IT BLOG

Making Work easy And Simple

Modes of Ethical Hacking

For conducting a security evaluation, several modes are there. An ethical hacker may attempt to perform an attack over various channels such as: Remote Network This mode attempts to simulate an intruder launch an attack over the internet. The primary defenses that must be defeated here are...

READ MORE

How to Install Java - Java Programming

How to install Java Once we decide to write a program in java, we need to first set an environment for running the java program. For setting the environment, we need to perform the following steps : Download the latest version of JDK and Install...

READ MORE

Introduction About Java - Java Programming

Introduction Of Java Language Java is a simple programming language. The design aim of java was to create a general-purpose programming language. Since its inception, its popularity is increasing day by day. So, it would not be wrong to say that Java is the most popular programming...

READ MORE

What Motivates a hacker?

An action or event that might prejudice security. Sequence of circumstances and events that allows a human or other agent to cause an information-related misfortune by exploiting vulnerability in an IT product. A threat can be either intentional an individual cracker or a criminal organization or...

READ MORE

what is Ethical Hacking?

In this ethical hacking tutorial , I will cover brief introduction about ethical hacking. Hacker refers to a person who enjoys learning the details of computer systems and stretches their capabilities. Hacking describes the rapid development of new programs or the reverse engineering of...

READ MORE

Backup Up the Data Using Windows Backup

Windows Backup allows for creating a duplicate copy of the files and folder on the hard disk and then archiving them to an external storage device If the original hard disk data is erased accidentally or if the hard disk becomes inaccessible, then the user can restore the archived copy of...

READ MORE

Backup and Archiving - Theory Concepts

Backing up data is essential to the survival and continuation of integral operations. Anyone in the support field who has spent an entire weeknight restoring a server can attest to this. The archive bit is a file attribute that signifies to the system if and when a file has been modified. This...

READ MORE

How To Break Password Of Windows Server 2016 With Active Directory And Without Active Directory

In this post you will learn, how to recover password of windows server 2016. This tutorial will help you to break password of windows server 2016 with active directory and without active directory. Recover Windows Server 2016 Password Using Installation Disk 1.) Boot windows server 2016 dvd....

READ MORE

Hacking Terminologies And Computer Security

In this blog i will explain about essential terminologies and computer security in a very easy way. Essential Terminologies => 1.) Threat :- An action that has the potential to compromise security 2.) Exploit :- A way to breach the security of an IT system by finding vulnerability. 3.)...

READ MORE

Find serial number of your computer using windows

This blog will show you how we can find serial number from our computer using windows. Step 1 :- open command prompt Step 2 :- Type the command :- WMIC BIOS GET SERIALNUMBER , then press enter. Note:- if your serial number is coded into your bios it will appear on the cmd's screen.

READ MORE