May 21, 2014

Hacker Centric Operating Systems

1.DEFT

DEFT is a Live CD built on top of Xubuntu with tools for computer forensics and incident response. It's a very light and fast live system created for the Computer Forensics specialists.

2.NodeZero Linux

NodeZero Linux is reliable, stable, and powerful. Based on the industry leading Ubuntu linux distribution, NodeZero Linux takes all the stability and reliability that comes with Ubuntu’s Long Term Support model, and its power comes from the tools configured to live comfortably within the environment.

3.Pentoo

Pentoo is a security-focused livecd based on Gentoo. It's basically a gentoo install with lots of customised tools, customised kernel, and much more.

4.Kali Linux

Kali Linux is a Debian-derived Linux distribution designed for digital forensics and penetration testing. It is preinstalled with numerous penetration-testing programs, including nmap, Wireshark, John the Ripper and Aircrack-ng. 

Linux Command Line Tools

1.traceroute

-determines a route to the host.

2.rsync

-syncs data from one disk location to another.

3.pwd

-displays the name of the current working directory.

4.man

-unveils information about commands and a keyword search mechanism for needed commands.

5.cat

-links file contents and output them for viewing or printing.

6.mv

-renames or moves files from one Linux directory to another.

7.cpio

-backs up empty directories.

8.apt-get

-searches for and installs software packages on Debian-based systems.

Java And Scala

Scala employs a lot of nested code, because of which it is very easy to end up writing a confusing code. On the other hand, it also allows you to improve clarity if done the right way.

Unlike Java, Scala has the ability to support operator overloading. 

In Scala, functions are objects. This is a major difference between Java and Scala. Functions or methods are treated as variables in Scala, allowing you to pass them like objects.

The learning curve for Scala is steep as compared to Java. For Java developers looking to learn Scala, books like Programming Scala, Scala in Action etc. are recommended.

May 15, 2014

Linux Mint

 
 
With all the Windows XP end of life fiasco now well behind us, Linux is the preferred choice for individuals.organizations alike around the world. XP users could have a viable alternative in Linux Mint! Linux Mint has the same look and feel as XP, switching over will in all probability be a breeze for long time XP users. A more friendlier environment can be generated by setting Mint's Cinnamon interface to look and act a lot like XP. Users won't have to shell out an extra penny to use Mint. Further, the system requirements to run even the latest version Mint 16 Petra are minimalistic. All you need is an x86 processor, 512 MB RAM' 5 GB disk space, a graphics card that can handle 800×600 resolution, and a CD/DVD drive or USB port and you're good to go!

Site to Download

May 12, 2014

Web Desining in .NET (ASP.NET)

ASP.NET supports three different development methods:

  1. Web Pages, 
  2. MVC (Model View Controller), 
  3. Web Forms

Web Pages

Web Pages is the simplest programming model for developing ASP.NET web pages. It provides an easy way to combine HTML, CSS, JavaScript and server code:
  • Easy to learn, understand, and use
  • Built around single web pages
  • Similar to PHP and Classic ASP
  • Server scripting with Visual Basic or C#
  • Full HTML, CSS, and JavaScript control
Web Pages is easy extendable with programmable Web Helpers, including database, video, graphics, social networking and much more.


Web Forms

Web Forms is the oldest ASP.NET programming model, with event driven web pages written as a combination of HTML, server controls, and server code. Web Forms are compiled and executed on the server, which generates the HTML that displays the web pages.Web Forms comes with hundreds of different web controls and web components to build user-driven web sites with data access.

 

MVC 

MVC is a framework for building web applications using a MVC (Model View Controller) design:
  • The Model represents the application core (for instance a list of database records).
  • The View displays the data (the database records).
  • The Controller handles the input (to the database records).
The MVC model also provides full control over HTML, CSS, and JavaScript.
The Model is the part of the application that handles the logic for the application data.
Often model objects retrieve data (and store data) from a database.
The View is the parts of the application that handles the display of the data.
Most often the views are created from the model data.
The Controller is the part of the application that handles user interaction.
Typically controllers read data from a view, control user input, and send input data to the model.
The MVC separation helps you manage complex applications, because you can focus on one aspect a time. For example, you can focus on the view without depending on the business logic. It also makes it easier to test an application.
The MVC separation also simplifies group development. Different developers can work on the view, the controller logic, and the business logic in parallel.

