جميع المواضيع
Affichage des articles dont le libellé est programme. Afficher tous les articles
Affichage des articles dont le libellé est programme. Afficher tous les articles

mercredi 4 février 2015

دعني اوضح لك الامر ، عندما تقوم بفحص الجهاز مع بداية التشغيل وقبل الدخول الي الويندوز يكون للبرنامج صلاحيات كاملة ويستطيع تنظيف ملفات النظام او ازالتها ولكن ماذا والويندوز يعمل؟ بالتأكيد لا يمكن حذف او تنظيف ملفات تعمل بالفعل! ، هذا هو الامر تحديداً أن تنظيف جهازك وفحصه مع بداية التشغيل يكون فعال 100% علي عكس تنظيفه وفحصه والويندوز يعمل بالفعل. وقمنا باستعراض برامج الحماية من الفيروسات بنسخ ISO وايضاً موضوع 3 اقراص انقاذ وموضوع اخر حول برنامج افاست وخاصية الفحص اثناء الاقلاع وقبل الدخول الي الويندوز. واليوم لدينا طريقة اخري عبر برنامج Windows Defender من مايكروسوفت وهو برنامج الحماية حيث توفر مايكروسوفت نسخة اخري من البرنامج لحرقها علي فلاش ميموري او سيدي او ديفيدي واستخدامها مباشرة والاقلاع اليها لفحص الجهاز وتنظيفه من البرمجيات الخبيثة.





المزيد»



from عالم الكمبيوتر http://ift.tt/16nXsD2

حرق برنامج مايكروسوفت Windows Defender علي فلاش ميموري لازالة الفيروسات

دعني اوضح لك الامر ، عندما تقوم بفحص الجهاز مع بداية التشغيل وقبل الدخول الي الويندوز يكون للبرنامج صلاحيات كاملة ويستطيع تنظيف ملفات النظام او ازالتها ولكن ماذا والويندوز يعمل؟ بالتأكيد لا يمكن حذف او تنظيف ملفات تعمل بالفعل! ، هذا هو الامر تحديداً أن تنظيف جهازك وفحصه مع بداية التشغيل يكون فعال 100% علي عكس تنظيفه وفحصه والويندوز يعمل بالفعل. وقمنا باستعراض برامج الحماية من الفيروسات بنسخ ISO وايضاً موضوع 3 اقراص انقاذ وموضوع اخر حول برنامج افاست وخاصية الفحص اثناء الاقلاع وقبل الدخول الي الويندوز. واليوم لدينا طريقة اخري عبر برنامج Windows Defender من مايكروسوفت وهو برنامج الحماية حيث توفر مايكروسوفت نسخة اخري من البرنامج لحرقها علي فلاش ميموري او سيدي او ديفيدي واستخدامها مباشرة والاقلاع اليها لفحص الجهاز وتنظيفه من البرمجيات الخبيثة.





المزيد»



from عالم الكمبيوتر http://ift.tt/16nXsD2

نشر في : 08:54 |  من طرف Unknown

mardi 3 février 2015

جوجل درايف وهي خدمة مميزة جداً من جوجل للتخزين السحابي اونلاين. وقد قمنا من قبل باستعراض خدمات التخزين السحابي اونلاين عبر استعراض افضل 5 خدمات من شركات مميزة بمساحات مختلفة للتخزين السحابي ولكن جوجل درايف اكبر من أن يكون مجرد خدمة تخزين لملفاتك اونلاين بحساب يمكنك الوصول اليه من اي جهاز كمبيوتر. فهناك امكانية التحكم وقراءة والتعديل علي الملفات النصية مباشرة اونلاين عبر خدمة Google Docs التابعة لجوجل ايضاً. وهناك الكثير من الخواص والامكانيات التي يمكنك القيام بها لملفات الـ PDF عبر جوجل درايف مباشرة وهذا ما سنقوم باستعراضه من خلال سطور هذا الموضوع.





المزيد»



from عالم الكمبيوتر http://ift.tt/1AoYhbX

4 اشياء مميزة يمكنك أن تفعلها بملفات الـ PDF المخزنة علي Google Drive

جوجل درايف وهي خدمة مميزة جداً من جوجل للتخزين السحابي اونلاين. وقد قمنا من قبل باستعراض خدمات التخزين السحابي اونلاين عبر استعراض افضل 5 خدمات من شركات مميزة بمساحات مختلفة للتخزين السحابي ولكن جوجل درايف اكبر من أن يكون مجرد خدمة تخزين لملفاتك اونلاين بحساب يمكنك الوصول اليه من اي جهاز كمبيوتر. فهناك امكانية التحكم وقراءة والتعديل علي الملفات النصية مباشرة اونلاين عبر خدمة Google Docs التابعة لجوجل ايضاً. وهناك الكثير من الخواص والامكانيات التي يمكنك القيام بها لملفات الـ PDF عبر جوجل درايف مباشرة وهذا ما سنقوم باستعراضه من خلال سطور هذا الموضوع.





