Protect Your Computer From Hackers

How To : Perform Network-Based Attacks with an SBC Implant

With a tiny computer, hackers can see every website you visit, exploit services on the network, and break into your Wi-Fi router's gateway to manipulate sensitive settings. These attacks can be performed from anywhere once the attacker's computer has been connected to the rout ...more

How To : ALL-in-ONE HACKING GUIDE

Hello and welcome to my article. I have made this article for anyone who wants to become a hacker, and wants to know how to get started. OVERVIEW: As you'll get further into the hacking community, and learn more about how it's all put together, you'll also realize very quick ...more

How To : Things to Do on WonderHowTo (03/07 - 03/13)

WonderHowTo is made up of niche communities called Worlds. If you've yet to join one (or create your own), get a taste below of what's going on in the community. Check in every Wednesday for a roundup of new activities and projects. Thanks to all of our active moderators and ...more

How To : Why You Should Study to Be a Hacker

Welcome back, my budding hackers! People often ask me, "Why are you training hackers? Isn't that illegal?" Although I usually give them a short version of this post, there are MANY reasons why YOU should be studying hacking. Before I begin, I want to re-emphasize to all of y ...more

Protect Your Facebook Profile : 10 Ways to Increase Privacy

Don't want one of your Facebook "friends" knowing your status updates? Prefer to keep a few of those "friends" out of your photo albums? Would you like to prevent a few "friends" from accessing your address? The simple answer would be to remove all of those so-called friends— ...more

How To : Protect Your PHP Website from SQL Injection Hacks

As a web developer, I often read articles about hackers (from the lowly to the knowledgeable) infiltrating websites via the dreaded 'SQL Injection' method and completely taking control, changing, gaining access, or destroying the owner's data. As a fellow web developer, I'm su ...more

How To : Disable the firewall in Windows XP

In this how to video, you will learn how to turn off the Windows firewall in Windows XP. This is useful if you would rather use a third party firewall to protect your computer instead. First, go to start menu and click run. Type in firewall.cpl and press okay. The firewall wil ...more

How To : Use SSLStrip to remove encryption from browser

You should encrypt everything. These are what you need: BackTrack 4,0, modify IP tables, Python and ARPspoofing. Program the PC to flip to forwarding mode. Adjust the programming in the IP tables. You are convincing the host and the client that the man (PC) in the middle is th ...more

How To : Snooper-proof your RFID chip loaded wallet

Did you know that malicious people can use scanners to read the Radio Frequency Identification (RFID) chips in your credit cards and identification documents and steal your personal information? Learn to protect your personal information from hackers and scammers with this sim ...more

How To : Protect your PC by disabling Remote Desktop

Remote Desktop is a feature of Microsoft Windows, that allows you to access your PC from anywhere in the world, and use it as if you were sat right in front of it. However, as with most things over theIinternet, Remote Desktop can never be 100% secure, and it is always possib ...more

How To : Use Smart Objects in Adobe Photoshop CS4 & CS5

Learn how to use Smart Objects in Adobe Photoshop and how they protect your pixels when scaling images. Whether you're new to computer graphics, new to Adobe Photoshop CS4 or a seasoned design professional just looking to pick up a few new tips and tricks, you're certain to li ...more

How To : See who is connected to a computer with netstat

Want to see whether your PC is being accessed by hackers? Netstat (network statistics) is a command-line tool that displays network connections (both incoming and outgoing), routing tables, and a number of network interface statistics. It is available on Unix, Unix-like, and W ...more

How To : Turn on parental controls in Mac OS X

If you want to protect your children from seeing something you don't want them to see, and they happen to be using Mac OS X, take a look at this walkthrough on how to set up parental controls on their Mac computer.

How To : Use the Microsoft Windows Firewall

In order to keep your PC safe from annoying or potentially dangerous threats on the Internet, a properly-configured firewall is a crucial item in helping prevent your system from becoming compromised. The Windows Firewall in Windows Vista™ is the first line of defense in helpi ...more

How To : Hunt down hidden malware

Watch this software tutorial video to learn how to use HijackThis to find malware hiding in the alternate data stream. This how-to video will make finding hidden malware easy and help you protect your computer.

How To : Detect viruses and spyware

This video helps you to protect your computer against viruses and spyware often contracted when using peer to peer (p2p) networks like limewire, kazaa and emule.

How To : Protect your Windows PC from malicious spyware

See how to protect your home computer from spyware. This home-computing how-to from the folks at CNET TV will teach you what you'll need to know to do just that. For more information, and to get started protecting your Windows PC and your own privacy, watch this helpful video ...more

How To : Remove viruses, trojans, adware, spyware & more

This video tutorial from ballader1 shows how to remove viruses, trojans, adware, spyware from your computer. To do that you need to download Malwarebytes application from malwarebytes.org. Open your internet browser and enter malwarebytes.org URL address. Make sure you down ...more

How To : Quickly disable the uac option on Windows Vista

To quickly disable the UAC option on Windows Vista operating system on a computer first go to the control panel on your computer. Then go to user accounts, next click on turn user account on or off and you will be prompted to type in your password. Type in your password and pr ...more

How To : Fix your strict NAT on Xbox Live to open

Your home router is automatically programmed to run firewalls to protect your computer from viruses. Unfortunately, these firewalls often mistake programs needed for online gaming as intruders and block them. In this tutorial, learn how to set you NAT settings to "Open" and ta ...more

How To : Disable uac and dep on Windows Vista

This video contains instructions about how to disable or enable the user accounts on Windows Vista. It is very simple; just go to control panel -> user accounts and safety -> user accounts. You can click the check box on or off to disable or enable the user accounts. This can ...more

How To : Keep your diary private

If you're serious about keeping your diary for your eyes only then you might have to take some drastic steps. There are some very clever ways to distract from, encrypt, hide, or disguise a diary if you're willing to put in the work. If you keep a diary, you’re likely to want ...more

How To : Bypass Windows and Linux Passwords

If you're interested in bypassing Windows and Linux passwords, there is a great tool from the good people at Kryptoslogic. Have you ever forgotten your administrator password? Have you ever bought a used computer with a password on it? Well, Kryptoslogic have created a boot-di ...more

How To : Find your open ports in order to close them

In this how to video, you will learn how to keep your Windows operating system secure by look for and closing open ports. First, you will need to run the program called Net State. Once this is open, type in netstat -a. This will list main connections. Next, type in netstat -an ...more

News : unlimited free downloads

this site contain all necessary tools of softwares to protect your pc from virus, to make your computer faster. it has a lot of softwares for free download. so try it!

How To : Password protect your folders on a Mac coomputer

In this tutorial, we learn how to password protect your folders on a Mac computer. First, use the spotlight tool to type in "disk" and then click on disk utility on the drop down menu. From here, go to the save as menu and enter in the name for the volume. After this, change t ...more

How To : Use Windows Defender in Windows 7

This video shows you how to use Window Defender on your computer. Go to the start button on the screen and click it. Next, select the control panel. At this point you can type in the word ‘Defender’ or find the icon in the control panel. Once the Windows Defender page comes up ...more

How To : Secure a home WiFi network

In this video tutorial, viewers learn how to secure a home wireless network. There are 3 types of security protocols for connecting devices. The 3 types of security protocols are: OPEN, WEP and WPA. Users should use passwords that are secure but no so obscure that they are unu ...more

  • Hot
  • Latest