How to Change the Content Files Simultaneously In Website

How to Change the Content Files Simultaneously In Website
Often create a file that uses the word / phrase repeated? In many file / files? And often have to be changed? If yes, please continue to the bottom. If not? Please see the tutorial below.

Examples of cases. Denis is making a simple site that consists of 4 pages:

     home.html to be used as a porch.
     profil.html which contains profiles of companies and others.
     kontak.html, providing relevant contacts and addresses.
     tentang.html, contains an explanation of the history of the establishment, and about his company.

Display the page as shown below:
home_page

User Commands (‘sed’ dan ‘grep')
Well, after so, it turns out the files there is something wrong. In the footer (copyright). The phrase "copyright © ts @ 2011" the truth is: "Copyright © 2011 Denis".

Want to change all that by opening sentence tiap2 file, the Denis lazy. He thinks there should be way more practical. Because, how kaloberkas / files are made ​​not only 4, but 24? Mabok, comrade! Incidentally he was using the Ubuntu linux and hear-hear there is a command that can do that, the command "sed" or joint command "grep + sed". What about Windows users? Unfortunately, it is not possible except windowsnya to install the program 'sed' and 'grep', which would be quite troublesome.
Manual 'sed' and 'grep'
After a long and exhaustive search (Denis version), he gets to do it. Example code is:

# Sed-i 's / word or phrase that you want to change / word you want to use / g' nama_berkas
# Grep-i sed 's / word or phrase that you want to change / word you want to use / g' nama_berkas

And he was then practicing them into files that he created it, becomes:

# Sed-i 's / copyright \ © ts @ 2011 / \ © 2011 Denis / g' *. html
# Grep-rl "copyright \ © ts @ 2011". | Xargs sed-i 's / copyright \ © ts @ 2011 / \ © 2011 Denis / g'
pwd (the directory where we are) and the ls-l (show all files)
pwd (the directory where we are) and the ls-l (show all files)
Home.html+code+before+changing+it
 Home.html code before changing it.
Home.html+code+after+the+code+above+typed
Home.html code after the code above typed. 
Home.html+code+after+the+change+occurs
 Home.html code after the change occurs.

Explanation of code:

1.    Attention! Quotation marks are used in the explanation of the code just to clarify its code. If you want to type the command (example: 'sed'), do not include quotation marks only.
2.    'Sed-i' means that the command 'sed' will change the contents of the file tersebu. If it does not give the '-i', 'sed' will only display the changes that occur in the terminal, while the file remains intact. Example: if you want to change the contents of the file home.html, the changes will only be displayed on the terminal. The contents of the file home.html its own will not change.
3.    'S / copyright \ © ts @ 2011 / \ © 2011 Budi / g'. The '/' to separate command and word / phrase you want to change. It could also be replaced with other punctuation marks, such as '|' or '#' and so forth. 'S' in front means substitute (replace). And 'g', a global, does it mean to do repeatedly on each word / phrase you want to change it. To mark '\' in front of the sign read '&', the '\' is used because the sign read '&' is included command 'sed'. Therefore need to be given the '\' to mean what it is. If you only want to change the numbers / words alone, it is usually not as difficult as this, should give the '\' in certain places.
4.    '*. Html' means to change all the files have the extension. Html (In the example case above, all of the file). If you want to change all files regardless of extension, can directly use the sign '*'.
5.    'Grep-rl "copyright © ts @ 2011".' Means to take (grep) all files in this directory and its sub-directory (.) Containing the text 'copyright © TS @ 2011'. Do a search and display the file name berulang-ulang/recursive / her file (-rl).
6.    '|' Is a pipeline. In Linux, we can combine the use of more than 2 orders. The trick, is using the pipeline. In this case, the combined command is' grep'untuk search for all files in a directory and its sub-directories and 'sed' to change the contents of his file.
7.    'Xargs' will run the command by receiving input from standard input (stdio), in this case is the output of 'grep', and then forwarded to the command behind the word 'xargs' is. For more details, could try running the command 'grep-rl "copyright \ © ts @ 2011".' Well, this output will be processed by the 'xargs''to be forwarded to the command' sed-i 's / copyright \ © ; ts @ 2011 / \ © 2011 Budi / g '


Examples of the use of the 'sed' and 'grep' in just a few of what can be done by both the command. By using the command 'sed', we can change all the numbers in one / more of the files to be what we want, for example. And by 'grep', we can search for words / phrases / numbers / symbols etc. with certain patterns. How so? Everything can be done because of the role of the Regular Expression in the second command. How to Change the Content Files Simultaneously In Website in Linux. cool is not it?

Types of Cracker Attacks and its Prevention

Types+of++Cracker+Attacks+and+its+Prevention
Often when we find a vulnerability or missconfiguration in the system itself, we will thought it was a small thing, because we respond not as a security hole. Tools and techniques used are mostly variations of crackers that attack them did before. For both system and network administrator or end user, you should be much to learn from the experience of past attacks (although the attack it happened to anyone else) to avoid the next attack will happen.

Knowing the type of attack is very important to maintain system stability, so you do not need bother to install a new system to make it more secure, you just need to patch or even a little Maybe configure your system for some of this paper is written very fundamental, but it would not hurt if you as a professional to review something basis from time to time .. This article is not intended to attack but instead is to survive, because it seems to me to survive you have to know how to attack. 

In this article there are frequent attacks by crackers and every attack has methods separately, for example, only in doing IP spoofing method which has many of them man in the middle attack. With the above reasons I will try illustrates the exaggerated attacks.general is often done cracker and should be known by an Administrator or end user, while the methods may be more specific I pour in my writing whether the next attack or method in place to survive. I know the following article is far from perfect, for the suggestions and criticisms so I would expect.

