Thursday, March 20, 2014

Basic Linux Commands & Installation

Type: E-Book
This Book will teach you about Linux Basic and Basic Commands with their Installation process. This Book is very useful if you are just a beginner in the Linux World.
Topics are below:
  • Why Linux ?
  • What is Linux?
  • The Shell
  • Computing Basics
  • Managing user accounts
  • Groups
  • Access Privileges
  • Linux File System
  • Concept of Mount
  • Linux Utilities tar and zip
  • Managing Software
  • Commands
  • Command Concatenation
  • Linux Help System
  • VI Editor



Like it ? Share it.

Wednesday, March 19, 2014

xcowsay in Kali Linux


A cow with a speech bubble containing some text. If text is specified it will be displayed in the bubble. Otherwise the text will be read from the standard input and displayed when end of file is encountered.


1. How to install – Open Terminal, type apt-get install xcowsay and Press Enter
(Click image for large view)

2. Open xcowsay with Help Commands
Syntax – usr/games/xcowsay –h

3. xcowsay is saying Merry Christmas.
Syntax - /usr/games/xcowsay Merry Christmas

4. xcowsay is saying Merry Christmas with thinking bubbles.
Syntax - /usr/games/xcowsay –think Merry Christmas
(Click image for large view)



Like it ? Share it.

Tuesday, March 18, 2014

Cowsay in Kali linux


Cowsay generates an ASCII picture of a cow saying something provided by the user. If run with no arguments, it accepts standard input, word-wraps the message given at about 40 columns, and prints the cow saying the given message on standard output.

1. How to install – Open terminal, type apt-get install cowsay and Press Enter.
(Click on image for large view)

2. The –b option initiates Borg mode.
Syntax - /usr/games/cowsay –b Message
Ex - /usr/games/cowsay –b Brog mode

2A. If you logged in as an user (not root) then command syntax will be change.
Syntax : hell@MrQuiety:/root$ cowsay –b Message
Ex : hell@MrQuiety:/root$ cowsay –b Brog mode


3. The –d causes the cow to appear dead.
Syntax - /usr/games/cowsay –d message
Ex - /usr/games/cowsay –d Dead

4. –g invokes greedy mode.
Syntax - /usr/games/cowsay –g message
Ex - /usr/games/cowsay –g greedy mode

5. –p cause a state of paranoia to come over the cow.
Syntax - /usr/games/cowsay –p message
Ex - /usr/games/cowsay –p Merry Christmas 

6. –s makes the cow appear thoroughly stoned.
Syntax - /usr/games/cowsay –s message
Ex - /usr/games/cowsay –s stoned

7. –t yields a tired cow.
Syntax - /usr/games/cowsay –t message
Ex - /usr/games/cowsay –t tired

8. –w is somewhat the opposite of –t.
Syntax - /usr/games/cowsay –w message
Ex - /usr/games/cowsay –w Merry Christmas

9. –y brings on the cow’s youthful appearance.
Syntax - /usr/games/cowsay –y message
Ex - /usr/games/cowsay –y youthful

10. –f option specifies a particular cow picture file (cowfile) to use. In this example I am showing you a dragon picture.
Syntax - /usr/games/cowsay –f <cowfile> message
Ex - /usr/games/cowsay –f dragon Merry Christmas

11. A snowman with –f option.
Syntax - /usr/games/cowsay –f <cowfile> message
Ex - /usr/games/cowsay –f snoman Merry Christmas

12. This command is use to view the cowfile list. Choose any of them and put them as cowfile in command and enjoy Christmas.
Syntax - /usr/games/cowsay -l

13. cowthink – If the program is invoked as cowthink then the cow will think its message instead of saying it. You can run all cowsay’s option with cowthink.
Syntax – /usr/games/cowthink –d message
Ex- /usr/games/cowthink –d dead

14. Combination of fortune and cowsay.
Ex - /usr/games/fortune | /usr/games/cowsay

14A. If you logged in as an user (not root) then command syntax will be change.
Ex - : hell@MrQuiety:/root$ fortune | cowsay

15. In this example you can see we are using cowsay option(-d) with the combination command of fortune and cowsay. You can also do same with cowthink.
(Click on image for large view)

Like it ? Share it.

