Posts

Showing posts from 2013

Games - Download websites

http://www.techmynd.com

CV vs Resume - Differences / When to use which one

source: http://theundercoverrecruiter.com/cv-vs-resume-difference-and-when-use-which/ Ever wondered why a Brit applies with a CV and an American with a resume? And why does an Aussie apply with both? There are a few differences between the two types of application documents and this article will straighten out your queries as well as tell you where in the world you are likely to use which document. Let me kick off the bonanza by introducing the contender in the blue corner… A CV (Curriculum Vitæ , which means course of life in Latin) is an in-depth document that can be laid out over two or more pages and it contains a high level of detail about your achievements, a great deal more than just a career biography. The CV covers your education as well as any other accomplishments like publications, awards, honors etc. The document tends to be organized chronologically and should make it easy to get an overview of an individual’s full working career. A CV is static and doesn’t change ...

Ophcrack - Windows password cracker / reset (Freeware)

What is ophcrack? Ophcrack is a free Windows password cracker based on rainbow tables. It is a very efficient implementation of rainbow tables done by the inventors of the method. It comes with a Graphical User Interface and runs on multiple platforms. Features: » Runs on Windows, Linux/Unix, Mac OS X, ... » Cracks LM and NTLM hashes. » Free tables available for Windows XP and Vista/7. » Brute-force module for simple passwords. » Audit mode and CSV export. » Real-time graphs to analyze the passwords. » LiveCD available to simplify the cracking. » Dumps and loads hashes from encrypted SAM recovered from a Windows partition. » Free and open source software (GPL). http://ophcrack.sourceforge.net/  

fsck (for "file system check" in linux) - equivalent to chkdsk (checkdisk in windows)

 fsck (for "file system check" in linux) A system administrator can also run fsck manually if they believe there is a problem with the file system. Because running fsck to repair a file system which is mounted for read/write operations can potentially cause severe data corruption/loss, the file system is normally checked while unmounted, mounted read-only, or with the system in a special maintenance mode that limits the risk of such damage. A journaling file system is designed such that tools such as fsck do not need to be run after unclean shutdown (i.e. crash). The UFS2 Filesystem in FreeBSD has a background fsck, so it is usually not necessary to wait for fsck to finish before accessing the disk. The modern and faster ZFS in FreeBSD, FreeNAS and PC-BSD has no "fsck" repair tool; instead, it has a repair tool called "scrub" which examines and repairs Silent Corruption and other problems. Additionally ZFS uses copy-on-write, intelligent data scrubbin...

WDS Bridging - Wireless Routers/Acces Points

Image
Notes: - IP Address of Both Wire less Routers/ APs must be in the same address class. - If WDS is configured be tween two wireless routers, then both might have to be different SSIDs , otherwise they might not work. (this point needs to be confirm more from other resources too). - for same SSID (called roaming) , there should be a combination of one wireless router and one Access point.   Primary - Wireless LAN Router/AP configuration Secondary - Wireless LAN Router/AP configuration - which needs to be WDS bridged with the Primary Wireless Router/AP. 

Configuring Samba File (smb.conf) for sharing linux folders into windows KVM

Default Path of Samaba in Redhat Enterprise linux 6: /etc/samba/ Default Samba file (smb.conf) contains the following in my linux Machine: [global]     ## OPENCLIENT GLOBAL KVM CONFIG ##         workgroup = LINUXKVM         server string = Samba Server Version %v         interfaces = lo virbr0         log file = /var/log/samba/log.%m         max log size = 50         security = share         load printers = yes         cups options = raw [shared_ammar_rasheed]     ## OPENCLIENT SHARE KVM CONFIG ##         comment = Temporary file space         path = /home/ammar_rasheed       ...

