Monday, February 7, 2011

Basic Network Cabling

Type Of Cable
1. Twisted pair cable
    - UTP (Unshielded twisted pair)
    - STP (Shielded Twisted pair)
2. Coaxial Cable - CCTV
3. Fiber Optic


Type of UTP cable
1. Cat3
2. Cat4
3. Cat5
4. Cat 5e
5. Cat 6
6. Cat 6a
7. Cat 7






Type of Equipment in Network Design

1. Patch Paanel
2. Modular Jack
3. RJ45
4. Face Plate
5. Cable Manager
6. Rack Cabling
7. Swith
8. Router
9. Firewall
10. Modem
11. Wireless
12. Computer

Tools
1. Puncher
2. Network Tester
3. Cable Stripper
4. Playar
6. Scissor/Cutter
7. Pen Labeling
8. Loytape/Sticker


Network Diagram



  • Patch Cord =UTP cable + RJ45
  • Modular jack > belakang face plate
  •  Sambungan daripada telecommunication closet ke work area mestilah tidak melebihi 100 meter

Jenis Sambungan Kabel

2 jenis sambungan kabel LAN:-
  • Straight thru cable - digunakan untuk menyambungkan antara peranti BERLAINAN.
          Contoh: Sambungan PC ke Router

  • Cross Cable - menghubungkan antara peranti yang SAMA.
          Contoh: Sambungan PC ke PC atau Switch ke Switch

2 jenis susunan kabel LAN:-
  • T568a
  • T568



T568A                                                T568B
Putih hijau                                         Putih Oren
Hijau                                                Oren
Putih oren                                         Putih Hijau
Biru                                                  Biru
Putih Biru                                         Putih Biru                             
Oren                                                 Hijau
Putih Coklat                                       Putih Coklat
Coklat                                              Coklat











Wednesday, February 2, 2011

Security Attack

Type of Attack









Ada juga berbagai cara serangan contohnya:


Brute Force Attack             
- memecahkan password pengguna
- try and error



Dictionary Attack
       -  mencari pasword melalui maklumat yang ada pada pengguna
       -  atau tempat keje pengguna tersebut (contoh bawah meja computer tertulis 
           password pengguna).

Prevention Security Attack
          1.     Antivirus
          2.     Firewall
          3.     Encryption
          4.     IP segmentation
          5.     IP Security (IP Sec)


      Ada juga skill-skill yang dapat di gunakan untuk mengelak dari ancaman serangan tersebut.
      Contohnya:

  
Skill sending messege:
1 .Drop box – messege yang ditulis tanpa send kepada pengguna lain, akan simpan di draft 
                       box.Hanay pengguna lain yang tahu e-mail dan password itu yang akan 
                       dapat membaca messege tersebut.

2. Steganografi – Messege yang dihantar melalui gambar
    contoh software:Gift it up

3. Cipher Text : contoh MD5,Symmetric AES


Tuesday, February 1, 2011

Remote Control PC

Aplikasi ini boleh didapati dengan percuma di internet.
Seperti yang sedia maklum aplikasi ini adalah satu cara untuk menghubungkan PC ke PC.
Mengawal PC dari jarak jauh.
Contoh : Anda di tingkat 3 tetapi dokumen anda berada di PC anda yang berada di tingkat 1.

Aplikasi ini juga membolehkan anda chat bersama kawan anda dan juga turut membolehkan anda menghantar atau menerima file.
Aplikasi ini juga membolehkan anda mengenal pasti IP adrress yang berada dalam jaringan anda.


Untuk eksperimen kali ini aku meggunakan aplikasi Beyond Remote 2.0.
Aplikasi ini boleh di dapati di google..
Tak pun aku bagi link cantek sikit la...lu asik nak kene suap je..isyh..

www.download.com
cari la link aplikasi ni kat situ.. hehehehe...

Folder Lock

Folder Lock adalah satu aplikasi yang dapat menyimpan folder atau file-file  rahsia anda. Untuk membuka folder ini memerlukan password. Folder lock ini sangat mudah digunakan semudah ABC..free lagi berpatutan.
Sebenarnya teknologi folder lock ni dah lama aku pakai sejak 5tahun lepas, kebetulan ada subjek ni dapat la aku update software folder lock yang aku ada..

Untuk eksperimen kali ini aku menggunakan aplikasi Universal Shield




Link software ini seperti biasa boleh didapati di www.google.com


rajin-rajinkan diri untuk meng"google"....selamat ber"google"....hehehe

Do Not Use Anonymous Proxy sites

Though Proxy sites provide us with some way to browse the blocked web pages but not all proxy sites are safe and good to use. In this edition of Tip of the Week section, I share the adverse effects of using the Anonymous Proxy sites.




