Mungkin ramai yang menganggap menggunakan wireless broadband seperti Celcom Broadband hanya boleh digunakan untuk satu komputer sahaja. Tetapi tanggapan itu silap kerana anda sebenarnya boleh berkongsi internet sehingga 10 orang dengan hanya menggunakan 1 modem sahaja. Saya akan tunjukkan caranya untuk membuat networking tersebut.
Untuk membuat networking, satu komputer diperlukan untuk dijadikan server.. Komputer tersebut akan sambung kepada internet secara terus dan akan berkongsi talian dengan komputer lain melaui local area network (LAN).. Berikut adalah caranya
1. di network Connection, sila klik kanan pada wireless modem anda dan pilih properties
2. pilih tab ‘advance’ dan tick pada ‘allow other network users to connect…’ seperti di bawah dan tekan ok
3. Pilih local area connection (LAN) di network connection dan pilih properties
4. Sila isikan nonbor ip seperti dibawah ini dan tekan ok.
5 Sambungkan wayar LAN dari komputer anda kepada Wireless router. Sila setup wireless router anda kepada ‘ Automatic configuration – DHCP’
6. Selesai.. Anda sekarang boleh berkongsi internet sehingga 10 komputer atau lebih.. goodluck
Saturday, January 9, 2010
Buat Networking USB Broadband
Out From Network Security and Computer Solution at 10:15 PM 0 comments
Cara Macamana Nak Buat Fail ISO
Kat cni aku nak tunjukkan kat korang mcmana nak buat fail iso.cara yg slalu digunakan..let's check it out....
stakat ni jer yg aku mampu ajar,harap2 berguna kpd blogger2 smua...
Out From Network Security and Computer Solution at 9:05 PM 0 comments
cara untuk remove windows genuine untuk xp, vista dan win 7
A tribute to Wocarson, creator of base version crack.
Install Notes:
1. Extract into a new empty folder
2. Run Setup.exe
Notes:
WGA crack release works on Microsoft Windows 2000, XP, Vista, 7 (32bit/64bit)
1.Close ALL Internet Explorer windows before use
2. Run the crack self-installer file and follow instructions.
3. System reboots automatically to complete installation.
4. Start downloading All Windows Operating System updates.
Updated, to work with the SP2 releases of Vista, and Internet Explorer 8 and Windows Media Player 11 and Windows Defender
Size : 2.1 MB
click to download
Out From Network Security and Computer Solution at 12:06 PM 0 comments
Sunday, December 27, 2009
Ini adalah cara2 bagaimana nak dapatkan wireless wep key
Download dan burn Backtrack 4
Lepas boot, pilih optional yang atas sekali
Command : startx (untuk masuk os backtrack)
masuk Terminal dan lakukan step2 seperti dibawah :
Objective : To list all wireless interface
Command : #iwconfig
Objective : To identify which interface is up (active)
Command : #ifconfig
Objective : To identify what chipset & driver in used
Command : #airmon-ng
Objective : To activate / start the interface
Command : #airmon-ng start wlan0
Objective : To list all available wireless router / switch & client’s mac address
Command : #airodump-ng wlan0
---------------------------------------------------------------------------------
Decsription :
BSSID : MAC address of the access point. In the Client section, a BSSID of ”(not associated)” means that the client is not associated with any AP. In this unassociated state, it is searching for an AP to connect with.
PWR : Signal level reported by the card. Its signification depends on the driver, but as the signal gets higher you get closer to the AP or the station. If the BSSID PWR is -1, then the driver doesn't support signal level reporting. If the PWR is -1 for a limited number of stations then this is for a packet which came from the AP to the client but the client transmissions are out of range for your card. Meaning you are hearing only 1/2 of the communication. If all clients have PWR as -1 then the driver doesn't support signal level reporting.
RXQ : Receive Quality as measured by the percentage of packets (management and data frames) successfully received over the last 10 seconds. See note below for a more detailed explanation.
