Wednesday, November 26, 2008

New Anti-Virus Evasion Technique Discovered

Script Fragmentation Attack Could Allow Hackers to Dodge Anti-virus Detection

Stephan Chenette of Websense describes a new Internet attack vector that could allow hackers to bypass anti-virus protection at both the gateway and the desktop. The technique, called script fragmentation, involves breaking down malware into smaller pieces in order to beat malware analysis engines. Web 2.0 requires new ways of thinking about browser security.


Security researcher Stephan Chenette opened up to eWEEK about a new Web attack vector that could potentially render desktop and gateway anti-virus products useless.

Chenette, manager of security research at Websense, calls the attack script fragmentation. Similar to TCP fragmentation attacks, it involves breaking down Web exploits into smaller pieces and distributing them in a synchronous manner to evade anti-malware signature detection.

"What this attack enables you to do is really get exploit code from the server into the browser memory and trigger the exploit," Chenette said. "Once you actually are able to trigger that exploit, you own that machine, so that means you can disable anti-virus, you can disable any protection mechanism after the fact."

The attack works like this: Malware authors write benign client code and embed it in a Web page. The only content contained on the initial page will be a small JavaScript routine utilizing XHR or XDR. This code contains no actual malicious content, and the same type of code is found on all of the major legitimate Web 2.0 sites.

When a user visits the Web page, the JavaScript and the XDR or XHR will slowly request more code from other Web servers a few bytes at a time, thereby only allowing a user's gateway anti-virus engine to analyze a few seemingly innocuous bytes as it tries to determine whether or not the Web site is malicious.

Once received by the client, the bytes are stored in an internal JavaScript variable. The client will request more and more information until all the information has been transferred. Once it has been transferred JavaScript will be used to create a Script element within the DOM (Document Object Model) of the browser and add the information as text to the node. This in turn will cause a change to the DOM and execute the code in the script element.

According to Chenette, the entire process—from data being transferred over the network to triggering JavaScript within the DOM—can slip under the radar because no malicious content touches the file system. It's done completely in memory, and any content that is transferred over the network is done in such tiny fragments that anti-virus engines parsing the information don't have enough context or information to match any signatures.

The attack, which has not been seen in the wild by Websense, works on all the major browsers. Technically, however, it is not a browser vulnerability—it merely takes advantage of the way browsers work.

Given that much of Web-based malware is distributed through compromised sites as opposed to rogue sites created by attackers, the method poses a significant threat in today's non-static, Web 2.0 environment, Chenette said. While disabling JavaScript, for example, would prevent the attack, that's not a realistic answer for most Web users.

"The problem with not allowing scripting is you break the functionality of almost all the top 50 Web sites that require JavaScript to be enabled," Chenette said. "One of the things that security vendors have to do is start understanding that we live now in a Web 2.0 world, not a Web 1.0 world, where active content is something we need to deal with everyday. That is the content that needs to be scanned … it is very important not only to look at the static content that has been put on disk but be able to detect changes inside of the browser."

Source

Firefox integrated NTLM authentication

Firefox, Mozilla, and friends CAN now do integrated NTLM Authentication. You need to set the following 4 preferences:

network.automatic-ntlm-auth.allow-proxies true

network.automatic-ntlm-auth.trusted-uris proxy1 (where proxy1 = the name of your proxy), proxy2, domain FQDN, etc

network.negotiate-auth.trusted-uris proxy1, proxy2, domain FQDN, etc

network.negotiate-auth.delegation-uris proxy1, proxy2, domain FQDN, etc

Here is how:
1. Type about:config in URL bar
2. In search bar type any part of the item you are looking for (ntlm or Negotiate)
3. Click on the item you want to change. (Or double click if it is a boolean, to change it)
4. Change the value in the pop up.
5. Click OK
6. Presto!

Friday, November 21, 2008

chrome preinstall on PC says google

Google is considering pre-installing its Chrome browser on personal computers in the search giant’s latest challenge to the dominance of Microsoft’s Internet Explorer.

According to a report in The Times, Google will likely start working those deals after it pulls the “beta” label from Chrome in early 2009. Likewise, it expects to release Mac and Linux versions of the browser in the first half of next year, which positions it to be accessible by 99 percent of computers.

Latest industry figures show that Internet Explorer currently enjoys a 71.3 per cent market share worldwide, with Mozilla Firefox at nearly 20 per cent. Chrome is used by less than 1 per cent of all web users, but is still under public testing before a final version is ready to launch.

AVG Antivirus Update Mistakenly Deletes System File (NewsFactor)

An update for the AVG 8 antivirus software for Windows 2000, XP and Vista released Saturday mistakenly warned that the Windows system file user32.dll was a Trojan horse. The problem affected the Dutch, French, Italian, Portuguese and Spanish versions.

AVG Technologies immediately corrected the problem for both free and paid versions of its software. If users acted on the update's warning, the user32.dll file was deleted, leaving Windows XP systems endlessly rebooting or unable to reboot.

The Czech-based AVG posted details of the problem and a method to fix it on the AVG Web site. The fix involves disabling AVG services and copying the user32.dll file from the Windows installation CD -- but only if the PC was not rebooted.

The effect on Windows Vista systems, if any, was not clear.

A company representative said, "AVG is actively working to remedy the problem some users are experiencing related to the most recent update to commercial and free versions of AVG 7.5 and AVG 8.0 in some languages. A number of users who installed the update mistakenly received a warning that the Windows system file user32.dll product version 5.1.2600.3099 was infected with a Trojan virus and were prompted to delete a file essential to the operation of Windows XP."

'High School Musical'-themed malware hits the Net (CNET)

Teens and young adults interested in downloading High School Musical-related music and video on peer-to-peer networks should be wary of malware, warns Panda Security.

While this may be obvious to older computer uses, younger users may not yet have experience with the social engineering used by malware writers, the security vendor said Friday in a press release.

If a person opens a High School Musical-themed video or song on any peer-to-peer network such as eMule or eDonkey, his or her computer may be infected with infected by VB.ADQ, the Agent.KGR Trojan, the adware Koolbar, or another strain of malicious code.

Panda recommends being cautious when downloading files. In particular, notice the file extension. Many of the malicious files have the extension ".exe," but that is rarely the case with a legitimate music or video file.

Wednesday, November 19, 2008

Your Own Home Server - Introduction

Your Own Home Server - Introduction

An Introduction

In this tutorial you will learn how to step up your own server. This server will be comprised of Apache 1.3.5, PHP 4.2.0, and MySQL 3.23.49. This tutorial will address the basic setup of a server on your own computer. This means the removal of hassles of dealing with the company that is running a remote web server. It will be easy to modify. You can add any thing you want to it, be it CGI/Perl, Zope, Roxen, etc, all by your self. You will have unlimited disk space, well at least as big as your hard drive is =) Now that you know the advantages, it is time that I tell you what i used, and what you will need.

What I used
* Windows 2000 - NOTE that if you are using 2k you WILL NEED Administrative Privileges. If you don't then get them somehow =) If you are on 95, 98, NT, XP, ME, I
* Apache 1.3.6 - I tried to use 2.0 but I could not get it work. I also feel that 1.3.6 is tried and true, so why mess with greatness.
* Mysql 3.23.49 - The newest version of MySQL when I set up my server. MySQL also the is the best PHP supported Database, and well love PHP don't we.
* PHP 4.2.1 - The latest and greatest PHP release. -nt

What you will need
* Apache 2 - Link: h**p://www.apache.org/dist/
* Mysql 3.23.49 - Link: h**p://www.mysql.com/downloads/mysql-3.23.html
* PHP 4.2.0 - Link: h**p://www.php.net/downloads.php
* Windows - This tutorial is ONLY written for new versions of Windows.

Once you have downloaded all the programs you are ready to continue.

1. Installing Apache

Installing Apache

The first step is to download Apache for Windows. Before you install it make sure that any other server software is removed. Remove it all via the control panel.On

Once you have clicked on the executable, a screen should com up that looks like this. Go ahead and click on next

user posted image

Of course you plan to abide be the license agreement, so click on I accept.... and click on next.

user posted image

You really don't need to read this, but if you want you can. Read it if you want feel informed. When you are ready click on next.

user posted image

Here is where the actual setup of Apache begins. For Network Domain put in localhost as for Server Name You want these both to be localhost because the server is running locally, on your computer. It doesn't matter what is in email field, just put in yours. No one will no it because it's just you.

user posted image

For the sake of this tutorial it is better to just leave it as it is because, later in the tutorial I will show you how to start the server with one click of the mouse, and for the sake of ease, it will be easier for you to follow along. You can change it if you want, but you will have to realize where to substitute it. For me the root drive is E: but for you will probably be C:

user posted image

Once you have all the jazz set up, it is time to install the server. If you are on w2k or XP be sure that you have Administrative permissions or you will get an error about half way through the install saving cannot access msvrt32.dll or something. If you get that error run it again when you have admin privileges. Once you are ready click on install.

user posted image

If all went well you just see a screen similar to this. Now it is time to test the install of apache. Click on Start > Program Files > Apache HTTP Server and look for start Start Apache in Console. Click it. Once it says Apache XXXXX running, press Windows Key + R and type -http://localhost/. If the install works you should see a page saying that it works. If all is set and done, continue to the next step.

user posted image
______________________________________________________________________
2. Installing PHP
Once you have clicked on the executable, a screen should come up that looks like this. Go ahead and click on next.

user posted image

Of course you plan to abide be the license agreement, so click on I accept.... and click on next.

user posted image

For this information, we will want the simple standard install. Chances are you if you are reading this tutorial, you will probably not even want to talk about advanced =)

user posted image

This is the mail setup, just enter localhost, and me@localhost.com. These are not important, because you, the admin, are the only person that will use the server, and you will be the one handling errors.

user posted image

We are going to want this install to work is Apache, so click on Apache, and move on.

user posted image

Once you have all the jazz set up, it is time to install the server. If you are on w2k or XP be sure that you have Administrative permission or you will get an error about half way through the install saving cannot access msvrt32.dll or something. If you get that error run it again when you have admin privileges. Once you are ready click on install.

user posted image

After the install is done you should get something that says you will have to manually configure apache to use php. Assuming you have a working Apache server installed, make sure that it is not running. Navigate to C:\Program Files\Apache Group\Apache\conf\ open the httpd.conf file. Note that you can also get to the http.conf from the start menu. Start > Program File > Apache HTTP Server > Configure Apache Server > Edit the Apache httpd.conf Configuration File and the window will open up in notepad. Now hit Ctrl + End if you see something like what follows, you can skip this step. If you do not see that code, copy it. This code will only work if you used the default install folder when you installed php. If you did, copy that code and paste it into the end of the file. Select the code to right, and hit crtl + c , then go into the httpd.conf file and hit ctrl + v and save the file.

