Showing posts with label Security. Show all posts
Showing posts with label Security. Show all posts

Thursday, August 4, 2016

Install and Secure Apache, My SQL, PHP & phpMyAdmin on a CentOS 6




To Install Apache, My SQL, PHP & phpMyAdmin follow below process, 


    a) Run below command to install Apache, My SQL, PHP and phpMyAdmin
   
        yum install httpd mysql-server php php-mysql
   
    b) Run below command to start Apache & MySQL service,
   
        service httpd start
        service mysqld start
   
    c) Run below command to add Apache & MySQL service in startup,
   
        chkconfig httpd on
        chkconfig mysqld on

    d) Run below command to set database password, and other settings,
   
        mysql_secure_installation
       
     e) Run below command to install phpMyAdmin
      
        yum install epel-release
        yum install phpmyadmin

     f) Open below file, update required detais and restart apache service,
   
    /etc/httpd/conf.d/phpMyAdmin.conf

    Require ip your_workstation_IP_address
    . . .
    Allow from your_workstation_IP_address
    . . .
    Require ip your_workstation_IP_address
    . . .
    Allow from your_workstation_IP_address
    . . .

    service httpd restart

       
    g) Open below url to test apache and phpMyAdmin
   
        Apache
        http://<IP_address>
       
        phpMyAdmin
        http://<IP_address>/phpmyadmin

ENJOY! and Stay connected.
       

Tuesday, March 17, 2015

Recover email passwords from email client.(Mail PassView).


Mail PassView is a small password-recovery tool that reveals the passwords and other account details for the following email clients:

  • > Outlook Express
  • > Microsoft Outlook 2000 (POP3 and SMTP Accounts only)
  • > Microsoft Outlook 2002/2003/2007/2010/2013 (POP3, IMAP, HTTP and SMTP Accounts)
  • > Windows Mail
  • > Windows Live Mail
  • > IncrediMail
  • > Eudora
  • > Netscape 6.x/7.x (If the password is not encrypted with master password)
  • > Mozilla Thunderbird (If the password is not encrypted with master password)
  • > Group Mail Free
  • > Yahoo! Mail - If the password is saved in Yahoo! Messenger application.
  • > Hotmail/MSN mail - If the password is saved in MSN/Windows/Live Messenger application.
  • > Gmail - If the password is saved by Gmail Notifier application, Google Desktop, or by Google Talk.
 
For each email account, the following fields are displayed: Account Name, Application, Email, Server, Server Type (POP3/IMAP/SMTP), User Name, and the Password. 

Known Problems - False virus alert

Some Antivirus programs detect Mail PassView utility as infected with Trojan/Virus. 


To visit official website click here.

Enjoy and Stay Connected!

Tuesday, February 17, 2015

List of network protocols on OSI model.

In this post we will know about network protocols organized by OSI model.

This is list of network protocols, classified by Open Systems Interconnection (OSI) model layers.




OSI model

Layer 1 (Physical Layer) 
>> Telephone network modems- V.92
>> IRDA physical layer
>> USB physical layer
>> EIA RS-232, EIA-422, EIA-423, RS-449, RS-485
>> Ethernet physical layer Including 10BASE-T, 10BASE2, 10BASE5, 100BASE-TX, 100BASE-FX, 100BASE-T, 1000BASE-T, 1000BASE-SX and other varieties
>> Varieties of 802.11 Wi-Fi physical layers
>> DSL
>> ISDN
>> T1 and other T-carrier links, and E1 and other E-carrier links
>> SONET/SDH
>> Optical Transport Network (OTN)
>> GSM Um air interface physical layer
>> Bluetooth physical layer
>> ITU Recommendations: see ITU-T
>> IEEE 1394 interface
>> TransferJet physical layer
>> Etherloop
>> ARINC 818 Avionics Digital Video Bus
>> G.hn/G.9960 physical layer
>> CAN bus (controller area network) physical layer
>> Mobile Industry Processor Interface physical layer

