Sitemap ^ RSS

Who Is Avinash Yalamanchili                                 

Avinash Yalamanchili is a 23 years old Independent Security Consultant and has definitive experience in the field of computers and Training Industry. He also wrote a book called “Decoded Hacks” in April 2007 and designed the distance learning course on “Ethical Hacking”, which have been appreciated by both students and professionals. Since then he has been part of many entrepreneurial ventures for capturing the market in training and knowledge based solutions by conducting Workshops and Seminars. He is also the founder of Anti Hackers League(AHL) http://www.antihackersleague.com, who works against the Crackers and un Ethica Hackers for the security purposes.
                                                                                                                              Read More

JACLYN Opearating System


                                     

Minimum system requirements
  • To run the Desktop CD (LiveCD + Install CD), you need 128 MB RAM to run or 192 MB RAM to install. The Alternate Install CD only requires you to have 64 MB RAM.
  • To install Jaclyn, you need 1 GB of free space on your hard disk.
  • Once installed, Jaclyn can run with 64 MB RAM, but it is strongly recommended to have at least 128 MB RAM.
Ship It

Unfortunately, unlike the other derivatives, Jaclyn does not yet have free cds available for shipping due to lack of funding.

Upgrading

Please make sure to backup your data before attempting an upgrade.

                                                                                                                               Read More


Making Hacking and Anti Hacking Tools Book(shortly)

   
         

Avinash fourth coming book is on Making Hacking and Anti Hacking tools.As Hacking isn't what it use to be in the days when networks were breached by young hackers sitting in their bedrooms late at night trying out their newly learned skill from a BBS board. Today's hacking is carried out by preprogrammed viruses that, self propagate themselves around the world and trying every computer port and over-flow that will have them. Finding the right tools for you and your company can be an endless search on the Internet that can produce the results of software from no name companies with no proven record. Software sales people will boast that their software is the best on the market, but you can't trust a sales person to tell you the truth. So you must either rely on your own research tools.


12 Ways to Protect Yourself from Identity Theft


  1. Change your passwords frequently and do not use the same user name and password for multiple websites.
  2. Changing some of the letters to numbers in a password makes it virtually impossible for someone to get into, and it remains easy to remember. ex: code becomes c0d3.
  3. Before you put your username and password into a website go to AMIHACKERPROOF.com
  4. Never open up a PDF file in an e-mail unless you are expecting to receive it and know where it came from.
  5. Do not use the CC line of an e-mail to send a message to multiple recipients. Instead, use the BC line.
  6. Do not auto-connect to open wireless networks such as a free wireless hotspot or your neighbour's router exposes your computer to security risks and attacks.
  7. Do not forward e-mails or sms that say "If you love God, please forward to 10 people and send it back to the person who sent it to you." God does not communicate via e-mail or sms.
  8. Don't put all of your personal information and photos on Facebook, Google+, Orkut, Myspace, or Twitter. Statuses that say you are leaving town for vacation or planning to do some thing, can be a bad idea too
  9. Install some true anti-spyware on your machine, and do not rely on anti-virus software alone.
  10. Never use ATM that appears unusual looking or offers options with which you are not familiar or comfortable. Do not allow people to look over your shoulder as you enter your PIN. Memorize your PIN; never write it on the back of your card. Do not re-enter your PIN if the ATM takes your card (contact a bank officials).
  11. Make a record of your Electronic Serial Number (ESN) and/or your International Mobile Equipment Identity (IMEI) number. You can find out your IMEI number by pressing *#06# on your mobile phone's keypad, it will display a 15 digit number - that is your IMEI number. Apart from this use power-on password for your mobile, off bluebooth when your not using, stop downloading untrusted apps and change your voicemail pin.
  12. Your mouse will not begin squeaking like a real mouse if you are being hacked and your keyboard will not begin typing by itself. If pictures appear on the Internet that you know nobody else had access to or things begin showing up on your credit report you should investigate.