Wednesday, June 29, 2011

How to Secure Your PC


How to secure Data
Mirror backup
Lock Folder ( Use strong password )
Lock Local Hardisk ( partition d,e..... )
Organise Folder and File
Encrypt the Data
Hidden Folder

*Mirror backup - Sejenis backup yg memerlukan 2 hardisk iaitu primary and secondary

Types of mirror backup
  • RAID 0





     



  • RAID 1














  • RAID 5

















How to secure hardware
  • Letak skru
  • kunci casing cpu
  • used dual power supply
  • used dual BIOS
  • used dual network card
  • Backup all harware as long as it can be backup
How to secure system
  • Create password to enter window
  • Create user account
  • Create permission for user
  • Join domain
  • Firewall
  • Antivirus
  • Create password for sleep computer
How to secure application
  • Delete cache
  • Clear cookies
  • Buy original software
  • Permission to run
  • Install application kat partition len
  • Dont click remember password in search engine application
  • Dont forget to log out before quit window

Security

Why we need Security??
There is a lot information in our computer, these data are store in text file or database. Security is needed to against unauthorized person.

Principal that must have in Security
C- Confidentiality ( Data Privacy )
I - Integrity ( Data is original )
A - Availability ( Can access the data )

Type of attack
  • Interruption Attack - Mesej x samapi kpd receiver
  • Interception Attack - Mesej yg di hantar di ketahui oleh attacker
  • Modification Attack - Attacker mengubah mesej asal
  • Fabrication Attack - Attacker hantar mesej kpd receiver tetapi sender x tahu apa-apa
Type of hacker
  • White hat - hacker just tgok2 sistem @ network ( eavesdropping )
  • Cracker ( web defacement )
  • Gray hat - Hacker saja nak test power kat system @ network
List of Professional Hacker @ Famous Hacker
  • Kevin Mitnick
  • Linus Banedick Torvalds
  • Richard Mathew Stallman
  • Ed Skandis




Friday, June 24, 2011

Ability To Communicate

The Following Elements Must have before two device can communicate
  • Equipment
  • Receiver
  • Sender
  • Message
  • Protocol
  • Medium
Law to Communicate
  • Subnetmask for device A and device B must same. For example ; A : 255.255.255.0 and B : 255.255.255.0.

TCP/IP Utilities
  • ARP - Displays and modifies the Address Resolution protocol (ARP) cache.
  • Hostname - Returns the host name of the local computer.
  • Ipconfig - Displays the current TCP/IP configuration. Also used to manually release and renew TCP/IP configurations assigned by a DHCP server.
  • Lpq - Obtains print queue status information from computers running Line Printer Daemon (LPD) print server software.
  • Nbstat - Displays the local NetBIOS name table, a table of NetBIOS names registered by local programs, and the NetBIOS name cache, a local cache listing of NetBIOS computer names that have been resolved to IP addresses.
  • Netsh - Displays and administers TCP/IP protocol settings on the local computer or a remote computer.
  • Netstat - Displays TCP/IP protocol session information.
  • Nslookup - Checks records, domain host aliases, domain host services, and operating system information by querying DNS servers.
  • Ping - Verifies configurations and tests IP connectivity.
  • Route - Displays or modifies the local routing table.
  • Tracert - Traces the route a packet takes to a destination.
  • Pathping - Traces the route a packet takes to a destination and displays information on packet losses for each router in the path. Pathping can also be used to troubleshoot Quality of Service (QoS) connectivity.

Wednesday, June 22, 2011

IP Address Class A, B and C Network and Host Capacities

I introduced the concepts of IP address classes and showed how the classes related to ranges of IP addresses. Of the five classes, D and E are dedicated to special purposes, so I will leave those alone for now. Classes A, B and C are the ones actually assigned for normal (unicast) addressing purposes on IP inter networks, and therefore the primary focus of our continued attention.
 
As we've seen, they differ in the number of bits (and octets) used for the network ID compared to the host ID. The number of different networks possible in each class is a function of the number of bits assigned to the network ID, and likewise, the number of hosts possible in each network depends on the number of bits provided for the host ID. We must also take into account the fact that one, two or three of the bits in the IP address is used to indicate the class itself, so it is effectively "excluded" from use in determining the number of networks (though again, it is still part of the network ID).

Let's walk through one line of this table so we can see how it works. I'll stick with class B since it's "in the middle". The basic division is into 16 bits for network ID and 16 bits for host ID. However, the first two bits of all class B addresses must be "10”, so that leaves only 14 bits to uniquely identify the network ID. This gives us a total of 214 or 16,384 class B network IDs. For each of these, we have 216 host IDs, less two, for a total of 65,534.
Why less two? For each network ID, two host IDs cannot be used: the host ID with all zeroes and the ID with all ones. These are addresses with "special meanings" as described in the topic that follows. You will also notice that 2 has been subtracted from the number of network IDs for class A. This is because two of the class A network IDs (0 and 127) are reserved. There are actually several other address ranges that are set aside in all three of the classes that I haven't shown here. They are listed in the topic on reserved, private and loopback addresses

How to Find Network ID? 

Formula for Class A = 2^n-1
Formula for Class B = 2^n-2
Formula for Class C = 2^n-3
where n = CIDR for the class of IP Adddress.
CIDR = sum of bit of the IP Address class.
Example for class A :-

2 ^8-1 = 2 ^7
            = 126

Example for class B :-

 2 ^16-2 = 2 ^14
               = 16,384

Example for class C :-

2 ^24-3 = 2 ^21
              = 2,097,152

How To Find Host ID?

Formula for Class A = 2^n-2
Formula for Class B = 2^n-2
Formula for Class C = 2^n-2

where n = number of balance of the bit minus CIDR for the class of IP Adddress. ( example for class A = 32-8 ; where 32 is total sum of the bit of ip address and 8 is a sum of bit for class A )
CIDR = sum of bit of the IP Address class.

Example for class A :-

2 ^32-8 = 2 ^24
              = 16, 277, 214 - 2
              = 16, 277, 212

Example for class B :-

 2 ^32-16 = 2 ^16
                 = 65,534 - 2
                 = 65,532

Example for class C :-

2 ^32-24 = 2 ^8
                = 254 - 2
                = 252