ScriptAlias /php/ "c:/php/"

AddType application/x-httpd-php .php .phtml

Action application/x-httpd-php "/php/php.exe"

Now that we have php installed, it is time to test it. Open up notepad and type the code to the right. Save it as phpinfo.php. Remember to set it as all files in the drop down menu, or the file will be a text file. Save in the Directory: C:\Program Files\Apache Group\Apache\htdocs. htdocs is the directory where all the files go. You can create endless dir's and browse them. For Example E:\Program Files\Apache Group\Apache\htdocs\mydir\myfile.php could be accessed as http://localhost/mydir/myfile.php. Once you have that file saved. You will need to start the Server. Click: Start > Program File > Apache HTTP Server >; and look for something like Start Apache in Console. After you have found it, launch it. You should get a window saying that Apache is running. Now go to Start > Run > and type in -http://localhost/phpinfo.php. If you don't see anything, php is not installed correctly. If php is installed correctly, you will see a few large tables, displaying php's configuration. Now Your are 1/2 done!
______________________________________________________________________
3. Installing MySQL
Once you have clicked on the executable, a screen should com up that looks like this. Go ahead and click on next.

user posted image

Of course you plan to abide be the license agreement, so click on I accept.... and click on next.

Just like before you should leave the default dir alone, so you will be able to follow along with me when I show you how to start and stop all the aspects of the server.

Stay with the typical installation. Just like before, if you don't have admin privileges, the install will be faulty. After you click next, the install will begin. After the install has finished, move on to the next step.

Now you have to set up the root account. The root account is the absolute admin of the system, the highest possible. Click on Start > Run and type cmd to open up the command prompt. You are going to have to navigate to where MySQL is installed. Type C: > Enter > cd mysql > Enter > cd bin > Enter. Now you have to tell setup the root settings. Type mysqladmin -uroot password InsertYourPasswordHere then hit enter.

To see an image of the screen, -h**p://www.webmasterstop.com/tutorials/images/doscreen1.gif

What is the point of having a database if you can't easily administer it! That is where phpMyAdmin comes into play. phpMyAdmin is a free piece of software written in php that makes the administration of a mysql or many other types of databases easy. You will want to download (h**p://prdownloads.sourceforge.net/phpmyadmin/phpMyAdmin-2.2.6-php.zip?downloadrelease_id=85832)the latest version. Save it in the htdocs folder. Once it is done downloading it, right click on it and select Extract > To Here. When it is done you should end up with a directory in the htdocs folder called phpMyAdmin-2.2.6 To make it easier to access, rename it to phpMyAdmin. After you have renamed it, click on it and look for a file called config.inc Open it. This is where you set the configuration of phpMyAdmin. When you open it up, it should look similar to the image to your side. On yours there should be a few things missing. The $cfgPmaAbsoulteUrl and $cfgservers[$i]['password']. You will need to fill those in between the quotes. for the $cfgPmaAbsoulteUrl enter -http://localhost/phpMyAdmin/ if you followed my instructions to the letter. If you did not rename it or extracted to a different directory, put that in there. For the $cfgservers[$i]['password'] enter the password you entered when you were setting MySQL in the set above. You can refer to the image for help. After you have put the right things in save the file.

To see an image of the screen, -h**p://www.webmasterstop.com/tutorials/images/phpmyadminscreen1.gif

Now we want to test the install of mysql, php, phpmyadmin, and apache all at once. Start apache in console like we did before. Now, you are going to need to start mysql. For myself I made a file that would start mysql for me. Open notepad and type: start c:\mysql\bin\mysqld-nt.exe --standalone and save that as Start MySQL.bat. Once you have saved it, click it. A window should open and then close. Mysql is now running on your computer. After mysql and apache are started go to run again and type -http://localhost/phpMyAdmin/index.php and if everything is installed correctly phpmyadmin should so up. You are almost done! Now we have the easy part =)

4. Finishing it all up

Wow! We mad it through the whole process. Now we want to simplify the whole process of controlling the server. I made a toolbar with all the things I needed. I made a new folder on my desktop and called it Server Folder and put all the stuff there. I made a new shortcut and gave it a value of -http://localhost/ made a shortcut to the PHP Documentation page. Another shortcut to my php editor, which is now unavailable. The phpMyAdmin shortcut is set to -http://localhost/phpMyAdmin/index.php. I made another shortcut htdocs. I moved the Start Apache in Console program that was in the start menu folder and moved it to the server folder. You can take the Start Mysql file you made in the last page and move it to the new folder. After you have put all the desired things into that folder, right click on a blank space in stat menu task bar (where the program boxes lie) and select Toolbars > New Toolbar and navigate to the folder. Voila!

Now all you have to do is click Start Apache in Console , Start Mysql, and Lauch browser biggrin.gif

Here You Are Guys

Hardware Firewall

The best firewall is a hardware firewall that is completely separate from your operating system. It need not be a dedicated router, could be an old pentium box running Linux. Below I have found some sites that have How To's on setting up an outside hardware router using an old computer and using a little linux program that fits on a single floppy disk.

Brief Description:
floppyfw is a router with the advanced firewall-capabilities in Linux that fits on one single floppy disc.

Features:
Access lists, IP-masquerading (Network Address Translation), connection tracked packet filtering and (quite) advanced routing. Package for traffic shaping is also available.
Requires only a 386sx or better with two network interface cards, a 1.44MB floppy drive and 12MByte of RAM ( for less than 12M and no FPU, use the 1.0 series, which will stay maintained. )
Very simple packaging system. Is used for editors, PPP, VPN, traffic shaping and whatever comes up. (now this is looking even more like LRP (may it rest in peace) but floppyfw is not a fork.)
Logging through klogd/syslogd, both local and remote.
Serial support for console over serial port.
DHCP server and DNS cache for internal networks.

floppyfw


h#tp://www.zelow.no/floppyfw/



Sentry Firewall CD-ROM is a Linux-based bootable CDROM suitable for use as an inexpensive and easy to maintain firewall, server, or IDS(Intrusion Detection System) Node. The system is designed to be immediately configurable for a variety of different operating environments via a configuration file located on a floppy disk, a local hard drive, and/or a network via HTTP(S), FTP, SFTP, or SCP.

The Sentry Firewall CD is a complete Linux system that runs off of an initial ramdisk, much like a floppy-based system, and a CD. The default kernel is a current 2.4.x series kernel with various Netfilter patches applied. An OpenWall-patched current 2.2.x kernel is also available on the CD.

Booting from the CDROM is a fairly familiar process. The BIOS execs the bootloader(Syslinux) - which then displays a bootprompt and loads the kernel and ramdisk into memory. Once the kernel is running, the ramdisk is then mounted as root(/). At this point our configuration scripts are run(written in perl) that configure the rest of the system. It is the job of these configure scripts to put the various startup and system files into the proper location using either what is declared in the configuration file(sentry.conf) or the system defaults located in the /etc/default directory.

Most of the critical files used at boot time can be replaced with your own copy when declared in the configuration file. This is essentially how we allow the user to configure the system using his/her own configuration and init files.

All of the binaries, files, scripts, etc, used to create the CD-ROM are also available on the CD-ROM. So, with a little practice, you can easily build and customize your own bootable Sentry Firewall CD. Please see the HOWTO for more details.


Sentry Firewall
ht*p://www.sentryfirewall.com/docs.html#overview

Guide For Getting Free Stuff

Ok, if you are like me you have heard so much about the FreeIpods and FreeFlatScreens websites on different forums, blogs, IM's, etc, you are about to puke. So am I. But yet the draw of getting an Ipod for doing basically nothing is pretty strong. I dismissed all the "stories" of people getting their ipods as the marketing machine at work. However, when Kevin Rose published that not only did he receive his, but a few of his friends did as well, I figured I might take a chance and give it a go. Today I received proof that it does indeed work. Yep, I got my iPod.

