Showing posts with label Tech. Show all posts
Monday, December 12, 2011

INTRODUCTION TO DENIAL OF SERVICE

0 comments
Save to del.icio.us 0 hits!

==================================                   
=INTRODUCTION TO DENIAL OF SERVICE=
===================================

1)WHAT IS A DENIAL OF SERVICE ATTACK?

Denial of service is about without permission knocking off services, for example through crashing the whole  system. This kind of attacks are easy to launch and it is hard to protect a system against them. The basic  problem is that Unix assumes that users on the system or on other systems will be well behaved.

Sometimes could a denial of service attack be a part of an attack to gain access at a system. At the moment  I can think of these reasons and specific holes:

1. Some older X-lock versions could be crashed with a method from the denial of service family leaving the  system open. Physical access was needed to use the work space after.

2. Syn flooding could be a part of a IP-spoof attack method.

3. Some program systems could have holes under the startup, that could be used to gain root, for example  SSH (secure shell).

4. Under an attack it could be usable to crash other machines in the network or to deny certain persons the  ability to access the system.

5. Also could a system being booted sometimes be subverted, especially rarp-boots. If we know which port  the machine listen to (69 could be a good guess) under the boot we can send false packets to it and  almost totally control the boot.

Thursday, November 10, 2011

Little Help For Anonymous Mailer

0 comments
Save to del.icio.us 0 hits!

Little help for anonymous mailer

An anonymous remailer is a computer which has been configured to run remailer software. This software is a specialized kind of email server software. Unlike average email server which goes to great lengths to log all incoming/outgoing traffic and add identifying and traceable info to its outgoing mail (in the form of headers) remailer software ensures that outgoing mail has been STRIPPED CLEAN of any identifying information! Thus the name 'anonymous' remailer.


The remailer performs certain automated tasks which include retrieving mail, decrypting/processing that mail (only mail that is properly encrypted and formatted), obeying the directives within the message and, finally, delivering - remailing - the finished product to a second party in anonymized form. When received by that second party it will reveal only that it was sent from an anonymous source (usually the remailer's name and email address). The IP address shown will be the IP address of the remailer machine.
Using a chain of remailers you can send messages totally anonymous, but you can receive too with a nym, download web pages, send files in FTP, talk in newsgroups, etc...


There are, more or less, four types of remailers:

- Pseudonymous remailers

A Pseudonymous remailer, simply takes away the email address of the sender, gives a pseudonym to the sender and sends the message to the intended recipient (that can be answered via that remailer).

- Cypherpunk remailers, also called type I

A Cypherpunk remailer sends the message to the recipient stripping away the sender address on it. You can not answer a message sent via a Cypherpunk remailer. You can usually encrypt the message sent to the remailer, and the remailer will decrypt it and send it to the recipient address hidden inside the encrypted message. In addition, you can chain 2 or 3 remailers, so each remailer can’t know who is sending a message to whom. Cypherpunk remailers do not keep logs of transactions.

- Mixmaster remailers, also called type II

Mixmaster remailers require use of a program on your computer to write your messages. Such programs are not supplied as a standard part of most operating systems or mail management systems.

- Mixminion remailers, also called type III

A Mixminion remailer attempts to address the following challenges in Mixmaster remailers: replies, forward anonymity, replay prevention and key rotation, exit policies, integrated directory servers, dummy traffic. They have been implemented for the Linux and Windows platforms and are currently available. Some implementations are open source.

Wednesday, November 9, 2011

Keep Your Files Private

0 comments
Save to del.icio.us 0 hits!

Keep Files Private

---------------------------------------------------------------------------------


If you want to encrypt the contents of an individual file or directory, Windows XP Pro will do the trick, provided you enable NTFS on your hard drive. To encrypt a file, right-click on it to bring up the Properties window. Click on the Advanced button, then in the Advanced Attributes dialog box click on Encrypt contents to secure data. This will encrypt the file (using either DES, which employs a 56-bit key on each 64-bit block of data, or 3DES, which uses a 56-bit key three times on each 64-bit block of data), and it will provide a certificate just for you. This certificate is key; if you reinstall Windows or otherwise lose your user account, your access to the encrypted files will be gone, too. You need to export your certificates to back them up: For detailed instructions, search on export certificate in Windows Help.

Windows XP does not require you to enter your password when you open the encrypted file. Once you log on to a session, encrypted files are available for you—and anyone who walks up to your system—to view.


Monday, November 7, 2011

Caught A Virus?