1. IP SpoofingIP Spoofing is also known as the Source Address Spoofing, namely forgery attacker's IP address so that attacker considers the target IP address is the IP address of the host in the network rather than from outside the network. Suppose the attacker has a type A 66.25.xx.xx IP address when the attacker did This type of attack the network that attacked the attacker will assume the IP is part of the Network 192.xx.xx.xx eg, IP-type C. IP spoofing occurs when an attacker 'outsmart' packet routing to change the direction of the data or transmissions to different destinations. Packet to routing is usually transmitted in a transparent and clear so as to make the attacker to easily to modify the data origin or destination of data. This technique is not only used by the attacker but also used by security professionals to download Tracing the identity of the attacker.
Protocol that handles communication between computers most successful in the spoof. ICMP (Internet Control Message Protocol) is one of them (vulnerable) because the protocol is bypassed by the information and error messages between two nodes in the network. Internet Group Message Protocol (IGMP) can be exploited by using this type of attack because the IGMP report error conditions at the level of user datagram, but it also contains routing information protocol and Information Network. (UDP) User Datagram Protocol can also be 'asked' to display the identity of the target host. Solutions to prevent IP spoofing is a way to secure packet-packet is transmitted and installing screening policies. Encryption Point-to-point can also prevent users who do not have the right to read the data / packet. Authentication can also be used to filter the source legal and not a source that has been in the spoof by attackers. In another prevention, Admininistrator can use the signature for packages that communicate in network thus assured that the package is not modified in transit. Anti Spoofing rules (anti-spoof rules) which basically tells the server to reject packet is coming from outside the visible coming from the inside, generally this will break any spoofing attacks.

2. FTP Attack
One of the attacks carried out against the File Transfer Protocol is a buffer overflow attack caused by a malformed command. destination FTP server to attack this average is to get a command shell or to perform Denial of Service. Denial Of Service attacks may eventually lead to a user or attacker to take resource in the network without authorization, while the command shell can make a attacker gain access to the server system and data files that an attacker can eventually made anonymous-root acces that have full rights to the system even network was attacked. Never or rarely update the server version and patch to its, is a mistake that is often performed by an admin and this is what makes the FTP server to be prone to enter. An example is the popular FTP servers on the UNIX family of wu-ftpd which is always in upgrade two times a day to improve the conditions that permit the occurrence bufferoverflow FTP exploit also useful to know the password contained in the system, FTP Bounce attack (using ftp servers other people to carry out attacks), and knowing or mensniff information residing in the system.

3. Finger Unix Exploits
In the early days of the Internet, Unix OS finger efficient utility used to download information sharing among users. Due to requests for information on this finger information is not to blame regulations, many system administrators leave this utility (finger) with security very minimal, even with no security at all. For an attacker utility is extremely valuable for make information on footprinting, including login names and contact information. This utility also provide excellent information about user activity within the system, how long users are in the system and how much users care system. Information generated from this finger to minimize effort in penetrating a cracker the system. Personal information about users who raised the finger daemon is already sufficient for a atacker to perform social engineering by using social skill to utilizing a user to 'tell' passwords and access codes to the system. 

4. Flooding & Broadcasting
An attacker could reduce the speed of networks and hosts that are in it are significant by continuing to perform request / demand any information from servers that can handle the classic attack Denial of service (Dos), send a request to a port in excess called flooding, sometimes this is also called spraying. When a request is sent to all flood stations that are in this attack dinamakn broadcasting network. The purpose of this second attack is the same that is making network resource that provides information becomes weak and finally give up. Attacks by flooding depends on two factors: the size and / or volume (size and / or volume). An attacker can cause Denial Of Service by throwing capacity files big or large volumes of small packets to a system. In such circumstances network server will face congestion: too much information requested and not enough power to push the data to run. Basically a big package requires the capacity the larger the process, but it is not normal and the same small package in a large volume will spend the resources in vain, and the resulting congestion. 
 Attackers often use these flooding attacks to gain access to the system used to attack other networks in an attack called Distributed Denial Of Service (DDOS). This attack is often called smurf if sent channeled through ICMP and called fraggles when this attack dijalakan through UDP. A node (used as tools) which amplifies the broadcast traffic is often referred to as Smurf Amplifiers, These tools are very effective to run the flooding attack. By doing the spoofing of target network, an attacker can send a request to the smurf amplifier, which in the Network amplifiying (amplified) will send a response kesetiap hosts in the network itself, which means a request made by the attacker will produce the same job and repetitive on the target network, the 
Result of this attack is a denial of service that does not leave footprint. This attack can be anticipated by refusing to broadcast which is directed at the router. Flooding-level TCP (SYN ATTACK mostly) have been used in February 2000 to attacked Yahoo!, eBay, etc. that use DDOS attack (Distributed Denial Of Service).
Networks that do not use a firewall to check TCP packets can usually be attacked in this way. Some of the functions of filtering on the firewall (Firewall Filtering Function) will usually be able to withstand a flooding attack from an IP address, but the attack made by DDOS will be difficult to be prevented because of this attack as we know it came from a variety of IP addresses Periodically. Actually, one way to stop DDOS attacks is to return the package to the address of origin or also by turning off the network (usually done by systems that have been exposed to very severe attack).

5. Fragmented Packet Attacks
Internet data is transmitted via TCP / IP can be divided into packages that are only The first package contains the contents of which contains information on the main part (head) of the TCP. Some firewall will allow to process part of packages that do not contain information source address on the package first, this will result in some type of system to crash. 
For example, the NT server will be a crash if the packets are broken up (fragmented packet) is enough to rewrite the first packet of information from a protocol. Packages which are broken down can also result in an atmosphere such as flooding attacks. Because the package split will remain stored until finally in the form back to the data is intact, the server will store the packets are broken up earlier in the kernel memory. And finally the server will be a crash if too many packages that have been broken down and stored in memory without re-united.
By way of enumeration of topographi target network, an attacker can have many option to either crash the packet by examining the contents of firewalls, load balancers or content - based routers. By not taking this defense system, the target network is much more prone to vandalism and burglary.
Because the packets are broken up (fragmented packet) is not recorded in the log file before it put back together the data is intact, the packet is split provides a way for hackers to get into network without the detection. There have been many Intrusion Detection System (IDS) and firewalls filter (firewall filters) to fix this problem, but still many systems that can still be penetrated by this.

