Saturday, May 1, 2010



FIREWALL








FIREWALL is quite easy to guess as the name implies fire of walls.Basically, a firewall is a barrier to keep destructive forces away from your property. In fact, that's why its called a firewall. Its job is similar to a physical firewall that keeps a fire from spreading from one area to the next.
A firewall is a part of a computer system or network that is designed to block unauthorized access while permitting authorized communications. It is a device or set of devices which is configured to permit or deny computer applications based upon a set of rules and other criteria.

A firewall is hardware, software,or a combination of both.
Hardware VS Software
  • Hardware Firewalls :        
                     Protect an entire network
                     Implemented on the router level
                     Usually more expensive, harder to configure
  •  Software Firewalls : 
                     Protect a single computer
                     Usually less expensive, easier to configure

      There is a chronological history of firewalls or types of firewall techniques


      1. Packet filter: Packet filtering inspects each packet passing through the network and accepts or rejects it based on user-defined rules. Although difficult to configure, it is fairly effective and mostly transparent to its users. It is susceptible to IP spoofing.
      2. Application gateway: Applies security mechanisms to specific applications, such as FTP and Telnet servers. This is very effective, but can impose a performance degradation.
      3. Circuit-level gateway: Applies security mechanisms when a TCP or UDP connection is established. Once the connection has been made, packets can flow between the hosts without further checking.
      4. Proxy server: Intercepts all messages entering and leaving the network. The proxy server effectively hides the true network addresses.
      If you are concerned about  privacy and safety of your computer and network firewall is the most important  part which cannot be neglected or left to mercy of others.

      Personal firewalls software products can be purchased from web sites like :NORTON personal firewall


      At end of this definition of firewall I have also written something which I felt every one of knows but then also we have been neglecting.Well I don't intend to vehement about this issue nor higgledy-piggledy ,I am a pacifist by nature.This post is just a way to bridge up  "You" with my idea of stronger,sanctified and secular India(its quite hard to describe in words...ineffable).Please read it and work/play with this idea well

                                   Ethics is a science of morality.And morality is the conduct i.e what we do.So lets Do






        Proscribing  Transgression ...Inspiring Transparency

        Folks if you all are vexed with the recent Buzz about " The new Indian pantheons Sri Lalit Modi and suave Sri Shashi Tharoor of IPL".Well to be honest (which indeed not in vogue ..just a wit) couldn't restrained myself from talking about the recent developments in my country.Even though this mayhem is not the part of the moot and I am not in the elitist society to speak about this but still it will require some diligent,contemplative thinking by we the people of India.So that when next time some glorified,extravagant events take place there is complete transparency and no signs of transgressions,debauchery.Lets commit our self to spread the idea of transparency ,integrity,authenticity and responsibility.Let this be our new credo.
            Be the change you want to see in the world
                        M K Gandhi

        No more advices as I hate being addressed as a sage who tells anecdotes or fables.Don't dare even to call me aka sage.

        Friday, April 16, 2010

        Petrified,Transfix..blah blah When asked to make a BOOTable USB.Ding dong now no more...just in 1min You can do sooo

        Well again we meet but its just a commercial entry by the way..A jolt hit me last night when my friend next room  came panting "DVD drive /Optical drive was malfunctioning".He looked a bit pale i have a project report to make next what i heard probably ...i will be screwed if my computer doesn't work properly.Well Whats the matter i asked him,it's your DVD player not responding not your hassling computer.Ya he said but he wanted to FORMAT his system to install a fresh windows 7 !!OOhhhhh Bingo!! there is the problem.Now i told him all the technical jargon but he couldn't follow at all albeit he was very much pleased and mystified with my idea What What "a BOOTable USB " .You ought to see his face baffled ...in a brisk businesslike tone he said can it be done.For sure in a minutes of time.  
                                            Merry time tough for him,aback i tried to make this for him but i was gasped to see that i wasn't able to make it so.Crawled websites to find how to do,found a beautiful site which made it as simple as to make a Maggi .


        Bootable USB guide, here we assume that you are using either Vista or Windows 7 to create a bootable USB. 

