"I haven't lost my mind; I have a tape back-up somewhere." ~Author Unknown
Thursday, July 28, 2011
Tech Quote of the Day 7/28/11
Today's Tech Deals 7/28/11
MicroCenter: $249.99 2GB/320GB Desktop...$379.99 Dell 4GB/1TB Desktop...$259.99 Compaq 3GB/320GB Laptops
website: http://tinyurl.com/3zpjrx9
TheNerds: Great Deals on Drobo Data Storage...While Supplies Last!
website: http://tinyurl.com/3gmaltx
SameDayMusic: Sonic Savings Alert: Top Ten Deals 7/27 through 8/10
website: http://tinyurl.com/3ktzs4c
PCConnections: Tip the Scales in Your Favor - Data Center Power & Cooling
website: http://tinyurl.com/3g6upot
Geeks: Dell 10" Convertible Tablet Deal
website: http://tinyurl.com/3pbuvbm
TigerDirect: Barebone Alerts: Quad 4GB PC Kit $199...Quad 8GB 1.5HD PC Kit $279...HDMI Video $29...1TB Portable Ext HD $89...4GB DDR3 $17
website: http://tinyurl.com/3drwwus
website: http://tinyurl.com/3zpjrx9
TheNerds: Great Deals on Drobo Data Storage...While Supplies Last!
website: http://tinyurl.com/3gmaltx
SameDayMusic: Sonic Savings Alert: Top Ten Deals 7/27 through 8/10
website: http://tinyurl.com/3ktzs4c
PCConnections: Tip the Scales in Your Favor - Data Center Power & Cooling
website: http://tinyurl.com/3g6upot
Geeks: Dell 10" Convertible Tablet Deal
website: http://tinyurl.com/3pbuvbm
TigerDirect: Barebone Alerts: Quad 4GB PC Kit $199...Quad 8GB 1.5HD PC Kit $279...HDMI Video $29...1TB Portable Ext HD $89...4GB DDR3 $17
website: http://tinyurl.com/3drwwus
Beauty Of The Baud: iExploder-Web Browser Quality Assurance Tester
source: ehacking.net
There are different ways and method to measure the security of web application and web browsers, there are different tools available to exploit web browser and for browser side attack like Tabnapping and BeEF.
So you must consider both sides threat to make the security of your web server strong and strong. As discussed before different tools to do a penetration testing on web application.
Beside these wonderful tools if you want to fuzz force (fuzzers) to find the vulnerability that can cause a harm, than iExploder is a good choice to find problems and reliability of a web browser.
Read the complete article here.
Beauty Of The Baud: Enhanced Mitigation Experience Toolkit (EMET)
source: ehacking.net
"The common aspect about Windows is that windows is more vulnerable than Linux, well there is deep discussion on it but the point is that you can secure your windows OS too, there has been numerous techniques and tools has been discovered to secure a OS system from different attacks.
Enhanced Mitigation Experience Toolkit is a Microsoft product that is designed to help prevent hackers from gaining access to your system.
Vulnerabilities and exploits are discover everyday means you have to patch your software everyday for maximum security but what about 0-day attack, to counter against 0-day type attack you can use EMET product.The key features that are available on EMET discuss below."
To learn more click here.
"The common aspect about Windows is that windows is more vulnerable than Linux, well there is deep discussion on it but the point is that you can secure your windows OS too, there has been numerous techniques and tools has been discovered to secure a OS system from different attacks.
Enhanced Mitigation Experience Toolkit is a Microsoft product that is designed to help prevent hackers from gaining access to your system.
Vulnerabilities and exploits are discover everyday means you have to patch your software everyday for maximum security but what about 0-day attack, to counter against 0-day type attack you can use EMET product.The key features that are available on EMET discuss below."
Beauty Of The Baud: Best Way to Secure a Facebook Account
Posted: 26 Jul 2011 12:08 AM PDT
source ehacking.net
This is definitely a must read for anyone who uses Facebook.
