Every IT professional worth his/her salt has their own webpage/blog these days. While you may have people from all over the globe dropping a line at your site, Email harvesters are the most unwanted visitors on any website. These email spambots crawl the web via search engines to find and extract email addresses from webpages. […]
Continue ReadingCategory: Security
How to detect a Rootkit on your machine
A root kit is a collection of programs that intruders often install after they have compromised the root account of a system. These programs will help the intruders clean up their tracks, as well as provide access back into the system. Root kits will sometimes leave processes running so that the intruder can come back […]
Continue ReadingHow to use Unix/Linux commands at the Windows command prompt
A lot of us who use Linux at work/school or have always grown up using unix commands for years and more often than not, there might have been instances where a ls command comes more naturally than the dir command at the command prompt in Windows. For the most part, a lot of us work […]
Continue ReadingWhat a Paypal phishing email looks like and how to detect it
In computing, phishing is a criminal activity using social engineering techniques. Phishers attempt to fraudulently acquire sensitive information, such as passwords and credit card details, by masquerading as a trustworthy person or business in an electronic communication. Phishing is typically carried out using email or an instant message, although phone contact has been used as […]
Continue ReadingUsing DOMJAX for Domain Name Search
CNN writes that more than 70 million web domain names have been purchased, and most – if not all – dictionary-word domain names (i.e. house.com, furniture.com) have already been taken. That should not disappoint you since millions of good web domain names are still available, all that’s required is a bit of creative thinking, some […]
Continue Reading