How apt-fast







Matt Parnell of a geek who is well known, makes the syntax for the install process from the server to be faster, view of the increasing number of users in Indonesia, which has a low bandwidth, this method may be very useful.

But to be able to use it would be maximal if mated with axel download accelerator, how to just type the command:

code:
$sudo apt-get install axel

okay immediately wrote .. how do I install it? only 3 lines of command ...

$sudo add-apt-repository ppa:tldm217/tahutek.net $sudo apt-get update $sudo apt-get install apt-fast

The above commands can be used to install like (apt-fast update, apt-fast upgrades, apt-fast dist-upgrade, apt-fast-install), you try to update it ...

Instalation Ubuntu or Linux for Flashdisk



In this tutorial I want to explain a tutorial on how to install Linux using a flash.
This method is claimed to be easier and faster than if we install Linux using a CD or DVD media. Almost all kinds of Linux distributions also support the installation using the
flash.
Before that you need a minimum of 1GB of flash size. You also need the UNetbootin for Linux iso extract files into flash.
In addition, your PC or laptop must support booting from flash.

To download the UNetbootin you can click here. UNet
bootin is available for Windows and Linux.

Various Linux distributions you can download the iso file it here.

Once everything is prepared, you can begin to
install Linux using the flash.

Open the UNetbootin application you have downloaded.

Select diskimage.

Then search for Linux iso file that you downloaded ear
lier.



In the Type field select the USB Drive, in column Drive select the drive letter you want to install flash.

The installation will last for approximately 10 minutes, depending on the speed of transfer of your flash.
After clicking Reboot to start installing Linux.



When the computer restarts do not forget the BIOS settings for your laptop or PC can boot from flash. Usually by pressing F1, F2, F12, ESC, or backspace.

Instalation Windows for Flashdisk








hose who have read my postings Install Windows Xp Fr
om Flashdrive Solution Install Windows without a CD-Rom, this way we can install windows through flash so that is a solution that is suitable for you who want to install windows if you do not have a CD-Rom. In this way we need some files USB_PREP8 and PEtoUSB and through some step that is long enough as well.

Now there is another solution that exactly the same as this, we can make a flash to install windows on a computer. What I mean is WinToFlash, a
program that is about 6MB, with WinToFlash we can move all the contents of the windows installer cd and make the flash bootable and ready to install the windows os. Simply download WinToFlash, then we just run a few steps then it will get a flash that is bootable, more practical than the former.

Here are the steps to install windows by using WinToFlash

What is needed:

- Flash (min, 1GB)

- A computer with a cd / dvd room to create a bootab
le flash

- A computer without the cd room (a computer that wi
ll be installed windowsnya)

1. download WinToFlash

http://wintoflash.com/download/en/

or

2. Extract the downloaded file, then carifile
WinToFlash.exe

3. klik windows setup transfer wizard
4.


then we have to menu wizard mode, then press next.
5.


in this step select the drive (cd rom) where cw installer windows are

while for the usb drive, select the drive from your flash.

6. After selecting the 2 drivers above, then click NEXT

7. then we will see a popup menu of "I Accepted the terms of the license agreement" just press CONTINUE

8. then we will be asked to reformat the flash you

pesanya as follows:

Warning! Formatting will of the erase ALL DATA on the target disk. To format press OK, press Cancel to quit

9. after you click OK the flash will be in the format and then transfer the installer files to the flash will be running windows

10. Next wait until FINISH, after you already have a flash bootable and ready to install on any computer or laptop without cd-rom

The following steps will install when using this bootable flash

1. input flash on a computer that will be installed

2. booting the computer from the flash

if you do not know how to boot from the flash, when you turn the computer / notebook very first press F2 and go into the bios menu.

look for the boot menu, then pilihflashdisk as the primary boot. then press F10 to Save and Exit

after that restart your pc / notebook you,

now you've booted from the flash and select

1st, text mode setup (Boot from flash again after finished)

after the first restart select

2nd, the GUI mode setup, continue setup 1st start of Windows



Good Luck ^_^

Application for Ubuntu


The following are applications that exist on ubuntu please try

1.Tilda
Salah besar jika pengguna Linux tidak pernah menggunakan perintah console, karena (sebenarnya) disinilah salah satu kenikmatan menggunakan Linux :d Nah, Tilda adalah console yang terinspirasi dari game tenar di tahun 90-an yaitu Quake. Tilda berfungsi membuat tampilan console menjadi jauh lebih menyenangkan.

Install:
sudo apt-get install tilda

2.Ubuntu Tweak

Ubuntu Tweak is a tool that lets you change hidden Ubuntu settings, for example: hide or change the splash screen, show or hide icons Computer, Home, Trash, and Network, change Metacity, Nautilus, power management and security settings, etc.. Currently, Ubuntu Tweak is available only for the Ubuntu GNOME desktop, it will not be used to Kubuntu or Xubuntu. This post will provide guidance separately install and use Ubuntu Tweak.

