Social Icons

Tuesday, May 22, 2012

Complete Tutorial: How to fix MSCOMCTL.OCX error

[NOTE: THIS TUTORIAL TRIED AND TESTED IN COUNTER STRIKE XTREAM]




1st Download Windows Activator
2nd Extract it in desktop and open it.


FOLLOW MY SCREEN SHOTS FOR MORE INFO; 


Tuesday, May 15, 2012

How to reset the error 5B00 of Printer Cannon iP2770

NOTE: THIS TUTORIAL IS TRIED AND TESTED BY ME.


SEE THE PICTURE BELOW, THAT'S CALLED ERROR 5B00 OF PRINTER CANON iP2700

STEP 1:

STEP 2:
Download here the software: click here



HOPE ALL GETZ AND UNDERSTAND MY SIMPLE TUTORIALS.

Sunday, May 13, 2012

Facebook Password Decryptor Review





"About FacebookPasswordDecryptor"



FacebookPasswordDecryptor is the FREE software to instantly recover stored Facebook account passwords stored by popular web browsers and messengers. Most of the applications store the Login passwords to prevent hassale of entering the password everytime by the user. Often these applications use their own proprietary encryption mechanism to store the login passwords including Facebook account passwords. FacebookPasswordDecryptor automatically crawls through each of these applications and instantly recovers the encrypted Facebook account password.



FacebookPasswordDecryptor presents both GUI interface as well as command line version, the later is more helpful for Penetration testers in their work. Apart from normal users who can use it to recover their lost password, it can come in handy for Forensic officials who can get hold of any stored Facebook Login passwords which can give vital clue in their investigation.



FacebookPasswordDecryptor is fully Portable software which can be directly run anywhere without installing locally. It also comes with Installer for those who wants to install it locally and use it on regular basis. It works on wide range of platforms starting from Windows XP to latest operating system Windows 7.





Features of FacebookPasswordDecryptor

FacebookPasswordDecryptor supports recovering of the stored Facebook account password from most of the popular Internet browsers and messengers. Here is the complete list of supported applications.



* Internet Explorer

* Firefox
* Google Chrome
* Opera Browser
* Apple Safari
* Flock Browser
* Paltalk Messenger
* Miranda Messenger



Here are the highlights of top features of FacebookPasswordDecryptor which makes it stand apart from other similar tools including commercial ones.



* Instantly decrypt and recover stored encrypted Facebook account password from Popular Web browsers and Messengers.



* Comes with both GUI interface as well as Command-line version.



* Support recovering multiple Facebook accounts stored with any of the supported applications.



* Automatically discovers the supported applications from their respective install location and recovers the password instantly.



* Sort feature to arrange the displayed password list by username and password which makes it easy to search through 100's of entries.



* Save the recovered Facebook password list to HTML/TEXT file for transferring to other system or for future use.



* Easier and faster to use with its enhanced user friendly interface.



* Completely Portable Software which also comes with optional Installer for assisting you in local Installation & Uninstallation.





Internals of FacebookPasswordDecryptor

Each of the above mentioned applications use their own encrypted format and storage location to securely store the Facebook account password. FacebookPasswordDecryptor uses different techniques to decrypt these passwords and present them in the clear text.



Here is the research article that throws light on the internal password storage and encryption mechanisms used for storing the Facebook account password by some of the prominent applications. It also shows how to recover Facebook passwords from each of such applications.



'Exposing the Facebook Password Secrets'



Installing FacebookPasswordDecryptor

Though FacebookPasswordDecryptor is a Portable tool, it comes with Installer so that you can install it locally on your system for regular usage. This installer has intuitive wizard (as shown in the screenshot below) which guides you through series of steps in completion of installation. At any point of time you can use Uninstaller to remove the software from the system.




Using FacebookPasswordDecryptor


FacebookPasswordDecryptor is easy to use with its simple GUI interface. 



Here are the brief usage details



Using GUI Version



* Launch FacebookPasswordDecryptor on your system

* Next click on 'Start Recovery' button and all stored Facebook Login passwords from various applications will be recovered & displayed as shown in screenshot 1 below.
* By default passwords are not shown for security reasons as it is sensitive data. However you can click on'Show Password' button at the bottom to view these passwords.
* Finally you can save all recovered password list to TEXT or HTML file by clicking on 'Export to Text' or 'Export to HTML' button respectively.



