Tuesday, November 26, 2013

cmus - C* Music Player Via Terminal





cmus is a small, fast and powerful console music player for Unix-like operating systems.
It supports various output methods by output-plugins. It has got completely configurable keybindings and it can be controlled from the outside via cmus-remote(1).



Monday, November 25, 2013

How to Protecting Against SYN Flood Attacks


In Windows, a protection allowing to detect and adjust the time when system is being targeted with a SYN flood attack, i.e., a type of denial of service attack. When the protection is enabled, responses of this connection time out more quickly in the event of an attack.

How To Secure Windows XP

 
Windows XP offers wonderful security features and as an administrator of the network or the computer it’s your responsibility to check the system’s security from every aspect.
In this article you will learn that how to implement the security procedures in the Windows XP Professional environment.  There is not a single method, software or hardware that can protect your computer from internal and external security threats. Before you determine the security strategy you need to understand that what the security risks are.
Due to the poor default settings, Windows XP has some security holes and these holes can be fixes by implementing the security procedures. Some of the major security procedures that can be configured and implemented in the Windows XP Professional are following.

How to disable Administrative shares on Windows XP

  1. Open Registry Editor (Start - Run - type "regedit" and press OK button)
  2. Navigate to "HKEY_LOCAL_MACHINE\SYSTEM\CurrentControlSet\Services\LanManServer\Parameters"
  3. Right click on "AutoShareWks" and change its value to "0"

How To Renaming the Administrator account in Windows XP


The Administrator account exists on all computers runningWindows XP Professional and Home. This gives potential hackers, half theinformation they need to access your computer—all they have to do is guess yourpassword.
You can make it more difficult for unauthorized persons toget into your system by renaming the Administrator account.

Sunday, November 24, 2013

See Bandwidth Usage Per Process Via Terminal with Nethogs

NetHogs is a small 'net top' tool. Instead of breaking the traffic down per protocol or per subnet, like most tools do, it groups bandwidth by process.
NetHogs does not rely on a special kernel module to be loaded. If there's suddenly a lot of network traffic, you can fire up NetHogs and immediately see which PID is causing this. This makes it easy to indentify programs that have gone wild and are suddenly taking up your bandwidth.

Saturday, November 23, 2013

Xtreme Download Manager for Windows

Xtreme Download Manager uses sophisticated dynamic segmentation algorithm,data compression and connection reuse to speed up the download process. Xtreme Download Manager supports HTTP, HTTPS and FTP protocols, firewalls, proxy servers, file redirects, cookies, authorization etc. Xtreme Download Manager integrates with any browser to handle downloads automatically using Advanced browser integration. Xtreme Download Manager is entirely written in Java, so it runs on any Operating System without even being installed.

Friday, November 22, 2013

Startup Repair Infinite Loop Recovery

How to Recover from an Infinitely Looping Startup Repair Loop without Reinstalling Windows.

If you've ever experienced a Startup Repair that continously loops and fails to fix the problem of not being able to load windows, even in safe mode, then you'll know that usually the only way to recover from this when System Restore does not work is to do a clean install of Windows.

This tutorial will show you how to use the System Recovery Options provided by Windows to recover your system to a working state so that you don't have to risk losing data by performing a clean install.

Warning: The instructions presented withing this tutorial must be followed correctly, or you can damage your Windows 7 installation even further. This tutorial is designed to help recover from a bad registry that is causing the startup repair loop. You should note that there may still be some issues remaining that cannot be fixed by manually restoring the registry.

Autoruns Programs Viewer for Windows


Introduction

This utility, which has the most comprehensive knowledge of auto-starting locations of any startup monitor, shows you what programs are configured to run during system bootup or login, and shows you the entries in the order Windows processes them. These programs include ones in your startup folder, Run, RunOnce, and other Registry keys. You can configure Autoruns to show other locations, including Explorer shell extensions, toolbars, browser helper objects, Winlogon notifications, auto-start services, and much more. Autoruns goes way beyond the MSConfig utility bundled with Windows Me and XP.

Autoruns' Hide Signed Microsoft Entries option helps you to zoom in on third-party auto-starting images that have been added to your system and it has support for looking at the auto-starting images configured for other accounts configured on a system. Also included in the download package is a command-line equivalent that can output in CSV format, Autorunsc.

YUMI (Multiboot USB Creator)

YUMI (Your Universal Multiboot Installer), is the successor to our MultibootISOs. It can be used to create a Multiboot USB Flash Drive containing multiple operating systems, antivirus utilities, disc cloning, diagnostic tools, and more. Contrary to MultiBootISOs which used grub to boot ISO files directly from USB, YUMI uses syslinux to boot extracted distributions stored on the USB device, and reverts to using grub to Boot Multiple ISO files from USB, if necessary.
Aside from a few distributions, all files are stored within the Multiboot or yumi folder (depending on version), making for a nicely organized Multiboot USB Drive that can still be used for other storage purposes.


Creating a YUMI Multiboot MultiSystem Bootable USB Flash Drive
YUMI works much like Universal USB Installer, except it can be used to install more than one distribution to run from your USB. Distributions can also be uninstalled using the same tool!

YUMI's Main Multiboot Boot Menu

Installing and Removing Nmap on Linux

Introduction

Nmap can often be installed or upgraded with a single command, so don't let the length of this chapter scare you. Most readers will use the table of contents to skip directly to sections that concern them. This chapter describes how to install Nmap on many platforms, including both source code compilation and binary installation methods. Graphical and command-line versions of Nmap are described and contrasted. Nmap removal instructions are also provided in case you change your mind.

File Permissions (chmod) on Linux

chmod is a Linux command that will let you "set permissions" (aka, assign who can read/write/execute) on a file.
Usage:
chmod permissions file

Or
Usage:
chmod permission1_permission2_permission3 file

When using chmod, you need to be aware that there are three types of Linux users that you are setting permissions for. Therefore, when setting permissions, you are assigning them for "yourself", "your group" and "everyone else" in the world. These users are technically know as:
  • Owner
  • Group
  • World

MAC Address Spoofing on Linux

There are two methods for spoofing a MAC address using either iproute2 (installed by default) or macchanger (available on the official repositories).
Both of them are outlined below.

Method 1: iproute2

First, you can check your current MAC address with the command:
# ip link show
where interface is the name of your network interface.
The section that interests us at the moment is the one that has "link/ether" followed by a 6-byte number. It will probably look something like this:
link/ether 00:1d:98:5a:d1:3a
The first step to spoofing the MAC address is to bring the network interface down. It can be accomplished with the command:
# ip link set dev interface down
Next, we actually spoof our MAC. Any hexadecimal value will do, but some networks may be configured to refuse to assign IP addresses to a client whose MAC does not match up with a vendor. Therefore, unless you control the network(s) you are connecting to, it is a good idea to test this out with a known good MAC rather than randomizing it right away.