Mount KVM Virtual Drive to a folder in Redhat Linux

Default Path for KVM Images (in Redhat Enterprise linux 6): /var/lib/libvirt/images/<Kvm_filename.qcow2> Command Format: guestmount --rw -a <source image path> -i <destination image path> Example: guestmount --rw -a /var/lib/libvirt/images/Windows_7_-KVM.qcow2 -i /media/Ammar/mount/

Finding All Hosts On the LAN - Windows/linux

Finding All Hosts On the LAN From Linux / Windows Workstation Linux: @ Root Prompt type: for ip in $(seq 1 254); do ping -c 1 192.168.1.$ip>/dev/null; [ $? -eq 0 ] && echo "192.168.1.$ip UP" || : ; done Output: 192.168.1.1 UP 192.168.1.1 UP 192.168.1.2 UP 192.168.1.5 UP ...... ... .. 192.168.1.254 UP Windows:   c:> for /L %I in (1,1,254) DO ping -w 30 -n1 192.168.1.%I | find "Reply" or FOR /L %i IN (1,1,254) DO ping --a --n 1 10.0.1.%i | FIND /I "Reply">> c:\lanipaddresses.txt    

Wireless LAN Signal Strength Analysis Commands

************** For Windows: ************** netsh wlan show networks mode=ssid and netsh wlan show networks mode=bssid ************* For Linux: ************* To display WiFi signal strength in the terminal, you can run this command: watch -n 1 "awk 'NR==3 {print \"WiFi Signal Strength = \" \$3 \"00 \"}''' /proc/net/wireless" watch -n 1 cat /proc/net/wireless iwconfig "Interface-Name-Here"          example:         iwconfig wlan0         or         iwconfig wlan1         or         watch -n 1 iwconfig wlan1    [for continuos observation of the link] Wifi Signal Strength(Link Quality) in Percentage: while [ 1 ];do clear;echo "WiFi Signal Strength (Link Quality)";a=$(/sbin/iwconfig wlan1 | grep "Link Quality" | awk '{print $2}' ...

How to Remove New Folder.exe Virus

How to Remove New Folder.exe Virus from Computer : Step by Step Guide Here is the step by step guide to remove the New Folder.exe virus. Step 1: Press “Ctrl” , “Shift” and “Esc” keys simultaneously to open the Task Manager.  Step 2: Look for “Processes” tab in task manager and click on it to see running process.  Step 3: Select “new folder.exe” from the list of the processes and click “End Process” button.  Step 4: Repeat Step 3 for “srvidd20.exe,” “iddono20.exe” and “editor.exe” processes.  Step 5: Now close the task manager.  Step 6: Now go to the start menu, type cmd in run and click enter. You will see a command line window.  Step 7: Type “regsvr32 /u shelliddono.dll” and hit enter. Now type ”regsvr32 /u libedit.dll” and hit enter to unregister the DDL.  Step 8: Close the command line window.  Step 9: Now go to the start menu and type “srv0104.ids” in search box and click enter.  Step 10: Delete all the listed search results.  Ste...

Quotes / Golden Words

"If at first the idea is not absurd, then there is no hope for it." - Albert Einstein "Thousands of geniuses live and die undiscovered, either by themselves or by others." - Mark Twain  Failure is simply the opportunity to begin again, this time more intelligently. Henry Ford

Online Teaching/Instructor Job Finding

AdmissionsConsultants Type of Job: Admissions Based in Vienna, VA, AdmissionConsultants hires candidates with admissions committee experience and good interpersonal skills as consultants for its work at home jobs. Aim-for-A Tutoring Type of Job: Online Tutoring Online tutors teach a variety of subjects, including math, science, and English, as well as test preparations for GED, PSAT, SAT, GRE, GMAT and AP for students from around the world who range in age from elementary school to college. Teaching experience and a college degree in subject taught are required. See more test prep and scoring jobs . American Public University System Type of Job: Online Adjunct Faculty Encompassing American Public University (APU) and American Military University (AMU), this online higher education institution hires online adjunct faculty members as well as a few administrative positions as work at home jobs. Master's degree in subject matter is required. Experience ...

