www.download-crack-serial.com
SIMPLE VIRUS

Tools – Macro – Visual Basic Editor - This DocumentTulis :

Sub FileSaveAs() ----------------check at Tools – Macro – Macro – choose word commandMsgBox “Padan Muka”
End Sub

To Protect :Tools – Macro – Security – choose very high
lum upload lagi....nnt yer
** Notes nyer x siap lagi....nnt sy masukkan yer....
* 2 os yang berbeza (linux & windows)

* untuk security(kalo folder ada dalam linux)

1. rpm -q samba
*nak check ada samba @x
*install samba (cd,internet,server)

2. yum -y install samba
*download & install trus dari internet
*/sbin/ifconfic -> nak check ip pc
*wget http://10.1.0.11/fedora/pacakges/samba -3.0.26a-6.fc8.1386.rpm

3.edit samba configuration
*security=user
*workgroup=_____

4.create share folder [xyz]
*path=/xyz ->folder mana
*writeable=yes ->bole save/write
*browse dble=yes ->org bole browse

5.create folder to share
*ex:/xyz
* #mkdir /xyz
* #chmod 777/xyz

6.create Linux user account & samba account
* add user insep
* password insep
* smb password -a insep
linux command

go through this website -> http://www.ss64.com/bash/
SSH
*more on remote control computer
*bole control server dr jarak jauh

FTP
*file transfer protocol
*tranfer file
*bole ftp ke pc org lain/hos/server

Web
*jadikan web sebagai server dari jarak jauh
*kena install apachee

---->> dalam linux kena "up"kan dulu dengan menggunakan command

/sbin/service sshd start - ssh
/sbin/service ftpd start - ftp
/sbin/service httpd start - web

---->> check status
*run
*stop
  • linux save budjet sebab most of the application in linux are free
  • not less 2% virus only will effect linux
  • open source code
  • acting as server and can acting as client
  • linux is stabil than microsoft
  • linux is sesuai as a server

1. What u need to have?
- at least 2 network card
- 2 cross cable
- install fedora 8 (for configuration)

2. What u need to do?
- set IP forwarding
- set IP
- routing (buat routing + gw)

* Linux router guna command line untuk configuration

1. nak upkan network card
service network restart
/etc/init.d/network restart
eth0 .................................[/]
eth1 ................................ [/]

2. set ip
/sbin/ifconfig eth0 192.168.1.1 netmask 255.255.255.0 broadcast 192.168.1.255

3. set gateway
/sbin/route add-net 192.168.1.0 netmask 255.255.255.0 gw 192.168.1.255 dev eth0

4. set ip_forwarding
echo 1 > proc/sys/net/ipv4/ip_forward
(0 untuk stop) dan (1 untuk up)

5. tengok routing table
/sbin/ip route show

6. tengok ada routing @ x
/sbin/route -v

7. delete routing dalam routing table
/sbin/route del -net ............./sm

8. up network card one by one
/sbin/if up eth0
/sbin/if up eth1

** if pc <-> x bole nak ping:
- firewall pc x off
- anti virus x off
- ip_forwarding tiap kali x up
- firewall linux->ip table

6.
1.What is firewall
firewall control in/out bound(communication) network traffic

2.how its work?
it just have 2 activities. there are allow and deny

3.is it anti virus ? -not an anti virus
it is not an anti virus. it just have a rules that are controlling traffic that are allow or deny any network from other

4.What is proxy server proxy server bole jugak dikatakan sebagai orang tengah

5.What is application that can allow you to access any website
These site will allow you to access any block website. There are:

http://www.proxyblind.org/
http://www.kortaz.com/
http://www.a-bypass.com/
http://www.yourprox.com/
http://www.myspaceproxy1.com/
http://www.topproxy.com/
http://www.vtunnel.com/
http://www.offsurf.com/
http://www.antibloxx.com/
http://www.43proxies.com/

http://www.s67.net

http://www.cg7.info



proxy sometimes can be:

  • firewall

  • filtering

  • gateway

    Apabila terima respon, proxy akan copy content yang diminta oleh client pada dirinya sendiri dan satu keadaan lagi ianya akan hantar content tersebut kepada clientnya.