6. E-mail Exploits
Peng-exploitasian e-mail occurs in five forms namely: Floods mail, manipulation command (command manipulation), the attack rate of transport (transport-level attack), enter the various codes (Inserting malicious code) and social engineering (utilizing socialization physically). Email attack can cause the system to crash, open and rewrite even execute files also make an application or access to command functions (command function). Attacks mail floods (flood = flood) occurs when large numbers of e-mail sent by the attacker to the target resulting in the transfer agent to handle overwhelmed, resulting in communication among other programs become unstable and can cause the system to crash. Doing flooding is a very crude but effective, means to create a mail server to be down. One interesting way of doing mail-flooding attack is to exploit the auto-responder (auto-responder function) found in most applications email, when an attacker to find an auto-responder is currently active in the two systems different, the attacker could redirect one to the other, because both are in the set to respond to sacara automatically to each message, then both will continue to mengenarate more e-mails in a loop (back and forth) and finally both be tired and down. Manipulating attack command (command manipulation attack) can result in a system a crash with a way to overthrow the mail transfer agent with a buffer overflow caused by commands (functions) are disabled (example: expn or VRFY). The difference between the mail flood and manipulation command: command manipulation to exploit the power belongs to send mail allow an attacker to access the system without the authorization information (the network admin unnoticed) and make other modifications to the run of the program. Enable command defective as above can also result in an attacker to access mendapatlan modify files, rewrite, and of course it makes trojan horses on the mail server.
Degree assault transport (transport-level attack) done in a way mengexploit-protocol router an / mapping across the internet e-mail: tranport Simple Mail Protocol (SMTP). An attacker can result in an error condition while (temporary error) in the target system in a way mengoverload more data on the SMTP SMTP buffer so the buffer can not handle it, the incident This can result in an attacker knocked out of the sendmail program and entered into the shell with power adminitsrasi can even take over the root. Some attacks also exploitable
common in POP and IMAP. At the moment it is difficult for SMTP vulnerability exploitable, the attacker may move to attack tranport level if he does not successfully attack by manipulation or mail-command flood. This attack is more used to create a disturbance rather than to break a system. A attacker would normally use to make flood type attacks Exchange Server and cut e-mail traffic (e-mail traffic). This attack can also be used to make the reputation of a organizations are becoming worse by sending spam or offensive e-mails to other organizations with source and the address of the organization.
Mail relaying, the process of falsifying the origin / source email by meroutekannya at the machine that will lied to, is another type of transport-level attacks. This technique is very useful for making broadcasting spam anonymously. Various kinds of content (content) are often sent via e-mail with this technique is usually a content-content that is damaging. Some Viruses and Worms will included in the e-mail as legitimate file attachments, such as Melissa variant that appears as Ms Word Macro or Loveletter worm that infects the system and mengemailkan itself to users who are in the address booknya outlook. Most antivirus scanners will capture attachment like this, but visrus and new worm and its variants are still dangerous. The last attack carried out by an attacker in addition to the above attack is by way of do social enginering, sometimes the attacker sends e-mails with a source address using users send the admin password in order to upgrade the system.

7. DNS and BIND Vulnerabilities
Recent news about the vulnerability (vulnerabilities) of the Berkeley Internet Name Domain applicationm(BIND) in various versions illustrate the fragility of the Domain Name System (DNS), namely the crisis directed at the basic operation of the Internet (Internet basic operation). Errors on BIND is actually not something new. Since permulaanya, standard BIND is the most favorite target for attack by a cracker community as some kerawanannya. Four vulnerability to buffer overflow that occurred in January and then only some parts of the vulnerability to diexploitasi by the cracker to get access to system and perform the command with full privileges (privilege command execution). Vulnerability in BIND is a very serious problem because more than 80 percent of the DNS Jagat was in the Internet built using BIND. Without the DNS in the Internet environment Modern, e-mail transmission may be difficult, navigating to web sites was complicated and may not there are other easy thing about the internet.
BIND vulnerability lies not only in the DNS. System address translators (number-address translator) is the subject of many exploits, including to carry out attacks in the information, Denial Of Service attack, the takeover of power by hijacking. The attack at the level of information is intended to make the server to answer something other than the correct answer. One way to do this type of attack is through cache poisoning, which will fool the remote name server to store the response from third-party domain by providing a wide range of information to the domain server that has the authorization. All of the implementation of the attack on DNS will have most likely to succeed done if the answer to a question that spesisfik be fooled (spoof). DOS or make the server could not operate, can be done by creating a DNS attack itself or also by sending excessive traffic-flooding from the outside, for example use "Smurf" ICMP flood. If an organization or company installed authoritathive name server in one segment that lies behind a link or behind a physical area,
then this will lead to a possibility to do Denial Of Service attacks. Cracker will try to attack the system via DNS by buffer overflow, which is one one partner has the potential to exploit the vulnerabilities of BIND. Disorders due to exploits weaknesses in the coding / programming BIND which allows an attacker to utilize code-code that can be executed to get into the system. Some operating systems has provided a patch for the stack that can not be executed, as well as conducted compiler (providing patches) that protect the stack from overflow. The mechanism of this protection stidaknya make the cracker would be difficult to use the exploit.
It is clear that updating the system regularly and use a patch is one that should be done to build effective security, if the vendor of your DNS does not provide patches on a regular basis, you better change your DNS software that provides patches in Periodically, of course, to maintain system security. On a Unix system, BIND must run as root to set a lower port (kodekode machine). If the DNS software can be fooled to run code-malicious code, or open files owned by root, a local user may be able to increase his own power in the machine. Organization or company that transforms authoritative servers should also be aware that replacing
their servers at the same time will result in the hijack their domains through the cache poisoning. Changing the server should be done as the transition process. To prevent domain hijacking network admin should first menambahkn new server into the network Infrastructure before replacing the old server.

8. Password Attacks
Password is a common thing when we talk about security. Sometimes a user does not concerned with the pin number that they have, such as online transaction in the cafe, even transact online at home is also very dangerous if not equipped with security software such as SSL and PGP. Password security is one procedure that is very difficult to attack, an attacker may Just have lots of tools (technically as well as in social life) only to open something that is protected by a password. When an attacker managed to get a password owned by a user, then he will have power equal to that user. Train employees / users to remain vigilant in safeguarding the password of social engineering can at least minimize risk, but in case of social enginering practices organizations must also be wary this is a technical way. Kebnayakan seranagn committed against the password is guessed (Guessing), brute force, cracking and sniffing. Guessing (guessing) the password can be done by entering the passwords one by one in bantuin manually or with scripts that have been programmed. Most users use things that public for their password including date of birth, and usually the user is not worrying about rules that apply to the company to use a combination of alphanumeric and at least 7 character. If only the user using his date of birth as the password then this attack will be very easy to do, because the cracker does not require a long time just to break down the 6 digit digit date of birth. Some of the user or even administrator can make the job a cracker easier if only they forgot to change the default password of a software.

