Thursday, June 19, 2008

Closing Open Holes (Port) By Trojan

With the spread of Hackers and Hacking incidents, the time has come, when not only system administrators of servers of big companies, but also people who connect to the Internet by dialing up into their ISP, have to worry about securing their system. It really does not make much difference whether you have a static IP or a dynamic one, if your system is connected to the Internet, then there is every chance of it being attacked.This manual is aimed at discussing methods of system security analysis and will shed light on as to how to secure your standalone (also a system connected to a LAN) system.Open Ports: A Threat to Security?In the Netstat Tutorial we had discussed how the netstat -a command showed the list of open ports on your system. Well, anyhow, before I move on, I would like to quickly...

Port List Opened By Trojan Horse

2 Death 21 Blade Runner;Back Construction;Doly Trojan;Fore;FTP Bmail; FTP Trojan;WebEx;Senna Spy FTP Server;Larva;MBT;Invisible FTP;WinCrash 23 Tiny Telnet Server;Truva Atl25 Aji;Antigen;Email Password Sender;Gip;Kuang2;Magic Horse; Moscow email;Terminator;Stealth31 Master Paradise;Hackers Paradise;Agent31 41 Deep Throat 48 DRAT 79 Firehotcker 80 Back End;Executor;Hooker;Intruzzo;RingZero99 Hidden Port 110 ProMail Trojan 113 Invisible Ident Deamon;Kazimas121 BO jammerkillahV 123 Net Controller 146 Infector 456 Hackers Paradise 500 Socket23 531 Rasmin 555 Phase0;ini-killer;NetAdmin;Stealth Spy606 Secret Service 666 Attack FTP;Back Construction;NokNok;Satanz Backdoor;ServeU;Cain&Abel667 SniperNet 777 Aim Spy;Legio789 iCkiller 808 WinHole 911 Dark Shadow 999 Deep Throat;WinSatan1000...

Wednesday, June 18, 2008

Control User Logins by Hacking the Registry

Make better use of the XP login screen.If there is more than one user account on your system, or if you've set up XP to require logins, you'll have to log in to XP before you can begin to use it. But you needn't stay with the default XP login rules; you can use a single Registry key to customize how you log in. For example, you can display custom text before login, and you can remind anyone with an account on the PC to change their password a certain number of days prior to the password's expiration.To control logon options, run the Registry Editor and go to the HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Windows NT\CurrentVersion\Winlogon subkey, which contains a variety of logon settings (as well as some settings not having to do directly with logons). Following are the most important values you...

Panduan Merawat Komputer

Langkah I: Kenali sistem AndaLangkah pencegahan pertama yang perlu Anda lakukan adalah membuat inventori sistem komputer. Informasi tersebut diperlukan saat Anda hendak memperbaiki atau menyervis komputer.Mulailah dengan mencatat nomor seri dan nomor model. Catatan ini berguna bagi manufaktur untuk menentukan jenis komponen yang ada dalam sistem Anda. Bila Anda telah menambahkan suatu komponen, sebutkan model dan nomor versinya.Anda juga mesti mengenal konfigurasi sistem secara detail. Pada komputer-komputer berbasis Windows, hal ini berarti mengopi dan mencetak beberapa file sistem penting yang akan berguna ketika timbul masalah dan Anda memerlukan bantuan seorang teknisi.Cara yang paling sederhana untuk mengamankan file konfigurasi sistem adalah dengan menjalankan program Sysedit. Kalau...

Wednesday, June 4, 2008

How To Install Program in Backtrack

Backtrack base is Slackware'sSlackware packaging system uses ordinary compressed tar files. The system allows you to keep track of the packages you install, making it easy to upgrade or remove them down the road. Slackware provides an interactive program for managing your packages. You can use pkgtool to handle adding and removing packages from your system.You can also use these command line utilities to work with packages. Below is a brief overview of the commands, however, you should always consult the man pages before using them.installpkg By typing installpkg [packagename].tgz you can install packages on your system. There are a few command line options as well: -warn Generates a report of what would happen if you installed the package and sends the report to standard...

Pages 381234 »

 

Subscribe in Bloglines Msn bot last visit powered by MyPagerank.Net Yahoo bot last visit powered by MyPagerank.Net
I heart FeedBurner downtime checker The Ubuntu Counter Project - user number # 31290

 
Twitter Delicious Facebook Digg Stumbleupon Favorites More

 
Powered by TadPole
FOG FLAMES