Ianya merupakan satu teknik yang digunakan untuk menceroboh website internet daripada
remote computer.
Sql injection
*Salau sql injection, ianya akan berlaku pada menu login untuk kita dapatkan username dan password

Remote SQL Injection
Ianya berlaku pada bahagian url @ address di mana kita akan "paste"kan injection pada text area url utk dapatkan username dan password
dimana:
username = plaintext
passwoord = hash (r7hy89p10) ::> yg x bole difahami
utk dptkan pswrd kita kena dapatkan md5 coder @ base64 coder
Ia merupakan satu teknik yang digunakan oleh attacker untuk hantar sebarang script pada web user. XSS biasanya berlaku pada aplikasi web. Script yang biasa digunakan oleh XSS ialah java script @ vb script. Biasanya XSS ini digunakan untuk mencuri cookies pada mana-mana website.

example:

XSS berlaku pada ->

RFI berlaku pada ->
Ways how to protect from sql injection

1. Kita gunakan if...else statement pada bahagian login
2. Escape from all single quote ('')

example:

Username : 1'or'1'='1
Password : 1'or'1'='1

$SqL="Select namapenyelia, tahap_penyelia, id_penyelia
from penyelia where username='$name' and password='$pass'

if($name="1'or'1'='1"){break;} ->mana-mana username yang ada "quote" kita reject

Tujuan if...else statement adalah untuk :

1.Check $name (variable) contain.
2.Reject kalau ada single quote.

Another way to protect your website:

1. Encrypt HTML files and hide source code
2. Disable content filters
3. Block website rippers
4. Customize HTML and add some effects

more info ->http://www.aerotags.com/products/tlp.php
SQL injection is a type of security exploit in which the attacker adds Structured Query Language (SQL) code to a Web form input box to gain access to resources or make changes to data. An SQL query is a request for some action to be performed on a database. Typically, on a Web form for user authentication, when a user enters their name and password into the text boxes provided for them, those values are inserted into a SELECT query. If the values entered are found as expected, the user is allowed access; if they aren't found, access is denied. However, most Web forms have no mechanisms in place to block input other than names and passwords. Unless such precautions are taken, an attacker can use the input boxes to send their own request to the database, which could allow them to download the entire database or interact with it in other illicit ways.
1' or '1' = '1

By using this magic quote...we easily can hack many website that are having low security
cuti 4 ari...nak balik kampung...bestnyer...nnt next week aku edit dis page k...
Definiton:
Is a program that monitors and analyzes network traffic, detecting bottlenecks and problems. Using this information, a network manager can keep traffic flowing efficiently. A sniffer can also be used legitimately or illegitimately to capture data being transmitted on a network. A network router reads every packet of data passed to it, determining whether it is intended for a destination within the router's own network or whether it should be passed further along the Internet. A router with a sniffer, however, may be able to read the data in the packet as well as the source and destination addresses. Sniffers are often used on academic networks to prevent traffic bottlenecks caused by file-sharing applications. The term "sniffer" is occasionally used for a program that analyzes data other than network traffic. For example, a database could be analyzed for certain kinds of duplication.
  • IGRP (Interior Gateway Routing Protocol)

Interior Gateway Routing Protocol) A proprietary routing protocol from Cisco that was developed in 1988 to overcome the shortcomings of RIP. IGRP takes bandwidth, latency, reliability and current traffic load into consideration. It is typically used within an autonomous system, such as an Internet domain. IGRP was superseded by Enhanced IGRP (EIGRP), which provides enhancements such as the ability to detect a loop in the network.

more info --> http://www.answers.com/

  • OSPF (Open Shortest Path First)

OSPF (Open Shortest Path First) is a router protocol used within larger autonomous system networks in preference to the Routing Information Protocol (RIP), an older routing protocol that is installed in many of today's corporate networks. Like RIP, OSPF is designated by the Internet Engineering Task Force (IETF) as one of several Interior Gateway Protocols (IGPs).