Note that FacebookPasswordDecryptor recoveres the stored Facebook password for currently logged on user only. If you want to recover the password for different user then you can right click and select 'Run as' to run it as respective user.




Using Command-line Version



Here is the typical usage of command line version



FacebookPasswordDecryptor.exe "<output_file path>"



Here are some of the examples



//Writes recovered password to text file in current directory

FacebookPasswordDecryptor.exe output.txt



//Writes recovered password to HTML file in current directory

FacebookPasswordDecryptor.exe output.html



//Writes recovered password to TEXT file

FacebookPasswordDecryptor.exe "c:\my test\passlist"



It automatically detects the mode (text or html) by using the extension of the specified file (txt or html). By default (or if no extension is specified) it uses the TEXT mode. For more examples refer to Screenshot 2 below.





Screenshots of FacebookPasswordDecryptor



Here are the screenshots of FacebookPasswordDecryptor



Screenshot 1: FacebookPasswordDecryptor showing the recovered Facebook password accounts from various applications. 




Screenshot 2: Command line usage of FacebookPasswordDecryptor showing various examples. 




Screenshot 3: Exported Facebook account password list in HTML format by FacebookPasswordDecryptor. 






HOW TO USE THE FACEBOOK DESCRYPTOR:


[NOTE: THIS SOFTWARE IS NOT FOR HACKING]


Friday, May 11, 2012

Viruses Explained - Everyone must Know

What is a virus, worm, trojan? What is a bot, a botnet, a zombie? All this and more explained by Mary Landesman, your About.com guide to Antivirus.


A Brief History of Malware; The First 25 Years

In January 2011, Brain - the first PC-based malware - turned 25 years old. (It's worth noting that the first computer virus was actually a Mac virus, Elk Cloner, in 1982). Following is a brief history of the first 25 years of malware evolution.

What are Autorun Worms?

Autorun worms are a type of malware that spread by taking advantage of the Windows autorun feature. Autorun allows executable files on a drive to be run automatically when that drive is accessed. The feature works via a file named autorun.inf. When a drive is accessed, Windows checks for the presence of autorun.inf and, if found, follows the...

Man-in-the-Browser Attacks (MitB)

A man-in-the-browser attack is like having a hidden enemy inside your Web browser. This "middleman" malware injects itself into the browser process, intercepting and handling all the back and forth communication between you and the website(s) you try to visit.

What is a Botnet?

A botnet is a collection of infected computers under the control of one or more attackers. These botnets are used for a variety of criminal purposes – all of which pose serious risk to the infected user as well as to the entire Internet community.

Six Most Memorable Antivirus Mistakes

We all make mistakes and software engineers are only human. In antivirus programs, those mistakes can sometimes result in the loss of email and/or the deletion of important system files. Following are the six most memorable antivirus mistakes (all of which have since been fixed).

Virus

A virus infects other files, by injecting the malicious code into the code of the legitimate file.

EICAR Test File

EICAR is not a virus. EICAR is a special file used to test antivirus software. Here's how to make an EICAR file to test your virus protection.

Malware Detection Methods

Malicious software comes in many different forms: viruses, worms, trojans, and advertising-related spyware and adware are the most common categories. But each category is also composed of many different types of threats. For example, within worms there are autorun worms, network worms, Internet worms, email worms, etc. There are equally as many...

What is Whitelisting

Traditional antivirus works via a blacklist approach, identifying known bad files and responding accordingly. The reverse of that approach, whitelisting, identifies all known good items.

What is a Downloader Trojan?

A downloader trojan is similar to a backdoor, but with slightly different purpose.

What is a Rootkit?

A rootkit gives attackers full access to the system (hence the term 'root') and typically hides the files, folders, registry edits, and other components it uses. In addition to hiding itself, a rootkit typically hides other malicious files that it may be bundled with.

Man in the Middle and Redirection Attacks

Man-in-the-middle attacks intercept communications between two points. During the interception, the MITM may record or even modify the communications between the two points.

