07 September 2011

What Is Forex Trading ????

Forex or FX is short for foreign exchange. So forex trading is currency trading. You simply exchange one nation’s currency for another in the hope of making money when the exchange rates change. The rates are constantly changing due to market news, national events, changes in values on a country’s stock exchange, etc.

02 September 2011

What Is Slackware ???

Slackware was the first Linux distribution to achieve widespread use. It was started by Patrick Volkerding in late 1992. He had gotten introduced to Linux when he needed an inexpensive LISP interpreter for a project. At that time, there were very few distributions, so Patrick went with the distribution from Soft Landing systems (SLS Linux).

01 September 2011

Kernel.org Cracked

"As has recently been announced on the main kernel.org page, the main kernel.org server (known as “hera”) was recently compromised by an unknown intruder. This person was able to gain

29 August 2011

Free and Open Source Software

Within the Linux community, there are two major ideological movements at work. The Free Software movement, which we'll get into in a moment, is working toward the goal of making all software free of intellectual property restrictions, which it believes hamper technical improvement and work against the good of the community. The Open Source movement is working toward most of the same goals, but takes a more pragmatic

28 August 2011

What Is Linux ???

Linux was started by Linus Torvalds in 1991 as a personal project. He was looking for a way to run a Unix-based operating system without spending a lot of money. In addition, he wanted to learn the ins-and-outs of the 386 processor. It was released free-of-charge to the public so that anyone could hack on it and make improvements under the GNU General Public License

27 August 2011

DEFCON 19

Defcon is the annual gathering of hackers around the world. This year, Defcon held back its activities at the Rio Hotel, Las Vegas on 4 - August 7, 2011 last. Who can not attend, you can download all the materials grand conference on the link below. Happy Hacking :D

24 August 2011

Trademark

A Trademark is a mark used by an individual or business organization which represents trade or business and which is capable of distinguishing goods or services from that of others.

23 August 2011

Exploring Armitage User Interface

The Armitage user interface has three main panels :
Modules
    • The modules panel lets you launch a Metasploit auxiliary module, throw an exploit, or generate a payload.

22 August 2011

XSS Vulnerability in Wordpress 3.2.1


Improper sanitized code in Wordpress Core Module(post-template. 
php) Causing Cross site Scripting. This file can be finded in 
directory /wp-includes. Author can simply Update his Post title
to <a><script>alert('1');</script></a> and its will give out 
alert on index page and post page.

17 August 2011

Armitage Feature

Armitage Feature like :
1. Discovery
  • Armitage provide several Host Management features available in metasploit.
  • You can import hosts and launch scans to buildup a database of possible targets and visualize them on the screen, working with visualizations is more interactive when you right click on them and configures the options and settings according to your network environment.

Armitage – The Ultimate Attack Platform for Metasploit

To use Armitage, it is necessary to understand Metasploit. Metasploit is a command line tool. Anything you do in Armitage is translated into a command that Metasploit understands. To make it easier and funnier “Raphael Mudge” designed Armitage, which is a user interface for Metasploit.Armitage is a graphical management tool for Metasploit. It helps you to indulge your senses by visualizing your targets, recommends exploits and exposes the advance capabilities of the framework.

01 August 2011

TCP/IP protocol

The TCP/IP protocol suite allows computers of all sizes, from many different computer vendors, running totally different operating systems, to communicate with each other. It is quite amazing because its use has far exceeded its original estimates. What started in the late 1960s as a government-financed research project into packet switching networks has, in the 1990s, turned into the most widely used form of networking between computerrs. It is truly an open system in that the definition of the protocol suite and many of its implementations are publicly available at little or no

25 July 2011

Detecting and Removing Vulnerabilities

Vulnerability management has evolved from simply running a scanner on an application, computer, or network to detect common weaknesses. Scanning is an essential element of vulnerability management, but VM includes other technologies and workflow that contribute to a bigger picture required for controlling and removing vulnerabilities. The primary objectives of VM are to:

Where do vulnerabilities come from?

Programming mistakes cause most vulnerabilities in software. A common mistake is failing to check the size of data buffers – a kind of storage bin of memory where a computer process executes its functions. When a buffer overflows, it overwrites data in adjacent memory buffers. This corrupts the stack or heap areas of memory, which may allow the execution of an attacker’s code on that machine via a virus, worm, or other unpleasant exploit.

Linux and the GPL

Linux is distributed under the GNU General Public License (GPL), which, in essence, says that anyone may copy, distribute, and even sell the program, so long as changes to the source are reintroduced back to the community and the terms of the license remain unaltered. Free means that you are free to take Linux, modify it, and create your own version. Free means that you are not at the mercy of a single vendor who forces you into a kind of corporate servitude by making sure that it is extremely costly to convert to another environment. If you are unhappy with your Linux vendor or the support you are getting, you can move to the next vendor without forfeiting your investment in Linux.

Content Management System

When the World Wide Web was born, creating even the simplest web page required learning the language of the Web: HTML. Since then, great strides in the power of web authoring software have been made with the availability of professional web editors such as Adobe Dreamweaver and Microsoft FrontPage. These types of editors have made the creation and maintenance of a web site much easier by providing a graphical user interface for web construction and minimizing the amount of HTML coding required by the webmaster.

24 July 2011

Is Linux Really FREE?

In any discussion of what free means in relation to software, you'll often see the expressions "free as in speech" or "free as in beer." In this case, free isn't a question of cost, although you can get a free copy (as in free beer) of Linux and install it on your system without breaking any laws. As Robert A. Heinlein would have said, "There ain't no such thing as a free lunch." A free download will still cost you connection time on the Internet, disk space, time to burn the CDs, and so on. In the case of Ubuntu Linux, you can have a free CD mailed

23 July 2011

VoIP Hardware for experienced Users

Once you are experienced in using softphone, you may start wondering whether there is an easier way to communicate through VoIP, as using softphone via a computer is not practical—you need to turn on your computer each time you want to communicate through VoIP or keep your computer running for a long duration just to receive incoming call. This may not be prudent at all, since the purpose of using VoIP is to minimize your cost. Besides wasting electrical energy, the computer in which the softphone is running could crash.

PC to PC Internet Telephone Call

This part will explain the simplest VoIP call technique using a computer to call another computer or VoIP network. All you need is a computer with a sound card, headset, microphone and internet connectivity. How much these equipments will cost depend on the specification you use. But sinceVoIP for personal use does not require sophisticated equipment, these equipments will not cost much. Of these requirements, bandwidth is perhaps the most important, as it determines how good the voice quality of your VoIP communication.

What Is Internet Telephony ?

In a simple definition, Voice over Internet Protocol (VoIP) or internet telephony is a telephone network over the internet (TCP/IP) network. Thus, you could use VoIP anywhere as long as you are connected to the internet.

There are two main internet telephony technology, i.e., H.323 and Session Initiation Protocol (SIP) that are frequently used. The former is an older standard developed by the International Telecommunication Union

How VoIP Works for Dummies ??

The heart of VoIP network is the softswitch. It stores all information on the subscribers. In a simple view, a VoIP softswitch basically has a table mapping the phone number of the subscriber and the computer or IP address of the subscriber.

Everytime, a subscriber wants to make a call to another subscriber. The client equipment will ask the softswitch the destination address of the other subscriber. The destination address can be an IP address. Thus, the