Our social:

Latest Post

Sunday, 15 July 2012

CONFIDENCE STEMS FROM OPTIMISM






Tired of thinking negative all the time? Tired of always being scared of the consequences? May be it is time to snap out of pessimism and reclaim your life


No one has ever profited from negative thinking. If you are a bright student and get bogged down unnecessarily by fears of failure, you may need to rethink the direction in which your life is heading. It might be symptomatic of a larger emotional problem like insecurity and self-hate. There is little to gain from being a negative nancy.

Negative thoughts distract you from your responsibilities and enervate you. Do not be tricked into considering your imagination a part of reality. And, if you have decided to turn a new leaf, here are some points you should pay attention to.

Shift focus: Every time you catch yourself being negative, immediately shift focus to something pleasant and positive.


Decide to be happy: Happiness is a state of mind. You have to decide to be happy. More importantly, create happiness and do not be paranoid about the fear of failure.

Revise your attitude and words: Instead of saying ‘This task is not meant for me,’ or ‘I am sure to flunk,’ try this – ‘What can I learn from this task?’ and ‘Maybe I have done better than I think.’


Surround yourself with positive people: During stressful times like declaration of exam results, go hang out with family members, friends or mentors who believe in you and who usually will oblige you with a pep talk. Avoid indulging in negative criticism of your life and do not let others de-motivate you.

Meditate: If your condition is chronic, then it is best you go join yoga or meditation classes just about now. Professional help will heal your mind and body and prevent exacerbation of the situation.
Be selective of music: Music affects your disposition to a large extent. Sad music will only make you feel more pathetic. Get rid of that depressing sappy collection and stock up on something interesting and upbeat.

Focus on someone else: Shift focus to something or someone else. When you are not working, try and do something for someone else every day. Show them you care and stop being self-obsessed.

Accept yourself: Most importantly, get real and accept yourself. Don’t abuse yourself by seeking perfection in everything you do. Be realistic. No one is perfect. There are things you are good at and things probably could do just fine. Furthermore, success depends on many a factor you don’t have control over. Therefore, accept failure and success as part of life.

If you have never quite been the topper in class and have similar issues, then resolve to work hard, give each exam your best shot. Don’t neglect your inert talents. You might find your niche elsewhere and not academics. Bottom of the matter is that not everyone excels at everything. Sometimes, great achievers are those who have gone off the beaten track. Be brave and life will be sunny.


SUCCESS MANTRA: PRIORITISE WORK AND THEN FOCUS




Are you overburdened with work? Do you take on more assignments than you can handle? Sometimes, in spite of being energetic and motivated, you might fail to meet deadlines and targets. Ironically, this could be due to a general lack of focus.

The fact of the matter is that you have too much on your plate and by trying to concentrate on all your projects you are attentive to none.

Focus is the key
Albert Einstein was a man who mastered the art of taking up one task at a time, focusing on it until it was achieved and shutting out everything else on his list and in life. The story goes that Einstein became so involved and focused while working on the theory of relativity that his marriage suffered and his hair turned grey almost overnight. He suspended all his engagements with various universities and institutes. This period between 1912-15, which he devoted to a single project, produced one of the most radical scientific revolutions in history – the theory of relativity.
Not all of us can be Einstein, especially in this day and age. But what Einstein proved, besides the theory of relativity, is that focused work on a single project results in higher productivity than handling a dozen assignments at the same time.

One at a time
Swami Vivekananda once said, “Take up one idea. Make that one idea your life - think of it, dream of it, live on that idea.”
These are times of insecurity and with so many things on mind, everyone believes in multi tasking to avoid complete failure. Instead, you should work consciously at maximising your chances of success.
So if your list is swarmed with “things to do” then the best way to de-clutter your senses is to prioritise your tasks. This will clear your mind and accelerate your progress.
What is important is that you are able to sift the most relevant and important projects from the mess of tasks you have piled up. Here is how you can get rid of pending work.
  • First, divide your tasks: Put them under professional, personal and extracurricular headers. Pick the top two from each and try and complete them in a week.
  • Prioritise important jobs: Under each heading, enlist the most crucial of assignments.
  • Cross out the irrelevant: Delete items from your list that are not going to help you achieve your goals.
  • Organise your obligations: Give yourself two to three weeks to get rid of pending assignments. Once you have these off your chest, the real work will await your undivided attention.
  • Avoid new undertakings: When you are done with these smaller nagging commitments you will be left with ample time for your own pet projects. Concentrate and try not to take on new ones. Postpone thoughts of fresh ventures till you have completed a substantial portion of work assigned.
After a few practice sessions, you will see how The Einstein Principle works. You will learn to be focused, disciplined and organised. Above all, you might learn how easy it is to accomplish big targets when you can effectively manage your distractions and worries – even if these are related to work. After all, if you are driven in life it is a pity to let yourself be bogged down needlessly.