Top 10 Viruses

Computer viruses can be a nightmare. Some can wipe out the information on a hard drive, tie up traffic on a computer network for hours, turn an innocent machine into a zombie and replicate and send themselves to other computers. Below we are going to share with you Top 10 Viruses and their information.


Storm Virus
Storm gets its name from the trap that is its method of infection.Storm Worm struck the cyber world as a malicious Trojan horse program in late 2006 when users began receiving e-mails with a subject line “230 dead as storm batters Europe.” It was without a doubt one of the most sophisticated and greatest cyber fraud networks ever constructed. It tricked the victims into clicking the fake links in an e-mail that was infected by the virus which could easily turn any Windows PC into a botnet, letting someone offsite operate it remotely for sending spam mails across the internet. In January 2007, it was estimated that out of all global malware infections, 8% is due to the Storm worm as the number of this dangerous malware infected PCs was close to 10 million.To this day, it remains a major security risk and continues to spread in new ways, including via links inserted into blog postings and bulletin boards.


Sasser and Netsky
The Sasser worm was a destructive beast when it hit in 2004, counting big targets such as the British Coast Guard (which lost its mapping capabilities), Agence France-Presse (which lost its satellite communications) and Delta Airlines (which had to cancel flights when their computer system went down).A 17-year-old German named Sven Jaschan created the two programs and unleashed them onto the Internet. The Sasser worm attacked computers through a Microsoft Windows vulnerability. Unlike other worms, it didn't spread through e-mail. Instead, once the virus infected a computer, it looked for other vulnerable systems.
The Netsky virus moves through e-mails and Windows networks. It spoofs e-mail addresses and propagates through a 22,016-byte file attachment. As it spreads, it can cause a denial of service (DoS) attack as systems collapse while trying to handle all the Internet traffic.
Sven Jaschan, creator of the Sasser and Netsky viruses

Nimda Virus
Nimda (that's "admin" spelled backward) hit the virus scene in 2001 and quickly (very quickly) rose to the top.Nimda spread through the Internet rapidly, becoming the fastest propagating computer virus at that time. In fact, according to TruSecure CTO Peter Tippett, it only took 22 minutes from the moment Nimda hit the Internet to reach the top of the list of reported attacks.The Nimda worm's primary targets were Internet servers. While it could infect a home PC, its real purpose was to bring Internet traffic to a crawl. It could travel through the Internet using multiple methods, including e-mail.The Nimda worm created a backdoor into the victim's operating system. It allowed the person behind the attack to access the same level of functions as whatever account was logged into the machine currently.

Melissa Virus
Melissa was the first mass-mailing macro virus for the new age of e-mailing which became the breaking news across the world on March 26, 1999. a man named David L. Smith created a computer virus based on a Microsoft Word macro. He built the virus so that it could spread through e-mail messages. Smith named the virus "Melissa," saying that he named it after an exotic dancer from Florida.the Melissa computer virus tempts recipients into opening a document with an e-mail message like "Here is that document you asked for, don't show it to anybody else." Once activated, the virus replicates itself and sends itself out to the top 50 people in the recipient's e-mail address book.Smith lost his case and received a 20-month jail sentence. The court also fined Smith $5,000 and forbade him from accessing computer networks without court authorization.

Code Red I and II Computer Viruses
In the summer 2001, a computer worm most commonly referred to as “Code Red” was unleashed on the network servers on July 13. It was a very sneaky virus which took advantage of a flaw in Microsoft Internet Information Server. This virus was for the first time detected by two of the eEye Digital Security employees and at the time when they found out about the virus, they were drinking Code Red Mountain Dew; hence the name “Code Red.” The Virus turned your computer into a slave, letting someone offsite operate it remotely. 

ILOVEYOU Virus
In 2000, one of the trickiest computer malware ever was detected on May 4 in Philippines. Around 10% of the internet users committed a huge mistake by going on the name of this hazardous worm.The ILOVEYOU virus initially traveled the Internet by e-mail, just like the Melissa virus. The subject of the e-mail said that the message was a love letter from a secret admirer. An attachment in the e-mail was what caused all the trouble. The original worm had the file name of LOVE-LETTER-FOR-YOU.TXT.vbs. The vbs extension pointed to the language the hacker used to create the worm: Visual Basic Scripting. 
It copied itself several times and hid the copies in several folders on the victim's hard drive.
It added new files to the victim's registry keys.
It replaced several different kinds of files with copies of itself.
It sent itself through Internet Relay Chat clients as well as e-mail.
It downloaded a file called WIN-BUGSFIX.EXE from the Internet and executed it. Rather than fix bugs, this program was a password-stealing application that e-mailed secret information to the hacker's e-mail address.