"Social networking websites specially Facebook is now a common medium for all of us to share to learn to connect and to fun, if you are addict with the Facebook or if you are not addict in both case you want to secure your profile from hackers, you want to protect your online information that can be stolen via Facebook. We have previously discussed the risk and the tips to secure your Facebook account.
This is definitely a must read for anyone who uses Facebook.
"Social networking websites specially Facebook is now a common medium for all of us to share to learn to connect and to fun, if you are addict with the Facebook or if you are not addict in both case you want to secure your profile from hackers, you want to protect your online information that can be stolen via Facebook. We have previously discussed the risk and the tips to secure your Facebook account.
In my views that the previous tips is not enough to protect your Facebook account, in this article i will tell you the single and the best way to secure your Facebook account."
To see this article in its entirety please click here.
August Developer Events
This month's lineup for Developers
Take advantage of one or all of the educational seminars and workshops this month for developers. Discover all the latest tricks, tips and techniques to boost your productivity with Adobe products. Join us for seminars and workshops, where you'll be able to meet other developers at a live session in a city near you or learn when and what you want on your own time with online learning from your office or home.
BlackHat
August 2-4, 2011
Las Vegas, NVThe Black Hat Briefings have become the most important security conference series in the world by sticking to our core value: serving the information security community by delivering timely, actionable security information in a friendly, vendor-neutral environment.
Register now
RIACON
August 6-7, 2011
Rockville, MDWhere architects and developers of all levels come to gather, share and learn about creating the next generation of web based applications.
Register now
Dreamweaver: Design &
Create Your Website
August 18: Minneapolis, MN
October 20: Chicago, IL
November 17: Dallas, TX
December 15: Philadelphia, PALearn everything you need to know about building compelling websites using Adobe® Dreamweaver® CS5!
Learn more
Adobe MAX 2011
October 1-5, 2011
Los Angeles, CAThe best and brightest speakers are coming to MAX to share their knowledge about the fast-changing landscape of digital content creation and application development across screens. See who's speaking, then register early to secure your spot in popular sessions and labs.
Learn more
Working with Documents
made easy in ColdFusion 9
August 3, 2011
10:00 A.M. PTLearn how to easily generate office documents for reporting, decision making, and presentations. Read, create, and update spreadsheets using the new CFSPREADSHEET tag.
Register now
Building an Elegant
Front-End for SAP Data
August 16, 2011
10:00 A.M. PTJoin Enterprise Platform Evangelist: Anne Katherine Petteroe and discover the elegant and user-friendly front-end that you can build for SAP data using Adobe Digital Enterprise Platform.
Learn more
Roundtripping Adobe Captivate Content with Adobe Flash
August 25, 2011
8:00 A.M. PTJoin Vish and Dr. Pooja Jaisingh to learn how to instantly update Flash® applications used in Adobe Captivate projects, invoke Flash from within Adobe Captivate, and synchronize the files in Adobe Captivate and Flash with a single click.
Register now
Tips for Setting Up an ADEP Trial
August 30, 2011
10:00 A.M. PTThe best way to see the ground-breaking improvements in the new Adobe Digital Enterprise Platform is to try it for yourself. Join us for tips and tricks in setting up a trial.
Learn more
Building rich internet applications quickly using ColdFusion 9
August 30, 2011
10:00 A.M. PTLearn how ColdFusion® enables developers to rapidly build enterprise-ready Internet applications by condensing complex business logic into fewer lines of code.
Register now
Easily Build Mobile Apps for iOS and Android with Adobe
Join Christophe as he demonstrates how to build mobile apps for iOS and Android devices more easily using Adobe Flash Builder, Flex® & LiveCycle®. Learn how to minimize development time and reuse components across device platforms. Duration: 60 minutes.