المزيد»



from عالم الكمبيوتر http://ift.tt/1AoYhbX

نشر في : 10:54 |  من طرف Unknown

السلام
  

 عليكم ورحمة الله تعالى وبركاته حدة الموضوع متعلق بالأشخاص ألدين يعانون من مشكل في الكارت ميموارأو ما تسمى أيضا ببطاقة الداكرةوأغلب الأشخاص تتلف لهم بطاقة الداكرة ويرمونها هدا خطاء كبير يرتكبونهاليوم أتيتكم ببرنامج يصلح بطاقة الداكرة المتلفةما عليكم سوى تحميل البرنامج وهو سهل التحميل ليس فيه أي صعوبة

وهده صورة البرنامج
عند تحميل البرنامج تقوم بإدخال البطاقة في الحاسوب تم تدهب إلى البرنامج سوف تطلع لك إسم البطاقة في

drive

كما في الصورة أعلاه تم حجم البطاقة كم فيها من جيجا تم تنقر على

option

وتختار

Quick  

وفي format size تضع on

لتحمل البرنامج أدخل على الرابط أدناhttps://www.sdcard.org/downloads/formatter_4/eula_windows/

راح يطلع لك البرنامج مضغوط فك عليه الضغط

  Peace


  And mercy of God be upon unit subject related persons Aldine suffer from the problem of the kart Memoaro what is also called Aldhakrhoagelb persons card damage them Aldhakrh card and threw Hedda big mis Ertkponhaleom Otikm program fit Aldhakrh Almtlfahma you card only download the software which is easy to download it is not any difficulty
WHDH image program

When you download the software you enter the card in the computer has been Tdhb to the program will look you in the name of the card
drive
As the picture above the card is how the size of GB was click on
option
And choose

Quick
In the format size put on
Enter the program to carry on the link below https://www.sdcard.org/downloads/formatter_4/eula_windows/
Claimed inform you the compressed program unpack it pressure

We hope you like Thread We are at your disposal, we do not Tbkhalo your comments and your comments



برنامج إصلاح بطاقة الذاكرة التالفة Repair damaged memory card program

السلام
  

 عليكم ورحمة الله تعالى وبركاته حدة الموضوع متعلق بالأشخاص ألدين يعانون من مشكل في الكارت ميموارأو ما تسمى أيضا ببطاقة الداكرةوأغلب الأشخاص تتلف لهم بطاقة الداكرة ويرمونها هدا خطاء كبير يرتكبونهاليوم أتيتكم ببرنامج يصلح بطاقة الداكرة المتلفةما عليكم سوى تحميل البرنامج وهو سهل التحميل ليس فيه أي صعوبة

وهده صورة البرنامج
عند تحميل البرنامج تقوم بإدخال البطاقة في الحاسوب تم تدهب إلى البرنامج سوف تطلع لك إسم البطاقة في

drive

كما في الصورة أعلاه تم حجم البطاقة كم فيها من جيجا تم تنقر على

option

وتختار

Quick  

وفي format size تضع on

لتحمل البرنامج أدخل على الرابط أدناhttps://www.sdcard.org/downloads/formatter_4/eula_windows/

راح يطلع لك البرنامج مضغوط فك عليه الضغط

  Peace


  And mercy of God be upon unit subject related persons Aldine suffer from the problem of the kart Memoaro what is also called Aldhakrhoagelb persons card damage them Aldhakrh card and threw Hedda big mis Ertkponhaleom Otikm program fit Aldhakrh Almtlfahma you card only download the software which is easy to download it is not any difficulty
WHDH image program

When you download the software you enter the card in the computer has been Tdhb to the program will look you in the name of the card
drive
As the picture above the card is how the size of GB was click on
option
And choose

Quick
In the format size put on
Enter the program to carry on the link below https://www.sdcard.org/downloads/formatter_4/eula_windows/
Claimed inform you the compressed program unpack it pressure

We hope you like Thread We are at your disposal, we do not Tbkhalo your comments and your comments



نشر في : 05:59 |  من طرف Unknown

dimanche 1 février 2015


The person can forget the unlock pattern or password to his
smartphone or using his tablet system Android, and always the question here is how to open it by other means. In fact, there are several different options to do so, some are more complex and require specific skills, and the other is easy and you can do out without the need to be a professional in Alandroed.ovi this entry will learn about all the different ways that you can use them to open your closed.