Actually, password guessing is something that is not very effective, and can spend time. Network admins can easily detect the attack if an attacker trying to login by guessing the password frequently. Brute-force attack that uses the logic is the same with password guessing, but brute-force attack faster and more powerful. In this type of attack an attacker using a script (usually free cracking programs) that will try passwords general (usually found in the dictionary). The purpose of this type of attack is to accelerate discovery before the network admin password is aware of the attack. Although the Brute-force attack is more efficient than guessing passwords, these two techniques on essentially the same. Attacker is generally more difficult to succeed with both these methods. Further Again, both techniques are very easy on the opponent by using blacklisting features, which will lock a user account if someone (the attacker) repeatedly enter passwords are not the right. For example, the default blacklist in unix system is three times (the chance to enter password).
The weakness of the protection feature blacklist blacklist is that it can igunkan to attack system by the attacker. For example, if an attacker can identify who the login name for network administrator, the attacker could have save a login name and password to enter the one repeatedly and finaly lock the admin account ☺. When the admin is trying to get access back, an attacker is still able to relate to the system. Password cracking is a method for protection against the encrypted passwords in the system. Assuming that atacker been entered into the system, he could have changed power within the system with a way to crack the password file using brute-force method dictionary attack (match the words in the dictionary with words that are encrypted in the password file). The success of using this method depends on processor speed and programs that are owned by the attacker. The best way to avoid this type of attack is with the authority to monitor access to the file. By way of peering traffic on port telnet (23) or HTTPD (80), an attacker can
get a password that is used to remotely connect the internet and through a process snifing called password. The easiest way to do this is because the second connection do not use encryption, except for connections that use SSL (secure socket layer) on HTTPD (usually under the browser locked padlock sign, which indicates a secure transaction) or also use SSH (Secure Shell) to connect to other machines remotely.

9.Proxy Server Attacks

One function is a proxy server to speed up response time by way of uniting process of multiple hosts in a trusted network. In most cases, each host has power to read and write (read / write) which means what can I do in the system I'll I can also do in your system and vice versa. If the firewall that is in the trusted network is not configured optimally, particularly for block access from outside, especially if the authentication and encryption is not used, an attacker can attack the proxy server and get the same access to other members of the trusted network. If attaker been entered into the system he certainly could do anything and he can do DDOS (distributed denial of service) are anoymous to attack other networks. 
The router is not configured optimally also will serve as a proxy server and will vulnerability to the same result with a proxy server. 

10. Command Processing Remote Attacks
Trusted Relationship between two or more hosts provide exchange of information and resource facility sharing. Similar to a proxy server, trusted relationship provides to all members network access to the same power at one and the other system (the network). Attacker will attack the servers that are members of the trusted system. Just as vulnerability on the proxy server, when access is received, an attacker would have the ability to execute commands and access the data available to other users.

11. Remote File System Attack

Protocols for data transport backbone of the Internet-is the level of TCP (TCPLevel) with a mechanism that has the ability to read / write (read / write) between network and hosts. Attacker can easily get trace information from this mechanism to gain access to the directory file. Depending on the OS (operating system) is used, the attacker could extrack information about network, sharing privileges, the name and location of users and groups, and the specification of the application or banner (name and version of software). System is configured or secured to a bare minimum will easily expose this information through the firewall even though. On UNIX systems, This information was taken by the NFS (Network File System) on port 2049. Windows systems provide data is the SMB (server messaging block) and on port netbios 135-139 (NT) and port 445 on win2k. Network administrators can minimize the risk that would occur by using Protokolprotokol by providing them with little regulation. Network with Windows systems, should block access to ports 139 and 445 from outside the network, if possible. In 2049 the port unix system should be in block, file sharing is limited and requests the file through the showmount (command in unix) should be noted in the log.

12. Selective Program Insertions
Selective Program Insertions are done when the attacker attacks that put the programs crushers, such as viruses, worms and trojans (you probably already know this term well ☺) on the target system. These programs are often also called the destroyer of malware. These programs are have the ability to damage the system, destruction of files, stealing passwords up to open the backdoor. Usually sold in the market will antivirus can detect and clean up programs like this, but if there is a new virus (just think of melissa variant) virus scanner may not be face the new scripts. Some network administrators perform defense against malware
with alternative technologies such as behavior blockers, which lay off the codes that are suspected based on the behavior of malware examples, not by signature. Some other applications will be quarantine the virus and code-code that is suspected in a protected area, usually called sandboxes.

13. Port Scanning
Through port scanning an attacker can see the function and how to survive a system of various kinds of ports. A atacker can get access to the system through an unprotected port. Sebaia example, scanning can be used to determine where the default SNMP string in the open for public, which means information can be extracted for use in remote command attack. Sequence 

14. TCP/IP stealing, Passive Listening Port and Packet Interception 
TCP / IP Sequence stealing, Passive Listening Port and Packet Interception runs to collect sensitive information to access the network. Unlike active attack or brute-force, attacks using this method has more stealth-like qualities.
TCP / IP Sequence stealing is a mapping from the sequence of numbers (digits), which could make a packet attacker's look legal. When the system asks the session on another machine, the two systems are exchanging TCP synchronization numbers. If not done at random, the attacker can recognize algorithm used to generate these numbers. Sequence of numbers that have been stolen can Attackers used to impersonate one of the earlier system, and finally allow it to pass through the firewall. It is actually effective when used with IP Spoofing.
Through passive listening ports, an attacker can monitor and record (log) of all messages and files sent to all ports that can be accessed on the target system to find the point of vulnerability. Packet Interception is the (exact coating) of the active listener on port programs that are in target system or restore functions to receive all types of messages (data) specific is sent. Such messages could be returned to the unauthorized systems, and its final reading returned either no change or even with the changes to the attacker, or even not is returned.
In some versions or also according to the configuration of the user SSHD (secured shell daemon), authentication can be done by using the public key (owned by machine of course). If an attacker learn the public key is used, it can create or insert false packets. System target will assume the sender is spoofed packets have access rights.