Watch now
Next Generation Application Development: Announcing: the Adobe Digital Enterprise Platform
Get a demo and an in-depth look at the Adobe Digital Enterprise Platform. Will show the new architecture based on OSGI, JCR and Sling which can run directly in a Java virtual machine.
Watch now
Take advantage of one or all of the educational seminars and workshops this month for developers. Discover all the latest tricks, tips and techniques to boost your productivity with Adobe products. Join us for seminars and workshops, where you'll be able to meet other developers at a live session in a city near you or learn when and what you want on your own time with online learning from your office or home.
BlackHat
August 2-4, 2011
Las Vegas, NVThe Black Hat Briefings have become the most important security conference series in the world by sticking to our core value: serving the information security community by delivering timely, actionable security information in a friendly, vendor-neutral environment.
Register now
RIACON
August 6-7, 2011
Rockville, MDWhere architects and developers of all levels come to gather, share and learn about creating the next generation of web based applications.
Register now
Dreamweaver: Design &
Create Your Website
August 18: Minneapolis, MN
October 20: Chicago, IL
November 17: Dallas, TX
December 15: Philadelphia, PALearn everything you need to know about building compelling websites using Adobe® Dreamweaver® CS5!
Learn more
Adobe MAX 2011
October 1-5, 2011
Los Angeles, CAThe best and brightest speakers are coming to MAX to share their knowledge about the fast-changing landscape of digital content creation and application development across screens. See who's speaking, then register early to secure your spot in popular sessions and labs.
Learn more
Working with Documents
made easy in ColdFusion 9
August 3, 2011
10:00 A.M. PTLearn how to easily generate office documents for reporting, decision making, and presentations. Read, create, and update spreadsheets using the new CFSPREADSHEET tag.
Register now
Building an Elegant
Front-End for SAP Data
August 16, 2011
10:00 A.M. PTJoin Enterprise Platform Evangelist: Anne Katherine Petteroe and discover the elegant and user-friendly front-end that you can build for SAP data using Adobe Digital Enterprise Platform.
Learn more
Roundtripping Adobe Captivate Content with Adobe Flash
August 25, 2011
8:00 A.M. PTJoin Vish and Dr. Pooja Jaisingh to learn how to instantly update Flash® applications used in Adobe Captivate projects, invoke Flash from within Adobe Captivate, and synchronize the files in Adobe Captivate and Flash with a single click.
Register now
Tips for Setting Up an ADEP Trial
August 30, 2011
10:00 A.M. PTThe best way to see the ground-breaking improvements in the new Adobe Digital Enterprise Platform is to try it for yourself. Join us for tips and tricks in setting up a trial.
Learn more
Building rich internet applications quickly using ColdFusion 9
August 30, 2011
10:00 A.M. PTLearn how ColdFusion® enables developers to rapidly build enterprise-ready Internet applications by condensing complex business logic into fewer lines of code.
Register now
Easily Build Mobile Apps for iOS and Android with Adobe
Join Christophe as he demonstrates how to build mobile apps for iOS and Android devices more easily using Adobe Flash Builder, Flex® & LiveCycle®. Learn how to minimize development time and reuse components across device platforms. Duration: 60 minutes.
Watch now
Next Generation Application Development: Announcing: the Adobe Digital Enterprise Platform
Get a demo and an in-depth look at the Adobe Digital Enterprise Platform. Will show the new architecture based on OSGI, JCR and Sling which can run directly in a Java virtual machine.
Watch now
Wednesday, July 27, 2011
Randi Zuckerber Wants Online Anonymity To End
What is it with the Zuckerbergs? It seems they are so against privacy it's beginning to become disturbing. In regards to cyber-crimes and cyber-bullying I can understand their point, but a one size fits all method to stopping those problems is not the way to go about it.
Anytime a person's real information is put online it can be misused in the hands of those with malicious intent. For instance, knowing a person's name, age, city of residence, and a few searches can yield vital information including their current address. Access to them via a social network can yield realtime information such as their current whereabouts. Depending on the intent, we can see the switch from a cyber crime to a real-world crime; whether it be stalking, robbing the person's home, etc.
