Monday, 13 October 2014

CCTV Lecture 6



CCTV B&E Lecture 6 by UrduITacademy

CCTV Lecture 5



CCTV B&E Lecture 5 by UrduITacademy

CCTV Lecture 4



CCTV B&E Lecture 4 by UrduITacademy

CCTV Lecture 3 Part 3



CCTV B&E Lecture 3-3 by UrduITacademy

CCTV Lecture 3 Part 2



CCTV B&E Lecture 3-2 by UrduITacademy

CCTV Lecture 3 Part 1



CCTV B&E Lecture 3-1 by UrduITacademy

CCTV Lecture 2 part 2



CCTV B&E Lecture 2-2 by UrduITacademy

CCTV Lecture 2 part 1



URDUIT CCTV B&E Lecture 2 Part 1 by UrduITacademy

CCTV Lecture2



URDUIT CCTV B&E Lecture 1 by UrduITacademy

CCTV Introduction



URDUIT CCTV B&E Introduction by UrduITacademy

Wednesday, 9 April 2014



  1. 10 System Admin Tools to Help You Secure Your Network :
    ___________________________________________________

    System admins are frequently bombarded with security concerns, requests, alerts, news items, “did you see this?!” emails, and more. Keeping up with all the aspects of network security can seem like an overwhelming task, but in this post we’re going to look at ten tools a system admin can use to help secure their network. Some you may be familiar with, like network security software, while others may come as a surprise, like your email client; but all will help you to stay ahead of the bad guys, keep yourself informed of the latest threats, and maintain the security of your network.

    1. Network security software

    ----------------------------------
    When we talk about network security software, we’re talking about a class of product more than any specific tool, and how important it is for you to have an application or small group of applications that can help you to accomplish most of your tasks. There are simply too many things for any one admin to do by hand, and network security software applications help to automate the heavy lifting and ensure that you can keep up with the workload. Look for network security software that multitasks. Think about it as a Swiss Army knife of software packages that includes many of the other items on this list.

    2. Vulnerability scanner

    ---------------------------
    A good vulnerability scanner is a key part of any toolkit, and should be used by server admins and security engineers alike. The top network security software apps will include a scanner that has a database of the thousands of vulnerabilities that could exist on your network, so that you can quickly, easily and regularly scan your network to ensure you systems are up-to-date, configured properly and secured.

    3. Port scanner

    ------------------
    A port scanner is another regular tool that should be in your network security software application. Attackers regularly scan your Internet connection looking for ways in and so should you. But you should also scan internally so you can find unauthorized services or misconfigured systems, and to validate your internal firewalls are set up correctly.

    4. Patching software

    ------------------------
    Patching operating systems and third party applications is one of the most important, regularly recurring tasks a sys admin has. Network security software that can automate this, and handle the hundreds of other applications on your network, is the only realistic way you can keep up with this.

    5. Auditing software

    ------------------------
    Auditing software may strike you as a strange recommendation at first, but consider all those apps you are trying to patch. How can you be sure you have no vulnerabilities on your systems if your users can install anything on your systems? How are you going to maintain licensing compliance if you don’t know who has installed what from \software? Network security software may also include software and hardware inventory components to help you stay informed and secure.

    6. Secure remote clients

    -----------------------------
    Telnet, older versions of PCAnyWhere and several of the web-based remote access apps that are out there all have a common issue - they’re not secure. Use SSH v2 or later for secure access to all CLI-based systems, and the most secure versions of Remote Desktop Protocol to manage Windows boxes. Using strong encryption, good passwords, lockout policies and, when possible, mutual authentication between client and host, will help to ensure no one sniffs credentials or brute-forces their way into a system. If you have two-factor authentication in your environment, ensure that every system possible uses it to further reduce your risk from unauthorized access.

    7. A good network analyzer

    --------------------------------
    Whether you like the open source WireShark, the free Microsoft tool NetMon, or one of the many other commercial network analysis tools, having a good “sniffer” is key to helping secure and analyze systems. There is simply no way that’s more effective to figure out just what is going on between networked systems than to see the traffic first hand.

