Showing posts with label knowledgebase. Show all posts
Showing posts with label knowledgebase. Show all posts
Friday, November 30, 2018
Wednesday, October 5, 2016
Windows Registry Tips
A small tweak which disables processing of autorun.inf to protect your PC from usb autorun viruses.
Windows Registry Tips
Remove Language Bar from Taskbar
[-HKEY_CLASSES_ROOT\CLSID\{540D8A8B-1C3F-4E32-8132-530F6A502090}]
@="Language bar"
"MenuTextPUI"="@%SystemRoot%\\System32\\msutb.dll,-325"
Allow Internet Explorer 7+ to open direct links to swf files (XP/Vista/7)
[HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Internet Explorer\Main\FeatureControl\FEATURE_BLOCK_LMZ_SCRIPT]
"iexplore.exe"=dword:00000000
Disable the Turn off computer button on the Welcome screen (XP/Vista/7)
[HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System]
"shutdownwithoutlogon"=dword:00000000
Disable USB Autorun to Save PC from USB Viruses (XP/Vista/7)
[HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Windows NT\CurrentVersion\IniFileMapping\Autorun.inf]
@="@SYS:DoesNotExist"
Disable Writing to USB Drives (XP/Vista/7)
[HKEY_LOCAL_MACHINE\SYSTEM\CurrentControlSet\Control\StorageDevicePolicies]
"WriteProtect"=dword:00000001
Enable Writing to USB Drives (XP/Vista/7)
[HKEY_LOCAL_MACHINE\SYSTEM\CurrentControlSet\Control\StorageDevicePolicies]
"WriteProtect"=dword:00000000
Note: Modifying the registry can cause serious problems that may require you to reinstall your operating system. Use the information provided at your own risk.
Windows Registry Tips
Remove Language Bar from Taskbar
[-HKEY_CLASSES_ROOT\CLSID\{540D8A8B-1C3F-4E32-8132-530F6A502090}]
@="Language bar"
"MenuTextPUI"="@%SystemRoot%\\System32\\msutb.dll,-325"
Allow Internet Explorer 7+ to open direct links to swf files (XP/Vista/7)
[HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Internet Explorer\Main\FeatureControl\FEATURE_BLOCK_LMZ_SCRIPT]
"iexplore.exe"=dword:00000000
Disable the Turn off computer button on the Welcome screen (XP/Vista/7)
[HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System]
"shutdownwithoutlogon"=dword:00000000
Disable USB Autorun to Save PC from USB Viruses (XP/Vista/7)
[HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Windows NT\CurrentVersion\IniFileMapping\Autorun.inf]
@="@SYS:DoesNotExist"
Disable Writing to USB Drives (XP/Vista/7)
[HKEY_LOCAL_MACHINE\SYSTEM\CurrentControlSet\Control\StorageDevicePolicies]
"WriteProtect"=dword:00000001
Enable Writing to USB Drives (XP/Vista/7)
[HKEY_LOCAL_MACHINE\SYSTEM\CurrentControlSet\Control\StorageDevicePolicies]
"WriteProtect"=dword:00000000
Note: Modifying the registry can cause serious problems that may require you to reinstall your operating system. Use the information provided at your own risk.
Tuesday, June 7, 2016
Which programing languages are useful for hacking
Important Programming languages for Hackers
Many of our readers often send us queries about which programming language they should learn. Some want to know quick fix hacking solutions. Almost all tech gadgets are built with coding. Every App, game or site that you use is programmed in a particular computer language. You need to know that hacking is not a click-of-a-button job but a serialized and compartmentalized vocation which uses different programming languages for different uses.
Most of the websites out there will give you list of most popular programming languages in the world. We at Techworm try to make it more easy for budding security researchers and hackers by breaking up the programming languages used by hackers.
Hacking is usually meant to break a code. There are three sections of hacking ― Web Hacking, Exploit Writing & Reverse Engineering and each of it requires different programming language
1. Web Hacking
Since most of the tech is build around world wide web, it is important to learn web hacking to be a good hacker. Let’s say you are interested in hacking web apps and/or websites then you will need to learn web coding. Websites use mostly HTML, PHP and JavaScript so it is important to learn these three.
HTML:
One of the easiest and widely used static markup web language present in each and every website you see in your browser. It’s recommended to learn HTML because it helps understanding web actions, response, and logic.
JavaScript:
JS is a client-side web programming mostly used in web sites for better user interface and quick response. If you are interested in a hacking career you need to learn JavaScript because it helps to understand client-side mechanism which is essential for finding client-side flaws.
PHP:
A dynamic server-side language which is responsible for managing web-apps and database. PHP is considered one of the most essential language because it controls everything on site and server, like a captain of a ship. It is advised to learn PHP nicely.
