Monday, August 10, 2009

install windows7 evolution copy build 7100

kat sini saya nak tunjukkan cara2 nak install windows 7.windows 7 ni asal die windows longhorn sebelum vista.dan apabila microsoft mengetahui kelemahan vista, para engginear die buat penambahbaikan dan terhasillah windows vienna dan nama tersebut di tukar menjadi windows 7

k saya nak tunjuk serba sedikit cmane nak install windows 7.mula masukkan cd dan apabila kuar arahan pada screen hitam enter sahaja.tunggu sampai kuar paparan ini





kemudian klik next



klik install now.lepas tu akan keluar paparan ini




sampai keluar paparan ini


>


klik accept pastu next




pastu klik pada custom advanced.akan keluar paparan ini



installation lebih kurang mcm vista je..papran diatas menunjukkan partition pada pc tersebut.pilih salah satu partition dan klik next.
perhatian
pastikan patition yang di pilih saiz 30gb ke atas,ini kerana windows 7 memerlukan 18gb saiz hard disk dan 10gb free space,




installation bermula











dan akhirnya maka siaplah installation windows 7



selamat mencuba...

How to Downgrade Vista to XP

Downgrading from Windows Vista to Windows XP is almost like installing Windows XP for the first time. You should take all the normal precautions like backing up all your important files and record important passwords in a different place, preferably on a CD. When you downgrade from Windows Vista to XP, note that Windows Vista will be completely removed from your system.

(Note: There is a way to have both Vista and XP in a dual boot configuration, but that's an option for more advanced users. See Dual Booting Vista and XP for more info on that.)

Before you begin the XP installation, make sure that the necessary XP hardware drivers are available, or included on the XP disk provided by your PC vendor. If in doubt, check the vendor's website or poke around with your favorite search engine to see if others have attempted the XP install on the same hardware. You may be able to install XP without all the needed drivers, but some hardware may not work afterwards.

Also, make sure that you have a genuine Windows XP CD before you begin the downgrade. Be sure to read the section earlier in this article to see if you qualify for a low/no cost XP recovery disk from your PC vendor. If not, perhaps you have an XP disc that came with another computer. If you've upgraded an existing computer from XP to Vista, the best choice would be the XP install/recovery disc that came with that computer. One some PC's the vendor doesn't ship a CD, but the recovery CD can be created from disk images on the hard drive. If all else fails, you can always buy a copy of Windows XP on Ebay. Just be sure it's a legal, licensed copy.

Follow these steps to install Windows XP on your Vista machine:

* Insert your Windows XP install/recovery CD and restart your computer.
* Install Windows XP normally, providing either the product key that came with the disk, or the one you got from Microsoft customer support. If the installer warns you that another copy of Windows is already installed, don't worry. Remember, this install will wipe out your existing Vista installation.
* Activate your copy of Windows XP when it prompts you to do so. If you run into the "already activated" problem, you can use the option to activate by phone.
* If you own Vista Business or Vista Ultimate, explain to the rep that you want to use your Downgrade Rights to install XP Pro.
* If you own Vista Home Basic/Premium, or you are installing XP Home Edition, don't mention ANYTHING about Vista. Just give the rep your XP product key (not the Vista key), explain that you are installing XP on a new hard drive, and tell them you need to activate.

Have you successfully downgraded from Vista to XP? Share your experience. Got questions or comments about downgrad

Tuesday, August 4, 2009

website-website tentang network security

kat sini saya sertakan website-website security network dan post ini akan diupdate dari semasa ke semasa:
http://www.securityfocus.com
http://sectools.org/
http://cybersecurity.org.my
http://mycert.org.my
http://www.iss.net/
http://netsecurity.about.com/
http://www.interhack.net/pubs/network-security/

Monday, August 3, 2009

contoh diagram network

What Is Security?

*

Security is a measurement, not a characteristic.

It is unfortunate that many software projects list security as a simple requirement to be met. Is it secure? This question is as subjective as asking if something is hot.
*

Security must be balanced with expense.

It is easy and relatively inexpensive to provide a sufficient level of security for most applications. However, if your security needs are very demanding, because you're protecting information that is very valuable, then you must achieve a higher level of security at an increased cost. This expense must be included in the budget of the project.
*

Security must be balanced with usability.

It is not uncommon that steps taken to increase the security of a web application also decrease the usability. Passwords, session timeouts, and access control all create obstacles for a legitimate user. Sometimes these are necessary to provide adequate security, but there isn't one solution that is appropriate for every application. It is wise to be mindful of your legitimate users as you implement security measures.
*

Security must be part of the design.