Layer 2 (Data Link Layer)
>> ARCnet Attached Resource Computer NETwork
>> CDP Cisco Discovery Protocol
>> DCAP Data Link Switching Client Access Protocol
>> Distributed Multi-Link Trunking
>> Distributed Split Multi-Link Trunking
>> Dynamic Trunking Protocol
>> Econet
>> Ethernet
>> FDDI Fiber Distributed Data Interface
>> Frame Relay
>> ITU-T G.hn Data Link Layer
>> HDLC High-Level Data Link Control
>> IEEE 802.11 WiFi
>> IEEE 802.16 WiMAX
>> LACP Link Aggregation Control Protocol
>> LattisNet
>> LocalTalk
>> L2F Layer 2 Forwarding Protocol
>> L2TP Layer 2 Tunneling Protocol
>> LAPD Link Access Procedures on the D channel
>> LLDP Link Layer Discovery Protocol
>> LLDP-MED Link Layer Discovery Protocol - Media Endpoint Discovery
>> PAgP - Cisco Systems proprietary link aggregation protocol
>> PPP Point-to-Point Protocol
>> PPTP Point-to-Point Tunneling Protocol
>> Q.710 Simplified Message Transfer Part
>> Multi-link trunking Protocol
>> RPR IEEE 802.17 Resilient Packet Ring
>> SLIP Serial Line Internet Protocol (obsolete)
>> StarLAN
>> STP Spanning Tree Protocol
>> Split multi-link trunking Protocol
>> Token ring a protocol developed by IBM; the name can also be used to describe the token passing ring logical topology that it popularized.
>> VTP VLAN Trunking Protocol
>> VLAN Virtual Local Area Network

Layer 3 (Network Layer)
>> CLNP Connectionless Networking Protocol
>> EGP Exterior Gateway Protocol
>> EIGRP Enhanced Interior Gateway Routing Protocol
>> IGMP Internet Group Management Protocol
>> IGRP Interior Gateway Routing Protocol
>> IPv4 Internet Protocol version 4
>> IPv6 Internet Protocol version 6
>> IPSec Internet Protocol Security
>> IPX Internetwork Packet Exchange
>> Routed-SMLT
>> SCCP Signalling Connection Control Part
>> AppleTalk DbP
>> ESP Encapsulating Security Payload over IP or IPSec
>> GRE Generic Routing Encapsulation for tunneling
>> BGP Border Gateway Protocol
>> OSPF Open Shortest Path First

Layer 4 (Transport Layer)
>> AH Authentication Header over IP or IPSec
>> IL Originally developed as transport layer for 9P
>> SCTP Stream Control Transmission Protocol
>> Sinec H1 for telecontrol
>> SPX Sequenced Packet Exchange
>> TCP Transmission Control Protocol
>> UDP User Datagram Protocol
>> DCCP Datagram Congestion Control Protocol
>> RTP

Layer 5 (Session Layer)
>> 9P Distributed file system protocol developed originally as part of Plan 9
>> NetBIOS, File Sharing and Name Resolution protocol - the basis of file sharing with Windows.
>> NetBEUI, NetBIOS Enhanced User Interface
>> NCP NetWare Core Protocol
>> NFS Network File System
>> SMB Server Message Block
>> SOCKS "SOCKetS"

Layer 6 (Presentation Layer)
>> TLS Transport Layer Security,
>> JPEG
>> MP3
>> MPEG

Layer 7 (Application Layer)
>> ADC, A peer-to-peer file sharing protocol
>> AFP, Apple Filing Protocol
>> BACnet, Building Automation and Control Network protocol
>> BitTorrent, A peer-to-peer file sharing protocol
>> BGP Border Gateway Protocol
>> BOOTP, Bootstrap Protoc;
>> CAMEL, an SS7 protocol tool for the home operator
>> Diameter, an authentication, authorization and accounting protocol
>> DICOM includes a network protocol definition
>> DICT, Dictionary protocol
>> DNS, Domain Name System
>> DSM-CC Digital Storage Media Command and Control
>> DSNP, Distributed Social Networking Protocol
>> DHCP, Dynamic Host Configuration Protocol
>> ED2K, A peer-to-peer file sharing protocol
>> Finger, which gives user profile information
>> Gnutella, a peer-to-peer file-swapping protocol
>> Gopher, a hierarchical hyperlinkable protocol
>> HTTP, Hypertext Transfer Protocol
>> HTTPS, Hypertext Transfer Protocol Secure
>> IMAP, Internet Message Access Protocol
>> IRC, Internet Relay Chat
>> ISUP, ISDN User Part
>> LDAP Lightweight Directory Access Protocol
>> MIME, Multipurpose Internet Mail Extensions
>> MSNP, Microsoft Notification Protocol (used by Windows Live Messenger)
>> MAP, Mobile Application Part
>> Mosh, Mobile Shell
>> NNTP, Network News Transfer Protocol
>> NTP, Network Time Protocol
>> NTCIP, National Transportation Communications for Intelligent