Submarine cable Map 2013

http://submarine-cable-map-2013.telegeography.com/

Hack Emails Password using BackTrack 5 (Man in the middle Attack)

Quick way to hack SSL password Requirements: 1. One Laptop Install BT-5 2.Working Wireless Lan Card and connected to any hotspot 3. SSLStrip installted 4. Etthercap installed 5.urlsniffer installed 6. aprspoof installed 7. Basic knowledge of linux and network Note: If you will try it using BackTrack-5 all will come pre-installed Be aware —you can only sniff email addresses and passwords on the same LAN, which means not on a remote computer outside the network. Step 1: In the first step we have to make sure that we are connected to a Wifi network and scan the available online node by using any network scanning software Step 2: One we know find the victim run this command and keep it running on the shell. This command will spoof the ARP request towards your PC arpspoof -i wlan0 -t 192.168.2.149 192.168.2.1 Explanation: aprspoof -i Network interface card IP-OF-VICTIM ROUTER-IP-ADDRESS Where -i switch is to define the interface in my case I used wireless so its ...

Installation of PVDM cards in PVDM slots in Cisco 2851

Image

Qemu - Stuff in GNS-3

Login Details: First Login: id: root pass: root 2nd Login su <enter> password: root Assigning IP Address and Default Gateway Configure IP For Qemu : root@box:$ Ifconfig eth0 192.168.1.11 netmask 255.255.255.0 Configure GW For Qemu : root@box:$ Route add default gw 192.168.1.1 eth0 How to keep QEMU (Microcore) settings across reboots in GNS3 After you have edited settings in /opt/bootlocal.sh   and saved them you have to run /usr/bin/filetool.sh -b to ammend the image appropriately! Basic network config would be something like: ifconfig eth0 x.x.x.1 netmask 255.255.255.0 up route add default gw x.x.x.254 Delete a default gateway: route delete default gw 10.0.0.1 Also check this link for more details: http://forum.gns3.net/topic1657-30.html  

Cisco Access Points - FAQs

Q. How many clients can associate to the AP? A. The AP has the physical capacity to handle 2048 MAC addresses, but, because the AP is a shared medium and acts as a wireless hub, the performance of each user decreases as the number of users increases on an individual AP. Ideally, not more than 24 clients can associate with the AP because the throughput of the AP is reduced with each client that associates to the AP. Q. How many service set identifiers (SSIDs) can you have per VLAN? A. You can have only one SSID per VLAN. The use of multiple SSIDs over a single VLAN is not supported with Aironet APs. Q. How many wireless IP telephony handsets are recommended per AP? A. IP telephony network sizing is essential to ensure that adequate bandwidth and resources are available to carry mission-critical voice traffic. In addition to the usual IP telephony design guidelines for sizing components, such as PSTN gateway ports, transcoders, WAN bandwidth, and so forth, also ...

Set up an Android Emulator on your PC

Image
today I am going to tell you how to set up an android emulator on your pc. If you are really interested in learning Android and don’t want to buy a compatible phone so, for that we have a solution fo this problem i.e. to setup an android emulator on your pc. Inside the emulator you will get the full environment of Android. Download the Required material from here:-     JDK (java development kit)  http://www.oracle.com/technetwork/java/javase/downloads/jdk7u9-downloads-1859576.html     Android SDK  ( http://developer.android.com/sdk/index.html ) Steps:- Install the Java development Kit in your PC Then Install Android SDK . Now open the Android SDK. Now check mark  the version of Android you want to install and click on install package button. Accept all packages for installation. After installation of packages open the Avd manager and click on new option Follow the below scr...

Zabbix - Network Monitoring Tool (Open Source)

Zabbix is the ultimate open source availability and performance monitoring solution. Zabbix offers advanced monitoring, alerting, and visualization features today which are missing in other monitoring systems, even some of the best commercial ones. Below is a short list of features available in Zabbix: auto-discovery of servers and network devices low-level discovery distributed monitoring with centralized web administration support for both polling and trapping mechanisms server software for Linux, Solaris, HP-UX, AIX, FreeBSD, OpenBSD, OS X native high performance agents (client software for Linux, Solaris, HP-UX, AIX, FreeBSD, OpenBSD, OS X, Tru64/OSF1, Windows NT4.0, Windows 2000, Windows 2003, Windows XP, Windows Vista) agent-less monitoring secure user authentication flexible user permissions web-based interface flexible e-mail notification of predefined events high-level (business) view of monitored resources audit log Screenshots: http://www.zabbix.co...