If you do not design your application with security in mind, you are doomed to be constantly addressing new security vulnerabilities. Careful programming cannot make up for a poor design.


labih lanjut layari web ni : http://phpsec.org/projects/guide/1.html#1.1

Securing Apache Web Server with mod_security

he Internet has its share of packet filters and proxy servers in order to increase the security for clients and servers alike. Filtering network traffic is never a bad idea since it provides a basic level of protection. When it comes down to protecting web servers your packet filter will most probably allow HTTP and HTTPS traffic to your server application. Unless you deploy an application proxy that inspects HTTP you can't do more. But you can equip your Apache web server with mod_security which in turns helps you to analyse any request thrown at it.
Application Layer Inspection

When you do any network traffic filtering or inspection you have to keep in mind that usually nothing understand the things that should be inspected better than the application in question. This is one of the reasons why proxy filters are "better" suited for this job. They know the protocol and can normalise fancily encoded requests. mod_security is in a very similar position. It sits right inside the Appache httpd process and inspects the HTTP requests. This is an important advantage over proxies since it can also see compressed or even encrypted content without difficulties.

So, what needs to be inspected? Apache's httpd surely does inspect HTTP requests. What do I need more? Well, there are some things mod_security can do for you.

* Better logging
The module can log the content of HTTP POST requests. Apache usually doesn't log that. Furthermore you can log complete HTTP transactions. This makes the job of a potential attacker harder. In addition to that you have a very fine control on what and when to log.
* Real time operation
mod_security sees the requests directly and can act immediately.
* Anomalies
The security module can act on anomalies in the web server operation by looking at request rates, IP addresses, HTTP sessions and user account.
* Black-/whitelisting
You can use a signature-based approach and define what you want to allow and what you want to block.
* Protects other web servers
You can even protect other web server software by combining it with mod_proxy. The Apache server can act as reverse proxy thus seeing all HTTP requests and applying rule sets.

nak lebih lanjut layari : http://linuxgazette.net/143/pfeiffer.html

Trojan Horse

Trojan horse is a destructive program that hides themselves as an ordinary harmless programs. A trojan program installed successfully in a PC, can permit an intruder to access or modify any information available in the PC and worst still the software configuration of a computer can be changed to permit subsequent intrusions. Examples of Trojan horse activities are erasing files and directories, collecting passwords and sending sensitive personal information to other users.

Antivirus Sites

Updating Virus Definition / Signature File

Update your Virus Definition to protect your computer from the latest viruses, worms or trojans. Below are the direct links to the update sites of some popular anti-virus software.

* Armour Anti-Virus
* Avast! Anti-Virus
* AVG Anti-Virus
* Command AntiVirus
* eTrust Antivirus
* F-Secure
* Hauri ViRobot
* Kaspersky Lab
* McAfee
* Norton AntiVirus
* Sophos Anti-Virus
* Trend Micro

Virus Information Center

Information on the current malicious code threats can be found here.

* CA's Security Advisor
* F-Secure Virus Description Database
* Hauri Virus Search
* NOD32 Virus Encyclopedia
* McAfee Threat Center
* Sophos Threat Analyses
* Symantec Threat Explorer
* Trend Micro Virus Information
* Virus Bulletin

Malicious Software

Malicious software also known as malware is a computer program created with malicious intents. It performs some malicious tasks such as stealing your identity, key logging, disrupt system, damage data or may attack other computers. It may be installed unintentionally when users open unsolicited emails, visit pornography and warez sites or just simply attacked by unknown source while being online. Usually unpatched systems or systems with vulnerable applications will easily become target to malware.

Malicious software includes

* Trojan horse
* Virus
* Worms

Interspersed among real virus notices are computer virus hoaxes. While these hoaxes do not infect systems, but they are time consuming and costly to handle. Read about Internet Hoax if you receive an unvalidated warning about viruses or trojans.

Please regularly check the below sites whenever you receive a virus alert.

* Antivirus sites
* Hoax database sites

If you suspect that your computer has been infected by malicious software, you may need to run a freeware tool called HijackThis and investigate its output. If you are unable to do so, you can email us at mycert [at] mycert.org.my with the attachment of the output. Another tool that could be used to remove malicious software is SUPERAntiSpyware.

Please read our brief guide on how to use these two software and how to obtain logs as below.

* HijackThis
* SUPERAntiSpyware

SMURF Attack

Problem:

As explained at http://www.quadrunner.com/~chuegen/smurf.cgi:

The "smurf" attack, named after its exploit program, is one of the most recent in the category of network-level attacks against hosts. A perpetrator sends a large amount of ICMP echo (ping) traffic at IP broadcast addresses, all of them having a spoofed source address of a victim. If the routing device delivering traffic to those broadcast addresses performs the IP broadcast to layer 2 broadcast function noted below, most hosts on that IP network will take the ICMP echo request and reply to it with an echo reply each, multiplying the traffic by the number of hosts responding. On a multi-access broadcast network, there could be potentially hundreds of machines reply to each packet.