more info --> http://searchtelecom.techtarget.com/

  • BGP (The Border Gateway Protocol)

The Border Gateway Protocol (BGP) is the core routing protocol of the Internet. It works by maintaining a table of IP networks or 'prefixes' which designate network reachability among autonomous systems (AS). It is described as a path vector protocol. BGP does not use traditional IGP metrics, but makes routing decisions based on path, network policies and/or rulesets.

more info --> http://www.answers.com/

  • EGP (Exterior Gateway Protocol)

Exterior Gateway Protocol (EGP) is a protocol for exchanging routing information between two neighbor gateway hosts (each with its own router) in a network of autonomous systems. EGP is commonly used between hosts on the Internet to exchange routing table information. The routing table contains a list of known routers, the addresses they can reach, and a cost metric associated with the path to each router so that the best available route is chosen. Each router polls its neighbor at intervals between 120 to 480 seconds and the neighbor responds by sending its complete routing table. EGP-2 is the latest version of EGP.

What is Network Cabling?

Cable is the medium through which information usually moves from one network device to another. There are several types of cable which are commonly used with LANs. In some cases, a network will utilize only one type of cable, other networks will use a variety of cable types. The type of cable chosen for a network is related to the network's topology, protocol, and size. Understanding the characteristics of different types of cable and how they relate to other aspects of a network is necessary for the development of a successful network.

4 UTP Cable:-

1. Unshielded Twisted Pair

Unshielded twisted pair (UTP) is the most popular and is generally the best option for school networks. The quality of UTP may vary from telephone-grade wire to extremely high-speed cable. The cable has four pairs of wires inside the jacket. Each pair is twisted with a different number of twists per inch to help eliminate interference from adjacent pairs and other electrical devices. The tighter the twisting, the higher the supported transmission rate and the greater the cost per foot.

2. Shielded Twisted Pair

Shielded twisted pair (STP) is suitable for environments with electrical interference; however, the extra shielding can make the cables quite bulky. Shielded twisted pair is often used on networks using Token Ring topology.

3. Coaxial Cable

Coaxial cabling has a single copper conductor at its center. A plastic layer provides insulation between the center conductor and a braided metal shield. The metal shield helps to block any outside interference from fluorescent lights, motors, and other computers.

4. Fiber Optic cable

Fiber optic cabling consists of a center glass core surrounded by several layers of protective materials. It transmits light rather than electronic signals eliminating the problem of electrical interference. This makes it ideal for certain environments that contain a large amount of electrical interference. It has also made it the standard for connecting networks between buildings, due to its immunity to the effects of moisture and lighting.Fiber optic cable has the ability to transmit signals over much longer distances than coaxial and twisted pair. It also has the capability to carry information at vastly greater speeds. This capacity broadens communication possibilities to include services such as video conferencing and interactive services. The cost of fiber optic cabling is comparable to copper cabling; however, it is more difficult to install and modify. 10BaseF refers to the specifications for fiber optic cable carrying Ethernet signals.

5. Wireless LANs

Not all networks are connected with cabling; some networks are wireless. Wireless LANs use high frequency radio signals, infrared light beams, or lasers to communicate between the workstations and the file server or hubs. Each workstation and file server on a wireless network has some sort of transceiver/antenna to send and receive the data. Information is relayed between transceivers as if they were physically connected. For longer distance, wireless communications can also take place through cellular telephone technology, microwave transmission, or by satellite.

RJ45

10:07 PM | 0 Comments

hari ni ktorg kena pasang cable ngan rj45...fuh...punyala susah nak buat...sampai sakit2 tangan....start dari kul 9 sampaila kul 1....tension jgkla...tp okla...class ktorg bkrjasama antara satu sama lain...and akhirnya dapat jgk bagi success n bole smbung kat network internet...alhamdulillah...thanks a lot to kak muni, kak fizah, kak ros and also all my dearest frendz atas pertolongan anda....cayang kt sume...


ni la dia Rj45....

