Showing posts with label how to. Show all posts
Showing posts with label how to. Show all posts

Monday, November 25, 2013

How to Protecting Against SYN Flood Attacks


In Windows, a protection allowing to detect and adjust the time when system is being targeted with a SYN flood attack, i.e., a type of denial of service attack. When the protection is enabled, responses of this connection time out more quickly in the event of an attack.

How To Secure Windows XP

 
Windows XP offers wonderful security features and as an administrator of the network or the computer it’s your responsibility to check the system’s security from every aspect.
In this article you will learn that how to implement the security procedures in the Windows XP Professional environment.  There is not a single method, software or hardware that can protect your computer from internal and external security threats. Before you determine the security strategy you need to understand that what the security risks are.
Due to the poor default settings, Windows XP has some security holes and these holes can be fixes by implementing the security procedures. Some of the major security procedures that can be configured and implemented in the Windows XP Professional are following.

How to disable Administrative shares on Windows XP

  1. Open Registry Editor (Start - Run - type "regedit" and press OK button)
  2. Navigate to "HKEY_LOCAL_MACHINE\SYSTEM\CurrentControlSet\Services\LanManServer\Parameters"
  3. Right click on "AutoShareWks" and change its value to "0"

How To Renaming the Administrator account in Windows XP


The Administrator account exists on all computers runningWindows XP Professional and Home. This gives potential hackers, half theinformation they need to access your computer—all they have to do is guess yourpassword.
You can make it more difficult for unauthorized persons toget into your system by renaming the Administrator account.

Friday, November 22, 2013

Startup Repair Infinite Loop Recovery

How to Recover from an Infinitely Looping Startup Repair Loop without Reinstalling Windows.

If you've ever experienced a Startup Repair that continously loops and fails to fix the problem of not being able to load windows, even in safe mode, then you'll know that usually the only way to recover from this when System Restore does not work is to do a clean install of Windows.

This tutorial will show you how to use the System Recovery Options provided by Windows to recover your system to a working state so that you don't have to risk losing data by performing a clean install.

Warning: The instructions presented withing this tutorial must be followed correctly, or you can damage your Windows 7 installation even further. This tutorial is designed to help recover from a bad registry that is causing the startup repair loop. You should note that there may still be some issues remaining that cannot be fixed by manually restoring the registry.

YUMI (Multiboot USB Creator)

YUMI (Your Universal Multiboot Installer), is the successor to our MultibootISOs. It can be used to create a Multiboot USB Flash Drive containing multiple operating systems, antivirus utilities, disc cloning, diagnostic tools, and more. Contrary to MultiBootISOs which used grub to boot ISO files directly from USB, YUMI uses syslinux to boot extracted distributions stored on the USB device, and reverts to using grub to Boot Multiple ISO files from USB, if necessary.
Aside from a few distributions, all files are stored within the Multiboot or yumi folder (depending on version), making for a nicely organized Multiboot USB Drive that can still be used for other storage purposes.


Creating a YUMI Multiboot MultiSystem Bootable USB Flash Drive
YUMI works much like Universal USB Installer, except it can be used to install more than one distribution to run from your USB. Distributions can also be uninstalled using the same tool!

YUMI's Main Multiboot Boot Menu

Installing and Removing Nmap on Linux

Introduction

Nmap can often be installed or upgraded with a single command, so don't let the length of this chapter scare you. Most readers will use the table of contents to skip directly to sections that concern them. This chapter describes how to install Nmap on many platforms, including both source code compilation and binary installation methods. Graphical and command-line versions of Nmap are described and contrasted. Nmap removal instructions are also provided in case you change your mind.

File Permissions (chmod) on Linux

chmod is a Linux command that will let you "set permissions" (aka, assign who can read/write/execute) on a file.
Usage:
chmod permissions file

Or
Usage:
chmod permission1_permission2_permission3 file

When using chmod, you need to be aware that there are three types of Linux users that you are setting permissions for. Therefore, when setting permissions, you are assigning them for "yourself", "your group" and "everyone else" in the world. These users are technically know as:
  • Owner
  • Group
  • World

MAC Address Spoofing on Linux

There are two methods for spoofing a MAC address using either iproute2 (installed by default) or macchanger (available on the official repositories).
Both of them are outlined below.

Method 1: iproute2

First, you can check your current MAC address with the command:
# ip link show
where interface is the name of your network interface.
The section that interests us at the moment is the one that has "link/ether" followed by a 6-byte number. It will probably look something like this:
link/ether 00:1d:98:5a:d1:3a
The first step to spoofing the MAC address is to bring the network interface down. It can be accomplished with the command:
# ip link set dev interface down
Next, we actually spoof our MAC. Any hexadecimal value will do, but some networks may be configured to refuse to assign IP addresses to a client whose MAC does not match up with a vendor. Therefore, unless you control the network(s) you are connecting to, it is a good idea to test this out with a known good MAC rather than randomizing it right away.