>> Transportation System Protocol
>> POP3 Post Office Protocol Version 3
>> RADIUS, an authentication, authorization and accounting protocol
>> RDP, Remote Desktop Protocol
>> Rlogin, a UNIX remote login protocol
>> rsync, a file transfer protocol for backups, copying and mirroring
>> RTP, Real-time Transport Protocol
>> RTSP, Real-time Transport Streaming Protocol
>> SSH, Secure Shell
>> SISNAPI, Siebel Internet Session Network API
>> SIP, Session Initiation Protocol, a signaling protocol
>> SMTP, Simple Mail Transfer Protocol
>> SNMP, Simple Network Management Protocol
>> SOAP, Simple Object Access Protocol
>> SMB, Microsoft Server Message Block Protocol
>> STUN, Session Traversal Utilities for NAT
>> TUP, Telephone User Part
>> Telnet, a remote terminal access protocol
>> TCAP, Transaction Capabilities Application Part
>> TFTP, Trivial File Transfer Protocol, a simple file transfer protocol
>> WebDAV, Web Distributed Authoring and Versioning
>> Extensible Messaging and Presence Protocol (XMPP)


For more detail click here....
Source: Wikipedia

ENJOY! and stay connected.

Thursday, February 12, 2015

Bypass Hardware or software Firewall/Proxy to access block sites [100% safe and working].

Hello friends generally in many of the offices, schools and even in few countries, it’s very common that to social media and many other sites like Facebook, Twitter, YouTube, Gaming sites etc... are blocked. Most of the times, it is done to increase productivity and protect users interact with unofficial content while work. We’re are having many different ways by which we can bypass school or office Firewall/Proxy.


In this post, We’ll see how to bypass school or office firewall/Proxy using Tor Browser (It's safe and secure as compared to any other).

What Is Tor?

The name "Tor" refer to several different components.
The Tor browser is a freeware program which we can run on your computer. It helps us to be hidden and use safe Internet. The most interesting and good thing about Tor
browser is that it doesn't require any kind of installation. Due to which auditor will not find any trace in register, add remove programs etc..., everything is kept in the location where Tor browser is extracted. Tor protects us by bouncing our communications around a distributed network of relays run by volunteers all around the world. It prevents somebody watching our Internet connection from learning what sites we visit, and it prevents the sites we visit from learning our physical location. This set of volunteer relays is called the Tor network. We can read more about, How Tor works from below Link.

How to use Tor Browser to bypass firewall/proxy to access block sites?
1 - Download Tor Browser from HERE. (DOWNLOAD)
2 - Execute the Downloaded .exe file. It will extract the content on your desktop, in a folder named 'Tor Browser' (by default).
3 - Open the 'Tor Browser' folder and execute 'Start Tor Browser' shortcut present there.

If not having any proxy settings.
4 - Click on Next > Next > Connect.
5 - Tor browser will be started and you may now access all blocked sites.

If using proxy settings.
4 - Click on 'Configure' button.
5 - Select 'Yes' under 'Does this computer need to use a proxy to access the internet?' and click on 'Next'.
6 - Click on 'Connect'.
5 - Tor browser will be started and you may now access all blocked sites.

To use Tor browser on other Operating system Linux, Mac, Android etc... visit below link.


Enjoy! and stay connected.

Monday, February 2, 2015

VirusTotal Windows Uploader Utility

VirusTotal Uploader is a simple Microsoft Windows Desktop application that makes the interaction with VirusTotal as easy as a right-click.

To upload a file to VirusTotal, we can visit the www.virustotal.com site and uplaoad a file to check.

We can also make this process more simple with the free VirusTotal Uploader utility. Install the utility, simply right-click on any file and choose VirusTotal from the Send To option. It will uploads the file and, scan results will be displayed in your browser as usual.