Install Ubuntu Tweak through the Ubuntu repositories:

$sudo add-apt-repository ppa:tualatrix/ppa
$sudo apt-get update
$sudo apt-get install ubuntu-tweak

Install Ubuntu Tweak through manual

Your download file in here

make instalasi

$ cd /media/your file save

$ sudo dpkg -i ubuntu-tweak_0.5.7-1_all.deb

3.Gnome-Do
Especially for those who prefer to use a shortcut than have to click-click menu:) But make no mistake, Gnome-Do is not only used to call the application, but Gnome-Do-with dozens of plugins, can be used for other things that may never have imagined You are: d

Install:
sudo apt-get install gnome-do

4.Gnome Global Menu
Nah bagi yang sudah terbiasa atau menganggap bahwa model menu Mac OS lebih nyaman digunakan, maka Anda harus menginstall applet yang satu ini di Gnome.

sudo add-apt-repository ppa:abhidg/ppa
sudo apt-get update
sudo apt-get install gnome-globalmenu

5.Thunderbird
I use Thunderbird because it does not like the Ubuntu default email client Evolution. In addition, I have been using Thunderbird for more than 5 years with a fixed data continues to be maintained. Alhamdulillah although the data are already very large, Thunderbird still does not reveal a problem.

Install:
sudo apt-get install thunderbird

6.Chromium Web Browser
For some reason, I long to be not too comfortable using Firefox after the emergence of Chromium on Ubuntu. Firefox often deplete memory notebook: (Also, it feels faster than Firefox browsing using Chromium.

sudo add-apt-repository ppa:chromium-daily/ppa
sudo apt-get update
sudo apt-get install chromium-browser

or

Call Ubuntu Tweak, open the Applications -> Add / Remove and search and check the Chromium Browser and Apply.

7.Pidgin (since 9.10)
Ubuntu 9.10 brings Empathy as the default IM while I still prefer using Pidgin.

Install:
sudo apt-get install pidgin

8.Skype
Actually I very rarely chat using Skype, which was not also use it for internet telephony. More often I use Skype to transfer files

Install:
Call Ubuntu Tweak, open the Applications -> Add / Remove and search and check the Skype and App

9.CompizConfig Settings Manager
These are tools to enable a variety of eye candy of Compiz.


Install:
sudo apt-get install compizconfig-setting-managers

10.Liferea Feed Reader
Tools aggregator that I use to follow many blogs and the media through RSS.
Install:
sudo apt-get install liferea

11.
Exaile Music Player
I'm using Exaile since Amarok has the look of his overacting in version 2.0
Install:
sudo apt-get install exaile

12.
XMind
This application is a lot I use to record ideas, ideas and a few other things that are very difficult to be made in plain text form.
Install:
http://www.xmind.net/downloads/

13.Gloobus
This tool allows you to view the contents of a file without having to open the application. Its function is to help job and it looks really cool to make Gloobus is one of the tools that you must install

make install
sudo add-apt-repository ppa:tualatrix/gloobus
sudo apt-get update
sudo apt-get install gloobus-preview

14.
Shutter
Tools capture screen (screenshot) with many features (comparable to the application on Windows).
install
sudo add-apt-repository ppa:shutter/ppa
sudo apt-get update
sudo apt-get install shutter

15.
Tosun VirtualBox
As the name implies, this tool is a virtual machine that can be used to install various operating systems for various purposes.
Install:
http://www.virtualbox.org/wiki/Linux_Downloads

16.Geany
Geany saya gunakan sebagai editor script PHP. Editor ini ringan dan memiliki banyak fitur yang membantu dalam pembuatan script PHP.
Install:
sudo apt-get install geany

17.SMPlayer
Player on Linux is actually very much with their respective advantages and disadvantages. SMPlayer because I like how it looks simple and not fancy
Install:
sudo apt-get install smplayer

18.
Bilbo
Well, the latter is an application that allows you to write blogs. Bilbo supports a variety of blog engines, including WordPress. MovableType and Blogger. If you are former Windows users who frequently use Livewriter, Bilbo is a replacement application in Linux
Install:
sudo apt-get install bilbo

19.
Cairo-Dock
Cairo-Dock is a navigation menu that can be easier for us to run the application without opening the start menu but just by clicking a shortcut on the Dock. Cairo-Dock similar to MacOS Dock owned and like Rocket Dock on Windows.

The first thing we should do is download the package Cairo-Dock, click here to download the Cairo-Dock. .

Select the latest version to improve the performance of Ubuntu and install Cairo-Dock and its plug-ins to your computer.

To select the Ubuntu derivative package, select the extension *. deb
To select other packages, select the extension *. tar.bz


your instalasi

1.sudo dpkg-i-cairo dock_v2.0.7_i686.deb
2.sudo dpkg-i-cairo-Dock plug-ins_v2.0.7_i686.deb
3.sudo apt-get install libcairo2 librsvg2-2 libglitz1 libglitz-glx1

20. VLC player
application for Music
make install
$ sudo apt-get install vlc

Good Luck ^_^...

25 Add-ons in the Best for Mozilla


1.Adblock Plus

Ads pop up as well as the appear on the web Audited a course disturbing, especially FOR slow internet users New Media The Connection. Not only slow the loading Audited julian, but advertising can also waste bandwidth internet quota What we have. Solutions to ITU New Articles Which is the way to block ads appear.

