Question about Microsoft Windows XP Professional With Servise Pack 2 (e8503040) for PC

1 Answer

How to hack the server informations

This is linux software and orcut and every chatting sites are blocked and i want to hack all passwords including orcut.
please help me .i always tried to find it out but its not easy here so
i need the help of all your experts and gurus please reply me .
thankyou

Posted by on

Ad

1 Answer

  • Level 1:

    An expert who has achieved level 1.

  • Contributor
  • 1 Answer

Dude! Your linux box is an firewall which is used to block unwanted websites. You can join a course and learn hacking Linux. None of expert or Gurus available at FixYa will should be able to help you.
If you can access firewall configuration just allow orkut.com and it should work.

Posted on Jun 30, 2009

Ad

1 Suggested Answer

6ya6ya
  • 2 Answers

SOURCE: I have freestanding Series 8 dishwasher. Lately during the filling cycle water hammer is occurring. How can this be resolved

Hi there,
Save hours of searching online or wasting money on unnecessary repairs by talking to a 6YA Expert who can help you resolve this issue over the phone in a minute or two.

Best thing about this new service is that you are never placed on hold and get to talk to real repairmen in the US.

Here's a link to this great service

Good luck!

Posted on Jan 02, 2017

Ad

Add Your Answer

Uploading: 0%

my-video-file.mp4

Complete. Click "Add" to insert your video. Add

×

Loading...
Loading...

Related Questions:

2 Answers

Hotmail pop and smp codes


  • POP server: pop3.live.com
  • POP server port: 995
  • POP SSL required? Yes
  • User name: Your Windows Live ID, for example yourname@hotmail.com
  • Password: The password you usually use to sign in to Hotmail or Windows Live
  • SMTP server: smtp.live.com
  • SMTP server port: 587
  • SMTP Authentication required? Yes (same as POP3 username and password)
  • SMTP TLS required? Yes

Aug 10, 2015 | Google Computers & Internet

Tip

Keeping Your Dedicated Server Safe


Dedicated servers can be an essential element of business growth. All your information is easily accessible to anyone authorized to access and use. There are different<b> operating systems</b> to select, depending on your needs. For example, Windows operating systems are optimized for networking and collaboration, which may be why they are the most popular. But what if the server is attacked? All your information is lost or seriously compromised, which may affect the performance of your business operations. There are many precautions must be taken to try to maintain your dedicated server secure and protected against attacks. Here are some tips to keep your data safe.<br /> <br /> Make sure your software is updated and patches<br /> <br /> If a service is not used, disable it. There is no sense wasting space<br /> <br /> Regularly check the system logs looking for suspicious activity or invalid<br /> <br /> Create a firewall can block the IP for a specified period of time<br /> <br /> Make your passwords and change them every 3 months<br /> <br /> Antivirus consistent schedule [for Windows] and rkhunter [for Linux] controls<br /> <br /> Make regular backups of all data, but do not store the backup server<br /> <br /> Install only certified applications on the server<br /> <br /> Security Alerts Cyber tracking technique should be applied to systems and programs<br /> <br /> Use all the other hardware used to access the server and everything, which develops applications for servers<br /> <br />