    8. Network tools

    -------------------
    Whenever you are dealing with connections from foreign systems, you will find the need to check network addresses, routes and more. Having good tools like DIG, WHOIS, HOST, TCPING and others close at hand makes network evaluation a breeze.

    9. Log parsing software

    ----------------------------
    Securing systems means going through logs; lots of them. Web logs, access logs, system logs, security logs, SNMP logs, syslog logs – the list goes on and on. Having software that can quickly and easily parse through logs is critical. Everyone has their favorite. Some install locally like LogParser, while others run on servers like Splunk. Whichever you prefer, get a good log parser to help wade through what can be millions of entries quickly and easily so you can find events you need to check.

    10. Your email client

    ------------------------
    Knowledge is power, and the best way to amass that knowledge is to stay informed. Whether you subscribe to email bulletins, security alerts, or RSS feeds, your email client can provide you the first indications that something new is out there, and also what you need to do to protect your systems from the threat. Zero day exploits, out of band patches, best practices and more, can all be yours if you simply join the right distribution lists and subscribe to the right lists.

    These 10 system admin tools are a great start towards building your toolkit for security. Network security software plays a major role in this toolkit, which you supplement with other tools and the information you need to maintain a secure environment.

12 Type Of Servers And What They Do!


1. Real-Time Communication ServersAlso known as chat servers or IRC, and sometimes known as instant messaging (IM) servers, these servers are meant to allow huge number users to exchange information instantly.2. FTP ServersThis is one of the oldest of the Internet services available. The FTP or File Transfer Protocol allows the users to securely transfer one or more files of any size between two computers.
3. Collaboration Servers
In many ways, collaboration software, once called 'groupware,' demonstrates the original power of the Web. Collaboration software designed to enable users to collaborate, regardless of location, via the Internet or a corporate intranet and to work together in a virtual atmosphere.
4. List Servers
List servers lets users better manage their mass mailing lists like open interactive discussions or one-way lists to deliver newsletters, announcements or advertising.
5. Telnet Servers
The Telnet server lets the users on to a host computer control and work on remote computers.
6. Web Servers
At its core, a Web server serves static content to a Web browser by loading a file from a disk and serving it across the network to a user's Web browser. This entire exchange is mediated by the browser and server talking to each other using HTTP.
7. Virtual Servers
A virtual server is a web server which shares its resources with multiple users. It's another way of saying that multiple web sites share the resources of one server.
8. Proxy Servers
Proxy server is a server which acts as an intermediary for requests between the users and the servers. Client connects to the proxy server and the proxy server evaluates the requests sent by the users simplifies them and control their complexities.
9. Mail Servers
Mail servers help in moving and storing the e-mail over a network via LANs and WANs or across the Internet.
10. Server Platforms
Normally used in same context with that of operating systems, server platforms are the platforms that are under the hardware or software of a system and the hence in the engine that drives the server.
11. Open Source Servers
Similar to server platforms, Open source server are referred to the underlying open source operating system used in the IT infrastructuresof the companies.
12. Application Servers
Application servers are a type of middleware which connects the database servers and the app users.
Admin- Adil Muneeb
3. Collaboration ServersIn many ways, collaboration software, once called 'groupware,' demonstrates the original power of the Web. Collaboration software designed to enable users to collaborate, regardless of location, via the Internet or a corporate intranet and to work together in a virtual atmosphere.4. List ServersList servers lets users better manage their mass mailing lists like open interactive discussions or one-way lists to deliver newsletters, announcements or advertising.5. Telnet ServersThe Telnet server lets the users on to a host computer control and work on remote computers.6. Web ServersAt its core, a Web server serves static content to a Web browser by loading a file from a disk and serving it across the network to a user's Web browser. This entire exchange is mediated by the browser and server talking to each other using HTTP.7. Virtual ServersA virtual server is a web server which shares its resources with multiple users. It's another way of saying that multiple web sites share the resources of one server.8. Proxy ServersProxy server is a server which acts as an intermediary for requests between the users and the servers. Client connects to the proxy server and the proxy server evaluates the requests sent by the users simplifies them and control their complexities.9. Mail ServersMail servers help in moving and storing the e-mail over a network via LANs and WANs or across the Internet.10. Server PlatformsNormally used in same context with that of operating systems, server platforms are the platforms that are under the hardware or software of a system and the hence in the engine that drives the server.11. Open Source ServersSimilar to server platforms, Open source server are referred to the underlying open source operating system used in the IT infrastructuresof the companies.12. Application ServersApplication servers are a type of middleware which connects the database servers and the app users.Admin- Adil Muneeb
3. Collaboration ServersIn many ways, collaboration software, once called 'groupware,' demonstrates the original power of the Web. Collaboration software designed to enable users to collaborate, regardless of location, via the Internet or a corporate intranet and to work together in a virtual atmosphere.4. List ServersList servers lets users better manage their mass mailing lists like open interactive discussions or one-way lists to deliver newsletters, announcements or advertising.5. Telnet ServersThe Telnet server lets the users on to a host computer control and work on remote computers.6. Web ServersAt its core, a Web server serves static content to a Web browser by loading a file from a disk and serving it across the network to a user's Web browser. This entire exchange is mediated by the browser and server talking to each other using HTTP.7. Virtual ServersA virtual server is a web server which shares its resources with multiple users. It's another way of saying that multiple web sites share the resources of one server.8. Proxy ServersProxy server is a server which acts as an intermediary for requests between the users and the servers. Client connects to the proxy server and the proxy server evaluates the requests sent by the users simplifies them and control their complexities.9. Mail ServersMail servers help in moving and storing the e-mail over a network via LANs and WANs or across the Internet.10. Server PlatformsNormally used in same context with that of operating systems, server platforms are the platforms that are under the hardware or software of a system and the hence in the engine that drives the server.11. Open Source ServersSimilar to server platforms, Open source server are referred to the underlying open source operating system used in the IT infrastructuresof the companies.12. Application ServersApplication servers are a type of middleware which connects the database servers and the app users.Admin- Adil Muneeb