Whats in it for them?
Step 1. Collect Names.
Step 2. Send those names items worth $200 or more
Step 3. ?????
Step 4. Profit

Before I signed up, I wanted to get to the bottom of the ?????. I didn't want any sweaty, filth pushing webmonkeys to have all my info, so I did my research. Gratis Internet, the parent company of the FreeIpods, FreeFlatscreens, etc. sites, recently did an interview with Wired Magazine.
In this article Gratis states that they are acting as Head Hunters for companies (more on that later) and are paid between $50-$90 per referral. Although this seems like a lot of money, this is nothing compared to what these companies spend for print advertising which does not guarentee ANY customers. So now we know what ?????? equals. ??????=$50-$90 for Gratis per guranteed customer (referral sites).

How Does it Work?
You sign-up on one (or more) of the following websites:

http://www.FreeMiniMacs.com/?r=14098976
This site gives away free Mini Macs. At the time of this writing only the 80gb MiniMac was available.

http://www.FreeDesktopPC.com/?r=13082204
This site gives away free flat screen monitors and TVs. At the time of this writing the following flat screens were available: Sony 19" LCD, Samsung 15" SyncMaster 510MP LCD TV, Samsung SyncMaster 710N LCD Monitor, Sony 27" FD Trinitron WEGA TV, or a 24" Toshiba TV/VCR/DVD combo

http://www.FreeGamingSystems.com/?r=12660654
This site gives away gaming systems. At the time of this writing the Slim PS2, Xbox, Nintendo Gamecube, and Nintendo DS were available.

http://www.FreeHandbags.com/?r=13950244
This site gives away high-end handbags. Might be a good surprise for your wife or girlfriend. =) At the time of this writing the following bags were available: Prada Mini-Hobo (black, Pink, Powder Blue), Burberry Novacheck Minisling, Coach Signature Demi Pouch (black, camel, purple), Kate Spade Pia Pochette (Black, Pink, Red)

http://www.mp3players4free.com/default.aspx?r=82419
This site gives out free mp3 players. You can get paypal $275, ipod, rio carbon, iriver, ipod mini.

http://www.dvrs4free.com/default.aspx?r=90581
This site gives away TiVo, Replay TV, and $275 paypal.

http://www.macminis4free.com/default.aspx?r=181183
Another mini mac site.

http://www.cameras4free.com/default.aspx?r=90773
This site is giving away high end digital cameras. At the the time of writing this, you follow cams are available: Canon Powershot S1 IS, Sony DSC-P100, Sony DSC-W1, Canon Powershot A95, $325 paypal.


Ok, so here is the tricky part. Once you sign up with one of these websites, you have to complete an "offer" from gratis's advertisers. There are numberous offers, some being better than others. Now remember the ???? = $50 - $90 equation? In order for you to receive your ipod/Flatscreen/Desktop PC/Handbag you have to refer 5, 8, or 10 of your friends, and they have to complete one of the offers as well. Then in order for them to receive theirs they need to refer others, and so on. So lets just look at why they are going to send an Ipod to you. (1(you) + 5(your friends)) x $90 = $540 - $250(ipod) = $290 profit for them just for you signing up. The advertisers are more than willing to pay, and FreeIpods is more than happy to send you your ipod. Works out for everyone.

What is the basic "lingo"?
"ref"/"referral" = The thing required to get your free items. These are your friends.
"green" = Status indicator that means your offer has been completed.
"yellow" = Status indicator that means your offer has yet to be completed or is in the process/pending.
"hold" = Means your account has been suspended or stopped. DON'T CHEAT.
"STV" = Means your product has been "Shipped To Vendor" You should recieve it in about 10 days time.

What process should you use to sign up (to ensure that you will get your item)
When signing up, it is recommended that you use Internet Explorer (sucks) some people have reported problems using other browsers (ex. Firefox, opera, etc.) Also make sure you have cookies accepted.

1. Click on one of the links above and enter a VALID US mailing address.

2. Complete the marketing survey - not your answers do not have any impact on you receiving your item. Just say no to them.

3. Once you have signed up, you should receive a verification email. If you did not receive one, go to the "My Account" page and click the link to have them resend it. If you still did not get it check your spam folder.

4. Sign-up with one of their partners and complete the offer. (see the section which offer should I choose) It can take up to 15 days for your offer to show completed. (A term that we freebie goers use for a "completed offer" is called "credit.") But usually they show completed after 24 hours. Be patient. If it doesn't show up as completed, you can email the site with proof and confirmation for signing up and they will give you credit.


Which offer should I choose?
Just so you know all offers require a credit card, **HOWEVER** not all of them cost anything! =) Here is a list of my recommended offers and I have not had any problems whatsover with doing these.

* Video Professor: This requires a credit card and pay only $3 shipping for computer tutorial CDs. After you receive the CDs, just call customer support and cancel your membership. Return to sender the CDs and they will refund you the shipping costs.

* Complete Home: Instant verification. Sign up for their program for $1 two month trial. You get a FREE $20 Lowes Gift Card just for doing this offer. Cancel your subscription within the 2 month trial and pay NOTHING and keep the gift card!

* Buyer's Advantage: Instant verification. Sign up for their program for $1 two month trial. You get a FREE $20 Circuit City Gift Card just for doing this offer. Cancel your subscription within the 2 month trial and pay NOTHING and keep the gift card!

* Great Fun: Instant verification. Sign up for their program for $1 two month trial. You get a FREE Walkie Talkie just for doing this offer. Cancel your subscription within the 2 month trial and pay NOTHING and keep the gift card!

* Traveler's Advantage: Instant verification. Sign up for their program for $1 two month trial. You get a FREE Thin Digital Camera just for doing this offer. Cancel your subscription within the 2 month trial and pay NOTHING and keep the gift card!

* eFax Plus: Sign up for their fax service. You get a 30 day free trial. Upon receiving credit for doing the offer, simply cancel the service within the free trial and pay nothing! It usually take 1-3 days to receive credit for this offer.

* Blockbuster Online: Try a two week trial of Blockbuster's Netflix-like service. Cancel online within trial time and pay nothing.

*Zooba: If you are a book fan, sign up for this offer. You get a book for $10 with free shipping. Instant verification.

*Various Credit Card offers: Apply for a credit card and get approved. When it arrives, cut it up and toss it out. Nothing to cancel, nothing to pay, and free stuff to gain!

Many of these offers are big companies, so you do not have to question the legitimacy for signing up under them. In other words, you will be safe because you are giving your credit card information to aol, blockbuster, and general motors, and i highly doubt that they will sell this info.

These are free, as long as you cancel within the trial period. Some offer online cancellations while others require calling their support number. Just tell them that you dont find yourself using their services enough so you want to cancel and they'll cancel your membership without any problems.

Cheating
Many of these free sites take cheating very seriously. If you want your free gift and not have you account suspended, simply DON'T CHEAT! Don't refer yourself and do all the offers yourself. If you think you can cheat the system because you are a 1337 h4x0r and you can use proxies and IP spoofs to refer yourself, DON'T DO IT. When you are in the approval stage, they will intensely throughly examine your account and make sure that all your referrels are legit and unique. Trust me, I know many people who have gotten suspended for attempting to cheat.

Multiple Accounts
This goes under cheating. It is wise not to create multiple accounts under the same site because it is against the free site's TOS. They suspend you no matter what your reason is, even if it was an accident. This also includes referring family members. You can only create one account under one household, under one IP address per site. So you cannot refer mother, sister, or brother to do it unless they live in another household.

So you've ran out of offers to do. What do I do?
Ok, if you are a freebie freak, you will probably eventually run out of offers to do because of the fact that you signed up for so many free sites did all the easy free offers. What shoud you do? Remember that free sites give you credit for a unique signup for the offers. So if you signed up for blockbuster online offer at freeflatscreens, you cannot do it again for another free site such as freedesktoppc. But there is a trick to this. A unique signup = a unique credit card that you used to sign up. So if you have a another credit card, you can sign up for the offer again. Another method is to purchase a visa gift card from your mall, or go to www.webcertificate.com and purchase a virtual debit/credit card and do the offers with those.

If you followed all these steps correctly, your free gift will be delivered to your doorstep in no time.

Here are the steps:
1. Getting friends to sign up under you
2. Approval Stage: They will analyze your account for fraud. Takes 1 week.
3. Pending Stage: Your account have been approved. You are now processing. This will take 1-2 weeks.
4. STV: Sent to Vendor. Your product will arrive in 10 days.
5. Shipped: Congrats!

Most of these freebie sites are for U.S residents only.

How do I overburn a CD with Nero?

Start Nero

From the action-bar select File and select Preferences.



In the Preferences window, select Expert Features(1) and check the Enable overburn disc-at-once(2).


Choose a Maximum CD Length(3) and click OK(4) (*82:59:59 is the maximum value I suggest, but as you can see from the screen capture above I have set mine significantly higher. The reason is because I frequently use 99min 850 MB CD media).

For a more accurate test you can use a nero tool called nero speed test to see how much a specific CD is capable of being overburned . get it here

From the action-bar select File and select Write CD.

A window will appear when you have exceeded expected length, click OK to start the overburn copy.

Remember to set disk to burn Disc at Once, you cannot overburn in Track at Once Mode.

Caught A Virus?

If you've let your guard down--or even if you haven't--it can be hard to tell if your PC is infected. Here's what to do if you suspect the worst.


Heard this one before? You must run antivirus software and keep it up to date or else your PC will get infected, you'll lose all your data, and you'll incur the wrath of every e-mail buddy you unknowingly infect because of your carelessness.

You know they're right. Yet for one reason or another, you're not running antivirus software, or you are but it's not up to date. Maybe you turned off your virus scanner because it conflicted with another program. Maybe you got tired of upgrading after you bought Norton Antivirus 2001, 2002, and 2003. Or maybe your annual subscription of virus definitions recently expired, and you've put off renewing.

It happens. It's nothing to be ashamed of. But chances are, either you're infected right now, as we speak, or you will be very soon.

For a few days in late January, the Netsky.p worm was infecting about 2,500 PCs a day. Meanwhile the MySQL bot infected approximately 100 systems a minute (albeit not necessarily desktop PCs). As David Perry, global director of education for security software provider Trend Micro, puts it, "an unprotected [Windows] computer will become owned by a bot within 14 minutes."

Today's viruses, worms, and so-called bots--which turn your PC into a zombie that does the hacker's bidding (such as mass-mailing spam)--aren't going to announce their presence. Real viruses aren't like the ones in Hollywood movies that melt down whole networks in seconds and destroy alien spacecraft. They operate in the background, quietly altering data, stealing private operations, or using your PC for their own illegal ends. This makes them hard to spot if you're not well protected.

Is Your PC "Owned?"

I should start by saying that not every system oddity is due to a virus, worm, or bot. Is your system slowing down? Is your hard drive filling up rapidly? Are programs crashing without warning? These symptoms are more likely caused by Windows, or badly written legitimate programs, rather than malware. After all, people who write malware want to hide their program's presence. People who write commercial software put icons all over your desktop. Who's going to work harder to go unnoticed?

Other indicators that may, in fact, indicate that there's nothing that you need to worry about, include:

* An automated e-mail telling you that you're sending out infected mail. E-mail viruses and worms typically come from faked addresses.
* A frantic note from a friend saying they've been infected, and therefore so have you. This is likely a hoax. It's especially suspicious if the note tells you the virus can't be detected but you can get rid of it by deleting one simple file. Don't be fooled--and don't delete that file.

I'm not saying that you should ignore such warnings. Copy the subject line or a snippet from the body of the e-mail and plug it into your favorite search engine to see if other people have received the same note. A security site may have already pegged it as a hoax.

Sniffing Out an Infection

There are signs that indicate that your PC is actually infected. A lot of network activity coming from your system (when you're not actually using Internet) can be a good indicator that something is amiss. A good software firewall, such as ZoneAlarm, will ask your permission before letting anything leave your PC, and will give you enough information to help you judge if the outgoing data is legitimate. By the way, the firewall that comes with Windows, even the improved version in XP Service Pack 2, lacks this capability.

To put a network status light in your system tray, follow these steps: In Windows XP, choose Start, Control Panel, Network Connections, right-click the network connection you want to monitor, choose Properties, check "Show icon in notification area when connected," and click OK.

If you're interested in being a PC detective, you can sniff around further for malware. By hitting Ctrl-Alt-Delete in Windows, you'll bring up the Task Manager, which will show you the various processes your system is running. Most, if not all, are legit, but if you see a file name that looks suspicious, type it into a search engine and find out what it is.

Want another place to look? In Windows XP, click Start, Run, type "services.msc" in the box, and press Enter. You'll see detailed descriptions of the services Windows is running. Something look weird? Check with your search engine.

Finally, you can do more detective work by selecting Start, Run, and typing "msconfig" in the box. With this tool you not only see the services running, but also the programs that your system is launching at startup. Again, check for anything weird.

If any of these tools won't run--or if your security software won't run--that in itself is a good sign your computer is infected. Some viruses intentionally disable such programs as a way to protect themselves.

What to Do Next

Once you're fairly sure your system is infected, don't panic. There are steps you can take to assess the damage, depending on your current level of protection.

* If you don't have any antivirus software on your system (shame on you), or if the software has stopped working, stay online and go for a free scan at one of several Web sites. There's McAfee FreeScan, Symantec Security Check, and Trend Micro's HouseCall. If one doesn't find anything, try two. In fact, running a free online virus scan is a good way to double-check the work of your own local antivirus program. When you're done, buy or download a real antivirus program.
* If you have antivirus software, but it isn't active, get offline, unplug wires-- whatever it takes to stop your computer from communicating via the Internet. Then, promptly perform a scan with the installed software.
* If nothing seems to be working, do more research on the Web. There are several online virus libraries where you can find out about known viruses. These sites often provide instructions for removing viruses--if manual removal is possible--or a free removal tool if it isn't. Check out GriSOFT's Virus Encyclopedia, Eset's Virus Descriptions, McAffee's Virus Glossary, Symantec's Virus Encyclopedia, or Trend Micro's Virus Encyclopedia.

A Microgram of Prevention

Assuming your system is now clean, you need to make sure it stays that way. Preventing a breach of your computer's security is far more effective than cleaning up the mess afterwards. Start with a good security program, such Trend Micro's PC-Cillin, which you can buy for $50.

Don't want to shell out any money? You can cobble together security through free downloads, such as AVG Anti-Virus Free Edition, ZoneAlarm (a personal firewall), and Ad-Aware SE (an antispyware tool).

Just make sure you keep all security software up to date. The bad guys constantly try out new ways to fool security programs. Any security tool without regular, easy (if not automatic) updates isn't worth your money or your time.

Speaking of updating, the same goes for Windows. Use Windows Update (it's right there on your Start Menu) to make sure you're getting all of the high priority updates. If you run Windows XP, make sure to get the Service Pack 2 update. To find out if you already have it, right-click My Computer, and select Properties. Under the General tab, under System, it should say "Service Pack 2."

Here are a few more pointers for a virus-free life:

* Be careful with e-mail. Set your e-mail software security settings to high. Don't open messages with generic-sounding subjects that don't apply specifically to you from people you don't know. Don't open an attachment unless you're expecting it.

* If you have broadband Internet access, such as DSL or cable, get a router, even if you only have one PC. A router adds an extra layer of protection because your PC is not connecting directly with the Internet.

* Check your Internet ports. These doorways between your computer and the Internet can be open, in which case your PC is very vulnerable; closed, but still somewhat vulnerable; or stealthed (or hidden), which is safest. Visit Gibson Research's Web site and run the free ShieldsUP test to see your ports' status. If some ports show up as closed--or worse yet, open--check your router's documentation to find out how to hide them.

Configuring your Bulletproof FTP Server Tutorial

I am not sure where I found this tutorial, It’s been a while…It might even have been here... ..So if it is one of yours, my hat goes off to you once again....

After reading the excellent tutorial on "Creating an FTP" that Norway posted…

(I would suggest reading and following his tutorial first, then following up with this one)

I thought that perhaps this tutorial might be pretty helpful for those interested in knowing how to configure their Bulletproof FTP Server that don't already know how... Here's how to get started…

This is for the BulletProof FTP Server 2.10. However, It should work fine on most following versions as well.

I'm assuming you have it installed and cracked.

Basics
1. Start the program.
2. Click on Setup > Main > General from the pull-down menu.
3. Enter your server name into the 'Server Name' box. Under Connection set the “Max number of users" to any number. This is the limit as to how many users can be on your sever at any time.
4. Click on the 'options' tab of that same panel (on the side)
5. Look at the bottom, under IP Options. Put a check in the box “Refuse Multiple Connections from the same IP”. This will prevent one person from blocking your FTP to others.
6. Also put a check in the 'Blocked Banned IP (instead of notifying client). VERY IMPORTANT! If somebody decides to 'Hammer' (attempt to login numerous times VERY quickly) your server/computer may CRASH if you don't enable this.
7. Click on the 'advanced' tab
8. At the bottom again look at the 'hammering area'
9. Enable 'anti-hammer' and 'do not reply to people hammering' Set it for the following: Block IP 120 min if 5 connections in 60 sec. You can set this at whatever you want to but that is pretty much a standard Click 'OK'

Adding Users
11. Setup > User accounts form pull-down.
12. Right click in the empty 'User Accounts' area on the right: choose 'Add'
13. Enter account name. (ie: logon name)
14. In the 'Access rights' box right click: choose ‘Add’.
15. Browse until you find the directory (folder) you want to share. In the right column you will see a bunch of checkboxes. Put a check in the following ones: Read, Write, Append, Make, List, and +Subdirs. Press 'select'.
16. Enter a password for your new FTP account.
17. Click on 'Miscellaneous' in the left column. Make sure 'Enable Account' is selected. Enable 'Max Number of Users' set it at a number other than zero. 1 for a personal account and more that one for a group account. Enable 'Max. no. of connects per IP' set it at 1

18. Under 'Files' enable 'show relative path' this is a security issue. A FTP client will now not be able to see the ENTIRE path of the FTP. It will only see the path from the main directory. Hide hidden flies as well.
Put a tick in both of these.

Advanced:
You don't need to do any of this stuff, but It will help tweak your server and help you maintain order on it. All of the following will be broken down into small little areas that will tell you how to do one thing at a time.

Changing the Port
The default port is always 21, but you can change this. Many ISPs will routinely do a scan of its own users to find a ftp server, also when people scan for pubs they may scan your IP, thus finding your ftp server. If you do decide to change it many suggest that you make the port over 10,000.
1. Setup > Main > General
2. In the 'Connection' Area is a setting labeled 'Listen on Port Number:'
3. Make it any number you want. That will be your port number.
4. Click 'OK'

Making an 'Upload Only' or 'Download Only' ftp server.
This is for the entire SERVER, not just a user.
1. Setup > Main > Advanced
2. In the advanced window you will have the following options: uploads and downloads, downloads only, and uploads only. By default upload and download will be checked. Change it to whatever you want.
3. Click 'OK’


While you are running your server, usually you will end up spending more time at your computer than you normally do. Don't be afraid to ban IP's. Remember, on your FTP you do as you want.