Will ending online anonymity stop cyber crimes? No. Will it curve cyber crime? Perhaps. Keep in mind everyday real-world crimes are committed by people who aren't hiding behind an online identity, yet still commit crimes. Food for thought.
Click here to read the article.
Tech Quote of the Day: 7/27/11
"Why do we want intelligent terminals when there are so many stupid users?"
Tuesday, July 26, 2011
Monday, July 25, 2011
Tech Quote of the Day: 7/25/11
"If Python is executable pseudocode, then perl is executable line noise."
Friday, July 22, 2011
Hacker Joseph Bernard Campbell Pleads Guilty
Cyberstalking and unauthorized access to a computer are two federal charges Joseph Bernard Campbell plead guilty to for stealing nude/semi-nude pictures of 19 women and posting those pictures on the women's Facebook page. He didn't stop there he posted those same pictures on porn sites and a forum. Read more about this story here.
Beauty Of The Baud: Chrome Extensions for Security Researcher
source: ehacking.net:
"The importance of browser is not a hidden truth in the process of penetration testing or ethical hacking, security researcher probably prefer Firefox as browser because it has a wide range of add ons that will help to make the test easier, however we have seen the rapid increase in the usage of google chrome, you can count chrome among the best browsers. On previous article we have discussed about the security extension that are available on Firefox.On this article I will discuss the best extensions (add ons) that are available for chrome browser and plays an important role for security researcher, web developers and ethical hacker."
To read the complete article click here.
Beauty Of The Baud: Backtrack 5- DNSenum Information Gathering Tool
source: ehacking.net
"Information gathering is generally a first step of ethical hacking/penetration testing, you need to get the maximum information about the victim because information is a key of success. As discussed before about information gathering in detail with different tools and technique like maltego and for DNS information gathering we have discussed DNSmap.
Information is weapon so in this article i will explain you how to get a information from DNS.
For this purpose i will use DNSenum, it is available on backtrack5 if you are using some other distribution and version than you can install it because it need only a perl, this may be a active perl or strawberry perl, you can run dnsenum on windows too. You can get the following information by using DNSenum."
Click here to read the article in its entirety.
Thursday, July 21, 2011
Today's Tech Deals 7/21/2011
Geeks: WiFi Night Vision Color Camera Blow-out
website: http://tinyurl.com/3petm9j
Amazon: Top Bargains
website: http://tinyurl.com/2ylfjd
NewEgg: July Storage Specials! $18.99 LG 24X DVD Burner, $129.99 WD 2TB 7200 RPM HDD...
website: http://tinyurl.com/3n7e5x5
TigerDirect: FIRST EVER 55" 1080p HDTV $699...46" 1080p HDTV $479...25" 1080p HDTV $179...Lockout or Not, These Deals are Hot
website: http://tinyurl.com/3jvrlb9
PCConnection: BlackBerry PlayBook Tablet - Only $599!
website: http://tinyurl.com/3ldl3xs
PSSL: Free Scratch Upgrade With Kontrol-S4 Purchase Before July 31st!
website: http://tinyurl.com/4xpbsun
Tuesday, July 19, 2011
Tech Quote of the Day: 7/19/11
"Like car accidents, most hardware problems are due to driver error."
Monday, July 18, 2011
Beauty Of The Baud: Virtualbox- Setup Windows On Linux Backtrack 5
source ehacking.net
"Virtual machines allow to run different operating system on a single box, A virtual machine is a program that run in an isolated partition on real computer(machine). As the name suggest virtual means it is not real, operating system install on VM do not run on real hardware. There are different software's available for visualization, i will discuss virtualbox for this article.
If you are using Linux or windows and want to create another virtual environment for another operating system, for Linux like Ubuntu based follow the tutorial below."
