How-To

Ethical Hacking – Part 1

Posted on

Before going into details of how to ethical hacking we should be clear of what it is. What is ethical hacking? An ethical hacking is an attempt to penetrate networks and or computer systems, using the same method as a hacker would use for the purpose of finding and fixing computer security vulnerabilities. Here are […]

How-To

MAC Address Spoofing

Posted on

To change MAC-Address for a Network card in Windows Registry: Click Start – Run, type “regedit” Navigate to [HKEY_LOCAL_MACHINE\SYSTEM\CurrentControlSet\Control\Class\{4D36E972-E325-11CE-BFC1-08002BE10318] HKEY_LOCAL_MACHINE \SYSTEM \CurrentControlSet \Control \Class \{4D36E972-E325-11CE-BFC1-08002BE10318} 3. Under this key, you shoud see numbers in sequence as “0000″, “0001″ and so on. Click on one at a time to check the description of the device to […]