Hope enjoyed the post.

Keep visiting for more interesting posts.

18 EBOOKS OF C,C++ & OBJ-C



Hi guys i have some ebooks for those who want to learn c,c++ and obj-c.

so here is the link

18 Ebooks of c,c++ & obj-c

Keep visiting

Friday, 13 July 2012

WINDOWS HACKING






>>Open COMMAND PROMPT while Locked by User.

>open notepad
>type www.command.com
> then save as cmd.bat at desktop
>then enter now its open.....enjoy

>>If your computer is slow?
then clean up the ram..

>Open notepad
>type FREEMEM=SPACE(64000000)
>Save it as ram.vbs
now run the script.
Check out !!


>>CracK BIOS Password

>Open the CPU
>Observe the Motherbord
>Remove the Silver Battery(3v)
>Wait 2 minutes and place the Battery
>>Restoring a Lost Desktop-
>Start
>Run
Type a period " . "
Then press Enter


>>If ur PC is hanged then do this.
Press shift+ctrl+esc or ctrl+alt+del
n den click on 'END TASK'
ur PC is runing now

>>create folder without name

>select any folder
>rename it
>press alt & type 0160 or 255
>enter

>>Amazing trick for use
Windows Backup Utility if installed
go to run
type ntbackup
ok
Now use backup

>>Increase the speed of your file sharing

Simple Way to Share Multiple Folders :
Goto Run and Type SHRPUBW.EXE then press Enter
Select the folder you want to share and Set permissions,
your share folder is ready now.....


>>Turning off the Help on Min, Max, Close Icons

When the mouse goes over the minimize, maximize and close icons on the upper
right hand side of a window.

To disable that display:
1. Start Regedit
2. Go to HKEY_CURRENT_USER \ Control Panel \ Desktop
3. Create a String Value called MinMaxClose
4. Give it a value of 1
5. Reboot


>>FIX CORRUPTED FILE IN WINDOW XP
1.Load XP cd into cd drive

2. go to Run

3. type sfc/scannowok

4. Then copy its lost file frm cd.

  >>AUTO DELETE TEMPORARY FOLDER.!!

what i prefer is %temp% " without quotes.. at Start -> Run.. this opens ur temp folder n den u cal erase it nearly
First go into gpedit.msc
Next select -> Computer Configuration/Administrative Templates/Windows Components/Terminal Services/Temporary Folder
Then right click "Do Not Delete Temp Folder Upon Exit"
Go to properties and hit disable. Now next time Windows puts a temp file in
that folder it will automatically delete it when its done! Note from Forum Admin: Remember, GPEDIT (Group Policy Editor) is only available in XP Pro.

>>Locking Folders:

    Consider you want to lock a folder named XXXX in your E:\, whose path is E:\XXXX.
    Now open the Notepad and type the following

[code]ren xxxx xxxx.{21EC2020-3AEA-1069-A2DD-08002B30309D}[/code]

    Where xxxx is your folder name. Save the text file as loc.bat in the same drive.
    Open another new notepad text file and type the following

[code]ren xxxx.{21EC2020-3AEA-1069-A2DD-08002B30309D} xxxx[/code]

    Save the text file as key.bat in the same drive.

Steps to lock the folder:

    To lock the xxxx folder, simply click the loc.bat and it will transform into control panel icon which is inaccessible.
    To unlock the folder click the key.bat file. Thus the folder will be unlocked and the contents are accessible.

>>Locking Drives:

We don’t usually prefer to lock our drives, but sometimes it becomes nesscary. Say for instance you might have stored your office documents in D:\ and you don’t want your kids to access it, in such case this technique can be useful for you. Please don’t try this tweak with your root drive (usually C:\ is the root drive) since root drives are not intended to be locked because they are mandatory for the system and application programs.

