Citrix XenApp

Your Journey towards cloud.

Virtualization Picking up Speed

Are your Skills keeping up? Skill up. Be Relevant

Are you a System Admin

Learn Citrix XenApp, Its future.

Citrix XenApp

Industry-leading virtualization platform for building cloud.

Cloud Computing in Demand

Learn how to build cloud on Citrix XenApp.

Showing posts with label Security. Show all posts
Showing posts with label Security. Show all posts

Friday, 1 June 2012

Password Protection for Windows Password

With Following steps your windows password would not be cracked with any password cracking tools which are mostly used to crack windows passwords.

So let's start:

Step 1. Goto Start>Run.

Step 2. Type syskey.exe and then click Ok.

Step 3. A dialog box is open then Click on Update.

Step 4. Then enter your password.Then click OK.
Now its done......

Stay Safe

Saturday, 19 May 2012

5 Threats To Your Home Wireless Connection

Keeping your wireless connection safe should be a top priority, especially if you use your wireless laptop or cell phone to login to secure financial accounts or business email. We all use the internet to access personal information, do banking, and chat in private to friends. Image if someone was watching you, browsing through your files, or recording your every move on your computer? Well don’t just sit there and think that it will not happen to you! If you have a wireless connection then you should make sure it is safe and secure by adding at least one simple security measure. Wireless network security is very important when it comes to protecting your privacy and precious data.

The Risks of a Weak Wireless Connection

Last year, the Washington Post report on a series of Facebook scams. Hackers would break into people’s Facebook accounts, claim to have been robbed in a foreign country, and ask their Facebook friends for someone to wire them money. Could this fool your family and friends into handing over hundreds or thousands of dollars?
One thing that makes this possible is that hackers can access your Facebook account, no matter how strong your password, if they can snoop on your wireless connection. They don’t need special equipment to do this—any basic wireless card lets hackers snoop on wireless connections using free software.
Wireless Connection Threats

There are three ways to protect yourself from wireless connection hackers:
  1. Don’t use a wireless connection. Always plug your computer into a blue Ethernet cord.
  2. Only use a wireless connection at least 1/2 mile (about 1 kilometer) away from any hackers.
  3. Secure your wireless connection from the five types of threats described in this article.

Wireless Connection Threat #1: Unencrypted Connections

Unencrypted connections are great—they’re easy to set up on your wireless router and all of your devices connect automatically. But because they’re unencrypted, hackers can eavesdrop on all of your wireless traffic. Well, almost all of your wireless traffic—anything that uses Secure Socket Layer (SSL) encryption like websites starting with HTTPS will be encrypted.
Unfortunately, although Facebook and GMail and other sites use SSL for login screens, they don’t use it for their regular connections. In these cases, hackers can still break into your accounts by reading the cookie your Web browser sends to Facebook and Google every time you connect.
If you own the wireless connection, your best solution is to enable encryption on your router. Choose WPA encryption if possible, but on older routers you’ll need to settle for WEP. See the next section for information on the risks of WEP.
If you don’t own the wireless connection, for example you’re at a library or coffee shop, then you need to protect your connection by using a Virtual Private Network (VPN) or by using one of the plugins for your browser which force Facebook, GMail, and other services to use SSL.

Wireless Connection Threat #2: WEP

The Wired Equivilance Privacy (WEP) system was part of the original specification for wireless Internet, but within a few years of being released, hackers figured out how to break it. In 2007, three cryptoanalysts broke into a WEP connection using a 1.7 GHz laptop in less than 1 minute. They published their technique and now any hacker can use it to eavesdrop on any WEP-protected connection.
WEP has been officially replaced by Wifi Protected Access (WPA), but many old routers only support WEP. If you have an option to use WPA, please use it. If you don’t have support for WEP on your router and you’re concerned about security, you should see if the manufacturer of your router offers a firmware upgrade. Otherwise you should buy a newer router.

Wireless Connection Threat #3: Weak Passwords

WPA lets you secure your wireless connection using a password, but this password can be hacked like any other weak password. Because this password helps keep all of your other passwords secure, you should put some extra thought into making it very secure. Besides, you’ll only have to type it once on each computer, so it won’t be much of a hassle to make it extra hard to guess.
I suggest you add a few numbers and some punctuation to your password to help keep hackers from guessing it. Also make sure it’s at least 8 characters long—and preferably 12 characters or more.

Wireless Connection Threat #4: Snooping Users

No matter how secure you make your wireless network using WPA and strong passwords, you still must trust every user you let onto your network. Once users have access to your network, they can snoop on every packet sent on your wireless connection.
For example, if you’re at a hotel which uses WPA and you log into Facebook, any hacker who’s in a nearby room can also use his WPA-protected connection to snoop on your packets. At an office, employees can snoop on the boss’s WPA connection to get access to confidential information.
High-end routers can give each user their own secure connection, or you can just buy separate cheap routers for each class of user—for example, one router for managers and one router for employees.

Wireless Connection Threat #5: Traffic Analysis

One of the most advanced hacker techniques which is probably not used much in the real world is called traffic analysis. It lets hackers snoop on certain communication even when it’s encrypted.
For example, researchers from John Hopkins University in Maryland, US, were able to decode encrypted voice-over-IP (VoIP) phone calls by looking at the size of the encrypted packets. The sound “c” produced small packets, but the sound “ow” produced a big packet, so a small packet followed immediately by a large packet might mean someone said, “cow”.
Other researchers and possibly hackers can use traffic analysis to figure out all sorts of interesting things about your communication. There’s no easy solution to traffic analysis—you have to hope the people who make your software read the security journals. However, you can try to avoid sending highly-sensitive information on the same wireless communication network hackers use. 

