Saturday, May 17, 2014

How To Bypass Adf.Ly, Linkbucks etc


Sometime we need to download very important data from the internet but those links are attached with adfly and other ads network website. There are serious problem now a days adf.ly has been blocked in India and some other countries, by the Department of Telecom (DoT). So any user trying to access adf.ly links get a notice or link down error. This Adf.ly skipper tool not requires to adf.ly servers up. So you can use this tool when a adf.ly link is down (not loading) or giving you whatever error. This Tool will bypass adfly link and gives you original link which is behind the adfly.
So, Now you do not need to worry if adfly and other ads network website blocked in your country.


How to Use this Tool ?
1. Open one of the below links
  • http://de-ads.net
  • http://dead.comuv.com/index.php
  • http://adf.boxxod.net
  • http://dead.esy.es/

(Click image for large view)


2. Paste your adfly or other link without http://www. then click on Deadfly.

3. After 4-6 second you will get your original link.
(Click image for large view)

Note - We can use bypass adf.ly (also custom domain), linkbucks.com, tubeviral.com, tinylinks.co, adfoc.us, q.gs, 9.bb, u.bb, j.js, bc.vc, ref.so and 50+ URL shortener links.

Like it ? Share it.

Thursday, May 15, 2014

Kali Linux Tools

Type: E-Book

In this E- Book we are presenting Complete Kali Linux Tools List with short description. This is will help you to understand each and every tool which available in Kali Linux as well you will able to recognize which tool you should work for your Attack.



Like it ? Share it.

Tuesday, May 13, 2014

How to Move Kali Linux Taskbar


Taskbar is most common in any operating system. If you are Windows user you are addicted to use your Windows taskbar at the bottom of your system. When we come to Linux it is usually at the Top of system. Kali Linux has taskbar at the top if you are feeling irritate you can move your taskbar wherever you want. 

(Click image for large view)

1. Press Alt + Right Click on the Taskbar then Click on Properties

2. Now, Click on Arrow Symbol and choose your Taskbar Place from drop down menu.
(Click image for large view)


Like it ? Share it.

Monday, May 12, 2014

Web Hosting


What is Website Hosting? 
A web hosting service is a type of Internet hosting service that allows individuals and organizations to make their website accessible via the World Wide Web. When you create website, it is composed of web pages having text, images, videos and other content for people to see them. However, people can see your website only when it is available on the Internet. To make your website available on the Internet, you have to store it on a computer called web server. When you buy some space on a web server and store your webpages there, your website becomes hosted and can be seen by anyone.

What is Web Server? 
A web server is the computer on which the web pages of your website are stored. It delivers or ‘serves’ the content of your website to the users through Internet. The computer which acts as server has to have very high specifications. It is also connected to the Internet through very powerful link. The web hosts or the web hosting companies have their own servers on which they rent out space to you so that you can host your website and make it accessible to the general public.


Who is Web Host?
Any person or company who owns a server and rents out web space for website hosting can be called the web host. Some web hosts do not own servers but rent a server from some large web hosting company and then resell the space under their own brand.The large web hosting companies even own their datacenter (collection of servers) where they can host millions of websites. Datacenters have many computer servers connected to the Internet with fast connections, back up and high security.

What are the Basic Features of a Web Hosting Plan? 
Disk Space - Disk space means the amount of storage space provided to you by your web hosting provider. You need disk space to store your web files composed of text, images, video, audio, etc.

Bandwidth - Bandwidth means the amount of data that a website can transfer over a period of time. It determines the speed of your website. More bandwidth means more speed. The less bandwidth your site has, the slower it takes for it to load.

Uptime - Uptime means the percentage of time that a hosting server stays up or running. 99.99% uptime would mean that your website will go down only for about 8 hours in a year while 98% uptime would mean that your website may remain down for about 7.3 days in a year.

Programming Services - The website hosting packages also let you create web pages with programming languages including HTML, PHP, ASP as well as databases.

Customer Service - This is one of the basic and most essential features that one should look for while selecting website hosting service. A good customer service will help you whenever you will feel trouble.

What are the Types of Web Server Hosting? 
Shared Hosting - Shared hosting refers to when your web site is hosted on a server along with many other customers' web sites. Your users won't know this - your web site is still configured as a separate web site on the server and can still have its own domain name etc. It is simply sharing the server with other web sites.The entry level websites don’t need high performance features and thus, shared hosting can fulfill their needs without having to pay larger amounts of money.

Dedicated Server Hosting - This is a server that hosts only your web site or web sites. This can give you more control over your web site. It can also help in ensuring that other customers' web sites don't impact on your web site. Using dedicated servers is much more expensive than shared hosting, but if your site receives lots of traffic or you have other requirements (such as extra security requirements), a dedicated server could be for you.