Beacons : Number of announcements packets sent by the AP. Each access point sends about ten beacons per second at the lowest rate (1M), so they can usually be picked up from very far.
# Data : Number of captured data packets (if WEP, unique IV count), including data broadcast packets.
#/s : Number of data packets per second measure over the last 10 seconds.
CH : Channel number (taken from beacon packets).Note: sometimes packets from other channels are captured even if airodump-ng is not hopping, because of radio interference.
MB : Maximum speed supported by the AP. If MB = 11, it's 802.11b, if MB = 22 it's 802.11b+ and higher rates are 802.11g. The dot (after 54 above) indicates short preamble is supported.
ENC : Encryption algorithm in use. OPN = no encryption,”WEP?” = WEP or higher (not enough data to choose between WEP and WPA/WPA2), WEP (without the question mark) indicates static or dynamic WEP, and WPA or WPA2 if TKIP or CCMP is present.
CIPHER : The cipher detected. One of CCMP, WRAP, TKIP, WEP, WEP40, or WEP104. Not mandatory, but TKIP is typically used with WPA and CCMP is typically used with WPA2. WEP40 is displayed when the key index is greater then 0. The standard states that the index can be 0-3 for 40bit and should be 0 for 104 bit.
AUTH : The authentication protocol used. One of MGT (WPA/WPA2 using a separate authentication server), SKA (shared key for WEP), PSK (pre-shared key for WPA/WPA2), or OPN (open for WEP).
ESSID : The so-called “SSID”, which can be empty if SSID hiding is activated. In this case, airodump-ng will try to recover the SSID from probe responses and association requests.
STATION : MAC address of each associated station or stations searching for an AP to connect with. Clients not currently associated with an AP have a BSSID of ”(not associated)”.
Lost : The number of data packets lost over the last 10 seconds based on the sequence number. See note below for a more detailed explanation.
Packets : The number of data packets sent by the client.
Probes : The ESSIDs probed by the client. These are the networks the client is trying to connect to if it is not currently connected.
---------------------------------------------------------------------------------
Objective : To select specific Encryption you want to encrypt
Command : #airodump-ng –bssid
Objective : To generate traffic
Command : #aireplay-ng -1 0 –a
Objective : To generate traffic
Command : #aireplay-ng -3 –b
Description:
Filter options:
-b bssid : MAC address, Access Point
-d dmac : MAC address, Destination
-s smac : MAC address, Source
-m len : minimum packet length
-n len : maximum packet length
-u type : frame control, type field
-v subt : frame control, subtype field
-t tods : frame control, To DS bit
-f fromds : frame control, From DS bit
-w iswep : frame control, WEP bit
Replay options:
-x nbpps : number of packets per second
-p fctrl : set frame control word (hex)
-a bssid : set Access Point MAC address
-c dmac : set Destination MAC address
-h smac : set Source MAC address
-e essid : fakeauth attack : set target AP SSID
-j : arpreplay attack : inject FromDS pkts
-g value : change ring buffer size (default: 8)
-k IP : set destination IP in fragments
-l IP : set source IP in fragments
-o npckts : number of packets per burst (-1)
-q sec : seconds between keep-alives (-1)
-y prga : keystream for shared key auth
Attack modes (Numbers can still be used):
-deauth count : deauthenticate 1 or all stations (-0)
-fakeauth delay : fake authentication with AP (-1)
-interactive : interactive frame selection (-2)
-arpreplay : standard ARP-request replay (-3)
-chopchop : decrypt/chopchop WEP packet (-4)
-fragment : generates valid keystream (-5)
-Caffe-latte : Caffe-latte attack (-6)
-cfrag : Client-oriented fragmentation attack (-7)
-test : injection test (-9)
Objective : To generate traffic
Command : #aircrack-ng
~~Are_Mean~~
Out From Network Security and Computer Solution at 3:01 AM 0 comments
Wednesday, July 1, 2009
Tokoh Hacker Dunia
Hacker adalah orang yang mempelajari, menganalisa, dan selanjutnya bila
menginginkan, bisa membuat, memodifikasi, atau bahkan mengeksploitasi
sistem yang terdapat di sebuah perangkat seperti perangkat lunak
komputer dan perangkat keras komputer seperti program komputer,
administrasi dan hal-hal lainnya, terutama keamanan.
