Saturday, November 23, 2019

Friday, November 22, 2019

Sunday, November 17, 2019

Friday, January 18, 2019

Saturday, July 8, 2017

Thursday, December 1, 2016

Wednesday, November 23, 2016

Configure Static IP On CentOS 6



Below steps will show configuration to set static IP address in Cent-OS machine.

    Network configuration files are under "/etc/sysconfig/network-scripts".
    We can open the file with editor like nano, vi, vim etc...
   
    Here I will use vi editor.
   
    In this server we will set Static IP for eth0 Ethernet port

1 - Start your server running Cent-OS enter root user credentials and login.

2 - Type the command,

         vi /etc/sysconfig/network-scripts/ifcfg-eth0

    This will open network configuration file, edit below lines:

         NM_CONTROLLED=yes
         ONBOOT=yes
         TYPE=Ethernet
         BOOTPROTO=static
         IPADDR=192.168.1.44            # Replace IP with your new
         NETMASK=255.255.255.0     # Replace IP with your subnet mask

3 - Type the command,

         vi /etc/sysconfig/network
   
    This will open file to set default gateway, edit below lines:

         NETWORKING=yes
         GATEWAY=192.168.1.1        # Replace IP with your gateway IP

4 - Type the command,

          vi /etc/resolv.conf
   
    This will open file to set DNS,

          nameserver 8.8.8.8                # Replace IP with your DNS IP
          nameserver 192.168.1.1        # Replace IP with your DNS IP

5 - To apply changes restart network interface, Type the command.
   
          /etc/init.d/network restart
   
NOTE:
Some time you might face issue in accessing your system. It can be due to firewall.
       
        To stop firewall temporary execute command,

            service iptables stop
           
        To stop firewall permanently execute command,

            service iptables stop
            chkconfig iptables off
           

 
ENJOY! and Stay connected.

Thursday, August 4, 2016

Install and Secure Apache, My SQL, PHP & phpMyAdmin on a CentOS 6




To Install Apache, My SQL, PHP & phpMyAdmin follow below process, 


    a) Run below command to install Apache, My SQL, PHP and phpMyAdmin
   
        yum install httpd mysql-server php php-mysql
   
    b) Run below command to start Apache & MySQL service,
   
        service httpd start
        service mysqld start
   
    c) Run below command to add Apache & MySQL service in startup,
   
        chkconfig httpd on
        chkconfig mysqld on

    d) Run below command to set database password, and other settings,
   
        mysql_secure_installation
       
     e) Run below command to install phpMyAdmin
      
        yum install epel-release
        yum install phpmyadmin

     f) Open below file, update required detais and restart apache service,
   
    /etc/httpd/conf.d/phpMyAdmin.conf

    Require ip your_workstation_IP_address
    . . .
    Allow from your_workstation_IP_address
    . . .
    Require ip your_workstation_IP_address
    . . .
    Allow from your_workstation_IP_address
    . . .

    service httpd restart

       
    g) Open below url to test apache and phpMyAdmin
   
        Apache
        http://<IP_address>
       
        phpMyAdmin
        http://<IP_address>/phpmyadmin

ENJOY! and Stay connected.
       

Friday, June 10, 2016

Modify host-name in Cent-OS 6

To change host name you must have root access of the system. We can do it using any text editor, here I am using text editor "vim".

Open /etc/sysconfig/network file.

         [root@lmntechnohub ~]# vim  /etc/sysconfig/network

Modify the HOSTNAME= value, and set your new host name.

     HOSTNAME=lmntechnohub.com

For internal networking, change the entries in host files at /etc/hosts .

     127.0.0.1    localhost localhost.localdomain

     10.10.10.10 lmntechnohub.com

Run the host-name command. This command will change host-name of Linux server, but it will not immediately update all programs that are running with old host-name.

     [root@lmntechnohub ~]# hostname lmntechnohub.com

     [root@lmntechnohub ~]# hostname

     lmntechnohub.com

     [root@lmntechnohub ~]#

To finalize it restart network service on your system, to ensure that changes will there on system restart.

     [root@lmntechnohub ~]# /etc/init.d/network restart

ENJOY! and Stay connected.

Wednesday, June 8, 2016

Networking between Host Computer and VM In VirtualBox

Hi friends,

How to access Virtual machine in Oracle VM VirtualBox from host computer to?



If you have a VM installed in virtual box, of your host system and want to access it from your host system. If your system is connected to a switch you can set network attached option as bridge and can access it in your network as a remote system.

But if you have a single system and want to access VM installed in virtual box of your host system without a switch.