Cloud Server Hosting - It is new in the Market Based on the innovative cloud computing technologies, cloud hosting is done through multiple servers inter connected with each other. This is unlike shared or dedicated server hosting that are provided through only one server. The multiple servers acting as a single system has multiple advantages like load balancing, no single point of failure, non-reliance on a single server leading to higher security and also the facility to increase or decrease server resources as per your needs. It is also cost effective web hosting solution as the website hosting companies charge you for cloud hosting services on the basis of usage. As you can scale your resources up and down on a cloud server, you are able to use more resources only on the days when you expect higher traffic.

Virtual Dedicated Servers - Also known as virtual private servers, virtual dedicated servers are a low-cost alternative to dedicated servers. The web host can put many virtual servers on each machine, therefore reducing costs. When you log in to the virtual server, it appears as though you have your own dedicated server (even though other virtual servers are probably running on the same machine).

Reseller web hosting - It allows clients to become web hosts themselves. Resellers could function, for individual domains, under any combination of these listed types of hosting, depending on who they are affiliated with as a reseller. Resellers' accounts may vary tremendously in size: they may have their own virtual dedicated server to a colocated server. Many resellers provide a nearly identical service to their provider's shared hosting plan and provide the technical support themselves.

Why Do You Need Web Hosting?
A lot of people tend to think that registering a domain name is good enough to get a website active. What they fail to understand is that a domain is as good as your name, a name by which others may recognize you. In order to get a website active and live on the internet, you need to host a website. If you are seeking to build a website without taking web hosting services, registering domain names will serve no purpose. Having a web hosting account is very important in order to get a website hosted. A web hosting company makes it possible for your website to be accessed by everyone on the web.

Like it ? Share it.

Sunday, May 11, 2014

The Linux Command Line - 13.07


    Type: E-Book
Why Use The Command Line?
Have you ever noticed in the movies when the “super hacker,” — you know, the guy who can break into the ultra-secure military computer in under thirty seconds — sits down at the computer, he never touches a mouse? It's because movie makers realize that we, as human beings, instinctively know the only way to really get anything done on a computer is by typing on a keyboard!
Most computer users today are only familiar with the graphical user interface (GUI) and have been taught by vendors and pundits that the command line interface (CLI) is a terrifying thing of the past. This is unfortunate, because a good command line interface is a marvelously expressive way of communicating with a computer in much the same way the written word is for human beings. It's been said that “graphical user interfaces make easy tasks easy, while command line interfaces make difficult tasks possible” and this is still very true today.
Since Linux is modeled after the Unix family of operating systems, it shares the same rich heritage of command line tools as Unix. Unix came into prominence during the early 1980s (although it was first developed a decade earlier), before the widespread adoption of the graphical user interface and, as a result, developed an extensive command line interface instead. In fact, one of the strongest reasons early adopters of Linux chose it over, say, Windows NT was the powerful command line interface which made the “difficult tasks possible.”


What This Book is about
This book is a broad overview of “living” on the Linux command line. Unlike some books that concentrate on just a single program, such as the shell program, bash, this book will try to convey how to get along with the command line interface in a larger sense. How does it all work? What can it do? What's the best way to use it?
This is not a book about Linux system administration. While any serious discussion of the command line will invariably lead to system administration topics, this book only touches on a few administration issues. It will, however, prepare the reader for additional study by providing a solid foundation in the use of the command line, an essential tool for any serious system administration task.
This book is very Linux-centric. Many other books try to broaden their appeal by including other platforms such as generic Unix and OS X. In doing so, they “water down” their content to feature only general topics. This book, on the other hand, only covers contemporary Linux distributions. Ninety-five percent of the content is useful for users of other Unix-like systems, but this book is highly targeted at the modern Linux command line user.
Like it ? Share it.

Saturday, May 10, 2014

Denial of Service (DoS)


A Denial of Service (DoS) attack is a malicious attempt to make a server or a network resource unavailable to users, usually by temporarily interrupting or suspending the services of a host connected to the Internet.

DoS and DDoS Attack

It is important to differentiate between Denial of Service (DoS) and Distributed Denial of Service (DDoS) attacks.

In a DoS attack, one computer and one internet connection is used to flood a server with packets, with the aim of overloading the targeted server’s bandwidth and resources.
A DDoS attack, uses many devices and multiple Internet connections, often distributed globally into what is referred to as a botnet. A DDoS attack is, therefore, much harder to deflect, simply because there is no single attacker to defend from, as the targeted resource will be flooded with requests from many hundreds and thousands of multiple sources.