Berikut beberapa profile 14 Hacker Terbaik Dunia untuk saat ini :
1. Kevin Mitnick
Kevin adalah hacker pertama yang wajahnya terpampang dalam
poster "FBI Most Wanted".
Kevin juga seorang "Master of Deception" dan telah menulis buku
yang berjudul "The Art of Deception".
Buku ini menjelaskan berbagai teknik social engineering untuk
mendapatkan akses ke dalam sistem.
2. Linus Torvalds
Seorang hacker sejati, mengembangkan sistem operasi Linux yang merupakan
gabungan dari "LINUS MINIX".
Sistem operasi Linux telah menjadi sistem operasi "standar"
hacker.
Bersama Richard Stallman dengan GNU-nya membangun Linux versi awal dan
berkolaborasi dengan programmer, developper dan hacker seluruh dunia
untuk mengembangkan kernel Linux.
3. John Draper
Penemu nada tunggal 2600 Herz menggunakan peluit plastik yang merupakan
hadiah dari kotak sereal.
Merupakan pelopor penggunaan nada 2600 Hz dan dikenal sebagai Phone
Phreaker (Phreaker, baca: frieker)
Nada 2600 Hz digunakan sebagai alat untuk melakukan pemanggilan telepon
gratis.
Pada pengembangannya, nada 2600 Hz tidak lagi dibuat dengan peluit
plastik, melainkan menggunakan alat yang disebut "Blue Box".
4. Mark Abene
Sebagai salah seorang "Master of Deception" phiber optik,
menginspirasikan ribuan remaja untuk mempelajari sistem internal telepon
negara. Phiber optik juga dinobatkan sebagai salah seorang dari 100
orang jenius oleh New York Magazine.
Menggunakan komputer Apple , Timex Sinclair dan Commodore 64.
Komputer pertamanya adalah Radio Shack TRS-80 (trash-80).
5. Robert Morris
Seorang anak dari ilmuwan National Computer Security Center yang
merupakan bagian dari National Security Agencies (NSA).
Pertama kali menulis Internet Worm yang begitu momental pada tahun 1988.
Meng-infeksi ribuan komputer yang terhubung dalam jaringan.
6. Richard Stallman
Salah seorang "Old School Hacker", bekerja pada lab Artificial
Intelligence MIT.
Merasa terganggu oleh software komersial dan dan hak cipta pribadi.
Akhirnya mendirikan GNU (baca: guhNew) yang merupakan singkatan dari GNU
NOT UNIX.
Menggunakan komputer pertama sekali pada tahun 1969 di IBM New York
Scintific Center saat berumur 16 tahun.
7. Kevin Poulsen
Melakukan penipuan digital terhadap stasiun radio KIIS-FM, memastikan
bahwa ia adalah penelpon ke 102 dan memenangkan porsche 944 S2.
8. Ian Murphy
Ian Muphy bersama 3 orang rekannya, melakukan hacking ke dalam komputer
AT&T dan menggubah seting jam internal-nya.
Hal ini mengakibatkan masyarakat pengguna telfon mendapatkan diskon
"tengah malam" pada saat sore hari, dan yang telah menunggu
hingga tengah malam harus membayar dengan tagihan yang tinggi.
9. Vladimir Levin
Lulusan St. Petersburg Tekhnologichesky University.
Menipu komputer CitiBank dan meraup keuntungan 10 juta dollar.
Ditangkap Interpol di Heathrow Airport pada tahun 1995
10. Steve Wozniak
Membangun komputer Apple dan menggunakan "blue box" untuk
kepentingan sendiri.
11. Tsutomu Shimomura
Berhasil menangkap jejak Kevin Mitnick.