  Method 1: Use your Google
If you try to open the device several times and did not succeed, you will propose Android system use your own account at Google to set up an .vikva your machine you enter your email and password to gain access to the device settings and can change or remove the password from there. Certainly the only negative of this method is the necessity of having the internet in your phone whether it's 3G connection or Wi-Fi!

Method 2: Contact your phone from another phone
Method only works if the smartphone with the SIM card. In this case you can make a phone call to your phone while answering a call, you can access the settings and change the style or word Almror.tava some phones and Android versions do not support this feature, which can be considered a security loophole!

Method 3: the answer to the security question or PIN code
Among the options are available as well as the answer to the security question. When you made several attempts to open the device suggests that you system Alandroed two ways: The first is to use your Google account (Method 1), and the second is the answer to the security question, which has already been specified when creating a pattern or password includes this matter as well as the PIN. From On cons way not available However, in some versions of Android.

Here are five different ways to overcome Basord Android phones


The person can forget the unlock pattern or password to his
smartphone or using his tablet system Android, and always the question here is how to open it by other means. In fact, there are several different options to do so, some are more complex and require specific skills, and the other is easy and you can do out without the need to be a professional in Alandroed.ovi this entry will learn about all the different ways that you can use them to open your closed.

  Method 1: Use your Google
If you try to open the device several times and did not succeed, you will propose Android system use your own account at Google to set up an .vikva your machine you enter your email and password to gain access to the device settings and can change or remove the password from there. Certainly the only negative of this method is the necessity of having the internet in your phone whether it's 3G connection or Wi-Fi!

Method 2: Contact your phone from another phone
Method only works if the smartphone with the SIM card. In this case you can make a phone call to your phone while answering a call, you can access the settings and change the style or word Almror.tava some phones and Android versions do not support this feature, which can be considered a security loophole!

Method 3: the answer to the security question or PIN code
Among the options are available as well as the answer to the security question. When you made several attempts to open the device suggests that you system Alandroed two ways: The first is to use your Google account (Method 1), and the second is the answer to the security question, which has already been specified when creating a pattern or password includes this matter as well as the PIN. From On cons way not available However, in some versions of Android.

نشر في : 04:28 |  من طرف Unknown

With the increasing tricks and ways to penetrate Aloyfa, it is not enough just to protect Aloyfa home a hack, but also you have to programs used in your computer in order to detect any attempt, and between these programs already explained by the one Tdoinata as well Halqati must, and there are some Sassadl Sattar reported for the first time.

Program: SoftPerfect WiFi Guard



Beautiful program, characterized by lightness, as it allows you to control Rutter Aloyfa of any attempt to penetrate. Through the program can control more in surveys (scan) that you want to do, for example, can be devoted to the time of the survey process began from one minute to 60 minutes, and this means that the program every minute or 60 minutes will perform a new survey of the network in order to discover if there was another computer share with you online.
Otherwise P SoftPerfect WiFi Guard will show you a small permeated emerge when all automatic scanning process in order to tell you the results of the search.

download: https://www.softperfect.com/products/wifiguard/


1 free software alerts you if it breaches wifi

With the increasing tricks and ways to penetrate Aloyfa, it is not enough just to protect Aloyfa home a hack, but also you have to programs used in your computer in order to detect any attempt, and between these programs already explained by the one Tdoinata as well Halqati must, and there are some Sassadl Sattar reported for the first time.

Program: SoftPerfect WiFi Guard



Beautiful program, characterized by lightness, as it allows you to control Rutter Aloyfa of any attempt to penetrate. Through the program can control more in surveys (scan) that you want to do, for example, can be devoted to the time of the survey process began from one minute to 60 minutes, and this means that the program every minute or 60 minutes will perform a new survey of the network in order to discover if there was another computer share with you online.
Otherwise P SoftPerfect WiFi Guard will show you a small permeated emerge when all automatic scanning process in order to tell you the results of the search.

download: https://www.softperfect.com/products/wifiguard/


نشر في : 04:08 |  من طرف Unknown


For the day no one has not been used wireless network in his daily life, use of this type of communication became more famous and used widely, especially because they provide this technique of easy access, as well as linking the largest possible number of devices and to cover long distances. Of course, this widespread technology Wi-flowing saliva hackers and permanent methods to penetrate this type of networking technologies and there .aka these tools are Wifiphisher tool.

