How to detect a Rootkit on your machine

A root kit is a collection of programs that intruders often install after they have compromised the root account of a system. These programs will help the intruders clean up their tracks, as well as provide access back into the system. Root kits will sometimes leave processes running so that the intruder can come back […]

Continue Reading

What a Paypal phishing email looks like and how to detect it

In computing, phishing is a criminal activity using social engineering techniques. Phishers attempt to fraudulently acquire sensitive information, such as passwords and credit card details, by masquerading as a trustworthy person or business in an electronic communication. Phishing is typically carried out using email or an instant message, although phone contact has been used as […]

Continue Reading

Using DOMJAX for Domain Name Search

CNN writes that more than 70 million web domain names have been purchased, and most – if not all – dictionary-word domain names (i.e. house.com, furniture.com) have already been taken. That should not disappoint you since millions of good web domain names are still available, all that’s required is a bit of creative thinking, some […]

Continue Reading