SQL Slammer/Sapphire
SQL Slammer, a standalone malicious program also known as “Sapphire” appeared at the starting of the year 2003 and was the first fileless worm which rapidly infected more than 75000 vulnerable hosts within10 minutes on 25th January.The Slammer virus was doubling its number of victims every few seconds.The Bank of America's ATM service crashed, the city of Seattle suffered outages in 911 service and Continental Airlines had to cancel several flights due to electronic ticketing and check-in errors.

MyDoom
My Doom explored its way to the malware world on 26th January 2004 and sent a shockwave around the world as it scattered exponentially via e-mail with random senders’ addresses and subject lines. My Doom also known as “Novarg” is reported to be the most dangerous virus ever released, breaking the previous record set by the Sobig F worm. It transmitted itself in a particularly deceitful manner through e-mail as what receiver would first reckon to be a bounced error message as it reads “Mail Transaction Failed.” But, as soon as the message is clicked upon, the attachment is executed and the worm is transferred to e-mail addresses found in user’s address book. Like the Klez virus, MyDoom could spoof e-mails so that it became very difficult to track the source of the infection.

Conficker
In 2009, a new computer worm Conficker also known as Downup, Domnadup and Kido crawled its way into as many as fifteen million Microsoft Windows operating systems around the world without human intervention using a patched Windows flaw. Conficker virus is very difficult to detect without running an upgraded version of original anti-virus and malware scanner. Conficker has assembled an army of zombies which has the potential to steal financial data and other important information from your system.

CIH
A destructive parasitic virus CIH also known as “Chernobyl” was first emerged in the year 1998 in Taiwan and quickly became one of the most dangerous and destructive viruses to ever hit with a payload that corrupts data. The CIH virus infects Windows 95 and 98 executable file and after doing that it remains a resident in the machine’s memory, where it infects other executables. Once activated, the virus annihilates the data on the hard disk and overwrites the computer’s Flash BIOS chip, rendering it completely inoperable and unless the chip is reprogrammed the user will not be able to boot the machine at all.


Like it ? Share it.

Spyware and Malware


1. What is Spyware?
Although a common user may suffer from different spam messages, viruses and hacks another largest issue for users today is a spyware. They are small programs Spywarethat are installed on PCs to collect user's data and information without owner's knowledge.
Commonly spyware is a hidden program that is hard to be identified or even found. It is installed secretly on a target PC. Seldom, commercial spywares, e.g. keyloggers are installed on corporate PCs by the owner or IT manager to monitor users activity on remote PCs during the working time.
Based on the term itself spywares are developed to monitor a remote PC's activity, but in fact spywares' functions are extended well beyond their basic goals. Commonly spywares collect the information about visited Internet sites, surfing habits in general, in addition they may redirect the work of web browser and install attendant software. Furthermore, spyware applications may slow down Internet connection at user's PC, change PC settings, home page, etc.


2. What is Malware?
Malware (malicious software) is a program developed to access a PC without user's knowledge. Malware term is mostly used by IT professionals to generalize intrusive and hostile program codes and software as well. malwareMalware is a very general term for many unwanted software like viruses, computer worms, adware, rootkits, spywares, etc. Commonly malware get to user's PC from the Internet (unauthorized mails with attachments, cracks of the software user downloads, harmful sites, etc.). Sometimes malware can include potentially unwanted programs.

