Hiển thị các bài đăng có nhãn Network Security. Hiển thị tất cả bài đăng
Hiển thị các bài đăng có nhãn Network Security. Hiển thị tất cả bài đăng
10 System Admin Tools to Help You Secure Your Network

10 System Admin Tools to Help You Secure Your Network




System admins are frequently bombarded with security concerns, requests, alerts, news items, “did you see this?!” emails, and more. Keeping up with all the aspects of network security can seem like an overwhelming task, but in this post we’re going to look at ten tools a system admin can use to help secure their network. Some you may be familiar with, like network security software, while
Find If A Website Is safe To Open or not using Online sites and Tools

Find If A Website Is safe To Open or not using Online sites and Tools


In last post, we explained how to check if the site is safe or not using the McAfee Advisor.  Now i am going to introduce some other sites and tools for testing the site is safe to open or not.

Websites To check sites:Norton Safeweb:
Norton Safeweb is free online application provided by Norton Security. It works same in way as McAfeeAdvisor.
You can check the site safety here:
http://
How to check if a website is safe to use or not? | McAfee SiteAdvisor

How to check if a website is safe to use or not? | McAfee SiteAdvisor

Cyber world is most risky world.  Here you may not know you are being attacked until your system completely destroyed or your data stolen.

if you trust whatever you website you see in Internet, then your data and system are in risk.  Website can spread malwares , this malware can infect your system without your knowledge.  In order to get protection from those sites, we have to identify harmful
How to Hide email address when sending mail to Multiple Recipients

How to Hide email address when sending mail to Multiple Recipients

Recently, i got mail from my Institute(where i learned Java) regarding the Interview. when i look into the To address, it includes other email address (including girls email address).  This is not big matter when you send mail within organization. What if suppose you send to others.

Just for fun:Just imagine you have two girl friends.  Forwarding some interesting mail to both.  If anyone notice
Could Your Bad Password Habits Come Back To Haunt You?

Could Your Bad Password Habits Come Back To Haunt You?


According to Business Insider, the CEO of a major social network used its trusted database of user passwords in order to hack into one of its user’s email accounts. The hack was based on the guess that this user probably accessed all of their accounts using the same password.

Although the cloud has provided us with some amazing new tools, it’s also created the need for increased end-user
How to recover a Hacked or Compromised Gmail Account?~Security Tips

How to recover a Hacked or Compromised Gmail Account?~Security Tips


Now a days, hacking gmail account is increasing.  Most of people doesn't know how to be secure(because they doesn't visit 2viet.blogspot.com).  So please refer our website to your friends as Security tips Blog. Ok let me come to the point.  In this article, i will explain how to recover your hacked or compromised gmail accounts.

First of all verify yourself whether your entering the correct
Bikini-clad women and photo tags | Facebook scammers

Bikini-clad women and photo tags | Facebook scammers

I have explained about Facebook scamming in my previous posts.  Still people believe that "Facebook will provide Facebook visitors tracker".  If you believe also, please read this article.  This is not only for Facebook users but also for twitter users.



A new Facebook is spreading over the Facebook.  Attacker tag your name in some hot women photos, it will probably displayed in your
How to Re-Enable Task Manager,System Restore,cmd,run,Registry? Fixed

How to Re-Enable Task Manager,System Restore,cmd,run,Registry? Fixed

Hi friends, today i faced a problem.  A virus attacked my XP. I was unable to use Task Manager, System Restore,cmd,run,Registry.


This malware disabled important windows features(task manager, system restore,.......)



Whenever i try to open the Task Manager, it pop this error message as " Task Manager is Disabled by Administrator. Contact admin" .

When i try to use System restore "it said
How does your Website becomes vulnerable to SQL Injection?

How does your Website becomes vulnerable to SQL Injection?

Developer is the one and only reason for the SQL Injection Vulnerability. While developing the Web Application, he fails to handle some vulnerability(because he doesn't know about it. Don't be one of them. If you are Web Application developer, then you must read these security techniquest in order to overcome the SQL Injection Vulnerability.



Reason 1:Incorrectly filtered escape
A Guide to Online Anonymity - How can i be completely untraceable ?

A Guide to Online Anonymity - How can i be completely untraceable ?


Definition:
The act of keeping your identity hidden online by using connection methods and encryption methods, to make yourself untraceable to a person, website, company, school or whatever else you are doing/connecting to.


Uses of Anonymity:Stay hidden when attacking a website or scanning it for vulnerabilities.
Keep your browsing history/activity hidden when at work, school, library or
How to Setup your own Proxy Server For Free using Hamachi and Privoxy?

How to Setup your own Proxy Server For Free using Hamachi and Privoxy?

Read this post to know  What is proxy server?
Why should i use Proxy server?

Open Wi-Fi Connections:
It is possible for anyone to monitor everything you do on an Open Wi-Fi Network. Not all sites that you visit may use HTTPS Encryption. Sometimes even sites that do use HTTPS only do so for certain actions and then revert to regular unencrypted HTTP connections, which are visible by anyone on
SQL Inject Me -SQL Injection Tool to test the Vulnerability for Pen Testers

SQL Inject Me -SQL Injection Tool to test the Vulnerability for Pen Testers

So far i have written what is sql Injection, How to prevent SQL Injection? .  In this post, i am going to introduce a new SQLi tool for Pen Testers and Webmasters.
The tool name is SQL Inject Me.

What is SQL Inject Me?
SQL Inject Me is Mozilla addon that is used to test the SQL Injection Vulnerability of Web Application.  It reduces the workload of Manual SQL Injection Test.  This is especially
How to Prevent SQL Injection Vulnerability? Website Security

How to Prevent SQL Injection Vulnerability? Website Security

Hi webmasters and budding Pen Testers, I hope you read my article about SQL Injection. Our Aim is to provide Security, right? So here is the prevention techniques.




Use Prepared Statements:

Use prepared statements, parameterized queries, or stored procedures. Don't use Dynamic SQL.
In Java you can use PreparedStatement() with bind variables 
In .NET you can use parameterized queries, such as
What is Virtual and Physical Ports?-Hackers tutorials

What is Virtual and Physical Ports?-Hackers tutorials


There two different ports are there.

First one is Physical Ports that are used to connect two different hardwares.  It will available behind your CPU. The different types of physical ports :
Ethernet ports
USB ports
Serial/Parallel ports
Using the physical ports only, we connect the Keyboard,monitor,Mouse,Modem to your CPU.



Second one is Virtual Port
We know that physical ports used to
Apache Log Extractor Tool for Pen Testers

Apache Log Extractor Tool for Pen Testers

We know that Apache Server is Famous Web server.  Let us see what is Apache log extractor tool .
What is Apache Log Extractor Tool?
Apache Log Extractor is a quick script to export URL information from Apache access logs. The thought behind this script was to provide a list of known URL’s on a remote server by analysing the logs. This list could then be used as the input for further testing tools
Scan files for Virus and Keylogger in Online for free-VirusTotal.com

Scan files for Virus and Keylogger in Online for free-VirusTotal.com

Usually if we download free software from public file hosting service website, it may contain some virus or keylogger.  If you run the program without scanning, it leads to problem in your computer. So it is necessary to scan your files before you run or open.

For scanning purpose, you don't need any anti virus but Internet.

VirusTotal.com will scan your file and give reports about the file.