learning Purpose. Thursday, March 12, 2009. Trojan Ports Used By Intruders. TCP 1 Breach.2001, SocketsDeTroie.230, SocketsDeTroie.250. TCP 28 Amanda.200. TCP 31 MastersParadise.920. TCP 68 Subseven.100. TCP 142 NetTaxi.180. TCP 146 Infector.141, Intruder.100, Intruder.100. TCP 171 ATrojan.200. TCP 285 WCTrojan.100. TCP 286 WCTrojan.100. TCP 334 Backage.310. TCP 370 NeuroticKat.120, NeuroticKat.130. TCP 413 Coma.109. TCP 420 Breach.450. TCP 623 Rtb666.160. TCP 680 Rtb666.160.