Tuesday, January 20, 2015

icacls - Display or modify permission for files and folders using windows command prompt.


We can Display or modify Access Control Lists (ACLs) or permission for files and folders using windows command prompt too.Access Control Lists can be only applied to files stored on an NTFS formatted drive.

Each ACL specify which users (or groups of users) can read or edit the file. 
When a new file is created it normally inherits ACL's from the folder where it was created.

For Vista and above use icacls.
NOTE: Cacls is now deprecated, please use Icacls.


SYNTAX :- 

CACLS filename [/T] [/M] [/L] [/S[:SDDL]] [/E] [/C] [/G user:perm] [/R user [...]] [/P user:perm [...]] [/D user [...]]

  filename : Displays ACLs.
  /T : Changes ACLs of specified files in the current directory and all subdirectories.
  /L : Work on the Symbolic Link itself versus the target
  /M : Changes ACLs of volumes mounted to a directory
  /S : Displays the SDDL string for the DACL.
  /S : SDDL Replaces the ACLs with those specified in the SDDL string (not valid with /E, /G, /R, /P, or /D).
  /E : Edit ACL instead of replacing it.
  /C : Continue on access denied errors.
  /G : user:perm Grant specified user access rights.

  •  Perm can be : R Read
  •  W : Write
  •  C  : Change (write)
  •  F : Full control
  /R : user Revoke specified user's access rights (only valid with /E).
  /P : user:perm Replace specified user's access rights.

  •  Perm can be: N None
  •  R Read
  •  W Write
  •  C Change (write)
  •  F Full control
 /D : user Deny specified user access.

 Wildcards can be used to specify more than one file in a command.
 You can specify more than one user in a command.

 Abbreviations :-
 CI - Container Inherit : The ACE will be inherited by directories.
 OI - Object Inherit : The ACE will be inherited by files.
 IO - Inherit Only : The ACE does not apply to the current file/directory.
 ID - Inherited : The ACE was inherited from the parent directory's ACL.
 


EXAMPLE :-

Give everyone read-only permission to a folder

C:\Users\lmntechnohub\Desktop>cacls Music /e /g Everyone:R
processed dir: C:\Users\lmntechnohub\Desktop\Music
 


Remove everyone read-only permission to a folder

C:\Users\lmntechnohub\Desktop>cacls Music /e /R Everyone
processed dir: C:\Users\lmntechnohub\Desktop\Music

Saturday, January 10, 2015

ARP Commands

ARP - Address Resolution Protocol

Display and modify the IP-to-Physical address translation tables used by address resolution protocol.

Syntax

View the current ARP table on the system.
arp -a
arp -g

Add a static ARP entry manually.
arp -s ip_addr eth_addr(MAC_addr)

Delete ARP table entry,
arp -d (To delete complete ARP table)
arp -d ip_addr (To delete entry for a specific IP address)

ARP Help
arp /?

If two hosts on the same sub-net cannot ping each other successfully, try running ARP -a to list the addresses on each computer to see if they have the correct MAC addresses.

A host's MAC address can be checked using IPCONFIG. If another host with a duplicate IP address exists on the network, the ARP cache may have had the MAC address for the other computer placed in it. ARP -d is used to delete an entry that may be incorrect.

Examples

Display the ARP cache tables for all interfaces:

C:\Users\lmntechnohub>arp -a

Interface: 157.25.35.15 --- 0xb
  Internet Address      Physical Address      Type
  157.25.35.4            00-1e-8c-cc-30-77     dynamic
  157.25.35.5            00-1e-8c-69-38-03     dynamic
  157.25.35.7            38-60-77-be-04-38     dynamic
  157.25.35.9            74-d4-35-78-d7-f1     dynamic
  157.25.35.10           70-71-bc-5c-72-fe     dynamic
  157.25.35.11           70-71-bc-5c-72-e0     dynamic
  157.25.35.12           74-d4-35-78-8a-94     dynamic
  157.25.35.16           54-be-f7-0d-05-94     dynamic
  157.25.35.17           54-be-f7-0d-05-88     dynamic
  157.25.35.29           00-e0-1c-3c-30-6a     dynamic
  157.25.35.30           00-25-5e-29-50-b9     dynamic
  157.25.35.255          ff-ff-ff-ff-ff-ff     static
  192.168.1.1           38-60-77-be-04-38     dynamic
  192.168.1.255         ff-ff-ff-ff-ff-ff     static
  224.0.0.252           01-00-5e-00-00-fc     static


Display the ARP cache table for the interface on IP address 10.1.4.99 ( -N <IP_addr> Display the ARP entries for the network interface specified.):

C:\Users\lmntechnohub>arp -a -N 17.65.115.15

Interface: 17.65.115.15 --- 0xb
  Internet Address      Physical Address      Type
  17.65.115.4            00-1e-8c-cc-30-77     dynamic
  17.65.115.5            00-1e-8c-69-38-03     dynamic
  17.65.115.7            38-60-77-be-04-38     dynamic
  17.65.115.9            74-d4-35-78-d7-f1     dynamic
  17.65.115.10           70-71-bc-5c-72-fe     dynamic
  17.65.115.11           70-71-bc-5c-72-e0     dynamic
  17.65.115.12           74-d4-35-78-8a-94     dynamic
  17.65.115.16           54-be-f7-0d-05-94     dynamic
  17.65.115.17           54-be-f7-0d-05-88     dynamic
  17.65.115.29           00-e0-1c-3c-30-6a     dynamic
  17.65.115.30           00-25-5e-29-50-b9     dynamic
  17.65.115.255          ff-ff-ff-ff-ff-ff     static
  192.168.1.1           38-60-77-be-04-38     dynamic
  192.168.1.255         ff-ff-ff-ff-ff-ff     static
  224.0.0.252           01-00-5e-00-00-fc     static



Add a static ARP cache entry on IP addr
10.52.44.74 to the physical address 00-AA-21-4A-2F-9A:

C:\Users\lmntechnohub>arp -s 10.52.44.74 00-AA-21-4A-2F-9A

C:\Users\lmntechnohub>arp -a

Interface: 10.10.10.15 --- 0xb
  Internet Address      Physical Address      Type
  10.52.44.74           00-aa-21-4a-2f-9a     static
  192.168.1.1           38-60-77-be-04-38     dynamic
  192.168.1.255         ff-ff-ff-ff-ff-ff     static
  224.0.0.252           01-00-5e-00-00-fc     static



Enjoy! and stay Connected.

Friday, January 2, 2015

Ping is not recognized as internal or external command (Solved).


1. Right-Click on Computer > Properties > Advanced system settings.
2. Select the "Advanced" tab.
3. Click on "Environment Variables" below.
4. Under "System Variables" locate Path and choose 'EDIT'.
5. Paste ";%SystemRoot%\system32;%SystemRoot%" at the end (Without quotes ".)



8. Click "OK" to save.




Sunday, December 28, 2014

Google Search Tips and Tricks.


1. Search on specific websites :-

You can use Google Search to search through specific websites. Example, if you don’t like the search for a news on news site, you can just open Google and type site:news.com followed by whatever you want to search for.


2. Search using a image :-

You all know that you can search Google using Images, no not the Image search, you can actually insert an image on the Google Search bar. What many miss is the amount of information that you can find using this. Instead of checking the Google image results, check the normal search results that come. You can find the source of a picture through this. It can also be used for finding things like recipes of certain preparations etc.

3. Autocomplete wildcards :-
Autocomplete is a very handy feature on Google Search. Like other advanced search engines, you can put blank in the middle of your search terms, which signifies ‘anything’. Google will show wildcard suggestions for the term that can be put there. So, if you’re searching for ‘how to learn English’, you can remove the word ‘learn’ from the string and Google will give you suggestions about what all can be put there.

4. Search with Extension :-

Remember these search tools: inurl, intitle and filetype. If you need to search for a PPT about "What is Google" then search as what is Google filetype:ppt. This will show you all search result with PPT extention.


5. Find alternatives for websites, products etc. :-
To search for a alternative to the iPhone 5S, just write ‘iPhone 5S vs’, and Google will show you suggestions for popularly searched competitors.

6. Google cache :-

The cached link to different websites on Google is highly useful. It can be used to access a website when it is down or getting around a SOPA ( Stop Online Piracy Act) blackout. But, you don’t always have to click on the cached link, you can simply write cache: along with the URL for the site and you will have what you need. Example :- "cache:lmnhub.blogspot.in"

7. Google proxy :-
You can use Google search to bypass security features, paywalls and downloading files by funnelling through websites using Google Translate or Mobilizer. Just like the cached option, you can also access this directly, as long as you have the URL available.

All you have to do is add the URL to the end of the Google URL.
Method 1 (For Desktop view) - http://translate.google.com/translate?sl=ja&tl=en&u=http://"Webpage url"
Method 2 (For Mobile view) - http://www.google.ie/gwt/x?u=http://"Webpage url"

8. Google Images to look for people :-
When a person’s name is the same as that of an object, it often returns conflicting results. To get around this, you can just add the &imgtype=facethe to the end of the search URL. The search will be redone and only those with faces will be returned.

9. Time-based search results :-
Google Search already provides a filter for getting time-based results, but if you want to be more specific, there is a way to do that too. All you have to do is add &tbs=qdr: to the end of your URL. You have to specify the time too. Here, h5 signifies five hours, while n5 signifies five minutes. For five seconds, write s5. So, if you want to search in the last ten minutes, you will write add&tbs=qdr:n10 to the URL.

For more Google search tips and tricks visit HERE.


Source: Lifehacker, Google.

Friday, December 26, 2014

Block Facebook application and game requests in 3 simple steps.


Game and application requests are very annoying. They consume a lot of our time.
For example, When ever you login to your Facebook and see there are many notification and all of them are only of games and application such as Candy Crush Saga, Candy Crush Soda Saga, Bubble Shooter, etc....
Due to this many of times we ignore the notification which might have an important message.

In this post we will see how to block such annoying Facebook game and application request.

Lets see :-

1 - Login to your Facebook account. And go to Settings.

2 - Click on "Blocking" option present in the left slide bar.

3 - Scroll down to find a section as "Block apps". Now just enter the game or application name you want to block.

Its done.

If in future you feel to get the notification of the blocked application just click Unblock option present at the end of the application.

Wednesday, December 24, 2014

How to Delete YouTube History.


As similar  to to many other sites and mentioned in my previous post Youtube too stores our search history.

Lets see how to Delete them :-

1 - Open www.youtube.com and login to your youtube account.
2 - Click on “History” at the left sidebar and then click on “Clear all watch history” to delete.
  

Enjoy ! and stay connected.

Facebook Stores our Activity (How to delete It.)


As similar  to to many other sites Facebook also stores our activity. For example if we have ever looked up someone, or a page on Facebook, our searches will be saved in our Activity Log. Others will not have access to what we had searched, but Facebook, and who ever is having  access to our account, can know.

Lets see how To Delete our Facebook activity.

1 - To delete your Facebook activity history click on down arrow at the Right top corner, and click on “Activity Log”.
2 - Click on “More” option present at the left side of the page.
3 - Click on “Search” Option to display your search history. After that click on “Clear Searches”. It will prompt a message for confirmation. There again click on “Clear Searches” to delete your history, as given in the image below.

Enjoy ! and stay connected

Tuesday, December 23, 2014

Delete your search history from Google



We are searching for a lot of our online time. Many of the time we that is too private, like personal medical advice, financial enquirers etc. Many of us may not know the fact that their search history is saved online in the hands of Google.

What makes things worse is when some anyone using your machine get to know about your search result. In this post, we get to know how to delete your search history from the many of our commonly used sites on the Internet, so that we can safeguard our privacy.

If we are logged into our Google account while searching query or clicking a link on the results page, our choices will be logged in, Google saves our activity history to give us better results in future searches. If you want to get rid of this, you can remove your searches from your profile.

Lets see how To Delete Your past Google activity History :-

1 - Open www.google.com and Login your Google account.

2. After successful login to your Google Account. In address bar type www.google.com/history.


3. It will display your Google history page, as below.


4. To delete all your search queries, Select the checkbox next to the “Remove Items” button
and then click Remove Items. To delete individual items, tick those items before clicking Remove Items.



This will delete your past Google activity. 



Now if you want that Google doesn’t record your web history, you can turn off your Web History.
To turn off your Web History click Options > Settings > Pause Button.