The Show Desktop Icon is not a standard program shortcut but a Windows explorer command file written in plain text.If you have accidently deleted the Show Desktop Icons, here are the steps involved to recreate it:Step 1: Open a new notepad file and type the following text: [Shell] Command=2 IconFile=explorer.exe,3 [Taskbar] Command=ToggleDesktop Step 2: Save […]
Continue ReadingMonth: January 2007
What a Paypal phishing email looks like and how to detect it
In computing, phishing is a criminal activity using social engineering techniques. Phishers attempt to fraudulently acquire sensitive information, such as passwords and credit card details, by masquerading as a trustworthy person or business in an electronic communication. Phishing is typically carried out using email or an instant message, although phone contact has been used as […]
Continue ReadingHow to hide your email address from spammers, a thorough guide
Every IT professional worth his/her salt has their own webpage/blog these days. While you may have people from all over the globe dropping a line at your site, Email harvesters are the most unwanted visitors on any website. These email spambots crawl the web via search engines to find and extract email addresses from webpages. […]
Continue ReadingHow to detect a Rootkit on your machine
A root kit is a collection of programs that intruders often install after they have compromised the root account of a system. These programs will help the intruders clean up their tracks, as well as provide access back into the system. Root kits will sometimes leave processes running so that the intruder can come back […]
Continue ReadingHow to develop ShellCode, a crucial point of any exploit software
It’s not an easy task to find a vulnerable service and find an exploit for it. It’s also not easy to defend against users who might want to exploit your system, if you are a system administrator. However, writing an exploit by yourself, to convert a news line from bug tracker into a working lockpick, […]
Continue Reading