Adblock Plus is an addon / plugin / add-on for Firefox browser has a function of the President to block the ads appear on sites that we visit. Not only THAT, adblock plus is also able to block the specific OBJECT-OBJECT OF ADA on another site a: scripts, frames, images, CSS, and others.

Adblock Plus ad blocking Setiap almost What appears on another web Audited BETWEEN google adsense, yieldmanager, adbrite, etc..

(https://addons.mozilla.org/id/firefox/addon/1865?collection_uuid=c867f4e3-1031-72c6-d68a-6d8593691b6b)

2.Personas Plus

one of the features of Firefox 3.6 is the Personas, a feature that allows the user to provide a new atmosphere in the browser, because the user can change the background of the browser with various attractive designs which are designed by designers with a variety of themes ranging from fashion, music, nature, sports and various other design themes.

As explained in the blog Mozilla, Personas is one experiment that was developed in the Mozilla Labs and is now Personas has graduated from Labs and will become an established feature. This change is also marked by the removal of various designs that used Personas can be found at getpersonas.com now be transferred to addons.mozilla.com, which means it will receive serious attention from Firefox, because as we know, one of the advantages of Firefox to be is a popular browser add-ons.

(https://addons.mozilla.org/id/firefox/addon/10900?collection_uuid=c867f4e3-1031-72c6-d68a-6d8593691b6b)

3. No Script

Make sure you are browsing dah hobby known as the name of Mozilla Firefox. What! Not familiar? please refer to this review. You know that Firefox was really a browser that is "safe" really for surfing the internet. Especially for those who frequently access the website to conduct online transactions such as click MANDIRI
The proof is really one of the many FireFox extensions NoScript diantarnya. No Script is an extention of firefox that provides comprehensive access for us to block or enable java script on the website that we visit. If the website really can we trust (such as web-based online banking), we can allow for java script can walk. But, if for any suspicious websites better java scritp to disable our website only.
(https://addons.mozilla.org/id/firefox/addon/722?collection_uuid=c867f4e3-1031-72c6-d68a-6d8593691b6b)
4. Firebug.
(Https: / / addons.mozilla.org/id/firefox/addon/1843? Collection_uuid = c867f4e3-1031-d68a-72c6-6d8593691b6b)
Add-ons to edit, debug, and monitor CSS, HTML, and JavaScript in any web page.

5. Greasemonkey.
(Https: / / addons.mozilla.org/id/firefox/addon/748? Collection_uuid = c867f4e3-1031-d68a-72c6-6d8593691b6b)
Allows you to customize how to display web pages using JavaScript.

6. ImTranslator.
(Https: / / addons.mozilla.org/id/firefox/addon/2257? Collection_uuid = c867f4e3-1031-d68a-72c6-6d8593691b6b)
Online Translator with the 1640 language support.

7. Xmarks Bookmark and Password Sync.
(Https: / / addons.mozilla.org/id/firefox/addon/2410? Collection_uuid = c867f4e3-1031-d68a-72c6-6d8593691b6b)
Add-ons for bookmarking.

8. Cooliris.
(Https: / / addons.mozilla.org/id/firefox/addon/5579? Collection_uuid = c867f4e3-1031-d68a-72c6-6d8593691b6b)
The fastest and most amazing ways to browse the photos and videos from the web or your desktop.

9. AniWeather.
(Https: / / addons.mozilla.org/id/firefox/addon/12331? Collection_uuid = c867f4e3-1031-d68a-72c6-6d8593691b6b)
Add-ons for weather.

10. Stylish.
(Https: / / addons.mozilla.org/id/firefox/addon/2108? Collection_uuid = c867f4e3-1031-d68a-72c6-6d8593691b6b)
Stylish allows you to easily install themes and skins to Google, Facebook, YouTube, Orkut, and many other sites.

11. Yoono.
(Https: / / addons.mozilla.org/id/firefox/addon/1833? Collection_uuid = c867f4e3-1031-d68a-72c6-6d8593691b6b)
Add-ons for social networks and instant messaging.

12. Read It Later.
(Https: / / addons.mozilla.org/id/firefox/addon/7661? Collection_uuid = c867f4e3-1031-d68a-72c6-6d8593691b6b)
Add-ons to save pages and read later with just one click.

13. AmazonAssist.
(Https: / / addons.mozilla.org/id/firefox/addon/64761? Collection_uuid = c867f4e3-1031-d68a-72c6-6d8593691b6b)
Amazon.com Official add-on.

14. ReminderFox.
(Https: / / addons.mozilla.org/id/firefox/addon/1191? Collection_uuid = c867f4e3-1031-d68a-72c6-6d8593691b6b)
Add-ons for the reminder.

15. InvisibleHand.
(Https: / / addons.mozilla.org/id/firefox/addon/11377? Collection_uuid = c867f4e3-1031-d68a-72c6-6d8593691b6b)
Add-ons to show notice of a price of a product.

16. WeatherBug.
(Https: / / addons.mozilla.org/id/firefox/addon/2455? Collection_uuid = c867f4e3-1031-d68a-72c6-6d8593691b6b)
Displays weather forecast.

17. Glue.
(Https: / / addons.mozilla.org/id/firefox/addon/3481? Collection_uuid = c867f4e3-1031-d68a-72c6-6d8593691b6b)
Helping you find your favorite movie, book, or music albums.

