Posts

Showing posts from April, 2014

Types of Security Attacks on Network

Image
Security attacks break the security barrier of the network and access the network resources . There are two types of security attacks carried on a network. Passive Attack - Defines an attack where an attacker just monitors the network. The attackers aim is not to alter the traffic but to just monitor what information is being transmitted over a network. This compromises the confidentiality of the data being transmitted. At any moment , the attacker can capture the traffic. Types of Security Attacks on Network  Active Attack - Defines an attack in which an attacker causes damage to the data being transmitted over a network. The attacker deletes ,  adds or alters information that is being transmitted over the network. The purpose of security attacks is to violate the protection over the network and to access the network traffic and resources. The other types of attacks that are carried over a network are as follows: Denial of Service (DOS) - Defines the most offensive

System does not start though fans are working - Troubleshoot

In some cases, you may not be able to access the drivers and the video also may not work. If the system does not start up, but the system fans work fine, it is mostly either a motherboard or CPU problem. 1 - Remove the CPU and restart it on the motherboard 2 - Check the seating of the CPU on the motherboard and ensure that is locked down 3 - Ensure that the motherboard power supply is properly connected 4 - Check all the ribbon cables to see that they are connected to the appropriate drives and are oriented properly 5 - Reset the BIOS settings to default 6 - Try the sage booting procedure with power up defaults , by referring to the motherboard manual 7 - If the system does not start up , the memory , CPU or motherboard are faulty 8 - Remove any additional memory and try starting with the minimum memory. Then swap the memory and try starting the same. if the system starts with either of the memories , then the other memory is faulty. 9 - Check all jumpers and conne

Easy and simple keyboard shortcuts for Lotus Notes

Lotus Notes also provides various keyboard shortcuts for navigating through different interfaces. To perform navigation, Lotus Notes uses the standard Microsoft Windows navigation keys. The commonly used keyboard shortcuts for Lotus Notes: alt+B Open bookmark list alt+F5 Restore Lotus Notes to default minimized size Arrow Keys Navigate within embedded components and objects , such as buttons on home page alt+7 then Arrow Keys then Enter Move position of active window alt+8 then Arrow Keys then Enter Change size of the window alt+9 Minimize active window alt+10 Maximize active window ctrl+tab Move to next windows tab ctrl+F6 Switch between open windows alt Access menu bar F6 Move to next pane or frame Shift+alt+S Open Search menu Shift+ctrl+tab Move to previous window tab Spacebar Open selected embedded element on home pa

How to access BIOS on different Computer manufactures

At some point of time working with different computer manufactures PC or Laptop it is unknown that how to access BIOS on the particular machine. Below are some useful info on accessing BIOS on HP,Dell,Acer,IBM,Sony,Toshiba and so on. Acer  F1,F2,Ctrl+Alt+Esc Compaq  F10 Dell 4400  F12 Dell Inspiron  F2 Dell Latitude  Fn+F1 (While booted) Dell Latitude  F2 (On boot) Dell Optiplex  Del or F2 Dell Precision  F2 HP  F1,F2 (Laptop Esc) IBM  F1 Sony VAIO  F2 Sony VAIO  F3 Toshiba  Esc

BIOS Beep Codes and Solutions

When a system is first powered on, the system runs a POST. If error are encountered during the POST, you usually see a text error message displayed on screen. Errors that occur very early in the POST may occur before the video card is initialized. These types of errors can not be displayed, so the system uses a series of beeps for communicating the error messages. the system pauses if any of the hardware connected to the system is not functioning properly. Below are AMI BIOS beep codes and Description with Solutions: 1 short beep DRAM refresh failure Clean the memory contacts and  reinstall it 2 short beep Memory parity circuit failure Clean the memory contacts and  reinstall it 3 short beep Base 64K RAM failure Clean the memory contacts and  reinstall it 4 short beep System timer failure Chcek the motherboard installation  for any loose contacts 5 short beep Processor failure Check the processor

Set pattern lock in computer just like android

Image
Billions of people they use Android phones most of them lock their phone with pattern lock. Why because It is just easy and user friendly.let us see how to lock your computer with pattern lock. just we need to install a free software which will enable a lock feature to your system. Eusing Maze Lock: This software is absolutely free. with the help of Eusing Maze Lock today we are going to lock our computer... Click here to download the software Set pattern lock in computer just like android Install it on your computer, once the installation completes, you will be prompted to set a pattern to lock your computer. Choose how ever you want it and do not forget it , that would be your password from now! If your friends or any stranger tries to access your computer with wrong pattern for 3 times,the software will start giving warning with siren...! :) Isn't it interesting?! So, What are you waiting for... download it and have fun.. (If you are not able to do

Tips to create super strong passwords easely

Image
Simplest way to create a super strong passwords for your online websites.  Tips to create super strong passwords easely A strongest password should have : -at least right characters long -should not contain your username or company name -should not be a dictionary word -should not be similar to your old password -should be mixture of Uppercase letters, lowercase letters,numbers,Symbols. Easy tip to remember your strong passwords: I love my mom - !L0veMyM0m$ I love cricket - 1L0v3Cr!ck37 If you create in this way you will be able to remember your password and also it is very much difficult to hack.