15. HTTPD Attacks
Vulnerabilities contained in the HTTPD webserver or there are five kinds: buffer overflows, httpd bypasses, cross scripting, web code vulnerabilities, and URL Floods. HTTPD buffer overflow can occur because the attacker to add errors to the ports used for web traffic by entering the lot carackter and strings to find a place
corresponding overflow. When a place is found for the overflow, an attacker would enter string that will be a command that can be executed. Buffer-overflow can give the attacker access to the command prompt.
Several of the HTTPD feature can be used to meciptakan HTTPD byapass, giving access to server using the logging function. In this way, a web page can be accessed and replaced without recorded by the web server. This method is often used by the cracker, and cyber hacktivis Vandals to defacing a website. While vulnerabilities in web scripts can happen to all web programming languages ​​and all extension applications. Including VB, Visual C + +, ASP, TCL, Perl, PHP, XML, CGI and Coldfusion. Basically, the attacker will exploit the weaknesses of an application, such as CGI scripts not check the input or the IIS RDS vulnerability that allows running on showcode.asp commands remotely (remote command priviledges). Through cross-scripting and cross-site scripting an attacker could exploit the exchange of cookies between browser and webserver. This facility could enable the script to change the look of the web, etc..
This script can be run malware, read important information and to expose sensitive data such as credit card number and password. In the end, the attacker can run a denial of service with the URL flood, which is done by how to repeat and keep repeating the request to port 80 via httpd are the limits TTL (time to live). Some of the user or manager may hate to hear these attacks. But on fact is nobody really fix to secure the network or website. Security is a process, not product. If you install a firewall, IDSes (instrusion detection system), routers and honeypots (system to trap) may be able to provide the layers to survive, but once again the most advanced equipment in the world will not help an organization until the organization has a process to upgrade the system, wear the patch, check security on the system itself and other methods. There have been many companies that use IDSes but does not monitor log files, they installed firewall, but not the upgrades. The best way to protect a website or network of attack is intended to bring security challenges as going against safety
itself, keep trying, always remember the basics and do not forget to pray ...:)
May be Helpful ^_^
Types of  Cracker Attacks and its Prevention

Best Tricks to Protect Important Files From VIRUS

Best+Tricks+to+Protect+Important+Files+From+VIRUS+(secure+file)
I returned to find a few ideas that may be beneficial to everyone who often haunted by the fear of losing important data because of being attacked malicious viruses are very irresponsible. Lately I hear and see more and more cases attack the virus in its  distribution with removing or damaging data with certain extensions, most of the attacks directed at data Document (*. doc, *. xls, *. ppt, *. txt and lnsbgygtl) especially in the files *. doc extension. This makes a lot of people are very afraid that they merajinkan yourself manually backing up data regularly, to install software antivirus and other protection software that is sometimes less effective and very troublesome self. That is why I wrote this article advanced the hopefully resolve the issue.

The essence of the article is actually very simple: rename all the extensions important files at once in a Drive with a single click. here I using a VBS script to aid implementation.
* just info: first hell usually I use this script to rename the video files from VCD
with extension *. DAT to *. MPG to be displayed (Thumbnail) ditampilan Explorer.

The virus attacked some file types based on the file exstensinya, and because most viruses attack the *. doc  file, then in the example below I will apply it in this file, is to change the extension *. doc into *. MSWord.  (You also may determine the outcome of his own in addition to rename *. MSWord)
Follow the following steps:
  1. Open RUN type notepad.exe then enter
  2. After the application appears type in notepad or copy> paste the script below:
Dim Drive, Root, fname
Drive = 'D' 'drive you will be processed
Set Root = CreateObject ("Scripting.FileSystemObject"). _
                 GetDrive (Drive). RootFolder
Set fname = New RegExp
with fname
             . Pattern = "\. Doc $" 'which will rename the file extension
             . IgnoreCase = True
             . Global = False
             . Multiline = False
end With
Call Rename (Root, fname)
Sub Rename (Folder, RegExp)
       Dim subfolders, File
       For Each File in Folder.Files
             If RegExp.Test (File.Name) Then
                 File.Name = RegExp.Replace (File.Name, ". MSWord") 'result renamenya
            end If
Next
For Each subfolder In Folder.SubFolders
           Call Rename (subfolders, RegExp)
  Next
end Sub

3.  SaveAs in the folder where the-course with the filename: XTRenamer.vbs, click on the column "Save as type" and replace "Text Document (*. txt)" to "All Files" then click the "Save"

4.  Execution XTRenamer.vbs file that you created earlier to change all air-file extension *. doc to *. MSWord on Drive D: \
* If there is an error in the script but you're sure not a typo, note and understand your script mainly on: HIGHLIGHT (Drive the target, and type suitable extension / no not on the computer there, or check your files there not change?
You can also specify their own what kind of file extension, and will rename
what later became an extension. To understand the script note
HIGHLIGHT and 'descriptions.
5.  Wait a while until the process is complete perenamannya. long process determined by computer speed and the number of files. usually on cheap home computers will not take more than 10 seconds. For more certainly open the Task Manager (ctrl + alt + del)> tab "Processes"
Windows+Task+Manager
If the list "Image-Name" is still there is a "wscript.exe"
means the process is still not yet completed. Having completed the process of renamannya assosiasikan then we have to file extensions The new order can be open at the desired application, that can be opened with is easy.

