Port Scanners are important to network security technicians because they can reveal possible security vulnerabilities on the targeted system.
CurrPorts is a portable
executable that list down all
currently opened TCP/IP and UDP ports on local computer. And also it displays information about the process that ports are opened for,
including the process name, full path of the process, version
information of the process, the time that the process
was created, and the user that
created it.
And also you can close unwanted TCP connections, kill the process that opened the ports, and
save the TCP/UDP ports information to HTML file, XML file, or to tab-delimited text file.
CurrPorts also automatically mark with pink color suspicious TCP/UDP ports owned by unidentified applications(Applications
without version information and icons).
Download CurrPorts
Download CurrPorts for 64bit
Please let me know if anything is not working properly. See you all in next post. Good Luck. ;)
Friday, August 31, 2012
Thursday, August 30, 2012
Track Your Stolen Laptop, Smart Phone
What would you do if someone steals your notebook or smart phone with its precious or sensitive data that comprises your digital, personal and work life?
Prey is a lightweight tracking software that helps you find, lock and recover your device when stolen or missing. It is open-source and available for Windows, Mac OS X, Linux and Android.
How Prey works:
Prey tracking software runs in the background processes of your notebook. It "wakes" at a specified interval, goes online (if your laptop isn't already connected to the Internet, Prey tries to connect to the nearest open Wi-Fi access point) and checks in with a specified Web address to see what you have ordered it to do. If said address doesn't issue a command to the laptop (such as telling your computer that it is considered stolen), the Prey software returns to sleep and will wake up again at the next time interval.
If your laptop is stolen, you can use another computer to sign in to the Prey Web site, mark the laptop as missing, and follow the whereabouts of your purloined system through a control panel -- assuming the thief takes your notebook online or the software manages to connect to a Wi-Fi access point.
(Read More: preyproject.com)Video Guide: vimeo.com/18728980
Download Prey: Official Site
Saturday, August 4, 2012
Hide Files Inside of Image Files
1. Create a new folder on your HDD,
Example: I create a folder in my D: drive and rename it as "Lesson". ( D:\Lesson )
* It better you follow my blue colored examples if you are a n00b.
2. Then drop the file(s) that you need to hide, into that folder. And also, place the image that you'll be using to hide the files in. In my case I have want to hide a text file ( Test.txt ) file inside a image file( Image.jpg ). So I put both files into D:\Lesson folder.
3. Now select the file(s) that you want to hide. Only select the files you want to hide, not the picture. (In my case I select only the Text.txt file.) Right-click on them; and choose the option to add them to a compressed RAR file. In order to accomplish this task, you will need to have either archiving or compression program such as WinRAR installed on your computer.
Name this RAR file whatever you want. I renamed it as “Secret.rar”.
4. Now click on Start, and then click on Run ( or press Windows Key + "r" ). It will open-up the run dialog box. In there type “CMD” without the quotes and press Enter.
It will pop-up the command prompt window.
Use "cd" command on command prompt to change the current working directory of the CMD in to your folder that contain the secret files. As my example I type cd D:\Lesson to get to the "Lesson" directory in D: drive.
5. If you successfully move to your folder on CMD, then type the following line:
"copy /b NameOfTheImage.JPG + NameOfZIPorRAR.rar NameOfNewSecretImage.jpg" ( without "s ) and press Enter.
In my example;
If you success it will say "1file(s) copied.".
And that’s it! The image file will have been updated with the compressed archive inside! You can actually check the file size of the picture and see that it has increased by the same amount as the size of the archive. Now You can delete all other files except the SecretImage.jpg ( Newly build secret image. ).
You can access your hidden file(s) by simply change the extension to .RAR and open the file using WinRAR.
Then your hidden files show up and you can extract them out.
It may sound like a lot of work, but it's a pretty simple. That is all it takes to hide files inside JPG picture files! It’s a great way simply because not many people know it’s possible and no one even thinks about a picture as having to the ability to “hide” files. This is only a tiny trick. A kind of a foolproof method. But if you want to get really serious about encryption, you'll want to encrypt your data with TrueCrypt.
Example: I create a folder in my D: drive and rename it as "Lesson". ( D:\Lesson )
* It better you follow my blue colored examples if you are a n00b.
2. Then drop the file(s) that you need to hide, into that folder. And also, place the image that you'll be using to hide the files in. In my case I have want to hide a text file ( Test.txt ) file inside a image file( Image.jpg ). So I put both files into D:\Lesson folder.
3. Now select the file(s) that you want to hide. Only select the files you want to hide, not the picture. (In my case I select only the Text.txt file.) Right-click on them; and choose the option to add them to a compressed RAR file. In order to accomplish this task, you will need to have either archiving or compression program such as WinRAR installed on your computer.
Name this RAR file whatever you want. I renamed it as “Secret.rar”.
4. Now click on Start, and then click on Run ( or press Windows Key + "r" ). It will open-up the run dialog box. In there type “CMD” without the quotes and press Enter.
It will pop-up the command prompt window.
Use "cd" command on command prompt to change the current working directory of the CMD in to your folder that contain the secret files. As my example I type cd D:\Lesson to get to the "Lesson" directory in D: drive.
5. If you successfully move to your folder on CMD, then type the following line:
"copy /b NameOfTheImage.JPG + NameOfZIPorRAR.rar NameOfNewSecretImage.jpg" ( without "s ) and press Enter.
In my example;
copy /b Image.JPG + Secret.rar SecretImage.jpg
If you success it will say "1file(s) copied.".
And that’s it! The image file will have been updated with the compressed archive inside! You can actually check the file size of the picture and see that it has increased by the same amount as the size of the archive. Now You can delete all other files except the SecretImage.jpg ( Newly build secret image. ).
You can access your hidden file(s) by simply change the extension to .RAR and open the file using WinRAR.
Then your hidden files show up and you can extract them out.
It may sound like a lot of work, but it's a pretty simple. That is all it takes to hide files inside JPG picture files! It’s a great way simply because not many people know it’s possible and no one even thinks about a picture as having to the ability to “hide” files. This is only a tiny trick. A kind of a foolproof method. But if you want to get really serious about encryption, you'll want to encrypt your data with TrueCrypt.
Good luck and keep exploring..!! ;)
Anonymous Browsing - An Introuduction to Tor
Surfing the internet securely through VPN or web proxy might do the tactic for some individuals who concern about the online privacy. Tor is a tool bundle for
organizations and individuals that want to improve their safety & security
on the web. It is enable online anonymity. You can perform anonymous web surfing, publishing, instant
msging, and any other utility that use the TCP protocol.
Tor design to maintain safeguard against traffic analysis, a form of network
surveillance that threatens personal anonymity and privacy, confidential
business activities and relationships, and state security. Tor short for The Onion Router. It is free and open source for Windows, Mac, Linux/Unix, and Android. Download Tor from Tor official web site and assure your privacy.
Subscribe to:
Posts (Atom)