Remote Administration Tools/Trojans |
|
Showing posts with label bypass-firewall. Show all posts
Showing posts with label bypass-firewall. Show all posts
List-of-remote-Administration-Tools/Trojans
Unblocking download limits with MAC spoofing.
Every computer has various network interfaces on it like
Ethernet card, Wireless card and other that allow it to communicate with the
other computer on the internet. Each network interface on every computer on the
internet has a unique MAC address or media Access control address. MAC
addresses are defined by the manufacturer of the computer at the time of
manufacturing. Different network interfaces on the same computer will usually
have a different unique MAC addresses. It is possible to view the MAC addresses
of your own machine by going to the MS DOS prompt and typing the command getmac
–V:
how to unblock access to use ports
Unblocking access to use ports
Many system administrators block USB ports and do not allow
users to use their personal USB pen
drive on college or company computers. This can be quite annoying if you want
to copy files back and forth or want to run applications from your pen drive.
One of the most common techniques of blocking a pen drive is through the
windows registry by following the below steps:
what is tails operating system
The tails operating system
The tails operating system (http://tails.boum.org)
is available as a free download on the internet and has been specifically
designed keeping security in mind. It is an OS that can run from a bootable live CD or pen drive and gives a
user absolute anonymity on the internet. Not only does it protect your privacy
on the internet, it can also be used to bypass restrictions that may have
implemented by your local system administrator. Tails uses tor to provide users
with secure encrypted anonymous access to the internet. It has various in built
encryption capabilities which allow user to use encryption to store files, send
instant message, do email and browser the internet. It is possible to install
tails OS on a bootable CD instead of a pen drive, but I
personally prefer using tail on a pen drive in such a manner that the pen drive
is bootable is slightly complicated for newbie's and described in detail below:
The onion router (tor)
Tor stands for the onion router
Tor stands for the
onion router and is free of charge software that is one of the best
anonymity (obscurity), privacy and unblocking tools existing on the internet.
Tor has thousands of volunteer relay servers in different parts of the world
through which a user’s data is routed and completely anonymous. Not only does
it defend your freedom on the internet by allowing you to access all your
favorite websites on the internet, it keeps all your communications in the
internet completely secure. It can be downloaded free off cost from https://www.torproject.org.
Archived pages
Archived pages
The cache pages and links on search engines give the most
recent cached version of webpage. However, sometimes you may want to access an
even older version of the same webpage for research purposed or just out of
curiosity.oif you want to see what a webpage looked like several years ago,
then there is a very cool tool called the WAYBACKMACHINE that is available for
free at www.archive.org. Since the year
1996, archive.org has been spidering the internet with the intention of
creating a permanent digital library of the internet for researches, historians
and the general public. This is a fantastic tool that allows you to search for
and view an old archived version of popu8lar WebPages on the internet from
several months or even years back!
Subscribe to:
Posts (Atom)