Thursday, June 11, 2009



::::::::::::::::::::::
security
.............
NetBios Hacking Protection:-
-----------------------------
Disable file sharing!

Use a firewall such as ZoneAlarm when you are not sharing files.

Password protect your shares.

Use a hardware firewall such as a router with built-in firewall.

This is an old hack, but it still can compromise an entire system

Prevention from IP scans?
---------------------------
If you’re on the internet, you have an IP. IP scanners will give an ALIVE message.

Firewalls are VITAL if you are directly connected to the internet (ZoneAlarm, etc.)

HTTP access to routers should be turned off unless absolutely necessary. If enabled, ensure passwords are hard to guess/break.
|---------------------------------------------------------------------
|eg:-Cain & Abel {scan the specified system and we can see the passwords.}
|Cain is a very, very evil script-kiddie tool.
|
|We can spoof, crack, trace, inject, sniff, poison, and a few other things.
|
|This program is dangerous in the wrong hands because it works verywell.
|--------------------------------------------------------------------------

Networking
------------
OSI Reference Model:
.......................................


7. Application
6. Presentation
5. Session
4. Transport
3. Network
2. Data Link
1. Physical

1.The Physical Layer
Transmission of raw bits over a communication channel.
2.Datalink
Provide an error-free communication link
eg:MAC-media access control.
3.Network
eg:-router{{Copies packets from one network to another.

Makes decisions about what route a packet should take.}}

Translation between different network types.
Routing.

Routing: It determines how packets are routed from source to destination.
Congestion Control: Many packets in the subnet trying to use the same route.
Internetworking: It allows heterogeneous networks to be interconnected.


4.Transport
End to end communication.
eg:tcp,udp
It defines Quality of Service (QOS).
5.Session
eg:rpc

It allows users on different machines to establish sessions between them.

Interaction Management:

The data exchange associated with a dialog may be:

Duplex: Two-way simultaneous.

Half-Duplex: Two-way alternate.

Simplex: One-way.

Synchronization: For lengthy transaction, the user may choose to establish synchronization points associated with the transfer. If a fault develops during a transaction, the dialog may be restarted at an agreed synchronization point

6.Presentation
Data compression,conversion,encryption and decryption.
7.Application
eg:jpeg,gif


--------------------------------------............................................------------------------
telnet: remote login. Also a tool to test other protocols.

FTP: File Transfer Protocols.

Ping: determine whether a host is reachable

Traceroute: determine the route that a packet will take to another host

Netstate: provide information about the network status of a local host

TCPdump: capture and observe packet exchange in a link.



----------------------------------------------------------------------------------------


Here anybody can post hardware,networking,shell programming,html and linux based questions.