SQL:
SQL is responsible for storing and managing sensitive and confidential data such as user credentials, bank and personal information about the website visitors. Black hat hackers mostly target SQL database and steal information which is later sold on underground dark web forum. If you want to be good security researcher, you should learn SQL so that you can find flaws in a website and report them.
2. Exploit Writing
After web hacking, another most important feature of hacking is exploits. You can crack a particular software by writing a exploit. But to write a exploit you need to learn either Python or Ruby.
Python:
It is said that a security researcher or hacker should know Python because it the core language for creating exploits and tools. Security experts and even pro hackers suggest that master Python is the best way to learn hacking. Python offers wider flexibility and you can create exploits only if you are good in Python.
Ruby:
Ruby is a simple yet complicated object-oriented language. Ruby is very useful when it comes to exploit writing. It is used for meterpreter scripting by hackers. The most famous hacker tool, Metasploit framework is programmed in Ruby. Though Ruby may not be as versatile as Python, knowledge of Ruby is must in understanding exploits.
3. Reverse Engineering
Reverse engineering, the process of taking a software program’s binary code and recreating it so as to trace it back to the original source code. If you know reverse engineering you can find flaws and bugs easily. If you want to learn reverse engineering you need to know C, C++ and Java. The process of converting the code written in high level language into a low level language without changing the original program is known as reverse engineering.
Do you think any other programming language is essential for wannabe hackers and security researchers? if yes then please comment below.
Reference:
Many of our readers often send us queries about which programming language they should learn. Some want to know quick fix hacking solutions. Almost all tech gadgets are built with coding. Every App, game or site that you use is programmed in a particular computer language. You need to know that hacking is not a click-of-a-button job but a serialized and compartmentalized vocation which uses different programming languages for different uses.
Most of the websites out there will give you list of most popular programming languages in the world. We at Techworm try to make it more easy for budding security researchers and hackers by breaking up the programming languages used by hackers.
Hacking is usually meant to break a code. There are three sections of hacking ― Web Hacking, Exploit Writing & Reverse Engineering and each of it requires different programming language
1. Web Hacking
Since most of the tech is build around world wide web, it is important to learn web hacking to be a good hacker. Let’s say you are interested in hacking web apps and/or websites then you will need to learn web coding. Websites use mostly HTML, PHP and JavaScript so it is important to learn these three.
HTML:
One of the easiest and widely used static markup web language present in each and every website you see in your browser. It’s recommended to learn HTML because it helps understanding web actions, response, and logic.
JavaScript:
JS is a client-side web programming mostly used in web sites for better user interface and quick response. If you are interested in a hacking career you need to learn JavaScript because it helps to understand client-side mechanism which is essential for finding client-side flaws.
PHP:
A dynamic server-side language which is responsible for managing web-apps and database. PHP is considered one of the most essential language because it controls everything on site and server, like a captain of a ship. It is advised to learn PHP nicely.
SQL:
SQL is responsible for storing and managing sensitive and confidential data such as user credentials, bank and personal information about the website visitors. Black hat hackers mostly target SQL database and steal information which is later sold on underground dark web forum. If you want to be good security researcher, you should learn SQL so that you can find flaws in a website and report them.
2. Exploit Writing
After web hacking, another most important feature of hacking is exploits. You can crack a particular software by writing a exploit. But to write a exploit you need to learn either Python or Ruby.
Python:
It is said that a security researcher or hacker should know Python because it the core language for creating exploits and tools. Security experts and even pro hackers suggest that master Python is the best way to learn hacking. Python offers wider flexibility and you can create exploits only if you are good in Python.
Ruby:
Ruby is a simple yet complicated object-oriented language. Ruby is very useful when it comes to exploit writing. It is used for meterpreter scripting by hackers. The most famous hacker tool, Metasploit framework is programmed in Ruby. Though Ruby may not be as versatile as Python, knowledge of Ruby is must in understanding exploits.
3. Reverse Engineering
Reverse engineering, the process of taking a software program’s binary code and recreating it so as to trace it back to the original source code. If you know reverse engineering you can find flaws and bugs easily. If you want to learn reverse engineering you need to know C, C++ and Java. The process of converting the code written in high level language into a low level language without changing the original program is known as reverse engineering.
Do you think any other programming language is essential for wannabe hackers and security researchers? if yes then please comment below.