        Steps are important to follow--

        1. Insert your USB (4GB+ preferable) stick to the system (make sure it got no files) 
        2. Open elevated Command Prompt([Windows] + R). To do this, type in CMD in Start menu search field and hit Ctrl + Shift + Enter. Alternatively, navigate to Start > All programs >Accessories > right click on Command Prompt and select run as administrator.
        3. When the Command Prompt opens, enter the following command:                             DISKPART and hit enter.                                                                                       LISTDISK and hit  enter .Once you enter the LIST DISK command,it will show the disk number of your USB drive. In the below image my USB drive disk no is Disk 1.
        4. In this step you need to enter all the below commands one by one and hit enter. As these commands are self explanatory, you can easily guess what these commands do SELECT DISK 1 (Replace DISK 1 with your disk number)                                      CLEAN                                                                                                                 CREATE PARTITION                                                                                          PRIMARY                                                                                                                SELECT PARTITION 1        ACTIVE                                                                                                               FORMAT  FS=NTFS                                                                                            (Format process may take few seconds)
          ASSIGN                                                                                                            EXIT        (Don’t close the command prompt as we need to execute one more command at the next step. Just minimize it.)
        5. Insert your Windows DVD in the optical drive and note down the drive letter of the optical drive and USB media. Here I use “D” as my optical (DVD) drive letter and “H” as my USB drive letter.(This you could do on someones else computer if your optical(DVD) doesn't works well...i hope that's fine buddy's..you can knock your friends head if he doesn't allow to do on his computer )  
        6. Now, Go back to command prompt and execute the following commands:           D:CD BOOT and hit enter. Where “D” is your DVD drive letter.                           CD BOOT and hit enter to see the below message.                                                                             BOOTSECT.EXE/NT60 H:                                                                         (Where “H” is your USB drive letter)
        7. Copy Windows DVD contents to USB.You are done with your bootable USB. You can now use this bootable USB as bootable DVD on any computer that comes with USB boot feature (most of the current motherboards support this feature..it's on the BIOS settings).
        Note that this bootable USB guide will not work if you are trying to make a bootable USB on XP computer



        Well thanks to the person who devised this brilliant idea (http://www.bootdisk.com/pendrive.htm)...but perhaps you could give me some credit though( i believe you all are not a lot of ingrate..hopefully is-int it)

        Once who couldn't follow please don't start scratching,maundering and stumbling .I tell you the secret even my friend for whom i took the pain was able to follow(i didn't wanted to disparage you..but a little thinking could help you i hope after this secret overt)  

        As said it ought to be a commercial and abridged discussion but tacit,terse are not in my syllabus.Well for my viewers do not get exasperated so early we will have an unabridged discussion on Firewalls,Anti-virus and Spy-ware .Till then its me "you-know-who" signing off ...see you

        Saturday, April 10, 2010

        Entangled "Virus,Worms and Trojan Horse"






        The most common blunder people make when the topic of a computer virus arises is to refer to a worm or Trojan horse as a virus. While the words Trojan, worm and virus are often used interchangeably, they are not exactly the same. Viruses, worms and Trojan Horses are all malicious programs that can cause damage to your computer, but there are differences among the three, and knowing those differences can help you to better protect your computer from their often damaging effects.Let me edify you with the proper meanings and the way to combat them.

        What Is a Virus?

         

        A computer virus attaches itself to a program or file enabling it to spread from one computer to another, leaving infections as it travels. Like a human virus, a computer virus can range in severity: some may cause only mildly annoying effects while others can damage your hardware, software or files.
        Almost all viruses are attached to an executable file, which means the virus may exist on your computer but it actually cannot infect your computer unless you run or open the malicious program. It is important to note that a virus cannot be spread without a human action, (such as running an infected program) to keep it going. 
        People continue the spread of a computer virus, mostly unknowingly, by sharing infecting files or sending e-mails with viruses as attachments in the e-mail. 



        What Is a Worm?







        A worm is similar to a virus by design and is considered to be a sub-class of a virus. Worms spread from computer to computer, but unlike a virus, it has the capability to travel without any human action. A worm takes advantage of file or information transport features on your system, which is what allows it to travel unaided.
        The biggest danger with a worm is its capability to replicate itself on your system, so rather than your computer sending out a single worm, it could send out hundreds or thousands of copies of itself, creating a huge devastating effect. One example would be for a worm to send a copy of itself to everyone listed in your e-mail address book. Then, the worm replicates and sends itself out to everyone listed in each of the receiver's address book, and the manifest continues on down the line. 
        Due to the copying nature of a worm and its capability to travel across networks the end result in most cases is that the worm consumes too much system memory (or network bandwidth), causing Web servers, network servers and individual computers to stop responding. In recent worm attacks such as the much-talked-about Blaster Worm, the worm has been designed to tunnel into your system and allow malicious users to control your computer remotely.




        What Is a Trojan horse?

