==================================
=INTRODUCTION TO DENIAL OF SERVICE=
===================================
1)WHAT IS A DENIAL OF SERVICE ATTACK?
Denial of service is about without permission knocking off services, for example through crashing the whole system. This kind of attacks are easy to launch and it is hard to protect a system against them. The basic problem is that Unix assumes that users on the system or on other systems will be well behaved.
Sometimes could a denial of service attack be a part of an attack to gain access at a system. At the moment I can think of these reasons and specific holes:
1. Some older X-lock versions could be crashed with a method from the denial of service family leaving the system open. Physical access was needed to use the work space after.
2. Syn flooding could be a part of a IP-spoof attack method.
3. Some program systems could have holes under the startup, that could be used to gain root, for example SSH (secure shell).
4. Under an attack it could be usable to crash other machines in the network or to deny certain persons the ability to access the system.
5. Also could a system being booted sometimes be subverted, especially rarp-boots. If we know which port the machine listen to (69 could be a good guess) under the boot we can send false packets to it and almost totally control the boot.
Showing posts with label Tech. Show all posts
Monday, December 12, 2011
INTRODUCTION TO DENIAL OF SERVICE
0
comments
Save to del.icio.us
0 hits!
Thursday, November 10, 2011
Little Help For Anonymous Mailer
Tag
Tech
0
comments
Save to del.icio.us
0 hits!
Little help for anonymous mailer
An anonymous remailer is a computer which has been configured to run remailer software. This software is a specialized kind of email server software. Unlike average email server which goes to great lengths to log all incoming/outgoing traffic and add identifying and traceable info to its outgoing mail (in the form of headers) remailer software ensures that outgoing mail has been STRIPPED CLEAN of any identifying information! Thus the name 'anonymous' remailer.
The remailer performs certain automated tasks which include retrieving mail, decrypting/processing that mail (only mail that is properly encrypted and formatted), obeying the directives within the message and, finally, delivering - remailing - the finished product to a second party in anonymized form. When received by that second party it will reveal only that it was sent from an anonymous source (usually the remailer's name and email address). The IP address shown will be the IP address of the remailer machine.
Using a chain of remailers you can send messages totally anonymous, but you can receive too with a nym, download web pages, send files in FTP, talk in newsgroups, etc...
There are, more or less, four types of remailers:- Pseudonymous remailersA Pseudonymous remailer, simply takes away the email address of the sender, gives a pseudonym to the sender and sends the message to the intended recipient (that can be answered via that remailer).- Cypherpunk remailers, also called type IA Cypherpunk remailer sends the message to the recipient stripping away the sender address on it. You can not answer a message sent via a Cypherpunk remailer. You can usually encrypt the message sent to the remailer, and the remailer will decrypt it and send it to the recipient address hidden inside the encrypted message. In addition, you can chain 2 or 3 remailers, so each remailer can’t know who is sending a message to whom. Cypherpunk remailers do not keep logs of transactions.- Mixmaster remailers, also called type IIMixmaster remailers require use of a program on your computer to write your messages. Such programs are not supplied as a standard part of most operating systems or mail management systems.- Mixminion remailers, also called type IIIA Mixminion remailer attempts to address the following challenges in Mixmaster remailers: replies, forward anonymity, replay prevention and key rotation, exit policies, integrated directory servers, dummy traffic. They have been implemented for the Linux and Windows platforms and are currently available. Some implementations are open source.
Wednesday, November 9, 2011
Keep Your Files Private
Tag
Tech
0
comments
Save to del.icio.us
0 hits!
Keep Files Private
If you want to encrypt the contents of an individual file or directory, Windows XP Pro will do the trick, provided you enable NTFS on your hard drive. To encrypt a file, right-click on it to bring up the Properties window. Click on the Advanced button, then in the Advanced Attributes dialog box click on Encrypt contents to secure data. This will encrypt the file (using either DES, which employs a 56-bit key on each 64-bit block of data, or 3DES, which uses a 56-bit key three times on each 64-bit block of data), and it will provide a certificate just for you. This certificate is key; if you reinstall Windows or otherwise lose your user account, your access to the encrypted files will be gone, too. You need to export your certificates to back them up: For detailed instructions, search on export certificate in Windows Help.
