Thursday, February 12, 2009
Wednesday, February 11, 2009
Certified training will describe about the definition and basic concept of hacking activity for confusing, tricking until computer disorder. On this material is based on 5 basic step for a hacker, beginning from Reconnaissance; Scanning; Gaining Access; Maintaining Access and Clearing Tracks.
This knowledge is good for;
- IT Security Officers
- IT Security Auditors
- IT Security Professionals
- Site Administrators
- Other practitioner of networking
- Introduction to Ethical Hacking
- Hacking Laws
- Google Hacking
- System Hacking
- Trojans and Backdoors
- Viruses and
- Social Engineering
- Hacking Email Accounts
- Session Hijacking
- Hacking Web Servers
- Web Application Vulnerabilities
- Web-Based Password Cracking Techniques
- SQL Injection
- Hacking Wireless Networks
- Physical Security
- Linux Hacking
- Evading IDS, Firewalls and Detecting Honey Pots
- Buffer Overflows
- Penetration Testing
- Covert Hacking
- Writing Virus Codes
- Assembly Language Tutorial
- Exploit Writing
- Smashing the Stack for Fun and Profit
- Windows Based Buffer Overflow Exploit Writing
- Reverse Engineering
- MAC OS X Hacking
- Hacking Routers, cable Modems and Firewalls
- Hacking Mobile Phones, PDA and Handheld Devices
- Bluetooth Hacking
- VoIP Hacking
- RFID Hacking
- Hacking USB Devices
- Hacking Database Servers
- Cyber Warfare- Hacking, Al-Qaida and Terrorism
- Internet Content Filtering Techniques
- Privacy on the Internet
- Securing Laptop Computers
- Spying Technologies
- Corporate Espionage- Hacking Using Insiders
- Creating Security Policies
- Software Piracy and Warez
- Hacking and Cheating Online Games
- Hacking RSS and Atom
- Hacking Web Browsers (Firefox, IE)
- Proxy Server Technologies
- Data Loss Prevention
- Hacking Global Positioning System (GPS)
- Computer Forensics and Incident Handling
- Credit Card Frauds
- How to Steal Passwords
- Firewall Technologies
- Threats and Countermeasures
- Case Studies
- Economic Espionage
- Patch Management
- Security Convergence
- Identifying the Terrorist
The Winnt32.exe program is used to customize the process for upgrading existing installations. The Winnt32.exe program is used for installing Windows 2000 from a computer that is currently running Windows 95/98 or Windows NT. As with the Winnt.exe program, you can use command-line switches to customize the setup process. The options available for Winnt32.exe are listed in Table below:
Creates an additional folder within the system root folder (where the Windows 2000 system files are located).
Also creates an additional folder within the system root folder, but Setup deletes the files after installation is completed.
Executes a command before the final phase of Setup.
Installs additional files to the hard disk that are necessary to load a command-line interface for repair and recovery purposes.
Creates a debug log at the level specified. By default, it creates C:\Winnt32.log at level 2(the warning level).
Specifies the location of the Windows 2000 installation files. It must contain the full path using the drive letter (e.g., f:\path) or UNC (\\server\shared_folder\path). To simultaneously copy files from multiple paths, use a separate /s switch for each source path.
Copies Setup start files to a hard disk and marks the partition as active. You can then install the hard disk in another computer. When you start that computer, Setup starts at the next phase. Use of this switch requires the /tempdrive switch.
Places temporary files on the specified drive and installs Windows 2000 on that drive.
Performs an unattended installation. The answer file provides the custom specifications to Setup. If you do not specify an answer file, all user settings are taken from the previous installation.
Indicates an identifier (id) that Setup uses to specify how a Uniqueness Database File (UDF) modifies an answer file (see the /u entry). The UDF overrides values in the answer file, and the identifier determines which values in the UDF file are used. For example, /udf:RAS_user,Our_company.udf overrides settings specified for the identifier RAS_user in the Our_company.udf file. If no UDF_file is specified, Setup prompts the user to insert a disk that contains the $Unique$.udf file.
It is important to know the difference between command-line switches for Winnt.exe and Winnt32.exe. Most of the switches have similar functionality with a different syntax. Ensure that you know the different syntaxes for each.
Tuesday, February 3, 2009
As you can see, the Control Panel provides a means for configuring and modifying settings for various components, including:
- Accessibility Options Customizes features designed to provide better accessibility for the disabled
- Add/Remove Hardware Guides you in the process of installing, removing, and troubleshooting Plug and Play hardware
- Add/Remove Programs Installs and removes application programs and Windows components.
- Administrative Tools A collection of utilities for configuration and management of the computer
- Date/Time Allows you to set the date, time, and time zone.
- Display Lets you customize the desktop appearance and modify display settings; used to set wallpaper, fonts, colors, screen resolution, etc.
- Folder Options Allows you to change the appearance of folders, change file associations, and configure offline folders.
- Fonts Used to install, delete, and manage fonts.
- Internet Options Lets you configure options for your Web browser.
- Keyboard and Mouse These applets allow you to set options for your keyboard and pointing device, including customizing cursors.
- Network and Dial-up Connections Used to configure new network connections and the properties of the protocols, user preferences, and other settings.
- Printers Allows you to install, delete, configure, and manage both local and network printers.
- Regional Options Customizes settings for display of time, language, and other region-specific settings.
- Scheduled Tasks Used to set up tasks to run automatically at specified dates and times.
- Sounds and Multimedia Lets you set system sounds for specified events and configure sound devices.
- System Provides system information and allows you to modify environment settings, network identification information, performance options, and startup and recovery information.
- Users and Passwords Manages local user accounts
Microsoft always recommends that if possible, you use the Control Panel interface to make changes rather than editing the Registry directly. Unfortunately, that's not always possible, which brings us to the next component.