    Start & Run and type Regedit to open Registry editor
    Browse HKEY_CURRENT_USER\Software\Microsoft\Windows\Curre ntVersion\Policies\Explorer
    Create a new DWORD value NoViewOnDrive and set its value as

2^ (Alpha Number of Drive Letter-1) where Alpha number are simple counting of alphabets from A to Z as 1 - 26
For example: to lock C:\, Alpha number of C is 3 so 2^ (3-1) = 4 (decimal value)

    To lock more drives, calculate the value of each drive and then set sum of those numbers as value
    To unlock your drive just delete the key from the registry.

>>To Remove Recyle Bin From Your Desktop

Open Regedit by going to START - RUN and type Regedit and hit enter. Then you should navigate to following entry in registry HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\ Desktop\NameSpace\{645FF040-5081-101B-9F08-00AA002F954E} and delete it. This action should remove recycle bin from your desktop.

>>Disable the Security Center warnings

Follow the given steps to edit the computer registry for disable message:
First click on Start button then type Regedit in Run option.
Here locate the location to:
• HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Security Center
Here in right side panel, double click on Anti Virus Disable Notify and set its value 1.
Now close the registry editor and restart your computer after any changes to go into effect.

>>HIDE DRIVES
How to Hide the drives(c:,d:,e:,a:...etc)

To disable the display of local or networked drives when you click My Computer.
1.Go to start->run.Type regedit.Now go to:

HKEY_CURRENT_USER\Software\Microsoft\Windows\CurrentVersion\Policies

 \Explorer

2.In the right pane create a new DWORD item and name it NoDrives(it is case sensitive).

3.Modify it's value and set it to 3FFFFFF (Hexadecimal) .

4.Restart the computer.

5.Now when you click on My Computer, no drives will be shown(all gone...).

To enable display of drives in My Computer, simply delete this DWORD item that you created. Restart your computer. All the drives are back again.

>>Show your name in taskbar

Trick to Show Your name after time in taskbar...
Try this trick to add up ur name in place of AM and PM beside time Its simple

Step-1:- Navigate to -> Start -> Control Pannel -> Regional and Language Option -> Click on Customize -> Go to TIME Tab -> Change AM symbol and PM symbol from AM and PM to ur name -> Apply -> Ok ...
Did It change? If not, follow step-2 below.

Step2:- Now go to time in taskbar and Double Click it to open "Date and time property" ...Look place where time changes in digital form i.e. 02:47:52 AM , click to arrow to change the AM or PM by selecting and press arrow. It will Show ur name or name that was entered by u, Apply -> OK
 Done

For educational purpose.
Keep visiting.


NETWORK HACKING





Ways To Attack a Network:

Ping

The IP address gives the attacker’s Internet address. The numerical address like 212.214.172.81 does not reveal much. You can use PING to convert the address into a domain name in WINDOWS: The Domain Name Service (DNS) protocol reveals the matching domain name.  PING stands for “Packet Internet Groper” and is delivered with practically every

Internet compatible system, including all current Windows versions.

Make sure you are logged on to the net. Open the DOS shell and enter

the following PING command:

Ping –a 123.123.12.1

Ping will search the domain name and reveal it. You will often have information on the provider the attacker uses e.g.:

 dialup21982.gateway123.provider.com

Pinging is normally the first step involved in hacking the target. Ping uses

ICMP (Internet Control Messaging Protocol) to determine whether the target host is reachable or not. Ping sends out ICMP Echo packets to the target host, if the target host is alive it would respond back with ICMP
Echo reply packets.

All the versions of Windows also contain the ping tool. To ping a remote host follow the procedure below.

Click Start and then click Run. Now type ping <ip address or hostname>

(For example: ping yahoo.com)

This means that the attacker logged on using “provider.com”.

Unfortunately, there are several IP addresses that cannot be converted

into domain names.

For more parameter that could be used with the ping command, go to

DOS prompt and type ping /?.

Ping Sweep

If you are undetermined about your target and just want a live system, ping sweep is the solution for you. Ping sweep also uses ICMP to scan for live systems in the specified range of IP addresses. Though Ping sweep is similar to ping but reduces the time involved in pinging a range of IP addresses. Nmap (http://www.insecure.org) also contains an option
to perform ping sweeps.



Tracert: 

 Tracert is another interesting tool available to find more interesting information about a remote host. Tracert also uses ICMP.
Tracert helps you to find out some information about the systems involved in sending data (packets) from source to destination. To perform a tracert follow the procedure below.

Tracer connects to the computer whose IP has been entered and reveals all stations starting from your Internet connection. Both the IP address as well as the domain name (if available) is displayed.