12. Dennis Ritchie dan Ken Thomson
Dennis Ritchie adalah seorang penulis bahasa C, bersama Ken Thomson
menulis sistem operasi UNIX yang elegan.
13. Eric Steven Raymond
Bapak hacker. Seorang hacktivist dan pelopor opensource movement.
Menulis banyak panduan hacking, salah satunya adalah: "How To Become
A Hacker" dan "The new hacker's Dictionary".
Begitu fenomenal dan dikenal oleh seluruh masyarakat hacking dunia.
Menurut Eric, "dunia mempunyai banyak persoalan menarik danmenanti
untuk dipecahkan".
14. Johan Helsingius
Mengoperasikan anonymous remailer paling populer didunia.
Out From Network Security and Computer Solution at 11:29 PM 0 comments
Monday, June 22, 2009
Keselamatan Dalam Rangkaian
istilah
Istilah-istilah yang berkaitan:
•Penggodam (hacker) boleh membawa maksud seseorang yang mahir dalam bidang komputer; namun media massa selalu menyamakan "penggodam" dengan "penggodam topi hitam".
•Topi hitam (black hat): seseorang yang mensubversi keselamatan komputer tanpa izin atau menggunakan teknologi (biasanya sebuah komputer ataupun internet) untuk tujuan keganasan, vandalisme, penipuan kad kredit, pencurian identiti, pencurian hak milik intelektual, dan sebagainya. Ini juga bermakna mengambil alih kawalan komputer lain melalui sebuah rangkaian, atau perekahan perisian (software cracking).
•Topi kelabu (grey hat): Penggodam yang etikanya tidak jelas atau di batasan undang-undang, seringkali mengaku terang-terang.
•Topi putih (white hat): Penggodam beretika yang memecah keselamatan tetapi untuk tujuan altruistik ataupun sekurang-kurangnya tidak berniat jahat. Topi putih biasanya mempunyai etika yang jelas, dan selalu berusaha untuk bekerja dengan pengilang atau pemilik untuk memperbaiki kelemahan yang dijumpai, walaupun banyak yang mengancam sama ada tersirat atau jelas untuk memaklumkan kepada awam selepas tempoh "sesuai" untuk memastikan respons yang kena pada waktunya. Istilah ini juga digunakan untuk penggodam yang mereka dan mengekod sistem yang lebih selamat.
Perekah/Penggertak (cracker):
•Topi hitam. Sering digunakan untuk membezakan penggodam topi hitam dengan penggodam lain. Penggodam komputer yang menggunakan perekahan kata laluan atau serangan kuasa keras. Berkait denga istilah pemecah peti besi.
•Perekah perisian. Orang yang mengkhusus dalam mengatasi mekanisma perlindungan penyalinan perisian. Tidak mengeksploit rangkaian, cuma perisian.
•Budak skrip (script kiddie): Penceroboh komputer yang tidak begitu mahir; seseorang yang sekadar mengikut arahan ataupun menggunakan teknik buku resepi tanpa memahami langkah yang dibuatnya.
•Hacktivis merupakan penggodam aktivis yang menggunakan teknologi untuk mengumumkan pesanan politik. Perlu dicatat bahawa vandalisme web bukan semestinya hacktivisme.
Alat keselamatan
•Dinding api (rangkaian). Dalam pengkomputeran, dinding api merupakan sejenis perkakasan dan/atau perisian dalam persekitaran rangkaian yang berfungsi untuk menghalang komunikasi yang dilarang oleh polisi keselamatan, serupa dengan fungsi dinding api atau pengadang bahang dalam pembinaan bangunan.
•Sistem pengesanan pencerobohan (IDS) umumnya mengesan manipulasi yang tidak dikehendaki kepada sistem. Manipulasi tersebut boleh jadi serangan oleh penggodam berniat jahat yang mahir, ataupun cuma budak skrip yang menggunakan program automatik.
•Perisian antivirus merupakan program komputer yang cuba mengenal pasti, mencegah dan menghapuskan virus komputer dan perisian jahat (malware) lain.