         

        A Trojan Horse is full of as much trickery as the mythological Trojan Horse it was named after. The Trojan Horse, at first glance will appear to be useful software but will actually do damage once installed or run on your computer.  Those on the receiving end of a Trojan Horse are usually tricked into opening them because they appear to be receiving legitimate software or files from a legitimate source.  When a Trojan is activated on your computer, the results can vary. Some Trojans are designed to be more annoying than malicious (like changing your desktop, adding silly active desktop icons) or they can cause serious damage by deleting files and destroying information on your system. Trojans are also known to create a backdoor on your computer that gives malicious users access to your system, possibly allowing confidential or personal information to be compromised. Unlike viruses and worms, Trojans do not reproduce by infecting other files nor do they self-replicate.

        What Are Blended Threats?

        Added into the mix, we also have what is called a blended threat. A blended threat is a more sophisticated attack that bundles some of the worst aspects of viruses, worms, Trojan horses and malicious code into one single threat. Blended threats can use server and Internet vulnerabilities to initiate, then transmit and also spread an attack. Characteristics of blended threats are that they cause harm to the infected system or network, they propagates using multiple methods, the attack can come from multiple points, and blended threats also exploit vulnerabilities.
        To be considered a blended thread, the attack would normally serve to transport multiple attacks in one payload. For example it wouldn't just launch a DoS attack — it would also, for example, install a backdoor and maybe even damage a local system in one shot. Additionally, blended threats are designed to use multiple modes of transport. So, while a worm may travel and spread through e-mail, a single blended threat could use multiple routes including e-mail, IRC and file-sharing sharing networks.
        Lastly, rather than a specific attack on predetermined .exe files, a blended thread could do multiple malicious acts, like modify your exe files, HTML files and registry keys at the same time — basically it can cause damage within several areas of your network at one time.
        Blended threats are considered to be the worst risk to security since the inception of viruses, as most blended threats also require no human intervention to propagate.

        Combating Viruses, Worms and Trojan Horses

        The first step in protecting your computer from any malicious there is to ensure that your operating system (OS) is up-to-date. This is essential if you are running a Microsoft Windows OS. Secondly, you need to have anti-virus software installed on your system and ensure you download updates frequently to ensure your software has the latest fixes for new viruses, worms, and Trojan horses. Additionally, you want to make sure your anti-virus program has the capability to scan e-mail and files as they are downloaded from the Internet, and you also need to run full disk scans periodically. This will help prevent malicious programs from even reaching your computer. You should also install a firewall as well.
        A firewall is a system that prevents unauthorized use and access to your computer. A firewall can be either hardware or software. Hardware firewalls provide a strong degree of protection from most forms of attack coming from the outside world and can be purchased as a stand-alone product or in broadband routers. Unfortunately, when battling viruses, worms and Trojans, a hardware firewall may be less effective than a software firewall, as it could possibly ignore embedded worms in out going e-mails and see this as regular network traffic.
        For individual home users, the most popular firewall choice is a software firewall.  A good software firewall will protect your computer from outside attempts to control or gain access your computer, and usually provides additional protection against the most common Trojan programs or e-mail worms. The downside to software firewalls is that they will only protect the computer they are installed on, not a network.
        It is important to remember that on its own a firewall is not going to rid you of your computer virus problems, but when used in conjunction with regular operating system updates and a good anti-virus scanning software, it will add some extra security and protection for your computer or network.



        In my next post i will through some more light on things like Antivirus ,Spy-ware and Firewalls .Hope this post well help you segregate and have a clear idea of Virus,Trojan and Worms.So buddy's it will be all for this week .Catch you all in my next post.

        Wednesday, March 31, 2010

        Stop the spam or we'll shoot this dog

        spam these days has become more vogue and a technical jargon for most of the email users and is the cause of pain in ass.yes this spam is just an unsolicited marketing strategies just like some one calling you on phone and advertising there products or trying to lure you.And we muddle heads cant do any thing about this unsolicited person.
            I was also so oblivious these days that i always maundered on this spam reception but didn't tried to thwart.I was a bit surprised , Ya probable boggled when i saw an email from my own email address  having some cupid girls photos and more stuff website blah-blah.Nonplussed i was looking here and there??? yes you folks are genius i was in my home. It was a breath taking moment so palpable,thankfully no one in my home was vacillating around.So after this close shave i was engrossed in finding ways to take some purportedly revenge for my vex.
                                                Each time one receives an email now one can easily verify its authenticity or even can trace it down using some utility tools freely available on the internet like NeoTracePro ,VisualRoute and many more.Follow these pursuit as i have mentioned :

