Showing posts with label linux. Show all posts
Showing posts with label linux. Show all posts

How To Restore Windows Boot Loader in Master Boot Record

http://johnplayerstricksandtips.blogspot.com
Friends in this tutorial i am gonna teach you how to restore the original Windows boot loader in the Master Boot Record. It is usually desired after a successful dual boot of a Linux distribution or Windows on just one hard disk drive has replaced the Windows boot loader with GRUB . For a few running cheap dedicated servers , this may save lots of time or hassle , and offers a few essential utility to the machine .
GRUB is perfectly fine , except Windows boot loader will always be recommended . GRUB can be prone to errors with a few anti-virus applications that insist on including little or otherwise harmless files into the Master Boot Record . These types of files ultimately alter and harm the GRUB loader .
Another note of precaution before we go through the process of restoring the Windows boot loader in MBR . At times , the Linux boot loader is more optimal for this situation , but not installed in the Master Boot Record , but instead in the Linux installation boot partition . In the event that the /boot is not a separate partition , the Linux boot loader can be installed in the main partition . This process allows the Windows boot manager the main responsibility of booting applications during a restart . Additionally , reinstalling Windows will not cause a loss of access to the Linux side of the dual boot .
Now that we understand the benefits of restoring the Windows boot loader , let's get this started ! The first step is to download the essential tool that will make this nice and easy : EasyBCD . Go to their main website and click on the "Download free for limited , non-commercial use" link . Following the basic installation instructions and load it up .
The first step is to go to the BCD Deployment tab on the left of the main menu . At the bottom of that tab is a button that says "Write MBR" with a STOP SIGN next to it . Click on that button . Do note : If your intent was to sever ties with the Linux installation , this will have done the trick . You can no longer boot the

How To Bypass Computer Password on All Operating Systems

Guys here is the tutorial for info on how to bypass the password on the major operating systems: Windows, Mac, or Linux.Mac The second most popular operating system, OS X is no safer when it comes to password cracking then Windows.The easiest method would be to use Ophcrack on this, also, as it works with Mac and Linux in addition to Windows. However, there are other methods that can be used, as demonstrated below.If the Mac runs OS X 10.4, then you only need the installation CD. Insert it into the computer, reboot. When it starts up, select UTILITIES > RESET PASSWORD. Choose a new password and then use that to log in.If the Mac runs OS X 10.5, restart the computer and press COMMAND + S. When at the prompt, type:fsck -fy mount -uw /launchctl load /System/Library/LaunchDaemons/com.apple.DirectoryServices.plist|dscl . -passwd /Users/UserName newpassword That’s it. Now that the password is reset, you can login.Linux-Finally, there is Linux, an operating system quickly gaining popularity in mainstream, but not so common you’re likely to come across it. Though Mac and Linux are both based on Unix, it is easier to change the password in Linux than it is OS X.To change the password, turn on the computer and press the ESC key when GRUB appears. Scroll down and highlight ‘Recovery Mode’ and press the ‘B’ key; this will cause you to enter ‘Single User Mode’.You’re now at the prompt, and logged in as ‘root’ by default. Type ‘passwd’ and then choose a new password. This will change the root password to whatever you enter. If you’re interested in only gaining access to a single account on the system, however, then type ‘passwd username’ replacing ‘username’ with the login name for the account you would like to alter the password for.Windows is still the most popular operating system, and the method used to discover the login password is the easiest. The program used is called Ophcrack, and it is free. Ophcrack is based on Slackware, and uses rainbow tables to solve passwords up to 14 characters in length. The time required to solve a password? Generally 10 seconds. The expertise needed? None.Simply download the Ophcrack ISO and burn it to a CD (or load it onto a USB drive via UNetbootin). Insert the CD into a machine you would like to gain access to, then press and hold the power button until the computer shuts down. Turn the computer back on and enter BIOS at startup. Change the boot sequence to CD before HDD, then save and exit.The computer will restart and Ophcrack will be loaded. Sit back and watch as it does all the work for your. Write down the password it gives you, remove the disc, restart the computer, and log in as if it were you own machine.

Linux Web Hosting Advantages

Guys ,the newbie in the Internet , it is essential to discuss the Linux OS , before web hosting is explained . Linux is an operating system developed by Linus Torvalds in the early 1990s and is a non-commercial platform . This is because the source code for Linux is free for everyone , and can easily be obtained from the Internet . A minor misconception prevails , with the general notion that "Linux" itself is free , which is not true . When purchase Linux from a distributor , they will provide you the source code free with the Linux distribution .
Linux web hosting is potentially the most well-known platform for websites on the internet . The key factors , which makes Linux stand out in the crowd , is its stability and substantial robustness , making your website reliable and smooth . The benefits :
Linux hosting has achieved a prior importance in the list of web hosting India , as it comes with free applications to aid smooth functioning of your website and keep it stable . It is an efficient option for the end user .
It has interesting database compatibility like SQL or MySQL , because of no extra requirement of plug-ins . These databases permit the optimization in communication with your website .
Website hosting on Linux servers are more capable to undergo the load than Windows hosting servers and are 50% more efficient in terms of performance . You can effortlessly get rid of the frequent shut down problems , whenever there is a massive traffic on the server , and enjoy the smooth and efficient working of your website .
Adding to the benefits , Linux is less vulnerable to security breach , and is far more stable than any other web hosting . This directly increases its uptime and runs for a longer period of time without getting rebooted . While Windows hosting requires frequent rebooting , each time it is upgraded . The end user can thus relax as far as the security of the website is concerned with Linux .
A very interesting feature of Linux is that it runs in different modules that are interlinked with one another , in a

Linux Security

Linux is an amazing operating system considering how it was originally created. It was a modest program written for one person as a hobby  – Linus Torvald of Finland. It has grown into a full-fledge 32-bit operating system. It is solid, stable and provides support for an incredible number of applications.  It has very powerful capabilities and runs very fast and rarely crashes.