Sunday, 2 March 2014


How to speed up your broadband internet 

Here’s a simple 3 minute tweak that will increase broadband speed in XP (Pro) and Windows 7 (Pro & Ultimate).

By default (even with QoS disabled) Windows reserves up to 20 percent of your connections bandwidth.

To override this reserve take the following steps.

Make sure you Log on as Administrator, not as a user with Administrator privileges.

Windows XP
gpedit.msc

Open the Run dialog box using shortcut Window + R and type gpedit.msc

Computer Configuration

Expand [ Computer Configuration ] branch

Group Policy

Expand [ Administrative Templates ] branch
Expand [ Network ] branch
Highlight [ QoS Packet Scheduler ]
Double-click [ Limit Reservable Bandwidth ]

Limit Reservable Bandwidth

Enabled is set by default, if [ Not Configured ] is your current setting Change to [ Enabled ]
Change [ Bandwidth limit % ] to 0
Click [ Apply ] [ OK ]
Windows 7
windows-7-gpedit.msc

Open the Run dialog box using shortcut Window + R and type gpedit.msc

Windows 7 Local Group Policy Editor

Expand [ Computer Configuration ] branch
Expand [ Administrative Templates ] branch
Expand [ Network ] branch
Highlight [ QoS Packet Scheduler ]
Double-click [ Limit Reservable Bandwidth ]

title=

In Windows 7 Not Configured is the default setting.

Even though bandwidth limit (%) indicates 0, Windows reserves up to 20 % of the current bandwidth available, as seen below.


Windows 7 Limit Reservable Bandwidth Default

Change setting from [ Not Configured ] to [ Enabled ]
Change [ Bandwidth limit % ] to 0
Click [ Apply ] [ OK ]

Set a picture on your folders background


 Again with A amazing Trick. Want to know
"How to change your folders background"
Follow these steps caarefully....