on Feb 07, 2011 | Computers & Internet

Tip

An Overview of E-Mail Hacking


<span> <b><span>HOW CAN I HACK HOTMAIL/GMAIL/YAHOO/FACEBOOK<br />so today i thought to write an tute on it.exclusively<br />Here is the "CORRECT" answer,but<br />FIRST OF ALL I'm merely disappointed by the number of technically illiterate people around the world. The most popular question in any hacking related site is "How to hack e-mail" its not tolerated in any security/hacking related topics and if asked you can expect to get a rant from people. the reason is simple because there are NO ways of hacking a e-mail address by easy means and the people who know this fact often get very annoyed when most people don't understand WHY its NOT POSSIBLE !<br /><br />The hacking of a e-mail is possible when a person who owns the account gets hacked. the other way is to hack them directly from the e-mail servers which is most unlikely because these sites use sophisticated Intrusion Detection and highly skilled consultants who are up to date with exploits and patch's. unless you are a real professional hacker its highly unlikely you will ever break into a e-mail server.<br />People MUST understand that there are NO PROGRAMS/SOFTWARE'S that can hack a e-mail password when you enter an e-mail address. to understand this better let me explain you how e-mail works<br />Lets say you have a gmail account<br />When you enter your username and password and hit login what happens is your outgoing e-mail server encrypts the login information and sends over the network to its destination which is a gmail server which can ONLY decrypt the encrypted credentials then these were checked against its database and if they match it will re direct you to your mail inbox. to authenticate you with the gmail server, it will send you a cookie ( a text file ) with a session ID to your browser confirming that you are authenticated so the gmail server.<br />So there was a time when e-mail servers gave the option to NOT to use SSL cause it slows down the e-mail. because of the time it takes to encrypt. it was a "happy time" for the hackers who simply used a wifi hotspot to sniff session ID and break into emails !!! why ? because If anyone sniffs your session ID he can use it to login into you mail WITHOUT the password because the session ID is the proof of authentication as I mentioned earlier ^ but with almost all the e-mail servers NOW use a SSL encryption and the Session ID is also encrypted so by sniffing its NOT possible to decrypt the ID !<br /><br />So there goes Packet Sniffing You may ask so what ? why the encryption cannot be cracked ? Because The encryption uses Hypertext Transfer Protocol over Secure Socket Layer and public/Private key encryptions technique which is almost impossible to crack. Do some Research on these terms and you will know why its not possible to crack/<br />Because we can't hack the password from the servers but we can hack it from the people who use it..<br /><br />There are only 3 ways to hack an account.. here are they</span><span>,<br /><br />1.Phishing 2.Keylogging 3.Social Engineering.</span><span>i will describe the methods to carry out these attacks(ethically) only if i found plenty number of requests on this forum!</span></b> <b><span>Note:The tutorial has been exclusively written by Hacking Airtel Member,but we have writtn this tute only for an educational demo,Hacking Airtel shall not be liable to what You do with this!</span><br /></b></span>

on Jan 08, 2011 | Computers & Internet

4 Answers

A good facebook hacking software


*********** testing of your website sceurity audit(s) DATABASE RETRIEVAL, HACKING OF WEBSITES & Hacking Accounts which include FACEBOOK,TWITTER this is pretty easy,MYSPACE,SKYPE, OVO .and email accounts such YAHOO,AOL ,HOTMAIL ,GMX,GMAIL AND OTHER EMAIL SERVICES BOTH PRIVATE AND GENERAL i send you a SCREENSHOT.I require either a Name, Friend ID, or E-mail address of the targets account(s)i can also get into BLACKBERRY AND APPLE SMARTPHONES AND OTHER SMART PHONES AND GET VALUABLE DATA. I ALSO SELL SMTP ,LEADS ,PHONE VERIFIED ACCOUNTS (CRAIGLIST,FACEBOOK,EMAILS,) ICAN POST ON CRIAGLIST) I ALSO SELL PAYPALL ACCOUNT, WESTERN UNION PAYOUT INFORMATION I have the help of a current 0-Day Exploit that allows me to gain remote access to the website servers and from there I find the password which is usually in an MD5 hash, from that I must decrypt to get the real password. The entire process takes about 10 minutes-15 hourS to complete. All passwords are tested out 3 times before they get issued to any clients.I also rip Standards from websites.I accept payment through LR (Liberty Reserve) Only.I hardly ever USE WESTERN UNION!

Apr 20, 2012 | Community Hacker

1 Answer

My account on ebay has been hacked into what do i do?