Here I will show you how to do it, use VirtualBox host only Ethernet network adapter for communicating between VM and your Host computer. Host-only networking is another networking option in virtual box network.

With bridged networking option, the virtual machines can communicate with internet through physical Ethernet.

But as the name indicating there is only Host for networking. This adapter will connect VM in Virtual box and Host system. No outside connection (Internet or Other network).

Host only network adapter is for internal networking between VM and your Host computer only.

Lets check how to do so.

1- Open Network and Sharing center > Adapter Settings on your host computer and look for VirtualBox Host-Only Network adapter.

2- Double click on Internet Protocol Version 4. Put a Static IP. DNS and gateway are optional.

3- Now start Virtual Box application, go to  Settings > Network. Select Host-Only Adapter from Attached to drop down menu, and click OK.

4- Now start VM in Virtual Box and go to Network Adapter settings, Right click and select Properties.


5- Double click on Internet Protocol Version 4. Assign a Static IP address of the same range that you assigned to the your host system. DNS and gateway are optional.


6- Open command prompt then try to ping host and vice versa. Refer the screen shots below.


My Host (Windows 7) Static IP :- 10.10.44.100
Virtual Box VM (Windows 10) Static IP :-
10.10.44.254


Virtual box Windows 10 is able to ping Host Windows 7 and vice versa

ENJOY! and Stay connected.

Tuesday, April 14, 2015

How to use a Ethernet splitter.


Imagine u have One Ethernet point came in your room and you want to connect two device one your laptop and other one is your desktop.

Now what will you do?


You can purchase a switch or a hub and connect your devices with it, Or You May pull a new wire for the your second device.
But both the options are expensive.

I have one more options for you which is cheap and easy as compared to other.
You can use a Ethernet splitter.


But how does it work?
You might know a Ethernet cable has 8 wires.
But among them only 4 cables are only used to transmit and receive data for a device. So we can use the other 4 cables to transmit and receive data but for other device.


For more check the video below.
ENJOY! and Stay connected.

Tuesday, March 17, 2015

Recover email passwords from email client.(Mail PassView).


Mail PassView is a small password-recovery tool that reveals the passwords and other account details for the following email clients:

  • > Outlook Express
  • > Microsoft Outlook 2000 (POP3 and SMTP Accounts only)
  • > Microsoft Outlook 2002/2003/2007/2010/2013 (POP3, IMAP, HTTP and SMTP Accounts)
  • > Windows Mail
  • > Windows Live Mail
  • > IncrediMail
  • > Eudora
  • > Netscape 6.x/7.x (If the password is not encrypted with master password)
  • > Mozilla Thunderbird (If the password is not encrypted with master password)
  • > Group Mail Free
  • > Yahoo! Mail - If the password is saved in Yahoo! Messenger application.
  • > Hotmail/MSN mail - If the password is saved in MSN/Windows/Live Messenger application.
  • > Gmail - If the password is saved by Gmail Notifier application, Google Desktop, or by Google Talk.
 
For each email account, the following fields are displayed: Account Name, Application, Email, Server, Server Type (POP3/IMAP/SMTP), User Name, and the Password. 

Known Problems - False virus alert

Some Antivirus programs detect Mail PassView utility as infected with Trojan/Virus. 


To visit official website click here.

Enjoy and Stay Connected!

Tuesday, February 17, 2015

List of network protocols on OSI model.

In this post we will know about network protocols organized by OSI model.

This is list of network protocols, classified by Open Systems Interconnection (OSI) model layers.




OSI model

Layer 1 (Physical Layer) 
>> Telephone network modems- V.92
>> IRDA physical layer
>> USB physical layer
>> EIA RS-232, EIA-422, EIA-423, RS-449, RS-485
>> Ethernet physical layer Including 10BASE-T, 10BASE2, 10BASE5, 100BASE-TX, 100BASE-FX, 100BASE-T, 1000BASE-T, 1000BASE-SX and other varieties
>> Varieties of 802.11 Wi-Fi physical layers
>> DSL
>> ISDN
>> T1 and other T-carrier links, and E1 and other E-carrier links
>> SONET/SDH
>> Optical Transport Network (OTN)
>> GSM Um air interface physical layer
>> Bluetooth physical layer
>> ITU Recommendations: see ITU-T
>> IEEE 1394 interface
>> TransferJet physical layer
>> Etherloop
>> ARINC 818 Avionics Digital Video Bus
>> G.hn/G.9960 physical layer
>> CAN bus (controller area network) physical layer
>> Mobile Industry Processor Interface physical layer