18. Delicious Bookmarks.
(Https: / / addons.mozilla.org/id/firefox/addon/3615? Collection_uuid = c867f4e3-1031-d68a-72c6-6d8593691b6b)
Delicious Bookmarks is the official Firefox add-on for Delicious.

19. Image Zoom.
(Https: / / addons.mozilla.org/id/firefox/addon/139? Collection_uuid = c867f4e3-1031-d68a-72c6-6d8593691b6b)
Adding functions to zoom and photo rotation

20. StumbleUpon.
(Https: / / addons.mozilla.org/id/firefox/addon/138? Collection_uuid = c867f4e3-1031-d68a-72c6-6d8593691b6b)
Helping you find sites that match your interests

21. YSlow.
(Https: / / addons.mozilla.org/id/firefox/addon/5369? Collection_uuid = c867f4e3-1031-d68a-72c6-6d8593691b6b)
To analyze the performance of a website.

22. Shareaholic.
(Https: / / addons.mozilla.org/id/firefox/addon/5457? Collection_uuid = c867f4e3-1031-d68a-72c6-6d8593691b6b)
Shareaholic is the easiest way to share interesting Web pages using Facebook, Email, Gmail, Reader, Bookmarks, Buzz, Evernote, Bit.ly, and more.

23. KidZui.
(Https: / / addons.mozilla.org/id/firefox/addon/9689? Collection_uuid = c867f4e3-1031-d68a-72c6-6d8593691b6b)
Change the browser to be fun for the kids.

24. Destroy the Web.
(Https: / / addons.mozilla.org/id/firefox/addon/14572? Collection_uuid = c867f4e3-1031-d68a-72c6-6d8593691b6b)
For video games.

25. CLIP.
(Https: / / addons.mozilla.org/id/firefox/addon/12544? Collection_uuid = c867f4e3-1031-d68a-72c6-6d8593691b6b)
Pictures photos and links to search pages Craigslist.

Checking Web Server of Netcraft


Netcraft is an Internet service provider company based in Bath, England. Revenue earned by Netcraft sourced from:

* Provider of Internet security services that include anti-
fraud services and anti-phishing, testing and other applications.
* Provide data for research on various aspects on the Internet. Netcraft has been exploring the Internet since 1995 and has the authority on the market share of web servers, operating systems, hosting providers, ISPs, encrypted transactions, electronic business, scripting languages and content technologies on the Internet.
* The cost of advertising on the Netcraft site.

Through its website, namely netcraft.com, Internet users ca
n check from situs2 web server on the Internet. Here's a snapshot of it:




This immediately wrote try Netcraft

Port Scanner NMAP


Actually this tutorial long time ago I made .. tp klo does not hurt my posts in my blog, who knows could be useful for teman2 in need.

www.insecure.org
~ ~ ~ ~ Fydor

at this time I will explain the basis and concept of the use of nmap (port scanner) to find out how many are open port2 on the target. If there are no errors kesalahan2 writing or description, please in the correction ya .. because I am also still in the learning stage. for teman2 who already understand yes please add more of his articles, can let our deeper understanding in the use of nmap.

[-1. Is nmap it?

nmap port scanner is a very famous in the world of hacking. and many are used to audit a system, where to find open ports allowing those ports can be exploited by the intruder. msh many more besides NMAP port scanner in the Internet world, such as: superscan, THC, BluesPortTool, etc..

[-2. Explanation
nmap in the latest version now already has a feature that is very good at all, can even be said complete. This is very helpful at all when we start scanning or start a "peek" open port on the target computer. NMAP has a lot in terms of sanning techniques, such as: UDP, TCP Connect (), TCP SYN (half open), ftp proxy (bounce attack), ICMP (ping sweep), FIN, ACK sweep, Xmas Tree, Null scans, etc is .. NMAP also has the advantage to know what OS is used by the target .. Mmm .. Cool it! that not less mantepnya, in the latest version can spoof our IP and MAC. Begh ... Ma
ntep Coy! This is useful for IP and MAC we can not know (anonymity network).
In practice I use nmap on windows, but in windows there are some functions that can not be executed but can be run on Linux: (. I also use ZA firewall (to view the log by an intruder), and sometimes I turn off the firewall (to view ports which benar2 open on my computer). because if we use a firewall, there are special port2 that he block and the lid is logical by the firewall.
"Woi!, Game tutorials dong .. even ngebacot again!" Ok .. Ok ... wait, yes, a little more direct koq practice. hehehehe ...: D

[-3. Supported platforms NMAP
Linux, Microsoft Windows, FreeBSD, OpenBSD, Solaris, IRIX, Mac OS X, HP-UX, NetBSD, Sun OS,

[-4. Depedencies on penginstall NMAP

if we want nmap running on windows we have to require that his name WinPcap. Download and install on your computer. can be downloaded at the link below:
http://www.winpcap.org

Download nmap on the link below. the installation directory, it's up to you routed .. tp klo may be yes in "C: \ nmap" let the easy access to it through cmd. : D
http://www.insecure.org/nmap/nmap_download.html

Performance of nmap can be found on his website. Tp, When I try on Linux, nmap faster process than in windows. That's according to me seh .. there may be an opposite.