Hi
The best thing that you can do is to report it.
How to Report a Stolen eBay Account

If you suspect unauthorized use of your account on eBay, the worldwide auction website, you must take steps to report it immediately. Secure your account by logging in and changing your password; also change any security questions you may have assigned to your account. If it is not possible to log into your account, it is all the more imperative to contact eBay to report the theft of your account. If you share your eBay account details with anyone else, such as family members, make sure they are not responsible for the suspicious activity before proceeding
Instructions
1 Compile whatever facts you have regarding the reasons you suspect your eBay account has been stolen or hacked. Organize them in chronological order. Write them down; the writing process may help to reveal additional details.
2 Go to eBay's Security Live Chat page. Provide the requested information, which includes your eBay user ID and basic personal contact information. Note that it is possible to use this feature even if you are not currently able to access your account.
3 Click the "send" button and wait for a live eBay security chat professional to assist you. Note that wait time may be significant, depending on eBay's security workload.
4 Provide any pertinent information that eBay security requests. Note that per eBay security, no one will ever ask you for credit card numbers, your social security number, site password, or other sensitive information via chat. Do not supply such information if, for some reason, you are asked for it.


Tips & Warnings

-Be vigilant about emails you receive and websites you visit. Always make sure that correspondence from eBay is genuine, and does not lead you to any websites that spoof or phish (resemble, but are fraudulent) the eBay site. For more information, consult eBay's help page on recognizing spoof websites.
-Check the email account you have attached to your eBay account. Make sure to change the password to your email account if it is the same as your compromised eBay password.

-Consider downloading the eBay Toolbar. One of its security features is Account Guard, which automatically monitors whether websites you visit that claim to be eBay are legitimate. It also allows you to monitor all of your buying and selling activities from the convenienceof a button in your web browser.
-Never provide extremely sensitive personal information to any websites that claim to be official eBay sites. In addition to not asking for social security numbers or credit card numbers in their security chat, eBay does not ask for such information on any of its websites, at any time.

Dec 19, 2011 | Apple iPod touch

1 Answer

Can i use linux as server software


Yes definitely, linux is mainly used as a server these days.
You can find much more information regarding Linux on Dell machines on the following web site: http://domsch.com/linux/
Hope it helps.

Dec 18, 2011 | Dell PowerEdge 2600 Server

2 Answers

How to hack a facebook password?


IMPORTANT NOTES: THE FOLLOWING DETAILS ARE FOR TRAINING TO PROVIDE RESOURCEFUL COMPUTER NETWORKING EXPERINCES LEAST CONTRIBUTORY TO AN ALTERNATIVE FUTIVE INTENSION.

Hacking into face book requires to be an initiator of the site. First, create the website called face book to be made available for several persons. Least informing the members about the intent to requesting details either usually known as social networks. Usually websites that are recognized as popular would have structure hosts. Mentionable examples are network administrators that make details aware to members about the ongoing conditions. Network administrators that makes the website continues to exist as the resources require to host either expertise or design technicalities are concerned. Websites also require technical experts that restores the conditions that occurs as the networked structures are established to become popularly tasked by several entities either human or devices of computers and peripherals. Internetworking sites have several entities of experts depending on the type of resources provided either as commercial, educational, social or personal sites. The magnitude of resources provided to include the numbers of members makes the web site require several experts to keep operational. Hosting websites requires several resources to make possible. Mentionable examples are the computer structures that are either situation ally located at an address or mobile. Each entity of device computers has address numbers that recognize as operational entities with purpose descriptions of functionalities. Establishing a website requires having the computer devices to the barest minimum a computer, network devices of modems routers, as hardware requirements. The complement to computer devices is program making possible instable displays to achieve user, professional or education experiences. Once the computer structures of hardwires, software's, structures have achieved regular functionality makes available several possible experiences among which hacking is mentioned. Hacking is very technical to describe or explain. First, the entity that makes available advertised recognition as hacker from which request are made to resolve computer device conditions that occur elsewhere becomes thought as computer technician. In which instance, solving missing passwords, usernames or retrieving details on computer from establishments that contract the entities expertise is mentionable means to make expertise functional. The contract entity requesting hacker's expertise usually least requests hacking as resource, the request to always to resolve an issue in which instance allows for expert technician to display skills? Face book hackers are web designers would make the pages display least informing the subscriber about intentions. Regular functional websites requires ascertaining the detail intents, to be verified to resourceful provision either where the administrators that make the space available are contactable. For example, websites that have contact details may least disclose the intent to members however provides mission statements malign acquirable alternate persons should least be thought as hackers sites. Once the members to site recognize the provider entities either as providing resources within expectation also with details that makes tangible as an entity with responsible establishment entities means hacking situations are unanticipated.