Razor

Razor is a markup syntax that lets you embed server-based code (Visual Basic and C#) into web pages.
Server-based code can create dynamic web content on the fly, while a web page is written to the browser. When a web page is called, the server executes the server-based code inside the page before it returns the page to the browser. By running on the server, the code can perform complex tasks, like accessing databases.
Razor is based on ASP.NET, and designed for creating web applications. It has the power of traditional ASP.NET markup, but it is easier to use, and easier to learn.

Web Hosting

  • Web hosting means storing your web site on a public server
  • Web hosting normally includes email services
  • Web hosting often includes domain name registration
  • A domain name is a unique name for your web site.
  • Choosing a hosting solution should include domain name registration.
  • Your domain name should be easy to remember and easy to type. 
Before you sign up with a host provider, make sure to check this:
  • What are the restrictions on monthly transfer?
  • Will the web site be closed if it exceeds the volume?
  • Will you be billed a fortune if the web site exceeds the volume?
  • Is upgrading a simple task?
Calculate the following: average page size * expected page views per month
 

E-mail Forwarding

E-mail forwarding allows you to have multiple e-mail personalities.
With e-mail forwarding, you can setup aliases for other e-mail accounts

Before you choose your web host, make sure that:
  • The hosting type suits your needs
  • The hosting type is cost effective
  • Upgrading to a better server is possible
  • If needed, upgrading to a dedicated server is possible

 

 

What is TCP/IP?

TCP/IP stands for Transmission Control Protocol / Internet Protocol. It defines how electronic devices (like computers) should be connected over the Internet, and how data should be transmitted between them.
TCP - Transmission Control Protocol
TCP is responsible for breaking data down into small packets before they can be set over a network, and for assembling the packets again when they arrive.
IP - Internet Protocol
IP takes care of the communication between computers. It is responsible for addressing, sending and receiving the data packets over the Internet.

IP is Connection-Less

TCP/IP Protocol for WEB

Web browsers and servers use TCP/IP protocols to connect to the Internet. Common TCP/IP protocols are:
HTTP - Hyper Text Transfer Protocol
HTTP takes care of the communication between a web server and a web browser. HTTP is used for sending requests from a web client (a browser) to a web server, returning web content (web pages) from the server back to the client.
HTTPS - Secure HTTP
HTTPS takes care of secure communication between a web server and a web browser. HTTPS typically handles credit card transactions and other sensitive data.
FTP - File Transfer Protocol
FTP takes care of transmission of files between computers.


Domain Names

A name is much easier to remember than a 12 digit number.
Names used for TCP/IP addresses are called domain names.

TCP/IP Protocols for Email

E-mail programs use TCP/IP for sending and receiving e-mails. The TCP/IP protocols for email are:
SMTP - Simple Mail Transfer Protocol
 SMTP takes care of sending emails. Often emails are sent to an email server (SMTP server), then to other servers, and finally to its destination. SMTP can only transmit pure text. It cannot transmit binary data like pictures, sounds or movies.
MIME - Multi-purpose Internet Mail Extensions
The MIME protocol lets SMTP transmit multimedia files including voice, audio, and binary data across TCP/IP networks. The MIME protocol converts binary data to pure text, before it is sent.
POP - Post Office Protocol
The POP protocol is used by email programs to retrieve emails from an email server. If your email program uses POP, all your emails are downloaded to your email program (also called email client), each time it connects to your email server.
IMAP - Internet Message Access Protocol
The IMAP protocol works much like the POP protocol. The main difference is that the IMAP protocol will not automatically download all your emails each time your email program connects to your email server.
The IMAP protocol allows you to look through your email messages at the email server before you download them. With IMAP you can choose to download your messages or just delete them. This way IMAP is perfect if you need to connect to your email server from different locations, but only want to download your messages when you are back in your office.