[-4. Basic Scanning
If you want to see help from nmapnya

C: \ nmap> nmap-h

Example 1: You want to know what ports are open from ports 1-65535 and the OS is used by the target.
C: \ nmap> nmap-v-sS-p1-65 535-O 192.168.1.2

mean:
-V = verbose
-SS = stealth scan
-P = port scans
-O = OS detection
192.168.1.2 = target

results:
[Quote]
Starting Nmap 4.11 (http://www.insecure.org/nmap) at 2006-10-07 16:14

Standard Time
Initiating ARP Ping Scan against 192.168.1.2 [1 port] at 16:14
The ARP Ping Scan stores 0.08s to scan 1 total hosts.
mass_dns: warning: Unable to determine any DNS servers. Reverse DNS is d
Try using-system-dns or specify valid servers with-dns_servers
DNS resolution of 1 IPs stores 0.02s.
Initiating SYN Stealth Scan against 192.168.1.2 [65535 ports] at 16:14
Discovered open port 23/tcp on 192.168.1.2
Discovered open port 25/tcp on 192.168.1.2
Discovered open port 80/tcp on 192.168.1.2
Discovered open port 443/tcp on 192.168.1.2
Discovered open port 5900/tcp on 192.168.1.2
Discovered open port 445/tcp on 192.168.1.2
Discovered open port 135/tcp on 192.168.1.2
Discovered open port 139/tcp on 192.168.1.2
Discovered open port 1066/tcp on 192.168.1.2
The SYN Stealth Scan stores 23.05s to scan 65535 total ports.
For osscan assuming port 23 is open, 1 is closed, and neither are firewa

Host 192.168.1.2 appears to be up ... good.
Interesting ports on 192.168.1.2:
Not shown: 65526 closed ports
PORT STATE SERVICE
23/tcp open telnet
25/tcp open smtp
80/tcp open http
135/tcp open msrpc
139/tcp open netbios-SSN
443/tcp open https
445/tcp open microsoft-ds
1066/tcp open unknown
5900/tcp open vnc
MAC Address: 00:17:31: AC: 48:4 D (Asustek Computer)
Device type: general purpose
Running: Microsoft Windows 2003/.NET | NT/2K/XP
OS details: Microsoft Windows 2003 Server or XP SP2
TCP Sequence Prediction: Class = truly random
Difficulty = 9999999 (Good luck!)
IPID Sequence Generation: Incremental

Nmap finished: 1 IP address (1 host up) Scanned in 24 328 seconds
Raw packets sent: 68 100 (2.997MB) | rcvd: 65 551 (3.016MB) [/ quote]
Well, already you can see it port2 are open and what OS is running the target .. O yes, to run-sS (stealth scanning) you must have permissions as an admin. Um .. Gaining want that computer? Difficult Boy ..! Hehe .. Advanced ah ..

Example 2: The above his cuman only port and its service information .. now we will see the service and the version of the open port2. keep your eyes with me!
C: \ nmap> nmap-v-sV-p1-65 535-O 192.168.1.2

The result: some of my output is not edited so much.
[Quote]
23/tcp open telnet Microsoft Windows XP telnetd
25/tcp open smtp Microsoft ESMTP 6.0.2600.2180
80/tcp open http Microsoft IIS webserver 5.1

135/tcp open msrpc Microsoft Windows RPC
139/tcp open netbios-SSN
443/tcp open https?
445/tcp open microsoft-ds Microsoft Windows XP microsoft
1066/tcp open msrpc Microsoft Windows RPC
5900/tcp open vnc VNC (protocol 3.3; Locked out) [/ quote]
Well, now saw versionnya. : D

example 3:
When we do the scanning, we recorded real IP in the firewall log or if you use snort snort. Nah, klo dah caught .. Game Over dech ... dah dong is not fun anymore .. stay waiting in the target samperin aja ama. : D
Now as never before is how we maintain the anonymity of our footprinting nmap IP or during scanning. The concept we can do decoy or deception of a source (check me if i wrong). Oh no, kyanya confused neh. we immediately practice dech .. Here we use the IDS. Oh yeah, our computer with IP 192.168.1.1 and 192.168.1.2 target

C: \ nmap> nmap-v-sV-p 22-O 192.168.1.2
when we do the scanning .. snort logs record like this:
[Quote]
[**] SCAN nmap TCP [**]
11/07-01: 33:18.752219 192.168.1.1:55464 -> 192.168.1.2:22
TCP TTL: 46 TOS: 0x0 ID: 12 633 IpLen: 20 DgmLen: 60
*** A **** seq: 0x18D5EF65 Ack: 0x0 Win: 0xC00 TcpLen: 40
TCP Options (4) => WAS: 10 NOP MSS: 265 TS: 1061109567 0 [/ quote]
Well, it caught our IP .. : D "word of the snort, I got U.." current we use the decoy, the decoy addresses asal2an we enter IP address.

