• Web Services Security - The Basics

    Wiki defines Web services as “Application programming interfaces (API) or web APIs that can be accessed over a network, such as the Internet, and executed on a remote system hosting the requested services”. So putting this down in simpler words, it is a function of the application that can be...
  • Top 10 Tips To Secure Laptops For Airline Travel

    Laptops are becoming more common than desktop computers. An increasing number of business and personal travelers bring along their laptops on flights. You should be prepared to remove your laptop from your laptop bag or carrying case to send it through the airport security checkpoint in its own...
  • HACKING

    It is the most common type of Cyber crime being committed across the world. Hacking has been defined in section 66 of The Information Technology Act, 2000 as follows "whoever with the intent to cause or knowing that he is likely to cause wrongful loss or damage to the public or any person destroys...
  • Internet Explorer Shortcut Keys

    Shortcut keys are very useful to do work on any application very easily. Here are some short cut keys of Internet Explorer (IE). To do this                                          ...
  • Check a login page is real or fake

    Hackers use this trick very often. They send you a link via email or other method. when you click on that link you find a login page there. They insist you t enter your personal information on it like email id, password etc. When you enter this detail in that login form your account can be hacked....
  • WHAT IS MAC ADDRESS.

    MAC address (Media Access Control address) is a quasi-unique identifier consists of a six byte number that attached to most network adapter card or network interface card (NIC). As such, all network cards, whether it’s of Ethernet NIC, Gigabit Ethernet NIC or wireless 802.11a/b/g/n WiFi or HiperLAN...

Wednesday, March 16, 2011

Introduction to Networking A basic understanding of computer networks is requisite in order to understand the principles of network security. In this section, we'll cover some of the foundations of computer networking, then move on to an overview of some popular networks. Following that, we'll take a more in-depth look at TCP/IP, the network protocol suite that is used to run the Internet and many...
EthernetEthernet is the most popular physical layer LAN technology in use today. Other LAN types include Token Ring, Fast Ethernet, Fiber Distributed Data Interface (FDDI), Asynchronous Transfer Mode (ATM) and LocalTalk. Ethernet is popular because it strikes a good balance between speed, cost and ease of installation. These benefits, combined with wide acceptance in the computer marketplace...
This is always a huge topic and it seems simple to many of us but the fact of the matter is we have a lot of "new" people so we need to be clear about this sort of thing. (Note all commands should be run as root or with sudo) 1. To start networking in Backtrack 4 final issue the following command. /etc/init.d/networking start This will attempt to start all the interfaces in the /etc/network/interfaces...
You can reveal passwords hidden behind asterisks or ******* easily. For Windows users, they can see the hidden password quickly using the free software in which I will...
...