Security

Update timthumb.php to prevent Zero Day vulnerability

Recently many sites are infected with timthumb script vulnerability.  Its a Zero Day vulnerability inside image resizing function. Most of the free as well as  paid themes are the victim of this vulnerability. It can be affected in timthumb.php or thumb.php. Update your wordpress theme to prevent the attack. Read more about this vulnerability at VaultPress How to fix timthumb.php You …

Read More »

Running console applications using Tor

Last time we explained how to install Tor on backtrack. That was for browsers and for some IM clients.Here I will be explaining how to use TOR for console-based applications. These are for applications which doesn’t have any settings for adding proxy address. How to do an anonymous scan using applications like Nmap ? or download a file using wget. Here we are …

Read More »

How to install Tor on Backtrack 5

Back track 5

Tor is an open source Anonymous Internet tool. It protects your personal identification from tracking systems by changing the source IP address frequently. Application will create many virtual tunnels through the tor network. By default Tor is not integrated in BackTrack 5. Why use Tor on Backtrack ? Normally Tor is used to protect the browsing security but Tor can …

Read More »

Secure file transfer from Windows to Linux using RSA key

PSCP is a command line application which is a free implementation  of scp for win 32 platform  . This tool is used for securely copying between computer systems. It uses the SSH (secure shell) protocol, which makes it impossible for other people on the network to snoop on your password or on the data you are transferring. PSCP can run …

Read More »

How to get ride from facebook chat virus?

Hope you noticed that a facebook chat virus is spreading links with some attractive messages. See some sample messages here. “Did you see how will u look like in 20 years from now? lol —-> {bitly link }” “ Hey!! is this photo urs? … OMG!!! —-> {bitly link }” “ omg hahah have u seen this photo u got …

Read More »

Root password recovery of Debian

If you don’t know the root password of Debian, how are you going to change it? You need to know a method of password recovery for the Debian Linux operating system. What this method does is reboot your machine into what is called “single user mode”. Single user mode is also referred to as maintenance mode and is runlevel 1. …

Read More »

Redhat linux hardening tips & bash script

From the time a servers goes to live environment its prone to too many attacks from the hands of crackers (hackers) also as a system administrator you need to secure your Linux server to protect and save your data, intellectual property, and time here server hardening comes into effect. Securing a server is much different than securing a desktop computer …

Read More »

Wikileaks Datacenter

Wikileaks is hosted at White Mountain Datacenter in Stockholm (Sweden), Pionen also houses dozens of servers belonging to other companies. These pictures show the Pionen data centre, 100 ft below ground in a former Cold War nuclear bunker.The datacenter is bomb proof . This is one of the most secure Datacenters in the world as it is housed in a …

Read More »

Prevent accidental reboots in Linux Servers

CTRL+ATL+DELETE will be the most commonly used shortcut key when we work on windows . Watch out that you never use this key (CTRL+ATL+DELETE) on linux server. The default Linux installation treats CTRL+ATL+DELETE command to immediately reboot the Linux system without any warning signals. To avoid this to happen we need to edit  the inittab file /etc/inittab The inittab file …

Read More »

Disabling runlevel system services on Linux Servers

When Linux server boots up a large amount of services keeps running in its background . Some services are essential to the operation of your server, while other services are considered non-essential and will cause no problems to your server by disabling them.  Some services takes a lot of time and may affect the working of some of your applications. …

Read More »