C: \ nmap> nmap-v-sV-O-D 192.168.1.2 192.168.2.10-p 22
logs like this:
[Quote]
[**] SCAN nmap TCP [**]
11/07-12: 01:08.582551 192.168.2.10:35522 -> 192.168.1.2:22
TCP TTL: 46 TOS: 0x0 ID: 1902 IpLen: 20 DgmLen: 60
*** A **** seq: 0x2B740381 Ack: 0x0 Win: 0xC00 TcpLen: 40
TCP Options (4) => WAS: 10 NOP MSS: 265 TS: 1061109567 0 [/ quote]
Hehe .. Our IP is not listed .. "Said the attacker, U can not get me."

Alhamdulillah, finally arrived at the end of this tutorial .. Hopefully useful tutorial .. yes actually there's still plenty more to be clarified .. tp klo mostly lazy to read it again instead Ntar ..

reference:
http://www.insecure.org
http://www.google.com
C: \ nmap> nmap-h
My brain

Asus 1015 PEM


Late August, Intel launched the presence of their first dual-core processor designed specifically for the Atom N550 netbook platform. The processor is the first dual-core Atom processors are aimed at netbook.

Along with the presence of these processors, Intel said a number of partners they directly deliver their products that utilize netbook Atom N550 into the market. One of them is Asustek with the Eee PC netbook series 1015PEM.

Design and Specifications
From the design, netboook 1015PEM Eee PC is similar to the Eee PC 1015PE who had already been present in the market. This netbook also use matte plastic casing and keyboard design chicklet.

Keyboard with these designs facilitate those who have fingers larger than average so as not to slip pressing a button next to the button he meant. Unfortunately, there are several buttons that have a small size to keep raises the risk of one push.

To move the cursor, Asus provides a touchpad measuring 7.6 x 4 inches. Wide e
nough for a netbook. To click, though there are no buttons left and right, because both are fused into a button, you can still click as usual. The following is a brief specification of the Asus Eee PC 1015PEM.

Processor: Intel Atom N550 1.5 GHz, 1MB cache
Chipset : Intel Express chipset NM10
Memory : 1GB DDR3
VGA : Intel GMA 3150
Display : 10.1 inch 1024x600 LED Backlight
Harddisk : 160GB, 2.5 "SATA 5400rpm
Sound / speakers: Integrated stereo speakers, HD Audio CODEC
Optical Drive: -
Battery : 6 cell Lithium Ion battery up to 13 hours
Connectivity: WiFi, Gigabit LAN, Bluetooth
External Ports: VGA, RJ-45, Mic / Headphone, 3 USB 2.0, card reader
Dimensions: 262 x 178 x 23.6 to 36.4 mm
Weight: 1.27 Kg (with 6 cell battery)

Operating system: Windows 7 Starter Edition
Warranty: 1 know


Features
Eee PC 1015PEM have the same completeness as netbooks in general. VGA port and a USB port on the left side and two on the right allows the user to connect a USB modem or an external hard drive while still recharge the battery cell phone and MP3 player, for example.


To do video conferencing, Asus provides a 0.3 megapixel camera at the top of the screen. Interestingly, there is a 'door' slide in front of the camera lens. It's quite useful to ensure that the camera will not catch the user when he is not ready.

This netbook also has a facility called Express Gate. Feature is application 'instant-on' Linux-based operating system that can be directly used in about 5 seconds after the button
is pressed. If users only need to surf the internet, chatting, communicating through Skype, simply press the button on the left corner to activate this feature. Now if you want to get into the operating system Windows 7, the button is on the right hand corner.

Performance Test
Using the Express Gate feature, less than 10 seconds we can immediately surf the Internet. Unfortunately, when we try to explore, we need to connect the ethernet cable to the LAN port. Unable to use WiFi.


In terms of performance, dual core processors are used, despite their lower clock that is only 1.5 GHz and the system makes the application more responsive when running.

Through the application of RightMark CPU Clock Utility, noted that the battery on this netbook has the full capacity of 56.305mWh. If used continuously, the application estimates that the battery can last up to 5 hours 26 minutes.

The test battery life we do use the application Imtec Battery Mark. When tested, and by enabling the CPU load, carrying batteries can last for 4 hours 46 minutes.


In terms of performance, dual core processors are used, despite their lower clock that is only 1.5 GHz and the system makes the application more responsive when running.

Through the application of RightMark CPU Clock Utility, noted that the battery on this netbook has the full capacity of 56.305mWh. If used continuously, the application estimates that the battery can last up to 5 hours 26 minutes.

The test battery life we do use the application Imtec Battery Mark. When tested, and by enabling the CPU load, carrying batteries can last for 4 hours 46 minutes.

From a brief experiment that we do, Asus Eee PC with dual core processors we can recommend to you who are looking for compact portable computer, with a somewhat decent processor in terms of speed. Battery that can last up to 5 hours or more, depending on how to use a netbook, too bad.

In Indonesia, this netbook will be marketed in three colors namely black, white, red, and blue in the price range of $ 440 or approximately Rp 3, 89 millions.


Excess
- Dual-core processor, better performance
- Battery durable enough

Deficiency
- Some of the buttons are smaller, less comfortable when worn

Prozilla



This time I discussed about the download manager again, and this difference as a download manager JDownloader previous. Unlike JDownloader, prozilla is lighter because they do not GUI based, which means to run it must use the terminal. To download acceleration equal to the IDM in windows (with the same internet connection) it can support even prozilla resume downloading are in IDM.