Read the entire article here.
Beauty Of The Baud: Radware Web Application Firewall-AppWall
source: ehacking.net
"Web application(s) are not secure any more, new web vulnerability and the way of attack discover everyday. By doing a penetration testing with different tools does not means that your web application secure, there are different vulnerability may find on the web application. For a manual security you need a fast team to update the operating system and application software's.
Read the entire article here.
"Web application(s) are not secure any more, new web vulnerability and the way of attack discover everyday. By doing a penetration testing with different tools does not means that your web application secure, there are different vulnerability may find on the web application. For a manual security you need a fast team to update the operating system and application software's.
There are different firewalls or IDS/IPS available to secure a web application.Radware’s AppWall is a Web Application Firewall (WAF) appliance that secures Web applications and enables PCI compliance by mitigating web application security threats and vulnerabilities. It prevents data theft and manipulation of sensitive corporate and customer information."
Read the entire article here.
Facebookers Beware!
Survey scammers are at it again. In a nutshell the scam hijacks the viewer's clicks and likes the page or shares the link with the viewers facebook friends. To find out more click here!
Beauty Of The Baud: Post of The Month-Computer Conferences For July 2011
Source: ehacking.net
From this article I have decided to write on the current conferences for the month this is called post of the month (PTM). The main aim of sharing this is to encourage the readers to understand the importance of conferences, you must go the computer related conference if you can, it will help you to understand the latest trend about computing, it will help you to learn about the latest research in the field of computer science.
Well there are so many conferences that is going on around your local premisses, so it very difficult for me to cover all of the conferences that is going to be held but i will try my best to get more and more information about conferences. Remember this article covers only the International conferences there are many conferences that is only for the locals, so I am not going to cover it.
July 18-21, 2011
There are two international conferences that is going to be held at 18-21 July, both are at Munich, GERMANY. First one is SAINT2011 the 11th IEEE/IPSJ International Symposium on Applications and the Internet, and the second one is COMPSAC 2011 35th IEEE International Computer Software and Applications Conference.
July 25-27, 2011
There are three international conferences available among these date, ARITH 2011, 20th IEEE Symposium on Computer Arithmetic will be held at Tübingen, Germany. ASONAM 2011, International Conference on Advances in Social Networks Analysis and Mining, Kaohsiung City, Taiwan. MASCOTS 2011, 19th Annual IEEE International Symposium on Modeling, Analysis and Simulation of Computer and Telecommunication Systems, Singapore, Singapore.
To learn more read the entire article here.
Goodbye Desktop Phone...Hello Cisco Cius!
Cisco's Cius enterprise tablet will definitely replace desktop phones, but it's much more than a phone replacement. Check out the video:
How To Root a Nook Color 1.2
Jake Ludington demonstrates how to root the Nook Color 1.2 to be able to use it as an Android Tablet.
Thursday, July 14, 2011
Today's Tech Deals 7/14/2011
DivX: Summer Sale! Half off all software
website: http://tinyurl.com/6jmc9t8
PcConnection: Stay Mobile with the HP TouchPad or the Mini 3105!
website: http://tinyurl.com/6c4nsyv
MusiciansFriend: Final Days To Save Up To 85% On Essentials & Accessories!
website: http://tinyurl.com/64mxxx9
Geeks: Digital Cordless Phone Set Liquidation
website: http://tinyurl.com/644ewsh
NewEgg: Mid-Year Electronics Update! $429.99 YAMAHA Receiver, $159.99 Sony Ericsson Unlocked...
website: http://tinyurl.com/6hm85on
Amazon: Our Best Deals on Camera Products
website: http://tinyurl.com/63z96dz
TigerDirect: Only @ Tiger: 3 Dual-Core Laptops under $300...42" 120Hz TV $399...FLip Camcorder $39...N Router $19...7" GPS $99...8GB MP3 $49...Sound Bar $49
website: http://tinyurl.com/6ejjvwg
SameDayMusic: Check Out These Accessories From Same Day Music!
