Tuesday, March 24, 2009

Certified Ethical Hacker

This is the training for hacker candidate that will know or should be known if you want be a hacker. The material itself will be mastery the how to fools or paralyses the computer system. Hacking materials are about Reconnaissance; Scanning ; Gaining Access ; Maintaining Access till Clearing Tracks.

Persons that better have this knowledge like as:
  • IT Security Officers
  • IT Security Auditors
  • IT Security Professionals
  • Site Administrators
  • Everyone who want to know network security system
The material contains as follows:

1. Introduction to Ethical Hacking
2. Hacking Laws
3. Footprinting
4. Google Hacking
5. Scanning
6. Enumeration
7. System Hacking
8. Trojans and Backdoors
9. Viruses and Worms
10. Sniffers
11. Social Engineering
12. Phishing
13. Hacking Email Accounts
14. Denial-of-Service
15. Session Hijacking
16. Hacking Web Servers
17. Web Application Vulnerabilities
18. Web-Based Password Cracking Techniques
19. SQL Injection
20. Hacking Wireless Networks
21. Physical Security
22. Linux Hacking
23. Evading IDS, Firewalls and Detecting Honey Pots
24. Buffer Overflows
25. Cryptography
26. Penetration Testing
27. Covert Hacking
28. Writing Virus Codes
29. Assembly Language Tutorial
30. Exploit Writing
31. Smashing the Stack for Fun and Profit
32. Windows Based Buffer Overflow Exploit Writing
33. Reverse Engineering
34. MAC OS X Hacking
35. Hacking Routers, cable Modems and Firewalls
36. Hacking Mobile Phones, PDA and Handheld Devices
37. Bluetooth Hacking
38. VoIP Hacking
39. RFID Hacking
40. Spamming
41. Hacking USB Devices
42. Hacking Database Servers
43. Cyber Warfare- Hacking, Al-Qaida and Terrorism
44. Internet Content Filtering Techniques
45. Privacy on the Internet
46. Securing Laptop Computers
47. Spying Technologies
48. Corporate Espionage- Hacking Using Insiders
49. Creating Security Policies
50. Software Piracy and Warez
51. Hacking and Cheating Online Games
52. Hacking RSS and Atom
53. Hacking Web Browsers (Firefox, IE)
54. Proxy Server Technologies
55. Data Loss Prevention
56. Hacking Global Positioning System (GPS)
57. Computer Forensics and Incident Handling
58. Credit Card Frauds
59. How to Steal Passwords
60. Firewall Technologies
61. Threats and Countermeasures
62. Case Studies
63. Botnets
64. Economic Espionage
65. Patch Management
66. Security Convergence
67. Identifying the Terrorist

Wednesday, March 4, 2009

Change Recovery Policy

To change the recovery policy for the local computer

  1. Click Start, click Run, type mmc, and then click OK.
  2. On the File menu, click Add/Remove Snap-in, and then click Add.
  3. Under Add Standalone Snap-in, click Group Policy, and then click Add.
  4. Under Group Policy Object, make sure that Local Computer is displayed, click Finish
  5. Click Close, and then click OK.
  6. In Local Computer Policy, click Public Key Policies.

Location:

    • Local Computer Policy

o  Computer Configuration

o        Windows Settings

o        Security Settings

o        Public Key Policies

  1. In the console tree, right-click Encrypted Data Recovery Agents, and then do one of the following:
    • To designate a user as an additional recovery agent using the Add Recovery Agent wizard, click Add.
    • To request a new file recovery certificate using the Certificate Request wizard, click Create. To complete this procedure, you must have the appropriate permissions to request the certificate and the certification authority (CA) must be configured to issue this type of certificate.
    • To delete this EFS policy and every recovery agent, click Delete Policy. If you select this option, users cannot encrypt files on this computer.

Attention:

  • Before changing the recovery policy in any way, you should first back up the recovery keys to a floppy disk.

Notes

  • You must be logged on as an administrator or a member of the Administrators group in order to complete this procedure. If your computer is connected to a network, network policy settings might also prevent you from completing this procedure.
  • Usually, the computer issues a default self-signed certificate that designates the initial Administrator account as the default recovery agent. However, if the user who first logs on after installation creates a second account by using the Create New User Wizard, then the second account becomes the default recovery agent.
  • If the default recovery agent's certificate is deleted without another recovery agent specified in the policy, the computer has an empty recovery policy. An empty recovery policy means that a recovery agent does not exist. This turns EFS off, so users cannot encrypt files on this computer.
  • In a domain, a default recovery policy is implemented for the domain when the first domain controller is set up. The domain administrator is issued the self-signed certificate, which designates the domain administrator as the recovery agent. To change the default recovery policy for a domain, log on to the first domain controller as an administrator.
  • To make changes to the File Recovery certificate, right-click the certificate and then clicking Properties. For example, you can use this to give the certificate a friendly name and enter a text description.