Some of his fiture include:

1. Supports FTP and HTTP
2. Supports Resume Download
3. Multiple connections and configuration of connections
4. Support for FTP search and choose the fastest server automatically
5. Used restricted maximum bandwidth (bps / bytes per second)

Instalasinya cukup mudah, langkah-langkahnya sebagai berikut :
Buka terminal, lalu ketikkan ( copy paste perintah ini juga bisa )

$wget http://old-releases.ubuntu.com/ubuntu/pool/universe/p/prozilla/prozilla_1.3.7.4-1_i386.deb

next:

$sudo dpkg -i prozilla_1.3.7.4-1_i386.deb

Once completed installed we can arrange a place / file that is downloaded is in prozilla.conf

$sudo gedit /etc/prozilla.conf

Find the lowest writing (mainoutputdir), and content suitable location that you want an example. Do not forget to delet a # before mainoutputdir

mainoutputdir = /home/panji/downloads

Save and exit. Prozilla you're ready to use. Emmm how how?

Previously there are several options when you akanmendownload file:

-R: used for files that you download can diresume (depending on the download from where)
-K = 10: sample mean in addition to the downloaded file will be divided into 10 connections.
-Max-bps = 30 000: these options are used for bandwidth becomes 30KBps melimit

For example, suppose we will medownload a file

proz -r -k=4 http://www61.indowebster.com/70e4b074f3fcc96647f20ac60f3e01a4.rar


Good Luck ^_^..

TuxCut = NetCut in Linux

TuxCut, an application that can be used to cut off Internet access at hotspots, or a PC LAN workgroup from client to server or vice versa by using the ARP protocol. This program is used by network users are impish and want to take a quota of bandwidth for his own use. Tuxcut PyQt made of language, for more details can directly visit the official website at

http://bitbucket.org/a_atalla/tuxcut/src/

In the feature bundle Tuxcut been created to protect us for our internet connection can not be dicut or in pieces by other users. In addition, there are features for scanning and MAC MAC changer, too. In contrast to Netcut, so we are protected from mischievous users who use Netcut, we have to install the program again the AntiNetcut (although netcut always more advanced than the anti netcut).

For how to uninstall it, here I use the Ubuntu Linux-based operating system.
1. Download TuxCut, because we want to install in kubuntu, we downloaded the debian package in

http://bitbucket.org/a_atalla/tuxcut/downloads/TuxCut-3.2_all.deb

2. Before installing TuxCut, we need to install arp-scan arp-tables and dsniff (requires Internet connection for kebih easily install it in the process)
a. Install with the command arp-scan

$ sudo apt-get arp-scan

b. Install dsniff with the command

$ sudo apt-get install dsniff

c. Install arptables, download the latest version of arptables

http://sourceforge.net/projects/ebtables/files/arptables/
The command:

tar zxf arptables-v0.0.3-3.tar.gz cd arptables-v0.0.3-3 make && make install

3.Install TuxCut with the command

$ sudo dpkg -i TuxCut-3.2_all.deb

* /If there are errors because the libraries are still lacking, they can apply the following command: apt-get install-f*/

initial appearance on tuxcut:


penggunaanya hampir sama dengan netcut pada sistem operasi windows
Good Luck ^_^...

Firesheep


When logging into a website you usually start by submitting your username and password. The server then checks to see if an account matching this information exists and if so, replies back to you with a "cookie" which is used by your browser for all subsequent requests

.

It's extremely common for websites to protect your password by encrypting the initial login, but surprisingly uncommon for websites to encrypt everything else. This leaves the cookie (and the user) vulnerable. HTTP session hijacking (sometimes called "sidejacking") is when an attacker gets a hold of a user's cookie, allowing them to do anything the user can do on a particular website. On an open wireless network, cookies are basically shouted through the air, making these attacks extremely easy.

This is a widely known problem that has been talked about to death, yet very popular websites continue to fail at protecting their users. The only effective fix for this problem is full end-to-end encryption, known on the web as HTTPS or SSL. Facebook is constantly rolling out new "privacy" features in an endless attempt to quell the screams of unhappy users, but what's the point when someone can just take over an account entirely? Twitter forced all third party developers to use OAuth then immediately released (and promoted) a new version of their insecure website. When it comes to user privacy, SSL is the elephant in the room.

Today at Toorcon 12 I announced the release of Firesheep, a Firefox extension designed to demonstrate just how serious this problem is.

After installing the extension you'll see a new sidebar. Connect to any busy open wifi network and click the big "Start Capturing" button. Then wait.

As soon as anyone on the network visits an insecure website known to Firesheep, their name and photo will be displayed:

Double-click on someone, and you're instantly logged in as them.

Firesheep is free, open source, and is available now for Mac OS X and Windows. Linux support is on the way.

Websites have a responsibility to protect the people who depend on their services. They've been ignoring this responsibility for too long, and it's time for everyone to demand a more secure web. My hope is that Firesheep will help the users win.

please try at their own risk........

Anti-Firesheep Trick Protects Linux Users





The Firesheep plug-in for Firefox has done an admirable job of illustrating the insecurity of public Wi-Fi, just as its creators intended. Now that it's out there in the wild, however, the question for users is how to protect their sensitive information.

