Apply For Blog Online Marketing
We are the for going brand launching in Ahmedabad for online Marketing.

Want to achieve Success in SEO for Online Marketing.

Join Masters with your product.
Mastersdaily Represents SEO optamization.
Success in Online Marketing Product
Master Represents the Latest Technological Blog

What are You Expecting? Which is Your Field? Student, Professional, Business, Corporate.

Mastersdaily is offering perfect approval from Online Marketing in minimum charges.
Just Think About Best SEO and Offline Data Entry Services in Bulk its only in Ahmedabad here with us..
Which is Perfect Path?
Ask the Professionals!

We provide better results and best seo online for your product.

Contact Us for Bulk data Entry Work We provide Services for Data Entry.
Just Our Services and Clients enjoys best Services in Gujarat.
Ready for Better Success Ratio in S.E.O
Your Home Today!

Enjoy Success With Best SEO in Market.

Get results first then only Pay for Services.
Just SEO Rocks With Online Marketing.
Where Should You Invest?
Ask the Professionals!

Contact us for bulk Services in offline mode.

Mastersdaily.
what u expect from us Contact us email us: jetmaster007@live.com.

Monday, 28 September 2009

0 Join in


Sunday, 20 September 2009

0 Mobile items

0 Port Scanners

Go through the previous article on TCP/IP before you start over this one. If you are one of those who know networking inside-out, then you can probably skip my advice. If not, I would advise you to do it now as the fundamentals explained them will help you to understand better what I am going to talk henceforth. Today, I want to take up the topic on Port Scanners.

In Internet security, no hacking tool is more celebrated than the scanner. It is said that a good TCP port scanner is worth a thousand user passwords. Before I treat the subject of scanners in depth, I want to familiarize you with scanners. Try not to get inundated by the plethora of information that you can find on scanners. Get the basics right and you'll be well set.

What Is a Scanner?

A scanner is a program that automatically detects security weaknesses in a remote or local host. By deploying a scanner, a user in Los Angeles can uncover security weaknesses on a server in Japan without ever leaving his or her living room.

True scanners are TCP port scanners, which are programs that attack TCP/IP ports and services (Telnet or FTP, for example) and record the response from the target. In this way, they glean valuable information about the target host (for instance, can an anonymous user log in?). Other so-called scanners are merely UNIX network utilities. These are commonly used to discern whether certain services are working correctly on a remote machine. These are not true scanners, but might also be used to collect information about a target host.

A scanner might reveal certain inherent weaknesses within the target host. These might be key factors in implementing an actual compromise of the target's security. In order to reap this benefit, however, you must know how to recognize the hole. Most scanners do not come with extensive manuals or instructions. Interpretation of data is very important.

Limitations of Scanners

A scanner won't tell you the following:

A step-by-step method of breaking in.

The degree to which your scanning activity has been logged.

Basic features of a Scanner

The primary attributes of a scanner is the capability to find a machine or network Once having found a machine, to find out what services are being run on the host. The capability to test those services for known holes This process is not incredibly complex. At its most basic, it involves capturing the messages generated when one tries to connect to a particular service.

Importance of scanners

Scanners are important to Internet security because they reveal weaknesses in the network. Whether this information is used by hackers or crackers is immaterial. If used by system administrators, scanners help strengthen security in the immediate sense. If employed by crackers, scanners also help strengthen security. This is because once a hole has been exploited, that exploitation will ultimately be discovered. Some system administrators argue that scanners work against Internet security when in the hands of crackers. This is not true. If a system administrator fails to adequately secure his or her network (by running a scanner against it), his or her negligence will come to light in the form of a network security breach.

Going through this article, you may feel that scanners are only for UNIX machines. It is not so. But the fact remains that scanners were designed initially for the UNIX machines. And that was because almost 90% of the Internet was run on UNIX machines. Today you can find scanners for any platform, offering unlimited functionality and power. Scanners, unlike sniffers, e-mail bombers, trojans, etc are not illegal. They are viewed upon as tools to improve Internet security rather than breach it.

A good scanner that I'll recommend novices for the Win 32 platform is SuperScan.

0 what is the sub types of Viruses?