        1. View the email headers for the suspicious email -just go into the email service provider and there ia na option of reply with a downward arrow click it.See for the option "show original" .And there you are the complete message with the full headers.For more clear view go an see of your self.An example is envisaged for you at Full header.
        2. Identify the true IP address for the sender (the person who sent you this email) using the header analysis as envisaged in the link at full header.The best way to do is to start from bottom of the received from list to trace the true IP address.
        3. After finding the IP address of the sender ,check for the specified domain of the sender if the domain name and the senders email address is not same it is for sure a spam.So for a quick trace of IP go for any application tools or see in free site like www.ipmango.com, www.whois.com and many more you just need to Google.see it's so simple is not so.
        Well you may be thinking how exactly does an email forging works and how was that Sumit calling Sumit  went all the way.Then folks you need to jump into the vista of Linux or Unix OS.These OS are were handy and interest most of the hacker with it versatile and large application available to play with.A must for every nascent or fledgling buddy's to dirty there hands with these OS.    More you talk n work with them more n more you become acquainted n adroit. Before i tell you all these ethical hacking stuff,i like to make a point about the fulminating discussion about spam is that removing spam is not an easy task for the email service provider all alone.so please pals stand for yourself n report about the spam you receive so we together can ferret all spams.And no dogs get killed (metaphorically....its a joke i don't want animal lovers to chide or berate me anymore).I will write how to carry an email spam But for that you need to see my next post.Hope you all make most of these and teach me also with your flair n inane writings.

        Wednesday, March 24, 2010

        Homage to my junior's!!!hights of insanity


        hi friends,it's been a long time since i wrote any thing on my blog.
        The catch is that in my college some folks vandalized and made the system paralyzed. What am I talking??You all may be baffled with the way i am telling the story,but dear it was done in such a expedite way that i even could not pick up my under-garments while we were asked to evacuate the place.Things got a little carried away ,my juniors seem to have lost there insanity and to aggregated even there senses were bit not working to the standards.As of this they went after the teachers and hit them with bludgeons .Strangled them and turned some in blue-berry's.soon we the students of fourth year took in the charge of the situation,trying to subjugate and subvert the students away .some of my friends were bantered by my juniors saying that we fourth year gurus of the college have turned effeminate and no longer suitable to lead the college.
            Thanks to Junie's hm-mm the college was brought down to a mud pie.Well now marooned at my home there is nothing to do except to eat and go gluttony ,sleep were ever you find a place cousin enough.      Now that i seemed to settled down in my brothers house.Its was soon that i realized that i missed you guys.YOU all are so good to me that some time you are ineffable to be expressed ,even though i am a bit verbose.Well as somebody said "it is all-way sooner to realize and act upon,rather than stay ignorant" who said not a big deal.. so buddy's now is the time to learn albeit i know you have been exasperated by my story but i love that..The growing market and the way the business is becoming more of a dynamic it is sermons advice that you need to be on your toes and ready to learn and serve those in need ,yes ugh-course with pool of fat money pouring in the market you need a bigger cup to hold that .but what do you think you have that others to not have.well the question is to be put to yourself ...hm by now you have a answer or you do not ??            well the smartest people gave me a very enthusiastic answer which made me contemplate .You now guys what they told me was that to be a good professional the key is to be a good learner and an UN-learner.quite confusing ,Ya bit fuzzy learner and a unlearn er,but if you think a bit which i suppose you do not need until i am here to take the pain.What they meant by this is that you need to bifurcate your mind .one as a learning department and other to filter and remove those unessential materials which has no special significance to your growth.If you practice this methodology you will probably be more successful that you are at present.Think on this a bit and do write me about the experience or any.
            Hope u enjoy these exclusive photos "regards to Nishant (Neomax)".It would not have been possible to get these photos if he wouldn't have got these photo at right time 6 a.m in the morning when it was fresh n puffed ostentatiously by my junipers.Networking we will talk a bit later as exasperated with all the whacks and cracks.

        Thursday, February 18, 2010

        What What .....this is the idea ..Bravo!!!....no ...what ????
        Since many days i having a nightmare  that i will come out with something unprecedented ..Ya i no this is all due to bad ravenous appetite for the beverages. But i still sometime when in contemplation think about how people really come up with new ideas or in more crude sense an invention.Then last week i just got lucky enough to meet some guys who liked to call them as  Hackers (or crackers.... i hope they not visit my blog).Just a moment of time had passed ,i started to crossfire them with lot of questions like what is really the way u guys come with new ideas to steal others data.One of the frowning on me ..then started to burst in laugh said to me in a very stringent voice that they don't steal.I was jittery n  cursed my self to ask this ....dumbstruck ed i stood there but i counted one me and asked them another question "HOW YOU REALLY COME WITH NEW IDEAS" .
         