If PING cannot reveal a name, Traceroute will possibly deliver the name of the last or second last station to the attacker, which may enable conclusions concerning the name of the provider used by the attacker and the region from which the attacks are coming.



Go to DOS prompt and type tracert <destination address>

 (For example: tracert yahoo.com).

But there are some tools available like Visual Traceroute which help you

even to find the geographical location of the routers involved.

http://www.visualware.com/visualroute



Port Scanning:-

After you have determined that your target system is alive the next  important step would be to perform a port scan on the target system.

There are a wide range of port scanners available for free. But many of  them uses outdated techniques for port scanning which could be easily recognized by the network administrator. Personally I like to use Nmap (http://www.insecure.org) which has a wide range of options. You can download the NmapWin and its source code from:

http://www.sourceforge.net/projects/nmapwin.



Apart from port scanning Nmap is capable of identifying the Operating system being used, Version numbers of various services running,

firewalls being used and a lot more.



Common ports:

Below is a list of some common ports and the respective services

running on the ports.

20 FTP data (File Transfer Protocol)

21 FTP (File Transfer Protocol)

22 SSH

23 Telnet

25 SMTP (Simple Mail Transfer Protocol)

53 DNS (Domain Name Service)

68 DHCP (Dynamic host Configuration Protocol)

79 Finger

80 HTTP

110 POP3 (Post Office Protocol, version 3)

137 NetBIOS-ns

138 NetBIOS-dgm

139 NetBIOS

143 IMAP (Internet Message Access Protocol)

161 SNMP (Simple Network Management Protocol)

194 IRC (Internet Relay Chat)

220 IMAP3 (Internet Message Access Protocol 3)

389 LDAP

443 SSL (Secure Socket Layer)

445 SMB (NetBIOS over TCP)

Besides the above ports they are even some ports known as Trojan

ports used by Trojans that allow remote access to that system.



Vulnerability Scanning:


Every operating system or the services will have some vulnerabilities due to the
programming errors. These vulnerabilities are crucial for a successful hack. Bugtraq is
an excellent mailing list discussing the vulnerabilities in the various system. The
exploit  code writers write exploit codes to exploit these vulnerabilities existing in a system.

There are a number of vulnerability scanners available to scan the host for known vulnerabilities. These vulnerability scanners are very important for a network administrator to audit the network security.

Some of such vulnerability scanners include Shadow Security Scanner,Stealth HTTP Scanner, Nessus, etc. Visit

http://www.securityfocus.com vulnerabilities and exploit codes of various

operating systems. Packet storm security

(http://www.packetstormsecurity.com) is also a nice pick.



SOME TOOLS:

1. Nmap

I think everyone has heard of this one, recently evolved into the 4.x series.

Nmap (Network Mapper) is a free open source utility for network exploration
or security auditing. It was designed to rapidly scan large networks, although
it works fine against single hosts. Nmap uses raw IP packets in novel ways to
determine what hosts are available on the network, what services (application
name and version) those hosts are offering, what operating systems (and OS
versions) they are running, what type of packet filters/firewalls are in use,
and dozens of other characteristics. Nmap runs on most types of computers and
both console and graphical versions are available. Nmap is free and open source.

Can be used by beginners (-sT) or by pros alike (packet_trace). A very
versatile tool, once you fully understand the results.

Get Nmap Here - http://www.insecure.org/nmap/download.html


2. Nessus Remote Security Scanner

Recently went closed source, but is still essentially free. Works with a client-
server framework.

Nessus is the worlds most popular vulnerability scanner used in over 75,000
organizations world-wide. Many of the worlds largest organizations are
realizing significant cost savings by using Nessus to audit business-critical
enterprise devices and applications.

Get Nessus Here - http://www.nessus.org/download/


3. John the Ripper

Yes, JTR 1.7 was recently released!

John the Ripper is a fast password cracker, currently available for many
flavors of Unix (11 are officially supported, not counting different
architectures), DOS, Win32, BeOS, and OpenVMS. Its primary purpose is to detect
weak Unix passwords. Besides several crypt(3) password hash types most commonly
found on various Unix flavors, supported out of the box are Kerberos AFS and
Windows NT/2000/XP/2003 LM hashes, plus several more with contributed patches.

You can get JTR Here - http://www.openwall.com/john/


4. Nikto

Nikto is an Open Source (GPL) web server scanner which performs comprehensive
tests against web servers for multiple items, including over 3200 potentially
dangerous files/CGIs, versions on over 625 servers, and version specific
problems on over 230 servers. Scan items and plugins are frequently updated and
can be automatically updated (if desired).