Author: Smith Solace

Types of viruses

Boot viruses: These viruses infect floppy disk boot records or master boot records in hard disks. They replace the boot record program (which is responsible for loading the operating system in memory) copying it elsewhere on the disk or overwriting it. Boot viruses load into memory if the computer tries to read the disk while it is booting.
Examples: Form, Disk Killer, Michelangelo, and Stone virus

Program viruses: These infect executable program files, such as those with extensions like .BIN, .COM, .EXE, .OVL, .DRV (driver) and .SYS (device driver). These programs are loaded in memory during execution, taking the virus with them. The virus becomes active in memory, making copies of itself and infecting files on disk.
Examples: Sunday, Cascade

Multipartite viruses: A hybrid of Boot and Program viruses. They infect program files and when the infected program is executed, these viruses infect the boot record. When you boot the computer next time the virus from the boot record loads in memory and then starts infecting other program files on disk.
Examples: Invader, Flip, and Tequila

Stealth viruses: These viruses use certain techniques to avoid detection. They may either redirect the disk head to read another sector instead of the one in which they reside or they may alter the reading of the infected file’s size shown in the directory listing. For instance, the Whale virus adds 9216 bytes to an infected file; then the virus subtracts the same number of bytes (9216) from the size given in the directory.
Examples: Frodo, Joshi, Whale

Polymorphic viruses: A virus that can encrypt its code in different ways so that it appears differently in each infection. These viruses are more difficult to detect.
Examples: Involuntary, Stimulate, Cascade, Phoenix, Evil, Proud, Virus 101

Macro Viruses: A macro virus is a new type of computer virus that infects the macros within a document or template. When you open a word processing or spreadsheet document, the macro virus is activated and it infects the Normal template (Normal.dot)-a general purpose file that stores default document formatting settings. Every document you open refers to the Normal template, and hence gets infected with the macro virus. Since this virus attaches itself to documents, the infection can spread if such documents are opened on other computers.
Examples: DMV, Nuclear, Word Concept.

Active X: ActiveX and Java controls will soon be the scourge of computing. Most people do not know how to control there web browser to enable or disable the various functions like playing sound or video and so, by default, leave a nice big hole in the security by allowing applets free run into there machine. There has been a lot of commotion behind this and with the amount of power that JAVA imparts, things from the security angle seem a bit gloom.

These are just few broad categories. There are many more specialized types. But let us not go into that. We are here to learn to protect our self, not write a thesis on computer virus specification.

0 Symptoms of Virus Infection-by Smith

Author: Smith Solace

Normally every student ask me that what is the symptom of the virus so here i give it.



In the last article, I tried to give you a brief classification of viruses according to their nature. Now we shall look into indications which may indicate viral infection. After that I have tried to give some tips for safe computing. While reading this article you may sound the tips too childish but nevertheless they can be critical. So don't overlook them and read on.

10 virus symptoms

Programs take longer to load. Memory-intensive operations take a lot of time to start.

A change in dates against the filenames in the directory. When the virus modifies a file the operating system changes the date stamp.

The floppy disk or hard disk is suddenly accessed without logical reason.

Increased use of disk space and growth in file size-the virus attaches itself to many files.

Abnormal write-protect errors. The virus trying to write to a protected disk.

Strange characters appear in the directory listing of filenames.

Strange messages like "Type Happy Birthday Joshi" (Joshi Virus) or "Driver Memory Error" (kak.worm) appear on the screen and in documents.

Strange graphic displays such as falling letters or a bouncing ball appear on screen.

Programs may hang the computer or not work at all.

Junk characters overwrite text in document or data files.

Your guide to safe computing

Listed below are some of the steps recommended by experts to safeguard your PC from viruses. These are a compilation of my past experiences and magazine sources.

Write-protect your floppy disks when using them on other computers.

Remove floppy disks from drives while booting.

Change a setting in the BIOS that enables your PC to boot from the C-drive first.

Use a good anti-virus program to scan floppy disks before copying files. Recommended ones are Norton Antivirus 2000 and Mcaffee 5.

Install software only from original write-protected disks with the publisher’s label.

Do not install pirated software, especially computer games.

Activate watch-guard programs (monitors) that look out for suspicious activity.

Use the update service offered by software vendors and update the anti-virus software every month.

Scan the entire hard disk twice a month.

Scan files downloaded from the Internet or those transferred through a network.

Prepare a rescue disk with critical system files. Preferably, it should be bootable.

Keep the original CD-ROM or diskettes containing the operating system handy.

In the next article, I will try to cover some of the most happening viruses in today's cyber world. This may caution you up a little.

Sunday, 6 September 2009

0 my photos








Followers

 
© 2010 The Techcrate SEO Services | Edited by Smith Solace | template design by Smith Solacecom