Windows XP does not require you to enter your password when you open the encrypted file. Once you log on to a session, encrypted files are available for you—and anyone who walks up to your system—to view.
Monday, November 7, 2011
Caught A Virus?
Tag
Tech
0
comments
Save to del.icio.us
0 hits!
Caught A Virus? If you've let your guard down--or even if you haven't--it can be hard to tell if your PC is infected. Here's what to do if you suspect the worst. Heard this one before? You must run antivirus software and keep it up to date or else your PC will get infected, you'll lose all your data, and you'll incur the wrath of every e-mail buddy you unknowingly infect because of your carelessness. You know they're right. Yet for one reason or another, you're not running antivirus software, or you are but it's not up to date. Maybe you turned off your virus scanner because it conflicted with another program. Maybe you got tired of upgrading after you bought Norton Antivirus 2001, 2002, and 2003. Or maybe your annual subscription of virus definitions recently expired, and you've put off renewing. It happens. It's nothing to be ashamed of. But chances are, either you're infected right now, as we speak, or you will be very soon. For a few days in late January, the Netsky.p worm was infecting about 2,500 PCs a day. Meanwhile the MySQL bot infected approximately 100 systems a minute (albeit not necessarily desktop PCs). As David Perry, global director of education for security software provider Trend Micro, puts it, "an unprotected [Windows] computer will become owned by a bot within 14 minutes." Today's viruses, worms, and so-called bots--which turn your PC into a zombie that does the hacker's bidding (such as mass-mailing spam)--aren't going to announce their presence. Real viruses aren't like the ones in Hollywood movies that melt down whole networks in seconds and destroy alien spacecraft. They operate in the background, quietly altering data, stealing private operations, or using your PC for their own illegal ends. This makes them hard to spot if you're not well protected.
Friday, November 4, 2011
Proxies Tutorial
Tag
Tech
0
comments
Save to del.icio.us
0 hits!
Proxies
What is a Proxy Server?
A proxy server is a kind of buffer between your computer and the Internet
resources you are accessing. The data you request come to the proxy first, and
only then it transmits the data to you. I know many are looking for IP Maskers
or Scramblers, but honestly, it aint real easy for the simple fact that any
website that you visit needs your IP to send the info packets too. If its
scrambled, you will get a lot of errors and crazy redirects :P My solution? Read
on........... for a good list of Proxy servers try here>>
http://www.multiproxy.org/
Why do I need to use proxy servers?
Transfer speed improvement. Proxy servers accumulate and save files that are
most often requested by thousands of Internet users in a special database,
called “cache”. Therefore, proxy servers are able to increase the speed of your
connection to the Internet. The cache of a proxy server may already contain
information you need by the time of your request, making it possible for the
proxy to deliver it immediately.
Security and privacy. Anonymous proxy servers that hide your IP address thereby saving you from vulnerabilities concerned with it. Sometimes you may encounter problems while accessing to web server when server administrator restricted access from your IP or even from wide IP range (for example restricting access from certain countries or geographical regions). So you try to access those pages using an anonymous proxy server. How To Install System Restore On Server 2003
Tag
Tech
0
comments
Save to del.icio.us
0 hits!
How to install System restore on server 2003 Before we begin, you'll need an XP CD. Doesn't matter if it's home or pro. It shouldn't matter if it has a service pack on it, since all the files will be the same source. In testing i used a slip streamed cd that already had sp1 on it. In XP, system restore is installed in sys setup.inf under the inf.always section. If you have XP installed, you can open up %windir%\inf\syssetup.inf and search for [Infs.Always], you'll see the section xp looks at for installing system components. You'll notice it has sr.inf, this is the inf for system restore. For server 2003, if you look at sys setup.inf you won't find sr.inf. This doesn't mean system restore won't work in server 2003, it just means they didn't install it. So first what we're going to need to do is right click on sr.inf and select 'install', to install it on server 2003. If you have xp installed on another computer/partition you can just right click on it. If you don't, then extract \i386\sr.in_ from the XP cd to your desktop, then right click on it and select 'install'. It'll prompt you where the files are, point it to the XP CD. Once done, it'll prompt to restart, say yes. That was easy, the next part is the tricky part. After restarting you'll get an error saying the service couldn't start. Specifically the error is error 1068. I searched google and found this link - CODE http://www.aerdyne.com/Kbase/article_000005.htm.