website: http://tinyurl.com/3ktzs4c
Reminder: Hear how to get proactive about managing application performance
|
Did you know that most errors in application performance go unreported? So you end up operating in a vacuum, unaware that end-user productivity — and satisfaction — have been impacted until after the fact. Find out how to get more visibility into application performance, and avoid the loss of customers and revenue. Get proactive about managing application performanceJoin us for a complimentary webinar with Enterprise Management Associates (EMA), and learn how to consistently provide reliable end-user performance within your most critical applications. Discover the steps for proactively managing application performance across your entire global organization — from the data center to the cloud, Internet, and beyond. Register for the webinar now. How to Achieve Proactive Application Performance Management When: Thursday, July 21, 2011 11:00 a.m. CDT Featured Speakers: Julie Craig, EMA Leslie Minnix-Wolfe, BMC Software |
Virtual Computing & Captain America Special Event
Learn the “how” of end-to-end virtual computing —
from desktop delivery to networking and the Cloud!
from desktop delivery to networking and the Cloud!
“From Wow to How” is back with a new feature movie that shows you how to make end-to-end virtual computing a reality — from the datacenter to any device. Register for this 2 hour event and
you’ll learn:
you’ll learn:
• | HOW to harness the full power of virtual desktops — beyond “just VDI.” Specific use cases show how you can tailor this amazing technology to your exact business needs | ||
• | HOW to build an infrastructure that ensures your virtual desktops are delivered with 100% availability, iron-clad security, and high performance for branch offices | ||
• | HOW to provide a single point of authentication for users to securely access ALL applications — including those on hosted IaaS or private cloud platforms |
Register and you could win an iPad 2!
From Wow to How 2:
Virtual Desktops,
Networking and the Cloud
Virtual Desktops,
Networking and the Cloud
Please join us for this live movie event on July 21, 2011 at 8am in one of more than 50 cities.
For some extra “wow” be our
guest afterwards for a special
advanced screening event
featuring Captain America:
The First Avenger.
guest afterwards for a special
advanced screening event
featuring Captain America:
The First Avenger.
500 Things Every IT Manager Needs To Know
Limited Time Offer - *Save $10.00 500 Things Every IT Manager Needs To Know: Volume 1 |
Productivity Development Infrastructure Cost Control Analyze *Save $10.00 |
Improve your team's productivity, manage your budget and develop your career! TechRepublic's 500 Things Every IT Manager Needs to Know: Volume 1 breaks down some of the most important facets of IT management into easily digestible lists. Built with content from our popular 10 Things and Five Tips blogs, it covers these areas: - Staff Management - Project Management - Infrastructure Planning - Migration and Upgrades - Purchase Decisions - Budgeting and Cost Control - Security - Career Development Both IT novices and seasoned pros will benefit from the concise but comprehensive tidbits found in TechRepublic's 500 Things Every IT Manager Needs To Know: Volume 1. Read Full Description *Use Coupon Code: CPN62261010160 during checkout to receive your discount. (DISCLAIMER: Coupon valid on select item only. Sales tax, GST, VAT, shipping and handling are not included in the total purchase calculation. Coupon not valid for cash or toward previously purchased items. Coupon is non-transferable. To receive discount, you MUST enter the coupon code provided above exactly as written (coupon code is case sensitive) at the time of checkout, or you will NOT receive the discount. Customer Support will not be able to apply savings to orders once submitted on-line. Order must be placed on-line, with coupon code; can not be placed over the phone. Discount will be reflected during checkout; check your order before you submit it. All sales final - no price corrections, credit, refunds or exchanges. Coupon good only until 11:59pm ET, July 18th, 2011 or once redeemed, which ever occurs first. Void where prohibited or restricted by law.) |
Beauty Of The Baud: WebSurgery- Web Application Security Tool
Source: ehacking.net
"Web application security is one of the key point to measure the security of a company profile. Website is very important, if the website is personal or if you are responsible for the website of your client, in both cases you must be careful about the security of the website. It is a good practice to be update to secure from exploitation but what about application layer security.
