Friday, May 9, 2014

BASIC LINUX COMMANDS GORVAM SADDAR


                                                                Basic Linux Commands

Command
Example
Description
cat
Sends file contents to standard output. This is a way to list the contents of short files to the screen. It works well with piping.
cat .bashrc
Sends the contents of the ".bashrc" file to the screen.
cd
Change directory
cd /home
Change the current working directory to /home. The '/' indicates relative to root, and no matter what directory you are in when you execute this command, the directory will be changed to "/home".
cd httpd
Change the current working directory to httpd, relative to the current location which is "/home". The full path of the new working directory is "/home/httpd".
cd ..

Move to the parent directory of the current directory. This command will make the current working directory "/home.
cd ~
Move to the user's home directory which is "/home/username". The '~' indicates the users home directory.
cp
Copy files
cp myfile yourfile
Copy the files "myfile" to the file "yourfile" in the current working directory. This command will create the file "yourfile" if it doesn't exist. It will normally overwrite it without warning if it exists.

How To Protect Your Data Of Zero-Day by gorvam saddar

ZERO-DAY A FUTURE THREAT, AND HOW TO PROTECT YOUR DATA.

ABSTRACT

It is known that practically all software has security flaws (programming problems that give individuals opportunities to explore previously nonexistent), many of these vulnerabilities not yet discovered, and hundreds are corrected every month through the packages available organizations affected, sometimes new versions and updates.
The term " zero day " (zero hour or 0day ) refers to the unknown nature of security breaches for companies , this attack tries to exploit computer application vulnerabilities that are unknown yet even by software manufacturers . Explaining in a simple and generally, there are two types of "exploit", or flaws / vulnerabilities that can be used in attacks. Those found by security companies and found by hackers whose purpose is exploration.
The issue is that some hackers choose to disclose newly discovered failures to apply the necessary corrections are sometimes rewarded for it with prizes. The “black hats” usually prefer to save for their own benefit a future attack or to share with attackers before the developer of software knows about the vulnerability.


HISTORY ALGORITHM AES

DDOS Attack Types And Tools by gorvam saddar


1
Denial of service (DOS) attack, a type of attack on a network that is designed to bring the network to its knees by flooding it with useless traffic. Many DoS attacks, such as the Ping of Death and Teardrop attacks, exploit limitations in the TCP/IP protocols.

Types:-

PC Computer Secret Tips and tricks by gorvam saddar

Make a photo background in drives Perform the following steps ..>>
 Open notepad and copy the following code :
[{BE098140-A513-11D0-A3A4-00C04FD706EC}]
iconarea_image=D:\Wallpapers\celeb\Genelia.jpg
iconarea_text=0x00FFFFFF

 Here, the path in the 2nd line of code represents the path of your picture. so just change at dere only....
 Now save this file as DESKTOP.INI in the location(any drive or any folder) where you desire to set the background picture.
 After setting it in your favourite location,close the drive and open the location again.
DONE !! .. your picture has been set as background picture for your desired location.
 

NOTE : Make sure that the extension in the path should be .jpg only and file should be saved as DESKTOP.INI only.


OPEN BLOCK WEB USING CALCULATOR
Now access the internet via your standard Microsoft Calculator using this trick.
You can do this for fun or when your browser is messed up for some unexplainable reason.
Steps:

all about windows commands .ALL WINDOWS COMMANDS Gorvam saddar



ASSOC Displays or modifies file extension associations.
ATTRIB Displays or changes file attributes.
BREAK Sets or clears extended CTRL+C checking.
*BCDEDIT Sets properties in boot database to control boot loading.
CACLS Displays or modifies access control lists (ACLs) of files.
CALL Calls one batch program from another.
CD Displays the name of or changes the current directory.
CHCP Displays or sets the active code page number.
CHDIR Displays the name of or changes the current directory.
CHKDSK Checks a disk and displays a status report.
CHKNTFS Displays or modifies the checking of disk at boot time.
*CHOICE Batch file command that allows users to select from a set of options.
CIPHER Displays or alters the encryption of directories [files] on NTFS partitions.
*CLIP Redirects output of another command to the Windows clipboard.
CLS Clears the screen.