What Is a MAC Address

2 comments
EXPLAIN




The Media Access Control address (MAC address) is a unique identifier assigned to most network adapters or network interface cards (NICs) by the manufacturer for identification, and used in the Media Access Control protocol sublayer. If assigned by the manufacturer, a MAC address usually encodes the manufacturer's registered identification number. It may also be known as an Ethernet Hardware Address (EHA), hardware address, adapter address, or physical address.
They uniquely identify an adapter on a LAN. MAC addresses are 12-digit hexadecimal numbers (48 bits in length). By convention, MAC addresses are usually written in one of the following two formats:
MM:MM:MM:SS:SS:SS
MM-MM-MM-SS-SS-SS
The first half of a MAC address contains the ID number of the adapter manufacturer. These IDs are regulated by an Internet standards body (see sidebar). The second half of a MAC address represents the serial number assigned to the adapter by the manufacturer. In the example,
00:A0:C9:14:C8:29
The prefix 00A0C9 indicates the manufacturer is Intel Corporation.


Why MAC Addresses?
Recall that TCP/IP and other mainstream networking architectures generally adopt the OSI model. In this model, network functionality is subdivided into layers. MAC addresses function at the data link layer (layer 2 in the OSI model). They allow computers to uniquely identify themselves on a network at this relatively low level.
Continue reading →

How to Make Invisible Password Protected Folder

0 comments
Password-protected-folder
Do you want to password protect your folder? Do you want to make it invisible so that it remains unnoticed by the normal users? Well here is a way to do that. In this post I will show you how to make a password protected folder in Windows without using any additional software. Here is is step by step procedure to create a password protected folder.

How to create a Password Protected Folder
Step-1: Create a new folder (Right-click -> New -> Folder) and give it any name of your choice. For instance I name it as ABC.
Step-2: Now in this folder place all the important files, documents or any folders that you want to password protect.
Step-3: Now Right-click on this folder (ABC) and select the option Send To -> Compressed (zipped) Folder.
Step-4: Now a new compressed zipped folder gets created next this folder (ABC) with the same name.
Step-5: Double-click on this compressed zipped folder and you should see your original folder (ABC) here.
Step-6: Now goto the File menu and select the option Add a password.
ie: File -> Add a password
Now a small window will pop up and here you can set your desired password. Once the password is set, the folder will ask for the password every time it is opened. Thus you have now created the password protected folder.

How to make it Invisible
Step-1: Now Right-click on this password protected folder and select Properties.
Step-2: At the bottom select the option Hidden and press OK. Now your folder gets invisible (hidden).
Step-3: In order to unhide this folder go to My Computer – >Tools -> Folder options. Switch to View tab, scroll down and under Hidden files and folders you’ll see the following two options
  • Do not show hidden files and folders
  • Show hidden files and folders
Now select the second option and press OK. Now the invisible folder becomes visible in it’s location. To access it you need the password. To make it invisible again repeat step -1 through step-3 and select the first option and click OK. Now the folder becomes invisible once again.
Continue reading →

Folder Lock Console Edition v6.1.2

0 comments
 Folder Lock Console Edition v6.1.2

The program is designed to password protect folders, files, removable media and USB CD / DVD drives. Files and folders are put in a safe, password-protected and can not be deleted or changed. The program is very easy to use. Once the vehicle is connected to a computer (even if it is not installed Folder Lock), a window with which you will need to enter your password.Encrypt can even entire hard drives, CD / DVD-ROMs and USB-storage. Install the program and the master password file is moved to the window and there also will be zaparoleny and encrypted.

The program is designed to password protect folders, files, removable media and USB CD / DVD drives. Files and folders are put in a safe, password-protected and can not be deleted or changed. The program is very easy to use. Once the vehicle is connected to a computer (even if it is not installed Folder Lock), a window with which you will need to enter your password.
Encrypt can even entire hard drives, CD / DVD-ROMs and USB-storage. Install the program and the master password file is moved to the window and there also will be zaparoleny and encrypted.
Folder Lock allows you to protect certain files and folders in Windows Vista/2003/XP/2000/NT/Me/98/98S, concealing them, and thus makes inaccessible to prying eyes.

The file or folder that can be anything - even if, for example, 50 Gb. To access the hidden data is to start Folder Lock and enter the correct password.
Management of the program is very simple - is supported by the method of drag & drop.



Download from Uploading
or
Download from Hotfile
Continue reading →

How to protect your internet bank account from hacker thieves

0 comments
How to protect your internet bank account from hacker thieves

 http://media.cnbc.com/i/CNBC/Sections/News_And_Analysis/__Story_Inserts/graphics/__MARKET_CONCEPTS/chained_bank.jpg
 
Home PCs which are used for internet surfing and e-mail need to be protected against computer viruses and spy software, experts say. Anti-virus packages are available from computer stores. Anti-spy packages are available off the internet - do a search for "anti-spy software".
Both anti-virus and anti-spyware packages need to be updated weekly, or each time you use e-mail or internet.
Many of the anti-spyware packages will update themselves automatically when you log on to the web. But users of anti-virus software will have to update their package weekly via the software manufacturer's internet website.
Continue reading →

hacking into bank account [only for knowledge]

0 comments
 http://www.usfst.com/media/media-news/news-thumb/090827/hacker.jpg
Hacking into a bank account is frighteningly easy. All one needs is a rudimentary know-ledge of computers, spy software easily downloaded from the internet and a vulnerable PC.
Computer programs that can spy on websites and e-mails are readily available - free of charge - via the worldwide web.
Experts say the hackers who allegedly stole R530 000 by hacking 10 Absa clients' bank accounts could easily have downloaded everything they needed off the internet.
The hackers would have sent e-mails to clients who used Absa's internet banking.
The e-mails would have contained a type of computer virus called a Trojan horse, which downloads automatically as soon as the e-mail is opened or previewed.
Absa forensic investigators have learnt that this Trojan horse contained spy software that was programmed to report back to the hacker, giving away security codes such as passwords, account numbers and PINs.
The hackers then use the passwords and the account holders' home PCs - which are more vulnerable than most banks' computer systems - to access the money.
Johan Reynders, director of software designers ADS, said the hackers could have obtained the e-mail addresses by simply doing an internet search using the last part of the address - @freemail.absa.co.za.
They could even have used spy software which could give them the e-mail addresses of everyone who accessed a bank website.
They could then have sent out a mass mailing which included the Trojan horse, to get the required information.
According to computer network specialist Malcolm Schwegmann, at the last count there were 1 285 spy software servers on the worldwide web.
They might be illegal, but are difficult to police, Schwegmann said. The potential for havoc by spy software hidden in e-mails was enormous.
Spy software was also often transmitted during internet surfing without the computer user noticing it.
The Banking Council said yesterday that the "industry should seek a solution to the problem".
Sapa reports that Absa was to hold talks with its competitors today to discuss internet banking fraud.
The meeting was to take place at Absa's headquarters in Johannesburg at 8am and would last about an hour, Absa group information security officer Richard Peasy said.
Meanwhile, Banking Council spokeswoman Claire Gerbhardt-Mann advised bank customers to install the latest anti-virus applications on their computers, exercise control over shared folders, keep their PIN secret and to never disclose their PIN to anyone, including bank staff.
Schwegmann said that, in addition to anti-virus applications, home PC users should also download anti-spy software programs off the internet.
Both he and Reynders said that anti-virus packages alone were not enough to provide protection.
Absa spokesman Errol Smith said yesterday that there appeared to have been no new internet frauds on their bank accounts overnight, which is when most of the hacking appears to take place.
Bellville police spokesman Superintendent Riaan Pool said the investigation could take a while to complete.
"It's a very difficult and long investigation," he said.
"And we'll just have to wait."
Continue reading →

full version internet download manager (idm)

0 comments




2zjau6v.jpg image by downarchive2 

after installing click on patch file and restart your browser..


DOWNLOAD FROM HERE....
Continue reading →

Vista/XP Virtual Desktops

0 comments
Here are some key features of "Vista XP Virtual Desktops":
· An infinite number of desktops only limited by the amount of memory in your computer
· A full screen desktop/window manager/switcher
· Live Vista thumbnails of all of your windows
· An alpha-blended indicator window to provide a visual indicator when you switch between desktops
· Hotkeys for up to 9 desktops using your numpad keys along with "send window to desktop" hotkeys
· A system tray icon to access a menu containing items for every desktop, no matter how many
· Multiple-monitor support
· Arrow key hotkeys
· One system tray icon per desktop (optional)
· Window-specific menus
· Sticky windows to exclude windows from the virtual desktop manager
· Per-desktop backgrounds
· XP support
· Thumbnail window tool
· Show all windows hotkey
· Show mini-preview at cursor hotkey
source softpedia




Continue reading →

GOOGLE WAVE INVITATIONS

0 comments

google_wave_logo.jpg (300×300)
Google Wave is one of the most exciting technology product of this year that is expected to create ripples over the internet. Google Wave is basically a communication tool that allows collaboration in real time to combine the experiences of email, web, chat, blog, wikis and social networking.
Google today announced that they are sending invitation to 1,00,000 early adopters who are interested in the riding the Wave. If you want to be the one among those to have your hands on with Google, here is what you have to do

1. Sign up for Google Wave Account: Send a request to Google Wave team to get invitation by filling this form. Majority of the invitations sent by Google are from this list, so straight away fill the form to get invitation.
2. Ask Google Wave users to Invite you: Google Wave is following GMail style invitation model to allow new users. So if you know any of your friends who have access to Google Wave access, then ask them to invite you.


LEAVE YOUR EMAILS FOR INVITATIONS...
Continue reading →
Recommend on Google
 
Copyright 2012 | Design by: Nishant Srivastava
About | Contact | Write For Us | Archive