You must do a penetration testing on web application to find the vulnerabilities like, SQL-injection, XSS and others.
There are so many tools that has been discussed before but there is another good tool called WebSurgery, WebSurgery is a suite of tools for security testing of web applications. It was designed for security auditors to help them with the web application planning and exploitation. Currently, it uses an efficient, fast and stable Web Crawler, File/Dir Bruteforcer and Fuzzer for advanced exploitation of known and unusual vulnerabilities such as SQL Injections, Cross site scripting (XSS), brute-force for login forms, identification of firewall-filtered rules etc."
Beauty Of The Baud: 7 Best Linux Server Security Tips
Linux seems to be the most secure and powerful server, but remember nothing is secure in the world you have to make the thing secure, if you are running Linux server and not patched it than it may be compromise so the point is that an administrator should make the box secure from hackers (crackers). There are different level of security like application layer security means web application security like SQL-Injection, XSS.
Application layer security is not the point of this article, in this article I will discuss Linux server hardening security tips.
Use Strong Passwords
I consider that you have an idea about the importance of passwords and password based attack, so use strong password that has upper and lower case alphabet, numbers and special characters, try to make the password policy strict.
Use Cryptography
Cryptography the art of secrete communication, all the data that goes through network may be sniffed so use encryption technique to secure your data. Use OpenVPN is a cost-effective, lightweight SSL VPN. Use scp, ssh, rsync, or sftp for file transfer.
Avoid Remote Log Ins
As mentioned on the previous tip that data goes on the network may be captured, services like FTP, Telnet, and different file transfer protocols may be compromised so avoid using these services by a remote location if you need to use these services than you must use secure channel like use OpenSSH, FTPS etc.
Patched Management
There are different exploits available for different software(s) and services, so make sure to follow the patch management strategy to keep update your Linux kernel and all the software's and services running on that server. Keep up to date your OS to secure the Linux, if you have a question like why patch management and about patch management policies than follow the link to learn.
Use Intrusion Detection Systems
Firewalls has different limitation so use intrusion detection systems (IDS), you must be configure both network IDS (NIDS) and host IDS (HIDS) to protect the attacks like DOS,port scanning etc. We have discussed about IDS in different articles with detail click here to learn.
Use Linux Security Extensions
To secure the Linux kernel is the key point to secure the Linux server, there are various security packages available to provide the additional security to Linux kernel, try to use the software's like SELinux, AppArmor or GRSecurity.
Use Log Management
Use a strong log management policy to keep an eye on the changes and errors, beside Linux built in log management files there are different software's that provides auditing and log management policies.
Recommended reading: 20 Linux Server Hardening Security Tips
Note: If you want to learn more about Linux and Windows based Penetration testing, you might want to subscribe our RSS feed and Email Subscription or become our Facebook fan! You will get all the latest updates at both the places.
Beauty Of The Baud: How to Protect Online Content
Content is king, you have heard this sentence so many times before, you spend much time on researching and writing a unique article for your blog and the other the theft try to steal your article.
Plagiarism is now the rising and a biggest threat for content writer, if you are running your own blog and if someone copying your articles than it will give you a pain.
In this article I will discuss how protect your blog content for being copying, there are various steps involve to stop these activities.Content Detection
The first step is to detect your content on the Internet, Internet is not a small network so it seems that it is difficult to detect some content on the Internet, while there are some tools that have an ability to find your work effectively.
- Copyscape: It is one my favorite and one of the best web service to find plagiarism on the Internet, enter the URL of your content than copyscape will tell you about the theft content in percentage and by word. It is a good way to prove that content is your.