0 comments
Save to del.icio.us 0 hits!

Caught A Virus?

If you've let your guard down--or even if you haven't--it can be hard to tell if your PC is infected. Here's what to do if you suspect the worst.


Heard this one before? You must run antivirus software and keep it up to date or else your PC will get infected, you'll lose all your data, and you'll incur the wrath of every e-mail buddy you unknowingly infect because of your carelessness.

You know they're right. Yet for one reason or another, you're not running antivirus software, or you are but it's not up to date. Maybe you turned off your virus scanner because it conflicted with another program. Maybe you got tired of upgrading after you bought Norton Antivirus 2001, 2002, and 2003. Or maybe your annual subscription of virus definitions recently expired, and you've put off renewing.

It happens. It's nothing to be ashamed of. But chances are, either you're infected right now, as we speak, or you will be very soon.

For a few days in late January, the Netsky.p worm was infecting about 2,500 PCs a day. Meanwhile the MySQL bot infected approximately 100 systems a minute (albeit not necessarily desktop PCs). As David Perry, global director of education for security software provider Trend Micro, puts it, "an unprotected [Windows] computer will become owned by a bot within 14 minutes."

Today's viruses, worms, and so-called bots--which turn your PC into a zombie that does the hacker's bidding (such as mass-mailing spam)--aren't going to announce their presence. Real viruses aren't like the ones in Hollywood movies that melt down whole networks in seconds and destroy alien spacecraft. They operate in the background, quietly altering data, stealing private operations, or using your PC for their own illegal ends. This makes them hard to spot if you're not well protected.

Friday, November 4, 2011

Proxies Tutorial

0 comments
Save to del.icio.us 0 hits!

Proxies
What is a Proxy Server?
 
A proxy server is a kind of buffer between your computer and the Internet resources you are accessing. The data you request come to the proxy first, and only then it transmits the data to you. I know many are looking for IP Maskers or Scramblers, but honestly, it aint real easy for the simple fact that any website that you visit needs your IP to send the info packets too. If its scrambled, you will get a lot of errors and crazy redirects :P My solution? Read on........... for a good list of Proxy servers try here>> http://www.multiproxy.org/

Why do I need to use proxy servers?
 
Transfer speed improvement. Proxy servers accumulate and save files that are most often requested by thousands of Internet users in a special database, called “cache”. Therefore, proxy servers are able to increase the speed of your connection to the Internet. The cache of a proxy server may already contain information you need by the time of your request, making it possible for the proxy to deliver it immediately.
Security and privacy. Anonymous proxy servers that hide your IP address thereby saving you from vulnerabilities concerned with it.
Sometimes you may encounter problems while accessing to web server when server administrator restricted access from your IP or even from wide IP range (for example restricting access from certain countries or geographical regions). So you try to access those pages using an anonymous proxy server.

How To Install System Restore On Server 2003

0 comments
Save to del.icio.us 0 hits!

How to install System restore on server 2003

Before we begin, you'll need an XP CD. Doesn't matter if it's home or pro. It shouldn't matter if it has a service pack on it, since all the files will be the same source. In testing i used a slip streamed cd that already had sp1 on it.

In XP, system restore is installed in sys setup.inf under the inf.always section. If you have XP installed, you can open up %windir%\inf\syssetup.inf and search for [Infs.Always], you'll see the section xp looks at for installing system components. You'll notice it has sr.inf, this is the inf for system restore. For server 2003, if you look at sys setup.inf you won't find sr.inf. This doesn't mean system restore won't work in server 2003, it just means they didn't install it.

So first what we're going to need to do is right click on sr.inf and select 'install', to install it on server 2003. If you have xp installed on another computer/partition you can just right click on it. If you don't, then extract \i386\sr.in_ from the XP cd to your desktop, then right click on it and select 'install'. It'll prompt you where the files are, point it to the XP CD. Once done, it'll prompt to restart, say yes.

That was easy, the next part is the tricky part. After restarting you'll get an error saying the service couldn't start. Specifically the error is error 1068. I searched google and found this link -
CODE
http://www.aerdyne.com/Kbase/article_000005.htm.

Tuesday, November 1, 2011

How To Make Your Own Video Avatars

0 comments
Save to del.icio.us 0 hits!

Video Avatars

1. Open PowerDVD:

2. Open a movie or Video clip:

3. Go to the beginning of the part u want as avatar & click on pause

4. make a picture of it:

5. press 2 steps forward & then make another pic, do this until u got the whole part:

Monday, October 31, 2011

What Should I Do With Image Files?

