Tuesday, December 16, 2008

Firefox Mobile for Symbian coming in 2009

If you're a smartphone browsing type, one of the more challenging aspects has long been that there's not a whole lot of choice in the mobile browsing arena, with many users sticking with their default browser; if you wanted choice, there was Opera Mobile, and that's about it.

Mozilla has a team responsible for mobile Firefox development,under the product name Fennec. Why Fennec? Well, the Fennec Fox is a smaller member of the fox family, or in other words, a smaller version of Firefox. This is apparently what passes for punnery in the development community.

Open-source software development initiative Mozilla expects to finalize development of its mobile Firefox browser on the Symbian platform by the middle of next year, according to a blog post by Christian Sejersen, Mozilla's director of mobile engineering.

Earlier this year, the company said it is in informal talks with mobile operators about its free Mobile Firefox browser. At the time, Mozilla said it would release mobile browsers for the Linux and Windows Mobile operating systems.


[via Christian Sejersen ]

Next generation of Windows Live application suite now available


Microsoft> on Monday announced the release of a final "refresh" of its beta Windows Live Essentials applications.

The updated applications include Windows Live Messenger, Mail, Photo Gallery, Movie Maker, Writer, Toolbar, and Family Safety, according to the Windows Experience blog.

The applications will become key to Microsoft's Windows 7, which will not ship with e-mail reading software and other conveniences traditionally included with Windows.

The blog post offers little by way of explaining the changes, except to say that the developers are "getting very close to the final release" and want to make sure the software is stable.

"Beginning on December 15, we are giving existing beta customers the ability to download the latest version of the Windows Live Essentials suite as a means to get feedback on the changes that we've made to date and confirm that the applications will be ready for full-scale release in the coming months," a Microsoft spokesperson said in an e-mail.

The updates include some minor changes, such as the way signature sounds are handled, but major features remain the same. The software is available for download from download.live.com.


The versions released today aren't dramatically different from the Windows Live Wave 3 apps w But Microsoft says the latest beta refresh means that the company is almost ready to take the beta label away and say that the Windows Live Essentials apps are ready to call final.

There is, however, a rather lengthy list of known issues, especially for users who are running Internet Explorer 8 Beta 2. So you might want to check out the release notes and system requirements before installing Windows Live Essentials.

Greasefire Finds Greasemonkey Scripts for the Site You're Visiting


Firefox only (Windows/Mac/Linux): Greasefire is a companion extension to the popular Greasemonkey extension designed to help you customize your web browsing by finding user scripts for any page you're currently visiting.

Once installed, the extension automatically searches the popular Greasemonkey script repository Userscripts.org for scripts related to the site you're visiting; if a script is available, the Greasemonkey icon in your Firefox status bar will display a fiery background to indicate that it found matches. For Lifehacker, as you can see from the photo above, Greasefire found nine matching scripts.

From there, installing new scripts is simple. Just click the "X scripts available" entry, then browse and find a script you like in the pop-up window. Click the install button at the bottom of the window when you find something you like.

Greasefire is a free download, works wherever Firefox does.

Free Online eBooks Available to Download at Desired Format

Nowadays ebook has become quite common and gradually replacing your conventional printed materials. You can enjoy the convenience of reading anywhere in your portable electronics gadget and best thing is, it doesn’t consume much of your memory space. If you are one of the preferred ebook readers, here is a good online website, ManyBooks that you can find plenty of interesting ebooks resource at no charge.

There are total 22,476 online ebook available for free downloading. You can search any ebook that you are interested in by author, title, category, language or recommendation from the website such as most recent reviews, popular titles, recent downloads, reader recommendations and more. Good thing about this service is it doesn’t require you to register prior to download the ebook. However, if you register an account, the service will help you keeping track of all ebooks you have read and you are able to share your favorite ebook to your friends through RSS Bookshelf feeds.

To download ebook in manybooks.net, just click the link of the ebook title, then it will bring you to the brief introduction page as well as readers’ reviews and total downloads. There are various formats being offered to download the ebook such as PDF, eReader, JAR, mobipocket-prc, palmdoc, iPOD notes, Sony .Irf and etc. Once you have chosen the desired format, click on the download button and it will be downloaded to your local drive and you can start reading it at your own pace.

[VIA MYDIGITALLIFE ]


Monday, December 15, 2008

Tips of How to Prevent Your Gmail from Being Hacked by Phishers

Nowadays it is very common to hear about online security vulnerability with email and domains being stolen by unauthorized third parties. As a frequent internet surfer, how are you going to ensure your Gmail is safe from being attacked by phishers and prevent your private information from being stolen by third parties?

You never know or suspect the email is actually sent by phisher as the web page looks like a legitimate site you have visited before. Phishers can imitate as banks, email, online merchants, payment services providers and even governments that you may be confused with what they have claimed and follow the instructions to enter your username, password and other private information on the site. All these information can be used by phishers to steal your bank money, open new credit card applications under your name and etc. In order to prevent or minimize such incident from happening, there are few tips you can apply to prevent phishers’ attacks:

Examine if there are any suspicious filters which are not created by you
Access to your Gmail account, go to Setting -> Filters, then verify if there are any filters which are not created by you. Delete them right away if there is any.

Disable Forwarding and POP/IMAP
Access to your Gmail account, go to Setting -> Forwarding and POP/IMAP, disable forwarding, POP and IMAP if you have not used them.

Be alert when being asked for sensitive information.
Any email or link in the email asking about your user name, password, bank account number or other personal information need to be cautious before submitting those information. Bear in mind that most of the legitimate websites never ask for sensitive information through this channel.

Do not click on suspicious links in email
If you receive an email asking for private information from a organization which you know of, instead of clicking on the link directly from the email, go to the organization website directly by typing the address in URL. If there is something you need to do, usually there will be an announcement on the homepage. If you can’t find any information from the homepage, don’t hesitate to call the respective party to find out more.

Use a browser that has a phishing filter
Use the the latest versions of browsers such as Firefox 3.x,Internet Explorer 7 and Opera 9.x which have included phishing filters for safer web browsing experience without being interrupted by these kind of phishing activities.

Do not be deceived by “great offers” or fantastic advertisement
Whenever you have received any online offers and requires you to enter private information, don’t be too excited and make sure that it is really safe or try to find more information.

Windows 7 Activation made easy

There are lot of queries regarding the windows7 activation . For that it is simple u can use old vista keys or below keys.

15 Windows 7 Pre-Release Preview MAK Unlimited Activation Product Keys

Windows 7 pre-beta release has been leaked to Internet for free download, however, without a valid product key to activate the Windows 7, the system can only run for 30 days maximum, or up to 120 days with rearm hack
Luckily, Windows Vista beta and RC product key can be used to activate Windows 7 beta version too (at least working on both Windows 7 build version 6801 32-bit (x86) and 64-bit (x64) editions. However, not all people is storing such an old information or email dated from 2 years ago.
While it’s possible to search for a valid product key using Google search engine, however, most of it may have been blacklisted or not working with Windows 7. But all hope is not lost, as it appears that some product key for Windows 7 pre-release preview (pre-beta version) have been leaked for free usage too.

Here’s a list of 15 Multiple Activation Key (MAK) which is the genuine legit product key for Windows 7 activation. Each product key can be used for unlimited number of client system activation, unlike a Windows Vista beta or release candidate key which limited to activate up to 10 copies of installed system.

J7PYM-6X6FJ-QRKYT-TW4KF-BY7H9
D67PP-QBKVV-6FWDJ-4K2XB-D4684
HQDKC-F3P6D-C9YYM-HRB89-QDBB7
76DX2-7YMCQ-K2WCP-672K2-BK44W
2RG93-6XVFJ-RKHQ7-D2RTT-3FMQT
TT63R-8JGWP-WWT97-R6WQC-4CVWY
YQJX6-D6TRM-VWBM7-PHDJK-YPXJH
Q7J7F-GQHBT-Q42RQ-2F8XV-2WKKM
KH4X7-JY8G7-RCD7G-BYDJW-YTPXH
WYBJ8-8QVP3-24R82-VV2VP-72Q9W
9DP2R-W78GJ-GJBKW-CKR46-H3WYT
CXB7F-WWCM4-BP9V3-2YH43-RK8Y6
W9BYV-K2TB8-4YDJT-QBQWP-KFDHB
WGDJW-B8DYC-WVKX4-6MKF4-B8PK8
2PHXF-9PBDW-D3WWY-CPDKD-XG87V

Windows 7 early pioneers (or genie pigs) can use one of the key to activate Windows 7 online or by phone activation.


[VIA mydigitallife]

or here is another option

Microsoft Windows 7 Activation 2008 Build 6801 | 1 MB

Run as Administrator..
When key installed successfully dialogue appears goto activation status and choose activate online..
DOWNLOAD

Tuesday, December 9, 2008

Windows7 Transformation Pack v1



Windows Se7en Transformation Pack for Windows OSes.

In This Pack:

* -Windows Se7en Visual Style
* -Windows Se7en Start Menu
* -Windows Se7en Styler TB
* -Windows Se7en Pie Dock
* -Windows Se7en Wallpapers


DOWNLOAD

Monday, December 8, 2008

How to Unlock Windows 7 Beta Hidden Protected Features

This will show you how to use a Blue Badge tool to unlock and enable the hidden protected features in the Windows 7 beta build 6801 version.
This was discovered by Rafael Rivera at Within Windows. See this site for more details and information.