Nikto is a good CGI scanner, there are some other tools that go well with Nikto
(focus on http fingerprinting or Google hacking/info gathering etc, another
article for just those).

Get Nikto Here - http://www.cirt.net/code/nikto.shtml


5. SuperScan

Powerful TCP port scanner, pinger, resolver. SuperScan 4 is an update of the
highly popular Windows port scanning tool, SuperScan.

If you need an alternative for nmap on Windows with a decent interface, I
suggest you check this out, it’s pretty nice.

Get SuperScan Here - http://www.foundstone.com/index.htm
subnav=resources/navigation.htm&subcontent=/resources/proddesc/superscan4.htm


6. p0f

P0f v2 is a versatile passive OS fingerprinting tool. P0f can identify the
operating system on:

- machines that connect to your box (SYN mode),
- machines you connect to (SYN+ACK mode),
- machine you cannot connect to (RST+ mode),
- machines whose communications you can observe.

Basically it can fingerprint anything, just by listening, it doesn’t make ANY
active connections to the target machine.

Get p0f Here - http://lcamtuf.coredump.cx/p0f/p0f.shtml


7. Wireshark (Formely Ethereal)

Wireshark is a GTK+-based network protocol analyzer, or sniffer, that lets you
capture and interactively browse the contents of network frames. The goal of
the project is to create a commercial-quality analyzer for Unix and to give
Wireshark features that are missing from closed-source sniffers.

Works great on both Linux and Windows (with a GUI), easy to use and can
reconstruct TCP/IP Streams! Will do a tutorial on Wireshark later.

Get Wireshark Here - http://www.wireshark.org/


8. Yersinia

Yersinia is a network tool designed to take advantage of some weakeness in
different Layer 2 protocols. It pretends to be a solid framework for analyzing
and testing the deployed networks and systems. Currently, the following network
protocols are implemented: Spanning Tree Protocol (STP), Cisco Discovery
Protocol (CDP), Dynamic Trunking Protocol (DTP), Dynamic Host Configuration
Protocol (DHCP), Hot Standby Router Protocol (HSRP), IEEE 802.1q, Inter-Switch
Link Protocol (ISL), VLAN Trunking Protocol (VTP).

The best Layer 2 kit there is.

Get Yersinia Here - http://yersinia.sourceforge.net/


9. Eraser

Eraser is an advanced security tool (for Windows), which allows you to
completely remove sensitive data from your hard drive by overwriting it several
times with carefully selected patterns. Works with Windows 95, 98, ME, NT,
2000, XP and DOS. Eraser is Free software and its source code is released under
GNU General Public License.

An excellent tool for keeping your data really safe, if you’ve deleted it..make
sure it’s really gone, you don’t want it hanging around to bite you in the ass.

Get Eraser Here - http://www.heidi.ie/eraser/download.php


10. PuTTY

PuTTY is a free implementation of Telnet and SSH for Win32 and Unix platforms,
along with an xterm terminal emulator. A must have for any h4. 0r wanting to
telnet or SSH from Windows without having to use the crappy default MS command
line clients.

Get PuTTY Here. - http://www.chiark.greenend.org.uk/~sgtatham/putty/


11. LCP

Main purpose of LCP program is user account passwords auditing and recovery in
Windows NT/2000/XP/2003. Accounts information import, Passwords recovery, Brute
force session distribution, Hashes computing.

A good free alternative to L0phtcrack.

LCP was briefly mentioned in our well read Rainbow Tables and RainbowCrack
article.

Get LCP Here - http://www.lcpsoft.com/english/download.htm


12. Cain and Abel

My personal favourite for password cracking of any kind.

Cain & Abel is a password recovery tool for Microsoft Operating Systems. It
allows easy recovery of various kind of passwords by sniffing the network,
cracking encrypted passwords using Dictionary, Brute-Force and Cryptanalysis
attacks, recording VoIP conversations, decoding scrambled passwords, revealing
password boxes, uncovering cached passwords and analyzing routing protocols.
The program does not exploit any software vulnerabilities or bugs that could
not be fixed with little effort.

Get Cain and Abel Here - http://www.oxid.it/cain.html


13. Kismet

Kismet is an 802.11 layer2 wireless network detector, sniffer, and intrusion
detection system. Kismet will work with any wireless card which supports raw
monitoring (rfmon) mode, and can sniff 802.11b, 802.11a, and 802.11g traffic.