Layer 2 (Data Link Layer)
>> ARCnet Attached Resource Computer NETwork
>> CDP Cisco Discovery Protocol
>> DCAP Data Link Switching Client Access Protocol
>> Distributed Multi-Link Trunking
>> Distributed Split Multi-Link Trunking
>> Dynamic Trunking Protocol
>> Econet
>> Ethernet
>> FDDI Fiber Distributed Data Interface
>> Frame Relay
>> ITU-T G.hn Data Link Layer
>> HDLC High-Level Data Link Control
>> IEEE 802.11 WiFi
>> IEEE 802.16 WiMAX
>> LACP Link Aggregation Control Protocol
>> LattisNet
>> LocalTalk
>> L2F Layer 2 Forwarding Protocol
>> L2TP Layer 2 Tunneling Protocol
>> LAPD Link Access Procedures on the D channel
>> LLDP Link Layer Discovery Protocol
>> LLDP-MED Link Layer Discovery Protocol - Media Endpoint Discovery
>> PAgP - Cisco Systems proprietary link aggregation protocol
>> PPP Point-to-Point Protocol
>> PPTP Point-to-Point Tunneling Protocol
>> Q.710 Simplified Message Transfer Part
>> Multi-link trunking Protocol
>> RPR IEEE 802.17 Resilient Packet Ring
>> SLIP Serial Line Internet Protocol (obsolete)
>> StarLAN
>> STP Spanning Tree Protocol
>> Split multi-link trunking Protocol
>> Token ring a protocol developed by IBM; the name can also be used to describe the token passing ring logical topology that it popularized.
>> VTP VLAN Trunking Protocol
>> VLAN Virtual Local Area Network

Layer 3 (Network Layer)
>> CLNP Connectionless Networking Protocol
>> EGP Exterior Gateway Protocol
>> EIGRP Enhanced Interior Gateway Routing Protocol
>> IGMP Internet Group Management Protocol
>> IGRP Interior Gateway Routing Protocol
>> IPv4 Internet Protocol version 4
>> IPv6 Internet Protocol version 6
>> IPSec Internet Protocol Security
>> IPX Internetwork Packet Exchange
>> Routed-SMLT
>> SCCP Signalling Connection Control Part
>> AppleTalk DbP
>> ESP Encapsulating Security Payload over IP or IPSec
>> GRE Generic Routing Encapsulation for tunneling
>> BGP Border Gateway Protocol
>> OSPF Open Shortest Path First

Layer 4 (Transport Layer)
>> AH Authentication Header over IP or IPSec
>> IL Originally developed as transport layer for 9P
>> SCTP Stream Control Transmission Protocol
>> Sinec H1 for telecontrol
>> SPX Sequenced Packet Exchange
>> TCP Transmission Control Protocol
>> UDP User Datagram Protocol
>> DCCP Datagram Congestion Control Protocol
>> RTP

Layer 5 (Session Layer)
>> 9P Distributed file system protocol developed originally as part of Plan 9
>> NetBIOS, File Sharing and Name Resolution protocol - the basis of file sharing with Windows.
>> NetBEUI, NetBIOS Enhanced User Interface
>> NCP NetWare Core Protocol
>> NFS Network File System
>> SMB Server Message Block
>> SOCKS "SOCKetS"

Layer 6 (Presentation Layer)
>> TLS Transport Layer Security,
>> JPEG
>> MP3
>> MPEG

Layer 7 (Application Layer)
>> ADC, A peer-to-peer file sharing protocol
>> AFP, Apple Filing Protocol
>> BACnet, Building Automation and Control Network protocol
>> BitTorrent, A peer-to-peer file sharing protocol
>> BGP Border Gateway Protocol
>> BOOTP, Bootstrap Protoc;
>> CAMEL, an SS7 protocol tool for the home operator
>> Diameter, an authentication, authorization and accounting protocol
>> DICOM includes a network protocol definition
>> DICT, Dictionary protocol
>> DNS, Domain Name System
>> DSM-CC Digital Storage Media Command and Control
>> DSNP, Distributed Social Networking Protocol
>> DHCP, Dynamic Host Configuration Protocol
>> ED2K, A peer-to-peer file sharing protocol
>> Finger, which gives user profile information
>> Gnutella, a peer-to-peer file-swapping protocol
>> Gopher, a hierarchical hyperlinkable protocol
>> HTTP, Hypertext Transfer Protocol
>> HTTPS, Hypertext Transfer Protocol Secure
>> IMAP, Internet Message Access Protocol
>> IRC, Internet Relay Chat
>> ISUP, ISDN User Part
>> LDAP Lightweight Directory Access Protocol
>> MIME, Multipurpose Internet Mail Extensions
>> MSNP, Microsoft Notification Protocol (used by Windows Live Messenger)
>> MAP, Mobile Application Part
>> Mosh, Mobile Shell
>> NNTP, Network News Transfer Protocol
>> NTP, Network Time Protocol
>> NTCIP, National Transportation Communications for Intelligent

