Red Hat Enterprise Linux 6.8 Released With New Features — The Most Popular Server Linux

Red Hat Enterprise Linux 6.8 Released With New Features — The Most Popular Server Linux

Red Hat recently announced the latest iteration of its widely popular enterprise Linux — Red Hat Enterprise Linux 6.8. This release comes with lots of new features, marking the Production Phase 2 of RHEL 6. Red Hat Enterprise Linux 6.8 provides new capabilities to system admins by making this dependable server Linux even more stable.
Red Hat Enterprise Linux is one of the leading server Linux distributions around, including the likes of Ubuntu 16.04 LTS Server and SuSE Linux Enterprise Server (SLES).
The world’s leading open source solutions provider Red Hat, has announced the general availability of RHEL 6.8. With more than 6 years of successful run, Red Hat Enterprise Linux 6 has set the stage for delivering new capabilities and bringing a stable and trusted platform for IT admins.

Red Hat releases RHEL 6.8 with many new features!

The base image of RHEL 6.8 has been changed to allow sysadmins to migrate the workloads to containers. As usual, Red Hat Enterprise Linux 6.8 includes multiple changes to help the organizations improve their security and efficiency.
Improving the VPN security, RHEL 6.8 has switched to libreswan, replacing openswan as VPN endpoint solution.
Thanks to the improvements to the Identity Management client code (SSSD), the customers will see simpler management and client-side performance.
With the new adcli support, the Active Directory domain RHEL management has been simplified. Identity login has also been made simpler with client cached authentication.
In RHEL 6.8, Relax-and-Recover, a system archiving tool, has been included to make lives of system admins easier by helping them create backups in the familiar ISO formats.
The dealing with packages has also been made simpler with an enhanced yum tool. RHEL 6.8 also provides a better understanding of storage usage and performance. Another great change comes in the form of support for up to 300TB data in xfs filesystem.
This release also marks the Production Phase 2 of RHEL 6.

0 comments:

Here’s Why Microsoft Should Adopt Android

Microsoft’s Windows phone lineup is a combination of some pretty impressive hardware and a struggling software. Looking at the recent developments, it won’t be premature to speculate a future where a Microsoft phone would run Android. Ditching Windows Phone feels like the right thing for Microsoft’s phone business and we can witness this development sooner than expected.

It’s a no denying fact that Microsoft has failed repeatedly at convincing people to use its mobile operating system. The latest shipment figures of Windows Phones show a constant decline and an overall 1.7% of the smartphone market share.
This misery was preceded by Microsoft’s Nokia buyout that has now been run on the ground and the company has lost about $10 billion on that deal. The smartphone company, that made classic phones like Nokia 1100, couldn’t survive the pummeling it received from iOS and Android.
If we start making a list of the problems with Microsoft’s phone business, it would be too long. So, why not talk about the ways Microsoft could save its phone business?
Looking closely, we can observe a gradual trend that shows Microsoft’s inclination towards Android. Yes, it shouldn’t sound weird to you if you’ve been keeping track of the recent developments. Even though Redmond is betting heavily on Continuum and its One Windows future, it looks like Microsoft has been quietly working a lot to support such possible switch in the future.
Talking more about acquisitions, Redmond has bought Xamarin and SwiftKey. While Xamarin makes it possible to run Microsoft’s .Net Framework and C# apps on Android iOS, SwiftKey was an app that was never made available for Windows Phone.
It’s not hidden that Microsoft is making more money from its cloud and server business. Ditching its platform-focused strategy, the company is already making Microsoft apps for consumer and enterprise. If you’ll ask me to give examples, I have plenty — Office, OneDrive, Skype, Cortana, SwiftKey, Office Lens etc.
Microsoft has already been working closely with Cyanogen since April 2015 to distribute Microsoft’s own apps and services bundled with Android. Cyanogen is working to deeply integrate Cortana into the next version of Cyanogen OS and plans to Android’s dependencies on Google.
Windows Phone is dying a slow death and Microsoft needs a lifesaver pill. We can see an Android fork from Microsoft in future years with Microsoft services deeply integrated inside it.
It’s possible that we could see some Surface-branded phones later this year or in 2017 before the company decides to close the Windows Phone chapter. Ditching Windows Phone feels like the right thing for Microsoft’s phone business and we can witness this development sooner than expected.