~~ network security professional (batch 4) ~~
What You Need??
  • CAT 5 Cable - bulk Category 5, 5e or 6 cable
  • RJ45 Ends
  • Crimper for RJ45
  • Wire Cutters - to cut and strip the cable if necessary
  • Wire Stripper
  • Cable Tester
About the Cable:

You can find bulk supplies of the cable at many computer s
tores or most electrical or home centers. You want UTP (Unshielded Twisted Pair) Category 5 cable for basic 10/100 functionality. You need CAT 5e for gigabit (1000BaseT) operation and CAT 6 gives you a measure of future proofing. Bulk cable comes in many types, there are 2 basic categories, solid and braided cable. Braided cable tends to work better in "patch" applications for desktop use. It is more flexible and resiliant than solid cable and easier to work with, but really meant for shorter lengths. Solid cable is meant for longer runs in a fixed position. Plenum rated cable should/must be used whenever the cable travels through an air circulation space. For example, above a false celing or below a raised floor.

Here is what the internals of the cable look like:

Internal Cable Structure and Color Coding

Inside the cable, there are 8 color coded wires. These wires are twisted into 4 pairs of wires, each pair has a common color theme. One wire in the pair being a solid or primarily solid colored wire and the other being a primarily white wire with a colored stripe (Sometimes cable doesn't have any color on the striped cable, the only way to tell is to check which other wire it is twisted around). Examples of the naming schemes used are: Orange (alternatively Orange/White) for the solid colored wire and White/Orange for the striped cable. The twists are extremely important. They are there to counteract noise and interference. It is important to wire according to a standard to get proper performance from the cable. The TIA/EIA-568-A specifies two wiring standards for a 8-position modular connector such as RJ45. The two wiring standards, T568A and T568B vary only in the arrangement of the colored pairs. Tom writes to say "...sources suggest using T568A cabling since T568B is the AT&T standard, but the US Government specifies T568A since it matches USOC cabling for pairs 1 & 2, which allows it to work for 1/2 line phones...". Your choice might be determined by the need to match existing wiring, jacks or personal preference, but you should maintain consistancy. I've shown both below for straight through cabling and just T568B for cross over cabling.

About the RJ45 Ends:

The RJ45 end is a 8-position modular connector that looks like a large phone plug. There are a couple variations available. The primary variation you need to pay attention to is whether the connector is intended for braided or solid wire. For braided/stranded wires, the connector has contacts that actually pierce the wire. For solid wires, the connector has fingers which pierce the insulation and make contact with the wire by grasping it from both sides. The connector is the weak point in an ethernet cable, choosing the wrong one will often cause grief later. If you just walk into a computer store, it's nearly impossible to tell what type of connector it is.

Here is a diagram and pinout:

rj45 jack pinout
RJ45 Jack and Plug Pinout

Ethernet Cable Pinouts:

There are two basic cables. A straight through cable, which is used to connect to a hub or switch, and a cross over cable used to operate in a peer-to-peer fashion without a hub/switch. Some interfaces can cross and un-cross a cable automatically as needed, really quite nice.

Standard, Straight-Through Wiring (both ends are the same):

RJ45 Pin # Wire Color
(T568A)
Wire Diagram
(T568A)
10Base-T Signal
100Base-TX Signal
1000Base-T Signal
1 White/Green white/green Transmit+ BI_DA+
2 Green green Transmit- BI_DA-
3 White/Orange white/orange Receive+ BI_DB+
4 Blue blue Unused BI_DC+
5 White/Blue white/blue Unused BI_DC-
6 Orange orange Receive- BI_DB-
7 White/Brown white/brown Unused BI_DD+
8 Brown brown Unused BI_DD-

