Jump to content

rusnaki

Members
  • Posts

    11
  • Joined

  • Last visited

  • Days Won

    1

rusnaki last won the day on June 20 2014

rusnaki had the most liked content!

About rusnaki

  • Birthday 08/08/1955

Converted

  • Biography
    Pinguin
  • Location
    Unknown
  • Interests
    $/€
  • Occupation
    Top Secret

Recent Profile Visitors

The recent visitors block is disabled and is not being shown to other users.

rusnaki's Achievements

Newbie

Newbie (1/14)

29

Reputation

  1. Really? cum sa inseli lumea mai bine si eficient?
  2. The Guide Show Step-by-Step How Disabling Secure Boot and Boot from CD/DVD Installation Media on Windows 8 with Uefi and so Usually for any PC with Windows8 Pre-Installed. The Content and Details of Windows 8.1 How-to Disable Secure Boot for Linux Installation Give Focus Only to the Essentials Instructions and Commands and Make the Tutorial Easier to Read and Digest. 1.Settings https://dg139.s3.amazonaws.com/win8/enablingBootFromCdDvdWindows8/1-windows8Settings.jpg 2.Search “boot” >> Change Advanced Startup Options 3.Advanced Start-Up > Restart Now 4.Select Troubleshoot 5.Click on Advanced Options 6.Choose UEFI Firmware Settings 7.Confirm Restart 8.In Bios Select the Advanced Tab Disabling Secure Boot 9.Select the Boot Options Tab Launch CSM = Always 1St Boot Device = DVD Disable All Boot Options on Bottom F10 to Save and Boot. After You Should be Finally Free to Evade from Win8 and Booting on Linux! Source : Tutorial for Linux » Windows 8.1 How-to Disable Secure-Boot and Boot from CD/DVD on Uefi PC and Pre-Installed
  3. Daca ai cablu USB incearca sa instalezi ultimul soft. In caz ca nu merge inseamna ca e dus LCD. Dar ca sa fii sigur poti merge cu el la service. Bafta
  4. Looking for more reading material to quench the thirst for Linux knowledge? If so, take a look at the book called “The Art of Unix Programming” by Eric S. Raymond. You can find it online here: The Art of Unix Programming
  5. Wanted to watch TV on your Linux box, and preferably for free? https://code.google.com/p/freetuxtv/ is an online TV player which was originally developed to let the subscribers of French ISPs (e.g., Free, Orange, SFR) watch live TV channels streamed by those ISPs. Over time, FreetuxTV has added additional free online TV, web radio and webcam channels to the list, and now the (crowdsourced) FreetuxTV WebTV Manager carries channels in over 50 different languages. While FreetuxTV channels are not premium quality in any means (and for good reason), it can still be a good option especially for expats who typically don't have the luxury to watch live TV programs or radio of their home countries. In this tutorial, I am going to describe how to watch free online TV on Linux using FreetuxTV. Install FreetuxTV on Linux First, you need to install VLC as FreetuxTV uses VLC backend to play TV or radio channels. Refer to this tutorial How to install VLC media player on Linux - Linux Questions & Answers to install VLC on your Linux system. After that, follow the distro-specific guidelines below to compile and install FreetuxTV. The latest FreetuxTV is built with GTK3-based GUI. To install FreetuxTV on Debian, Ubuntu or Linux Mint: $ wget https://freetuxtv.googlecode.com/files/freetuxtv-0.6.6.tar.gz $ tar xvfvz freetuxtv-0.6.6.tar.gz $ sudo apt-get install gcc make autoconf automake intltool libtool gettext libgtk-3-dev libdbus-glib-1-dev libsqlite3-0 libsqlite3-dev libcurl3 libcurl4-openssl-dev libvlc-dev libnotify-dev $ cd freetuxtv-0.6.6 $ ./autogen.sh $ ./configure --prefix=/usr/local $ make $ sudo make install To install FreetuxTV on Fedora: $ wget https://freetuxtv.googlecode.com/files/freetuxtv-0.6.6.tar.gz $ tar xvfvz freetuxtv-0.6.6.tar.gz $ sudo yum install vlc-devel dbus-glib-devel libnotify-devel libcurl-devel intltool gtk3-devel sqlite-devel $ cd freetuxtv-0.6.6 $ ./autogen.sh $ ./configure --prefix=/usr/local $ make $ sudo make install Watch Online TV with FreetuxTV $ freetuxtv The first time you run FreetuxTV, you will be asked to add channel group(s) you are intrested in. The channels are categorized by languages. Once you add one or more channel groups, it will appear in the left sidebar of FreetuxTV. To watch a TV channel, simply click on the corresponding icon. Record Live TV with FreetuxTV Since live broadcasting has varying time schedules across different countries in different timezones, FreetuxTV is also designed to allow you to record live TV or radio at scheduled time slots, so you can enjoy them later at your convenience. To record the current channel, click on the record icon at the bottom. It will pop up a window where you can set the recording period. Once you start recording, you can check the status of recording by clicking on "Recordings" tab on the left. You can choose among different transcoding formats in the Preferences window.
  6. Domain Name System (DNS) is one of the most critical services in the Internet. Without DNS, we would not be able to access the web. Before going into the details on how DNS works, a little on the background may be helpful. When you are accessing, say, Google, your traffic originates from your computer, goes through the backbone of your ISP, and then their own upstream provider and so on; until it reaches Google's network. In the TCP/IP-based current Internet, the transit communication from your computer all the way to Google's network is driven by a set of intermediate routers based on the IP address of the destination web server of Google. This means we need to know the IP address of Google's web server to access Google service. However, it is almost impossible for us to keep more than hundreds of IP addresses in our memory. What if there could be a mechanism to map IP addresses to domain names that are easy to remember? That is where DNS services come in, which keep directories of all domain names and their associated IP addresses. So if we want to communicate with a particular web server, we can use its domain name, say, Example Domain. DNS server then handles the translation of the domain name to its IP address, so that our computer can communicate with the destination web server with the IP address. Advantages of using DNS * For end users, using Internet is far easier. * For service providers, DNS allows them to design, cluster, load balance, tune and backup the network without service interruptions. This is possible as they can control the server/host that a user communicates with simply by changing DNS records. Before we get into the details of how DNS actually works, we need to understand some terms used in the industry. Terminology The following section is a long list of definitions. To have a firm grasp on the operation of DNS, it is important that we understand them. However, if they are too much to digest all at once, especially for the beginners, you may read through them once and move on to the next part. You can come back later to go over the hierarchy again. Believe me; they will start to make sense as the pieces fall together. Back on the topic, all DNS names are hierarchical. The standards and RFC regarding DNS can be found here DNS related RFCs . The most prominent among them is RFC 1035 - Domain names - implementation and specification DNS Syntax All DNS names are hierarchical and are typically divided into 3 major parts i.e., host.domain.tld. For example, for Example Domain, the part www is the host part, .example is the domain part, and .com is the top level domain (TLD). The following sections explain these in details. Root Servers and Root Zones The Root name server - Wikipedia, the free encyclopedia and DNS root zone - Wikipedia, the free encyclopedia are amongst the highest order in the hierarchical world of DNS. The root zones maintain the top level domains. The servers that are used to host root zones are called root servers. There are 13 sets of root servers, which are named as a.root-servers.net, b.root-server.net, c.root-servers.net, d.root-servers.net up to m.root-servers.net. The number 13 refers to number of entities and not to the actual number of servers. Each entity may contain hundreds of devices in their network for clustering, load balance and redundancy. The root servers share a distributed database and communicate with each other for updates. Top Level Domain A top-level domain or TLD is the rightmost part of the name, e.g., .com, .org, .net, .gov, .mil. All domains have to be registered under a top level domain. TLDs are maintained by Root Zones. Domain A domain is a 'string' registered under a TLD to be used by an organization/user as a part of the name. The DNS is open to the users starting from domain and moving downwards in the hierarchy. In the name syntax, the domain part is written in the left of TLD. For example, in Example Domain, the part example is the domain name. Domains are maintained by Authoritative Name Servers i.e., DNS servers maintained by the user/domain. Sub Domain A sub domain is an optional parameter and is written on the left of the domain. A user is free to delegate sub domains within a domain. The sub domains records are kept in the authoritative name server maintained by the domain. For example, in www.branch-1.example.com, the part branch-1 is actually a sub domain. Hostname Hostname is typically the leftmost part of the name, and indicates the actual server that is hosting the services. The admins have full access to this part, and can delegate names as they want. For example, in Example Domain and ftp.example.com, the parts www and ftp are hostnames, and indicate actual web server and ftp server. Authoritative Name Server The Authoritative Name Server of a domain is responsible for keeping all DNS records that are relevant to the domain. Naturally, it is impossible, as well as inefficient for the root servers to contain all DNS mappings and records for every domain in the world. Instead, the authoritative name servers for each domain should contain all the records for the respective domains. The root servers contain information about the authoritative name servers for each domain. How DNS Works Let us assume a user is trying to access the site Example Domain. After the user typed the URL in the browser and hit enter, the page is loaded seamlessly in the browser. To make that happen, the following events take place behind the scenes. 1. The user computer checks its own DNS cache for the IP address. If it is not found, the user forwards a query to the configured local DNS server, typically the DNS server operated by the user's ISP. 2. The local DNS server checks its own cache for the IP address to check whether it already knows the answer. If it is not found, the local DNS server queries the root servers for the authoritative name servers for the domain. This type of query is called a recursive query. As the TLD for the domain is .com, the responsible root servers should be able to answer the query. 3. The root servers reply with necessary information about the authoritative name servers. 4. The local DNS server now queries the authoritative DNS servers of example.com directly, which should have all DNS records within the domain. 5. The authoritative DNS server of example.com answers the query by providing the IP address 100.100.100.100 for the host WWW. 6. The local DNS server stores the information in the cache for future reference, and returns the IP address to the original user. 7. The user computer stores the IP address in its DNS cache as well. Then the web browser generates an HTTP request to the WWW server of example.com located at 100.100.100.100. 8. The WWW server of example.com happily responds to the query, and sends the page to the user. To sum up, surfing through the Internet is very easy thanks to DNS. Underneath it, however, a lot of activities take place in the background. The Internet that we know and love today would collapse without it. Hope this helps. Creds : Sarmed Rahman
  7. Penetration Testing with BackBox BackBox Team is proud to announce the publication of the first book titled "Penetration Testing with BackBox". We had many requests from the users and members all around the community about a BackBox based book. Finally, we are deligthed to introduce the long awaited publication! The book contains enough information to get familiar with BackBox and all its functionalities and it is based entirely on live, practical examples that everybody will enjoy reading chapter by chapter. Overview Experience the real world of penetration testing with Backbox Linux using live, practical examples Gain an insight into auditing and penetration testing processes by reading though live sessions Learn how to carry out your own testing using the latest techniques and methodologies Table of Contents Chapter 1: Starting Out with BackBox Linux Chapter 2: Information Gathering Chapter 3: Vulnerability Assessment and Management Chapter 4: Exploitations Chapter 5: Eavesdropping and Privilege Escalation Chapter 6: Maintaining Access Chapter 7: Penetration Testing Methodologies with BackBox Chapter 8: Documentation and Reporting Download link Penetration Testing with BackBox [eBook].epub - Speedy Share - upload your files here Enjoy
  8. M-A?I Se scrie întotdeauna m-a?i, cu cratim?. Poate fi completat cu voi … pe mine: (Voi) m-a?i duce (pe mine) cu ma?ina. (Voi) m-a?i fi dus (pe mine) cu ma?ina.
  9. This is a small tool that can be used to investigate Skype user accounts stored in your PC. First of all, let’s learn how to investigate data manually. This is a very easy to understand article. I hope you have a basic understanding of SQL. All the data is stored in the main.db file related to each user in separate folders. Windows: C:Users<user>AppDataRoamingSkype Linux: /home/<user>/.Skype/ OS X: /home/<user>/.Skype/ Overview of the Database SELECT tbl_name FROM sqlite_master WHERE type == 'table'; This query would return all the tables in the database from the schema of the database. Out of these we are interested in the data in the Accounts, Contacts, Calls, Conversions and Messages tables. Profile of the User To investigate the profile of the specific user, run this query. I hope you can understand these simple queries. SELECT fullname, skypename, city, country,datetime(profile_timestamp,'unixepoch') FROM Accounts; We are selecting those columns from the table Accounts. The date and time is stored using the POSIX time stamp. We need to return this value into a human readable format. So we have to use the function datetime() in SQLite and pass the argument ‘unixepoch’. Contacts To dump the contacts use this query. SELECT displayname, skypename, country, city, about, phone_mobile, homepage, birthday , datetime(lastonline_timestamp,'unixepoch') FROM Contacts; Calls To dump all the calls of the user run this query. SELECT datetime(begin_timestamp,'unixepoch'), time(duration,'unixepoch'), is_incoming, identity FROM calls, conversations WHERE calls.conv_dbid = conversations.id; If the ‘is_incoming’ column returns ’1? it means the call was an incoming call. If it returns ’0? it means the call was an outgoing call. Messages To dump all the messages, run this query. We are not interested in data consisting of <partlist alt=””>. SELECT datetime(timestamp,'unixepoch'), dialog_partner, author, body_xml FROM Messages; If the ‘dialog_partner’ columns are equal to ‘author’ it means the message is FROM ‘author’. If the ‘dialog_partner’ columns are not equal to ‘author’ it means the message is TO ‘dialog_partner’. You can see one result, “hi”, which is a message. Automation So now I think you know how to investigate a Skype database file and what is happening behind the scenes. I thought of writing a small tool to automate this. SkypeFreak by OsandaMalith Features * Fully open source * Cross-platform. Works on Windows, Linux and OS X * Written in Python 2.7 * Can write to a file and extract data easily Available Options: 1.Profile 1.Contact 3.Calls 4.Messages 5.Generate a Full Report To investigate the profile, enter 1 and you will see the profile details nicely formatted. All returned data can be written to a file. The calls can be retrieved, including incoming or outgoing, in a detailed manner. The messages can be viewed nicely in a clear format. You can easily generate the whole report a text file by entering option 5 and giving a file name. Credits goes to : Osanda Malith.
  10. fKAK0Jel0Ky5CzklCAZ=AKPlfdzrye/lfJ558OzlBAcZ Hint : G7
×
×
  • Create New...