0 comments:

Ubuntu Linux On Windows 10 — Here Are The First Pictures

Ubuntu Linux On Windows 10 — Here Are The First Pictures

At the first day of Microsoft Build Developer Conference 2016, something amazing happened. Microsoft showed the world how Ubuntu on Windows 10 can ease the lives of developers. By installing official Ubuntu binaries on Windows 10, you can use any Linux tool on Windows 10 and get your work done.

Earlier, we told you about the expected next chapter in Microsoft’s love affair with Linux that mentioned a partnership between Microsoft and Canonical to bring Ubuntu to Windows 10. Well, at Microsoft’s Developer Build Conference 2016 we got the confirmation.
The long-rival operating systems have come together to allow developers use their favorite Linux tools inside Windows 10. During Day 1’s keynote at Build 2016, Microsoft’s Kevin Gallo announced that now you can run Bash on Ubuntu on Windows. This won’t be possible due to some virtual machine, emulator or a container. Instead, it’ll be with the help of Ubuntu binaries running natively in Windows 10.

Ubuntu on Windows 10 — What does it mean?


Well, thanks to the upcoming Windows 10 Anniversary update, Windows OS will get a new developer feature that will allow you to import Ubuntu binaries and run native Linux shells and command line tools.
To run Bash on Windows, users usually turned to Cygwin, a GNU command line utility for Win 32 or HyperV and Ubuntu. Another option was to use Docker to run a Linux container.
On his blog, Dustin Kirkland from Canonical writes:
“Right, so just Ubuntu running in a virtual machine?”  Nope!  This isn’t a virtual machine at all.  There’s no Linux kernel booting in a VM under a hypervisor.  It’s just the Ubuntu user space. “Ah, okay, so this is Ubuntu in a container then?”  Nope!  This isn’t a container either.  It’s native Ubuntu binaries running directly in Windows. “Hum, well it’s like cygwin perhaps?”  Nope!  Cygwin includes open source utilities are recompiled from source to run natively in Windows.  Here, we’re talking about bit-for-bit, checksum-for-checksum Ubuntu ELF binaries running directly in Windows.
Willing to know more? Well, when this feature arrives in Windows 10, you’ll be able to run Ubuntu on Windows 10 by simply getting Ubuntu from Canonical and Windows Store like this:


The screenshots show a lightweight and real Ubuntu image on top of Windows 10. This Ubuntu on Windows 10 installation brings all Linux tool you can name — apt, ssh, rsync, find, grep, awk, sed, sort, xargs, md5sum, gpg, curl, wget, apache, mysql, python, perl, ruby, php, gcc, tar, vim, emacs, diff, patch, and more.

Inside your Windows installation drive, you can see all of your Ubuntu files in C:\Users\YourUserName\AppData\Local\Lxss\rootfs\


After setting up everything, you can run apt-get update in Windows 10 and download your favorite developer packages. Below is the result of apt-get install emacs23:

Here’s a Windows 10 Start Menu screenshot that shows Ubuntu on Windows 10. Looks pretty great to me!

Wondering what Canonical thinks about the new partnership?
Here’s what Dustin Kirkland had to say — “This is an almost surreal endorsement by Microsoft on the importance of open source to developers.  Indeed, what a fantastic opportunity to bridge the world of free and open source technology directly into any Windows 10 desktop on the planet.”
Are you excited about this future with Ubuntu on Windows 10? Share your views in the comments below.

0 comments:

Ubuntu Linux Is Coming To Windows 10

Ubuntu Linux Is Coming To Windows 10 - Microsoft Partners With Canonical

Microsoft and Canonical, Ubuntu Linux’s parent company, are partnering to allow you to use Ubuntu on Windows 10. The official announcement is expected to be made at Microsoft’s BUILD 2016 developer conference later today. This partnership is expected to integrate Windows and Linux on the developer desktop.
Microsoft is kicking off its BUILD 2016 developer conference on March 30. This annual event is known to bring some exciting news for Microsoft fans each year. At this year’s event, Microsoft is expected to show off its newly-found Linux love in a big manner.
According to a new report from ZDNet, Microsoft is likely to announce a partnership between Canonical and Microsoft that would aim to bring Ubuntu on Windows 10.
This functionality won’t be limited to running Bash shell on Windows 10. With this development, users will be able to run Ubuntu simultaneously with Windows operating system. This will be making Ubuntu an integrated part of Windows 10, not just some virtual machine.
At the moment, details are not revealed regarding this arrangement. It’s expected that Ubuntu will run on top of a foundation of native Windows libraries. It should be noted that Microsoft quietly introduced Linux subsystem in a new Windows 10 Redstone build.
This combination of Windows 10 and Ubuntu will be aimed at developers. Linux fans shouldn’t expect Ubuntu to come along with its Unity interface. Instead, it’ll rely on Bash and CLI tools like make, gawk, and grep. Having said that, Microsoft’s target audience are developers, not desktop users.
Since last summer, Microsoft and Canonical have been working together on many projects, including the work to bring containers to Windows 10 using LXD. They have also partnered to help developers write programs for Ubuntu on the Azure cloud.
In a nutshell, here’s what this partnership means according to ZDNet — “So is this MS-Linux? No. Is it a major step forward in the integration of Windows and Linux on the developer desktop? Yes, yes it is.”

0 comments:

VoCore: A Cheap And Coin-sized Linux Computer

VoCore: A Cheap And Coin-sized Linux Computer 

VoCore is an open hardware that runs OpenWRT Linux. This tiny computer comes with Wi-Fi, USB, 20+ GPIOs that will help you to make a smart home automation system or use it in other embedded projects. Read more to know about this device and grab one for yourself.
With each passing day, mini computer boards are getting more and more popular. Single board computers like Raspberry Pi, CHIP, OrangePi etc. are being endorsed by makers and DIY enthusiasts to create new innovations. However, if you are looking for an even smaller Linux computer,VoCore is the perfect device for you.
At fossBytes, we love open source technologies and so do the makers of VoCore. It’s an open source hardware that runs OpenWrt on top of Linux. With this mini Linux machine, you can fork your own Wi-Fi router, make smart home automation systems, invent a new device, build a motherboard and whatnot.
In simpler words, you can use it as a standalone device or use it as an embedded component of a larger system. It comes with included Dock that extends the USB and Ethernet ports to enhance its functionality.

Specifications of VoCore Linux computer:

This coin-sized computer is powered by 32MB SDRAM, and 8MB SPI Flash. It provides many interfaces like 10/100M Ethernet, USB, UART, I2C, I2S, PCM, JTAG and over 20 GPIOs.
  • OpenWRT Linux
  • Onboard Wi-Fi adapter
  • Integrates a 802.11n MAC, baseband, radio, FEM & 5-port 10/100Mbps Ethernet switch
  • Processor: Ralink/Mediatek 360 MHz RT5350 MIPS
Here’s the pin map of VoCore:
An open source software and hardware of VoCore means that you will also get its full hardware design and source code. This will allow you to control every part of this tiny Linux computer.

0 comments:

Kingston’s 'Unhackable' DataTraveler USB

Kingston’s 'Unhackable' DataTraveler USB Drive Self-destructs With Incorrect PIN Entry

Kingston Digital, one of the world leaders in memory products, has released DataTraveler 2000 encrypted USB Flash drive. This portable memory device offers best-in-class security features like hardware encryption and PIN protection with an onboard keypad. The device is expected to ship in Q1 in 16GB, 32GB and 64GB capacities.
At CES 2016, Kingston has announced a new USB drive that’ll make the life easier for the privacy concerned users. This secure DataTraveler 2000 encrypted USB Flash drive is created to provide the best possible security measures to the IT professionals for carrying sensitive documents.
The USB drive looks impressive right from the outside. As you pull out the outer aluminum cover, a built-in keypad will be there to surprise you. When inserted into a computer, you’ll have to unlock the device by entering the correct PIN. Failing to do so in 10 attempts, the USB will self-destruct — sounds just like the pen drive from Hollywood flicks like Mission Impossible, right?
This USB 3.1 compatible thumb drive offers speeds of up to 135MBps read and 40MBps write. On the security front, DataTraveler 2000 comes with hardware-based full disk AES 256-bit encryption in XTS mode. The drive also protects your data from bruteforce attacks.

Kingston DataTraveler 2000 USB — PIN protection, AES 256-bit data encryption, resists bruteforce attacks

For additional protection, Kingston’s super-secure USB drive features the option of auto-locking the drive by deleting key and password files after 10 invalid login attempts.
“We are excited to add DataTraveler 2000 to our existing lineup of fast and encrypted USB Flash drives for organizations and SMBs,” said Ken Campbell, Flash business manager, Kingston. “It is the perfect option to deploy in the workforce where a uniform encrypted data storage solution that works on many different OS’ are in use.”
This OS independent USB drive works with all popular operating systems, even Android and ChromeOS. The DataTraveler 2000 is available in 16GB, 32GB and 64GB capacities.
The DataTraveler 2000 is expected to hit the markets in the end of 2016 Q1.
Are you excited about this upcoming USB drive from Kingston? Tell us in the comments below

0 comments:

USBDriveby: A Necklace That Can Hack Your PC In Just 60 Seconds

USBDriveby: A Necklace That Can Hack Your PC In Just 60 Seconds


In a video found on the YouTube channel of Samy Kamkar, a USB drive beaded in a necklace has been shown which is capable of doing some really dangerous hacking tricks with a horrifying outcome. This necklace is called USBDriveby, which is a necklace that can hijack your computer in just 60 seconds.


USBdriveby is basically a USB-powered microcontroller which is beaded into a necklace or a chain. The reason behind beading this USB-driven microcontroller is that one can take the advantage of security flaws in one’s computer’s USB ports. Once inserted into one of the USB ports, it just needs a minute or better say, 60 seconds to infect and annihilate a personal computer.

How does USBDriveBy work?

  • Once USBDriveby is inserted into one of the USB ports on a PC, it pretends to be a mouse or a keyboard.
  • It automatically uses of a number of keystrokes to satisfy the PC’s network monitor app to convince that everything is ok.
  • In the next step, it disables the system’s firewall.
  • After disabling the firewall, it alters the DNS settings next. By changing the DNS Settings, it provides full control to the hacker.
  • Once the control goes into the hands of the hacker, a hacker can redirect any website the user wishes to visit with the website of hacker’s choice.
  • Using the website of the hacker’s choice, the USBDriveBy creates an outbound connection by opening up a backdoor port to a remote server, allowing the computer to receive remote commands.
  • Once the control goes to the remote server, a hacker can exploit the entire PC.
  • While leaving the computer, any windows and settings screens that have been opened up are closed and footprints are swept up while the hacker leaves the PC.

So, basically, within a minute, an entire PC can be hacked by disabling a number of security layers and cleaning up its mess as well. It permanently leaves the computer with an open connection for all sorts of remote manipulations even after the USBDriveBy has been removed from the USB port.
Although the video shown below talks only about the Mac OS X but Kamkar states that the process is quite ‘easily extendable to Windows or Linux’. Once the harm is done, there is nothing much a user can do to protect himself from such attacks except for guarding his USB ports.
.
If you are also aware of these sorts of stylish hacking materials, leave the comment about the cool gadgets in the comment section below.


0 comments:

Protect Your Conversations from Spies And Tools for Impenetrable Security.

Protect Your Conversations from Spies And Tools for Impenetrable Security.


Do you think your nerd cave is under surveillance by spies? Are you secretly building a time machine and afraid that someone might steal your blueprints? Privacy is a priority for every tech lover. Today, there are entities out there who’re after your personal information – be it online marketers, hackers, or even government agents. Thanks to the Cybersecurity Information Sharing Act of 2015 – infamously dubbed as “CISA” – agencies like the NSA and FBI can freely monitor your online activities with the help of your ISP.

Why Does It Matter?

You may not be a super-villain secretly planning to take over the city (or the world). But you most likely have information you’d like to keep private. Your passwords, credit card information, browsing history, chats; nothing is safe without setting up the proper security measures. No, we’re not talking about using proxies, installing an antivirus, or going incognito. We’re talking about setting up an impenetrable, military-grade security.
Encryption holds the key to achieving this, and you’ll need a couple of tools to get started. First, let’s make sure all your online conversations are kept secret. There are currently two popular encryption methods being used: Pretty Good Privacy (PGP) and Elliptical Curve Cryptography (ECC).
PGP may not have a fancy name like ECC, but it’s worth mentioning that it’s been developing for over 25 years and it has never been cracked. PGP works with a pair of keys for each user – a public key for receiving and a private key for decrypting messages. On top of these, each message is encrypted with a “session key” that’s generated randomly every time. On the contrary, ECC is basically the newer version of public-key cryptography meant to replace the RSA (Rivest-Shamir-Adleman).