The "smurf" attack's cousin is called "fraggle", which uses UDP echo packets in the same fashion as the ICMP echo packets; it is a simple re-write of "smurf".

Currently, the providers/machines most commonly hit are IRC servers and their providers.

There are two parties whom are hurt by this attack... the intermediary (broadcast) devices--let's call them "amplifiers", and the spoofed address target, or the "victim". The victim is the target of a large amount of traffic that the amplifiers generate.

Let's look at the scenario to paint a picture of the dangerous nature of this attack. Assume a co-location switched network with 100 hosts, and that the attacker has a T1. The attacker sends, say, a 768kb/s stream of ICMP echo (ping) packets, with a spoofed source address of the victim, to the broadcast address of the "bounce site". These ping packets hit the bounce site's broadcast network of 100 hosts; each of them takes the packet and responds to it, creating 100 ping replies out-bound. If you multiply the bandwidth, you'll see that 76.8 Mbps is used outbound from the "bounce site" after the traffic is multiplied. This is then sent to the victim (the spoofed source of the originating packets).

Solutions:

*

Apply filtering rules at your border router.

Filter out ICMP/UDP packets directed for broadcast addresses. To filter out ICMP directed broadcast, please use this vendor specific information (for others please refer to http://www.quadrunner.com/~chuegen/smurf.cgi):
o

Cisco - as of IOS version 12.0, a feature called no ip directed-broadcast" is now the default configuration. For previous versions of IOS, use the interface configuration command to enable this.
o

Bay Networks - You can use this command

[1:1]$bcc
bcc> config
hostname# ip
ip# directed-bcast disabled
ip# exit
o

3Com NetBuilder - To disable 3Com routers from forwarding directed broadcast, you can enter this command

SETDefault -IP CONTrol = NoFwdSubnetBcast

*

Apply patches for hosts to discard ICMP directed broadcast

Here is the relevant information for specific platforms:
o

IBM AIX 4.x - use this command

no -o bcastping=0 Â Â Â Â # disable bcast ping responses (default)
o

Solaris - add this command into /etc/rc2.d/S69inet

ndd -set /dev/ip ip_respond_to_echo_broadcast 0
o

FreeBSD - as of version 2.2.5, FreeBSD does not respond to echo request directed for broadcast addresses. The relevant sysctl parameter is

net.inet.icmp.bmcastecho
o

NetBSD/OpenBSD - use this parameter for sysctl

sysctl -w net.inet.ip.directed-broadcast=0
o

Linux - in Linux you can completely deny echo request by compiling this option in the kernel, i.e. CONFIG_IP_IGNORE_ECHO_REQUESTS.

However, this violates RFC 1122. To protect Linux hosts from this attack, one can make use of Linux's in-kernel firewall capability. This can be done with

ipfwadm -I -a deny -P icmp -D 123.123.123.0 -S 0/0 0 8
ipfwadm -I -a deny -P icmp -D 123.123.123.255 -S 0/0 0 8

(replace 123.123.123.0 and 123.123.123.255 with your base network number and broadcast address, respectively).

SYSLOG and SNMP Bombs

Problem:

This issue is more like the MAIL BOMB ATTACK.

Unauthorized users can send large amounts of large log messages to your logging server, often filling up disk space on you system, denying collection of additional logging data.

These attacks usually involve the unauthorized user(s) sending thousands of large log messages to your server.

Once the disk fills up, additional messages are rejected by the server.

Solutions:

*

Deploy monitoring systems

Ensure your monitoring systems monitor the number of log messages coming into your server, and reporting sudden spikes in traffic.

In addition, monitoring systems should check for active disk space on your systems, and reporting when your partitions are in jeopardy.
*

Ensure log directories are on dedicated disk partitions

Ensure that your mail spool and log directories would not affect other aspects of the system if they where filled.

For example, having a log message directory on a Unix ROOT file system may effect the availability of the system itself if the system was subject to a successfull Denial Of Service Attack.
*

Report abuse to your Internet Service Provider

When a Denial Of Service attack is detected on your systems, contact the Security Department of your Internet Service Provider to have them assist in tracking down the source of the active attack.

Mail Bomb

Problem:

Unauthorized users can send large amounts of large email messages to and through your email server, often filling up disk space on your mail system, denying email services to other users.

These attacks usually involve the unauthorized user(s) sending thousands of large binary attachments to a single or multiple valid users on your server (or spooling through your server in attack against someone else, using your server to hide his tracks).