When you are online you must also select the open server button next to the on-line button which is the on-line Button

You also have to use the actual Numbered ip Address ie: 66.250.216.67

Or even Better yet, get a no-ip.com address

Sunday, November 16, 2008

UPDATES for Firefox, Safari ON CRITICAL SECURITY

Apple and Mozilla have each issued updates to fix a large number of critical security flaws in their respective Safari and Firefox Web browsers. The Apple update, which brings Safari to version 3.2, is reportedly causing many users to experience frequent browser crashes.

Other problems with this update may be related to a new anti-phishing feature built into Safari 3.2 (Firefox and Microsoft's Internet Explorer have had this feature for more than two years now).

Mozilla Corp. on Wednesday patched 11 vulnerabilities in Firefox 3.0 -- and 12 bugs in the older Firefox 2.0 -- that could be used to compromise computers and steal information. Yesterday's update patched virtually the same number of vulnerabilities as the last security update seven weeks ago.

Firefox 3.0.4, the fourth update since Mozilla launched the browser in June, fixes six flaws rated "critical," two "high," two "moderate," and one "low" in Mozilla's four-step scoring system. Most of the critical bugs could be used by hackers to introduce their own malicious code into a vulnerable system.

Apple Quietly Releases Safari 3.2

Sunday nov 16 apple launched the update to safari version 3.2. The feature includes various feature to upgrade like:-
The notable feature is that it finally adds anti-phishing technology, an area where Safari has lagged behind competitors.
Aside from that, it provides some security fixes, improved JavaScript performance, and a slightly newer version of Webkit, pulling their Acid3 score up to 77.

Google iPhone Voice Recognition App



GOOGLE voice recognition search application for the iPhone, originally set for launch on Friday, will likely go live sometime Monday, we’ve heard from a source with knowledge of the situation.
Apple left Google completely in the dark as to why the app didn't make it into the store on Friday, as previously planned. Google keeps an airtight lock on their news, and John Markoff's piece in the NYT was supposed to accompany the app's release

The good news for Google and all that were eagerly awaiting this app, is it will likely become available come Monday. This news comes from a source with insider knowledge of the situation (according to a report at TechCrunch). Google has apparently had little contact with Apple during this period, and have been getting updates on the situation via the iPhone developer tool which has had a status of ‘in review’ for the last few days .

Thursday, November 6, 2008

Wars-of-browsers

There are the periods when Netscape & internet browser explore had the war for there place. Brits scientist sir Tim Berne less had never thought his 1991 which was renames Nerves would lead to origin a various change in 2008 World Wide Web.

Browsers are important tool for searching internet. Here I try to find which is great among




Fire Fox 3

Mozilla one of the failure browsers among the open sources users breaks the records by downloading 8 million in just 24 hours. Firebox has a simple 8 clean logout with light-weight 78MB. It is say 8 have rich a. it have various active security feature like (anti-phishing, pop-blocker, password managers, parental controls).

The area that lacks are speed & performance firebox is now of the blocks talking marginally longer. It takes about 1 to 14 at first startup & four to eight seconds to startup later.
Fire fox is great with its feature like bookmarks & history management, search engine integration & tabbed browsing. It is far ahead with thousands assours to pick. The manager is an easy way to in stall as sour by listing popular us without need to open a webpage.
Book-mark is done clicking star in the location tab change to golden means page is Booked.
Password manager is unobtrusive with a discreet toolbar shown instead of the dialog box that offers to remember passwords.
Spelling checking & searching on page is also well important.

Google Chrome

Every product has its important. When a goggle products comes then its goes to box in the web.
Since its logo looks like a pogo ball bat it has not left Google color.
Chrome is just easy to use simple & looks great. There is a tab bar in place of the little bar with no menu bar & tool bar cluttering the interface. The one thing in the address bar (also known as the amni bar) which doubles up as a search bar. when opening new tabs, chrome displays a preview of sites in the new tab which is like operas speed dial. There are no advance navigational options – only the forward/back/refresh.

Chrome is not loaded with feature but user can create application shortcuts to webpage on desktop. A handily feature that is also available in chrome is resizing areas like the comment box in the webpage. Besides that chrome is same like other browsers having basic bookmaking, full search engine functionality, password management etc.
Chrome logs more system resources than any other browsers chrome loads the site speedy but it had issues with heavy content sites.
Chrome is great but still at early stage to compare with established browsers.

Opera

Opera is a feature rich as firebox is but in narrowly loses out to the later. It has lots of feature that are hard to find in other browsers like e-mail. IRC & Bittorent clients etc. An option for controlling opera with voice commands is available, but it’s only for 2000/Xp has not been perfected yet. Operas mouse gesture is another feature which is useful for the someone who wants to navigate quickly. Data sharing is possible through the opera link a free service that synchronizes book-marks, speed dial entries, notes & other personal data between multiple computers.
Perspire boasting so many innovative & unique feature it disappoints as it is not yet, open source. Opera is erratic. Sometime its really quick but often lags behind the navigation time when compared to firebox & I.E
Opera disappoints on its Book-Marks as it does not provides on click bookmrking, editing & managing in ease. Password management still fit primitive with irritating boxes pop such when a password is entered. Search engine integration is not yet truthful, it provides mine default engine but does not provide good integration. Opera provide basic history management.

Internet Exploer-8

Microsoft latest offering is IE8 beta. Which claims its fast safe easy? Ie8 have lots of add-ons. Some free some non free
Accelators that provides easy access to various web services from any WebPages with just few mouse clicks. Another unique is web slices. Microsoft uses this technology to automatically trace sites. Using slices user can keep up frequently updated sites directly from favorite bar. Ie8 has a separate process for individual tab in browser windows.
Lacking feature is the download manager which is limited. IE still is copyright of Microsoft and no proper password mgmt.

Wednesday, November 5, 2008

How to set folder permission

Linux (and almost all other Unixish systems) have three user classes as follows:
  • User (u): The owner of file
  • Group (g): Other user who are in group (to access files)
  • Other (o): Everyone else

You can setup following mode on each files. In a Linux and UNIX set of permissions is called as mode:

  • Read (r)
  • Write (w)
  • Execute (x)

However, above three modes or permission have different meaning for file and directory:

Linux Read mode permissions

  • Read access on a file allows you to view file
  • Read access on a directory allows you to view directory contents with ls command

Write mode permissions

  • Write access on a file allows you to write to file
  • Write access on a directory allows you to remove or add new files

Execute mode permissions

  • Execute access on a file allows to run program or script
  • Execute access on a directory allows you access file in the directory

Octal numbers and permissions

You can use octal number to represent mode/permission:

  • r: 4
  • w: 2
  • x: 1

For example, for file owner you can use octal mode as follows. Read, write and execute (full) permission on a file in octal is
0+r+w+x = 0+4+2+1 = 7

Only Read and write permission on a file in octal is
0+r+w+x = 0+4+2+0 = 6

Only read and execute permission on a file in octal is
0+r+w+x = 0+4+0+1 = 5

Use above method to calculate permission for group and others. Let us say you wish to give full permission to owner, read & execute permission to group, and read only permission to others, then you need to calculate permission as follows:
User = r+w+x = 0+4+2+1 = 7
Group= r+w+x = 0+4+2+0 = 6
Others = r+w+x = 0+0+0+1 = 1

Effective permission is 761.

chmod command

To setup file permission you need to use chmod command:
chmod {mode} {file-name}

To setup file permission 761 you need to use chmod command as follows:
# chmod 0761 file
To setup a file readable by anyone and writable by the owner only:
# chmod 644 file
To setup a file readable/executable by everyone and writable by the owner only:
# chmod 755 file
You can change permissions for all files and directories within a directory by using the -R option on the chmod command. For example, to setup others read and execute access to all files and directories (and files and directories within directories), you need to type command as follows (i.e. change the modes of the file hierarchies rooted in the files instead of just the files themselves):
# chmod -R 755 directory-name/

However, Linux (and UNIX) stores and process user database in different format.

The root user

  • The root user is the super user.
  • The root user can control entire Linux system including files, process, applications etc. The root user has full access to system.
  • You should not use root for day-to-day tasks as root has full system access.
  • Never ever, give root password to anyone.

For more information see What defines a user account?

User database

  • User database is stored in /etc/passwd file
  • User passwords and password expiry information stored in /etc/shadow file

Group database

  • User group information is stored in /etc/group file

UNIX/Linux User rights

There are two types of user rights (traditional):

  • File level user rights or permissions granted using chmod and chown command
  • Administrative (root) level rights granted using sudo.

If you type the following command:

$ ls -l

You’ll see something like the following:

-rw-r--r-- 1 indiver webusers 14814 2006-07-26 13:25 working-nixcraft.txt 

Look at 3rd, 4th and last columns.

  • vivek is username or the owner of the file (userid)
  • webusers is group name, so all users in webusers can access file working-nixcraft.txt
  • working-nixcraft.txt is the file name.

As the root user you can change or setup user file related rights/permission using chmod and chown command.

