Forex or FX is short for foreign exchange. So forex trading is currency trading. You simply exchange one nation’s currency for another in the hope of making money when the exchange rates change. The rates are constantly changing due to market news, national events, changes in values on a country’s stock exchange, etc.
07 September 2011
What Is Forex Trading ????
Labels:
Currency,
Foreign Exchanger,
Forex,
Stock Exchange,
Trader,
Trading
02 September 2011
What Is Slackware ???
Slackware was the first Linux distribution to achieve widespread use. It was started by Patrick Volkerding in late 1992. He had gotten introduced to Linux when he needed an inexpensive LISP interpreter for a project. At that time, there were very few distributions, so Patrick went with the distribution from Soft Landing systems (SLS Linux).
01 September 2011
Kernel.org Cracked
"As has recently been announced on the main kernel.org page, the main kernel.org server (known as “hera”) was recently compromised by an unknown intruder. This person was able to gain
Labels:
Cracker,
Cracking,
Hacker,
Hacking,
kernel.org,
Linux,
root,
Security Vulnerabilities,
virus linux,
Vulnerabilities
29 August 2011
Free and Open Source Software
Within the Linux community, there are two major ideological movements at work. The Free Software movement, which we'll get into in a moment, is working toward the goal of making all software free of intellectual property restrictions, which it believes hamper technical improvement and work against the good of the community. The Open Source movement is working toward most of the same goals, but takes a more pragmatic
Labels:
free,
General Public License,
GNU Software License,
IT,
License GNU GPL,
Linux
28 August 2011
What Is Linux ???
Linux was started by Linus Torvalds in 1991 as a personal project. He was looking for a way to run a Unix-based operating system without spending a lot of money. In addition, he wanted to learn the ins-and-outs of the 386 processor. It was released free-of-charge to the public so that anyone could hack on it and make improvements under the GNU General Public License
27 August 2011
DEFCON 19
Defcon is the annual gathering of hackers around the world. This year, Defcon held back its activities at the Rio Hotel, Las Vegas on 4 - August 7, 2011 last. Who can not attend, you can download all the materials grand conference on the link below. Happy Hacking :D
24 August 2011
Trademark
A Trademark is a mark used by an individual or business organization which represents trade or business and which is capable of distinguishing goods or services from that of others.
23 August 2011
Exploring Armitage User Interface
The Armitage user interface has three main panels :
Modules
Modules
- The modules panel lets you launch a Metasploit auxiliary module, throw an exploit, or generate a payload.
22 August 2011
XSS Vulnerability in Wordpress 3.2.1
Improper sanitized code in Wordpress Core Module(post-template.
php) Causing Cross site Scripting. This file can be finded in
directory /wp-includes. Author can simply Update his Post title
to <a><script>alert('1');</script></a> and its will give out
alert on index page and post page.
Labels:
Exploit,
PHP,
Vulnerabilities,
Web Vulnerabilities,
Wordpress,
XSS
17 August 2011
Armitage Feature
Armitage Feature like :
1. Discovery
1. Discovery
- Armitage provide several Host Management features available in metasploit.
- You can import hosts and launch scans to buildup a database of possible targets and visualize them on the screen, working with visualizations is more interactive when you right click on them and configures the options and settings according to your network environment.
Armitage – The Ultimate Attack Platform for Metasploit
To use Armitage, it is necessary to understand Metasploit. Metasploit is a command line tool. Anything you do in Armitage is translated into a command that Metasploit understands. To make it easier and funnier “Raphael Mudge” designed Armitage, which is a user interface for Metasploit.Armitage is a graphical management tool for Metasploit. It helps you to indulge your senses by visualizing your targets, recommends exploits and exposes the advance capabilities of the framework.
Labels:
Access,
Armitage,
Database,
Exploit,
Framework,
Hostname,
Internet,
IP address,
Metasploit,
Network,
network protocol,
pentest,
Vulnerabilities
01 August 2011
TCP/IP protocol
The TCP/IP protocol suite allows computers of all sizes, from many different computer vendors, running totally different operating systems, to communicate with each other. It is quite amazing because its use has far exceeded its original estimates. What started in the late 1960s as a government-financed research project into packet switching networks has, in the 1990s, turned into the most widely used form of networking between computerrs. It is truly an open system in that the definition of the protocol suite and many of its implementations are publicly available at little or no
Labels:
Access,
Bandwidth,
Computer,
Gateway,
Internet,
IP address,
Network,
network protocol,
Online,
operating systems,
protocols,
Server
25 July 2011
Detecting and Removing Vulnerabilities
Vulnerability management has evolved from simply running a scanner on an application, computer, or network to detect common weaknesses. Scanning is an essential element of vulnerability management, but VM includes other technologies and workflow that contribute to a bigger picture required for controlling and removing vulnerabilities. The primary objectives of VM are to:
Where do vulnerabilities come from?