A Proxy Site is a web page that allows you to view and surf your web addresses even if they are blocked by the network administrator. There may be 2 kinds of Proxies available:
1. Proxy websites where you enter your blocked web page to be able to view through it.
2. Proxy addresses which need to be added in the browser proxy settings that can open more number of pages for you.
Though it is easier to use the proxy sites, it is unsafe to do so because of the following reasons:
• Since you allow your secret info to pass through the proxy sites, it is never safe to use them.
• These sites can capture all the info transmitting through their servers which can be very risky if you are using the sites for your banking needs etc.
• Proxy sites can infect your system with malwares and keyloggers and if your system is not safe enough to catch these, your complete information would be lost.
Thus it is better to be safe and not use the proxy sites rather than regret later for your hacked account or passwords.

Keylogger

    Keylogger ini adalah program atau perkakas yang dapat merakam aktiviti yang      

    dilakukan oleh keyboard.

         
Ia juga terbahagi kepada dua jenis :

 1.Keylogging software

2.Keylogging hardware device



 Terdapat lima jenis keylogger

1.hipervisor-based

2.Kenel-based

3.APIs-based

4.Formgrabber-based

5.Packet analyzer

 Experimen yang aku jalankan kali ini menggunakan software

 Revealer Keylogger Free Edition


aku rasa-rasa la software ni berlandaskan APIs-based tapi
aku tak berapa pasti, Kalau-kalau rajin tolong googlekan....



link untuk download software ini adalah : www.google.com
rajin-rajin la google sendiri.. hehehe...

Tuesday, January 18, 2011

What is a SSL that was used in google search engine??



Features: SSL Search
With Google search over SSL, you can have an end-to-end encrypted search solution between your computer and Google. This secured channel helps protect your search terms and your search results pages from being intercepted by a third party. This provides you with a more secure and private search experience.
To use search over SSL, visit https://encrypted.google.com New window icon each time you perform a search. Note that only Google web search is available over SSL, so other search products like Google Images and Google Maps are not currently available over SSL. When you're searching over SSL, these properties may not appear in the left panel.

What is SSL?

SSL (Secure Sockets Layer) is a protocol that helps provide secure Internet communications for services like web browsing, e-mail, instant messaging, and other data transfers. When you search over SSL, your search queries and search traffic are encrypted so they can't be read by any intermediary party such as employers and internet service providers (ISPs).

What can I expect from search over SSL?

Here's how searching over SSL is different from regular Google search:
  • SSL encrypts the communication channel between Google and a searcher's computer. When search traffic is encrypted, it can't be read by third parties trying to access the connection between a searcher's computer and Google's servers. Note that the SSL protocol does have some limitations — more details are below.
  • As another layer of privacy, SSL search turns off a browser's referrers New window icon. Web browsers typically turn off referrers when going from HTTPS to HTTP mode to provide extra privacy. By clicking on a search result that takes you to an HTTP site, you could disable any customizations that the website provides based on the referrer information.
  • At this time, search over SSL is supported only on Google web search. We will continue to work to support other products like Images and Maps. All features that are not supported have been removed from the left panel and the row of links at the top. You'll continue to see integrated results like images and maps, and clicking those results will take you out of encrypted search mode.
  • Your Google experience using SSL search might be slightly slower than you're used to because your computer needs to first establish a secure connection with Google.
Note that SSL search does not reduce the data that Google receives and logs when you search, or change the listing of these terms in your Web History New window icon.
Information for school network administrators
  • How will SSL search affect our content filtering services?

    When students search using https://encrypted.google.com, their searches will bypass any content filters that are in place on your network. If this is problematic for your school, you can block https://encrypted.google.com. When students continue to search using http://www.google.com, your content filtering will work as it always has in the past.
  • If your students try searching via the https://www.google.com homepage, they will be redirected to https://encrypted.google.com and will not be able to perform encrypted searches to bypass content filters.
  • If I block access to https://www.encrypted.google.com, will I block access to all of Google's authenticated services (like Google Apps for Education)?

    No; logins for Google Apps for Education New window icon and our other authenticated services are currently hosted at https://www.google.com. As long as you allow access to https://www.google.com, your organization should still be able to access all of our other services.

Does SSL provide complete security?