3. What can spyware/malware do to Computer?
Those programs could perform various of nasty things to your PC from simple spam and mail advertisement to password stealing. Here is the list of most common activities:
  • Prevent user from work by clutters creation
  • Data destruction, copy or rewrite on a disc
  • Files encryption within code or virus attack
  • Personal data and address book information steal (identity theft and keystroke-logging).
  • Replacement website links with false sites for user to enter personal info and passwords there (commonly for bank account info steal)
  • Browser flood with different pop-up windows and sites, commonly of advertisement character.
  • PC infection with viruses
  • Enables remote users (hackers) to get an access to user's PC for remote control and data transfer
  • Rarely the use of phone modem for expensive international calls.
  • Slow down Internet connection
  • Antivirus and firewall activity deactivation.
  • The use of user's PC as a server for pornography files broadcast

4. What is the source of spyware/malware? Where does it come from?
All known malware and spyware applications are developed by tricky but clever programmers or hackers and delivered to your PC through the Internet or with infected flash drivers, CDs, etc. The most common source is covert Internet installation. Mostly malware can be found on innocent-looking web site components and different toolbars, MP3 players, game demos, free service subscriptions and other offers you are welcomed to download from the Internet. There are a lot of tricky options to subscribe to online services, but remember that it is rather unsafe and potentially dangerous for your PC's security. Whenever you install any program or application, subscribe to a "free" service - do not forget to read an End User License Agreement and do not make next step if you see that software's vendor or service provider is allowed to install the third party software on your PC. Should you not read the EULA, you will be the only person who is guilty in malware's getting to your PC.

5. How can I protect my PC from malware and spyware?
  • use updated OS with a high level of malware protection system.
  • install patches and updates of your protection system if automatic update is not available.
  • do not asset your Administrative rights to any user who works at your PC as additional user.
  • use well known and specialized anti-malware software.
  • update the bases of your antivirus software if auto-update is not available.
  • World known and mostly used antiviruses use your personal firewall (hardware or software) to control an access to the Internet from your PC.
  • do not allow a remote access to your PC by unauthorized users.
  • do not open files and archives received from unreliable sources.
  • disable autorun option for all portable media sources that will not allow the run of codes stored there without your permission

Like it ? Share it.

Monday, March 17, 2014

Figlet in Kali Linux


Figlet display large characters made up of ordinary screen characters. Figlet prints its input using large characters (called “FIGcharacters”) made up of ordinary screen characters (called “sub-characters”). Figlet output is generally reminiscent of the sort of “signatures” many people like to put at the end of e-mail and UseNet message. It also reminiscent od the output of some banner programs, although it is oriented normally, not sideways.




1. How to install – Open Terminal, type apt-get install figlet and Press Enter.
(Click on image for large view)

2. Open figlet with help commands
Syntax – figlet –h

3. This is a simple example of figlet.

Ex – figlet Merry Christmas 

4. You can change your font style.
Syntax – figlet –f <fontname> Message
Ex- figlet –f pagga Merry Christmas
Here, I am giving you some Font Names :



ascii9
ascii12
bigascii9
bigascii12
bigmono9
bigmono12
circle
emboss
emboss2
future
letter
mono9
mono12
pagga
smascii9
smacii12
smblock
smbraille
smmono9
smmono12

wideterm

5. You can also change your filters.
Syntax – figlet –f <fontname> -F <fltername> Message
Ex – figlet –f pagga –F metal Merry Christmas
Here, I am giving you some filter Names :
Metal

gay
(Click on image for large view)

Like it ? Share it.

Sunday, March 16, 2014

Unlock/ Reset Android Pattern Lock/Password


Android is a very interesting and very interface and it has become very popular among mobile and gadget users been the operating system use now. The problem users face now is how to disable or unlock android phone password or pattern lock which has become common now. So, If you also forgot your android mobile's password or you have forgot your pattern lock then no need to worry i am going to tell you how can you reset your pattern lock without using gmail or any other things.

Steps:
  1. First you need to switch off your Android device.
  2. After switching off your android device, press your Up volume button + Power button and hold it too along with the volume up button. (Sometime you have to press “Volume up + Home Key + Power Button” So if above key combination will not work for you try this one.)
  3. It will start a secret terminal interface.
  4. Then press to use Home button for scroll up and down.
  5. Then you will get to the choose option DELETE ALL USER DATA.
  6. Select the option and wait
  7. Your device will take some time but after it will restart and you will find out your android device has been unlocked.



Warning - This is the process of getting back the factory setting, in this case may be your mobile data/setting will be reset. Kindly eject your Micro card before trying this. 

Like it ? Share it.