The trick is:
1. Login Control Panel> Folder Options> Files Type
2. Find and click the "New" and then in the "File Extension:" type "msword" (if you make modifications to the script and change the string "MSWord" with others, adjust).
3. Click on the "<<Advanced", will appear in the column "Associated File Type:". click column, will appear a list of listings that very much and look for posts "Microsoft Office Word Document". Let me look faster type "mi" quickly in a list of these listings.
extention
4. Then click "OK"
5. Completed, make it easy ...
6. (Optional) change the default icon image that are not easily fooled by files viruses are often air-icon resembles a Word file. The trick? Read the article before.
If you want to change the extensions are also your other important data that it is possible to have a virus such as *. xls, *. ppt, *. txt, etc., then do modifications to the script (syntax code that needs to be modified has been my HIGHLIGHT give its' description.) And do not forget to associate again with the default viewer program. / pemrosesnya like the above. The side effects (well here it is often questionable)
a.  This VBS script will simply rename the file extension alone is not filenamenya, so for example if you have a file called Data.doc it will converted into Data.MSWord. so do not worry, his real name not be
to change.
b.  If you change the data will be shared extension for document or data that you create to spread widely disseminated on the Internet / local network or to another computer then it will be a bit troublesome people who will open it, on their computers because the extension has not been associated with its viewer program. So if you want to be able to open this file on another computer better rename the extension back to *. doc or can be opened by: Right-click> Properties> Change ... and search for "Microsoft Office Word" (Application
Microsoft Word) in the "programs" and click OK> Apply> Ok recently opened. 
c.  Application of this VBS script on Drive C: \ "possible" - (likely very small) can interfere with the performance of applications that include file *. doc in the process. Therefore I suggest to move the files important you from drive C: \ to another drive so the drive is C: \ is not necessary in-process using this VBS script.
d.  No messing around
May be HelpFull ^_^

Knowing Kiddie Script in Detail in the World of Hacking

Knowing+Kiddie+Script+in+Detail+in+the+World+of+Hacking
Knowing Kiddie Script in Detail in the World of Hacking
In this day and age to be a Script Kiddie was not difficult because only with a capital of internet connection
and understand a little about computers, Ordinary people like me can become a Script Kiddie because only a few learning tools-tools that the spread on the internet and learn it then we can become a Script Kiddie. Kiddie Script Hacking tools

Definition of Script Kiddie
In the world of hackers alone, A Script Kiddie interpreted as someone with bad intentions who use the program others to attack computer systems, or deface any on the website. On the call of a script kiddie is in fact not a pride, it is usually assumed sebagasi a child (kid) who lack the ability to create their own tools and
usually only aims to create a sensation. At any rate this can cause many problems for computer users and we are often using Internet, usually a script kiddie looking for targets not by choosing a target but rather rely on the results of the scan tools that detect the weaknesses of a system in general. Sooner or later the tools that used a script kiddie will provide a scan of a weak system which can later be attacked with ease, well from the bottom of it A Script Kiddie is a threat, anyone can be the next target because it did not specify the Script Kiddie victims but use the results of a scan tool that detect the weakness of a system.

Weapons Which In Use Script Kiddie
On this day anything very easily found on the internet, The same with weapon Script Kiddie. Numerous
tools which can be downloaded on the internet and can be used easily, even though their use even a layman like I was. One very simple way is to scan IP / web to find weaknesses in systems that can be attacked
easily, to become a script kiddie. Someone do not have to work until late at night because of the many tools that work automatically so we can stay active and we are just waiting for the results of a scan tool

Bad things that can happen
Once your system is weak then the intruder will go straight and invade your system with no little compassion
was. Below are some bad things that can happen if a system has been attacked

1. Web defacement
After the intruders then made it into a web serve and have full access on a webs, which are usually done a script kiddie is replace the main page of a web with id nick name along with a message intended for web admin them. Not only that many of the intruders tear ngabrik contents web so that the web is no longer able to accessed by visitors or not run properly again. it is a achievement for a script kiddie.
2. Infect the system
One example through a virus or worm which in which later spread through the internet virus or worm that infects a computer to compose sisitem, took this important files that exist on the computer or damage the total
a computer to not be reused.
3. Retrieving a password
Passwords with strong type (has a password that is difficult in (guessed it) sometimes are helpless if the script kiddie has running a program or a keylogger program that can to enskrip a password
4. File operations
If a script kiddie has gained full access, then they can at will do anything, for example such menghaspus or steal files is very important. Imagine if your important files or the files other sensitive stolen by someone else if your computer attacked by intruders.

Protections
An attack occurs because of a weakness therefore we must do the protections under method of attack.
1. Minimization of system
One of the security loopholes that can be susup by attacker is through the service or program being running on the system on your computer. Therefore, make sure we minimize service or program running on your  computer. And you can disable the service or program that is not in used or needed.
2. Password management
Things you should do is just be careful if you want to create a common password like "admin", "1234", "qwerty", even "p @ $ $ w0rd" and still a lot of passwords which has a very easy level of difficulty in guessing. It seems conceded just waiting Now by simply using a search eingine script kiddie can find a database containing collection-a collection of passwords and other things that are sensitive
3. Use a firewall
At least with us using the firewall can protecting the attacks coming from the port are allowed by firewall is usually port 80 which is generally used as web serving. Firewalls also can cover up weaknesses a system.
4. Use the tools
If a script kiddie use tools to attack then use the same thing to know the system you own. Tools are designed to find weaknesses in the system call a vulnerability scanner. Typically this software will scan IP address, operating system, and applications walking and finally determine the update on operating system and application that has its disadvantages.
5. Always update
Updates are always programs that you can use, because usually a lot of programs that still has many problem as this can be a boomerang for the system if found on the program crashes.

Tips Protection Web Pages With. Htaccess and. Htpasswd

Sometimes  after we do a website online, it seems there are certain links  that others do not
should know. And of course the link was a bit special.:). Maybe its contents secret ato as the user who
become a member who can access these links. With. Htaccess and. Htpasswd can be in
do. Here will be explained how a directory is the key to
the file. htaccess and. htpasswd.

References.
1. http://www.webmaster-toolkit.com/htaccess-generator.shtml
2. http://www.xs4all.nl/ ~ remcovz / htpasswd.html
3. http://www.topsubmit.de/dienste/tools/htaccess-generator/
4. http://www.eye-create.com/htaccess.html

Things that  need.
Apache modules, PHP and its modules.