Programming mistakes cause most vulnerabilities in software. A common mistake is failing to check the size of data buffers – a kind of storage bin of memory where a computer process executes its functions. When a buffer overflows, it overwrites data in adjacent memory buffers. This corrupts the stack or heap areas of memory, which may allow the execution of an attacker’s code on that machine via a virus, worm, or other unpleasant exploit.
Labels:
Buffer Overflow,
Computer,
Exploit,
General Public License,
Network,
Online,
Programming,
Software,
Virus,
Vulnerabilities,
Worm
Linux and the GPL
Linux is distributed under the GNU General Public License (GPL), which, in essence, says that anyone may copy, distribute, and even sell the program, so long as changes to the source are reintroduced back to the community and the terms of the license remain unaltered. Free means that you are free to take Linux, modify it, and create your own version. Free means that you are not at the mercy of a single vendor who forces you into a kind of corporate servitude by making sure that it is extremely costly to convert to another environment. If you are unhappy with your Linux vendor or the support you are getting, you can move to the next vendor without forfeiting your investment in Linux.
Content Management System
When the World Wide Web was born, creating even the simplest web page required learning the language of the Web: HTML. Since then, great strides in the power of web authoring software have been made with the availability of professional web editors such as Adobe Dreamweaver and Microsoft FrontPage. These types of editors have made the creation and maintenance of a web site much easier by providing a graphical user interface for web construction and minimizing the amount of HTML coding required by the webmaster.
Labels:
CMS,
content,
content management system,
erp,
HTML,
Joomla,
Programming,
Web,
World Wide Web
24 July 2011
Is Linux Really FREE?
In any discussion of what free means in relation to software, you'll often see the expressions "free as in speech" or "free as in beer." In this case, free isn't a question of cost, although you can get a free copy (as in free beer) of Linux and install it on your system without breaking any laws. As Robert A. Heinlein would have said, "There ain't no such thing as a free lunch." A free download will still cost you connection time on the Internet, disk space, time to burn the CDs, and so on. In the case of Ubuntu Linux, you can have a free CD mailed
23 July 2011
VoIP Hardware for experienced Users
Once you are experienced in using softphone, you may start wondering whether there is an easier way to communicate through VoIP, as using softphone via a computer is not practical—you need to turn on your computer each time you want to communicate through VoIP or keep your computer running for a long duration just to receive incoming call. This may not be prudent at all, since the purpose of using VoIP is to minimize your cost. Besides wasting electrical energy, the computer in which the softphone is running could crash.
PC to PC Internet Telephone Call
This part will explain the simplest VoIP call technique using a computer to call another computer or VoIP network. All you need is a computer with a sound card, headset, microphone and internet connectivity. How much these equipments will cost depend on the specification you use. But sinceVoIP for personal use does not require sophisticated equipment, these equipments will not cost much. Of these requirements, bandwidth is perhaps the most important, as it determines how good the voice quality of your VoIP communication.
Labels:
Access,
Bandwidth,
Computer,
Internet,
Network,
network protocol,
Server,
SIP Provider,
Telephone,
VoIP
What Is Internet Telephony ?
In a simple definition, Voice over Internet Protocol (VoIP) or internet telephony is a telephone network over the internet (TCP/IP) network. Thus, you could use VoIP anywhere as long as you are connected to the internet.
There are two main internet telephony technology, i.e., H.323 and Session Initiation Protocol (SIP) that are frequently used. The former is an older standard developed by the International Telecommunication Union
There are two main internet telephony technology, i.e., H.323 and Session Initiation Protocol (SIP) that are frequently used. The former is an older standard developed by the International Telecommunication Union
Labels:
Access,
Bandwidth,
Gateway,
Internet,
IP address,
IP Phone,
Network,
network protocol,
Online,
protocols,
Server,
SIP Provider,
Telephone,
VoIP
How VoIP Works for Dummies ??
The heart of VoIP network is the softswitch. It stores all information on the subscribers. In a simple view, a VoIP softswitch basically has a table mapping the phone number of the subscriber and the computer or IP address of the subscriber.
Everytime, a subscriber wants to make a call to another subscriber. The client equipment will ask the softswitch the destination address of the other subscriber. The destination address can be an IP address. Thus, the
Everytime, a subscriber wants to make a call to another subscriber. The client equipment will ask the softswitch the destination address of the other subscriber. The destination address can be an IP address. Thus, the