-
Posts
18725 -
Joined
-
Last visited
-
Days Won
706
Everything posted by Nytro
-
Bine ai revenit. Poti sa ramai
-
XPath Injection Similar to SQL Injection, XPath Injection attacks occur when a web site uses user-supplied information to construct an XPath query for XML data. By sending intentionally malformed information into the web site, an attacker can find out how the XML data is structured, or access data that he may not normally have access to. He may even be able to elevate his privileges on the web site if the XML data is being used for authentication (such as an XML based user file). Querying XML is done with XPath, a type of simple descriptive statement that allows the XML query to locate a piece of information. Like SQL, you can specify certain attributes to find, and patterns to match. When using XML for a web site it is common to accept some form of input on the query string to identify the content to locate and display on the page. This input must be sanitized to verify that it doesn't mess up the XPath query and return the wrong data. XPath is a standard language; its notation/syntax is always implementation independent, which means the attack may be automated. There are no different dialects as it takes place in requests to the SQL databeses. Download: http://sec4app.com/download/XPathInjection.pdf
-
WebCruiser - Web Vulnerability Scanner WebCruiser - Web Vulnerability Scanner, a compact but powerful web security scanning tool that will aid you in auditing your site! It has a Vulnerability Scanner and a series of security tools. It can support scanning website as well as POC (Proof of concept) for web vulnerabilities: SQL Injection, Cross Site Scripting, XPath Injection etc. So, WebCruiser is also an automatic SQL injection tool, an XPath injection tool, and a Cross Site Scripting tool! Key Features: * Crawler(Site Directories And Files); * Vulnerability Scanner: SQL Injection, Cross Site Scripting, XPath Injection etc.; * SQL Injection Scanner; * SQL Injection Tool: GET/Post/Cookie Injection POC(Proof of Concept); * SQL Injection for SQL Server: PlainText/Union/Blind Injection; * SQL Injection for MySQL: PlainText/Union/Blind Injection; * SQL Injection for Oracle: PlainText/Union/Blind/CrossSite Injection; * SQL Injection for DB2: Union/Blind Injection; * SQL Injection for Access: Union/Blind Injection; * Post Data Resend; * Cross Site Scripting Scanner and POC; * XPath Injection Scanner and POC; * Auto Get Cookie From Web Browser For Authentication; * Report Output. System Requirement: Windows with .Net Framework 2.0 or higher Homepage: http://sec4app.com/ Download: http://sec4app.com/download.htm
-
BinPack: Las Vegas Edition Release For those weren’t able to score a BinPack disc, don’t worry we have setup a torrent of the iso. The disc contains a portable security environment customized for all the various Black Hat, DEFCON, and Security B-Sides attendees as well as the BinPack tool. Here is the latest screenshot of the tool. There are several bugs to be worked out with this version, which is why there is two releases; one stable and one alpha. Download: http://westcoasthackers.net/blog/2010/07/binpack-las-vegas-edition-release/
-
Injector is a little tool that will inject your code into a target process. Injector is a POST EXPLOITATION tool. it use generic shellcodes (may be generated from metasploit) and inject the shellcode into the target process and then run the code with the context of target process. By doing this it can evade anti viruses and provide a very powerful base for post exploitation. Key Features & Benefits: *ask for a file (means provide flexibility. you can choose your own codes). *Can provide On demand shells.(inject code into the processes and get shell). *Evade Anti viruses(because we are not generating exe, we are injecting direct shellcode.) This is one of the most powerful technique employed with this tool set. *Alphanumeric shellcodes are bullet proof solution for Anti viruses.. *can backdoor a process (bind shell). *can provide ability to switch from one exploitation tool to other..(for eg.. inject meterpreter shellcode -Metasploit, inject bind shell --Core Impact(we can connect core impact ) This is a small but very powerful utility that will inject direct shellcode into a process..and provide a powerful protection against anti viruses. Explanation: suppose we have a bind/reverse shell. now we want upload some tools. for eg. netcat or simply we may want to upgrade it to a meterpreter shell but victim is using latest Anti Virus then up gradation will fail or uploaded tools will be deleted.. Now the Game Begin how antivirus detect our tools.. because of some signatures, yes right. ok now we will try to pack or encrypt our exes then reupload on victim machine but antivirus detect and delete them.. now we face a very interesting question.. HOW antivirus know that our encrypted/packed file was the same malicious file?? basically antivirus load the file and detect the packer then decrypt the file and match the signature. now it provide a very important point what if we don't upload exe but we upload encrypted shellcode with injector. note that these shellcodes are not detectable because they are just raw instructions antivirus can't load the file and can't decrypt the instruction.. So in this way we can Bypass AV.. Hope your are getting what i am saying.. Injector will give you all the powers that will need in your post exploitation phase. Vid tut: http://vimeo.com/14139105 Download: https://sites.google.com/site/mamit30/home/injector/injector.rar?attredirects=0&d=1 Sursa: h4cky0u.org :: Login
-
The latest buzz word in the information security industry is “insecure DLL loading“, “DLL hijacking” or “DLL preloading“. Mr. HD Moore, the author of Metasploit has gone ahead and made it VERY easier for a lot of us to test such attacks at leisure. Hence you see such a spurt in proof-of-concept codes online! Mr. Peter Van Eeckhoutte has been maintaining a list of such vulnerable applications on his wonderful blog hosted here. This toolkit uses native JScript, automatically kills spawned processes, reduces the memory usage by ProcMon, and automatically validates every result from the CSV log. This is a complete re-write from the version 1 of the tool. This kit will turn your desktop PC into a vulnerability mincing machine by launching the file handlers for every registered file type, while recording whether or not a DLL was accessed within the working directory of the associated file! The DLLHijackAuditKit will help you verify if a application is vulnerable to DLL preloading attacks. How to use DLLHijackAuditKit v2? 1. Download ProcMon from here and copy the procmon.exe binary into the DLLHijackAuditKit directory. Launch the Process Monitor, accept the EULA, and exit. 2. Download Ruby from here and install it normally. 3 .Browse to this directory and launch 01_StartAudit.bat as an Administrator. The Administrator bit is important, as it will allow the script to kill background services that are spawned by the handlers and prevent UAC popups. 4. After the audit script completes (15-30 minutes), switch to the Process Monitor window, and access File->Save from the menu. Save the resulting log in CSV format to the local directory with the name “Logfile.CSV”. 5. Launch 02_Analyze.bat as an Administrator. This will scan through the CSV log, build test cases for each potential vulnerability, try them, and automatically create a proof-of-concept within the Exploits directory should they succeed. 6. Identify the affected vendor for each generated proof-of-concept and ask them nicely to fix their application. Send them the calc.exe-launching PoC if necessary. It is very easy to use but looking at today’s emerging tool this is small and also does the work! There are some known issues with this tool working on a Windows XP machine, etc. Hopefully Mr. Moore fixes them soon. Till then you can try being a vulnerability discoverer with this simple tool! Grab your pie while this vuln is hot! Download: http://www.metasploit.com/redmine/projects/framework/repository/raw/external/source/DLLHijackAuditKit.zip Sursa: h4cky0u.org :: Login
-
SSHatter is an SSH brute force utility available from SSHatter | freshmeat.net Essentially the tool is comprised of a small Perl file. The utility requires a few non-standard Perl libraries but these are easily installed. You must have Perl installed to use SSHatter. Installing SSHatter First download and unpack the tool: wget http://freshmeat.net/redir/sshatter/70781/url_tgz/get.php tar -xvzf SSHatter-0.6.tar.gz cd SSHatter-0.6/src Next you may have to install the following perl libraries. Install Parallel::ForkManager To install Parallel:::Forkmanager it is easiest to simply download the source from Parallel::ForkManager - search.cpan.org and compile the module yourself wget http://search.cpan.org/CPAN/authors/id/D/DL/DLUX/Parallel-ForkManager-0.7.5.tar.gz tar -xvzf Parallel-ForkManager-0.7.5.tar.gz cd Parallel-ForkManager-0.7.5 perl Makefile.pl make sudo make install Install Net::SSH-Perl This package is usually distributed as a package and can easily be installed on most systems. On Fedora use: sudo yum install perl-Net-SSH-Perl Once you have installed these modules you'll need to create a file full of potential targets and a file of usernames to try. A simple password file is distributed with SSHatter but you may want download and utilize a more extensive one. SSHatter also uses a file of usernames. Again, you can download an extensive file or perhaps tailor this file to the target system. For our purposes we'll simply target localhost and try and brute force the user root. $ perl SSHatter.pl usage: SSHatter.pl sleeptime: 0 - disable retries at SSHatter.pl line 62. $ echo root > users $ echo 127.0.0.1 > targets $ perl SSHatter.pl 1 targets users passwords 1 1 Evaluation The source code to SSHatter is a mere 168 lines, making it rather compact. SSHatter also supports connection attempts to alternate port numbers if the targets are listed with an IP address, then a colon and the port (i.e. 127.0.0.1:20). SSHatter does include the handy functionality of being able to sleep between tries, so you can slow your brute force attempts, which may evade some filters. All in all SSHatter is a simple, straightforward tool. It isn't particulary fast, stealthy or easy to use. It doesn't include any advanced functionality such as documentation, randomly generated passwords or a GUI. SSHatter also doesn't have any easy way to configure scans of ranges of IP's and seems to rely on a pre-built target list. SSHatter is also distributed as copyrighted material, rather than as GPL material, which will probably limit any sort of participation or active development community. Credits:CardingPower
-
Nu l-am incercat, nu stiu daca e infectat... “PyLoris is a tool for testing a web server’s vulnerability to Denial of Service (DoS) attacks. It uses the Slowloris method; by using all available connections web servers cannot complete valid requests. Supports SOCKS, SSL, and all HTTP request methods.” Whats new Tkinter GUI Scripting API Inteligent Thread & Exception Handling Supports options to be pulled from files Multiple concurrent attack support ScriptLoris class for easy extension and prepackaged attack creation libloris module providing attack API Highly configurable HTTP connection consuming DoS HTTPS support GET, POST, HEAD and other headers supported SOCKS4 and SOCKS5 proxies supported Written in Python Cross Platform; supported on Windows, Linux, and Mac OS X Forging Referer header for severs inaccessible directly Gzip encoding to test for CEV-2009-1891 vulnerability Many more bug fixes! and much more ! DOWNLOAD: http://sourceforge.net/projects/pyloris/files/
-
Da, foarte bun, il aveam ca bookmark
-
Esti ratat. Vreau sa vad cate vizualizari face acest topic stupid. Daca postezi ceva esti si mai ratat.
-
Acum vad, cred ca este doar local.
-
Mi s-a parut mai complex decat majoritatea celor "home-made". Screenshot: Homepage: Ecodsoft Keylogger - Best all-in-one invisible Keylogger, free download for trial! Download (trial): http://www.ecodsoft.com/downloads/ecodsoft-keylogger.exe Cracked: http://hotfile.com/dl/55138752/3f23002/Ecodsoft_Keylogger_v2.1_Incl_Keygen.rar.html http://rapidshare.com/files/407237493/Ecodsoft_Keylogger_v2.1_Incl_Keygen.rar http://www.megaupload.com/?d=XUZZVJEE http://www.sharingmatrix.com/file/13110521/Ecodsoft%20Keylogger%20v2.1%20Incl%20Keygen.rar Sau: http://hotfile.com/dl/35432952/d44dc4c/REGGOLYEKTFOSDOCE212121.rar.html PASSWORD: smartworld
-
Inside the Windows Vista Kernel: Part 1 http://technet.microsoft.com/en-us/magazine/2007.02.vistakernel.aspx Inside the Windows Vista Kernel: Part 2 http://technet.microsoft.com/en-us/magazine/2007.03.vistakernel.aspx Inside the Windows Vista Kernel: Part 3 http://technet.microsoft.com/en-us/magazine/2007.04.vistakernel.aspx Inside the Windows Vista Kernel http://technet.microsoft.com/en-us/library/cc748650.aspx
-
Eu sunt curios ce o sa faceti cu ele... Cred ca o sa le tineti bibelou, de dragul de a avea
-
Next Generation of Btrfs Linux Filesystem Nears Prime Time Brtfs = Better Filesystem Btrfs, Future Linux Default Filesystem Sean Michael Kerner Friday, August 27, 2010 09:55:12 AM Since at least 2008, the Btrfs Linux filesystem has been talked about as a next-generation technology one day potentially rivalling or supplanting the current dominant Linux filesystems. According to Chris Mason, founder of the Btrfs effort and now director of software development at Oracle, Btrfs is today generally stable and usable even though it's yet to be finalized. And although he admits the filesystem still has some issues to overcome as development continues, Mason said he would like to see Btrfs ultimately replacing existing Linux filesystems like the popular Ext3 and Ext4 systems that are often the default on enterprise Linux distributions. "The reason why we decided to go with a new filesystem instead of expanding an existing one is we wanted to provide something that was focused on features that the existing Linux filesystems just couldn't provide," Mason said during an Oracle-sponsored webcast on the state of Btrfs, which first landed in the Linux 2.6.29 kernel and has been improved with each subsequent kernel release. Mason explained that the foundation of Btrfs is its use of copy on write (COW), an approach that means Btrfs never directly overwrites data during normal operations. Instead, Mason said Btrfs writes the new values for metadata and data elsewhere, and then points the filesystem to the new location. "What this allows us to do is have very strong consistency checks and integrity checks to make sure, as we move along, that the drive returns exactly the data that we wrote," Mason said. "That's a very important part of keeping data manageable as you scale storage up to massive sizes." In addition to COW, Btrfs provides the ability to take snapshots as well as the ability to resize the filesystem. For migration, Mason noted that Btrfs provides the ability to do offline conversion of existing Ext3 or Ext4 filesystems to make it easier for developers to try out the new filesystem. "We create the Btrfs filesystem in the free space of the Ext3 or Ext4 filesystem and we create Btrfs metadata that points to the data blocks from the Ext3/4 files," Mason said. "Then we basically make a snapshot of the Ext3/4 filesystem."
-
Top Ten Security Reasons to Upgrade to Windows 7 # July 12, 2010 # By Lisa Phifer After a devastating wrong turn with Vista, Microsoft is back on its game with Windows 7. Sure, Windows 7 has annoyances – such as touting attractive features, but making most of them available only to those who pay extra for Enterprise (or Ultimate). But Windows 7 Enterprise delivers a plethora of improvements to justify the cost and pain of migration. The security benefits you could reap by upgrading to Windows 7 Enterprise include the following: 1.Improved platform security. Windows 7 picks up where XP SP2 and Vista left off, extending Data Execution Protection and Address Space Layout Randomization to deter malware, even when browsing. Kernel Patch Protection stops malware from hooking 64-bit kernel events, and Windows Service Hardening can enforce resource access profiles for included Microsoft services. Alas, not all applications use DEP and ASLR and only services can use WSH, but Windows 7 starts with a more solid foundation from which to fend off attackers. 2.Safer browsing. Internet Explorer 8, supplied with all versions of Windows 7, incorporates a wealth of security enhancements, including SmartScreen filtering, trusted domain highlighting, type 1 cross-site script attack filters, and InPrivate browsing. IE8 takes advantage of ASLR and DEP and can apply more granular ActiveX settings—for example, letting admins authorize riskier ActiveX controls, but only by trusted sites or users. IE8 can also be installed on XP SP3 and Vista, but upgrading to Windows 7 makes the most of some IE8 features and provides further incentive to retire older, less secure browsers. 3.Secure protocol support. Network protocols may not "wow" end users or sys admins, but they're a vital part of building a more secure foundation. Windows 7 includes native support for IPv6 (including IPv6 IPsec) and DNSSEC. These more secure protocols make it harder for attackers to spoof IP packets and addresses by providing cryptographic authentication and integrity checks. Enterprise networks must master other hurdles to actually use these protocols, but embedding protocol support in all of your endpoints satisfies one big pre-requisite. 4.Location-aware connection security. Windows 7 includes policy-based network segmentation, letting admins apply different Windows Firewall rules to each adapter based on location (e.g., Wi-Fi at the office, Wi-Fi at home, Wi-Fi at a public hotspot). The Windows 7 Firewall itself has grown from outbound-only packet filtering into a full bi-directional TCP/IP firewall, enforcing rules that can now be centrally-configured with ActiveDirectory GPOs. Windows 7 still doesn't have the best personal firewall around, but this is a noteworthy improvement. 5.Quick-and-easy file recovery. Windows XP creates System Restore points to roll a damaged PC back to a know-good earlier state. Windows 7 and Vista beef this up with Volume Shadow Copy (VSC) – a service that backs up entire volumes, including Windows system files, program files, settings, and user files. By default, shadow copies are created weekly on a Windows 7 PC with idle time. On-the-go workers can use VSC to recover a single lost document or a corrupted DLL in minutes, without connectivity or help. However, because shadow copies are stored on the same disk, they are not a replacement for routine data backup to archive. 6.Always-on secure remote access. For those tired of intrusive VPNs, Windows 7 Enterprise offers DirectAccess. DA uses auto-initiated, authenticated, encrypted IPv6/IPsec tunnels to securely connect remote Windows 7 users to private network resources. DA tunnels can terminate at a Windows Server 2008 DA gateway or at any IPv6 Windows Server 2008 behind that gateway. Alas, in order to achieve user-transparent always-on secure remote access with DA, the enterprise must deploy Windows Server 2008 and IPv6. Fortunately, DA can wrap IPv6 inside IPv4 or HTTPS to traverse home and public networks that usually lack IPv6 today. 7.Usable user access control. The tighter User Access Controls first introduced by Vista are back in Windows 7 – after a rigorous reality-check back at Redmond. UAC deters apps and users from making unauthorized changes by defaulting to Standard User and requiring explicit permission to elevate privileges when needed. Windows 7 now silently elevates many activities routinely needed by end-users (e.g., adding printers, changing time/date) to reduce prompting. Many Microsoft apps have also been refactored to segregate activities that do and do not require elevation, and admins can now configure prompts without disabling UAC altogether. 8.Better desktop auditing. Vista added XML-based audit events at a finer level of granularity. Windows 7 took this further by including more helpful information in audit events—for example, indicating not just that a given activity was permitted or denied, but why that decision was made. These enhancements improve forensic analysis and troubleshooting capabilities and make it possible to easily find all changes made by an individual user or group. 9.Application whitelisting. In Windows 7 Enterprise, XP/Vista Software Restriction Policy blacklists are replaced by AppLocker whitelists. SRPs were too hard to maintain and too easy to bypass. Windows 7 AppLocker strikes a better balance by permitting or denying program launch based on Publisher Rules (recommended), Hash Rules (for programs without signatures), and Path Rules (as a last resort). Publisher Rules check signatures on executables, installers, scripts, and libraries. A new wizard can even search an entire reference PC to find all programs and propose AppLocker Publisher Rules, falling back to Hash Rules only for programs without signatures. AppLocker still isn't for everyone, but it can deliver a more effective defense against malware while enforcing potentially-unwanted-program policies. 10.On-the-go data protection. BitLocker, introduced in Vista, is back in Windows 7 Enterprise with major improvements. BitLocker full-disk encryption can now be controlled by GPOs, use a wider PIN or two-factor authentication to unlock drives, and interface with a central recovery key store. Windows 7 also plugs the "USB hole" with BitLocker To Go—portable data encryption for USB drives. BitLocker To Go stores an encrypted volume on a USB drive, along with a reader that can be used to decrypt those files on Vista or XP PCs. GPOs can be used to control whether unencrypted data can be written to USB, thereby enforcing encryption whenever files are permitted to leave an otherwise locked-down PC. Take a hard look at these and other Windows 7 security features to determine how you can get the biggest bang for your buck during your OS migration. Some of these features require additional infrastructure – most notably DirectAccess. Several are only available when upgrading to Windows 7 Enterprise (or Ultimate). Most require careful planning and testing prior to broad rollout (e.g., UAC, AppLocker). However, if used wisely, Windows 7 can help many organizations strengthen their security postures.
-
MAC Address Spoofing for Windows, Linux and Mac # June 7, 2010 # By Eric Geier Network adapters come preconfigured from the factory with their own globally unique physical or Media Access Control (MAC) address, which helps them identify themselves when communicating with other networking components. Though you can't change the permanent MAC address actually stored by the network adapter, you can make it provide a different address using your operating system (OS). We'll see how to do this with Windows, Mac OS X, and Linux. There are a few reasons you might want to simulate another MAC address, including troubleshooting and testing your network. From a security standpoint, it's a good idea to understand the technique, referred to as "MAC spoofing," because hackers also find it useful to get around MAC address filtering. This filtering is used by some network administrators to help control which devices end-users can connect to the network or even as another layer of security against hackers. If nothing else, understanding MAC spoofing will help you demonstrate to yourself or others just how easy it is to change your address and bypass MAC-based security measures. Changing Your MAC Address in Windows Before you change the MAC address, you might want to write down the original one. One way to bring it up is to open the Network Connections window, double-click the desired network adapter, and on the Network Connection Status window, click the Details button to look for the Physical Address. Another way is to open a Command Prompt, type ipconfig /all, find the desired Network Connection, and look for the Physical Address. The more user-friendly way to change your MAC address in Windows is via the Network Adapter Properties. You probably want to try this first, leaving the Registry method as a last resort. When you're ready, give it a try: 1. Open the Network Connections window and double-click the desired network adapter. 2. On the Network Connection Status window, click the Properties button. 3. On the Network Connection Properties window, click the Configure button. 4. On the Network Adapter Properties window, select the Advanced tab. 5. Choose the Network Address or Locally Administered Address Property, select the Value radio button, and then enter the new MAC address. If using Windows 7, you must use a special format as we'll note in a moment. 6. Click OK to save changes. If you don't have success changing your MAC via the Network Adapter Properties, you might want to try using the Windows Registry. However, you should first copy down the original address before proceeding so you'll have it if you want to restore it. When you're ready, here's how to edit the Windows Registry setting: 1. Open the Registry Editor by typing regedit into the Start Menu field or Run prompt. Browse to the following key: HKEY_LOCAL_MACHINESYSTEMCurrentControlSetControlClass{4D36E972-E325-11CE-BFC1-08002BE10318} 2. You should see 4-digit sub-keys, such as 0000, 0001, 0002, 0003 and so on. Find the right network adapter by referencing the DriverDesc attribute of each sub-key. 3. Once you find the desired adapter, see if it contains a NetworkAddress attribute. If not, create a new String (REG_SZ) and label the Value Name as NetworkAddress. 4. To edit the NetworkAddress, double-click it and type the desired MAC address (without separators) in as the Value Data. If using Windows 7, use the special format discussed next. For either method in Windows 7, the second character of the MAC address must be a 2, 6, A, or E, such as the following examples: x2-xx-xx-xx-xx-xx x6-xx-xx-xx-xx-xx xA-xx-xx-xx-xx-xx xE-xx-xx-xx-xx-xx Now you should double-check you're using the new MAC address, using one of the methods we discussed in the beginning of the section. If you have problems changing your MAC address, you might consider using a third-party utility, such as Technitium MAC Address Changer. Changing Your MAC Address in Mac OS X Spoofing the MAC address for AirPort adapters in Mac OS X 10.4 (Tiger) and later is fairly easy. However, by default the original address is restored after rebooting. First, you might want to check out your current address; type the following into a Terminal window: ifconfig en1 | grep ether Then change the MAC with the following command: sudo ifconfig en1 ether xx-xx-xx-xx-xx-xx Be sure to replace the x's with your desired address. You might also need to change the interface number (en1) to something else. You can review interfaces by typing ifconfig. The IP address info listed for each interface might give you a clue when distinguishing between them. If you have problems getting it to work, try disconnecting from all wireless networks but leave the AirPort adapter on, and then retry. You can force it to do this by copying and pasting the following command: /System/Library/PrivateFrameworks/Apple80211.framework/Versions/Current/Resources/airport /usr/sbin/airport -z If you run into issues, you might want to try the ChangeMAC utility. Changing Your MAC Address in Linux Changing the MAC address in Linux also requires a few commands in a Terminal window. First, you should check which interface number is associated with the desired network adapter and possibly copy down the original MAC address before making changes: type ifconfig into a Terminal window. When you're ready, bring up a Terminal window, and start by deactivating the interface: sudo ifconfig eth0 down If you want an interface other than eth0, be sure to replace it in these examples. Then you can assign it a new address, replacing the x's with your desired address: sudo ifconfig eth0 hw ether xx:xx:xx:xx:xx:xx Now you can reactivate the interface: sudo ifconfig eth0 up Lastly, verify it has changed: sudo ifconfig eth0 | grep HWaddr
-
# March 31, 2010 # By Eric Geier The Windows Registry is just one of those things we learn to love, and learn to hate. It's a huge, seemingly unorganized and highly sensitive mess of settings that tell Windows how to behave. As you may know, you can tweak Windows, its features, and other programs by making changes to the Windows Registry. We're going to discuss ten different registry changes or hacks relating to networking. You might discover a few tricks and shortcuts that may save you some time or a headache. Without further ado, here they are in no real particular order: 1. Hide Your Computer From the Network If file and printer sharing is enabled on a Windows computer, it by default sends announcements in the background to all the other computers. This makes the computer show up in Network or Network Neighborhood. However, with this registry hack, you can hide your computer so others can't browse to it even if you're sharing. Create or change the "Hidden" DWORD value to "1" at the following location: HKEY_LOCAL_MACHINESYSTEMCurrentControlSetServicesLanmanServerParameters Then you can still access the computer and shares with the Universal Naming Convention (UNC) path in a web browser or windows explorer window: \computernamesharename 2. Display Error Statistics on the Network Connection Status Window By default, the Network Connection Status window shows the number of packets or bytes received and sent via the network adapter. This can help when troubleshooting by letting you know if any traffic is getting in or out. However, a simple registry hack can give you another piece of information: the number of errors. This can help alert you of network issues. Create or change the "ShowLanErrors" DWORD value to "1" at the following location: HKEY_LOCAL_MACHINESYSTEMCurrentControlSetControlNetworkConnectionsStatMonShowLanErrors 3. Change Advanced 802.1X Authentication Settings 802.1X authentication helps better protect wired and wireless networks, but it adds another step to the connection process. This added step might have an adverse impact to clients that roam between wireless access points. Fine-tuning the Pairwise Master Key (PMK) and preauthentication settings, however, might help. In Windows XP and Vista, you must configure these settings via registry values. Start by browsing to the following location: HKEY_LOCAL_MACHINESOFTWAREMicrosoftEAPOLParametersGeneralGlobal Then you can change the following DWORD values: PMKCacheMode: Set "1" to enable PMK caching, "0" to disable. PMKCacheTTL: Number of minutes (5-1440) to keep PMK entries cached, up to 24 hours. PMKCacheSize: Maximum number of PMK entries (1-255) that can be cached. PreAuthMode: Set "1" to enable preauthentication, "0" to disable. PreAuthThrottle: Number of wireless access points (1-16) that the client will try preauthentication with, based on the order of network profiles created in Windows. 4. Remove Cached 802.1X Login Credentials in XP Windows XP by default saves the login credentials for 802.1X authentication for later connections. Unfortunately, you must modify the Windows Registry to delete this cache in XP, unlike with Windows Vista and 7. To remove the cached 802.1X login credentials, delete the following registry key: HKEY_CURRENT_USERSoftwareMicrosoftEapolUserEapInfo 5. Enable the Network Adapter's Onboard Processor Some network adapters have an integrated processor that can run some networking functions instead of passing them on to the main processor. Ideally, this frees up your main CPU for other tasks and increases overall performance. However, this on-board processor capability is turned off by default in Windows XP and requires a registry change to enable. Create or change the "DisableTaskOffload" DWORD value to "0" at the following location: HKEY_LOCAL_MACHINESYSTEMCurrentControlSetServicesTcpipParameters 6. Change the IP Address of the Wireless Hosted Network A new feature in Windows 7 and Windows Server 2008 R2 lets you create a virtual Wi-Fi router, called a Wireless Hosted Network. By default, Windows assigns this virtual interface the IP address of 192.168.137.1. However, you can change this address in Windows Registry. Change the "ScopeAddress", "ScopeAddressBackup", and "StandaloneDHCPAddress" DWORD values at the following location: HKEY_LOCAL_MACHINE\SYSTEMCurrentControlSetservicesSharedAccessParameters 7. Remove the Public Folder Shortcuts If you don't use the Public folders provided by Windows, you may want to remove the shortcuts in XP or Vista. You find them on most open/save file dialogs and in the Favorite Links section of Windows Explorer windows. A shortcut is even on the main folder list, among the shortcuts to the user folder and to the drives. These shortcuts do not appear in Windows 7. However, the Public folders are by default chosen as a location for the Libraries, which you might want to change. To remove the shortcut from the Favorite Links in XP or Vista, open your Links folder (C:Usersyour_user_nameLinks) and delete Public.lnk. To remove the shortcut from the Folders List, you must delete the following registry key: HKEY_LOCAL_MACHINESOFTWAREMicrosoftWindowsCurrentVersion explorerDesktopNameSpace{4336a54d-038b-4685-ab02-99bb52d3fb8b} 8. Remove the Shortcuts to the Shared Documents Folder If you don't want users to use the Shared Documents folder in Windows XP, you might want to hide the shortcuts to it. Just create the "NoSharedDocuments" DWORD value and set to "1" at the following location: HKEY_CURRENT_USERSoftware\MicrosoftWindowsCurrentVersionPoliciesExplorer 9. Change the Default IP Address of ICS As you may know, Windows includes a very useful feature called Internet Connection Sharing (ICS) that lets you share your Internet connection. Windows gives the virtual router the IP address of 192.168.0.1 and hands out addresses via DHCP to computers. This however is the default IP of popular off-the-shelf routers like D-Link. Therefore, you might want to change the default to something else to avoid an IP conflict. To change the IP address of ICS, modify the "ScopeAddress", "ScopeAddressBackup", and "StandaloneDhcpAddress" DWORD values at the following registry location: HKEY_LOCAL_MACHINESYSTEMControlSetServicesSharedAccessParameters 10. Remove the Hand From Icons of Shared Resources By default, Windows adds an image of a hand to all the icons of shared folders and printers. This makes it easy to distinguish resources that are being shared on the network. Sometimes you might not want this. Luckily, there's a quick registry hack to remove the hands. Change the "Default" REG_SZ value from "ntshrui.dll" to blank at the following location: HKEY_CLASSES_ROOTNetworkSharingHandler Eric Geier is the Founder and CEO of NoWiresSecurity, which helps businesses easily protect their Wi-Fi with enterprise-level encryption by offering an outsourced RADIUS/802.1X authentication service. He is also the author of many networking and computing books, for brands such as For Dummies and Cisco Press.
-
C++Ox: The Dawning of a New Standard Pagini: 42 It's been 10 years since the first ISO C++ standard, and 2009 will bring us the second. The new standard will support multithreading, with a new thread library. Find out how this will improve porting code, and reduce the number of APIs and syntaxes you use. In this special report, Internet.com delves into the new features being discussed by the standards team. Learn how these new features will revolutionize the way you code. Special report topics include: * Overview: C++ Gets an Overhaul * Easier C++: An Introduction to Concepts * Simpler Multithreading in C++0x * The State of the Language: An Interview with Bjarne Stroustrup * Timeline: C++ in Retrospect Screenshot: http://i51.tinypic.com/2qir41s.png Download: http://www.speedyshare.com/files/24120293/5147_c_0_specialreport_op.pdf http://www.mediafire.com/?8m9sarucs3w9swk
-
Get Answers to Your Wi-Fi Questions Pagini: 15 Screenshot: http://i52.tinypic.com/124vxhg.png Download: http://www.speedyshare.com/files/24120221/3852_wifiqa_ntwk.pdf http://www.mediafire.com/?12o67j3o3s42m3v
-
Mastering Network Protocols Pagini: 8 Scurt si la obiect Screenshot: http://i56.tinypic.com/2n0ikhx.png Download: http://www.speedyshare.com/files/24120148/3852_mstrng_net_prot.pdf http://www.mediafire.com/?idzac8np82kj38k
-
Nu am citit ce e pe acolo, dar poate daca ii dai ceva bani administratorului...
-
Ce plm faceti cu logurile? Nu prea aveti ce face cu ele... Asta daca nu sunteti niste boscheti care abia asteptati sa scrieti "HACKED by VASILE" pe hi5-uri...
-
kills, plays, lies, cooks, beats, licks, likes, eats, drikns, fart, flirts with... Pff, sunt o gramada Mai sunt pe la comentarii
-
yo9gjx: Nu am cum sa ajung maintainer, e prea mult de munca. Da, sunt astfel de comentarii, asa cum oricine poate face patch-uri, asa oricine poate lasa propriile comentarii. Pe mine insa nu ma deranjeaza. Kabron: Thanks