Introduction: HACKERS & HACKERS BY SANJEET KAPOOR

Kyrion Ethical Hacking Tutorials

kyrion-hacking-tutorials

Brought to you by Sanjeet Kapoor Hacking Tutorials

Sanjeet Kapoor Ethical Hacking Tutorials is a platform for the Techno-Geeks to exchange their ideas and knowledge in the vast and exciting field of Ethical Hacking and Information Security. You can interact with our reputed Trainers and know interesting facts about them too. We also allow you to post views and information on new-found technologies in this domain that you wish to share with others.

We also bring you a series of Free E-tutorials that would allow you to sit back at home and learn key concepts of Ethical Hacking and Cyber Security.

Kyrion Hacking Tutorials

  • How to Hide a folder without any third party Software

    May 9, 2012

    Step 1 : Rename any folder with extension {645FF040-5081-101B-9F08-00AA002F954E} For eg, If u’ve a folder with name “Anything” press F2, then type, “Anything.{645FF040-5081-101B-9F08-00AA002F954E}” and Press Enter. Step 2 : To get back to its original form, Make a new batch file with any name and [...]
  • Unlock IDEA NET SETTER

    April 25, 2012

    Now a days most of us are using data cards of various companies and one of them is IDEA NETSETTER. Today I’m going to tell, how you can use any other SIM in IDEA NET SETTER and then you can access upto 2mbps via that USB Net setter Netsetter is using a Huawei modem Step 1 : Download UNIVERSAL [...]
  • Lock Desktop Icons

    April 25, 2012

    In this tutorial we’ll see how we can lock our desktop icons so that no one can make any changes to the icons that we have arranged in the desktop. Generally it happens when someone comes to our system and mess up the arrangement. So for that open Registry and go to the following [...]
  • Search Quickly into your System

    April 25, 2012

    In our computer it takes lots of time to search a file or folder, and for that also we have to dig out many folders. So in this tutorial I am going to post this article by which we can save our time while searching for a particular file or folder.  This trick will save the all sub directory and [...]
  • Chakravyuh Online Event Schedule

    April 2, 2012

    Dear Warrior, We express our heartiest gratitude to you for becoming a part of Chakravyuh! Hereby in this email, we would like to update you about the schedule of Chakravyuh. 30th March 2012 1700 Hrs:   Registration Closes 31st March 2012 1900 Hrs:   Chakravyuh Online Event Starts for 60 [...]
  • Cool Keyboard Tricks in Windows 7

    March 26, 2012

    Hello Guys, In this tutorial I am going to tell you Some of the cool tricks of Keyboard button which will help you to work more efficiently and faster. Even you can impress your friends or colleagues by using these shortcuts button.   [Windows] + [D] Show or Hide the desktop [Windows] + [...]
  • Facebook Trick

    March 18, 2012

    Hello Guys, This post of mine is just to make yourself easy with handling your social life. Here I will be telling you various shortcuts for Facebook in Google Chrome & Mozilla Firefox browser. Chrome        Firefox                  Facebook Alt+m           Shift+Alt+m           New Message Alt+0   [...]
  • All Saved Password Location

    March 15, 2012

    Google Chrome: Chrome Passwords are stored in a SQLite file the sites name and sites username is in clear text but the password is seeded in a Triple DES algorithm. The file is called Web Data and is stored in the following location   XP – C:\Documents and Settings\Username\Local [...]
  • Fake Access Point with Airsnarf

    March 12, 2012

    Hello Guys, This is a tutorial of How you can make a Fake access point by using airsnarf in Backtrack. As you know wireless hotspots are everywhere. A mobile user can obtain connectivity quickly and easily in a wide variety of public locations.  Some of these hotspots are free and some of them [...]
  • Wireless Network Hardening

    March 12, 2012

    Hello Guys, This is the tutorial for securing your AP/Routers. Threats to Wi-Fi Implementations Radio waves can penetrate through walls there is a great chance of unauthorized access to the network and data. Because of its broadcasting nature, anybody can sniff the network for valuable credentials. [...]