Change your password right now - Heartbleed

Image
                 " The Heartbleed Bug is a serious vulnerability in the popular OpenSSL cryptographic software library. This weakness allows stealing the information protected, under normal conditions, by the SSL/TLS encryption used to secure the Internet.  Change your password right now - Heartbleed SSL/TLS provides communication security and privacy over the Internet for applications such as web, email, instant messaging (IM) and some virtual private networks (VPNs). " http://heartbleed.com/ Change your passwords of :   Facebook Twitter Pinterest Google  Tumblr Flickr Linkedin Slideshare Yahoo! AOL  Hotmail Dropbox Soundcloud These are the most popular sites and applications. I'd recommend you to have stronger password for all your websites. Click here How to create a strong password.

Directories in LINUX for Beginners

Directory: /bin /bin contains the binaries which are needed to run LINUX. Directory: /boot /boot has all the files required for booting LINUX on system. Directory: /dev /dev has the devices for all the files. Directory: /etc /etc contains the configuration files of the various software. Normally no one touch this directory. - Directory: /home /home is like My Documents in Windows. This contains the username as the sub directory. - Directory: /lib /lib contains the libraries required fo r the system files. - Directory: /lost+found /lost+found contains the files which are damaged or which are not linked to any directory These damages are due to the incorrect shutdown. - Directory: /mnt This is the directory in which we mount the devices and other file systems. - Directory: /opt Here the optional softwares are installed. - Directory: /root The directory for the user root

35 Basic and Important Commands of Linux OS

When we start using Linux at least we should know the below basic commands. 1. ls -l To list  the files as well as directories those are kept in the particular working directory Syntax [root@sonaby]#ls -l 2. ls -la Same use as 'ls -l' but  this command helps to see the hidden files. Syntax  [root@sonaby]#ls -la 3. ls -li Same as 'ls -la' but it will also shows the Inode number of each and every file Syntax  [root@sonaby]#ls -li 4. ls To see only file name. Syntax  [root@sonaby]#ls 5. clear To clear the screen (short cut Ctrl+l) Syntax  [root@sonaby]#clear 6. exit To end a current session Syntax  [root@sonaby]exit 7. touch To create a new empty file Syntax  [root@sonaby]#touch 8. cd To change the working/present directory Syntax  [root@sonaby]#cd /home/test 9. cat To view the contents of a file and it is also used for creating a new file with some contents Syntax  [root@sonaby]#cat <file name> to view file contents 10. mkdir To make a new directory Syntax  [root@s

10 basic things you should know about Shell

-  The shell is a unique and multi- faceted program.  - The shell is a command interpreter and a programming language in built.  - There are various types of shells. - The commonly used shells are Bourne Shell (sh), C Shell (csh or tcsh) and Korn Shell    (ksh). - The first shell is Bourne Shell (sh). - These shells have their own built in functions which allow for the creation of the shell   scripts.  - Through the shell, user interacts with the kernel. - The prompt for the Bourne shell is $ or # for the root user and the prompt for the C     shell is %. - We can start shell and exit by using the CTRL+D. - All shells use different syntax and provide different services.

Fun with Firefox Browser..!

Image
Here is small trick that you can do with Firefox. It is just for a fun.. :) chrome://browser/content/browser.xul Copy this and paste it in your Firefox address bar and press Enter. Do this as much you want.. Also read : Write one liner Batch Script to Take Your File Backup 7 Types of Dangerous Virus 2 Software to Keep Your Passwords Safe and Secure

How to create a Super Mandatory Profile ?

Image
The super mandatory profile is a mandatory profile with an additional layer of security. Windows OS must successfully load the super mandatory profile or the user cannot log on to the workstation.  Windows OS will create a temporary profile for the user based on the default network user profile or the default local user profile. Windows Vista deletes temporary profiles when the user logs off. Super mandatory profiles prevent creating a temporary user profile and restrict the user from logging on, should there be any problem with finding or loading the mandatory profile. How to create a Super Mandatory Profile  Create a super mandatory profile 1.    Create a mandatory profile by following the Create a mandatory profile procedure. 2.    While logged on as a domain administrator, connect to the network share you created or used in step 1. This should be the share path to the roaming or mandatory user profile. For example, the share path in the test.com domain is \\finance\RUP\.