This Blue Badge tool will back up the default files below with the renamed file extension of .original instead, then patch the default files below to unlock the hidden protected features. If you need to restore the original files after running the Blue Badge tool, then delete the patched files below and rename the backup .original file extentions for the files below back to the same default file extensions of the files below.
  • C:\Windows\Explorer.exe
  • C:\Windows\System32\wisptis.exe
  • C:\Windows\System32\ieframe.dll
  • C:\Windows\System32\shell32.dll
  • C:\Windows\System32\stobject.dll
  • C:\Windows\System32\TabletPC.cpl
  • C:\Windows\System32\themecpl.dll
  • C:\Windows\System32\themeui.dll
  • C:\Windows\System32\powercfg.cpl
For the 32 bit (x86) Windows 7 -
A) Click on the Download button below to download the BlueBadge_rev2_x86.zip file.
WARNING: This is for the 32 bit version of Windows 7 Build 6801 only.

B) Go to step 3.
download
rapidshare

For the 64 bit (x64) Windows 7 -
A) Click on the Download button below to download the BlueBadge_rev2_x64.zip file.
WARNING: This is for the 64 bit version of Windows 7 Build 6801 only.
DOWNLOAD

3. Click on Save and save the ZIP file to your desktop.
4. Open the ZIP file and extract the BlueBadge.exe file to the desktop (C:\Users\(user name)\Desktop).
5. Click on the BlueBadge.exe file to run it.
6. Click on Yes in the UAC prompt.
7. Click on the I understand the risks, continue button.
8. Click on OK.(if warning message comes)
9. Restart the computer to apply changes.

The official list of games that *WORK* on Windows 7

After software available here is the list of games that worked on WINDOWS7 here is the list of all the games working fine

  • Area 51
  • Call of Duty 4
  • Call of Duty 5
  • Call of Duty 5 Beta
  • Company of Heroes
  • DiRT
  • Far Cry 2
  • F.E.A.R.
  • F.E.A.R. - Combat Evolved
  • Grand Theft Auto: San Andreas
  • Grand Theft Auto: Vice City
  • Grand Theft Auto: 3
  • Grid
  • Halo: Combat Evolved
  • Half-Life:2
  • Need for Speed: Undercover
  • Portal
  • Quake 3
  • Red Alert 3
  • Star Trek: Starfleet Command III
  • The Elder Scrolls IV: Oblivion
  • World of Warcraft
video proof
http://www.youtube.com/watch?v=tISEUSAhUGo

The following emulators are working well in multiplayer:
WinKawaks v1.59
FB Alpha v0.2.96.98
Mame Plus! v0.119
Snes9x v1.42
Gens v2.14 Souvenir
Nestopia v1.40
EmuLinker Kaillera Server v2.0

the following icq 6.5 multiplayer games work fine:
zoopaloola
slidealama
rps
warsheep

Known working aplicatations for WINDOWS 7

HERE ARE THE LIST OF THE PROGRAM THAT ARE WORKING FINE ON THE WIN7. NOTE THAT ALL THE APPLICATION WAS RUN AT LATEST VERSION

Nero 9
K-Lite Codec Pack
VLC Player
utorrent
t-versity media server
nvidia video driver
Need for speed undercover
ATI Catalyst Preview Driver
Real Alternative
Quicktime
WinRar
Adobe Reader
Adobe Flash Player
Spybot Search and Destroy
AVG Anti-Virus Free Edition
Windows Live Essentials Wave 3 beta (there is a bug in Windows Live Mail on windows 7 though)
Team Fortress 2
Portal
Zune
Mozilla Firefox 3.0.4
Steam
Skype 4 Beta 2
Google Chrome
Twhirl
mIRC
Office 2007
Dreamweaver CS4
Adobe Pro 9
CoffeeCup Forms
CuteFTP 8
MMicrosoft Expression 2
Norton Ghost 14
Skynergy Hot Keys
Roxio Creator 2009
Real Player
Power ISO
7-ZIP
Winrar
Adobe CS4 master collection
4U Download Youtube Video
Ad-Aware
AD Sound Recorder
Autodesk 3ds max 2009
Avi Joiner
EZ ScreenRecorder
FastStone Capture
HJSplit
KingDia Video Converter
LimeWire
Myspace MP3 Gopher
UltraISO
Registry Mechanic
VCDgear
WinAVI
Office 2008
ESET NOD32 AV

NOT Working:
Alcohol
Deamon Tools
Frostwire

Working GAMES
Unreal Tournament 3
Counterstrike 1 and Source
Half Life 2
Half Life 2 Episode 1 & 2

U CAN LIST ALL THE APPLICATION WHICH ARE WORKING.

Creating a secret folder in 2 ways.

The techniques are here : No need to download anything! But, some of you may know this now.
(This works for WinXP only)

First technique
1. Create a folder at desktop, just make sure you know where you created it.
2. Rename it, then type/press Alt + 0160
3. Now, in the %SystemRoot%\system32\SHELL32.dll directory, find the icon that looks blank
4. Replace the folder icon
5. Done!

Second technique
This is the most simple one.
1. Create a folder
2. Right click on it, then properties
3. Check the "hidden" between "Read Only" and "Hidden"
4. Apply, then OK
5. Done!
6. To see the folder again, go to My Computer, then type the directory at the address bar. (Example, i made a hidden folder at Desktop, ill type C:\Documents and Settings\Administrator\Desktop\my hidden folder


The hidden folder is great for when your lil bro/sis are always playing/using your program.

Turn Windows Vista Into Windows 7

If you are a Windows Vista user and cannot wait another year before Windows 7 arrives you might want to pimp your operating system to look and feel like Windows 7. The following article is a guideline (originally posted by Martin Brinkmann-Windows7 News-Props) on how to tweak several areas of the Windows Vista interface to resemble Windows 7. Some changes, like a new wallpaper, do not tinker with system data at all while other changes require to patch system files so that the changes can be applied. It would therefor be a good idea to create a system restore point or backup before you continue reading and applying.

Here is what you do:

Install the Windows 7 theme
Install the Windows 7 boot screen
Install the Windows 7 login screen
Install one of the Windows 7 wallpapers
Add Aero Shake to Windows Vista
Add Aero Snap to Windows Vista
Add the Windows 7 Calculator to Windows Vista

1. Install the Windows 7 theme

Download: Windows 7 Vista Style http://giannisgx89.deviantart.com/art/Windows-7-Vista-Style-FINAL-102269037
Adding another theme to Windows Vista can only be done if several system files are patched first. You can find instructions on how to patch a system file at uxtheme.dll patcher or directly download the required files for your operating system here. http://www.withinwindows.com/uxtheme-patches/

The Windows 7 Vista Style theme has to be downloaded and unpacked on the system. The whole directory has to be moved into the directory C:\Windows\Resources\Themes if Windows Vista is installed on drive c:. The theme can then be selected by clicking on the Windows 7.msstyles file in the Windows 7 folder of the theme. Go here for more Windows 7 Themes: http://windows7news.com/windows-7-theme/

2. Install the Windows 7 boot screen

Download Windows 7 Boot Screen for Windows Vista: http://vishal-gupta.deviantart.com/art/Windows7-Boot-Screen-for-Vista-102728909
The zip comes with two files: VistaVG Seven Boot Screen for Vista.tbs which can be used with the Tuneup Utilities or winload.exe.mui which can be used if the Tuneup Utilities are not installed on the system. Using the winload.exe.mui file requires to replace the original file located in the system32\en-US\ folder with the one downloaded. You need to take ownership of the file by right-clicking it in system32\en-US\ to be able to replace it with the new one. It might be a good idea to backup the file before replacing it. You could also move the old file out of the folder and the new file in. Restart the computer system to see the new boot screen. You might need to enable No Gui Boot in the Boot tab of msconfig.

3. Install the Windows 7 login screen

Download: Windows 7 Login Screen: http://pugalenthi.deviantart.com/art/Windows-7-Login-Screen-102320932
Download the file from the link above and unpack it on the hard drive. Start by installing Logonvista (LogonStudioVista.exe). Start the application afterwords and load the Windows7.logonvista file.Then take permission for basebrd.dll which is located in c:\windows\branding\basebrd\basebrd.dll and replace it with the one in the dll folder of the unpacked file. It is again advised to backup the file before replacing it. Logout to see the changes.

4. Install Windows 7 Wallpapers

Download: Here: http://depositfiles.com/en/files/mlcm455zw

You can view all Windows 7 wallpapers that have been installed in the M3 build of Windows 7 by following the link at the beginning.

5. Install Software

Download: Aero Shake, Aero Snap and the Windows 7 Calculator

Aero Shake: http://lifehacker.com/5082279/aero-shake-clears-your-pre+windows-7-desktop
One of the new features of Windows 7. Shaking the active window with the mouse will minimize all visible windows. Shaking it again will display the minimized windows again.

Aero Snap. http://www.aerosnap.de.vu/
Aero Snap can be used to snap windows to the left or right side of the desktop which will change their size so that they will be displayed on half the screen. Moving a window to the top will maximize that window.

Windows 7 Calculator: http://www.winvistaclub.com/forum/windows-vista-tips-tutorials/26020-make-windows-7-calculator-work-vista-too.html
This replaces the original Windows Vista Calculator with the new and updated Windows 7 calculator.