Task: change file owner and group

Consider following example:

$ ls -l foo.txt

Output:

-rw-r--r-- 1 vivek webgroups 8 2006-08-08 17:57 foo.txt

Change files ownership to tony user:

# chown tony foo.txt
# ls -l foo.txt

Output:

-rw-r--r-- 1 tony webgroups 8 2006-08-08 17:57 foo.txt

Change foo.txt group to ftpusers:

# chown tony:ftpusers foo.txt
# ls -l foo.txt

Output:

-rw-r--r-- 1 tony ftpuseers 8 2006-08-08 17:57 foo.txt

You can also operate on files and directories recursively using -R option. For example setup /var/www/html ownership to user lighttpd including subdirectories:

# chown -R lighttpd /var/www/html

Task: change files access rights/permissions

You need to use chmod command. Please refer the old article - how Linux file permissions work.

Task: Grant administrative rights to a normal user

You need to use sudo tool. It allows a permitted user to execute a command as the superuser or another user, as specified in the /etc/sudoers configuration file.

A note for Ubuntu Linux users

You can use chmod and chown command to setup user rights. Make sure you prefix all commands with word (command) sudo:

$ sudo chown tony:ftpusers foo.txt

Q. How do I use chmod and chown command under Linux?

A. Use chown command to change file owner and group information. Use chmod command to change file access permissions such as read, write etc.

chown command

chown command changes the user and/or group ownership of each given file.

For example following command will setup user and group ownership to root user only for /backup directory:
# chown root:root /backup
Set user user ownership to root user and allow any member of ftp group to access file.txt (provided that they have sufficient read/write rights).
# chown root:ftp /home/data/file.txt

HOPE THIS TIPS WILL HELP TO KNOW THE THE BASIC COMMAND OF LINUX ADMIN

Red Hat Linux Video Player Installtion

You can use VLC or mplayer both can play movies, mp3, dvd and so on. However, these packages are not part of default installation and not supported by RedHat. You need to install 3rd party repo such as RPMforge to install the package.

For 34 bit version i386:
wgethttp://packages.sw.be/rpmforge-release/rpmforge-release-0.3.6-1.el5.rf.i386.rpm For 64 bit version x86_64
wgethttp://packages.sw.be/rpmforge-release/rpmforge-release-0.3.6-1.el5.rf.x86_64.rpm Now, type the following command to install packages vlc, mplayer and xmms:

yum install vlc mplayer xmms xmms-mp3

Use vlc to dvd and movies
vlc file.avi

Use mplayer to view dvd, tv, radio etc
mplayer *.mp3
mplayer file.avi

Use xmms to play mp3
xmms &

Dual boot linux and mac osx leopard kalyway 10.5.2



Dual boot linux and mac also we can make triple boot with vista is very hard than I think and finally I got it. I spent 3 days to did it succesfully. Ok, this is way of my installation. I made in single hard disk, Pentium 4 3.0ghz, 1 gig RAM, Nvidia geforce fx5500 256mb, 80 gig hard disk drive.

Preparation before make dual boot


1. You must already have Super Grub Disk before install all this method. Burn iso image in your mini cd. Find SGD at http://supergrub.forjamari.linex.org)

2. EasyBCD for windows. Download here: http://neosmart.net/dl.php?id=1

3. Vista OS, Mac OSX and Linux OS' dvd/cd.

4. Burn gparted iso in your mini cd.


Install vista in your pc

Vista or windows xp, it must install in first partition and absolutely you're already have it in your HD. But if you're advance user, forget my advice here. :p We can install windows anytime, anywhere actually...

After installing windows, you can use easyBCD and make a new MBR. Just choose linux, windows and vista in MBR. Good software for all download free here:
http://neosmart.net/dl.php?id=1

Install Vista first.. you can choose any partition.
After installing Vista, install EasyBCD and create Mac in MBR by EasyBCD.

##############################################################################

Linux
Ok, now I already have vista. Install linux in any partiton, I made logical partition and choose ubuntu 8.04.1 as primary and opensuse kde 4 as extended. I don't working with lilo, I was using grub. In terminal, edit menu.lst,

$ sudo gedit boot/grub/menu.lst

and add this below or above ubuntu title. It is from windows menu.lst. We will repair it later. Don't panic if it won't boot to mac.





title Mac OSX
root (hd0,0)
makeactive
chainloader +1


Reboot pc and restart linux back. Because I have two linux, so I boot to times to login to ubuntu and opensuse.

#################################################################################################

Mac OSX
Actually, you can install mac or linux before or after. It's up to you. I install mac osx 10.5.2 kalyway in my pc pentium 4. But after iatkos 10.5.4 release, I installed iatkos. This is how to install kalyway. To install iatkos 10.5.4, check out at my post here:
http://linux-guider.blogspot.com/2008/09/installing-iatkos-1054-is-easy.html

-Insert dvd, boot..
-press F8
-enter -v and wait. Grab your "Nasi Lemak or Roti Canai". Eat until macosx ready for next work.

- Utilities -> Disk Utility in the menu bar. Find the hard drive in the sidebar you want to install Leopard.
- Erase -> Mac OS Extended (Journaled) format. (Rename, no space or special character)
- quit Disk Utility and head back to the Installer.
- utilities - terminal
- enter this command

fdisk -e /dev/rdisk0
flag 2 <--note that flag 2 is my mac partiton number two
quit
y

then, you can quit terminal. Quit Disk Utility and head back to the Installer.

-Hit Continue at the Welcome screen, agree to the terms, and then be sure to hit the Customize button before proceeding with your installation.
-install package comes with individual settings that match specific motherboards. Buti I leave all default. I don't want to feel head-ache.
-When the installation is complete (around an hour), let your computer restart, pop out the install disc, and sit back in wonder as Leopard runs on your PC in full 10.5.2. Watch start-up movie and grab your "chicken chop". Register your profile and password and don't register to mac.

################################################################################################

WHAT HAPPEN IF I GOT HFS + ERROR?

After installing Mac, you will got error message in boot such as HFS+error in bootloader. USE SUPER GRUB DISK. SGD is useful tool for recover linux grub and windows MBR.

Free iso download here:
http://supergrub.forjamari.linex.org

Repair grub

Use super grub disc to REPAIR menu.lst. Just edit by type e and enter. Change hd0,0 to hd0,2. Test boot.. If fail.. change to hd0,3 or hd1.0 or whatever until it boot. All menu.lst attaced here is for example. If you have a doubt to boot mac or windows in grub, choose title mac osx in grub menu, we will edit it please enter:

e

on title macosx, change root (hd0,0) to

root (hd0,1)

it's mean, you will boot in partition number 1. Press enter and:

b

You will boot to mac osx or windows. If still doubt, you can try any number, Look mine here..





title Mac OSX
root (hd0,2)
makeactive
chainloader +1


WINDOWS GONE??

Repair windows startup using windows cd/dvd.

MAC OSX GONE?


Never gone, but it is hidden until you find it back with easybcd on WINDOWS or supergrub disk in linux.

REFIT?

I never use refit.. Please tell me what is refit?? lol

Conclusion
1. Before installing three of this OS, make sure you have make a back up copy of your important data.
2. Burn SGD in mini vcd and keep it as your important hardware.
3. Keep easyBCD.exe in you removable disk.
4. maybe gparted iso also useful.

Good luck!

installing iatkos 10.5.4 is easy!!



Wow.. it is easy to install it. No more hacking, just doing simple method except if you have other OS partition. iatkos 10.5.4 is more quiet than kalyway. My fan turning in low speed.
Second time I did it. I was amazed, it really easy to install.


How to install iatkos 10.5.4?


First time I follow a guide but it doesnt work.
Actually, it is just 2-3 steps depend on your choice. Don't add nforce -v or toh -v or whatever. Just enter, -v for verbose mode ok?

1. For fresh install:

utilities - disk utilities - view partiton - choose partiton - choose hard disc - erase tab - volume format "mac os extended (journaled) - name "OSX or whatever, avoid space" - erase tab - pop up erase - DONE!! - QUIT

2. But I have other OS, forget step 1 and..

utilities - disk utilities - choose hard disc - erase tab - volume format "mac os extended (journaled) - name "OSX or whatever, avoid space" - erase tab - pop up erase - DONE!! - QUIT

3. multi OS boot (forget this if you just want to install macosx only):

utilities - terminal

fdisk -e /dev/rdisk0
flag
quit
n

then, you can quit terminal.

4. Back to mac os x instaler...

continue - agree - select destination - continue -customize - select kernel ToH 9.2 only - install - skip - reboot

5. You're finish. I don't change anything in customize tab!! It saves me!! Reboot pc and take out your dvd and put it in case while boot. If macosx don't want to restart, help it by pressing restart button. (I'm not kidding lol)

6. So now, watch a start up movie and register yourself.

Pro

Easy install than other version
Install in 25 minutes

Cons

Sometimes a desktop blinking after install X11.dmg - solved after install Kernel ToH 9.2


how to speed up your youtube using squid

After struggled a week to find info how to cache youtube with squid proxy, ( the truth is, it is hard to cache youtube because of their multiple server redirection )

Use squid on linux!! I have successfully done it. You can save your limited bandwidth with squid proxy and cache

get it now..