Tuesday, November 1, 2011
How To Make Your Own Video Avatars
0
comments
Save to del.icio.us
0 hits!
Video Avatars 1. Open PowerDVD: 2. Open a movie or Video clip: 3. Go to the beginning of the part u want as avatar & click on pause 4. make a picture of it: 5. press 2 steps forward & then make another pic, do this until u got the whole part:
Monday, October 31, 2011
What Should I Do With Image Files?
Tag
Tech
0
comments
Save to del.icio.us
0 hits!
What Should I Do With Image Files? ------------------------------ 1. What is a image file? A image file is a CD/DVD, but instead of insert it into your CD/DVD-Rom, you open it from inside your Hard Disk. So, it's a file that replaces a normal CD/DVD. Inside the image are the CD/DVD files like if it were a CD/DVD. 2. What are the image files extensions? There's many extensions, but the most common are:
3. How to open a image file? The most common way to open image files, is to use a virtual CD/DVD-Rom. It's like a normal CD/DVD-Rom, only that you mount the images directly from your computer, installing a simple program. Windows 2000 Tips & Tricks
0
comments
Save to del.icio.us
0 hits!
Speed up the Boot Menu : Tired of waiting thirty seconds to boot Windows 2000 if you don't select from the boot menu? Speed up the booting process by only showing the available operating systems for just a couple of seconds. Right-click "My Computer" on the desktop and choose "Properties". On the "System Properties" multi-tabbed dialog box that follows, click "Advanced". Click the "Startup and Recovery..." button. Then, on the "Startup and Recovery" dialog box that follows, next to "Display list of operating systems for ... seconds", select the number of seconds that you want the computer to wait before continuing with the default OS. When you're done, press "OK" to close the dialog box. Desktop Disappearing: Although Windows 2000 is more stable than previous versions of NT, in some situations, strange things can happen. If, for example, Explorer crashes, most of your desktop, including the "Start" button, disappears. To bring back Explorer without rebooting your machine, press CONTROL-ALT-DELETE. When the "Windows Security" dialog box appears, click the "Task Manager" button. If the "Windows Task Manager' dialog box appears as it should, select the "File" menu and then "New Task (Run)". When the "Create New Task" dialog box appears, just type in "Explorer" and press the "OK" button. Windows Explorer should then reappear, complete with the "Start" button.
Sunday, October 30, 2011
Windows Registry
Tag
Tech
0
comments
Save to del.icio.us
0 hits!