0 comments
Save to del.icio.us 0 hits!


What Should I Do With Image Files?

------------------------------

1. What is a image file?

A image file is a CD/DVD, but instead of insert it into your CD/DVD-Rom, you open it from inside your Hard Disk. So, it's a file that replaces a normal CD/DVD. Inside the image are the CD/DVD files like if it were a CD/DVD.

2. What are the image files extensions?

There's many extensions, but the most common are:

  • iSO (Generic image file)
  • BiN/CUE (Generic BiN image file)
  • NRG (An image created using Nero Burning ROM)
  • iMG/CCD/SUB (An image created using CloneCD)
  • MDF (An image created using MagicISO Maker)
There are many other images, but these are the most common.

3. How to open a image file?

The most common way to open image files, is to use a virtual CD/DVD-Rom. It's like a normal CD/DVD-Rom, only that you mount the images directly from your computer, installing a simple program.

Windows 2000 Tips & Tricks

0 comments
Save to del.icio.us 0 hits!



Speed up the Boot Menu :
Tired of waiting thirty seconds to boot Windows 2000 if you don't select from the boot menu? Speed up the booting process by only showing the available operating systems for just a couple of seconds.
Right-click "My Computer" on the desktop and choose "Properties". On the "System Properties" multi-tabbed dialog box that follows, click "Advanced". Click the "Startup and Recovery..." button. Then, on the "Startup and Recovery" dialog box that follows, next to "Display list of operating systems for ... seconds", select the number of seconds that you want the computer to wait before continuing with the default OS. When you're done, press "OK" to close the dialog box.
Desktop Disappearing:

Although Windows 2000 is more stable than previous versions of NT, in some situations, strange things can happen. If, for example, Explorer crashes, most of your desktop, including the "Start" button, disappears. To bring back Explorer without rebooting your machine, press CONTROL-ALT-DELETE. When the "Windows Security" dialog box appears, click the "Task Manager" button. If the "Windows Task Manager' dialog box appears as it should, select the "File" menu and then "New Task (Run)". When the "Create New Task" dialog box appears, just type in "Explorer" and press the "OK" button. Windows Explorer should then reappear, complete with the "Start" button.

Sunday, October 30, 2011

Windows Registry

0 comments
Save to del.icio.us 0 hits!


1: What is the Registry?

The Registry is a database used to store settings and options for the 32 bit versions of Microsoft Windows including Windows 95, 98, ME and NT/2000. It contains information and settings for all the hardware, software, users, and preferences of the PC. Whenever a user makes changes to a Control Panel settings, or File Associations, System Policies, or installed software, the changes are reflected and stored in the Registry.

The physical files that make up the registry are stored differently depending on your version of Windows; under Windows 95 & 98 it is contained in two hidden files in your Windows directory, called USER.DAT and SYSTEM.DAT, for Windows Me there is an additional CLASSES.DAT file, while under Windows NT/2000 the files are contained seperately in the %SystemRoot%\System32\Config directory. You can not edit these files directly, you must use a tool commonly known as a "Registry Editor" to make any changes (using registry editors will be discussed later in the article).

2: The Structure of The Registry

The Registry has a hierarchal structure, although it looks complicated the structure is similar to the directory structure on your hard disk, with Regedit being similar to Windows Explorer.

Each main branch (denoted by a folder icon in the Registry Editor, see left) is called a Hive, and Hives contains Keys. Each key can contain other keys (sometimes referred to as sub-keys), as well as Values. The values contain the actual information stored in the Registry. There are three types of values; String, Binary, and DWORD - the use of these depends upon the context.

There are six main branches, each containing a specific portion of the information stored in the Registry. They are as follows:


* HKEY_CLASSES_ROOT - This branch contains all of your file association mappings to support the drag-and-drop feature, OLE information, Windows shortcuts, and core aspects of the Windows user interface.
* HKEY_CURRENT_USER - This branch links to the section of HKEY_USERS appropriate for the user currently logged onto the PC and contains information such as logon names, desktop settings, and Start menu settings.
* HKEY_LOCAL_MACHINE - This branch contains computer specific information about the type of hardware, software, and other preferences on a given PC, this information is used for all users who log onto this computer.
* HKEY_USERS - This branch contains individual preferences for each user of the computer, each user is represented by a SID sub-key located under the main branch.
* HKEY_CURRENT_CONFIG - This branch links to the section of HKEY_LOCAL_MACHINE appropriate for the current hardware configuration.
* HKEY_DYN_DATA - This branch points to the part of HKEY_LOCAL_MACHINE, for use with the Plug-&-Play features of Windows, this section is dymanic and will change as devices are added and removed from the system.