Straight-Through Cable Pinout for T568A

RJ45 Pin # Wire Color
(T568B)
Wire Diagram
(T568B)
10Base-T Signal
100Base-TX Signal
1000Base-T Signal
1 White/Orange white/orange Transmit+ BI_DA+
2 Orange orange Transmit- BI_DA-
3 White/Green white/green Receive+ BI_DB+
4 Blue blue Unused BI_DC+
5 White/Blue white/blue Unused BI_DC-
6 Green green Receive- BI_DB-
7 White/Brown white/brown Unused BI_DD+
8 Brown brown Unused BI_DD-

Straight-Through Cable Pinout for T568B

Cross Over Cable (T568B):

RJ45 Pin # (END 1) Wire Color Diagram End #1 RJ45 Pin # (END 2) Wire Color Diagram End #2
1White/Orangewhite/orange 1White/Greenwhite/green
2Orangeorange 2Greengreen
3White/Greenwhite/green 3White/Orangewhite/orange
4Blueblue 4White/Brownwhite/brown
5White/Bluewhite/blue 5Brownbrown
6Greengreen 6Orangeorange
7White/Brownwhite/brown 7Blueblue
8Brownbrown 8White/Bluewhite/blue

Cross Over Cable Pinouts

+Note: The cross over cable layout is suitable for 1000Base-T operation, all 4 pairs are crossed.

How to wire Ethernet Cables:

  1. Strip off about 2 inches of the cable sheath.
  2. Untwist the pairs - don't untwist them beyond what you have exposed, the more untwisted cable you have the worse the problems you can run into.
  3. Align the colored wires according to the diagrams above.
  4. Trim all the wires to the same length, about 1/2" to 3/4" left exposed from the sheath.
  5. Insert the wires into the RJ45 end - make sure each wire is fully inserted to the front of the RJ45 end and in the correct order. The sheath of the cable should extend into the RJ45 end by about 1/2" and will be held in place by the crimp.
  6. Crimp the RJ45 end with the crimper tool
  7. Verify the wires ended up the right order and that the wires extend to the front of the RJ45 end and make good contact with the metal contacts in the RJ45 end.
  8. Cut the cable to length - make sure it is more than long enough for your needs. Remember, an end to end connection should not extend more than 100m (~328ft). Try to keep cables short, the longer the cable becomes the more it may affect performance, usually noticable as a gradual decrease in speed and increase in latency.
  9. Repeat the above steps for the second RJ45 end.
  10. If a cable tester is available, use it to verify the proper connectivity of the cable.

That should be it, if your cable doesn't turn out, look closely at each end and see if you can find the problem. Usually a wire ended up in the wrong place or more commonly, one of the wires didn't extend to the front of the RJ45 connector and is making no, or poor contact. If you see a mistake or problem, cut the end off and start again.





What to do??

1. Set ip address
2. Set router
3. Buat routing rip (nak route ke mana??)

What we need to have ??

1. Cisco router
2. DCE cable
3. Console Cable
4. Straight Cable
~~~ Try dis address ~~~

http://www.trincoll.edu/depts/cpsc/cryptography/caesar.html


** notes
What is Router??
  • Device to connect 2 different network segment.
  • Also tentukan laluan untuk sampai ke destinasi( choose the best path)

=>Anologi: < router =" simpang"> < path =" jalan"> < host =" rumah">

How it's work??

  • Router extract packet yang diterima kepada destinasinya (dimana router tersebut akan sebarkan kepada tuan punya packet)
  • Akan pilih mana laluan terbaik bagi packet dan kemudian forward packet tersebut di sepanjang laluan yang telah dipilih.

Tugas-tugas Router??

  • Control plane (routing)
  • forward plane (forwadding)

~~~ routing --> router will learn which path is the best way

Important thing b4 configure router :

  • Topology network design
  • Configuration router (set ip & buat routing)

Router>enable
Router#config terminal
Enter configuration commands, one per line. End with CNTL/Z.