On the Windows side, pretty much all we've seen so far have been tools that simply alert you when Firesheep is being used on the network you're connected to. Unfortunately, they don't go beyond that to actually protect your data.
For Linux users, however, the situation is better. A free new solution from security firm Sophos lets users of the open source operating system "browse over unencrypted Wi-Fi access points with no more risk than you'd browse at home," according to its blog post from earlier today.
It takes only 60 seconds to set up, even for users on the road, and it works even if you're already working over unencrypted Wi-Fi, the company says.
Remote Browsing
Sophos's solution centers on a 120-line Python http proxy hosted at a URL in Japan. Users begin by visiting that URL and then cutting and pasting the proxy into an editor and saving it, resulting in a 4500-byte file.
Next, users secure-copy that file onto the shell server on their home network so they can run the proxy remotely, away from the insecure Wi-Fi network. They then start that proxy with an encrypted SSH tunnel so they can send and receive the http content securely from that insecure Wi-Fi network to their home network, where the browsing requests will actually take place.
Users then simply tell their browser that they're going to surf over that SSH tunnel to the remote proxy, effectively allowing them to browse the Web from the airport or wherever via the security of their home network.
A YouTube video demonstrates the process involved, including the specific commands and Firefox settings.
The Linux Advantage
Linux users already enjoy many widely acknowledged security advantages over their Windows counterparts, so it's nice to see one more such benefit in the world of Wi-Fi.
As for Windows users? They'd probably do well to consider Wi-Fi alternatives such as tethering or MiFi, at least when dealing with sensitive data.

New virus travels in PDF files


On Tuesday morning, Network Associates' McAfee antivirus division became aware of the first virus--known as "Peachy"--that uses PDF to spread, said Vincent Gullotto, senior director of McAfee's Avert group.

Fortunately, those who are simply viewing a PDF, or Portable Document Format, file aren't vulnerable. The virus spreads only by way of Adobe's Acrobat software--the program used to create PDF documents--not through Acrobat Reader, the free program that is used to view the files.

There is no way for this to affect Acrobat Reader," said Adobe's Sarah Rosenbaum, director of Acrobat product management. "The code in Acrobat that recognizes attachments does not exist in Reader."

Peachy exploits an Acrobat feature that allows people to embed other files within a PDF--attachments that can be opened only by people using Acrobat.

Right now it's considered to be a low risk because we haven't seen it reported to us from a customer," Network Associates' Gullotto said.

But the Peachy virus raises the issue that PDF files--widely used to display documents within Web browsers and e-mail--could become a new channel for spreading viruses.

What I'm concerned about here is that this could be a new frontier," said Richard Smith, chief technology officer of the Privacy Foundation. "It's considered to be a safe file format." Smith posted news of the virus to the Bugtraq security mailing list Tuesday.

It's clear that if Adobe modified future versions of Reader so that it could read attachments embedded in PDF files, the program could fall victim to Peachy's descendents.

Rosenbaum said that while it's possible Adobe might add attachment-handling capability in future editions of Acrobat Reader, the company has no immediate plans to do so.

Smith said he believes Acrobat Reader software could prove susceptible in any case. Indeed, the Computer Emergency Response Team posted news of a vulnerability in the Windows version of Acrobat in November 2000 that could let an outside attacker gain control over the computer of a person who simply viewed a PDF file. Adobe patched that hole.

Adobe said any popular software becomes a target for security attacks and Acrobat has crossed that threshold.

"I think the attraction...has reached a critical level recently," Rosenbaum said. "It's only been in the last 18 to 24 months that PDF...use has really exploded."

How Peachy works
Acrobat lets people embed different file types within a PDF, including everything from the VBScript programs--used in the LoveLetter virus--to an actual executable program, Gullotto said.

Peachy is named after a small game in a PDF file that involves finding peaches, Gullotto said. According to a person called Zulu, who said he wrote Peachy, showing the solution to the game runs a VBScript file.

The virus then spreads to others using e-mail addresses collected from Microsoft Outlook, Gullotto said. Hiding the VBScript file in a PDF document bypasses the filters in newer versions of Outlook that ordinarily screen out VBScript files.

However, these more recent versions of Outlook, such as Outlook 2002 or those that have been patched with a security update, do take measures that hamper viruses such as Peachy, said David Jaffe, lead product manager for Microsoft Office. Although PDF files--and whatever embedded programs are hidden in them--aren't screened out, Outlook warns the user when a virus or other automated process tries to access Outlook's address book or use the program to send e-mail, Jaffe said.

Through an agreement with Adobe announced in June, McAfee's software can scan PDF files, Gullotto said. However, as with other virus types, the software isn't always able to catch new viruses until its definitions are updated.

Updated virus descriptions released by McAfee next week will be able to detect Peachy, Gullotto said.

But Adobe doesn't currently plan to prevent VBScript or other files from running.

To prevent Peachy from being able to run, "the change we would have to make is not to allow VBScript attachments. That is a problem for a lot of our customers," Rosenbaum said. "If they change their opinion, we will do what they want."

People with the full version of Acrobat will have to exercise caution when opening attachments to PDF files. However, opening attachments isn't automatic: A cautionary dialog box asks if a person wants to proceed.