Speed Up Your Network Access

0 comments
Save to del.icio.us 0 hits!

Windows Xp: Speed Up Your Network Access

Increasing network browsing speed:

Does your computer slow down when you browse your local area network and connect to other computers that are sharing data? One of the most common causes of this slowdown is a feature of Windows Explorer that looks for scheduled tasks on remote computers. This effort can take some time on some computers and can really slow down your browsing. The window with which you are browsing the network may appear to freeze momentarily, as the system is waiting for a response from the remote computer.

Windows XP: Speeding Disk Access

Although this problem is a complex one, the solution is very simple. Instead of having to wait for the remote scheduled tasks, which is useless information to anyone who is not a system administrator remotely configuring scheduled tasks, you can disable this feature.

In order to do this, you will have to change the System Registry and delete a reference to a key so that this feature will not be loaded. To do this, follow these steps:

Thursday, October 27, 2011

Speed Up Your Computer And Windows

0 comments
Save to del.icio.us 0 hits!

OK, every time I have to install, reinstall, or optimize someone elses XP setup I forget what I need to do, so I have to go throught dozens of magizines and find all the good useful tweaks that will speed up the computer and Windows.
So I made this tutoral and text file so I and everyone else can see and use on a floppy or thumb drive or something and carry it around, so you don't have to forget and can tweak the computer without downloading anything.

And if you have something to add, just post it and I'll add it to the text file and this post.

Services to turn off:
Alerter
Application Management
Automatic Updates
ClipBook
Distributed Link Tracking Client
Error Reporting Service
Fast User Switching Compatibility
Messenger
Portable Media Serial Number Service
Remote Registry
Routing and Remote Access
Task Scheduler
Telnet
TPC/IP NetBIOS Helper
Uninterruptible Power Supply


Change "Recycle Bin" size to 1%


Registry Hacks:

WinXP Tips & Trix - Repairing Damaged Winsock2

0 comments
Save to del.icio.us 0 hits!


Repairing Damaged Winsock2

The symptoms when Winsock2 is damaged show when you try to release and renew the IP address using IPCONFIG...

And you get the following error message:

An error occurred while renewing interface 'Internet': An operation was attempted on something that is not a socket.

Also Internet Explorer may give the following error message:
The page cannot be displayed Additionally, you may have no IP address or no Automatic Private IP Addressing (APIPA) address, and you may be receiving IP packets but not sending them.

There are two easy ways to determine if Winsock2 is damaged:

From the XP source files, go to the Support / Tools directory

Winsock Test Method 1
Run netdiag /test:winsock

The end should say Winsock test ..... passed

Winsock Test Method 2

Win XP Tips And Tricks And Winsock 2 Repair

0 comments
Save to del.icio.us 0 hits!

Winxp Tips And Tricks, Winsock 2 repair

--------------------------------------------------------------------------------
Repairing Damaged Winsock2

The symptoms when Winsock2 is damaged show when you try to release and renew the IP address using IPCONFIG...

And you get the following error message:

An error occurred while renewing interface 'Internet': An operation was attempted on something that is not a socket.

Also Internet Explorer may give the following error message:
The page cannot be displayed Additionally, you may have no IP address or no Automatic Private IP Addressing (APIPA) address, and you may be receiving IP packets but not sending them.

There are two easy ways to determine if Winsock2 is damaged:

From the XP source files, go to the Support / Tools directory

Win XP Tweaks

0 comments
Save to del.icio.us 0 hits!

 Win XP Tweaks

-----------
STARTUP
-----------


Windows Prefetcher
******************
[HKEY_LOCAL_MACHINE \ SYSTEM \ CurrentControlSet \ Control \ Session Manager \ Memory Management \ PrefetchParameters]

Under this key there is a setting called EnablePrefetcher, the default setting of which is 3. Increasing this number to 5 gives the prefetcher system more system resources to prefetch application data for faster load times. Depending on the number of boot processes you run on your computer, you may get benefits from settings up to 9. However, I do not have any substantive research data on settings above 5 so I cannot verify the benefits of a higher setting. This setting also may effect the loading times of your most frequently launched applications. This setting will not take effect until after you reboot your system.