•Penyulitan digunakan untuk melindungi mesej pengguna dari orang lain. Terdapat banyak cara yang boleh digunakan seperti menukar letak aksara, menggantikan aksara, ataupun membuang aksara dari mesej. Cara-cara ini perlu digabungkan untuk menjadikan penyulitan tersebut lebih selamat, iaitu sukar untuk direkah.
•Keizinan mengehadkan capaian ke komputer kepada sekumpulan pengguna melalui penggunaan sistem pengesahan. Sistem ini boleh melindungi sama ada keseluruhan komputer – seperti melalui skrin log masuk interaktif – atau perkhidmatan individu, seperti pelayan FTP.
•Alat pengimbas kerentanan dan pengimbas port boleh digunakan dengan cepat untuk memeriksa komputer pada rangkaian terhadap kelemahan yang diketahui dan port yang boleh digunakan untuk mencapai komputer tersebut.
Out From Network Security and Computer Solution at 9:13 PM 0 comments
Detect Invisable YM
Firstly open your yahoo messenger main window and double click on the name of the person whom you want to check.The chat window will open obviously.
Click IMVironment button, select See all IMVironments, select Yahoo! Tools or Interactive Fun, and click on Doodle.
After loading the Doodle imvironment there can be two possibilities
1.If the user is offline Doodle are will show this "waiting for your friend to load Doodle" continuously .
2. If the user is online (but in invisible mode), after few seconds (it can take up to one minute, depending on your connection speed), you should get a blank page like in the picture below.So you know that the user is online.
Alternate Method:
Chose a person you want to check .Double click to open the chat window.Now simply invite the person for a voice conference.This is done by clicking on the "conference' button on the top of the chat window.
If the talk button appears and turns green then that person is online.But if you receive the message 'Voice chat could not be started ' then the person is offline.
Out From Network Security and Computer Solution at 9:12 PM 0 comments
LINUX ROUTER...
1. What u need to have?
- at least 2 network card
- 2 cross cable
- install fedora 10 (for configuration)
2. What u need to do?
- set IP forwarding
- set IP
- routing (buat routing + gw)
* Linux router guna command line untuk configuration
1. nak upkan network card
service network restart
/etc/init.d/network restart
eth0 .................................[/]
eth1 ................................ [/]
2. set ip
/sbin/ifconfig eth0 192.168.1.1 netmask 255.255.255.0 broadcast 192.168.1.255
3. set gateway
/sbin/route add-net 192.168.1.0 netmask 255.255.255.0 gw 192.168.1.255 dev eth0
4. set ip_forwarding
echo 1 > proc/sys/net/ipv4/ip_forward
(0 untuk stop) dan (1 untuk up)
5. tengok routing table
/sbin/ip route show
6. tengok ada routing @ x
/sbin/route -v
7. delete routing dalam routing table
/sbin/route del -net ............./sm
8. up network card one by one
/sbin/if up eth0
/sbin/if up eth1
** if pc <-> x bole nak ping:
- firewall pc x off
- anti virus x off
- ip_forwarding tiap kali x up
- firewall linux->ip table
Out From Network Security and Computer Solution at 8:11 PM 0 comments
WEB Devolepment
Web Development dibahagikan kpd 2 :
• Static --- Pure HTML
• Dynamic
Static
• Content
• nk ubah/edit perlu buka semula fail tersebut
• pages yang tersedia
Dynamic
• content can be anything (dynamicly loaded into web page)
• Develop guna mySQL & PHP
• Keperluan : web server (-> apache) + mySQL + PHP
• Software : WAMP, XAMP, Easy PHP [ ada ketiga-tiga keperluan diatas -packages)
Web Authoring Tools -> Dreamweaver
Buat folder untuk...( step )
1. /var/www/html
2. mkdir shadia
3. vim index.html
Web development is a broad term for any activities related to developing a web site for the World Wide Web or an intranet.
This can include e-commerce business development, web design, web content development, client-side/server-side coding, and web server configuration.