While SSL helps prevent intermediary parties, such as ISPs, from knowing the exact search that you typed, they could still know which websites you visit once you click on the search results. For example, when you search over SSL for [ flowers ], Google encrypts the query "flowers" and the results that Google returns. But when you click on a search result, including results like images and maps, you could be exiting the encrypted mode if the destination link is not on https://. If your computer is infected with malware or a keylogger, a third party might still be able to see the queries that you typed. We recommend that everyone learns how to prevent and remove malware.
Remember that only Google web search supports search over SSL, so searching Google Images, for example, will not be encrypted.
Technical discussion of SSL protocol-level limitations
While SSL is a clear privacy and security benefit, we are aware of some technical limitations to SSL at the protocol level that are not specific to Google's implementation:
  • A determined, skilled malicious party could potentially interpose himself into the network traffic and present a spoofed certificate to the user. In many cases, this will result in a certificate warning to the user. If you see a certificate warning, the protection may not hold.
  • An adversary with the ability to install root certificates on the machine could potentially interpose himself into the network traffic without any warnings appearing.
  • A highly capable source may be in a position to sign certificates with a standard, pre-installed certificate authority (CA), which again would allow intercept without any apparent warnings to the user.
  • Even if all web searching occurs over SSL, a passive traffic listener may still be able to observe DNS look-ups.

How can I confirm whether I'm on a secure connection?

Check to see that the URL you're on starts with https:// instead of http://. Most browsers provide a visual confirmation (such as an icon of a lock) in the address bar or in the status bar at the bottom of the page. On Google SSL search, you'll also see a special Google SSL logo with a lock icon. In addition to this logo, be sure to also check the https:// text in the address bar and any browser lock icons.
When you perform a search on https://encrypted.google.com New window icon, you might see a warning if a page has some non-secure components: depending on your browser settings, you might see the lock icon turn into a warning sign, a pop-up message, or some other form of alert. This issue is often referred to as a "mixed mode error."
Since this is a beta feature, there might be some rare cases in search over SSL that generate a mixed mode error.

Friday, January 14, 2011

Never reuse the Same Password

We happen to sign up for so many services and accounts that it becomes a problem to remember all the passwords for each of them. To avoid this problem most people wish to keep the same password for all their accounts.

I advises you to never keep the same password for all your online accounts and services. Reusing passwords (using the same password for more than one system) is similar to carrying one key that unlocks your house, your car, your office and your safety deposit box. One lost key could let a thief unlock all the doors. Always choose different passwords for your home computer, office computer, different e-mail accounts, bank accounts etc.
Keep in mind that – if you reuse passwords, your password is only as secure as the least secure system on which you have used it. Therefore it is a better and safer habit to keep different passwords for different accounts.

Double Check Email Recipient before Sending

Emails hold the major part in day to day communication for everyone whether it’s the office people or the home users. Sometimes emails also carry confidential information like the important data or the login credentials. Thus we should take extra care while handling these.
I advise all the email users to ensure that you double check the recipient’s address before sending the email otherwise you may end up revealing not only confidential information but also some personal details to an unauthorized person.
Emails, if sent to some unintended recipient may not only reveal your personal information but also risk of getting your account hacked. Since those emails come directly in the inbox (not in the spam) there are full chances of information leak.
So it’s better to check the recipients thoroughly before sending after all the confidential information should stay confidential.

How to Make Passwords Difficult to Guess

We will learn few tips on how to make Passwords difficult to guess.
In our day to day lives we need to store our information and thus we require passwords for that, but here is how to make your passwords strong and difficult to guess.
Tips:
• Ensure that your password is at least 8 characters long and is a combination of Lower Case, Upper Case, Numeric Characters and Special characters (i.e. *,!,@,& etc ).
• Do not use:
             o Common elements, which are easy to guess or crack using cracking tools
               (i.e., words,names, sports, movies and shows, groups, songs etc)
             o Elements relating to your personal life, which could be found out with a bit of
                social engineering (i.e. graduation year, birthdays, phone numbers etc)
             o Keyboard patterns (i.e. 1q2w3e4r), which are very common and easy to crack
             o Repeating patterns (i.e. ah*fjDS1, ah*fJDS2, etc), because once the pattern is
               cracked, it is easy to get the complete password.
If you keep these tips in mind then you can be sure of one thing, your password is safe!