Master File Table Zone Reservation
**********************************
[HKEY_LOCAL_MACHINE \ SYSTEM \ CurrentControlSet \ Control \ FileSystem]

Under this key there is a setting called NtfsMftZoneReservation, the default setting of which is 1. The range of this value is from 1 to 4. The default setting reserves one-eighth of the volume for the MFT. A setting of 2 reserves one-quarter of the volume for the MFT. A setting of 3 for NtfsMftZoneReservation reserves three-eighths of the volume for the MFT and setting it to 4 reserves half of the volume for the MFT. Most users will never exceed one-quarter of the volume. I recommend a setting of 2 for most users. This allows for a "moderate number of files" commensurate with the number of small files included in most computer games and applications. Reboot after applying this tweak.

Try Yahoo Messeger With No Adds

0 comments
Save to del.icio.us 0 hits!

Yahoo Messeger, no add's
I went into the system registery and found out that Yahoo! moved the 'banner url' key to a slightly different location. Than what it used in version 9!

Yahoo! IM no longer uses 'YUrl', but uses 'View' instead. You gotta click on each key inside of 'View' and edit the 'banner url' string to anything you want... I simply cleared mine out completely and it works flawlessly!

Here is what you gotta do:

Run regedit
Goto HKEY_CURRENT_USER -> Software -> Yahoo -> Pager -> View

How To Install XP Repair On Your PC

0 comments
Save to del.icio.us 0 hits!

  
   XP REPAIR INSTALL:

  
   1. Boot the computer using the XP CD. You may need to change the
      boot order in the system BIOS. Check your system documentation
      for steps to access the BIOS and change the boot order.
   
   
  2. When you see the "Welcome To Setup" screen, you will see the
     options below This portion of the Setup program prepares Microsoft
     Windows XP to run on your computer:

   To setup Windows XP now, press ENTER.

   To repair a Windows XP installation using Recovery Console, press R.

   To quit Setup without installing Windows XP, press F3.

   
   
    3. Press Enter to start the Windows Setup.

      do not choose "To repair a Windows XP installation using the
      Recovery Console, press  R", (you do not want to load Recovery
      Console). I repeat, do not choose "To repair a Windows XP
      installation using the Recovery Console, press  R".

How To Find a Remote IP

0 comments
Save to del.icio.us 0 hits!

How to find a remote IP

Method 1

To view someone's IP# when they send you hotmail email do this:
1) Click "Options" on the upper right side of the page.
2) On the left side of the page, Click "Mail"
3) Click "Mail Display Settings"
4) Under "Message Headers" select "Full" or "Advanced"
5) Click ok

Method 2

reg a dydns account and install the ip pointer, so each time you ping the host name you regestored

for example:
you regestor the host name myhost.dydns.com, then you keep a little software running on the target host. The little software will keep update your IP to dydns.com server.

so at your pc just start cmd, and ping myhost.dydns.com, it will give you the most updated ip address.

How To Step Up Your Own Server

0 comments
Save to del.icio.us 0 hits!

Your Own Home Server - Introduction
An Introduction
In this tutorial you will learn how to step up your own server. This server will be comprised of Apache 1.3.5, PHP 4.2.0, and MySQL 3.23.49. This tutorial will address the basic setup of a server on your own computer. This means the removal of hassles of dealing with the company that is running a remote web server. It will be easy to modify. You can add any thing you want to it, be it CGI/Perl, Zope, Roxen, etc, all by your self. You will have unlimited disk space, well at least as big as your hard drive is =) Now that you know the advantages, it is time that I tell you what i used, and what you will need.

Wednesday, October 26, 2011

Computer Acronyms

0 comments
Save to del.icio.us 0 hits!

--- A ---


ADSL - Asymmetric Digital Subscriber Line
AGP - Accelerated Graphics Port
ALI - Acer Labs, Incorporated
ALU - Arithmetic Logic Unit
AMD - Advanced Micro Devices
APC - American Power Conversion
ASCII - American Standard Code for Information Interchange
ASIC - Application Specific Integrated Circuit
ASPI - Advanced SCSI Programming Interface
AT - Advanced Technology
ATI - ATI Technologies Inc.
ATX - Advanced Technology Extended

Subscribe now! RSSFeeds RSS

Advertise Here

Earn by receiving SMS Advertise with Slodive Advertise with Slodive

Subscribe now! RSSSlodive's Latest Posts

Subscribe now! RSSSlodive's Latest Comments

Subscribe now!Slodive's Hot Links

Total Pageviews