Step 1: Have the Folder you want to put the background on open!
Step 2: Open up Notepad, then simply paste in this code:

[{BE098140-A513-11D0-A3A4-00C04FD706EC}]
iconarea_image=***Picture Location Here!***\***Name of File!***

Step 3: Go to ur picture (the picture you want to use!) and right click and select
properties and find the file location for example lets say my file is in "my hardrive" it
would be located at "C:\\" understand? copy the location!

Step 4: Now go back to ur text document (notepad) and where it says ***Picture
Location Here!*** paste the location...u copied in the previus step!

Step 5: Now after u've done that where it says ***Name of File!*** type the name
of the file including the .jpg .bmp .bip. jpeg etc

Step 6: Save the text document as "desktop.ini" be sure to remember the .ini
extension! click Save as "All Files" not "Text Document" and save the document in the
folder where u want the background to be!
Now just close the folder and open it again it should show the picture as a
background!
Enjoy....

What is Firewall -Introduction to Firewalls


Introduction to firewalls


When you use internet in your college/school/offfice , You may not be access some websites, right? Do you know how they block those websites? They use firewalls for block websites. Firewall prevent the system from hackers attack. Lets us know what is firewall.

What is Firewall?


Firewall is working like a security guard standing outside the office. Usually, What the security guard do? He will allow those who has identity card and block those who has not the identity card. Right? Likewise, The firewall will block unauthorized access to the system.

Firewall may be a software or hardware. It will work based on the set of rules defined by the administrator. Using Firewall administrator can block certain website from being accessed.

All traffic from inside and outside of the network must pass through the firewall.

Only authorized trafic will be allowed to pass (based on the set of rules)

Types of Fire Walls

Packet Filtering

Appliction level gate way

Circuit level gate way.

Packet Filtering (Network Layer)

A packet filtering router applies a set of rules to each incoming IP packet and then forwards or discards the packets. Router is configured such that it can filter incoming and outgoing packets. The packets will filtered based on the source and destination IP address.

IP spoofing attack is possible in this packet filtering. IP spoofing can be achieved by changing the source IP address of packets.

Stateful Inspection Firewalls

A stateful inspection packet filters tightens the rules of TCP traffic by creating a state table of out bound TCP connection. If the packet matches with existing connection based on the state table, it will be allowed. If it does not match, It will be evaluted according to the rule set for new connections.

Aplictaion Level Gateway

Application level gateway is also known as proxy server. The user communicate with the gateway using application layer of TCP/IP stack. The gateway asks the user for the name of the remote host to be connected. When the user enters valid user ID, gateway will give access to the remote application. This will block the malicious activity and correct the application behavior. This will ensure the safety of company.

More secure than packet filtering. Easy to log and audit all incoming traffic at the application level. Application-level filtering may include protection against spam and viruses as well, and be able to block undesirable Web sites based on content rather than just their IP address.

Circuit Level Gateway

The circuit level gateway works at session layer of OSI model. Monitor TCP handshaking between packets to make sure a session is legitimate. Traffic is filtered based on the session rules. Circuit-level firewalls hide the network itself from the outside, which is useful for denying access to intruders. But they don't filter individual packets. This firewall is used when the administrator trusts internal users.

Why Firewall?

Firewall block unauthorized users, prohibits vulnerable services from entering or leaving the network.

Protection from IP spoofing and routing attacks.

Protection against Remote login, Trojan backdoor, Session hijacking, cookie stealing,etc.

Limitation of Firewalls

The fiewall cannot protect against attacks that by pass the firewall.

The firewall does not protect against internal threats

The firewall cannot protect against the transfer of virus infected progams (or) files. It would be impossible for the firewall to scan all incoming files, emails for viruses.

Tuesday, 11 February 2014


How To Disable Right Click On Your Website Or Blog ?

