![](https://blogger.googleusercontent.com/img/b/R29vZ2xl/AVvXsEhcA_OSKcYAwhymA4e38qYeOvxabnL_iFKRTGKdwHJaxYUs8EpFmNZmKG-MZ9LnocNlnpHWuSscjFSku-G6ix8sCnpvduDzJ5BrEk-FKgEiplBdHHIqVxrN2UNbC2pDJeWJDQBbLkHCtdyS/s320/1245.jpg)
Make it strong for Security
At the RSA Conference, which is ongoing, Zscaler's Michael Sutton has provided further evidence that many embedded web servers (EWS) can be easily accessed by outsiders via the internet.
Watching a movie or TV show on your mobile phone may be convenient, but it is not necessarily safe.
.
Mobile security firm Lookout is warning Android users in Europe about a slew of apps that showed up on the Android Market in the last week that are not what they appear to be.
The queen of hacker commands is telnet.Telnet is a remote logging command which inbuild with command prompt in Windows Operating System.
For use Telnet,first open the command prompt.For this press Windows Key+R Key you see RUN platform open,here write ‘cmd’ and press OK.Command prompt will be open.Here type
C:\hrde>telnet/?
Here’s what you will get:
telnet [-a][-e escape char][-f log file][-l user][-t term][host
[port]]
-a Attempt automatic logon. Same as -l option except uses
the currently logged on user's name.
-e Escape character to enter telnet client prompt.
-f File name for client side logging
-l Specifies the user name to log in with on the remote system.
Requires that the remote system support the TELNET ENVIRON
option.
-t Specifies terminal type.
Supported term types are vt100, vt52, ansi and vtnt only.
host Specifies the hostname or IP address of the remote computer
to connect to.
port Specifies a port number or service name.
For Newbie: what is a port on a computer? A computer port is sort of like a seaport. It's where things can go in and/or out of a computer.
Telnet is a remote logging command so it is use for log into a remote computer.
Every day people complaining they can't telnet. That is usually because they try to telnet into a computer, or a port on a computer that is set up to refuse telnet connections. Here's what it might look like when a computer refuses a telnet connection:
C:\hrde >telnet 10.0.0.3
Connecting To 10.0.0.3...Could not open connection to the host, on port 23. A connection attempt failed because the connected party did not properly respond after a period of time, or established connection failed because connected host has failed to respond.
Or you also see:
C:\hrde >telnet techbroker.com
Connecting To techbroker.com...Could not open connection to the host, on port 23.
No connection could be made because the target machine actively
refused it.
If you just give the telnet command without giving a port number, it
will automatically try to connect on port 23, which sometimes runs a
telnet server.
So firstly found the IP address of the Victim and use ‘Port Tracer’ tool for trace the open Port on victim System.Many tool are available on internet you got it by search on Google Uncle.
After that run according to shown below…
C:\hrde>telnet ip-address port-number
And press ENTER key.
If telnet failed to connect, possibly the computer you were trying to
telnet into was down or just plain no longer in existence. Maybe the
people who run that computer don't want you to telnet into it.
Do you suspect that your child or employee is inappropriately using your unreachable computer? If yes, then this software is ideal for you. No physical access to the remote PC is needed to install the spy software. Once installed it records chat conversations, web sites and more.
This software remotely installs to your computer through email. Unlike the other remote spyware titles on the market, Sniper Spy fully and completely bypasses the Windows XP Firewall.
The program then records user activities and sends the data to your online control panel. You login to your control panel to view spy results using your own password-protected account.
For get trial click here
For get free click here
The eBook is pretty exhaustive and the topics covered include: