Quantcast
Channel: Brain Book
Browsing all 195 articles
Browse latest View live

SARG INSTALLATION ON UBUNTU 12

SARG INSTALLATION AND CONFIGURATION ON UBUNTU 12NOTE: web server is required to view reports. apt-get install apache2apt-get install sargnano /etc/sarg/sarg.confroot@raabtaproxy:/etc/sarg# cat...

View Article


HOW TO SHUTDOWN AND RESTART LINUX

How do I use shutdown command?NOTE: Use commands without sudo for other linux distributionsThe shutdown command can be used to turn off or reboot a computer. Type the command as follows to shutdown...

View Article


ZeroShell-2.0.RC2 Installation on Hard Disk

Install Zeroshell-2.0.RC2 on the hard disk1. First download the image from the official site ZeroShell-2.0.RC2.iso. Also Download ZeroShell-2.0.RC2-IDE-USB-SATA-2GB.img.gz 

2. Open ISO image with...

View Article

SQUID 3.3.3 COMPILATION ON UBUNTU 12

Compilation of Squid 3.3.3 on Ubuntu 12## Switch to root usersudo suapt-get updateapt-get upgradewget  http://www.squid-cache.org/Versions/v3/3.3/squid-3.3.3.tar.gztar -xzvf squid-3.3.3.tar.gzapt-get...

View Article

FIX BAD SECTORS IN HARD DRIVE

open command prompt in windows with Administrator privileges.## Switch to drive having bad sectorsc:\>f:## check the disk with below commandf:\>chkdsk  /f  /r

View Article


QMOBILE NOIR A50

Qmobile Noir A50 LaunchedSpecifications and PricePriceProcessorROMSIZECameraGPSWLAN3.5mm Ear JackInternal/External Memory  Operating SystemSIM SlotRAMDisplayNetworkBluetoothBattery (N/A)(1.x GHz Dual...

View Article

WIFI TIPS AND TRICKS

To show and delete wifi profiles in windowsTo show the key of wifi interfacenetsh wlan show profiles name=[profile name] key=clearTo delete the stored profile of every WLAN interface.netsh wlan delete...

View Article

VSFTPD ON UBUNTU 12.04 WITH chroot_local_user=YES AND allow_writeable_chroot=YES

VSFTPD FOR UBUNTU 12.04Vsftpd installation and configuration1.    login as root (or sudo..) and do the following:2.    apt-get install python-software-properties3.    sudo add-apt-repository...

View Article


Image may be NSFW.
Clik here to view.

BEAUTIFUL PAKISTAN

BEAUTIFUL PAKISTAN

View Article


HOW TO SETUP VPN (PPTP) SERVER ON DEBIAN LINUX

VPN-ing into your server will allow you to connect to every possible service running on it, as if you were sitting next to it on the same network, without individually forwarding every port combination...

View Article

RSYNC BACKUP LOCAL AND NETWORK

RSYNC1.     --dry-run This tells rsync to not actually do anything. It will just write a log of what it would do to the screen. Once you've made sure everything will work as you expect, you have to...

View Article

SYMMETRIC AND ASYMMETRIC ENCRYPTION

Symmetric EncryptionSymmetric encryption is the oldest and best-known technique. A secret key, which can be a number, a word, or just a string of random letters, is applied to the text of a message to...

View Article

PORTS AND PROTOCOLS

TABLE LEGENDUseDescriptionColorOfficialPort is registered with IANA for the applicationWhiteUnofficialPort is not registered with IANA for the application  RedMultiple useMultiple applications are...

View Article


Image may be NSFW.
Clik here to view.

STP – Spanning Tree Protocol

STP - Spanning Tree ProtocolThe 802.1D Spanning Tree Protocol (STP) standard was designed at a time when the recovery of connectivity after an outage within a minute or so was considered adequate...

View Article

Information Security Interview Questions & Answers

1. What’s the difference between a router, a bridge, a hub and a switch?Router join multiple networks togetherBridge connects a LAN to another LANHub is a device to connect multiple computer together...

View Article


Hosts Entry in Windows 7

How to Resolve Domain Login Delay issue?How to add hosts entry in windows 7?1. Open notepad with “Run as Administrator” privileges2. Open windows hosts file from c:\windows\system32\drivers\etc\hosts5....

View Article

Penetration Testing

Backtrack Penetration Testing: What is Penetration Testing?Penetration testing is the legal and authorized attempt to exploit a computer system with the intent of making a network or system more...

View Article


AUDIT TRAILS IN LINUX

Audit Trails in Linux/etc/audit.rulesauditctl - a command to assist controlling the kernel’s audit system. You can get status, and add or delete rules into kernel audit system. Setting a watch on a...

View Article

APACHE BENCHMARKING

make a file in /var/www/html/<!DOCTYPE HTML PUBLIC"-//W3C//DTD HTML 4.0 Transitional//EN"><html><head><title>Webserver test</title></head><body>This is a...

View Article

SWAP FILE OR SWAP SPACE

SWAPFILE OR SWAPSPACEAdd a Swap Filedd if=/dev/zero of=/swapfile bs=1024 count=65536(6MB Swap file)mkswap /swapfileswapon /swapfile/etc/fstab entry for permanent swapfile on boot time/swapfile...

View Article
Browsing all 195 articles
Browse latest View live