ALL LINK ARE IN RAPIDSHARE HERE IS THE BELOW LINK
Windows 7 Theme
RAPIDSHARE

BOOTSCREEN
RAPIDSHARE

Login Screen
RAPIDSHARE


Install one of the Windows 7 wallpapers
RAPIDSHARE

Add Aero Shake to Windows Vista
RAPIDSHARE

Add Aero Snap to Windows Vista
RAPIDSHARE

Add the Windows 7 Calculator to Windows Vista
RAPIDSHARE

Wednesday, November 26, 2008

New Anti-Virus Evasion Technique Discovered

Script Fragmentation Attack Could Allow Hackers to Dodge Anti-virus Detection

Stephan Chenette of Websense describes a new Internet attack vector that could allow hackers to bypass anti-virus protection at both the gateway and the desktop. The technique, called script fragmentation, involves breaking down malware into smaller pieces in order to beat malware analysis engines. Web 2.0 requires new ways of thinking about browser security.


Security researcher Stephan Chenette opened up to eWEEK about a new Web attack vector that could potentially render desktop and gateway anti-virus products useless.

Chenette, manager of security research at Websense, calls the attack script fragmentation. Similar to TCP fragmentation attacks, it involves breaking down Web exploits into smaller pieces and distributing them in a synchronous manner to evade anti-malware signature detection.

"What this attack enables you to do is really get exploit code from the server into the browser memory and trigger the exploit," Chenette said. "Once you actually are able to trigger that exploit, you own that machine, so that means you can disable anti-virus, you can disable any protection mechanism after the fact."

The attack works like this: Malware authors write benign client code and embed it in a Web page. The only content contained on the initial page will be a small JavaScript routine utilizing XHR or XDR. This code contains no actual malicious content, and the same type of code is found on all of the major legitimate Web 2.0 sites.

When a user visits the Web page, the JavaScript and the XDR or XHR will slowly request more code from other Web servers a few bytes at a time, thereby only allowing a user's gateway anti-virus engine to analyze a few seemingly innocuous bytes as it tries to determine whether or not the Web site is malicious.

Once received by the client, the bytes are stored in an internal JavaScript variable. The client will request more and more information until all the information has been transferred. Once it has been transferred JavaScript will be used to create a Script element within the DOM (Document Object Model) of the browser and add the information as text to the node. This in turn will cause a change to the DOM and execute the code in the script element.

According to Chenette, the entire process—from data being transferred over the network to triggering JavaScript within the DOM—can slip under the radar because no malicious content touches the file system. It's done completely in memory, and any content that is transferred over the network is done in such tiny fragments that anti-virus engines parsing the information don't have enough context or information to match any signatures.

The attack, which has not been seen in the wild by Websense, works on all the major browsers. Technically, however, it is not a browser vulnerability—it merely takes advantage of the way browsers work.

Given that much of Web-based malware is distributed through compromised sites as opposed to rogue sites created by attackers, the method poses a significant threat in today's non-static, Web 2.0 environment, Chenette said. While disabling JavaScript, for example, would prevent the attack, that's not a realistic answer for most Web users.

"The problem with not allowing scripting is you break the functionality of almost all the top 50 Web sites that require JavaScript to be enabled," Chenette said. "One of the things that security vendors have to do is start understanding that we live now in a Web 2.0 world, not a Web 1.0 world, where active content is something we need to deal with everyday. That is the content that needs to be scanned … it is very important not only to look at the static content that has been put on disk but be able to detect changes inside of the browser."

Source

Firefox integrated NTLM authentication

Firefox, Mozilla, and friends CAN now do integrated NTLM Authentication. You need to set the following 4 preferences:

network.automatic-ntlm-auth.allow-proxies true

network.automatic-ntlm-auth.trusted-uris proxy1 (where proxy1 = the name of your proxy), proxy2, domain FQDN, etc

network.negotiate-auth.trusted-uris proxy1, proxy2, domain FQDN, etc

network.negotiate-auth.delegation-uris proxy1, proxy2, domain FQDN, etc

Here is how:
1. Type about:config in URL bar
2. In search bar type any part of the item you are looking for (ntlm or Negotiate)
3. Click on the item you want to change. (Or double click if it is a boolean, to change it)
4. Change the value in the pop up.
5. Click OK
6. Presto!

Friday, November 21, 2008

chrome preinstall on PC says google

Google is considering pre-installing its Chrome browser on personal computers in the search giant’s latest challenge to the dominance of Microsoft’s Internet Explorer.

According to a report in The Times, Google will likely start working those deals after it pulls the “beta” label from Chrome in early 2009. Likewise, it expects to release Mac and Linux versions of the browser in the first half of next year, which positions it to be accessible by 99 percent of computers.

Latest industry figures show that Internet Explorer currently enjoys a 71.3 per cent market share worldwide, with Mozilla Firefox at nearly 20 per cent. Chrome is used by less than 1 per cent of all web users, but is still under public testing before a final version is ready to launch.

AVG Antivirus Update Mistakenly Deletes System File (NewsFactor)

An update for the AVG 8 antivirus software for Windows 2000, XP and Vista released Saturday mistakenly warned that the Windows system file user32.dll was a Trojan horse. The problem affected the Dutch, French, Italian, Portuguese and Spanish versions.

AVG Technologies immediately corrected the problem for both free and paid versions of its software. If users acted on the update's warning, the user32.dll file was deleted, leaving Windows XP systems endlessly rebooting or unable to reboot.

The Czech-based AVG posted details of the problem and a method to fix it on the AVG Web site. The fix involves disabling AVG services and copying the user32.dll file from the Windows installation CD -- but only if the PC was not rebooted.

The effect on Windows Vista systems, if any, was not clear.

A company representative said, "AVG is actively working to remedy the problem some users are experiencing related to the most recent update to commercial and free versions of AVG 7.5 and AVG 8.0 in some languages. A number of users who installed the update mistakenly received a warning that the Windows system file user32.dll product version 5.1.2600.3099 was infected with a Trojan virus and were prompted to delete a file essential to the operation of Windows XP."

'High School Musical'-themed malware hits the Net (CNET)

Teens and young adults interested in downloading High School Musical-related music and video on peer-to-peer networks should be wary of malware, warns Panda Security.

While this may be obvious to older computer uses, younger users may not yet have experience with the social engineering used by malware writers, the security vendor said Friday in a press release.

If a person opens a High School Musical-themed video or song on any peer-to-peer network such as eMule or eDonkey, his or her computer may be infected with infected by VB.ADQ, the Agent.KGR Trojan, the adware Koolbar, or another strain of malicious code.

Panda recommends being cautious when downloading files. In particular, notice the file extension. Many of the malicious files have the extension ".exe," but that is rarely the case with a legitimate music or video file.

Wednesday, November 19, 2008

Your Own Home Server - Introduction

Your Own Home Server - Introduction

An Introduction

In this tutorial you will learn how to step up your own server. This server will be comprised of Apache 1.3.5, PHP 4.2.0, and MySQL 3.23.49. This tutorial will address the basic setup of a server on your own computer. This means the removal of hassles of dealing with the company that is running a remote web server. It will be easy to modify. You can add any thing you want to it, be it CGI/Perl, Zope, Roxen, etc, all by your self. You will have unlimited disk space, well at least as big as your hard drive is =) Now that you know the advantages, it is time that I tell you what i used, and what you will need.

What I used
* Windows 2000 - NOTE that if you are using 2k you WILL NEED Administrative Privileges. If you don't then get them somehow =) If you are on 95, 98, NT, XP, ME, I
* Apache 1.3.6 - I tried to use 2.0 but I could not get it work. I also feel that 1.3.6 is tried and true, so why mess with greatness.
* Mysql 3.23.49 - The newest version of MySQL when I set up my server. MySQL also the is the best PHP supported Database, and well love PHP don't we.
* PHP 4.2.1 - The latest and greatest PHP release. -nt

What you will need
* Apache 2 - Link: h**p://www.apache.org/dist/
* Mysql 3.23.49 - Link: h**p://www.mysql.com/downloads/mysql-3.23.html
* PHP 4.2.0 - Link: h**p://www.php.net/downloads.php
* Windows - This tutorial is ONLY written for new versions of Windows.

Once you have downloaded all the programs you are ready to continue.

1. Installing Apache

Installing Apache

The first step is to download Apache for Windows. Before you install it make sure that any other server software is removed. Remove it all via the control panel.On

Once you have clicked on the executable, a screen should com up that looks like this. Go ahead and click on next

user posted image

Of course you plan to abide be the license agreement, so click on I accept.... and click on next.

user posted image

You really don't need to read this, but if you want you can. Read it if you want feel informed. When you are ready click on next.

user posted image

Here is where the actual setup of Apache begins. For Network Domain put in localhost as for Server Name You want these both to be localhost because the server is running locally, on your computer. It doesn't matter what is in email field, just put in yours. No one will no it because it's just you.

user posted image

For the sake of this tutorial it is better to just leave it as it is because, later in the tutorial I will show you how to start the server with one click of the mouse, and for the sake of ease, it will be easier for you to follow along. You can change it if you want, but you will have to realize where to substitute it. For me the root drive is E: but for you will probably be C:

user posted image

Once you have all the jazz set up, it is time to install the server. If you are on w2k or XP be sure that you have Administrative permissions or you will get an error about half way through the install saving cannot access msvrt32.dll or something. If you get that error run it again when you have admin privileges. Once you are ready click on install.

user posted image

If all went well you just see a screen similar to this. Now it is time to test the install of apache. Click on Start > Program Files > Apache HTTP Server and look for start Start Apache in Console. Click it. Once it says Apache XXXXX running, press Windows Key + R and type -http://localhost/. If the install works you should see a page saying that it works. If all is set and done, continue to the next step.

user posted image
______________________________________________________________________
2. Installing PHP
Once you have clicked on the executable, a screen should come up that looks like this. Go ahead and click on next.

user posted image

Of course you plan to abide be the license agreement, so click on I accept.... and click on next.

user posted image

For this information, we will want the simple standard install. Chances are you if you are reading this tutorial, you will probably not even want to talk about advanced =)

user posted image

This is the mail setup, just enter localhost, and me@localhost.com. These are not important, because you, the admin, are the only person that will use the server, and you will be the one handling errors.

user posted image

We are going to want this install to work is Apache, so click on Apache, and move on.

user posted image

Once you have all the jazz set up, it is time to install the server. If you are on w2k or XP be sure that you have Administrative permission or you will get an error about half way through the install saving cannot access msvrt32.dll or something. If you get that error run it again when you have admin privileges. Once you are ready click on install.

user posted image

After the install is done you should get something that says you will have to manually configure apache to use php. Assuming you have a working Apache server installed, make sure that it is not running. Navigate to C:\Program Files\Apache Group\Apache\conf\ open the httpd.conf file. Note that you can also get to the http.conf from the start menu. Start > Program File > Apache HTTP Server > Configure Apache Server > Edit the Apache httpd.conf Configuration File and the window will open up in notepad. Now hit Ctrl + End if you see something like what follows, you can skip this step. If you do not see that code, copy it. This code will only work if you used the default install folder when you installed php. If you did, copy that code and paste it into the end of the file. Select the code to right, and hit crtl + c , then go into the httpd.conf file and hit ctrl + v and save the file.

ScriptAlias /php/ "c:/php/"

AddType application/x-httpd-php .php .phtml

Action application/x-httpd-php "/php/php.exe"

Now that we have php installed, it is time to test it. Open up notepad and type the code to the right. Save it as phpinfo.php. Remember to set it as all files in the drop down menu, or the file will be a text file. Save in the Directory: C:\Program Files\Apache Group\Apache\htdocs. htdocs is the directory where all the files go. You can create endless dir's and browse them. For Example E:\Program Files\Apache Group\Apache\htdocs\mydir\myfile.php could be accessed as http://localhost/mydir/myfile.php. Once you have that file saved. You will need to start the Server. Click: Start > Program File > Apache HTTP Server >; and look for something like Start Apache in Console. After you have found it, launch it. You should get a window saying that Apache is running. Now go to Start > Run > and type in -http://localhost/phpinfo.php. If you don't see anything, php is not installed correctly. If php is installed correctly, you will see a few large tables, displaying php's configuration. Now Your are 1/2 done!
______________________________________________________________________
3. Installing MySQL
Once you have clicked on the executable, a screen should com up that looks like this. Go ahead and click on next.

user posted image

Of course you plan to abide be the license agreement, so click on I accept.... and click on next.

Just like before you should leave the default dir alone, so you will be able to follow along with me when I show you how to start and stop all the aspects of the server.

Stay with the typical installation. Just like before, if you don't have admin privileges, the install will be faulty. After you click next, the install will begin. After the install has finished, move on to the next step.

Now you have to set up the root account. The root account is the absolute admin of the system, the highest possible. Click on Start > Run and type cmd to open up the command prompt. You are going to have to navigate to where MySQL is installed. Type C: > Enter > cd mysql > Enter > cd bin > Enter. Now you have to tell setup the root settings. Type mysqladmin -uroot password InsertYourPasswordHere then hit enter.

To see an image of the screen, -h**p://www.webmasterstop.com/tutorials/images/doscreen1.gif

What is the point of having a database if you can't easily administer it! That is where phpMyAdmin comes into play. phpMyAdmin is a free piece of software written in php that makes the administration of a mysql or many other types of databases easy. You will want to download (h**p://prdownloads.sourceforge.net/phpmyadmin/phpMyAdmin-2.2.6-php.zip?downloadrelease_id=85832)the latest version. Save it in the htdocs folder. Once it is done downloading it, right click on it and select Extract > To Here. When it is done you should end up with a directory in the htdocs folder called phpMyAdmin-2.2.6 To make it easier to access, rename it to phpMyAdmin. After you have renamed it, click on it and look for a file called config.inc Open it. This is where you set the configuration of phpMyAdmin. When you open it up, it should look similar to the image to your side. On yours there should be a few things missing. The $cfgPmaAbsoulteUrl and $cfgservers[$i]['password']. You will need to fill those in between the quotes. for the $cfgPmaAbsoulteUrl enter -http://localhost/phpMyAdmin/ if you followed my instructions to the letter. If you did not rename it or extracted to a different directory, put that in there. For the $cfgservers[$i]['password'] enter the password you entered when you were setting MySQL in the set above. You can refer to the image for help. After you have put the right things in save the file.

To see an image of the screen, -h**p://www.webmasterstop.com/tutorials/images/phpmyadminscreen1.gif

Now we want to test the install of mysql, php, phpmyadmin, and apache all at once. Start apache in console like we did before. Now, you are going to need to start mysql. For myself I made a file that would start mysql for me. Open notepad and type: start c:\mysql\bin\mysqld-nt.exe --standalone and save that as Start MySQL.bat. Once you have saved it, click it. A window should open and then close. Mysql is now running on your computer. After mysql and apache are started go to run again and type -http://localhost/phpMyAdmin/index.php and if everything is installed correctly phpmyadmin should so up. You are almost done! Now we have the easy part =)

4. Finishing it all up

Wow! We mad it through the whole process. Now we want to simplify the whole process of controlling the server. I made a toolbar with all the things I needed. I made a new folder on my desktop and called it Server Folder and put all the stuff there. I made a new shortcut and gave it a value of -http://localhost/ made a shortcut to the PHP Documentation page. Another shortcut to my php editor, which is now unavailable. The phpMyAdmin shortcut is set to -http://localhost/phpMyAdmin/index.php. I made another shortcut htdocs. I moved the Start Apache in Console program that was in the start menu folder and moved it to the server folder. You can take the Start Mysql file you made in the last page and move it to the new folder. After you have put all the desired things into that folder, right click on a blank space in stat menu task bar (where the program boxes lie) and select Toolbars > New Toolbar and navigate to the folder. Voila!

Now all you have to do is click Start Apache in Console , Start Mysql, and Lauch browser biggrin.gif

Here You Are Guys

Hardware Firewall

The best firewall is a hardware firewall that is completely separate from your operating system. It need not be a dedicated router, could be an old pentium box running Linux. Below I have found some sites that have How To's on setting up an outside hardware router using an old computer and using a little linux program that fits on a single floppy disk.

Brief Description:
floppyfw is a router with the advanced firewall-capabilities in Linux that fits on one single floppy disc.

Features:
Access lists, IP-masquerading (Network Address Translation), connection tracked packet filtering and (quite) advanced routing. Package for traffic shaping is also available.
Requires only a 386sx or better with two network interface cards, a 1.44MB floppy drive and 12MByte of RAM ( for less than 12M and no FPU, use the 1.0 series, which will stay maintained. )
Very simple packaging system. Is used for editors, PPP, VPN, traffic shaping and whatever comes up. (now this is looking even more like LRP (may it rest in peace) but floppyfw is not a fork.)
Logging through klogd/syslogd, both local and remote.
Serial support for console over serial port.
DHCP server and DNS cache for internal networks.

floppyfw


h#tp://www.zelow.no/floppyfw/



Sentry Firewall CD-ROM is a Linux-based bootable CDROM suitable for use as an inexpensive and easy to maintain firewall, server, or IDS(Intrusion Detection System) Node. The system is designed to be immediately configurable for a variety of different operating environments via a configuration file located on a floppy disk, a local hard drive, and/or a network via HTTP(S), FTP, SFTP, or SCP.

The Sentry Firewall CD is a complete Linux system that runs off of an initial ramdisk, much like a floppy-based system, and a CD. The default kernel is a current 2.4.x series kernel with various Netfilter patches applied. An OpenWall-patched current 2.2.x kernel is also available on the CD.

Booting from the CDROM is a fairly familiar process. The BIOS execs the bootloader(Syslinux) - which then displays a bootprompt and loads the kernel and ramdisk into memory. Once the kernel is running, the ramdisk is then mounted as root(/). At this point our configuration scripts are run(written in perl) that configure the rest of the system. It is the job of these configure scripts to put the various startup and system files into the proper location using either what is declared in the configuration file(sentry.conf) or the system defaults located in the /etc/default directory.

Most of the critical files used at boot time can be replaced with your own copy when declared in the configuration file. This is essentially how we allow the user to configure the system using his/her own configuration and init files.

All of the binaries, files, scripts, etc, used to create the CD-ROM are also available on the CD-ROM. So, with a little practice, you can easily build and customize your own bootable Sentry Firewall CD. Please see the HOWTO for more details.


Sentry Firewall
ht*p://www.sentryfirewall.com/docs.html#overview

Guide For Getting Free Stuff

Ok, if you are like me you have heard so much about the FreeIpods and FreeFlatScreens websites on different forums, blogs, IM's, etc, you are about to puke. So am I. But yet the draw of getting an Ipod for doing basically nothing is pretty strong. I dismissed all the "stories" of people getting their ipods as the marketing machine at work. However, when Kevin Rose published that not only did he receive his, but a few of his friends did as well, I figured I might take a chance and give it a go. Today I received proof that it does indeed work. Yep, I got my iPod.

Whats in it for them?
Step 1. Collect Names.
Step 2. Send those names items worth $200 or more
Step 3. ?????
Step 4. Profit

Before I signed up, I wanted to get to the bottom of the ?????. I didn't want any sweaty, filth pushing webmonkeys to have all my info, so I did my research. Gratis Internet, the parent company of the FreeIpods, FreeFlatscreens, etc. sites, recently did an interview with Wired Magazine.
In this article Gratis states that they are acting as Head Hunters for companies (more on that later) and are paid between $50-$90 per referral. Although this seems like a lot of money, this is nothing compared to what these companies spend for print advertising which does not guarentee ANY customers. So now we know what ?????? equals. ??????=$50-$90 for Gratis per guranteed customer (referral sites).

How Does it Work?
You sign-up on one (or more) of the following websites:

http://www.FreeMiniMacs.com/?r=14098976
This site gives away free Mini Macs. At the time of this writing only the 80gb MiniMac was available.

http://www.FreeDesktopPC.com/?r=13082204
This site gives away free flat screen monitors and TVs. At the time of this writing the following flat screens were available: Sony 19" LCD, Samsung 15" SyncMaster 510MP LCD TV, Samsung SyncMaster 710N LCD Monitor, Sony 27" FD Trinitron WEGA TV, or a 24" Toshiba TV/VCR/DVD combo

http://www.FreeGamingSystems.com/?r=12660654
This site gives away gaming systems. At the time of this writing the Slim PS2, Xbox, Nintendo Gamecube, and Nintendo DS were available.

http://www.FreeHandbags.com/?r=13950244
This site gives away high-end handbags. Might be a good surprise for your wife or girlfriend. =) At the time of this writing the following bags were available: Prada Mini-Hobo (black, Pink, Powder Blue), Burberry Novacheck Minisling, Coach Signature Demi Pouch (black, camel, purple), Kate Spade Pia Pochette (Black, Pink, Red)

http://www.mp3players4free.com/default.aspx?r=82419
This site gives out free mp3 players. You can get paypal $275, ipod, rio carbon, iriver, ipod mini.

http://www.dvrs4free.com/default.aspx?r=90581
This site gives away TiVo, Replay TV, and $275 paypal.

http://www.macminis4free.com/default.aspx?r=181183
Another mini mac site.

http://www.cameras4free.com/default.aspx?r=90773
This site is giving away high end digital cameras. At the the time of writing this, you follow cams are available: Canon Powershot S1 IS, Sony DSC-P100, Sony DSC-W1, Canon Powershot A95, $325 paypal.


Ok, so here is the tricky part. Once you sign up with one of these websites, you have to complete an "offer" from gratis's advertisers. There are numberous offers, some being better than others. Now remember the ???? = $50 - $90 equation? In order for you to receive your ipod/Flatscreen/Desktop PC/Handbag you have to refer 5, 8, or 10 of your friends, and they have to complete one of the offers as well. Then in order for them to receive theirs they need to refer others, and so on. So lets just look at why they are going to send an Ipod to you. (1(you) + 5(your friends)) x $90 = $540 - $250(ipod) = $290 profit for them just for you signing up. The advertisers are more than willing to pay, and FreeIpods is more than happy to send you your ipod. Works out for everyone.

What is the basic "lingo"?
"ref"/"referral" = The thing required to get your free items. These are your friends.
"green" = Status indicator that means your offer has been completed.
"yellow" = Status indicator that means your offer has yet to be completed or is in the process/pending.
"hold" = Means your account has been suspended or stopped. DON'T CHEAT.
"STV" = Means your product has been "Shipped To Vendor" You should recieve it in about 10 days time.

What process should you use to sign up (to ensure that you will get your item)
When signing up, it is recommended that you use Internet Explorer (sucks) some people have reported problems using other browsers (ex. Firefox, opera, etc.) Also make sure you have cookies accepted.

1. Click on one of the links above and enter a VALID US mailing address.

2. Complete the marketing survey - not your answers do not have any impact on you receiving your item. Just say no to them.

3. Once you have signed up, you should receive a verification email. If you did not receive one, go to the "My Account" page and click the link to have them resend it. If you still did not get it check your spam folder.

4. Sign-up with one of their partners and complete the offer. (see the section which offer should I choose) It can take up to 15 days for your offer to show completed. (A term that we freebie goers use for a "completed offer" is called "credit.") But usually they show completed after 24 hours. Be patient. If it doesn't show up as completed, you can email the site with proof and confirmation for signing up and they will give you credit.


Which offer should I choose?
Just so you know all offers require a credit card, **HOWEVER** not all of them cost anything! =) Here is a list of my recommended offers and I have not had any problems whatsover with doing these.

* Video Professor: This requires a credit card and pay only $3 shipping for computer tutorial CDs. After you receive the CDs, just call customer support and cancel your membership. Return to sender the CDs and they will refund you the shipping costs.

* Complete Home: Instant verification. Sign up for their program for $1 two month trial. You get a FREE $20 Lowes Gift Card just for doing this offer. Cancel your subscription within the 2 month trial and pay NOTHING and keep the gift card!

* Buyer's Advantage: Instant verification. Sign up for their program for $1 two month trial. You get a FREE $20 Circuit City Gift Card just for doing this offer. Cancel your subscription within the 2 month trial and pay NOTHING and keep the gift card!

* Great Fun: Instant verification. Sign up for their program for $1 two month trial. You get a FREE Walkie Talkie just for doing this offer. Cancel your subscription within the 2 month trial and pay NOTHING and keep the gift card!

* Traveler's Advantage: Instant verification. Sign up for their program for $1 two month trial. You get a FREE Thin Digital Camera just for doing this offer. Cancel your subscription within the 2 month trial and pay NOTHING and keep the gift card!

* eFax Plus: Sign up for their fax service. You get a 30 day free trial. Upon receiving credit for doing the offer, simply cancel the service within the free trial and pay nothing! It usually take 1-3 days to receive credit for this offer.

* Blockbuster Online: Try a two week trial of Blockbuster's Netflix-like service. Cancel online within trial time and pay nothing.

*Zooba: If you are a book fan, sign up for this offer. You get a book for $10 with free shipping. Instant verification.

*Various Credit Card offers: Apply for a credit card and get approved. When it arrives, cut it up and toss it out. Nothing to cancel, nothing to pay, and free stuff to gain!

Many of these offers are big companies, so you do not have to question the legitimacy for signing up under them. In other words, you will be safe because you are giving your credit card information to aol, blockbuster, and general motors, and i highly doubt that they will sell this info.

These are free, as long as you cancel within the trial period. Some offer online cancellations while others require calling their support number. Just tell them that you dont find yourself using their services enough so you want to cancel and they'll cancel your membership without any problems.

Cheating
Many of these free sites take cheating very seriously. If you want your free gift and not have you account suspended, simply DON'T CHEAT! Don't refer yourself and do all the offers yourself. If you think you can cheat the system because you are a 1337 h4x0r and you can use proxies and IP spoofs to refer yourself, DON'T DO IT. When you are in the approval stage, they will intensely throughly examine your account and make sure that all your referrels are legit and unique. Trust me, I know many people who have gotten suspended for attempting to cheat.

Multiple Accounts
This goes under cheating. It is wise not to create multiple accounts under the same site because it is against the free site's TOS. They suspend you no matter what your reason is, even if it was an accident. This also includes referring family members. You can only create one account under one household, under one IP address per site. So you cannot refer mother, sister, or brother to do it unless they live in another household.

So you've ran out of offers to do. What do I do?
Ok, if you are a freebie freak, you will probably eventually run out of offers to do because of the fact that you signed up for so many free sites did all the easy free offers. What shoud you do? Remember that free sites give you credit for a unique signup for the offers. So if you signed up for blockbuster online offer at freeflatscreens, you cannot do it again for another free site such as freedesktoppc. But there is a trick to this. A unique signup = a unique credit card that you used to sign up. So if you have a another credit card, you can sign up for the offer again. Another method is to purchase a visa gift card from your mall, or go to www.webcertificate.com and purchase a virtual debit/credit card and do the offers with those.

If you followed all these steps correctly, your free gift will be delivered to your doorstep in no time.

Here are the steps:
1. Getting friends to sign up under you
2. Approval Stage: They will analyze your account for fraud. Takes 1 week.
3. Pending Stage: Your account have been approved. You are now processing. This will take 1-2 weeks.
4. STV: Sent to Vendor. Your product will arrive in 10 days.
5. Shipped: Congrats!

Most of these freebie sites are for U.S residents only.

How do I overburn a CD with Nero?

Start Nero

From the action-bar select File and select Preferences.



In the Preferences window, select Expert Features(1) and check the Enable overburn disc-at-once(2).


Choose a Maximum CD Length(3) and click OK(4) (*82:59:59 is the maximum value I suggest, but as you can see from the screen capture above I have set mine significantly higher. The reason is because I frequently use 99min 850 MB CD media).

For a more accurate test you can use a nero tool called nero speed test to see how much a specific CD is capable of being overburned . get it here

From the action-bar select File and select Write CD.

A window will appear when you have exceeded expected length, click OK to start the overburn copy.

Remember to set disk to burn Disc at Once, you cannot overburn in Track at Once Mode.

Caught A Virus?

If you've let your guard down--or even if you haven't--it can be hard to tell if your PC is infected. Here's what to do if you suspect the worst.


Heard this one before? You must run antivirus software and keep it up to date or else your PC will get infected, you'll lose all your data, and you'll incur the wrath of every e-mail buddy you unknowingly infect because of your carelessness.

You know they're right. Yet for one reason or another, you're not running antivirus software, or you are but it's not up to date. Maybe you turned off your virus scanner because it conflicted with another program. Maybe you got tired of upgrading after you bought Norton Antivirus 2001, 2002, and 2003. Or maybe your annual subscription of virus definitions recently expired, and you've put off renewing.

It happens. It's nothing to be ashamed of. But chances are, either you're infected right now, as we speak, or you will be very soon.

For a few days in late January, the Netsky.p worm was infecting about 2,500 PCs a day. Meanwhile the MySQL bot infected approximately 100 systems a minute (albeit not necessarily desktop PCs). As David Perry, global director of education for security software provider Trend Micro, puts it, "an unprotected [Windows] computer will become owned by a bot within 14 minutes."

Today's viruses, worms, and so-called bots--which turn your PC into a zombie that does the hacker's bidding (such as mass-mailing spam)--aren't going to announce their presence. Real viruses aren't like the ones in Hollywood movies that melt down whole networks in seconds and destroy alien spacecraft. They operate in the background, quietly altering data, stealing private operations, or using your PC for their own illegal ends. This makes them hard to spot if you're not well protected.

Is Your PC "Owned?"

I should start by saying that not every system oddity is due to a virus, worm, or bot. Is your system slowing down? Is your hard drive filling up rapidly? Are programs crashing without warning? These symptoms are more likely caused by Windows, or badly written legitimate programs, rather than malware. After all, people who write malware want to hide their program's presence. People who write commercial software put icons all over your desktop. Who's going to work harder to go unnoticed?

Other indicators that may, in fact, indicate that there's nothing that you need to worry about, include:

* An automated e-mail telling you that you're sending out infected mail. E-mail viruses and worms typically come from faked addresses.
* A frantic note from a friend saying they've been infected, and therefore so have you. This is likely a hoax. It's especially suspicious if the note tells you the virus can't be detected but you can get rid of it by deleting one simple file. Don't be fooled--and don't delete that file.

I'm not saying that you should ignore such warnings. Copy the subject line or a snippet from the body of the e-mail and plug it into your favorite search engine to see if other people have received the same note. A security site may have already pegged it as a hoax.

Sniffing Out an Infection

There are signs that indicate that your PC is actually infected. A lot of network activity coming from your system (when you're not actually using Internet) can be a good indicator that something is amiss. A good software firewall, such as ZoneAlarm, will ask your permission before letting anything leave your PC, and will give you enough information to help you judge if the outgoing data is legitimate. By the way, the firewall that comes with Windows, even the improved version in XP Service Pack 2, lacks this capability.

To put a network status light in your system tray, follow these steps: In Windows XP, choose Start, Control Panel, Network Connections, right-click the network connection you want to monitor, choose Properties, check "Show icon in notification area when connected," and click OK.

If you're interested in being a PC detective, you can sniff around further for malware. By hitting Ctrl-Alt-Delete in Windows, you'll bring up the Task Manager, which will show you the various processes your system is running. Most, if not all, are legit, but if you see a file name that looks suspicious, type it into a search engine and find out what it is.

Want another place to look? In Windows XP, click Start, Run, type "services.msc" in the box, and press Enter. You'll see detailed descriptions of the services Windows is running. Something look weird? Check with your search engine.

Finally, you can do more detective work by selecting Start, Run, and typing "msconfig" in the box. With this tool you not only see the services running, but also the programs that your system is launching at startup. Again, check for anything weird.

If any of these tools won't run--or if your security software won't run--that in itself is a good sign your computer is infected. Some viruses intentionally disable such programs as a way to protect themselves.

What to Do Next

Once you're fairly sure your system is infected, don't panic. There are steps you can take to assess the damage, depending on your current level of protection.

* If you don't have any antivirus software on your system (shame on you), or if the software has stopped working, stay online and go for a free scan at one of several Web sites. There's McAfee FreeScan, Symantec Security Check, and Trend Micro's HouseCall. If one doesn't find anything, try two. In fact, running a free online virus scan is a good way to double-check the work of your own local antivirus program. When you're done, buy or download a real antivirus program.
* If you have antivirus software, but it isn't active, get offline, unplug wires-- whatever it takes to stop your computer from communicating via the Internet. Then, promptly perform a scan with the installed software.
* If nothing seems to be working, do more research on the Web. There are several online virus libraries where you can find out about known viruses. These sites often provide instructions for removing viruses--if manual removal is possible--or a free removal tool if it isn't. Check out GriSOFT's Virus Encyclopedia, Eset's Virus Descriptions, McAffee's Virus Glossary, Symantec's Virus Encyclopedia, or Trend Micro's Virus Encyclopedia.

A Microgram of Prevention

Assuming your system is now clean, you need to make sure it stays that way. Preventing a breach of your computer's security is far more effective than cleaning up the mess afterwards. Start with a good security program, such Trend Micro's PC-Cillin, which you can buy for $50.

Don't want to shell out any money? You can cobble together security through free downloads, such as AVG Anti-Virus Free Edition, ZoneAlarm (a personal firewall), and Ad-Aware SE (an antispyware tool).

Just make sure you keep all security software up to date. The bad guys constantly try out new ways to fool security programs. Any security tool without regular, easy (if not automatic) updates isn't worth your money or your time.

Speaking of updating, the same goes for Windows. Use Windows Update (it's right there on your Start Menu) to make sure you're getting all of the high priority updates. If you run Windows XP, make sure to get the Service Pack 2 update. To find out if you already have it, right-click My Computer, and select Properties. Under the General tab, under System, it should say "Service Pack 2."

Here are a few more pointers for a virus-free life:

* Be careful with e-mail. Set your e-mail software security settings to high. Don't open messages with generic-sounding subjects that don't apply specifically to you from people you don't know. Don't open an attachment unless you're expecting it.

* If you have broadband Internet access, such as DSL or cable, get a router, even if you only have one PC. A router adds an extra layer of protection because your PC is not connecting directly with the Internet.

* Check your Internet ports. These doorways between your computer and the Internet can be open, in which case your PC is very vulnerable; closed, but still somewhat vulnerable; or stealthed (or hidden), which is safest. Visit Gibson Research's Web site and run the free ShieldsUP test to see your ports' status. If some ports show up as closed--or worse yet, open--check your router's documentation to find out how to hide them.

Configuring your Bulletproof FTP Server Tutorial

I am not sure where I found this tutorial, It’s been a while…It might even have been here... ..So if it is one of yours, my hat goes off to you once again....

After reading the excellent tutorial on "Creating an FTP" that Norway posted…

(I would suggest reading and following his tutorial first, then following up with this one)

I thought that perhaps this tutorial might be pretty helpful for those interested in knowing how to configure their Bulletproof FTP Server that don't already know how... Here's how to get started…

This is for the BulletProof FTP Server 2.10. However, It should work fine on most following versions as well.

I'm assuming you have it installed and cracked.

Basics
1. Start the program.
2. Click on Setup > Main > General from the pull-down menu.
3. Enter your server name into the 'Server Name' box. Under Connection set the “Max number of users" to any number. This is the limit as to how many users can be on your sever at any time.
4. Click on the 'options' tab of that same panel (on the side)
5. Look at the bottom, under IP Options. Put a check in the box “Refuse Multiple Connections from the same IP”. This will prevent one person from blocking your FTP to others.
6. Also put a check in the 'Blocked Banned IP (instead of notifying client). VERY IMPORTANT! If somebody decides to 'Hammer' (attempt to login numerous times VERY quickly) your server/computer may CRASH if you don't enable this.
7. Click on the 'advanced' tab
8. At the bottom again look at the 'hammering area'
9. Enable 'anti-hammer' and 'do not reply to people hammering' Set it for the following: Block IP 120 min if 5 connections in 60 sec. You can set this at whatever you want to but that is pretty much a standard Click 'OK'

Adding Users
11. Setup > User accounts form pull-down.
12. Right click in the empty 'User Accounts' area on the right: choose 'Add'
13. Enter account name. (ie: logon name)
14. In the 'Access rights' box right click: choose ‘Add’.
15. Browse until you find the directory (folder) you want to share. In the right column you will see a bunch of checkboxes. Put a check in the following ones: Read, Write, Append, Make, List, and +Subdirs. Press 'select'.
16. Enter a password for your new FTP account.
17. Click on 'Miscellaneous' in the left column. Make sure 'Enable Account' is selected. Enable 'Max Number of Users' set it at a number other than zero. 1 for a personal account and more that one for a group account. Enable 'Max. no. of connects per IP' set it at 1

18. Under 'Files' enable 'show relative path' this is a security issue. A FTP client will now not be able to see the ENTIRE path of the FTP. It will only see the path from the main directory. Hide hidden flies as well.
Put a tick in both of these.

Advanced:
You don't need to do any of this stuff, but It will help tweak your server and help you maintain order on it. All of the following will be broken down into small little areas that will tell you how to do one thing at a time.

Changing the Port
The default port is always 21, but you can change this. Many ISPs will routinely do a scan of its own users to find a ftp server, also when people scan for pubs they may scan your IP, thus finding your ftp server. If you do decide to change it many suggest that you make the port over 10,000.
1. Setup > Main > General
2. In the 'Connection' Area is a setting labeled 'Listen on Port Number:'
3. Make it any number you want. That will be your port number.
4. Click 'OK'

Making an 'Upload Only' or 'Download Only' ftp server.
This is for the entire SERVER, not just a user.
1. Setup > Main > Advanced
2. In the advanced window you will have the following options: uploads and downloads, downloads only, and uploads only. By default upload and download will be checked. Change it to whatever you want.
3. Click 'OK’


While you are running your server, usually you will end up spending more time at your computer than you normally do. Don't be afraid to ban IP's. Remember, on your FTP you do as you want.

When you are online you must also select the open server button next to the on-line button which is the on-line Button

You also have to use the actual Numbered ip Address ie: 66.250.216.67

Or even Better yet, get a no-ip.com address

Sunday, November 16, 2008

UPDATES for Firefox, Safari ON CRITICAL SECURITY

Apple and Mozilla have each issued updates to fix a large number of critical security flaws in their respective Safari and Firefox Web browsers. The Apple update, which brings Safari to version 3.2, is reportedly causing many users to experience frequent browser crashes.

Other problems with this update may be related to a new anti-phishing feature built into Safari 3.2 (Firefox and Microsoft's Internet Explorer have had this feature for more than two years now).

Mozilla Corp. on Wednesday patched 11 vulnerabilities in Firefox 3.0 -- and 12 bugs in the older Firefox 2.0 -- that could be used to compromise computers and steal information. Yesterday's update patched virtually the same number of vulnerabilities as the last security update seven weeks ago.

Firefox 3.0.4, the fourth update since Mozilla launched the browser in June, fixes six flaws rated "critical," two "high," two "moderate," and one "low" in Mozilla's four-step scoring system. Most of the critical bugs could be used by hackers to introduce their own malicious code into a vulnerable system.

Apple Quietly Releases Safari 3.2

Sunday nov 16 apple launched the update to safari version 3.2. The feature includes various feature to upgrade like:-
The notable feature is that it finally adds anti-phishing technology, an area where Safari has lagged behind competitors.
Aside from that, it provides some security fixes, improved JavaScript performance, and a slightly newer version of Webkit, pulling their Acid3 score up to 77.

Google iPhone Voice Recognition App



GOOGLE voice recognition search application for the iPhone, originally set for launch on Friday, will likely go live sometime Monday, we’ve heard from a source with knowledge of the situation.
Apple left Google completely in the dark as to why the app didn't make it into the store on Friday, as previously planned. Google keeps an airtight lock on their news, and John Markoff's piece in the NYT was supposed to accompany the app's release

The good news for Google and all that were eagerly awaiting this app, is it will likely become available come Monday. This news comes from a source with insider knowledge of the situation (according to a report at TechCrunch). Google has apparently had little contact with Apple during this period, and have been getting updates on the situation via the iPhone developer tool which has had a status of ‘in review’ for the last few days .

Thursday, November 6, 2008

Wars-of-browsers

There are the periods when Netscape & internet browser explore had the war for there place. Brits scientist sir Tim Berne less had never thought his 1991 which was renames Nerves would lead to origin a various change in 2008 World Wide Web.

Browsers are important tool for searching internet. Here I try to find which is great among




Fire Fox 3

Mozilla one of the failure browsers among the open sources users breaks the records by downloading 8 million in just 24 hours. Firebox has a simple 8 clean logout with light-weight 78MB. It is say 8 have rich a. it have various active security feature like (anti-phishing, pop-blocker, password managers, parental controls).

The area that lacks are speed & performance firebox is now of the blocks talking marginally longer. It takes about 1 to 14 at first startup & four to eight seconds to startup later.
Fire fox is great with its feature like bookmarks & history management, search engine integration & tabbed browsing. It is far ahead with thousands assours to pick. The manager is an easy way to in stall as sour by listing popular us without need to open a webpage.
Book-mark is done clicking star in the location tab change to golden means page is Booked.
Password manager is unobtrusive with a discreet toolbar shown instead of the dialog box that offers to remember passwords.
Spelling checking & searching on page is also well important.

Google Chrome

Every product has its important. When a goggle products comes then its goes to box in the web.
Since its logo looks like a pogo ball bat it has not left Google color.
Chrome is just easy to use simple & looks great. There is a tab bar in place of the little bar with no menu bar & tool bar cluttering the interface. The one thing in the address bar (also known as the amni bar) which doubles up as a search bar. when opening new tabs, chrome displays a preview of sites in the new tab which is like operas speed dial. There are no advance navigational options – only the forward/back/refresh.

Chrome is not loaded with feature but user can create application shortcuts to webpage on desktop. A handily feature that is also available in chrome is resizing areas like the comment box in the webpage. Besides that chrome is same like other browsers having basic bookmaking, full search engine functionality, password management etc.
Chrome logs more system resources than any other browsers chrome loads the site speedy but it had issues with heavy content sites.
Chrome is great but still at early stage to compare with established browsers.

Opera

Opera is a feature rich as firebox is but in narrowly loses out to the later. It has lots of feature that are hard to find in other browsers like e-mail. IRC & Bittorent clients etc. An option for controlling opera with voice commands is available, but it’s only for 2000/Xp has not been perfected yet. Operas mouse gesture is another feature which is useful for the someone who wants to navigate quickly. Data sharing is possible through the opera link a free service that synchronizes book-marks, speed dial entries, notes & other personal data between multiple computers.
Perspire boasting so many innovative & unique feature it disappoints as it is not yet, open source. Opera is erratic. Sometime its really quick but often lags behind the navigation time when compared to firebox & I.E
Opera disappoints on its Book-Marks as it does not provides on click bookmrking, editing & managing in ease. Password management still fit primitive with irritating boxes pop such when a password is entered. Search engine integration is not yet truthful, it provides mine default engine but does not provide good integration. Opera provide basic history management.

Internet Exploer-8

Microsoft latest offering is IE8 beta. Which claims its fast safe easy? Ie8 have lots of add-ons. Some free some non free
Accelators that provides easy access to various web services from any WebPages with just few mouse clicks. Another unique is web slices. Microsoft uses this technology to automatically trace sites. Using slices user can keep up frequently updated sites directly from favorite bar. Ie8 has a separate process for individual tab in browser windows.
Lacking feature is the download manager which is limited. IE still is copyright of Microsoft and no proper password mgmt.

Wednesday, November 5, 2008

How to set folder permission

Linux (and almost all other Unixish systems) have three user classes as follows:
  • User (u): The owner of file
  • Group (g): Other user who are in group (to access files)
  • Other (o): Everyone else

You can setup following mode on each files. In a Linux and UNIX set of permissions is called as mode:

  • Read (r)
  • Write (w)
  • Execute (x)

However, above three modes or permission have different meaning for file and directory:

Linux Read mode permissions

  • Read access on a file allows you to view file
  • Read access on a directory allows you to view directory contents with ls command

Write mode permissions

  • Write access on a file allows you to write to file
  • Write access on a directory allows you to remove or add new files

Execute mode permissions

  • Execute access on a file allows to run program or script
  • Execute access on a directory allows you access file in the directory

Octal numbers and permissions

You can use octal number to represent mode/permission:

  • r: 4
  • w: 2
  • x: 1

For example, for file owner you can use octal mode as follows. Read, write and execute (full) permission on a file in octal is
0+r+w+x = 0+4+2+1 = 7

Only Read and write permission on a file in octal is
0+r+w+x = 0+4+2+0 = 6

Only read and execute permission on a file in octal is
0+r+w+x = 0+4+0+1 = 5

Use above method to calculate permission for group and others. Let us say you wish to give full permission to owner, read & execute permission to group, and read only permission to others, then you need to calculate permission as follows:
User = r+w+x = 0+4+2+1 = 7
Group= r+w+x = 0+4+2+0 = 6
Others = r+w+x = 0+0+0+1 = 1

Effective permission is 761.

chmod command

To setup file permission you need to use chmod command:
chmod {mode} {file-name}

To setup file permission 761 you need to use chmod command as follows:
# chmod 0761 file
To setup a file readable by anyone and writable by the owner only:
# chmod 644 file
To setup a file readable/executable by everyone and writable by the owner only:
# chmod 755 file
You can change permissions for all files and directories within a directory by using the -R option on the chmod command. For example, to setup others read and execute access to all files and directories (and files and directories within directories), you need to type command as follows (i.e. change the modes of the file hierarchies rooted in the files instead of just the files themselves):
# chmod -R 755 directory-name/

However, Linux (and UNIX) stores and process user database in different format.

The root user

  • The root user is the super user.
  • The root user can control entire Linux system including files, process, applications etc. The root user has full access to system.
  • You should not use root for day-to-day tasks as root has full system access.
  • Never ever, give root password to anyone.

For more information see What defines a user account?

User database

  • User database is stored in /etc/passwd file
  • User passwords and password expiry information stored in /etc/shadow file

Group database

  • User group information is stored in /etc/group file

UNIX/Linux User rights

There are two types of user rights (traditional):

  • File level user rights or permissions granted using chmod and chown command
  • Administrative (root) level rights granted using sudo.

If you type the following command:

$ ls -l

You’ll see something like the following:

-rw-r--r-- 1 indiver webusers 14814 2006-07-26 13:25 working-nixcraft.txt 

Look at 3rd, 4th and last columns.

  • vivek is username or the owner of the file (userid)
  • webusers is group name, so all users in webusers can access file working-nixcraft.txt
  • working-nixcraft.txt is the file name.

As the root user you can change or setup user file related rights/permission using chmod and chown command.

Task: change file owner and group

Consider following example:

$ ls -l foo.txt

Output:

-rw-r--r-- 1 vivek webgroups 8 2006-08-08 17:57 foo.txt

Change files ownership to tony user:

# chown tony foo.txt
# ls -l foo.txt

Output:

-rw-r--r-- 1 tony webgroups 8 2006-08-08 17:57 foo.txt

Change foo.txt group to ftpusers:

# chown tony:ftpusers foo.txt
# ls -l foo.txt

Output:

-rw-r--r-- 1 tony ftpuseers 8 2006-08-08 17:57 foo.txt

You can also operate on files and directories recursively using -R option. For example setup /var/www/html ownership to user lighttpd including subdirectories:

# chown -R lighttpd /var/www/html

Task: change files access rights/permissions

You need to use chmod command. Please refer the old article - how Linux file permissions work.

Task: Grant administrative rights to a normal user

You need to use sudo tool. It allows a permitted user to execute a command as the superuser or another user, as specified in the /etc/sudoers configuration file.

A note for Ubuntu Linux users

You can use chmod and chown command to setup user rights. Make sure you prefix all commands with word (command) sudo:

$ sudo chown tony:ftpusers foo.txt

Q. How do I use chmod and chown command under Linux?

A. Use chown command to change file owner and group information. Use chmod command to change file access permissions such as read, write etc.

chown command

chown command changes the user and/or group ownership of each given file.

For example following command will setup user and group ownership to root user only for /backup directory:
# chown root:root /backup
Set user user ownership to root user and allow any member of ftp group to access file.txt (provided that they have sufficient read/write rights).
# chown root:ftp /home/data/file.txt

HOPE THIS TIPS WILL HELP TO KNOW THE THE BASIC COMMAND OF LINUX ADMIN

Red Hat Linux Video Player Installtion

You can use VLC or mplayer both can play movies, mp3, dvd and so on. However, these packages are not part of default installation and not supported by RedHat. You need to install 3rd party repo such as RPMforge to install the package.

For 34 bit version i386:
wgethttp://packages.sw.be/rpmforge-release/rpmforge-release-0.3.6-1.el5.rf.i386.rpm For 64 bit version x86_64
wgethttp://packages.sw.be/rpmforge-release/rpmforge-release-0.3.6-1.el5.rf.x86_64.rpm Now, type the following command to install packages vlc, mplayer and xmms:

yum install vlc mplayer xmms xmms-mp3

Use vlc to dvd and movies
vlc file.avi

Use mplayer to view dvd, tv, radio etc
mplayer *.mp3
mplayer file.avi

Use xmms to play mp3
xmms &

Dual boot linux and mac osx leopard kalyway 10.5.2



Dual boot linux and mac also we can make triple boot with vista is very hard than I think and finally I got it. I spent 3 days to did it succesfully. Ok, this is way of my installation. I made in single hard disk, Pentium 4 3.0ghz, 1 gig RAM, Nvidia geforce fx5500 256mb, 80 gig hard disk drive.

Preparation before make dual boot


1. You must already have Super Grub Disk before install all this method. Burn iso image in your mini cd. Find SGD at http://supergrub.forjamari.linex.org)

2. EasyBCD for windows. Download here: http://neosmart.net/dl.php?id=1

3. Vista OS, Mac OSX and Linux OS' dvd/cd.

4. Burn gparted iso in your mini cd.


Install vista in your pc

Vista or windows xp, it must install in first partition and absolutely you're already have it in your HD. But if you're advance user, forget my advice here. :p We can install windows anytime, anywhere actually...

After installing windows, you can use easyBCD and make a new MBR. Just choose linux, windows and vista in MBR. Good software for all download free here:
http://neosmart.net/dl.php?id=1

Install Vista first.. you can choose any partition.
After installing Vista, install EasyBCD and create Mac in MBR by EasyBCD.

##############################################################################

Linux
Ok, now I already have vista. Install linux in any partiton, I made logical partition and choose ubuntu 8.04.1 as primary and opensuse kde 4 as extended. I don't working with lilo, I was using grub. In terminal, edit menu.lst,

$ sudo gedit boot/grub/menu.lst

and add this below or above ubuntu title. It is from windows menu.lst. We will repair it later. Don't panic if it won't boot to mac.





title Mac OSX
root (hd0,0)
makeactive
chainloader +1


Reboot pc and restart linux back. Because I have two linux, so I boot to times to login to ubuntu and opensuse.

#################################################################################################

Mac OSX
Actually, you can install mac or linux before or after. It's up to you. I install mac osx 10.5.2 kalyway in my pc pentium 4. But after iatkos 10.5.4 release, I installed iatkos. This is how to install kalyway. To install iatkos 10.5.4, check out at my post here:
http://linux-guider.blogspot.com/2008/09/installing-iatkos-1054-is-easy.html

-Insert dvd, boot..
-press F8
-enter -v and wait. Grab your "Nasi Lemak or Roti Canai". Eat until macosx ready for next work.

- Utilities -> Disk Utility in the menu bar. Find the hard drive in the sidebar you want to install Leopard.
- Erase -> Mac OS Extended (Journaled) format. (Rename, no space or special character)
- quit Disk Utility and head back to the Installer.
- utilities - terminal
- enter this command

fdisk -e /dev/rdisk0
flag 2 <--note that flag 2 is my mac partiton number two
quit
y

then, you can quit terminal. Quit Disk Utility and head back to the Installer.

-Hit Continue at the Welcome screen, agree to the terms, and then be sure to hit the Customize button before proceeding with your installation.
-install package comes with individual settings that match specific motherboards. Buti I leave all default. I don't want to feel head-ache.
-When the installation is complete (around an hour), let your computer restart, pop out the install disc, and sit back in wonder as Leopard runs on your PC in full 10.5.2. Watch start-up movie and grab your "chicken chop". Register your profile and password and don't register to mac.

################################################################################################

WHAT HAPPEN IF I GOT HFS + ERROR?

After installing Mac, you will got error message in boot such as HFS+error in bootloader. USE SUPER GRUB DISK. SGD is useful tool for recover linux grub and windows MBR.

Free iso download here:
http://supergrub.forjamari.linex.org

Repair grub

Use super grub disc to REPAIR menu.lst. Just edit by type e and enter. Change hd0,0 to hd0,2. Test boot.. If fail.. change to hd0,3 or hd1.0 or whatever until it boot. All menu.lst attaced here is for example. If you have a doubt to boot mac or windows in grub, choose title mac osx in grub menu, we will edit it please enter:

e

on title macosx, change root (hd0,0) to

root (hd0,1)

it's mean, you will boot in partition number 1. Press enter and:

b

You will boot to mac osx or windows. If still doubt, you can try any number, Look mine here..





title Mac OSX
root (hd0,2)
makeactive
chainloader +1


WINDOWS GONE??

Repair windows startup using windows cd/dvd.

MAC OSX GONE?


Never gone, but it is hidden until you find it back with easybcd on WINDOWS or supergrub disk in linux.

REFIT?

I never use refit.. Please tell me what is refit?? lol

Conclusion
1. Before installing three of this OS, make sure you have make a back up copy of your important data.
2. Burn SGD in mini vcd and keep it as your important hardware.
3. Keep easyBCD.exe in you removable disk.
4. maybe gparted iso also useful.

Good luck!

installing iatkos 10.5.4 is easy!!



Wow.. it is easy to install it. No more hacking, just doing simple method except if you have other OS partition. iatkos 10.5.4 is more quiet than kalyway. My fan turning in low speed.
Second time I did it. I was amazed, it really easy to install.


How to install iatkos 10.5.4?


First time I follow a guide but it doesnt work.
Actually, it is just 2-3 steps depend on your choice. Don't add nforce -v or toh -v or whatever. Just enter, -v for verbose mode ok?

1. For fresh install:

utilities - disk utilities - view partiton - choose partiton - choose hard disc - erase tab - volume format "mac os extended (journaled) - name "OSX or whatever, avoid space" - erase tab - pop up erase - DONE!! - QUIT

2. But I have other OS, forget step 1 and..

utilities - disk utilities - choose hard disc - erase tab - volume format "mac os extended (journaled) - name "OSX or whatever, avoid space" - erase tab - pop up erase - DONE!! - QUIT

3. multi OS boot (forget this if you just want to install macosx only):

utilities - terminal

fdisk -e /dev/rdisk0
flag
quit
n

then, you can quit terminal.

4. Back to mac os x instaler...

continue - agree - select destination - continue -customize - select kernel ToH 9.2 only - install - skip - reboot

5. You're finish. I don't change anything in customize tab!! It saves me!! Reboot pc and take out your dvd and put it in case while boot. If macosx don't want to restart, help it by pressing restart button. (I'm not kidding lol)

6. So now, watch a start up movie and register yourself.

Pro

Easy install than other version
Install in 25 minutes

Cons

Sometimes a desktop blinking after install X11.dmg - solved after install Kernel ToH 9.2