Thursday, January 6, 2011

Windows cannot find regsvr.exe

Steps to Remove regsvr.exe Virus

 

There are so many types of computer viruses in this world that removing them and finding a specific solution for each of them is a big ask. One such virus that screwed me is regsvr.exe classified as a W32.Imaut worm.
It has become a daily routine that when I plug my pen drive in my college systems (full of all kinds of viruses), it gets infected by the viruses instantly. Though the Anti Virus I use (Symantec) successfully detects and remove them but I feel that I should discuss the steps to remove regsvr.exe virus.
What the regsvr.exe virus does?
•    This worm creates folders and a registry entry to enable its automatic execution at every system startup.
•    This worm also creates a scheduled task to enable its automatic execution at a specified date and/or time.
•    It also creates Autorun.inf file for its auto execution.
Solution to fix the problem:
1.    If the task manager and registry editor is disabled then we need to enable them first. Read this.
" Enable the Registry Editor, Task Manager and Folder Options Disabled by Virus

 

Virus attack is common these days and we often come across the problems like Disabled Folder Options or like Task Manager and Regedit disabled by Administrator. These problems are nothing but virus activities. The virus has infected our system and stopping us from accessing these options.

Pressing keys Ctrl+Alt+Del opens up a dialog saying that “Task Manager has been disabled by your Administrator” whereas you are the Administrator yourself. It becomes very annoying when you think that you can fix this problem by going into the Registry Editor but it doesn’t show up. Even the Folder Options gets disabled.
This problem is generally caused by a virus named “Brontok” but don’t worry just use RRT (Remove Restrictions Tool) that can easily solve this problem. RRT is free and can successfully enable:
1.    Folder Options
11.    Regedit (Registry Editor)
111.    Task Manager
1V.    Show Hidden Files option
The tool will come more useful if you use it in Safe Mode.
Download RRT     "

2.    Delete the Autorun.inf file created by the virus. Read this to know how to do that.

           "Common sense says to delete this file but even that is not easy as it possesses system, hidden  
               and  read only attributes. So,
                  1.    First go to cmd, type “attrib X:\Autorun.inf –s –r –h” without quotes where X is your
                         drive name which is having the problem.
                11.    Now the file is visible and ready to delete.
              111.    After deleting the file, close the explorer and open it again or just give a reboot to the          
                     computer, your problem is fixed.
Well this is the best and easy fix available without using any software.

3.    Now type msconfig in the Run dialog and click on startup tab.
4.    Look for regsvr and uncheck any options, click OK.
5.    Now traverse to control panel -> scheduled tasks, and delete the At1 task that might be listed there.
6.    Type regedit in the Run dialog to open the registry editor.
7.    Click on Edit -> Find and search for regsvr.exe
8.    Just delete all the occurrences of regsvr.exe virus (do not confuse it with regsvr32.exe which is not a virus).
9.    Navigate to entry HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Windows NT\CurrentVersion\Winlogon and modify the entry Shell = “Explorer.exe regsvr.exe” to delete the regsvr.exe from it.

10.    Now to actually delete the virus from the system go to system32 folder and delete the regsvr.exe virus file from there (you will need to uncheck the option of “Hide Protected System Files and Folders” in Folder Options to view the virus file).
Reboot the system for changes to take place.    "

 

 Windows cannot find regsvr.exe


 This is a common error message that comes at the computer startup and is caused by the none other than regsvr.exe virus.

The problem was reported by one of our readers and the solution to fix this problem is very easy.
Steps to solve the problem:
1.    We have already discussed how to remove regsvr.exe virus in the past.
2.    After you have done that then just make sure to perform the following thing to remove this error message.
3.    Open registry editor (type regedit in the run box), Navigate to entry HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Windows NT\CurrentVersion\Winlogon
4.    See the entry Shell = “Explorer.exe regsvr.exe” on the right side.
5.    Modify this key and delete the regsvr.exe from it. The value of the key now should be only “Explorer.exe”.

 The error message will not come again.

Tuesday, January 4, 2011

Turn your Computer into WiFi Hot Spot with Virtual Router

If you need to share your computer’s wireless internet with other systems then it can be done easily by converting it into a WiFi hot spot using the in-built wifi feature.

What you need to do is just download and install this tool called Virtual Router which turns any Windows 7 or Windows 2008 R2 Computer into a Wifi Hot Spot using Windows 7’s Wireless Hosted Network (Virtual Wifi) technology.
This is a great tool as it can solve many problems regarding the sharing of the wireless service. You can pair any device with your Windows 7 system without having to install any new hardware. Just use this tool, create a new wireless network, set it’s password and you should be good to pair devices with your computer wifi hot spot.
The tool has been coded in C# and is free to use. The tool is small in size and can be downloaded from the link below.
Download Virtual Router