Unfortunately Linux machines are broken almost every day. This happens not because it is an insecure operating system. It contains all the necessary tools to make it very secure.  But the truth is. It hasn’t become significantly more secure with the increase in popularity. On the other hand, our understanding of the hackers methods and the wide variety of tools and techniques available contributed to help system administrators to secure their Linux computers.

Our goal in this article is to list the most critical situations, and how to prevent an invasion with simple measures.

1-    Weak passwords – By far the first and most used   method used by hackers to try penetrating a Linux system is cracking a password, preferently of the user root. Usually they will target a common user first, and then, using his/her access to the operating system, try to get a privileged access cracking the root password. Good password policy, and good passwords are absolutely critical to the security on any computer.   Some common mistakes when selecting a password:
A- use “password” as password.
B- use the name of the computer.
C- a well-know name from science, sports or politics.
D- reference to movies.
E- anything that is part of the user web site.
F– references associated with the account.

The latest version of Linux offer shadowed passwords. If a cracker can see an encrypted password, crack it would a simple task. So, instead of storing the password in the passwd file, they are now stored in the shadow file which is readable only for root. Before a hacker can crack a password he needs to figure out an account name.  So, simple accounts names must be avoided as well. Another security measure is to apply a “no login” to the account in the passwd file. This must be done to all the accounts that don’t need to log in to the system. Examples are: apache, mysql, ftp and other.

Limit which terminals root may log in from. If the root account is allowed to log in only in certain terminals that are considered secure, it will be almost impossible for a hacker to penetrate the system. This can be done listing the allowed terminals on /etc/security. The login program will consider insecure any terminal that is not listed on this file, which is readable, only by root.

2-    Open Network Ports


Any Linux default installation will provide the Operating System with tons of software and services. Several of them are not necessary or even wanted by the administrator. Removing these software and services will close the path to several attacks and improve security.  The /sbin/chkconfig program can be used to stop services from automatically starting at run levels 3, 4 and 5. Log in as root and type /sbin/chkconfig --list to view all the services set to start automatically. Select the ones you don’t need and type /sbin/chkconfig 345 name_of_service off. You must do that to all services you don’t want to keep running. Also, the xinetd server can be used to disable other services as well.


3-    Old Software Versions


Everyday vulnerabilities are found in programs, and most of them are fixed constantly. It is important, and sometimes critical, to keep up with the changes. There are mailing lists for every Linux distribution where one can have security related information’s, and the latest vulnerabilities found.
Some place to watch for security holes are:
·    http://www.redhat.com/mailman/listinfo/redhat-announce-list
·    http://www.debian.org/MailingLists/
·    http://www.mandrakesecure.net/en/mlist.php
·    http://www.suse.com/us/private/support/security/index.html
·    http://www.freebsd.org/security/index.html
·    http://www.linuxtoday.com/
·    http://www.lwn.net/
It is crucial to insure that the security released patches are applied to the programs as soon as they area available. The hacker community will be aware of the discovered holes and will try to explore them before the fixes are applied.

4-    Insecure and Badly Configured Programs

There are some programs that have a history of security problems. To name a few IMAP, POP, FTP, port map and NFS, are the most known. The good thing is that most of these programs can be replaced by a secure version like spop, sftp or scp.

It is important that,  before deploying any service,  the administrator investigate its security history. Sometimes simple configuration measures can prevent serious headaches in the future.



Some advices regarding a web server configuration are well worth to mention:

-    Never run the web server as a privileged user;
-    Do not keep clients’ confidential data on the web server – Credit card numbers, phone numbers, mailing addresses, must be recorded on a different machine.
-    Make sure the privileged data that a user supplies on a form does not show up as a default for the next person to use the form;
                  -     Establish acceptable values for data that is supplied by web clients.
                  -     Check vulnerabilities on CGI programs.



5-    Stale and Unnecessary Accounts

When a user no longer uses his /her account, make sure it is removed from the system. This stale account won’t have this password changed periodically leaving a hole.  Publicly readable or writable files owned by that account must be removed. When you remove an unnecessary service make sure you remove or disable the correspondent account.

Security Resources in the web

Bugtraq – Includes detailed discussions of Unix security holes
http://www.securityfocus.com/

Firewalls – Discuss the design, construction, operation, and maintenance of firewall systems.

http://www.isc.org/services/public/lists/firewalls.html

RISKS Discuss risks to society from computers

http://www.risks.org/

Insecure.org

http://www.insecure.org/

Backup & Bulk Copy(Linux)

The best  Linux utility to synchronize data is rsync.
 rsync allows you to copy recursively inside the machine and even on remote machines.
As the name suggests, the synchronization utility, which means to copy only the changes rather than the entire file, and also maintain a property and file permissions

The operation is quite simple

$ Rsync [options] source target

 example

$ Rsync-arh / home / clubhack / / mnt / backup

Now if you want to use the same rsync to transfer the file on the remote machine would be the best solution
$ Rsync-aH / my_dir / remoteip: / path / to / dir /

In order to preserve permissions, ownership, group and time stamp, you can choose to use switches like-p,-o,-g,-t etc.

You can also choose which files to include or exclude the synchronization settings.





splash on firewalls(linux)

Linux is much easier on the command line

For a complete configuration, the simplest

iptables-L

You can do a little 'fast

iptables-nL

-N by the order to stop a reverse lookup and thus increase performance.

You can make it

iptables-t nat-L

iptables-t missing NL

iptables-t filter-L

iptables-t raw-NL

This list (-L), in particular, (t) of the chain, no reverse lookup (n).