Debunking Antivirus Conspiracy Theories

It's almost as certain as death and taxes - the 'it' being the constant recycling of the age old conspiracy theory surrounding antivirus vendors.

2006: Year of Targeted Attacks

A look back at the emerging malware threats of 2006

False Negative

A false negative occurs when a virus scanner fails to detect a virus in an infected file.

False Positive

A false positive occurs when a virus scanner erroneously detects a 'virus' in a non-infected file.

What is a Virus Signature?

In the antivirus world, a signature is an algorithm or hash (a number derived from a string of text) that uniquely identifies a specific virus.

How SpyBot Got Its Name

Controversy - real or manufactured - surrounds the name 'spybot'. Here's the history of the term from 1990 to present day use.

What is a Keylogger Trojan?

In its simplest form, a keylogger trojan is malicious, surreptitious software that monitors your keystrokes, logging them to a file and sending them off to remote attackers. Some keyloggers are sold as commercial software - the type a parent might use to record their children's online activities or a suspicious spouse might install to keep tabs on their partner.

What is a virus?

The term 'virus' and its definition may have outlived its prime. In today's hostile computing environment, one would do better to ask, "what is malware?"

What is a Trojan?

A Trojan is a program that appears to be legitimate, but in fact does something malicious.

What is a Boot Sector Virus?

To understand what a boot sector virus is, one must first understand what a boot sector does. This tutorial provides the details.

What is a DDoS Attack?

Trojans are often used to launch Distributed Denial of Service (DDoS) attacks against targeted systems, but just what is a DDoS attack and how are they performed?

What is Pump and Dump?

Ever received one of those emails that pretends to be TO someone else, passing on some hot stock tip they've learned? Referred to as 'pump and dump' scams, the intent of the email is to get lots of people to take advantage of this unexpected windfall of information and buy the stock. Here's how it works.

What is Behavior Blocking?

In its simplest form, behavior blocking monitors file activities, preventing certain modifications to the operating system or related files.

What is a RAT?

RATs, or Remote Access Trojans, provide a "backdoor" into the system through which the unscrupulous hacker can snoop into your system - even running other malicious code if s/he chooses.

What's in a (Virus) Name?

What do the virus names Shockwave, Pro Linux, W32/Prolin@mm, Troj_Shockwave, and Creative have in common? Shockwave, Pro Linux, W32/Prolin@mm, Troj_Shockwave, and Creative are all names of the same virus.

Is your PC a zombie?

In the computer world, a Trojan can be used to turn your PC into their own computing matter - effectively turning it into a zombie machine.

Free online security courses

Whether you need help understanding Windows or want to know what the difference is between a virus and a Trojan - and why it matters - these free online courses can help.

Understanding virus names

Antivirus vendors generally assign virus names consisting of a When attempting to find information about a particular virus, it can be helpful to understand how the virus names are formed.

Introduction to malware

What is a computer virus and how can it impact my system? These are fair questions but unfortunately a great deal of misinformation exists. This multi-lesson tutorial is designed to give you an accurate, broad perspective of malicious code and how to most effectively protect against it.

Antivirus Glossary

From your About.com Guide to Antivirus, a glossary of terms commonly used when discussing malicious code and the antivirus technology used to defend against it.

Browser Hijacking

Often accused of being drive-by downloads, these pesky Internet parasites can quickly take advantage of an improperly secured system. Find out how to protect yourself and which tools remove the pests.

MMORPG Trojans Abound

Trojans used to create botnets have long been implicated in spam and credit card fraud rings. But online games, particulary MMORPGs (Massive Multi-player Online Role Playing Games), are also a frequent target.

SOURCE: CLICK HERE
 

About

www.blogpingtool.com free web page counters

Add to Google Reader or Homepage

Subscribe in Bloglines

blogger widgets Free Backlinks

Pinoy Link Exchange ExactSeek: Relevant Web Search Web Directory www.hypersmash.com

Blogroll

Twitter Widgets Facebook Widgets View Khilven Laudo's profile on LinkedIn

Followers

Blogger news

Page Viewers