Create a  htpasswd file.
The first step is we have to specify the directory where are we going to protectionism. Well here
my example it is / home / azmy / public_html / azmy.
Go to the directory;
[root @ proxy root] # cd / home / azmy / public_html / azmy
Create a htpasswd file;
[root @ proxy azmy] # htpasswd-c / etc / .htpasswd azmy

New password:
Re-type new password:
Updating password for user azmy
[root  @ proxy azmy] #
Can also: htpasswd-c. Htpasswd azmy, but the default is to us while accessing the directory current.
htpasswd-c / etc / .htpasswd azmy This means we create the htpasswd file in the directory / etc and
as well as create a user and password for azmy.
If we have made a htpasswd file then for the addition of new users we do not need anymore
make htpasswd file but enough with the command:
[root @ proxy azmy] # htpasswd / etc / .htpasswd admin

New password:
Re-type new password:
Updating password for user admin
[root @ proxy azmy] #
And do not forget to add the user admin. Htaccess file it.

Create File. Htaccess
[root @ proxy azmy] # vi. htaccess
AuthUserFile / etc / .htpasswd
AuthGroupFile / dev / null
AuthName "Restricted Access"
AuthType Basic
<limit GET>
azmy require user admin
</ limit>
[root @ proxy azmy] #
For RedHat 9.0 or Fedora Core, httpd.conf configuration used in the menu:
<Directory />
Options FollowSymLinks
# AllowOverride None
AllowOverride All
</ Directory>
<Directory "/direktory/web/anda">
Options Indexes FollowSymLinks
# AllowOverride None <- comment this line
AllowOverride FileInfo AuthConfig <- add this line
Order allow, deny
Allow from all
</ Directory>

Restart  Apache.
[root @ proxy azmy] # / etc / rc.d / init.d / httpd restart

Open Browsers.
Restart  Apache.
[root @ proxy azmy] # / etc / rc.d / init.d / httpd restart
Open Browsers.
http://www.azmy.tk/azmy/
Then the box will appear that will ask you to enter user and password.
Please try and mengoprek own ..:)
-= End. Htaccess and. Htpasswd =-
Criticism and suggestions please to: abang_ojex@yahoo.com
Then the box will appear that will ask you to enter user and password.
Please try and mengoprek own ..:)
-= End. Htaccess and. Htpasswd =-
Criticism and suggestions please to: denisciala@rocketmail.com

Build a Natural Blog Liked by Google from 0

Build  a Natural Blog Liked by Google from 0
Build  a Natural Blog Liked by Google from 0
To create  a website yourself without the help of  the manufacturer's service website takes more than just ideas and web editor software good. Side should provide a menu option to use with a clear structure, layout and techniques used are also must be harmonious. Thus, the first-tanma have made ​​a careful planning to produce a good web. Starting from a private or commercial, profitable or not advantageous, however, in the planning and
designing a web when we create a personal web if there is Small mistakes can ditolerin, not so with the company's web, because the aim is to attract as many customers. in order to  create a website using google like www.blogger.com facilities for those of you who want to secure your account adsens

Selects Address (Domain)
This stage does not always have to be done in stages but first must consider what will be the address at use by the web that you create. try to immediately buy a domain that is desired. Do not let your web finished with a nice, but the domain you want is already used by others.

Choose Hosting
Hosting is where your host or store Web files that you create. Decide whether you want to buy space serving or hosting will be making your own webs. If you to choose your web hosting files, then select a hosting provider who no longer in doubt the reliability or ask your friends and you can also Searing with other users via the internet. If you choose to make your own web serving, use applications that have been reliable and trusted for his prowess in serve a use as the web and you can also hire an IT to download the settings and make the system security nice to avoid the attack by hackers. 

Making the Right Design  
First you must clearly define design is clear. Who are you going to, how to look page, means and what techniques you use, and you also must have thinking about multimedia effects what you use to beautify your web page. For example you want to add animation, you can use Macromedia Flash to make it.
Website Designing Display
If you have to understand clearly which way your web fixed, now you just make your website look attractive
possible so that visitors feel at home and visit as often as possible your website. Usually creative ideas come when we as often as possible browsing to look around and take the creative ideas from competitors. do not
imitate, create other more interesting variations. Or you can also download a web template from the internet for free or there is also are paid.

Test the HostingBefore
Some mistakes will inevitably be found after completion your web design, web consistency, test the hyperlink, the position element-eleman correct page on every web page should continue in observing, as well as in general appearance. You can also ask assistance to your friends to correcting your website, because in general they can provide suggestions for improving your website. If you want your visitors to get looks
the same page, you must use testing on existing browsers. such as Internet Explorer, Netscape Navigator,
Opera, and Mozilla Firefox. 

By updating the Periodic
After you have successfully launched the web on your desaign own step by step. then it's time you update
sacar periodically so that the visitors are not bored and fed up with the contents (content) to your web.
Perform repairs on a regular basis in order to improve the web you, accommodating all the suggestions and criticisms of the visitors to to correct or provide creative ideas.

Knowing the specifications of your PC using Piriform Speecy Details

Why use this software? Why not use standard  Windows features that use computer properties or direct X diagnostic (dxdiag)? Because this software is more to explain in detail about the hardware installed on your PC.
If using Computer Properties:

The information contained only a version of Operating System, Processor, and RAM capacity
Computer+Properties
Using  Device Manager
Using++Device+Manager
It seems  none the less. Incomplete  if there is no information about mainboardnya. Incidentally, I want to know the brands and types of its Mainboard.  Description of the hard disk, VGA, LAN & Audio  exists.
using dxdiag
step 1

START -> RUN -> dxdiag
dxdiag
 then comes  this image:

directx+diagnostic+tool
The information we want is complete. But we have to open the program and then one by one.  It took a long time. By using Piriform Speecy, all the information we want is programmed directly stated, this software also includes a free freeware we downloaded on the internet.
Using Piriform Speecy

Summary section of this application displays all of the specifications yamg hardware and operating system installed on the PC.
Piriform+Speecy
Motherboard+descriptions

CPU+descriptions+detail

Knowing the  specifications of your  PC using Piriform Speecy Details!

Hacking with ProRat

For those of you who like to idle computer ignorant friend, ya I love tools that fit
for you. His name ProRat. ProRat hacking tool is one of the very outer
very common. Tools are made ​​of Turkey. These tools serve to infiltrate into
other people's computers. It's very easy and simple as we live
know the IP and Port victim's computer, then we can directly
menginfeksinya.
A. How to use ProRat:
1. The first time we have to know in advance the IP and Port of victims who
is open. We can do it by hand or even with the help of
Ports Scanner tool.

