Latest Entries »

How File Deletion Works?

When you delete a file from your computer the file is not actually deleted. The file is not permanantly deleted or dropped from your hard disk. Suppose from a book containing 50 pages, when you delete the page 25, assume that only the entry in the index which points to the page 25 is deleted and not actually the page 25 itself. Likewise when you delete a file from your hard disk, only the pointer which points to this file is removed and not actually the file itself. This file still exists intact and is 100% possible to recover it back in the original condition. In this condition the file becomes invisible and hence appears to have deleted.

Recovering The Deleted Files?

To recover the deleted files all you need to do is perform a scan for the deleted files using a File Recovery Software.

The Phoenix Data Recovery software performs a thorough scanning of the hard disk sector by sector and will locate the existence of deleted files to restore them back in the original condition. It is the only software that supports 185 popular file types including Windows NT Registry, JPEG, MP4, GIF, BMP and MS Word files. The software offers rich graphical support and incorporates advanced scanning methods to completely scan and recover deleted files from your hard drive. With this you can

Synergy is a program that will let you use one keyboard and mouse on multiple computers across a network. The computers can be running Linux, Windows, or MacOS. The computer with the keyboard and mouse is the server or host, and the computers with the displays to be controlled remotely are the clients. In this tutorial I will let you know how to get Synergy setup and running on your Ubuntu system.

On the left-hand monitor I have a Windows XP system running. On the right-hand monitor I run Ubuntu. If I move my mouse off my Windows XP monitor to the right, it shows up on the Ubuntu monitor and vice-versa. Plus cut-and-paste works between the machines as well.

Here’s how to configure Synergy with two computers. Let’s assume that you have two home machines called “windowspc” and “ubuntu”. We’ll put the Windows machine on the left and the Ubuntu machine on the right. One of the two machines will run as the Synergy server and the other will run as a Synergy client. I picked the Ubuntu machine to be the server.

This book is a practical guide to discovering and exploiting security flaws in web applications. The authors explain each category of vulnerability using real-world examples, screen shots and code extracts. The book is extremely practical in focus, and describes in detail the steps involved in detecting and exploiting each kind of security weakness found within a variety of applications such as online banking, e-commerce and other web applications.

The topics covered include bypassing login mechanisms, injecting code, exploiting logic flaws and compromising other users. Because every web application is different, attacking them entails bringing to bear various general principles, techniques and experience in an imaginative way. The most successful hackers go beyond this, and find ways to automate their bespoke attacks. This handbook describes a proven methodology that combines the virtues of human intelligence and computerized brute force, often with devastating results.

The authors are professional penetration testers who have been involved in web application security for nearly a decade. They have presented training courses at the Black Hat security conferences throughout the world. Under the alias “PortSwigger”, Dafydd developed the popular Burp Suite of web application hack tools.

Here’s the resource you need if you want to apply today’s most powerful data mining techniques to meet real business challenges. Data Mining: Concepts and Techniques equips you with a sound understanding of data mining principles and teaches you proven methods for knowledge discovery in large corporate databases.
Written expressly for database practitioners and professionals, this book begins with a conceptual introduction designed to get you up to speed. This is followed by a comprehensive and state-of-the-art coverage of data mining concepts and techniques. Each chapter functions as a stand-alone guide to a critical topic, presenting proven algorithms and sound implementations ready to be used directly or with strategic modification against live data. Wherever possible, the authors raise and answer questions of utility, feasibility, optimization, and scalability, keeping your eye on the issues that will affect your project’s results and your overall success.