>> Transportation System Protocol
>> POP3 Post Office Protocol Version 3
>> RADIUS, an authentication, authorization and accounting protocol
>> RDP, Remote Desktop Protocol
>> Rlogin, a UNIX remote login protocol
>> rsync, a file transfer protocol for backups, copying and mirroring
>> RTP, Real-time Transport Protocol
>> RTSP, Real-time Transport Streaming Protocol
>> SSH, Secure Shell
>> SISNAPI, Siebel Internet Session Network API
>> SIP, Session Initiation Protocol, a signaling protocol
>> SMTP, Simple Mail Transfer Protocol
>> SNMP, Simple Network Management Protocol
>> SOAP, Simple Object Access Protocol
>> SMB, Microsoft Server Message Block Protocol
>> STUN, Session Traversal Utilities for NAT
>> TUP, Telephone User Part
>> Telnet, a remote terminal access protocol
>> TCAP, Transaction Capabilities Application Part
>> TFTP, Trivial File Transfer Protocol, a simple file transfer protocol
>> WebDAV, Web Distributed Authoring and Versioning
>> Extensible Messaging and Presence Protocol (XMPP)


For more detail click here....
Source: Wikipedia

ENJOY! and stay connected.

Monday, February 16, 2015

OSI Model (7 Layers of OSI Model, and How it works).

The most basic thing to understand network is to understand about OSI model. It is one of the most important tools which help us to know how networking devices like router, switch, hub, computer, etc... works.

To understand OSI model easily, let’s take a real life example. Many of us have posted a Greeting card or any Letter to anyone.
 

Generally to do it, we have to follow at least below steps:-
1 - Write your letter or Purchase a Greeting card.
2 - Pack it into an envelope.
3 - Write sender and receiver address on that envelope
4 - Stamp it.
5 - Go to the post box and drop it into it.

The above example, signify that we have to go through some steps in a specific order to send any message with each other. The networking too use a set of steps to send and receive any data which is called OSI model. The ISO model has 7 steps. Each step is called as a Layer. Each layer is arranged from top to bottom (numbering from 7 to 1). When a device send information to another the data goes from top to bottom layer (7 to 1). But if a device receives any data it will go from bottom to top (1 to 7). When data goes from top to bottom layer, a header is added to it at every layer. This is called encapsulation.

Lets Understand each layer how they work.


# Layer 7 – Application layer
 This is the closest layer to the user. It provides the interface between the applications we use and the next layers. But don't thing programs you are using (like a web browser – IE, Firefox, Opera, etc) are not a part of Application layer. Telnet, FTP, SMTP, HTTP, HTTPs, POP3 are examples of Application layer.

# Layer 6 – Presentation layer
Presentation layer ensures that the data passing is in a appropriate form for receiving device. It can be also called as translator of the network. For example, if we want to send an song the Presentation layer will format our data into MP3 format. Or we want to send photos to any of our friend, the Presentation layer will format our data into GIF, JPG, PNG etc... format.

# Layer 5 – Session layer
The Session Layer establishes, maintains and ends communication with the receiving device.

# Layer 4 – Transport layer
This layer maintains data flow and provides for error checking and recovery between the devices. The best example of Transport layer is Transmission Control Protocol (TCP) and User Datagram Protocol (UDP).

# Layer 3 – Network layer
This layer provides logical addresses which routers will use to determine the path to the destination (the last destination). In most cases, the logic addresses here means the IP addresses (including source & destination IP addresses).
 

# Layer 2 – Data Link Layer
The Data Link layer formats the message into a data frame, and adds a header containing the hardware destination and source address to it. This header is responsible for finding the next destination device on a local network.

NOTE:- Network layer (layer 3) is responsible for finding the path to the last destination (network) but it doesn’t care about who will be the next receiver. It is the Layer 2 that helps data to reach the next destination.

Network layer is divide into 2 sub-layers:
>> Logical link control (LLC)
>> Media access control (MAC).


The LLC functions include:
+ Managing frames to upper and lower layers
+ Error Control
+ Flow control

The MAC sublayer carries the physical address of each device on the network. This address is more commonly called a device’s MAC address. MAC address is a 48 bits address which is burned into the NIC card on the device by its manufacturer.


# Layer 1 – Physical layer

The Physical Layer defines the physical characteristics of the network such as connections, voltage levels and timing.