A good wireless tool as long as your card supports rfmon (look for an orinocco
gold).

Get Kismet Here - http://www.kismetwireless.net/download.shtml


14. NetStumbler

Yes a decent wireless tool for Windows! Sadly not as powerful as it’s Linux
counterparts, but it’s easy to use and has a nice interface, good for the
basics of war-driving.

NetStumbler is a tool for Windows that allows you to detect Wireless Local Area
Networks (WLANs) using 802.11b, 802.11a and 802.11g. It has many uses:

Verify that your network is set up the way you intended.
Find locations with poor coverage in your WLAN.
Detect other networks that may be causing interference on your network.
Detect unauthorized rogue access points in your workplace.
Help aim directional antennas for long-haul WLAN links.
Use it recreationally for WarDriving.

Get NetStumbler Here - http://www.stumbler.net/

15. Hping

To finish off, something a little more advanced if you want to test your TCP/IP
packet monkey skills.

hping is a command-line oriented TCP/IP packet assembler/analyzer. The
interface is inspired to the ping unix command, but hping isn’t only able to
send ICMP echo requests. It supports TCP, UDP, ICMP and RAW-IP protocols, has a
traceroute mode, the ability to send files between a covered channel, and many
other features.

Get hping Here - http://www.hping.org/

For educational purpose only.
Keep visiting.


Intrusion Detection System (IDS)


>>Intrusion Detection System (IDS):

A system that tries to identify attempts to hack or break into a computer system or to misuse it. IDSs may monitor packets passing over the network, monitor system files, monitor log files, or set up deception systems that attempt to trap hackers.

Computer systems have become more vulnerable to intrusions than ever. Intrusion Detection is a security technology that allows not only the detection of attacks, but also attempts to provide notification of new attacks unforeseen by other components. Intrusion detection is an important component of a security system, and it complements other security technologies.

>>How does an IDS work?

While there are several types of IDSs, the most common types work the same. They analyze network traffic and log files for certain patterns. What kind of patterns you may ask? While a firewall will continually block a hacker from connecting to a network, most firewalls never alert an administrator.

The administrator may notice if he/she checks the access log of the firewall, but that could be weeks or even months after the attack. This is where an IDS comes into play. The attempts to pass through the firewall are logged, and IDS will analyze its log. At some point in the log there will be a large number of request-reject entries. An IDS will flag the events and alert an administrator. The administrator can then see what is happening right after or even while the attacks are still taking place. This gives an administrator the advantage of being able to analyze the techniques being used, source of attacks, and methods used by the hacker.

>>Following are the types of intrusion detection systems :-

1)Host-Based Intrusion Detection System (HIDS): Host-based intrusion detection systems or HIDS are installed as agents on a host. These intrusion detection systems can look into system and application log files to detect any intruder activity.

2)Network-Based Intrusion Detection System (NIDS): These IDSs detect attacks by capturing and analyzing network packets. Listening on a network segment or switch, one network-based IDS can monitor the network traffic affecting multiple hosts that are connected to the network segment, thereby protecting those hosts. Network-based IDSs often consist of a set of single-purpose sensors or hosts placed at various points in a network. These units monitor network traffic, performing local analysis of that traffic and reporting attacks to a central management console.

 >>Some important topics comes under intrusion detection are as follows :-

1)Signatures: Signature is the pattern that you look for inside a data packet. A signature is used to detect one or multiple types of attacks. For example, the presence of “scripts/iisadmin” in a packet going to your web server may indicate an intruder activity. Signatures may be present in different parts of a data packet depending upon the nature of the attack.

2)Alerts: Alerts are any sort of user notification of an intruder activity. When an IDS detects an intruder, it has to inform security administrator about this using alerts. Alerts may be in the form of pop-up windows, logging to a console, sending e-mail and so on. Alerts are also stored in log files or databases where they can be viewed later on by security experts.

3)Logs: The log messages are usually saved in file.Log messages can be saved either in text or binary format.

4)False Alarms: False alarms are alerts generated due to an indication that is not an intruder activity. For example, misconfigured internal hosts may sometimes broadcast messages that trigger a rule resulting in generation of a false alert. Some routers, like Linksys home routers, generate lots of UPnP related alerts. To avoid false alarms, you have to modify and tune different default rules. In some cases you may need to disable some of the rules to avoid false alarms.

5)Sensor: The machine on which an intrusion detection system is running is also called the sensor in the literature because it is used to “sense” the network.


