Archive for August, 2010

Full list of Windows 7 keyboard shortcuts or accelerator hotkeys

1 Comment »

Winodws 7 includes many new keyboard accelerator keys that make it easier to work with menus and other commands.
Normally, the keyboard shortcuts to activate the command are listed along with command in the programs’ menus (typically a letter is underlined to indicate that it can be activated by pressing the combination of Alt key with the underlined key). Some are not listed and hidden though.

Here’s the full list of Windows 7 keyboard shortcuts or accelerator hotkeys available on the operating system level and also for several built-in application programs in Windows 7, as published by Microsoft. Read the rest of this entry »


8 steps to protect your Cisco router

5 Comments »

Network security is a completely changing area; new devices like IDS (Intrusion
Detection systems), IPS (Intrusion Prevention systems), and Honeypots are modifying the
way people think about security. Companies are spending thousand of dollars on new
security devices, but forgetting the basic, the first line of defense: the border router.

Although a lot of people may think that routers don’t need to be protect, they are
completely wrong. A lot of secure problems appear all time against this kind of device
and most of them are vulnerable. Read the rest of this entry »


Incredible HTML5 Examples

No Comments »

Google Images Box – CSS 3D example:

Andrew Hoyer | Cloth Simulation:

CanvasMol:


Privacy is dead, people.

4 Comments »

Many people go online on internet via a wifi routers and typically only the computer directly connected to the device can interrogate it for ID information.  But bad news guys because Google location data can be used to pinpoint exactly where you live 🙁

Google database created when its cars were carrying out surveys for its Street View service.

Google Street View car, Getty The data gathered by Google’s Street View cars

This database links Mac addresses of routers with GPS co-ordinates to help locate them. It can be use to identify someone’s location to within a few meters.

Now the actual issue:

This pin point location can be gathered by some crafted web page without asking your permissions which is possible with bug in most of the wifi routers and it is using Firefox location sharing.

1) Click here to Enter your Wifi Router MAC address and see where you are.

2) Click here to open java applet, collect that information for you and display your location. (not working. I am working on it)

3) Click here Firefox will ask your location.

Sources:

http://www.bbc.co.uk
http://www.computerworld.com
http://www.itworld.com

Recovering a lost Mysql root password

No Comments »

Lost MySQL root password Recovery

1/etc/init.d/mysql stop
2mysqld_safe --skip-grant-tables &

This stops MySQL and reloads it without the authentication (grant) tables, so we can connect to MySQL without a password. Beware this locks out all of your applications until the password reset process is completed. Now we need to go in an reset the password

1su -
2mysql -u root -p

It will prompt you for a password, just hit enter. You should now be inside the MySQL terminal and ready to change the root password:

1update user set password=PASSWORD(”NEW-PASSWORD”) where User=’root’;

Of course, replace NEW-PASSWORD with your chosen root password. Now all that remains is to restart MySQL in the normal manner in order for it to pick up the authentication tables correctly and let your customers and applications back in

1# /etc/init.d/mysql stop
2# /etc/init.d/mysql start

Simple Construction of a RAW TCP/IP Packet

1 Comment »
001#!/usr/local/bin/perl
002 
003use Socket;
004 
005$src_host = $ARGV[0]; # The source IP/Hostname
006$src_port = $ARGV[1]; # The Source Port
007$dst_host = $ARGV[2]; # The Destination IP/Hostname
008$dst_port = $ARGV[3]; # The Destination Port.
009 
010 if(!defined $src_host or !defined $src_port or !defined $dst_host or !defined $dst_port) {
011   print "Usage: $0 <source host> <source port> <dest host> <dest port>\n";
012   exit;
013 }
014 else {
015  main();
016 }
017  
018sub main {
019 my $src_host = (gethostbyname($src_host))[4];
020 my $dst_host = (gethostbyname($dst_host))[4];
021 
022 socket(RAW, AF_INET, SOCK_RAW, 255) || die $!;
023 setsockopt(RAW, 0, 1, 1);
024  
025 my ($packet) = makeheaders($src_host, $src_port, $dst_host, $dst_port);
026 my ($destination) = pack('Sna4x8', AF_INET, $dst_port, $dst_host);
027 send(RAW,$packet,0,$destination);
028}
029 
030sub makeheaders {
031 local($src_host,$src_port,$dst_host,$dst_port) = @_;
032 my $zero_cksum = 0;
033 # Lets construct the TCP half
034 my $tcp_proto          = 6;
035 my ($tcp_len)          = 20;
036 my $syn                = 13456;
037 my $ack                = 0;
038 my $tcp_headerlen      = "5";
039 my $tcp_reserved       = 0;
040 my $tcp_head_reserved  = $tcp_headerlen .
041                          $tcp_reserved;
042 my $tcp_urg            = 0; # Flag bits
043 my $tcp_ack            = 0; # eh no
044 my $tcp_psh            = 0; # eh no
045 my $tcp_rst            = 0; # eh no
046 my $tcp_syn            = 1; # yeah lets make a connexion! :)
047 my $tcp_fin            = 0;
048 my $null               = 0;
049 my $tcp_win            = 124;
050 my $tcp_urg_ptr        = 0;
051 my $tcp_all            = $null . $null .
052                          $tcp_urg . $tcp_ack .
053                          $tcp_psh . $tcp_rst .
054                          $tcp_syn . $tcp_fin ;
055 
056 # In order to calculate the TCP checksum we have
057 # to create a fake tcp header, hence why we did
058 # all this stuff :) Stevens called it psuedo headers :)
059 
060 my ($tcp_pseudo) = pack('a4a4CCnnnNNH2B8nvn',
061  $tcp_len,$src_port,$dst_port,$syn,$ack,
062  $tcp_head_reserved,$tcp_all,$tcp_win,$null,$tcp_urg_ptr);
063 
064 my ($tcp_checksum) = &checksum($tcp_pseudo);
065 
066 # Now lets construct the IP packet
067 my $ip_ver             = 4;
068 my $ip_len             = 5;
069 my $ip_ver_len         = $ip_ver . $ip_len;
070 my $ip_tos             = 00;
071 my ($ip_tot_len)       = $tcp_len + 20;
072 my $ip_frag_id         = 19245;
073 my $ip_frag_flag       = "010";
074 my $ip_frag_oset       = "0000000000000";
075 my $ip_fl_fr           = $ip_frag_flag . $ip_frag_oset;
076 my $ip_ttl             = 30;
077 
078 # Lets pack this baby and ship it on out!
079 my ($pkt) = pack('H2H2nnB16C2na4a4nnNNH2B8nvn',
080  $ip_ver_len,$ip_tos,$ip_tot_len,$ip_frag_id,
081  $ip_fl_fr,$ip_ttl,$tcp_proto,$zero_cksum,$src_host,
082  $dst_host,$src_port,$dst_port,$syn,$ack,$tcp_head_reserved,
083  $tcp_all,$tcp_win,$tcp_checksum,$tcp_urg_ptr);
084 
085 return $pkt;
086}
087 
088sub checksum {
089 # This of course is a blatent rip from _the_ GOD,
090 # W. Richard Stevens.
091   
092 my ($msg) = @_;
093 my ($len_msg,$num_short,$short,$chk);
094 $len_msg = length($msg);
095 $num_short = $len_msg / 2;
096 $chk = 0;
097 foreach $short (unpack("S$num_short", $msg)) {
098  $chk += $short;
099 }
100 $chk += unpack("C", substr($msg, $len_msg - 1, 1)) if $len_msg % 2;
101 $chk = ($chk >> 16) + ($chk & 0xffff);
102 return(~(($chk >> 16) + $chk) & 0xffff);
103}