Friday, 13 January 2012

Kaspersky Rescue Disk 10 on USB Device

Procedure to record Kaspersky Rescue Disk 10 to a removable USB device.,

Steps to Follow:1. Download the iso image of Kaspersky Rescue Disk 10 and a special utility 
Download the following utilities:
  • Iso image of Kaspersky Rescue Disk 10 (196 MB) 
  • Utility to record Kaspersky Rescue Disk 10 to USB devices (378 KB)
2. Recording Kaspersky Rescue Disk 10 to your USB device: 
In order to do this, perform the following actions:

  • Connect the USB to  your system. The USB Device should have the following features: 
    •  USB Device should not less than 256 MB.  
    • USB device must have FAT16 or FAT32 file system. If it is formatted in NTFS file system then you need to format it in FAT16 or FAT32 first.
  • Run the downloaded file rescue2usb.exe. On the Kaspersky USB Rescue Disk Maker window, click Browse... and select the iso image of Kaspersky Rescue Disk 10
  •  Under 'USB Medium' Select the required USB device  and Click START. Wait until the process is complete.
  • Click OK on the open window informing that Kaspersky USB Rescue Disk has been successfully created. 

3. Configure the computer to boot from Removable Device:- 
To do this, perform the following actions: 

  • Enable booting from removable devices in BIOS settings  
  • Connect the removable device with Kaspersky Rescue Disk 10 image to your computer.
4. Boot your computer from Kaspersky Rescue Disk 10

  • Restart your computer. After reboot, a message will appear on the screen: Press any key to enter the menu.  Press any key. 
  • A loading wizard will start (you will see the menu to select the required language). If you do not press any key in 10 seconds, the computer boots from hard drive automatically. In the start up wizard window that opens, select the graphic interface language using the cursor moving keys. Press the ENTER key on the keyboard. 

  • Select one of the following start up methods and Press the ENTER.
    • Kaspersky Rescue Disk. Graphic Mode loads the graphic subsystem.
    • Kaspersky Rescue Disk. Text Mode loads the text user interface represented by the Midnight Commander (MC) console file manager. 
    • Boot from Hard Disk. 

  • The End User License Agreement of Kaspersky Rescue Disk 10 is displayed on the screen. Read carefully the agreement. If you agree with all the statements of the agreement press the C button on your keyboard.

Once the actions described above have been performed, the operating system starts. It scans your computer for connected devices and searches for file systems of your local and removable disks. Once the operating system has started, you can start work with Kaspersky Rescue Disk 10. If the host operating system is in sleep mode or its operation has been completed incorrectly, you will be asked to mount the file system or restart the computer. In order to boot from the hard drive to shut down the operating system correctly, select Restart computer.

  • If you select Continue, the application will continue mounting the file system, but there is a fairly high risk of file system damage. 
  • If you select Skip, the application will skip file system mounting. Only boot sectors and autorun elements will be scanned. There is a fairly high risk of file system damage.

Monday, 2 January 2012

Stop Virus entering from USB to Pc and Vice versa


In this post i am gonna tell to How to protect both PC and USB from Viruses. Well, Do you know On what moments viruses transfer from USB 2 PC and PC 2 USB????
  1. At the time when we Open USB Drive for Copying a File from USB to PC
  2. During Copying a File from PC to USB

So if we do something to stop entering Viruses on these two moments then you can protect both PC and USB from Viruses.

Now the Question arises How we can do this......
Answer:


1. At the time when we Open USB Drive for Copying a File from USB to PC

  • On this time if we disable the Writing Property of USB drive then viruses can't enter in the USB.
Now Steps to disable the Writing Property of USB drive:
1.  Click Start, click Run, type Regedit in the Open box, and then click OK.
2.  Go to HKLM > System > current control set > control
3. Right click on Control folder> new> key and give name 'StorageDevicePolicies'
4. Now In the right side window right click > new > Dwrd value and give it a value '1'
5. Now close registry, restart PC. 
2. During Copying a File from PC to USB
  • Always use 'send to' (right click on file that has to copy> send to > USB Drive) except copind and pasting file.
  • During Copying a File from PC to USB Remember to enable the Writing Property of USB drive by changing value 0 in step 4.


Direct shortcut to Enable and disable the Writing Property of USB drive 
Note: Registry Modification will be in effect only after Reboot PC.

Be safe

Thursday, 1 September 2011

Manual virus removal from 'System Volume information'

In Windows,  System Volume Information is a system folder, to keep track of the changes took placed on a partition in a fix time period. This folder exists in every partition on your HDD. By default this folder is hidden, but you can see it by showing the hidden and system files and folders.The information stored in these folders helps Windows to revert to an earlier state, when you use the System Restore tool.


But sometimes, some malware files get in the System Volume Information folder. This can happens by any of following reasons:

  1.  the malware wants to get there so that user doesn't have access to delete it and from where it can restore itself, 
  2. or some malware file gets deleted and Windows decides that the file was important and it automatically stores it there, in case you ever want it back.
Well, you can easily clean malware infection from this folder by using the following simple steps:





  • Right click on My Computer, then go to Properties
  • Now in Windows XP:  Go to System Restore tabenable the option Disable System Restore on all drives and click Apply. This should erase all System Restore Points, including the infected file(s).
  • In Windows 7: Go to System Protection > then under protection settings choose hard drive that have malware and click Configure > Turn off system Protection > ok
  • After this, again enable the system Restore option and press Apply again, so that you'll re-enable System Restore.