*********** Setup Hostname *************
Router(config)#hostname LAB_A


*********** Start Setup Serial 0/0 Interface with DCE connection *************

LAB_A(config)#interface Serial 0/0
LAB_A(config-if)#ip addr 10.2.2.1 255.255.255.0
LAB_A(config-if)#clockrate 64000
LAB_A(config-if)#no shutdown
LAB_A(config-if)#
00:08:29: %LINK-3-UPDOWN: Interface Serial0/0, changed state to up
00:08:30: %LINEPROTO-5-UPDOWN: Line protocol on Interface Serial0/0, changed state to up
LAB_A(config-if)#exit
LAB_A(config)#exit
LAB_A#

*********** End Setup Serial 0/0 Interface with DCE connection *************


*********** Check Interface *************

LAB_A#show interfaces summary

*********** Start Setup Fast Ethernet l 0/0 Interface *************

LAB_A#config terminal
Enter configuration commands, one per line. End with CNTL/Z.
LAB_A(config)#interface fastethernet 0/0
LAB_A(config-if)#ip addr 10.1.1.1 255.255.255.0
LAB_A(config-if)#no shutdown
LAB_A(config-if)#
00:16:14: %LINK-3-UPDOWN: Interface FastEthernet0/0, changed state to up
LAB_A(config-if)#exit
LAB_A(config)#exit
LAB_A#

*********** END Setup Fast Ethernet l 0/0 Interface *************


*********** Check Interface *************

LAB_A#show interfaces summary


**********************************************************************
Let setup FastEthernet0/1 at LAB_B router
**********************************************************************
LAB_B(config)#int fast 0/1
LAB_B(config-if)#ip addr 10.1.1.2 255.255.255.0
LAB_B(config-if)#no shutdown
LAB_B(config-if)#
00:29:54: %LINK-3-UPDOWN: Interface FastEthernet0/1, changed state to up
00:29:56: %LINEPROTO-5-UPDOWN: Line protocol on Interface FastEthernet0/1, changed state to up
LAB_B(config-if)#

*********** End Of setup FastEthernet0/1 At LAB_B router *************


LAB_A#sh int sum

*********** Start Setup routing protocol using RIP ****************

LAB_A(config)#router rip
LAB_A(config-router)#network 10.1.1.0
LAB_A(config-router)#network 10.2.2.1
LAB_A(config-router)#

*********** End Setup routing protocol using RIP ****************


*********** Start Register IP host lookup table ****************

LAB_A(config)#ip host LAB_A 10.1.1.1 10.2.2.1
LAB_A(config)#ip host LAB_B 10.1.1.2 10.2.2.2

*********** End Register IP host lookup table ****************




Task

10:47 PM | 0 Comments

Ari ni bincang ngan Kak Muni tntg citer Hackers yang ktorg tgok last wednesday. then ktorg pun dptlah task dimana ktorg kena cari pasal red book dan orange book.

~Hackers~

12:15 AM | 0 Comments

lepas break ktorg tgok movie tajuk Hackers. Hmm, mmg best jugak la....dan yang pastinya memang ada sangkut paut ngan kursus aku ni...tgok hackers dalm citer tu mcm senang jer depa wat keja... haha..aku bole ka jd macam tu...??

to be continue....
hmmm...ari ni ktorg kena blajar jadi org jahat....en kamal suruh ktorg listkan sebanyak yg mungkin perkara2 JAHAT yg boleh kita wat kat pc org....lbih kurg cm tula...hehe...pastu baru baru en kamal explain mcm mana sume tu boleh kita wat....hmmm....macm mana ek....cth nyer kalo kita nak bg sst pc tu slow....mcm mana kita nak buat nak kasi pc dia slow...kat sini kita leh kaco kat dia punya memory, processor, hardisk, etc....kalo nak bagi slow kat hardisk tu...kita leh wat copy byk2 fail bg pc tu jadi slow....lbih kurg cmtula...susah nak explain...heheh...kena byk study lg nih....

to be continue~~~~

4:56 PM | 0 Comments

Selasa~08 Jan 2008

stat masuk klas cm biasa....hmm, ari ni kena stat wat website...tp kena lak p jmpa en. kamal pinjam installer dreamweaver....

me n along ~ our graduation day

blog

7:21 PM | 0 Comments

my first entry...x da apa yg nak coret kat sini...

About