 1. Got to your blogger Dashboard
 and then Click on Layout.
 2. Now Click on Add Gadget and
 select Html/Javascript.
 3.Paste the Given Code
 <!--MBW Code-->
 <script language="JavaScript1.2">
 function disableselect(e){
 return false
 }
 function reEnable(){
 return true
 }
 document.onselectstart=new
 Function ("return false")
 if (window.sidebar){
 document.onmousedown=disableselect
 document.onclick=reEnable
 }
 </script>
 4. Save it and done. Now users will
 not be able to right click on your
 website.

Tuesday, 4 February 2014


How can you protect both your personal and work-related data?


Use and maintain anti-virus software and a firewall - Protect yourself against viruses and Trojan horses that may steal or modify the data on your own computer and leave you vulnerable by using anti-virus software and a firewall . Make sure to keep your virus definitions up to date.

Regularly scan your computer for spyware - Spyware or adware hidden in software programs may affect the performance of your computer and give attackers access to your data. Use a legitimate anti-spyware program to scan your computer and remove any of these files. Many anti-virus products have incorporated spyware detection.

Keep software up to date - Install software patches so that attackers cannot take advantage of known problems or vulnerabilities . Many operating systems offer automatic updates. If this option is available, you should turn it on.

Evaluate your software's settings - The default settings of most software enable all available functionality. However, attackers may be able to take advantage of this functionality to access your computer. It is especially important to check the settings for software that connects to the internet (browsers, email clients, etc.). Apply the highest level of security available that still gives you the functionality you need.

Avoid unused software programs - Do not clutter your computer with unnecessary software programs. If you have programs on your computer that you do not use, consider uninstalling them. In addition to consuming system resources, these programs may contain vulnerabilities that, if not patched, may allow an attacker to access your computer.

Consider creating separate user accounts - If there are other people using your computer, you may be worried that someone else may accidentally access, modify, and/or delete your files. Most operating systems (including Windows XP and Vista, Mac OS X, and Linux) give you the option of creating a different user account for each user, and you can set the amount of access and privileges for each account. You may also choose to have separate accounts for your work and personal purposes. While this approach will not completely isolate each area, it does offer some additional protection. However, it will not protect your computer against vulnerabilities that give an attacker administrative privileges. Ideally, you will have separate computers for work and personal use; this will offer a different type of protection.

Establish guidelines for computer use - If there are multiple people using your computer, especially children, make sure they understand how to use the computer and internet safely. Setting boundaries and guidelines will help to protect your data

Use passwords and encrypt sensitive files - Passwords and other security features add layers of protection if used appropriately (see Choosing and Protecting Passwords and Supplementing Passwords for more information). By encrypting files, you ensure that unauthorized people can't view data even if they can physically access it. You may also want to consider options for full disk encryption, which prevents a thief from even starting your laptop without a passphrase. When you use encryption, it is important to remember your passwords and passphrases; if you forget or lose them, you may lose your data.

Follow corporate policies for handling and storing work-related information - If you use your computer for work-related purposes, make sure to follow any corporate policies for handling and storing the information. These policies were likely established to protect proprietary information and customer data, as well as to protect you and the company from liability. Even if it is not explicitly stated in your corporate policy, you should avoid allowing other people, including family members, to use a computer that contains corporate data.

Dispose of sensitive information properly - Simply deleting a file does not completely erase it. To ensure that an attacker cannot access these files, make sure that you adequately erase sensitive files (see Effectively Erasing Files for more information).
Follow good security habits - Review other security tips for ways to protect yourself and your data

HOW TO BYPASS THE WINDOWS 8 PASSWORD SCREEN


1. Hold down the Windows key and thentap X (Win -x ) and click on CommandPrompt (Admin)
2. In command prompt window typecontrol userpasswords2then press ENTER
3. After that will appear User Accountsdialog where you need to uncheck the boxmarked Users must enter a user name andpassword to use this computer.
4. Click on Apply , then confirm theautomatic sign-in option by entering yourpassword twice.
5. Reboot your PC
so enjoy and bypass the login screen.......

Masala FM

Free Shoutcast HostingRadio Stream Hosting