                                                 No ideas fall from sky or can be grown on trees he said metaphorically...but yes if you stick to what u do and enjoy doing the stuffs more n more you can meet with new ideas...well its all contingent no rendezvous folks ..u may come with new ideas or not its not big deal as far as u enjoyed your excursions ..so a learned that Inventions are not done just for the sake of inventions...they tell us how much that person loves his subject...they are good spouse by then ...

           well lets try an understand what is all about the term Internet....pals i no we all hate this but you came all this way reading so that you could learn....even though  i started with an anecdote ,so that we have a smooth n interesting learning ...yes what i said enjoy ...i teach what i practice...if you got some good practices the please post me i will be glad to no that.
                              lets talk now about " Internet Service Providers"(ISP) before we go any further to understand the various technological jargon.There is an ISP is a company that supplies Internet connectivity to home and business customers. ISPs support one or more forms of Internet access, ranging from traditional modem dial-up to DSL and cable modem broadband service to dedicated T1/T3 lines.
        More recently, wireless Internet service providers or WISPs have emerged that offer Internet access through wireless LAN or wireless broadband networks.
        In addition to basic connectivity, many ISPs also offer related Internet services like email, Web hosting and access to software tools.we will learn more in coming posts be a patient reader as slowly and gradual study of these intrinsic protocols will give you more insight.And from my next post i am going to write about some resent development in the field on computers ,application tools and motley of operating system. 
         

        Thursday, February 11, 2010

        Any one care for networking?????

        Well folks i no guru.....don't even take me for a geek!!!
        I just care for networking...as it's all about getting in touch with new people ....ha i can't write a blog
        To be were honest i out of now were just wanted to do so...i made my mind but i am just short of the ideassss
        Yes you can make fun of me...you are legitimate to do so...and free to do your critical assessments.
                                                 well i think i almost started to write a blog ...but you people don't go in by my style ..as i am straight.so you came all the way to learn about networking n see what i gave u .
        lets get to some serious networking then.

                 why one care for networking???
        The simplest answer would be that i have no one to care for..oooHHHH!!! i just said serious work ...so then be ,today what we have around us is all about getting people to like you  n the best way to do is through this new Buzzzz called networking n making most of the Internet technology.There are more add-on to it like you can now pry into once life without getting noticed ....see now life is getting more simpler...
        For my buddy's how are just waiting for the pudding i let them know bro you can do all nasty stuff with this computer networking but let me admonish you before u get into behind bars ;-)..a sermons advice  "never piss in a place were it is written u about to lay a monolithic here...." they r just waiting for you with trap doors n Honey Potts ...flush it always after you do  those as we call..
               Now that you were so patient lets talk some technical jargon's (which is hate the most ...)

        1)what is computer networking :-
        Networking is the practice of linking computing devices together with hardware and software that supports data communications across these devices.
        we are social animals so we go for social networking ....but it's just seemed that we are running out of time in our life .so there was a need to find better n more interesting way to get connected to each other ...fun n cognizance led to the discover of computer (...my tribute to our great scientist ) then they set some protocols n standards for these computers to communicate ...these interlinked computer n others device like printers,scanners blab-la are collectively called computer networking.
        i am just getting exasperated by all this ...i said you folks i hate technicality ...
        This one last for they day i now we all like to do nasty stuff but morons are not learned n i know that we are not those ....we are a bunch of some good n responsible people ...so we always read the manuals thoroughly before we ride on a virgin.These techno-lingual stuffs is all about for our smooth ride....don't be an ignorant..


        2)Types of computer networking  : One way to categorize computer networks is by their geographic scope.
        • Local area network (LAN), which is usually a small network constrained to a small geographic area. An example of a LAN would be a computer network within a building.
        • Metropolitan area network (MAN), which is used for medium size area. examples for a city or a state.
        • Wide area network (WAN) that is usually a larger network that covers a large geographic area.
        • Wireless LANs and WANs (WLAN & WWAN) are the wireless equivalent of the LAN and WAN.

         
        Let it be for the day i wish i can keep the good work.....n learn from u all by your comments n queries ...
        If you have some good thing to share with us please feel most welcomed to do soooo.


         
        " i see you "