This new tool launched by George Chatzisofroniou Greek security researcher under the name Wifiphisher. It is a tool to penetrate wireless networks, which use intelligent fraud and style in a new way far from the traditional stereotypes methods known .alojml tool that integrates several techniques in the field of penetration as well as many of the weaknesses in the protocols used in networks.

How Wifiphisher works and why is it dangerous?
Common way to get through the Wi-Fi networks for a long time is Alaatmadeh mainly on the dictionary, which includes hundreds of thousands of random words and tested to reach the password for the router or Alrotr.ohma known attack "brute force" and take a long time.

The new method, which relies upon Wifiphisher are totally different and smarter. It can Tl_khasaha in the following:
The tool is to reproduce your Access Point Access Point, and offers a new point of counterfeit victim will be "Kaltoam evil", while at the same time you Aladh Btid blocking DoS service attack on the router to disable the original point of contact, making the victim believe there is documentation and access problems for the point of origin Contact and thus the tool Bajabbark smart and tricky way of the contact point counterfeit that will be quite similar to the original (and you will be sent as well as tool and fake page asking for the password) and of course the user will be reassuring and will not feel any difference thus will enter the password voluntarily; and the latter sent to your attacker. also noteworthy that the attack tool "Deauthentication" to separate all related to the original point contact devices, and forcing them to call fake point.

Once you get the original password, this point contact counterfeit or "evil twin" can continue to work as the connection broker (between the original access point and other users), the sense will be connected to the Internet like you are connected to the original point of contact!. Yes, and this may lead to steal passwords and other information and passing on this network lyrics, and this is very dangerous too.

Wifiphisher certainly can be considered intelligent combination of social engineering (the most common method of penetration), with a simple application that combines many techniques and styles.
And 2 this tool Kali Linux require network cards, and one of them is capable of injection. You can download the tool and experience, as you can access all the information about them through this link.

https://github.com/sophron/wifiphisher

Learn new tool Wifiphisher and dangerous hack wifi Wi-Fi (WPA / WPA2) quite easily!



For the day no one has not been used wireless network in his daily life, use of this type of communication became more famous and used widely, especially because they provide this technique of easy access, as well as linking the largest possible number of devices and to cover long distances. Of course, this widespread technology Wi-flowing saliva hackers and permanent methods to penetrate this type of networking technologies and there .aka these tools are Wifiphisher tool.

This new tool launched by George Chatzisofroniou Greek security researcher under the name Wifiphisher. It is a tool to penetrate wireless networks, which use intelligent fraud and style in a new way far from the traditional stereotypes methods known .alojml tool that integrates several techniques in the field of penetration as well as many of the weaknesses in the protocols used in networks.

How Wifiphisher works and why is it dangerous?
Common way to get through the Wi-Fi networks for a long time is Alaatmadeh mainly on the dictionary, which includes hundreds of thousands of random words and tested to reach the password for the router or Alrotr.ohma known attack "brute force" and take a long time.

The new method, which relies upon Wifiphisher are totally different and smarter. It can Tl_khasaha in the following:
The tool is to reproduce your Access Point Access Point, and offers a new point of counterfeit victim will be "Kaltoam evil", while at the same time you Aladh Btid blocking DoS service attack on the router to disable the original point of contact, making the victim believe there is documentation and access problems for the point of origin Contact and thus the tool Bajabbark smart and tricky way of the contact point counterfeit that will be quite similar to the original (and you will be sent as well as tool and fake page asking for the password) and of course the user will be reassuring and will not feel any difference thus will enter the password voluntarily; and the latter sent to your attacker. also noteworthy that the attack tool "Deauthentication" to separate all related to the original point contact devices, and forcing them to call fake point.

Once you get the original password, this point contact counterfeit or "evil twin" can continue to work as the connection broker (between the original access point and other users), the sense will be connected to the Internet like you are connected to the original point of contact!. Yes, and this may lead to steal passwords and other information and passing on this network lyrics, and this is very dangerous too.

Wifiphisher certainly can be considered intelligent combination of social engineering (the most common method of penetration), with a simple application that combines many techniques and styles.
And 2 this tool Kali Linux require network cards, and one of them is capable of injection. You can download the tool and experience, as you can access all the information about them through this link.

https://github.com/sophron/wifiphisher

نشر في : 03:51 |  من طرف Unknown

Text Widget

Blog Archive

back to top