Sep 20, 2009

Eid Mubarak............

0 comments
Posted in
•(♥).•*´¨`*•♥•(★) Wish You a Very Happy Eid Mubarak. (★)•♥•*´¨`*•.(♥)•

= ! r e y =

Sep 12, 2009

Cisco CCNA Basic Config

0 comments
Posted in
I have been studying my Cisco CCNA last month, so I thought I share the things I learn with my blog readers. CCNA is for all the people who want a Career in Network Administrators & System Administrators.


Five Configuration modes in CISOC Router & Switches:
1. User Mode
2. Priviledge Mode
3. Configuration Mode
4. Interface Mode
5. Line mode


Cisco Router Basic Configuration Need:
1. Password + Secret
2. Hostname
3. Interface (IP and subnet mask, no shut, and clock rate)
4. Line configuration

Below are some coding on Basic configuration for Cisco router:


Enter Privilege Mode
Router > enable


Enter Configuration Mode
Router# config t
Or
Router# Configuration Terminal

Note:
“>” Mean you are in User Mode
“#” Mean you are in Priviledge Mode.
“(config)” Mean you are Configuration Terminal


Password need when enter into Privilege Mode next time
Router(config)#enable password p@ssw0rd
Router(config)#enable secret s3cr3t

DoS (denial-of-service attack) or DDoS distributed denial-of-service attack

0 comments
Posted in , ,
As most of us know what DDos is! Last week dhiraagu got hit hard by DDos attack. It took 9 days to restore their network back to normal working condition. As told by dhiraagu, they attacked Dhiraage Web Servers & Main Router.

So what DDos?
The use of a DDos is to overwhelm or flood servers, network links, and network devices (routers, firewalls, etc.) by sending segments/packets and making its resource/bandwidth busy or unavailable for Intended Users.
A DDoS attack directs hundreds or even thousands of compromised "zombie" hosts against a single target. These zombie hosts are unwittingly recruited from the millions of unprotected computers accessing the Internet through high-bandwidth, "always-on" connections. By planting "sleeper" codes on these machines, hackers can quickly build a legion of zombies, all waiting for the command to launch a DDoS attack. With enough zombie hosts participating, the volume of an attack can be astounding. The diagram show how DDos work.



Can we Protect Network from DDos!

Yes / No. DDoS is emerging as the weapon of choice for hackers, political "hacktivists," cyber-extortionists, and international cyber-terrorists. Easily launched against limited defenses, DDoS attacks not only target individual Websites or other servers at the edge of the network- they subdue the network itself. Attacks have begun to explicitly target the network infrastructure, such as aggregation or core routers and switches, or Domain Name System (DNS) servers. Because DDoS attacks are among the most difficult to defend against, responding to them appropriately and effectively poses a tremendous challenge for all Internet-dependent organizations. Network devices and traditional perimeter security technologies such as firewalls and intrusion detection systems (IDSs).

Some DDoS attacks Incidents

'Anonymous' group attempts DDoS attack against Australian government (September 9th, 2009)
Twitter & Facebook Taken Offline By DDoS Attacks (August 6th, 2009)
U.S. eyes N. Korea for ‘massive’ DDOS attack (July 8th, 2009)
GoDaddy hit by a DDoS attack (January 16th, 2009)
DNS Backbone DDoS Attacks (October 22nd, 2002)

Jul 20, 2009

Moving.......> > Blogger.com

0 comments
Posted in
Dear Readers....!

I am moving my blog to Blogger.com from wordpress. So i am just uploading my backup files from wordpress, as you all can see photos cannot be Seen. So Just Keep on Visit, Until all is up and running.

Thank You

Irey

Jan 11, 2009

Secret of Dhiraagu E-directory

7 comments
Posted in , ,
Okay First I am very angry at Dhiraagu the way they treated me when I had trouble at my home Internet, which is from Dhiraagu Broadband ADSL. For 3 weeks without internet they fail to fix it. But there goal is to fix a problem with in 48 hours when it’s reported.

As you all know when we try to find some one mobile number by entering Name of the person or Address only land lines number show up, no mobile numbers……!!! Dhiraagu E-directory is very up to day with the latest Numbers of Landlines and Mobile numbers. Ok there is a very simple way to get a list of landlines / Mobile number list from Dhiraagu without call 110 and the best thing is it’s FREE.

Just visit dhiraagu.com.mv and scroll down there will be a small box call E-directory. Just enter a 1st Letter of the Mobile number it will be 7 for all. Then just put 6 spaces (press Space Key 6 times) and submit it. What we are doing is tell Dhiraagu server to give us all the number starting with 7. Why adding 6 spaces it’s because there are 7 numbers mobile number. 7 is the starting 1st letter, is 6 spaces will complete the 7 letter combination of the mobile numbers. For land line just add 3 and 6 spaces (press Space Key 6 times) will do for landlines.

Eg: - “7 “without the Comma

Some may think they use JavaScript to verify what we enter. Just Disable JavaScript it will work. Nop!!! It wont work because Dhiraagu verify JavaScript + from there server side all so. You can bypass JavaScript Verify but not Server Side Verification.

Note: - It will take a SOME time to load the complete list.

Jan 1, 2009

HAPPY NEW YEAR

0 comments
Posted in

HAPPY ~ NEW ~ YEAR ~ 2009



It’s my first post at year 2009. Just want to wish all the readers a very happy New Year. It has been some time now without posting anything. So a new year with new start for everything. I have a lot just keep on visiting.

= ! r E y =