Types of DoS Attacks

The most common type of Denial of Service attack involves flooding the target resource with external communication requests. This overload prevents the resource from responding to legitimate traffic, or slows its response so significantly that it is rendered effectively unavailable.
Resources targeted in a DoS attack can be a specific computer, a port or service on the targeted system, an entire network, a component of a given network any system component. DoS attacks may also target human-system communications (e.g. disabling an alarm or printer), or human-response systems (e.g. disabling an important technician's phone or laptop).
DoS attacks can also target tangible system resources, such as computational resources (bandwidth, disk space, processor time); configuration information (routing information, etc.); state information (for example, unsolicited TCP session resetting). Moreover, a DoS attack can be designed to: execute malware that maxes out the processor, preventing usage; trigger errors in machine microcode or sequencing of instructions, forcing the computer into an unstable state; exploit operating system vulnerabilities to sap system resources; crash the operating system altogether.
The overriding similarity in these examples is that, as a result of the successful Denial of Service attack, the system in question does not respond as before, and service is either denied or severly limited.

Types of DDoS Attacks

DDoS attacks can divided in three types:
  • Volume Based Attacks - This type of attack includes UDP floods, ICMP floods, and other spoofed packet floods. The goal of this DDoS attack is to saturate the bandwidth of the attacked site. The magnitude of a volume-based attack is usually measured in Bits per second.
  • Protocol Attacks - This type of DDoS attack consumes the resources of either the servers themselves, or of intermediate communication equipment, such as routers, load balancers and even some firewalls. Some examples of protocol attacks include SYN floods, fragmented packet attacks, Ping of Death, Smurf DDoS and more. Protocol attacks are usually measured in Packets per second.
  • Application Layer Attacks - Perhaps the most dangerous type of DDoS attack, application layer attacks are comprised of seemingly legitimate and innocent requests. The intent of these attacks is to crash the web server. SDome examples of application layer attacks include Slowloris, Zero-day DDoS attacks, DDoS attacks that target Apache, Windows or OpenBSD vulnerabilities and more. The magnitude of this type of attack is measured in Requests per second.

Symptoms and Manifestations

The United States Computer Emergency Readiness Team (US-CERT) defines symptoms of denial-of-service attacks to include:
  • Unusually slow network performance (opening files or accessing web sites)
  • Unavailability of a particular web site
  • Inability to access any web site
  • Dramatic increase in the number of spam emails received—(this type of DoS attack is considered an e-mail bomb)[2]
  • Disconnection of a wireless or wired internet connection
  • The term "hit offline" being used on you, then you (the target) may disconnect from the internet
Denial-of-service attacks can also lead to problems in the network 'branches' around the actual computer being attacked. For example, the bandwidth of a router between the Internet and a LAN may be consumed by an attack, compromising not only the intended computer, but also the entire network.
If the attack is conducted on a sufficiently large scale, entire geographical regions of Internet connectivity can be compromised without the attacker's knowledge or intent by incorrectly configured or flimsy network infrastructure equipment.

Methods of attack

A "Denial-of-Service" attack is characterized by an explicit attempt by attackers to prevent legitimate users of a service from using that service. There are two general forms of DoS attacks: those that crash services and those that flood services.
A DoS attack can be perpetrated in a number of ways. The five basic types of attack are:
  • Consumption of computational resources, such as bandwidth, disk space, or processor time.
  • Disruption of configuration information, such as routing information.
  • Disruption of state information, such as unsolicited resetting of TCP sessions.
  • Disruption of physical network components.
  • Obstructing the communication media between the intended users and the victim so that they can no longer communicate adequately.
A DoS attack may include execution of malware intended to:[citation needed]
  • Max out the processor's usage, preventing any work from occurring.
  • Trigger errors in the microcode of the machine.
  • Trigger errors in the sequencing of instructions, so as to force the computer into an unstable state or lock-up.
  • Exploit errors in the operating system, causing resource starvation and/or thrashing, i.e. to use up all available facilities so no real work can be accomplished or it can crash the system itself
  • Crash the operating system itself.
Preventing DoS and DDoS Vulnerabilities

Defending against Denial of Service attacks typically involves the use of a combination of attack detection, traffic classification and response tools, aiming to block traffic that they identify as illegitimate and allow traffic that they identify as legitimate. A list of prevention and response tools is provided below:

Firewalls
Firewalls can be setup to have simple rules such to allow or deny protocols, ports or IP addresses. In the case of a simple attack coming from a small number of unusual IP addresses for instance, one could put up a simple rule to drop all incoming traffic from those attackers.
More complex attacks will however be hard to block with simple rules: for example, if there is an ongoing attack on port 80 (web service), it is not possible to drop all incoming traffic on this port because doing so will prevent the server from serving legitimate traffic. Additionally, firewalls may be too deep in the network hierarchy. Routers may be affected before the traffic gets to the firewall. Nonetheless, firewalls can effectively prevent users from launching simple flooding type attacks from machines behind the firewall.

Some stateful firewalls, like OpenBSD's pf packet filter, can act as a proxy for connections: the handshake is validated (with the client) instead of simply forwarding the packet to the destination. It is available for other BSDs as well. In that context, it is called "synproxy".

Switches
Most switches have some rate-limiting and ACL capability. Some switches provide automatic and/or system-wide rate limiting, traffic shaping, delayed binding (TCP splicing), deep packet inspection and Bogon filtering (bogus IP filtering) to detect and remediate denial of service attacks through automatic rate filtering and WAN Link failover and balancing.
These schemes will work as long as the DoS attacks are something that can be prevented by using them. For example SYN flood can be prevented using delayed binding or TCP splicing. Similarly content based DoS may be prevented using deep packet inspection. Attacks originating from dark addresses or going to dark addresses can be prevented using Bogon filtering. Automatic rate filtering can work as long as you have set rate-thresholds correctly and granularly. Wan-link failover will work as long as both links have DoS/DDoS prevention mechanism.

Routers
Similar to switches, routers have some rate-limiting and ACL capability. They, too, are manually set. Most routers can be easily overwhelmed under DoS attack. Cisco IOS has features that prevent flooding, i.e. example settings.

Application Front-end Hardware
Application front end hardware is intelligent hardware placed on the network before traffic reaches the servers. It can be used on networks in conjunction with routers and switches. Application front end hardware analyzes data packets as they enter the system, and then identifies them as priority, regular, or dangerous. There are more than 25 bandwidth management vendors.

IPS Based Prevention
Intrusion-prevention systems (IPS) are effective if the attacks have signatures associated with them. However, the trend among the attacks is to have legitimate content but bad intent. Intrusion-prevention systems which work on content recognition cannot block behavior-based DoS attacks.
An ASIC based IPS may detect and block denial of service attacks because they have the processing power and the granularity to analyze the attacks and act like a circuit breaker in an automated way.
A rate-based IPS (RBIPS) must analyze traffic granularly and continuously monitor the traffic pattern and determine if there is traffic anomaly. It must let the legitimate traffic flow while blocking the DoS attack traffic.

DDS Based Defense
More focused on the problem than IPS, a DoS Defense System (DDS) is able to block connection-based DoS attacks and those with legitimate content but bad intent. A DDS can also address both protocol attacks (such as Teardrop and Ping of death) and rate-based attacks (such as ICMP floods and SYN floods).
Like IPS, a purpose-built system, such as the well-known Top Layer IPS products, can detect and block denial of service attacks at much nearer line speed than a software based system.

Blackholing and Sinkholing
With blackholing, all the traffic to the attacked DNS or IP address is sent to a "black hole" (null interface, non-existent server, ...). To be more efficient and avoid affecting network connectivity, it can be managed by the ISP.
Sinkholing routes to a valid IP address which analyzes traffic and rejects bad ones. Sinkholing is not efficient for most severe attacks.

Clean Pipes
All traffic is passed through a "cleaning center" or a "scrubbing center" via various methods such as proxies, tunnels or even direct circuits, which separates "bad" traffic (DDoS and also other common internet attacks) and only sends good traffic beyond to the server. The provider needs central connectivity to the Internet to manage this kind of service unless they happen to be located within the same facility as the "cleaning center" or "scrubbing center".

Like it ? Share it.

Friday, May 9, 2014

Folder Option is Missing in Windows Vista/ Windows 7


The Folder Options dialog box lets users set many properties of Windows Explorer, such as Active Desktop, Web view, Offline Files, hidden system files, and file type. Folder option" is most usable thing in Windows System. You can do a lot by using Folder option like hide/show files etc.

Error Details : This operation has been cancelled due to restrictions in effect on this computer. Please contact your system Adminstrator.
(Click image for large view)

You must be signed in as and administrator to be able to do the steps in this tutorial.
1. Press Windows + R and type gpedit.msc then click on OK

2. A windows will appear. This is Local Group Policy. Now go to 
User Configuration → Administrative Templates → Windows Components → Windows Explorer. Now carefully watch the list there you will see "Remove the Folder Options menu item from the Tools menu " Right Click on this and click on Edit

3. Now select Disabled and Click OK
(Click image for large view)

4. Restart System.



Note - This tutorial is also useful if you want to Enable/Disable your folder option for some reason. Above method tells you how can you Enable Folder Option. If you want to Disable Folder Option. you just need to choose Enabled option from Image no 3 
In short :

To Enable Folder Options
Select Disabled or Not Configured and click on OK. (Image No 3)
NOTE: Not Configured is the default setting.

To Disable Folder Options
Select Enabled and click on OK. (Image No 3 but you just need to choose Enabled)