Monday, March 28, 2011

TROJANS

What is trojan?
  • An unauthorized program contained within a legitimate program. This unauthorized program performs ffunctins unkonown by the user. 
  • A legitimate program that has been altered by the placement of unauthorized code within it; this code performs functions known by the user
working of trojans
  • Attacker gets access to the trojaned syastema as the system goes online.
  • Byway of the access provided by the trojan attacker can stage attacks of different types.
various trojan genre
  • Remote Access Trojans(RAT)
  • Password Sending Trojans
  • Keyloggers
  • Destructive
  • Denial of Services(Dos) Attack Trojans
  • FTP Trojans
modes of transmissions:
Attachments, Physical access, Browser and e-mail software bugs, NetBIOS(file sharing), Fake Programs, Untrusted sites and Freeware Softwares.

Symptoms:
  • System is slow
  • Task Manager Disabled
  • unwanted Processes
  • unwanted Files or Folders on the disk
preventions:
  • Donot download software from any site which is not trusted.
  • Donot click on any file or folder that you are not sure what is it.
  • Donot click on any unknown link.
  • There are many Trojan removing software available( I dont know that they work or not, i have tried one but it didn't worked)
remember prevention is better than cure....
keep reading...

NEW TOOLBAR FOR MS OFFICE

Google has launched a special cloud connect toolbar which is inbuild in the office applications like ms-word, ms-powerpoint ms excel. With this toolbar u can save your ms office data to the server of google.

How it works:
You have to login into your google account through this toolbar. After that this toolbar automatically starts saving data. Untill your google account is active all the documents will be saved in encripted form in the google server.

Wednesday, March 16, 2011

Stegnography: Hide any text in any picture.

step1: Put any picture and notepad file on desktop or any where u want.
Step2: Goto command prompt. Then go to the location where u have kept the files(i.e. image and notepad files)
Step3: Now type in the command prompt: copy /b abc.jpg+bcd.txt xyz.jpg (note that my picture name is    abc and notepad file is bcd and xyz is the file which will be created.
step4: Now u can see a image having name xyz. which contains the text which was contained in the notepad file(bcd).
step5: To see the notepad content right click the image and choose open with notepad.
Ste6: You will see encripted texts. Don't worry. scroll down. At the last u will see the content of your notepad files.


If u feel any problem then write to me...

How to hide any text in the notepad

step1: Goto command prompt. Type cmd in the run option.
step2: write cd\
step2: Now you are in c:\>
step4 :type- notpad vikash.txt:hidden.txt
step5: it will ask u that the filename of notepad (here vikash) not found do you want to create?(you can see a new notepad file) click yes.
Step6: Now type the content u want to keep hidden. and save it.
Step 7: when u will open the file u will see nothing written on it.
Step 8: To see the content Type the same command again ie( notpad vikash.txt:hidden.txt). You will be able to see the content.

ATTACK ON NETWORK SECURITY

There are basically three types of attacks-
1) Reconnaissance attack- This attack basically deals with the information gathering which is later used to compromise the network. This type of attack includes- Packet sniffing, Port scan, Ping sweeps etc.

2) Access attacks- This attack is done when the vulnerability in the network is found in 1st stage. this attack includes-IP spoofing, password cracking(Brute force attack, Dictionary attack), Man in middle attack(Session Hijacking), Server Spoofing, Trust exploitation, Buffer overflow.

3)Denial of Service(DoS) attack- • DoS attacks prevent access to part or all of a computer system. They are usually achieved by sending large amounts of jumbled or otherwise unmanageable data to a machine that is connected to a corporate network or the Internet, blocking legitimate traffic from getting through. Even more malicious is a Distributed Denial of Service attack (DDoS) in which the attacker compromises multiple machines or hosts. Ex- ping broadcast, Ping of death, smurf, teardrop.

Tuesday, March 15, 2011

few things u would like to know

1) How to know your ip address?
step1: open command prompt or type cmd in run
step2: type ipconfi/all
step3:press enter
this will show your ip address, physicsal/ mac address, and subnet mask and default gateway of your internal network for all network interfaces.

To find the IP of your computer within internet -
go to site: www.whatismyip.com or
                  www.whatismyipaddress.com

you can easily change your ip using proxy websites like:

www.anonymizer.com or
www.samair.ru/proxy