Reference:
Monday, January 18, 2016
How To Repair A Corrupted SD Card or USB Flash Drive
How To Repair A Corrupted SD Card or USB Flash Drive
Steps are as follow:
1) Go to command prompt using "RUN" window
2) Type "DiskPart" on the prompt (This will change command prompt to "DISKPART>"
3) list disk (This will show all storage disk list
4) Make your USD drive selected using "Select Disk 1" command (Note: disk 0 is your primary hard drive)
5) Type "Clean" to cleaning the disk
6) After cleaning you need to create a primary partition, Type "Create Partition Primary"
7) Activate newly created partition, Type "Active"
8) Type "Select Partition 1" to get this partition format
9) Type "Format fs=fat32".
That's it, you are done now. Once disk is fully formatted you are ready to use your USB/SD card.
Thursday, December 31, 2015
Technical skills you must know !!
In today's evolving world, it is crucial to stay up-to-date about latest industry developments and trends. Skills that were crucial for a role five years ago are obsolete today. In the intervening period, skill set requirements have developed and evolved. With businesses increasingly relying on the latest technologies and adopting innovative solutions, professionals who keep re-skilling themselves move ahead in their careers.
With 2016 a week away, Simplilearn has identified a list of must-have tech skills for professionals that will gain momentum in 2016
Technical Skills
Coding:
Coding is an important tech skill to possess in the Information Age. Whether it's very rudimentary understanding of HTML or in-depth knowledge of application development such as Java; having skills in coding is better than having none at all.Big Data:
With the arrival of the Internet of Things and the mounds of data being collected, understanding the science behind big data has become essential. Knowing how to handle the data and what to do with it is important. Right from apps to refrigerators, everything would be bound in an IoT-enabled ecosystem, and attaining skills in the Big Data domain can come in handy.Cloud computing:
More and more organizations are adopting cloud-based solutions, and it's quickly becoming the new norm. Thus, possessing skills in cloud computing will give candidates the upper hand.Data visualization:
Data is being produced at an astonishingly high-rate on mobile applications and websites. Presenting this data in visual form so as to deliver actionable insights is a skill that is going to be in high demand for the foreseeable future.Digital Marketing
Digital marketing seems to be one of the most sought after skills in 2015 and promises to offer exceptional career growth in 2016 as well. With the affordability factor and its wide reach, Digital marketing has been consistently gaining momentum across all the verticals. The benefit of applying digital marketing is the transparency it provides through instant and measurable outcomes for businesses and individuals.Web Development:
It is vital to possess the ability to develop for the web and work with technologies such as PHP, AJAX, HTML5, Python, CSS, and Java.Mobile Development:
With over 200 billion mobile app downloads expected by 2017, the revenue from apps is expected to rise to over $64 billion by 2017. As a result, the need for skilled mobile specialists who can optimize websites for mobile-viewing and develop mobile applications has seen a steep rise.In addition to the most sought after tech skills for 2016, professional certifications are set to dominate the professional learning landscape. Some of the recommended tech certifications are TOGAF- certified Enterprise Architects will remain among the highest-paid professionals in industry, making over $124,000 on average compared to their non-certified peers.
Scrum Master:
According to payscale.com, a CSM® professional has a median salary of $112,000 a year. Also, a Certified ScrumMaster® earns 3% more than a ScrumMaster.CISSP:
IT professionals with the CISSP certification tend to earn $21,000 more compared to IT professionals without CISSP certification.PMP:
According to PMI, Project Management is among the top skillsets in demand by organizations across the globe. It is estimated that one-fifth of the world's total GDP-which is nearly 12 trillion-is spent on projects. This creates a huge demand for knowledgeable and skilled project managers. The median salary for a PMP is $109,405.ITIL:
According to Indeed.com, the average salary of an ITIL® certified professional is $95,000.Data Scientist:
The median salary for a data scientist is about $95,000 per annum.Digital Marketing Certification: The certification is a stamp of approval for domain knowledge in the field of online marketing. This enhances the job prospects of individuals enabling them to gain entry in various Fortune 500 and E commerce companies like Amazon and Ebay. A survey conducted on Moz.org reported that the global average salary of online marketers is $65,766 and entry-level salaries start at around $35,000. The average salary for online marketers in the United States is $86,253.
CEH:
According to Payscale.com, a Certified Ethical Hacker draws an average annual salary of $68,314.The Bottom Line
Technology seems to be a change agent for transforming various aspects of life. Learning continuously will be the most effective medium of gaining knowledge.
Corporate appreciate employees who are willing to learn and lead the way ahead. Gone are those days where professionals stay with an organization for more than a decade. Even in one company, one cannot expect to stay on with the same skill sets for more than a couple of years. Improvisation has been the buzz word among corporate. Today's world seem to value knowledge over experience. Certification is the only desired way to gather knowledge and prove ones efficiency.
(The article has been contributed by www.simplilearn.com)
Subscribe to:
Posts (Atom)