Using Encrypted Messages

Today, there is a growing number of secure messaging and email tools that utilize either ECC or PGP encryption. You can easily take advantage of PGP for emails with the following steps:
Step 1: Install a Desktop Email Client
The first thing you need to do is install a desktop email client. For the purpose of this guide, you should choose from either Mozilla Thunderbird (Free) or Postbox.
Step 2: Install GNU Privacy Guard
You will need GPG to generate your public and private encryption keys. You’re going to need GPGTools for OS X and GPG4Win for Windows.
Step 3: Install the Enigmail Extension
Enigmail is a security extension you need for your desktop email clients. Remember that you need the appropriate extension for Thunderbird and for Postbox.
Step 4: Configure PGP
Make sure to restart your mail client after installing Enigmail. When done, access the “OpenPGP” menu item and find “Key Management”. When setting up for the first time, you need to generate your keys by choosing “New Keypair”. Choose the email account you want to use PGP with and then assign a passphrase. When done, go ahead and click “Generate Key”.
Step 5: Setup a Failsafe
After Step 4, you will be asked to generate a revocation certificate. This can be used to devoid your public key should your private key get compromised. Also choose “Export Keys to File” from the
OpenPGP menu to create a backup of your keys.
Step 6: Encrypt Your Messages
You can now sign and encrypt messages from the OpenPGP menu. You can do this whenever you compose a new message. You will be asked for your passphrase each time. When done, you can
watch the magic happens as your message turns into an encrypted mess – super spy style!

0 comments:

Facebook Messenger Gets Its First Game, Doodle Draw

Facebook Messenger Gets Its First Game, Doodle Draw


Last Year we heard that Facebook Messenger is actively working on hosting games in its app. Now, it does. Released for Android and iOS, Draw Something for Messenger functions on Facebook's Messenger Platform, which was opened to third-party developers back in March.
Doodle Draw for Messenger is the first game launched for the Facebook Messenger platform, and it is currently available to download in select regions from Google Play and App Store. Users can also download the game by tapping on the three-dot 'More' option in the Messenger app. Before this, the chatting app only featured content creation, sharing, and curated content apps on the platform.
The game should be familiar with those who have already played 'Draw Something' video game as Doodle Draw features the same user interface, gameplay style and more. The game suggests users something to draw, which the users can scribble out and send to a Facebook Messenger contact. The friend then would have to guess what the user has drawn. Earning more points while playing would let users get access to more colors.
As reported by TechCrunch, the Doodle Draw for Messenger at the time of launch let users earn in-game currency by inviting their friends to play with them, which could lead to the spam that games like Candy Crush saga were causing in a big way before Facebook tweaked its algorithms. Doodle Draw developer Clay.io however removed the feature soon after. Doodle Draw for Messenger weighs 4MB and runs on Android 4.0/iOS 6.0 and later OS versions.
Facebook on Wednesday announced that an Android version of its Messenger app has been downloaded more than a billion times from the Google Play store. It is worth noting that both Facebook and Google boast 1 billion app downloads on Google Play.

0 comments:

A History Of Hacking


A History Of Hacking


A history of hacking Hacking has been around for more than a century. In the 1870s, several
teenagers were flung off the country's brand new phone system by enraged authorities. Here's a peek at how busy hackers have been in the past 35 years. Early 1960s University facilities with huge mainframe computers, like MIT's artificial intelligence lab, become staging grounds for hackers. At first, hacker was a positive term for a person with a mastery of computers who could push programs beyond what they were designed to do. Early 1970s John Draper makes a long-distance call for free by blowing a precise tone into a telephone that tells the phone system to open a line. Draper discovered the whistle as a give-away in a box of children's cereal. Draper, who later earns the handle Captain Crunch, is arrested repeatedly for phone tampering throughout the 1970s. Yippie social movement starts YIPL TAP (Youth International Party Line Technical Assistance Program) magazine to help phone hackers (called phreaks) make free long- distance calls. Two members of California's Homebrew Computer Club begin making blue boxes, devices used to hack into the phone system. The members, who adopt handles Berkeley Blue (Steve Jobs) and Oak Toebark (Steve Wozniak), later go on to found Apple Computer. Early 1980s Author William Gibson coins the term
cyberspace in a science fiction novel called Neuromancer. In one of the first arrests of hackers, the
FBI busts the Milwaukee-based 414s (named after the local area code) after members are accused of 60 computer break-ins ranging from Memorial Sloan- Kettering Cancer Center to Los Alamos National Laboratory. Comprehensive Crime Control Act gives Secret Service jurisdiction over credit
card and computer fraud. Two hacker groups form, the Legion of Doom in the United States and the
Chaos Computer Club in Germany. 2600 The Hacker Quarterly is founded to share tips on phone and computer hacking. Late 1980s The Computer Fraud and Abuse Act gives more clout to federal authorities. Computer Emergency Response Team is formed by U.S. defense agencies. Based at Carnegie Mellon University in Pittsburgh, its mission is to investigate the growing volume of attacks on computer networks. At 25, veteran hacker Kevin Mitnick secretly monitors the e-mail of MCI and
Digital Equipment security officials. He is convicted of damaging computers and stealing software and is sentenced to one year in prison. First National Bank of Chicago is the victim of a $70-million computer heist. An Indiana hacker known as Fry Guy -- so named for hacking McDonald's -- is raided by law enforcement. A similar sweep occurs in Atlanta for Legion of Doom hackers known by the handles Prophet, Leftist and Urvile. Early 1990s After AT&T long-distance service crashes on Martin Luther King Jr. Day, law enforcement starts a national crackdown on hackers. The feds nab
St. Louis' Knight Lightning and in New York grab Masters of Deception trio Phiber Optik,  Acid Phreak and Scorpion. Fellow hacker Eric Bloodaxe is picked up in Austin, Texas. Operation Sundevil, a special team of Secret Service agents and members of Arizona's organized crime unit,
conducts raids in 12 major cities, including Miami. A 17-month search ends in the capture of hacker Kevin Lee Poulsen (Dark Dante), who is indicted for stealing military documents. Hackers break into Griffith Air Force Base, then pewwwte computers at NASA and the Korean Atomic Research Institute. Scotland Yard nabs Data Stream, a 16-year-old British teenager who curls up in the fetal position when seized. A Texas A&M professor receives death threats after a hacker logs on to his
computer from off-campus and sends 20,000 racist e-mail messages using his Internet address. In a highly publicized case, Kevin Mitnick is arrested (again), this time in Raleigh, N.C., after he is tracked down via computer by Tsutomu Shimomura at the San Diego Supercomputer Center. Late 1990s Hackers break into and deface federal Web sites, including the U.S. Department of Justice, U.S. Air Force, CIA, NASA and others. Report by the General Accounting Office finds Defense Department computers sustained 250,000 attacks by hackers in 1995 alone. A Canadian hacker group called the Brotherhood, angry at hackers being falsely accused of electronically stalking a Canadian family, break into the Canadian Broadcasting Corp. Web site and leave message The media are liars. Family's own 15-year-old son eventually is identified as stalking culprit. Hackers pierce security in Microsoft's NT operating system to illustrate its weaknesses. Popular Internet search engine Yahoo!
is hit by hackers claiming a logic bomb will go off in the PCs of Yahoo!'s users on Christmas Day 1997 unless Kevin Mitnick is released from prison. There is no virus, Yahoo! spokeswoman Diane Hunt said. 1998 Anti-hacker ad runs during Super Bowl XXXII. The Network Associates ad, costing $1.3-million for 30 seconds, shows two Russian missile silo crewmen worrying that a computer order to launch missiles may have come from a hacker. They decide to blow up the world anyway. In January, the federal Bureau of Labor Statistics is inundated for days with hundreds of thousands of fake information requests, a hacker attack called spamming. Hackers break into United Nation's
Children Fund Web site, threatening a holocaust if Kevin Mitnick is not freed. Hackers claim to have broken into a Pentagon network and stolen software for a military satellite system. They threaten to sell the software to terrorists. The U.S. Justice Department unveils National Infrastructure Protection Center, which is given a mission to protect the nation's telecommunications, technology and
transportation systems from hackers. Hacker group L0pht, in testimony before Congress, warns it could shut down nationwide access to the Internet in less than 30 minutes. The group urges stronger security measures.

0 comments:

5 Deadly Linux Commands That Can Destroy A System

5 Deadly Linux Commands That Can Destroy A System

1. Command  rm -rf
It will Delete Everything Explanation  It is a combination of three keywords. First is  rm It will remove all the files followed by this command. Second is  -rf  This will run rm command in more effective way and will remove everything  ( all files and folders inside the specified folder ) without asking confirmation from the user. Third is This will start removing the data from the root directory and will delete everything from the computer including the data of removable media.

2. Command  (){  & }; 
Shell function that gets replicated. This command creates a shell function ,
which once get initialized starts to create multiple copies of itself. It results in taking quickly all the memory and power of CPU.It makes computer freeze or not responding. This is also known as Denial Of Service Attack.

3. Command  mkfs.ext4 devsda1
 This command will format the hard disk Explanation  This command is again composed of two keywords. First is  mkfs.ext4  This part of command will create a new ext4 file system on following device where this command will get executed. Second is devsda1 ;This part of command specifies the 1st partition on the first hard disk which is probably in use by the user. Similarly, This Command  mkfs.ext3 devsdb2 will Format the second partition on the second hard disk with ext3 File system.

4. Command  devsda
 Write Any content Directly to a Hard Drive. Explanation  This command will execute normally as other commands in linux do. But output of this command will directly be sent to the file system (NTFS or FAT ) of the Hard Drive. It will result into damaging the file system of the computer.

5. Command  mv ~ devnull
Beware it Will Move your Home Directory To Black hole. Explanation  Moving any of your content and data to following path devnull means you want to destroy it. It means devnull is a black hole where once anything sent , can not be recovered back. Note : Many of these commands will only be dangerous if they’re prefixed with sudo on Ubuntu – they won’t work
otherwise. On other Linux distributions, most commands must be run as root.

0 comments:

4 Ways to Be Anonymous Online


Want to be anonymous online to view blocked websites, protect your self from hackers or want to hack some one and stay un-traced?. In the following post i will explain 4 easy ways by which you can stay anonymous online!

4 Ways to Be Anonymous Online


1. Using Proxies

A proxy is an address ( IP address) of a Server (proxy server) that is placed between your computer and the Internet The advantage of a proxy is that your real IP address is Hidden so when you hack your giving the IP address of the proxy sever and not your real IP address Same way if your a normal Internet user the hacker won't get your real IP but the IP of the proxy server.You can use it to enter site or forum that you are IP is banned. To know more about proxies let me know above this post and I will post a full tutorial about it.


2. Using Tor
Tor-proxy is a free proxy-server service that Internet users can use to hide their IP address while surfing the Web. Tor (The Onion Router) is free software for enabling online anonymity. Tor directs Internet traffic through a free, worldwide volunteer network consisting of more than three thousand relays to conceal a user's location or usage from anyone. I have written a complete How to guide on how to use tor - just let me know if you need it


3. SSH Tunneling

SSH tunnel is an encrypted tunnel created through an SSH protocol connection. SSH tunnels may be used to tunnel un encrypted traffic cover a network through an encrypted channel.In easy language,you can surf net without being monitored and even surf blocked sites too. To know more about SSH and SSH tunneling let me know if you would like to read: SSH tunneling guide
.


4. Using VPN

Virtual Private Network. Basically it’s a private network which lets users to connect to other users orremote sites using a public network usually internet. It uses "virtual" connections routed through the Internet from the company’s private network to the remote site or employee instead of physical connections. In short, it is private network constructed within a public network infrastructure,such as the global Internet. The Biggest difference between proxy and VPN is everything in a VPN is encrypted which gives an additional layer of security. There are some paid Andfree VPN services

0 comments:

Hacking Wireless Networks For DUMMIES


Hacking Wireless Networks For DUMMIES


Become a cyber-hero - know the common wireless weaknesses
"Reading a book like this one is a worthy endeavor toward becoming an experienced wireless security professional."
--Devin Akin - CTO, The Certified Wireless Network Professional (CWNP) Program

Wireless networks are so convenient - not only for you, but also for those nefarious types who'd like to invade them. The only way to know if your system can be penetrated is to simulate an attack. This book shows you how, along with how to strengthen any weak spots you find in your network's armor.
Discover how to:
  • Perform ethical hacks without compromising a system
  • Combat denial of service and WEP attacks
  • Understand how invaders think
  • Recognize the effects of different hacks
  • Protect against war drivers and rogue devices

Download Here!

0 comments: