fanez.wordpress.com
Mengintip Host dengan Tools NMAP | Fanez's Weblog
https://fanez.wordpress.com/mengintip-host-dengan-tools-nmap
10 Tips Wireless Security. Analisa Network dengan TCPdump. Download IOS menggunakan Xmodem dan TFTPDNLD. Mengintip Host dengan Tools NMAP. Pengantar DNS (Domain Name System). Pengantar Pengkabelan dan Jaringan. Serangan Denial of Service Haddad Sammir (MOBY). SMTP (Simple Mail Transfer Protocol). Standard for ARPA Internet Text Messages. TCP/IP dan Praktek Sekuriti Jaringan. Tips Membangun LAN dengan Bluetooth. 124; Comments RSS. Mengintip Host dengan Tools NMAP. Artikel Populer IlmuKomputer.Com. Secara ...
drivebywifiguide.com
Jeff Duntemann's Wardriving FAQ
http://drivebywifiguide.com/wardrivingfaq.htm
Part I. The Basics. Wardriving is the gathering of statistics about wireless networks in a given area by listening for their publicly available broadcast beacons. Wireless access points (APs) announce their presence at set intervals (usually every 100 milliseconds) by broadcasting a packet containing their service set identifier (SSID; basically, the user-defined name of the access point) and several other data items. A stumbling utility. Wardriving as we know it was first developed by Pete Shipley.
chandramb.blogspot.com
System Engineer - IT Administration: 04/23/10
http://chandramb.blogspot.com/2010_04_23_archive.html
System Engineer - IT Administration. Use Green Technologies and save the world. Friday, April 23, 2010. Security Firewalls are installed to prevent unauthorized access to the network. Group policies in place for accessing PCs and workstations for authorized access. Access to important files and directories is given only to specific personnel. All email and web servers are located at an independent internet data center. Each client's process is run on a separate VLAN/VPN when run off-shore/off-site. Adequ...
chandramb.blogspot.com
System Engineer - IT Administration: Re-size Amazon EC2 Instance Disk Size
http://chandramb.blogspot.com/2014/11/re-size-amazon-ec2-instance-disk-size.html
System Engineer - IT Administration. Use Green Technologies and save the world. Wednesday, November 26, 2014. Re-size Amazon EC2 Instance Disk Size. Resize Amazon EC2 Instance Disk. 1) Create Snapshot from Volume. 2) Create Volume From New Snapshot and give size as you want. 3) Stop EC2 Instance. 4) Go to Volume and detach Volume. 5) Attach new Volume as /dev/sda1. 6) Start Instance and do the following. Filesystem Size Used Avail Use% Mounted on. Dev/xvda1 6.0G 2.0G 3.7G 35% /. Command (m for help): u.
chandramb.blogspot.com
System Engineer - IT Administration: 05/30/10
http://chandramb.blogspot.com/2010_05_30_archive.html
System Engineer - IT Administration. Use Green Technologies and save the world. Sunday, May 30, 2010. Multiple Private Keys in a GlassFish. Multiple Private Keys in a GlassFish domain. GlassFish uses Java JKS for storing keys and certificates. Out of the box, the keyStore (keystore.jks) and the trustStore (cacerts.jks) reside in $GLASSFISH HOME/domains/domain1. Even though there are several CA root certificates in cacerts.jks, there is only one private key in keystore.jks. Instead of hand-crafting the do...
chandramb.blogspot.com
System Engineer - IT Administration: Setup Self SSL with tomcat...
http://chandramb.blogspot.com/2010/11/setup-self-ssl-with-tomcat.html
System Engineer - IT Administration. Use Green Technologies and save the world. Tuesday, November 16, 2010. Setup Self SSL with tomcat. Type the following command in UNIX. Keytool -genkey -alias mycert -keyalg RSA -keystore /etc/tomcat6/keystore. And answered the prompts. Then edit my server.xml file and uncommented/edited this line. Subscribe to: Post Comments (Atom). Setup Self SSL with tomcat. About Me - System Administrator. Gurgaon, Haryana, India. View my complete profile. What is computer security?
photsworld.blogspot.com
Phots World: Security Tools
http://photsworld.blogspot.com/p/security-tools.html
A world of computer and Mobile. Top Network Security Tools. Premier UNIX vulnerability assessment tool. Nessus was a popular free and open source vulnerability scanner until they closed the source code. In 2005 and removed the free "registered feed" version. Sniffing the glue that holds the Internet together. Everyone's favorite open source IDS. See all intrusion detection systems. The network Swiss army knife. And so-called GNU Netcat. A network probing utility like ping on steroids. And can even decloa...