However, among web professionals, "web development" usually refers only to the non-design aspects of building web sites, e.g. writing markup and coding.
Web development can range from developing the simplest static single page of plain text to the most complex web-based internet applications, electronic businesses, or social network services.
For larger businesses and organizations, web development teams can consist of hundreds of people (web developers).
maller organizations may only require a single permanent or contracting webmaster, or secondary assignment to related job positions such as a graphic designer and/or Information systems technician.
Web development may be a collaborative effort between departments rather than the domain of a designated department.
Reference-http://en.wikipedia.org/wiki/Web_development
Out From Network Security and Computer Solution at 8:11 PM 0 comments
FTP
Ni da skit nota pasal ftp untuk load file dalam domain web yang aku kena buat..huhu
FTP
1. What is FTP? #
FTP stands for File Transfer Protocol and it is the process used to upload and download files from a web server. This is done using an FTP program.
2. Do you recommend any FTP programs? #
Here are a few FTP programs that we recommend:
Windows
o BulletProof FTP
o CuteFTP
o WS_FTP
Mac
o Transmit
o Cyberduck
o Captain FTP
o Interarchy
o BulletProof FTP
o CuteFTP
o Fetch
o Coda
3. What information needs to be entered into a FTP or web design program in order to upload files to the server? #
server/hostname: your-domain.comusername: your-usernamepassword: your-passwordremote directory: httpdocsport: 21
To help you with this, we have created some screen shot examples of FTP configurations for a few popular FTP programs and web design applications with a built-in FTP feature.
4. The website is not loading in a browser after the files have been uploaded to the server, what might be causing this? #
1. Double check that you have uploaded your files to the httpdocs folder
2. Check that you have named your default page: index.html, index.htm or index.php
5. A FTP program is having some problems connecting to the server, how do you troubleshoot this? #
0. Make sure that you have entered all the proper FTP information for your website. This was provided in the account information email that we sent to you when your website became live on our server. If you no longer know your FTP password, you can reset it using your control panel. If you no longer know your control panel password, just enter a support ticket through our Help Desk and ask us to reset both your control panel and FTP passwords and re-send your account access info.
1. Do not add “ftp.” before your domain name. Your server/host name is just your domain name only, without any prefixes.
2. Double check that your FTP program is set to access port number 21.
3. Verify that you currently have a connection to the internet and that your ISP is not having any problems.
4. If you are behind a firewall, make sure that it is not configured to block access to port 21 on outbound connections. Also, you could try enabling “passive mode” on your FTP program since some firewalls require this when using FTP.
5. If you have a slow connection (ie dial-up), try increasing the time-out value setting in your FTP program. For instance if the default is 60:00, try changing it to 120:00. This is a common issue with Dreamweaver and this fix often solves the problem.
6. If you are running a BitTorrent program, you need to pause it or turn it off. BitTorrent programs require a massive amount of your internet connection’s uploading/downloading resources to run. Running a BitTorrent program while trying to FTP will cause extremely slow and almost non-existant upload/download times.
6. When the files are uploaded to the server they are corrupted, what might be causing this? #
Make sure that your FTP application is set to automatically detect ACSII or binary mode.
7. How do you change the password for FTP access? #
The password for FTP can be reset using your control panel.
0. Log in to your control panel.
1. Select the domain name.
2. Click on “Setup”.
3. Next to the “New FTP Password” box, enter the new password. Next to the “Confirm Password” box, enter the new password again, then select “OK”
8. Do you offer anonymous FTP? #
For security reasons, we do not support anonymous FTP.
9. Is it possible to upload files to a website using SFTP (Secure FTP) or SCP (Secure Copy)? #
We do not offer SFTP or SCP access to our servers because it would require granting shell access. For security reasons, we do not offer shell access under any circumstances. The improved security that comes from SFTP and SCP is far outweighed by the risks inherent to the enabling of shell access on a public server.
Out From Network Security and Computer Solution at 8:10 PM 0 comments