From the picture above we know all the current computer's IP and Port
whichever is open. That will be the victim in our experiment times
This is a computer with IP 192.162.10.233.
2. The next step is we run ProRat, these tools can you download
in http://www.prorat.net. Previously matiin Anti Virus ye first (disable),
because ProRat be detected as a virus. Though he is not harmful to
our computer. After that fill IP casualties on the form of IP and port (default
5110).
If we click the Connect button then the connection to the victim's computer has not been
can, because we have not the victim's computer infection. To infect a computer
victims we first create a server that will run on computers
the victim. I click the Create button - Create ProRat Server.
Then came the look of Notifications:

Check the option Use Proconnective Notifications and contents of the IP (DNS) Address
with our IP.
On the General Settings tab we input the Server Port (default 5110), Servers
Victim Name and Password.

On the Bind tab with file we can not infiltrate the file to be executed
shared server. File extension is free.

Next is the Server Extensions tab, there are several options the server extension.
We choose an extension. Exe.

To make the icon you click on the tab Server server icon, select whatever icon
you want.

The final step of making this server is click Create Server
Once successful, it will appear:
3. We stayed running Server is dikomputer victims. The way is up
you want to secretly infiltrated or the technique used by Social Engineering
(Mas teachings Fauzi) and can also directly on the computer you infeksikan
it (if biased sihh).
4. Once the server is successfully running on the victim's computer, then we
immediately try to connect to it with our computers.

5. For the connection we can use or direct ProConnective
type the IP address and port the victim's computer. ProConnective are tools
inherited from ProRat that serves as a Bridge (bridge connection) between
computer servers and client computers (the victim). Will appear if the victim's IP
he was on.


6. After successfully connecting to the status of the victim's computer
ProRat will change from Disconnected to Connected
7. Well ... it's time we play. There are many things we can do on
the victim's computer as the information of your PC, send a message
error, turn off the computer, lock the mouse, open the CD-ROM or even
photographing the victim's face.
8. Now we will see the victim PC info:

From the image above we can see the information held from computer
the victim.
9. We also can transmit fake error messages to the victim's computer:

10. Install Keylogger.
GOOD LUCK may be USeFull ^_^ with Hacking with ProRat (Hacking Tools)

Check Contents Before Downloading The Winrar file

Check Contents Before Downloading The Winrar file
Check Contents Before Downloading The Winrar file
've experienced download files with extension. rar? or. when done in downloaded zip file was located in the archive is different from what we want. Here are some tips to check the contents of the file. Rar /. Zip before download is using the Mozilla Add Ons "Arch View" with this you can view the contents of the file before download sepetri air file extension. Rar,. Zip or. Iso.

ArchView can open archive file online without downloading the whole archive. Just like a normal web page. It is very fast because it only brings a fraction of the archive file from the server. ArchView supports avi, ZIP formats and ISO CD image; HTTP, FTP and file: protocols. And can present XUL or HTML interface.

features

* Direct access to archive files on the Web or FTP server.
* List archive catalog file.
* Open or download the individual files.
* Support RAR and ZIP archives and ISO CD image.
* Support HTTP, FTP and file: protocols.
* Can present HTML or XUL interface.
* Just take the necessary data rather than the entire archive file.
* Work with Firefox, easy to use.
* Platform independent, (theoretically) supports all platforms that Firefox can run.

limitation

* Can not open SFX file.
* Does not support multi-volumn archives.
* Does not support avi decoding, need third party software.
* Can not open encrypted file in ZIP.
* Unable to display the comments RAR

Download Add Ons Mozilla: https://addons.mozilla.org/en-US/firefox/addon/5028

Note:

Must direct link, if the file is in filehosting like (rapidshare, ziddu, etc.) must be converted first to a direct link Rapidleech wear. If its already installed addons, go direct address of the archive file in the mozilla link and see the result. Check Contents Before Downloading The Winrar file

Researching Before Buying a Laptop

Researching Before Buying a Laptop
Carefully Before buying a laptop, you've got to know in advance how the product works or need your support in the future. In general, the size of a mini laptop in them (under 10 inches), thin, and lightweight (10 inches? 14 inches), mainstream (14 inches? 15.4 inches), and a desktop replacement (17 inches? 21 inches).

NEEDS ADJUSTING
If you want to use a laptop instead of a PC / home computer, look for notebooks with screen sizes of at least 15 inches so you can work more comfortably. Big screen is also practical as a media presentation to the client. Conversely, if you often travel on business, choose a notebook with a size of 12 inches or less.

PROCESSOR OPTIONS
If only for typing or routine work in Word or Excel, then the standard processor is more than enough to meet the needs (eg Pentium 4). However, when using the laptop for design, video editing to gaming, it is advisable to choose a processor that has a reasonably good performance (eg Core 2 Duo or more).

TYPE OF SCREEN (SCREEN)
Although already set the screen size, but you are also faced with the choice of type screen, which is a standard or wide. Choose a wide format because it is more convenient and good views with a minimum resolution of 1024 x 768. There is also a type that looks more glossy shine, but less comfortable to read. Finally, type a more matte finish provide comfort when dealing with text or writing.

MEMORY
The larger the memory (RAM), the faster the performance of the notebook. For standard usage, with a capacity of 512 MB of memory? 1GB is enough. For graphic design, gaming, and video editing, 2GB is the ideal memory size.

HARD DISK
If the file is a document in the notebook, hard disk capacity of 80GB is more than enough. But when more store song files, video, and high resolution images, you should select the hard disk capacity of 160GB or more.

MEDIA STORAGE
Choose a notebook that is equipped with CD / DVD writer. Because maybe one day we need to move files on the notebook to a CD / DVD or vice versa. If no, can add a CD / DVD writer external USB connection.

CONNECTIVITY
Connectivity is very useful for easy transfer of files from one device to another device in the form of USB, Bluetooth (if you want to connect to the phone), WiFi or Ethernet port (local area network / LAN) to connect to the internet or hotspot. Researching Before Buying a Laptop

 
Free Host | new york lasik surgery | cpa website design