I summarize all the important functions of each layer in the table:-

Layer
Description
Popular Protocols
Protocol Data Unit
Devices operate in this layer
Application
# User interface
HTTP, FTP, TFTP, Telnet, SNMP, DNS…
Data

Presentation
# Data representation, encryption & decryption
# Video (WMV, AVI…)
Data

# Bitmap (JPG, BMP, PNG…)
# Audio (WAV, MP3, WMA…)

Session
# Setup, monitor & terminate the connection session
# SQL, RPC, NETBIOS names…
Data

Transport
# Flow control (Buffering, Windowing, Congestion Avoidance) helps prevent the loss of segments on the network and the need for retransmission
# TCP (Connection-Oriented, reliable)
Segment

# UDP (Connectionless, unreliable)
Network
# Path determination
# IP
Packet/Datagram
Router
# Source & Destination logical addresses
# IPX

# AppleTalk
Data Link
# Physical addresses
# LAN
Frame
Switch, Bridge
# WAN (HDLC, PPP, Frame Relay…)
Includes 2 layers:

# Upper layer: Logical Link Control (LLC)

# Lower layer: Media Access Control (MAC)

Physical
Encodes and transmits data bits
# FDDI, Ethernet
Bit (0, 1)
Hub, Repeater…
# Electric signals
# Radio signals

Download YouTube Playlist.


 YouTube sort video clips and group them into playlists. But if want to download a YouTube playlist its very tough to do so.

But in this post we will see a very simple option to do it with just a few couple of steps.

1. Download and install the 4K Video Downloader application.
(Available for Mac OS X, Windows and Linux.)


2. Copy the video link from the browser.


3. Press 'Paste Url' button in 4K Video Downloader application.

4. Then you need to press 'Download Playlist' in order to download the whole playlist.

5. Wait until the application gets all information about the playlist.

6. Select a quality type and format in the download window and press 'Download' button.

7. Now you just need to wait until all files are downloaded and watch the videos.


To DOWNLOAD latest and License version click below link :-

 ENJOY! and Stay connected.

Thursday, February 12, 2015

Bypass Hardware or software Firewall/Proxy to access block sites [100% safe and working].

Hello friends generally in many of the offices, schools and even in few countries, it’s very common that to social media and many other sites like Facebook, Twitter, YouTube, Gaming sites etc... are blocked. Most of the times, it is done to increase productivity and protect users interact with unofficial content while work. We’re are having many different ways by which we can bypass school or office Firewall/Proxy.


In this post, We’ll see how to bypass school or office firewall/Proxy using Tor Browser (It's safe and secure as compared to any other).

What Is Tor?

The name "Tor" refer to several different components.
The Tor browser is a freeware program which we can run on your computer. It helps us to be hidden and use safe Internet. The most interesting and good thing about Tor
browser is that it doesn't require any kind of installation. Due to which auditor will not find any trace in register, add remove programs etc..., everything is kept in the location where Tor browser is extracted. Tor protects us by bouncing our communications around a distributed network of relays run by volunteers all around the world. It prevents somebody watching our Internet connection from learning what sites we visit, and it prevents the sites we visit from learning our physical location. This set of volunteer relays is called the Tor network. We can read more about, How Tor works from below Link.

How to use Tor Browser to bypass firewall/proxy to access block sites?
1 - Download Tor Browser from HERE. (DOWNLOAD)
2 - Execute the Downloaded .exe file. It will extract the content on your desktop, in a folder named 'Tor Browser' (by default).
3 - Open the 'Tor Browser' folder and execute 'Start Tor Browser' shortcut present there.

If not having any proxy settings.
4 - Click on Next > Next > Connect.
5 - Tor browser will be started and you may now access all blocked sites.

If using proxy settings.
4 - Click on 'Configure' button.
5 - Select 'Yes' under 'Does this computer need to use a proxy to access the internet?' and click on 'Next'.
6 - Click on 'Connect'.
5 - Tor browser will be started and you may now access all blocked sites.

To use Tor browser on other Operating system Linux, Mac, Android etc... visit below link.


Enjoy! and stay connected.

Wednesday, February 11, 2015

Candy Crash Saga Crack APK For Android (Unlimited Life)


Candy Crush Saga is a great mind puzzling games. Many people love to play Candy Crush Saga.

Developing a Game isn’t a easy task, it requires lot of effort, time and hard work to make any game fun and entertaining. So will request you to please and avoid any Cheats Or Hacks.


How To Download And Install Candy Crush Saga Crack Apk.
1- Download Candy Crush Saga Crack v Apk (DOWNLOAD)



2- Uninstall any previous version of the game.
3- Install the game on your device.

Enjoy! and Stay connected.