>>SNORT: 

Snort is a very flexible network intrusion detection system that has a large set of pre-configured rules. Snort also allows you to write your own rule set. There are several mailing lists on the internet where people share new snort rules that can counter the latest attacks.

Snort is a modern security application that can perform the following three functions :

* It can serve as a packet sniffer.
* It can work as a packet logger.

* It can work as a Network-Based Intrusion Detection System (NIDS).


LEARN TCP/IP

The term IP (Internet Protocol) address spoofing refers to the creation of IP packets with a forged (spoofed) source IP address with the purpose of concealing the identity of the sender or impersonating another computing system.



For Check Your IP Address..

http://whatismyip.com/



for see another IP address

http://whatismyip.com/tools/ip-address-lookup.asp


Why it works ?
IP-Spoofing works because trusted services only rely on network address based authentication. Since IP is easily duped, address forgery is not difficult.
The main reason is security weakness in the TCP protocol known as sequence number prediction.

How it works ?
To completely understand how ip spoofing can take place, one must examine the structure of the TCP/IP protocol suite. A basic understanding of these headers and network exchanges is crucial to the process.

                                   

Internet Protocol (IP) :
It is a network protocol operating at layer 3 (network) of the OSI model. It is a connectionless model, meaning there is no information regarding transaction state, which is used to route packets on a network. Additionally, there is no method in place to ensure that a packet is properly delivered to the destination.

Your Browser and Server use TCP/IP

Browsers and servers use TCP/IP to connect to the Internet.

A browser uses TCP/IP to access a server. A server uses TCP/IP to send HTML back to a browser.

Your E-Mail uses TCP/IP

Your e-mail program uses TCP/IP to connect to the Internet for sending and receiving e-mails.

Your Internet Address is TCP/IP

Your Internet address "192.168.10.14" is a part of the standard TCP/IP protocol (and so is your domain name).

What is TCP/IP?

TCP/IP is the communication protocol for communication between computers on the Internet.

TCP/IP stands for Transmission Control Protocol / Internet Protocol.

TCP/IP defines how electronic devices (like computers) should be connected to the Internet, and how data should be transmitted between them.

Inside TCP/IP

Inside the TCP/IP standard there are several protocols for handling data communication:

    TCP (Transmission Control Protocol) communication between applications
    UDP (User Datagram Protocol) simple communication between applications
    IP (Internet Protocol) communication between computers
    ICMP (Internet Control Message Protocol) for errors and statistics
    DHCP (Dynamic Host Configuration Protocol) for dynamic addressing

TCP Uses a Fixed Connection

TCP is for communication between applications.

If one application wants to communicate with another via TCP, it sends a communication request. This request must be sent to an exact address. After a "handshake" between the two applications, TCP will set up a "full-duplex" communication between the two applications.

The "full-duplex" communication will occupy the communication line between the two computers until it is closed by one of the two applications.

UDP is very similar to TCP, but simpler and less reliable.

IP is Connection-Less

IP is for communication between computers.

IP is a "connection-less" communication protocol.

IP does not occupy the communication line between two computers. IP reduces the need for network lines. Each line can be used for communication between many different computers at the same time.

With IP, messages (or other data) are broken up into small independent "packets" and sent between computers via the Internet.

IP is responsible for "routing" each packet to the correct destination. 







IP Routers


When an IP packet is sent from a computer, it arrives at an IP router.


The IP router is responsible for "routing" the packet to the correct destination, directly or via another router.


The path the packet will follow might be different from other packets of the same communication. The router is responsible for the right addressing, depending on traffic volume, errors in the network, or other parameters.


Connection-Less Analogy


Communicating via IP is like sending a long letter as a large number of small postcards, each finding its own (often different) way to the receiver.


TCP/IP


TCP/IP is TCP and IP working together.


TCP takes care of the communication between your application software (i.e. your browser) and your network software.


IP takes care of the communication with other computers.


TCP is responsible for breaking data down into IP packets before they are sent, and for assembling the packets when they arrive.


IP is responsible for sending the packets to the correct destination.





IP Addresses


Each computer must have an IP address before it can connect to the Internet.


Each IP packet must have an address before it can be sent to another computer.


IP addess is the identity of computer or website.





Domain Names


A name is much easier to remember than a 12 digit number.


Names used for TCP/IP addresses are called domain names.


google.com is a domain name.