Once the disk fills up, the server rejects additional messages.

Solutions:

*

Deploy monitoring systems

Ensure your monitoring systems monitor the number of messages coming into your server, and reporting sudden spikes in traffic.

In addition, monitoring systems should check for active disk space on your systems, and reporting when your partitions are in jeopardy.
*

Ensure mail spool areas are on large, dedicated disk partitions

Ensure that your mail spool and log directories would not affect other aspects of the system if they were filled.

For example, having the mail spool, queue and/or users mail directories on a Unix ROOT file system may affect the availability of the system itself if the system was subject to a successful Denial Of Service Attack.
*

Report abuse to your Internet Service Provider

When a Denial Of Service attack is detected on your systems, contact the Security Department of your Internet Service Provider to have them assist in tracking down the source of the active attack.

ICMP or PING Flood Attack

Problem:

Unauthorized users can disrupt your service or consume your available network bandwidth by sending a constant stream of forged ICMP packets to your system(s).

Known as a "Ping Flood" attack, computer hackers send a steady stream of PING packets (known as "echo request" packets) to your system(s). In many cases, this flood of traffic can consume system resources, and even consume significant amounts of bandwidth on mid to low speed connections (eg; T1 and below).

Solutions:

*

Block Traffic

In most cases, you can simply deny ICMP packets on your network firewalls to prevent the traffic from affecting your systems. However, since the traffic is still traversing your access line, you need to ensure your Internet Service Providor is involved.
*

Report abuse to your Internet Service Provider

When a Denial Of Service attack is detected on your systems, contact the Security Department of your Internet Service Providor to have them assist in tracking down the source of the active attack.

SYN Attack

SYN Attack

Problem:

All systems on the Internet which accept TCP connections are susceptible to a SYN attack.

From CERT Alert CA-96.21:

"When a system (called the client) attempts to establish a TCP connection to a system providing a service (the server), the client and server exchange a set sequence of messages. This connection technique applies to all TCP connections--telnet, Web, email, etc.

The client system begins by sending a SYN message to the server. The server then acknowledges the SYN message by sending SYN-ACK message to the client. The client then finishes establishing the connection by responding with an ACK message. The connection between the client and the server is then open, and the service-specific data can be exchanged between the client and the server. Here is a view of this message flow:

Client Server
------ ------
SYN-------------------->
<--------------------SYN-ACK
ACK-------------------->


Client and server can now send service-specific data.

The potential for abuse arises at the point where the server system has sent an acknowledgment (SYN-ACK) back to client but has not yet received the ACK message. This is what we mean by half-open connection. The server has built in its system memory a data structure describing all pending connections. This data structure is of finite size, and it can be made to overflow by intentionally creating too many partially-open connections.

Creating half-open connections is easily accomplished with IP spoofing. The attacking system sends SYN messages to the victim server system; these appear to be legitimate but in fact reference a client system that is unable to respond to the SYN-ACK messages. This means that the final ACK message will never be sent to the victim server system.

The half-open connections data structure on the victim server system will eventually fill; then the system will be unable to accept any new incoming connections until the table is emptied out. Normally there is a timeout associated with a pending connection, so the half-open connections will eventually expire and the victim server system will recover. However, the attacking system can simply continue sending IP -spoofed packets requesting new connections faster than the victim system can expire the pending connections.

In most cases, the victim of such an attack will have difficulty in accepting any new incoming network connection. In these cases, the attack does not affect existing incoming connections nor the ability to originate outgoing network connections.

However, in some cases, the system may exhaust memory, crash, or be rendered otherwise inoperative.

The location of the attacking system is obscured because the source addresses in the SYN packets are often implausible. When the packet arrives at the victim server system, there is no way to determine its true source. Since the network forwards packets based on destination address, the only way to validate the source of a packet is to use input source filtering..."

Solutions:

The SYN Attack rests at the very core of identified weakness of the TCP/IP protocal, and are difficult, if not impossible in some cases, to correct.

Denial Of Services

Denial Of service attack is giving dramatic effects on the service and stability of its victims.

Although this is not something new, the increased accessability of the Internet and the ever decreasing age and sophistication of the average computer hacker, is resulting in an enourmous surge in the type of attack which is specifically and solely intended to deny service to the system or application. In many cases, the exploit code to conduct these attacks are freely available on the Internet, and it can affect the stability of the system only by a few keystrokes and by mere click of the mouse.

These attacks take advantage of the deficiencies in the TCP/IP protocal which is used as the baseline for communications on the Internet, and they are difficult, if not impossible, to trace their source since the packets can be "spoofed" or "forged" as they come from any source on the Internet