Followers

Wednesday, October 21, 2009

Apache http Server

Hye guy! we meet again. Today I just want to help my knowledge how to setup Apache http server. Maybe you can refer to the youtube.com but you need to find the video first if you refer to me just below my post I already put the video to you just refer to the video.

Okay let's say you want to setup the Apache. I give you some simple instruction to follow

  1. Download the Apache http from apache.org or click this link for windows only: click here
  2. Open the installer and setup it
  3. When chage on the network domain field to the localhost
  4. Change also the server name to localhost and Administrator Email address to admin@localhost
  5. After that click next and wait for the installation finish

Good luck my friend, kindly all you can give some response / feedback.


Tuesday, October 20, 2009

Drive Protection

Follow the instruction to remove a trojan and make a drive protection. This will remove the autorun.inf from executing in your system.

follow this instruction :
  • Click Start -> Run.
  • Type notepad and press Enter.
  • Copy all the text below into Notepad.

    @echo off

    set drv=c:\

    attrib -A -H -S -R %drv%\autorun.inf
    del \\.\%drv%\autorun.inf\"lpt3.This folder was created by Flash_Disinfector"
    rd %drv%\autorun.inf

  • Save this as remove_fd.bat to your Desktop (remember to select Save as file type: All files in Notepad).
  • Double Click remove_fd.bat and wait for the dos window to close and file.txt will appear on the desktop.
  • Repeat previous steps to all drives, make replacing c with the appropriate drive letter.

This is a program designed and developed by sUBs (author of combofix) to clean autorun.inf Trojans that are executing on the system.


Intrusion Detection Systems

what is intrusion detection systems?what is use for?how we can get it?what are the software?

Intrusion detection systems is one of the ways you to protect you network from being attack by hacker or cracker. Intrusion detection system means to differentiate between an authorized entry and a malicious intrusion. There are two types of intrusion detection systems that is signature-based and heuristic-based. Intrusion detection systems also known as IDS.

Snort are one of the intrusion detection systems famous software but it hard to configure. How it's work? Snort also will tells you where are the attack came from and lot of more. This software also can terminate the connection the suspicious events.

You can download this kind of intrusion detection software from www.snort.org. How to configure this software? You can refer this video below or you can get the instruction from snort.org.










Sunday, October 18, 2009

Troubleshoot Window Vista

To run the System File Checker tool, follow these steps:
  1. Click Start
    Start button , and then type cmd in the Start Search box.
  2. Right-click cmd in the Programs list, and then click Run as administrator.
     User Account Control permission
    If you are prompted for an administrator password or confirmation, type your password or click Continue
  3. At the command prompt, the following line, and then press ENTER:
    sfc /scannow






To restore the operating system to an earlier point in time, follow these steps:
  1. Click Start

    Start button , type system restore in the Start Search box, and then click System Restore in the Programs list.
     User Account Control permission If you are prompted for an administrator password or confirmation, type your password or click Continue.
  2. In the System Restore dialog box, click Choose a different restore point, and then click Next.
  3. In the list of restore points, click a restore point that was created before you began to experience the issue, and then click Next.
  4. Click Finish.