1: What is the Registry? The Registry is a database used to store settings and options for the 32 bit versions of Microsoft Windows including Windows 95, 98, ME and NT/2000. It contains information and settings for all the hardware, software, users, and preferences of the PC. Whenever a user makes changes to a Control Panel settings, or File Associations, System Policies, or installed software, the changes are reflected and stored in the Registry. The physical files that make up the registry are stored differently depending on your version of Windows; under Windows 95 & 98 it is contained in two hidden files in your Windows directory, called USER.DAT and SYSTEM.DAT, for Windows Me there is an additional CLASSES.DAT file, while under Windows NT/2000 the files are contained seperately in the %SystemRoot%\System32\Config directory. You can not edit these files directly, you must use a tool commonly known as a "Registry Editor" to make any changes (using registry editors will be discussed later in the article). 2: The Structure of The Registry The Registry has a hierarchal structure, although it looks complicated the structure is similar to the directory structure on your hard disk, with Regedit being similar to Windows Explorer. Each main branch (denoted by a folder icon in the Registry Editor, see left) is called a Hive, and Hives contains Keys. Each key can contain other keys (sometimes referred to as sub-keys), as well as Values. The values contain the actual information stored in the Registry. There are three types of values; String, Binary, and DWORD - the use of these depends upon the context. There are six main branches, each containing a specific portion of the information stored in the Registry. They are as follows: * HKEY_CLASSES_ROOT - This branch contains all of your file association mappings to support the drag-and-drop feature, OLE information, Windows shortcuts, and core aspects of the Windows user interface. * HKEY_CURRENT_USER - This branch links to the section of HKEY_USERS appropriate for the user currently logged onto the PC and contains information such as logon names, desktop settings, and Start menu settings. * HKEY_LOCAL_MACHINE - This branch contains computer specific information about the type of hardware, software, and other preferences on a given PC, this information is used for all users who log onto this computer. * HKEY_USERS - This branch contains individual preferences for each user of the computer, each user is represented by a SID sub-key located under the main branch. * HKEY_CURRENT_CONFIG - This branch links to the section of HKEY_LOCAL_MACHINE appropriate for the current hardware configuration. * HKEY_DYN_DATA - This branch points to the part of HKEY_LOCAL_MACHINE, for use with the Plug-&-Play features of Windows, this section is dymanic and will change as devices are added and removed from the system. Speed Up Your Network Access
0
comments
Save to del.icio.us
0 hits!
Windows Xp: Speed Up Your Network Access Increasing network browsing speed: Does your computer slow down when you browse your local area network and connect to other computers that are sharing data? One of the most common causes of this slowdown is a feature of Windows Explorer that looks for scheduled tasks on remote computers. This effort can take some time on some computers and can really slow down your browsing. The window with which you are browsing the network may appear to freeze momentarily, as the system is waiting for a response from the remote computer. Windows XP: Speeding Disk Access Although this problem is a complex one, the solution is very simple. Instead of having to wait for the remote scheduled tasks, which is useless information to anyone who is not a system administrator remotely configuring scheduled tasks, you can disable this feature. In order to do this, you will have to change the System Registry and delete a reference to a key so that this feature will not be loaded. To do this, follow these steps:
Thursday, October 27, 2011
Speed Up Your Computer And Windows
0
comments
Save to del.icio.us
0 hits!
OK, every time I have to install, reinstall, or optimize someone elses XP setup I forget what I need to do, so I have to go throught dozens of magizines and find all the good useful tweaks that will speed up the computer and Windows. WinXP Tips & Trix - Repairing Damaged Winsock2
0
comments
Save to del.icio.us
0 hits!
Win XP Tips And Tricks And Winsock 2 Repair
0
comments
Save to del.icio.us
0 hits!
Winxp Tips And Tricks, Winsock 2 repair Win XP Tweaks
0
comments
Save to del.icio.us
0 hits!
Win XP Tweaks Try Yahoo Messeger With No Adds
0
comments
Save to del.icio.us
0 hits!
Yahoo Messeger, no add's How To Install XP Repair On Your PC
0
comments
Save to del.icio.us
0 hits!
XP REPAIR INSTALL: 1. Boot the computer using the XP CD. You may need to change the boot order in the system BIOS. Check your system documentation for steps to access the BIOS and change the boot order. 2. When you see the "Welcome To Setup" screen, you will see the options below This portion of the Setup program prepares Microsoft Windows XP to run on your computer: To setup Windows XP now, press ENTER. To repair a Windows XP installation using Recovery Console, press R. To quit Setup without installing Windows XP, press F3. 3. Press Enter to start the Windows Setup. do not choose "To repair a Windows XP installation using the Recovery Console, press R", (you do not want to load Recovery Console). I repeat, do not choose "To repair a Windows XP installation using the Recovery Console, press R". How To Find a Remote IP
0
comments
Save to del.icio.us
0 hits!
How to find a remote IP How To Step Up Your Own Server
Tag
Tech
0
comments
Save to del.icio.us
0 hits!
Your Own Home Server - Introduction
Wednesday, October 26, 2011
Computer Acronyms
Tag
Tech
0
comments
Save to del.icio.us
0 hits!
--- A --- |
Subscribe now!
|