- Plagiarisma: Just like copyscape, plagiarisma is the same service that provides the same feature.
- Google Alerts: Google is a friend yes google is a best friend, if you dont want to check the plagiarism by yourself than google do this for you.
Work License
Do you have a license, yes license for your content. It is a best practice to show your license with your work so that copier think before copying your work because you have a legal rights.
You must have an idea about the copyright act for your country, while on cyber world you can get the Creative Commons (CC) License from Creative Commons Organization for your work. This organisation has categorized the license like to share or to protect your work.
- Click here to choose the license.
- Fill out the form by your appropriate need.
- Get the HTML code to put on your blog.
- Put the code on the best place so that every visitor will see this notification.
Take Action Against The Copier
I suggest that first you should contact the copier via contact us form or you can get the contact information by using whois, if you want to take some legal action against the copier than you can do this, below is the some tips to take action.
- blogger.com: There are different blogs that are hosted on blogger, so if the copier blog hosted on blogger you must report to blogger against the copier activities.
- Report to DMCA: Another good way to take action, if you want to remove your content from copier website, than report DMCA to this activity.
- Scribd: If someone copying your work on scribd than you can take action against him via Scribd copyright act.
- Report to Adsense: Click here to report.
- Below are some more way to take action.
Beauty Of The Baud: Computer Forensic Framework-PTK
"Computer forensic is a branch of digital forensic science and an act to investigate, analyze, identify and collect evidence or information which is encoded or store.
Computer forensic science is a growing field and different colleges offers variety of degree in this field, however there are different tools and tricks available to do the job done. In backtrack 5 there is a separate section for forensic tools.
Beside tools and tricks there are numerous training available on Internet.
PTK forensics is a computer forensic framework for the command line tools in the SleuthKit plus much more software modules. This makes it usable and easy to investigate a system.
PTK forensics is more than just a new graphic and highly professional interface based on Ajax and other advanced technologies; it offers numerous features such as analysis, search and management of complex digital investigation cases." source: ehacking.net
For more information click here!
Tuesday, July 12, 2011
Beauty Of The Baud: Fast Track Hacking-Backtrack5 Tutorial
Backtrack 5 contains different tools for exploitation, as discussed before about metasploit and armitage for this article i will discuss about fast track, however I have received different request to write more tutorial for armitage, i will write for armitage too later. Fast Track is a compilation of custom developed tools that allowpenetration testers the ease of advanced penetration techniques in a relatively easy manner.
Some of these tools utilize the Metasploit framework in order to successfully create payloads, exploit systems, or interface within compromised systems.
If you are beginner and dont have any idea about vulnerability, payload and shell code than first read the article " Introduction to metasploit".
For this tutorial i will use backtrack 5, however you can use some other version(s).
How To Use Fast-Track For Payload Generation
There are three interface available for fast track on backtrack 5, i will show you how to generate payload by using fast track, you can use fast track web interface too for different purposes like auto-pwn. Follow the procedure.
- Click on Applications-->Backtrack-->Exploitation tools-->Network exploitation tools-->Fast-Track-->fasttrack-interactive
- You will get the first window that is menu windows, enter number 8 that is payload generator number.
- On the next window will ask you about payload enter number 2 that is "Reverse_TCP Meterpreter".
- Now we need to encode our payload so that it can easily bypass antivirus software's and IDS. I enter number 2 you can enter of your choice.
- On the next we have to enter IP address of the victim than port number, I have scanned my local network using nmap, you can do this click here to learn nmap. Then select the type of payload either EXE or shell code.
- Now a file name payload.exe has been created, you can get the file by going on filesystem-->pentest>exploit-->fasttrack-->payload.exe.
- Use some social engineering technique to run this payload on the victim box than on the fast-track window start listing your payload to get the hack done. When everything is fine you will get the command window of the victim.
- For more backtrack5 tutorial click here.
Subscribe to:
Posts (Atom)