Steps to Remove csrcs.exe or csrsc.exe Virus

This was the error message faced by one of our readers that when he boots the PC up, the CSRCS.exe error message comes up on the screen.
csrsc.exe is a process which is registered as W32.Spybot.CF Virus. DO NOT confuse it with csrss.exe which is an important file used by Windows. The attackers of this virus can access our computer and gain access to some important data remotely.
Steps to remove this virus:
1.    Scan the system with a good and updated Anti Virus.
2.    Open Task Manager, locate this exe (csrcs.exe or csrsc.exe but not csrss.exe), and kill the process.
3.    Now type msconfig in the Run box, and then go to startup tab.
4.    Locate this exe file, if any, and then remove it from there as well.
5.    Now search the file in the C: drive.
6.    Permanently delete the file (csrcs.exe or csrsc.exe only) from the computer.
7.    Reboot the PC for changes to take place.
UPDATE
After doing the above steps, you need to clean the registry as well.
  1. Navigate to HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\WindowsNT\CurrentVersion\Winlogon\
  2. On the right side, there is a key named “Shell”, it may be having a value “explorer.exe csrcs.exe”. Just modify it to delete the csrcs.exe from it (not explorer.exe). Restart the computer
The virus should have gone.

Solution to remove Write Protection from USB Pen Drive

This seems to be the problem of most of us these days and some of our readers who wanted to know the methods how they can remove the Write Protected error from their USB drives like Pen Drives and memory cards.

What is Write Protected error and why it happens?
In the Write Protected error, we can’t write or copy any data in our flash drives and even can’t format the drive.
There are many reasons that cause this problem, let’s see solutions of them.
Solutions:
•    First of all try to locate a small switch (if any, that you may have not noticed) at some place on the drive or memory card reader. This is the prime reason for this error. If there is one, switch it to the other side to turn the protection off.
•    Yes I know this problem is also occurring these days without this switch but not to worry. Just download this helpful software from here and run it to execute a “low-level format” on the drive. This software is quite handy and may take few attempts to actually remove the error.
•    The problem can also be caused by some virus activity so just get it scanned by some updated good anti virus which may solve your problem.
•    BUT if none of the methods listed above solves your problem then your pen drive might have gone corrupted, so just get it replaced.
Hope any of the methods listed above solves your problem.
Update 1:
After the low level format, you may need to “Partition the drive“. Dont worry, partitioning a pen drive means allocating it its File System and Cluster Size that was lost after the Low Level Format.
For that:
  1. Run diskmgmt.msc in Run.
  2. In the disk management window, select the pen drive, right click on it and click on Format.
  3. Now choose the File System and Allocation Unit Size and do not check the boxes below.

Click OK and the drive will be reusable after this.
Update 2 (Better Solution):
Follow the steps in this post and just put the value 0 (zero) in step 5.
This will surely solve your problem now.
Update 3 (Solution Working):
Thanks to one of our readers Jim, who let us know about the tool called Neo 9, using which we can easily this write protection problem.
For transcend drive users, try the tool at this link, it has been found to work.

Manage Processes on Remote Computer with Remote Process Explorer

Windows default Task Manager provides capabilities to manage the processes on the local system but it cannot be used to manage the processes of the computer connected to a network.
So if you ever wanted to manage and control the processes running in the background of a remote computer then this can be done easily with the free and easy tool called Remote Process Explorer.
Remote Process Explorer is a powerful tool for managing, monitoring and analyzing processes on a local or remote computer. It can also be used to run a new process or kill the existing ones or just change their priorities.
It also shows how much CPU usage is consumed by a process and also lists the hidden processes which default Task Manager cannot do.

download link:
http://lizardsystems.com/downloads/rpexplorer_setup.exe

Monday, January 3, 2011

Make Firefox Run Faster

Though Firefox is no doubt a great web browser but the only thing that concerns many people is that it is bit slower to open a webpage. However here is an easy trick with which you can make Firefox run faster. We have already discussed how to make IE8 faster.
The trick would apply better to all the broadband users and to see the difference you got to do this trick.

Trick to make Firefox Faster:
1.    Open Firefox, type about:config in the url and hit enter.
2.    It may show a certificate message, click the button at bottom to enter the settings page (do not worry).

3.    You would see many entries there, navigate to locate the following three
       network.http.pipelining
       network.http.proxy.pipelining
       network.http.pipelining.maxrequests


4.    Double click the following entries to make them “true”.
       network.http.pipelining
       network.http.proxy.pipelining


Doing this allows browser to make more request to a web page at a time instead of usual 1.
5.    Now modify value of “network.http.pipelining.maxrequests” to 30
       This is the number that signifies how many requests the browser should make.

6.    Now create a key by right clicking any empty area and then New-> Integer. Name the key as     
       nglayout.initialpaint.delay and set its value to 0.
This key will stop the browser to wait before acting on the information it receives.

7.    Restart Firefox.

    So how much speed improvement you noticed?