Additional notes

Hacking is very technical to explain. Usually, the persons that acquire resources are the only recognizers to hacking incidences. For example, hacking into devices that least becomes recognized may not dispense such a message. Hacking situations are explainable. First the condition where the hackers have retrieved details that belong as personal details. Attempting to retrieve forget ton passwords to personal accounts may be possible with means known as hacking to another person since the default entry is not resorted. Second, the situation where the hackers have to acquire resources least reckonable by the owner. Resources would usually display on networks for example least known to persons until disappearance. Conditions of such nature least makes available recognition of hacking unless personal resources become disintegrable. Third the situation that hacking is suspected without any resources missing. Occasionally message goes around of hacking taking place making person's causation. In such situations, missing details appears hacked until proven unpacked. All three categories of hacking are technical to explain depending on whose side made the hacking. The network sites administrator has contact details either email, phone or chat to quest for recent conditions or concerns. Inform the network sites experts of the condition either in person since computer device surfing is technical.

Feb 07, 2011 | Computers & Internet

2 Answers

Un block blocked web sites my space facebook and any blocked web sites on a government computer


Total Internet Privacy and the TIP Tunnel offer complete Private Internet Browsing,Private Internet Service, Anonymous Surfing, Anonymous Internet, web surfing through the webs best most secure and private web tunnel, with free private internet browsing tools. TIP is a complete encrypted VPN solution for private internet communications.
Tiptunnel is designed for individuals accessing the Internet from insecure Internet connections, such as wireless, or from countries with restrictive Internet filtering systems.
Anonymous Internet surfing by default simply doesn't happen but it is possible. The most basic way of protecting your identity is to use an anonymous VPN to hide your IP address when you are surfing. Your communications can still be intercepted as the majority of that web traffic is in the clear but it's less likely unless someone is deliberately targeting you, the main benefit is that your IP address is not left in the logs of the web servers and your web browsing will remain more private.
provides a secure, obscured VPN tunnel between your computer and our secure servers located in Asia or the US and the Europe.
TIP Tunnel Enterprise package includes:

* Anonymous surfing
* IP Address Obscurity, your real IP address is hidden
* Bypass Internet filtering by your ISP
* All traffic is 100% encrypted with AES 256 bit encryption
* Immune to packet sniffing, attacks and popups
* Real-time virus protection
* Real-time spam filtering
* Guaranteed 100% privacy with no logs
* Supported platforms include Windows, Linux and Mac
* Multiple server access worldwide
* Professional 24/7 Technical Support
http://tiptunnel.com

Jan 06, 2010 | Computer Associates Full Version ...

3 Answers

What programming language can i use in linux


you can use c,c++ by default no need to install the extra software like in windows ..

LINUX comes with the softwares just like office suite,programming tools,web designing tools,etc and drivers inbuilt in it ...
so once you install the LINUX you will be having almost all the required softwares inbuilt in it including music player,video player,etc

if you want you can install the extra softwares too but the softwares use in windows doesnt work with linux you must download the separate software for linux ....

linux is best in security wise because no virus will attack to LINUX as the viruses are very less developed as there are scarcity in users of linux and there is no chance of hacking the password in linux like in windows this is because of the greater security used in the linux ....

linux stores the password by making use of shadowing .. so upto this time nobody is unable to hack the password ...


Aug 19, 2008 | Microsoft Windows Server Standard 2003 for...

Not finding what you are looking for?
Microsoft Windows XP Professional With Servise Pack 2 (e8503040) for PC Logo

Related Topics:

90 people viewed this question

Ask a Question

Usually answered in minutes!

Top Microsoft Computers & Internet Experts

micky dee

Level 3 Expert

3008 Answers

Les Dickinson
Les Dickinson

Level 3 Expert

18424 Answers

Alun Cox

Level 3 Expert

2678 Answers

Are you a Microsoft Computer and Internet Expert? Answer questions, earn points and help others

Answer questions

Manuals & User Guides

Loading...