Squid is a proxy http server that speeds up getting pages from the internet by keeping copies of commonly accessed pages or graphics instead of downloading them each time. To install it:-

On ubuntu, opensuse, mandriva, fedora, gentoo, arch etc, you can find in a repo by keyword squid. If you made any changes, you can reconfigure it using :

/usr/sbin/squid -k reconfigure (depending upon the installation location of squid)

Let's play fast youtube with ubuntu

1. From a root terminal type apt-get install squid

2. Open gedit /etc/squid/squid.conf

3. Find the TAG: visible_hostname and after the comments section add visible_hostname where is your machine’s hostname.

4. Check http_port is either set to 3128 or a port number that you can remember for configuring your browser.

5. Close and save

6. Type adduser squid and specify a password

7. Restart squid by typing: /etc/init.d/squid restart

8. Stop the service by typing /etc/init.d/squid stop

9. Test it in debug mode by typing squid -z (which creates the cache files)

10. Type squid -NCd10 to test squid in debug mode and leave it running.

11. Open Firefox and type the URL localhost:3128 or whatever port you chose. It will fail to retrieve a page, but at the bottom it will confirm that the error is generated by squid.

12. Back at the Terminal type CTRL-C to cancel the debug mode

13. Start squid for real with /etc/init.d/squid start. It will start automatically from now on.

14. To configure Firefox to use squid, go to Edit>Preferences and click Advanced.

15. Click Network>Settings and then Manual Proxy Configuration. For http proxy, enter localhost and for port 3128 (or whichever port you chose).

16. Then click OK and close the Preferences dialogue.

17. Now go to any webpage. If you get the page, it’s working

Yahoo-Mail-Configuring-Email-Client-(Mozilla Thunderbird)-on-Ubuntu-Debian-based


First you need to add the following line to source list file by editing the /etc/apt/sources.list file
$ sudo gedit /etc/apt/sources.list

Add the following line
deb http://tskariah.000webhost.com/ubuntu ubuntu main
Save and exit the file

Add the PGP public key for the new repository
$ wget http://tskariah.000webhost.com/t_skariah.asc.gpg -O- | sudo apt-key add -

Update the source list
$ sudo apt-get update

Install YPOPs!
$ sudo aptitude install ypops

Re-configure YPOPs! for Ubuntu
$ sudo dpkg-reconfigure -fgnome ypops

Other front-ends could be “dialog” (default), or “web”.The old /etc/ypops.ini would be saved as /etc/ypops.ini.bak
A dialog will popup with help for every option available .
Configuration note


Don’t check the ‘Add a new account’ in the first step unless you have multiple yahoo accounts.
If you’re installing YPOPs! on a LAN computer that acts as a router, replace the bind address 127.0.0.1 with the LAN address reachable by the other network PCs (192.168.1.1 or 10.10.0.1 for example).


How to start YPOPs! for Ubuntu manually
$ sudo /etc/init.d/ypops start

How to stop YPOPs! for Ubuntu manually:
$ sudo /etc/init.d/ypops stop

How to automatically start YPOPs! for Ubuntu at bootup
Use the configuration wizard.

How to remove YPOPs! for Ubuntu:
$ sudo apt-get remove ypops

Directory structure:
/etc/init.d/ypops - init script/etc/ypops.ini - config file/usr/bin/ypops - executable file/var/log/ypops/ - log directory/var/run/ypops.pid - pid file

WARNING: The log directory is readable by all. If the log-level is set to Advanced, YPOPs! would dump all the HTML pages there, which might contain private information.

If you want to configure Mozilla Thunderbird to access your yahoo email use the following steps
  • Click Tools-> Account Settings
  • Click Add Account button.
  • Choose Email account. Click Next
  • Type name and email address in the boxes. Click Next
  • Choose POP and type ‘localhost’ as the incoming server.
  • Depending on your preferences check or uncheck Use Global Inbox
  • Click Next. If your username is not already there by default, add it.
  • Click Next. Add the way you want your Account Name to look in Thunderbird.
  • Click Finish.

Now scroll down to the bottom of the Account Settings pane and click on Outgoing server (SMTP).Click on Advanced. Click on Add.
  • Type 127.0.0.1 as the outgoing mail server. Port default is 25.
  • Check Use name and password. This is Thunderbird’s way of enabling authentication.
  • Type your Yahoo user name as username@yahoo.com.
  • Click No to Use secure connection and then OK twice.
  • Click OK to the Server Settings window.

Now get back into Account SettingsGo back to the Server Settings of you Yahoo Account in the Account Settings pane.

Do not check Use secure connection (SSL) or Use secure authentication.
  • Click on Advanced.
  • Choose where you want your emails to go in the POP tab.
  • Click on the SMTP tab and click on the drop down menu and select 127.0.0.1:25
  • Continue modifying any of your preferences in the account and then click on OK.

The first time you try to access the account, Mozilla will ask for a password and if you want Mozilla to remember the password.

Vodafone Mobile Connect Card (VMC) software On linux

Vodafone Mobile Connect Card (VMC) software On linux also can use with Huawei E 220 usb modem.

Betavine has been release vodafone-mobile-connect-card-driver-for-linux-2.0.beta3

Download free at: https://forge.vodafonebetavine.net/frs/?group_id=12

How to install? Enter this at terminal. (Note that VMC by Betavine requires some python lib, so you must get my installer first at http://huaweie220.blogspot.com)

sudo sh vodafone-mobile-connect-card-driver-for-linux-2.0.beta3-installer.run

some problem could be solve. See my screenshots here.

When you start it at terminal use "gksu vodafone-mobile-connect-card-driver-for-linux" command, it will get better. But what happen if you use a shortcut from application-Internet-vodafone-mobile-connect-card-driver-for-linux? It will show a message box like this:



to solve this problem, close the message box. Drag and drop the short-cut to desktop. Right-click the short-cut and enter properties. Select Launcher and add gksu like this:

gksu vodafone-mobile-connect-card-driver-for-linux



Press close. Replug your usb modem. Ok, on a Desktop, click the short-cut. For the first time, it will show this:



Ok enter your profile and this is mine:



close a program. Click the icon again and it will show this. If you cant get connect, (it still authenticated) just close the window and click again the icon. Maybe 2 to 5 times.



This is when it done!!





If you get another problem? this also can be solve.

I was informed that these two files needed their permissions changed from 0600 to 0660:
/etc/ppp/chap-secrets
/etc/ppp/pap-secrets

Vodafone Mobile Connect Card driver for Linux needs the following files and dirs with some specific permissions in order to work properly: /etc/ppp/pap-secrets should have 0660 mode, found 0600 /etc/ppp/chap-secrets should have 0660 mode, found 0600

How to solve this problem??

Ok, now it is easy, just open terminal and give this three command:

sudo chmod g+rw /etc/ppp/*-secrets
sudo chmod 0660 /etc/ppp/pap-secrets
sudo chmod 0660 /etc/ppp/chap-secrets

Another command you should know and use if VMC take a too long time to get connected.

sudo modprobe -r ehci_hcd

How to play VCD on Linux using VLC

regarding VLC’s playing VCDs. I think I’ve found something.

Open file, In the Open Disc dialogue, click at Disc tab and chosing VCD at disc type gives me this:

vcdx:///dev/hdd :audio-track=0

in the advanced options.
/dev/hdd is my CD-ROM drive, obviously.

I tried changing that to:
vcd:///dev/hdd :audio-track=0

removing the “x” from the MRL. It worked.

With VLC, it works, except that the sound is intermittent.
Cheers!

mplayer
------

It doesn't work for me even I use this:

mplayer vcd://2 or 1



How to know your vcd://**? (for newbies)
Right click at *.dat file and open with mplayer.. Right click at mplayer screen and open vcd dialogue, it will say "failed to open vcd://*. Sometime it is vcd://1 and other time is vcd://2.

I also create new directories..

sudo mkdir /dev/hdd
sudo mkdir /dev/cdrom
sudo mkdir /dev/dvd
sudo mkdir /dev/dvdrw

and then I put this:

sudo ln -s /dev/myphysicaldriveaddress /dev/disk
sudo ln -s /dev/myphysicaldriveaddress /dev/hdd
sudo ln -s /dev/myphysicaldriveaddress /dev/cdrom
sudo ln -s /dev/myphysicaldriveaddress /dev/dvd
sudo ln -s /dev/myphysicaldriveaddress /dev/dvdrw



I'll will upgrade my post if I found something new...

Several types of mobile broadband connection in Linux

In linux GPRS, EDGE, UMTS and HSDPA mobile broadband sand, we installer standard mobile pc suite and is designed specifically for Linux. However, we can connect the camera linux Huawei, Vodafone, 3 mobile phones and phones like Sony Ericsson, Nokia, Motorola, etc. with special software.


However, most still come with linux support special file for the connection (only supported Mandriva 2009 found nothing Huawei E220 installation). We edit wvdial.conf etc., resolv.conf and add a little long the. This is one reason that I presented HE220 installer, because I want to do all the work will be easy.


If you set all without my installer, it takes more than 30 minutes to set. With my setup, just open terminal, become root and type "make install" and "wvdial huawei". The installation was completed in about 10 seconds.


Download he220rc3 here:


He220rc3.tar.gz size 24.086 KB


http://www.filefactory.com/dlf/f/3179e2/b/5/h/21c360c872ddb97ba7a08f6765dae00d/j/0/n/he220rc3_tar_gz


http://www.filefactory.com/file/3179e2/n/he220rc3_tar_gz


he220r1 for Ubuntu and Ubuntu based solely on direct download for free:


http://www.wikiupload.com/download_page.php?id=65521


http://www.filefactory.com/file/2a5ec3/n/he220r1-for-ubuntu_tar_gz


http://www.savefile.com/files/1830364


http://www.2shared.com/file/4068697/de789423/he220r1-for-ubuntutar.html


For your information, this system is already in place in most 3G handsets and mobile. It is supported by ttyUSB0 usb 3g 3g ttyACM0 mobile phone dial-up configuration and another set as Novatel etc. You can check the file / etc / wvdial.conf and edit to your liking. Important that you share with installer companion, friend, lover and his family. Keep this on your installation of removable devices or backup data CD or DVD for future use.


This connection is geek, right? Do not worry if your computer can install my software, you can do a few steps.


KPPP = ppp for KDE


GPPP = ppp for gnome


Vodafone Mobile coonect card software for linux-Betavine = vodafone


UMTSmon = very simple but useful software

Network Manager applet = 0.7 this is new to linux 3G arena, published by Ubuntu Intrepid

Network applet = PCLOS and Mandriva (for version 2009) Mobile Internet Connector

How to remove messengerskinner.exe

MessengerSkinner.exe is a part of MessengerSkinner software. MessengerSkinner is a potentially unwanted application that may drop a copy of Trojan.Skintrim on to the computer. It may also display pop-up advertisements on the computer. Here is a full process on how to remove it. 


 

1. Temporarily Disable System Restore (Windows Me/XP).
2. Update the virus definitions.
3. Uninstall Messenger Skinner
a) Click Start > Settings> Control Panel or Start > Control Panel (this varies with the operating system).
b) In the Control Panel window, double-click Add/Remove Programs.
c) Click Messenger Skinner to remove.
d) Click Add/Remove, Change/Remove, or Remove (this varies with the operating system). Follow the prompts.

4. Reboot computer in SafeMode
5. Run a full system scan and clean/delete all infected file(s)
6. Delete/Modify any values added to the registry.
 

Navigate to and delete the following registry entries:
HKEY_CURRENT_USER\Software\Microsoft\Windows\CurrentVersion\Run\”[RANDOM CHARACTERS]” = “c:\documents and settings\administrator\local settings\application data\[RANDOM CHARACTERS].exe [RANDOM CHARACTERS]”
HKEY_CURRENT_USER\Software\Microsoft\Windows\CurrentVersion\Run\”messengerskinner” = “C:\Program Files\MessengerSkinner\MessengerSkinner.exe”

Navigate to and delete the following registry subkeys:
HKEY_CURRENT_USER\Software\LanConfig
HKEY_CURRENT_USER\Software\MessengerSkinner
HKEY_LOCAL_MACHINE\SOFTWARE\MessengerSkinner
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Uninstall\MessengerSkinner
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Uninstall\[RANDOM CHARACTERS]

7. Exit registry editor and restart the computer.

In order to make sure that threat is completely eliminated from your computer, carry out a full scan of your computer using AntiVirus and Antispyware Software. You can also try Online Virus Scanner which doesn’t need any installation.

What’s new in the Flash 10 security

The new version of Adobe Flash (actually 10 beta) has a variety of features and enhancements aimed to increase the security.

You can read a detailed article of Trevor McCaulery here: http://www.adobe.com/devnet/flashplayer/articles/fplayer10_security_changes.html

It seems that the Adobe security is based on:

  • require user interaction: to avoid automatic explotation and warn user about flash actions
  • new features that ovverride olds with a more secure implemtation

A browser as web hacking platform

A list of Firefox plugins to turn your browser in an hacking platform. This is an improved list based on "Turning Firefox to an ethical hacking platform" from Security-Database.com

Information gathering

  • Whois and geo-location
    • ShowIP
      : Show the IP address of the current page in the status bar. It also
      allows querying custom services by IP (right mouse button) and Hostname
      (left mouse button), like whois, netcraft.
    • Shazou
      : The product called Shazou (pronounced Shazoo it is Japanese for
      mapping) enables the user with one-click to map and geo-locate any
      website they are currently viewing.
    • HostIP.info Geolocation : Displays Geolocation information for a website using hostip.info data. Works with all versions of Firefox.
    • Active Whois : Starting Active Whois to get details about any Web site owner and its host server.
    • Bibirmer Toolbar
      : An all-in-one extension. But auditors need to play with the toolbox.
      It includes ( WhoIs, DNS Report, Geolocation , Traceroute , Ping ).
      Very useful for information gathering phase
  • Enumeration / fingerprinting
    • Header Spy: Shows HTTP headers on statusbar
    • Header Monitor
      : This is Firefox extension for display on statusbar panel any HTTP
      response header of top level document returned by a web server.
      Example: Server (by default), Content-Encoding, Content-Type,
      X-Powered-By and others.
  • Social engineering
    • People Search and Public Record:
      This Firefox extension is a handy menu tool for investigators,
      reporters, legal professionals, real estate agents, online researchers
      and anyone interested in doing their own basic people searches and
      public record lookups as well as background research.
  • Googling and spidering
    • Advanced dork
      : Gives quick access to Google’s Advanced Operators directly from the
      context menu. This could be used to scan for hidden files or narrow
      in a target anonymously (via the scroogle.org option)
    • SpiderZilla : Spiderzilla is an easy-to-use website mirror utility, based on Httrack from www.httrack.com.
    • View Dependencies
      : View Dependencies adds a tab to the "page info" window, in which it
      lists all the files which were loaded to show the current page. (useful
      for a spidering technique)

Security Assessment / Code auditing

  • Editors
    • JSView
      : The ’view page source’ menu item now opens files based on the
      behavior you choose in the jsview options. This allows you to open the
      source code of any web page in a new tab or in an external editor.
    • Cert Viewer Plus
      : Adds two options to the certificate viewer in Firefox or Thunderbird:
      an X.509 certificate can either be displayed in PEM format (Base64/RFC
      1421, opens in a new window) or saved to a file (in PEM or DER format -
      and PKCS#7 provided that the respective patch has been applied - cf.
    • Firebug
      : Firebug integrates with Firefox to put a wealth of development tools
      at your fingertips while you browse. You can edit, debug, and monitor
      CSS, HTML, and JavaScript live in any web page
    • XML Developer Toolbar:allows XML Developer’s use of standard tools all from your browser.
    • Web developer : Adds a menu and a toolbar with various web developer tools.
  • Headers manipulation
    • HeaderMonitor
      : This is Firefox extension for display on statusbar panel any HTTP
      response header of top level document returned by a web server.
      Example: Server (by default), Content-Encoding, Content-Type,
      X-Powered-By and others.
    • RefControl : Control what gets sent as the HTTP Referer on a per-site basis.
    • User Agent Switcher :Adds a menu and a toolbar button to switch the user agent of the browser
  • Cookies manipulation
    • Add N Edit Cookies : Cookie Editor that allows you add and edit "session" and saved cookies.
    • CookieSwap
      : CookieSwap is an extension that enables you to maintain numerous sets
      or "profiles" of cookies that you can quickly swap between while
      browsing
    • httpOnly : Adds httpOnly cookie support to Firefox by encrypting cookies marked as httpOnly on the browser side
    • Allcookies : Dumps ALL cookies (including session cookies) to Firefox standard cookies.txt file
  • Security auditing
    • HackBar
      : This toolbar will help you in testing sql injections, XSS holes and
      site security. It is NOT a tool for executing standard exploits and it
      will NOT learn you how to hack a site. Its main purpose is to help a
      developer do security audits on his code.
    • Tamper Data : Use tamperdata to view and modify HTTP/HTTPS headers and post
      parameters.
    • Chickenfoot
      : Chickenfoot is a Firefox extension that puts a programming
      environment in the browser’s sidebar so you can write scripts to
      manipulate web pages and automate web browsing. In Chickenfoot, scripts
      are written in a superset of Javascript that includes special functions
      specific to web tasks.

Proxy/web utilities

  • FoxyProxy
    : FoxyProxy is an advanced proxy management tool that completely
    replaces Firefox’s proxy configuration. It offers more features than
    SwitchProxy, ProxyButton, QuickProxy, xyzproxy, ProxyTex, etc
  • SwitchProxy:
    SwitchProxy lets you manage and switch between multiple proxy
    configurations quickly and easily. You can also use it as an anonymizer
    to protect your computer from prying eyes
  • POW (Plain Old WebServer)
    : The Plain Old Webserver uses Server-side Javascript (SJS) to run a
    server inside your browser. Use it to distribute files from your
    browser. It supports Server-side JS, GET, POST, uploads, Cookies,
    SQLite and AJAX. It has security features to password-protect your
    site. Users have created a wiki, chat room and search engine using SJS.
  • Torbutton : Torbutton provides a button to securely and easily enable or disable
    the browser’s use of Tor. It is currently the only addon that will
    safely manage your Tor browsing to prevent IP address leakage, cookie
    leakage, and general privacy attacks.

Misc

  • Hacks for fun
    • Greasemonkey : Allows you to customize the way a webpage displays using small bits of JavaScript (scripts could be download here)
  • Encryption
    • Fire Encrypter
      : FireEncrypter is an Firefox extension which gives you
      encryption/decryption and hashing functionalities right from your
      Firefox browser, mostly useful for developers or for education &
      fun.
  • Anti Spoof
    • refspoof
      : Easy to pretend to origin from a site by overriding the url referrer
      (in a http request). — it incorporates this feature by using the
      pseudo-protocol spoof:// .. thus it’s possible to store the information
      in a "hyperlink" - that can be used in any context .. like html pages
      or bookmarks