When you address a web site, like http://www.google.com, the name is translated to a number by a Domain Name Server (DNS).


All over the world, DNS servers are connected to the Internet. DNS servers are responsible for translating domain names into TCP/IP addresses.


When a new domain name is registered together with a TCP/IP address, DNS servers all over the world are updated with this information.


TCP - Transmission Control Protocol


TCP is used for transmission of data from an application to the network.


TCP is responsible for breaking data down into IP packets before they are sent, and for assembling the packets when they arrive.


IP - Internet Protocol


IP takes care of the communication with other computers.


IP is responsible for the sending and receiving data packets over the Internet.


HTTP - Hyper Text Transfer Protocol


HTTP takes care of the communication between a web server and a web browser.


HTTP is used for sending requests from a web client (a browser) to a web server, returning web content (web pages) from the server back to the client.


HTTPS - Secure HTTP


HTTPS takes care of secure communication between a web server and a web browser.


HTTPS typically handles credit card transactions and other sensitive data.


SSL - Secure Sockets Layer


The SSL protocol is used for encryption of data for secure data transmission.


SMTP - Simple Mail Transfer Protocol


SMTP is used for transmission of e-mails.


MIME - Multi-purpose Internet Mail Extensions


The MIME protocol lets SMTP transmit multimedia files including voice, audio, and binary data across TCP/IP networks.


IMAP - Internet Message Access Protocol


IMAP is used for storing and retrieving e-mails.


POP - Post Office Protocol


POP is used for downloading e-mails from an e-mail server to a personal computer.


FTP - File Transfer Protocol


FTP takes care of transmission of files between computers.


NTP - Network Time Protocol


NTP is used to synchronize the time (the clock) between computers.


DHCP - Dynamic Host Configuration Protocol


DHCP is used for allocation of dynamic IP addresses to computers in a network.


SNMP - Simple Network Management Protocol


SNMP is used for administration of computer networks.


LDAP - Lightweight Directory Access Protocol


LDAP is used for collecting information about users and e-mail addresses from the internet.


ICMP - Internet Control Message Protocol


ICMP takes care of error-handling in the network.


ARP - Address Resolution Protocol


ARP is used by IP to find the hardware address of a computer network card based on the IP address.


RARP - Reverse Address Resolution Protocol


RARP is used by IP to find the IP address based on the hardware address of a computer network card.


BOOTP - Boot Protocol


BOOTP is used for booting (starting) computers from the network.


PPTP - Point to Point Tunneling Protocol


PPTP is used for setting up a connection (tunnel) between private networks.





When you write an email, you don't use TCP/IP.


When you write an email, you use an email program like Lotus Notes, Microsoft Outlook or Netscape Communicator.


Your Email Program Does


Your email program uses different TCP/IP protocols:


    It sends your emails using SMTP
    It can download your emails from an email server using POP
    It can connect to an email server using IMAP


SMTP - Simple Mail Transfer Protocol


The SMTP protocol is used for the transmission of e-mails. SMTP takes care of sending your email to another computer.


Normally your email is sent to an email server (SMTP server), and then to another server or servers, and finally to its destination.


SMTP can only transmit pure text. It cannot transmit binary data like pictures, sounds or movies.


SMTP uses the MIME protocol to send binary data across TCP/IP networks. The MIME protocol converts binary data to pure text.


POP - Post Office Protocol


The POP protocol is used by email programs (like Microsoft Outlook) to retrieve emails from an email server.


If your email program uses POP, all your emails are downloaded to your email program (also called email client), each time it connects to your email server.


IMAP - Internet Message Access Protocol


The IMAP protocol is used by email programs (like Microsoft Outlook) just like the POP protocol.


The main difference between the IMAP protocol and the POP protocol is that the IMAP protocol will not automatically download all your emails each time your email program connects to your email server.


The IMAP protocol allows you to look through your email messages at the email server before you download them. With IMAP you can choose to download your messages or just delete them. This way IMAP is perfect if you need to connect to your email server from different locations, but only want to download your messages when you are back in your office.

MAKE A "TEXT TO SPEECH CONVERTER"


Open notepad.


Copy and paste following code and save it as "speak.vbs":


Dim userinputuserinput
userinputuserinput = inputbox("Type below to hear your computer speak")
set sapi = wscript.createobject("SAPI.Spvoice")
Sapi.speak userinputuserinput 




Double click on speak.vbs. A dialog box will be opened like:





Type anything in English. Your computer will speak for you.
Thats it. You are done.