Connect With Me In Facebook

Welcome to DefendHackers, If u want to Apply for a Blogroll as a Author , With h4ckfreak Mail me @ suren.click@gmail.com

Mark Zuckerberg tells 8th graders “there’s no shortcuts” and to make friends

By h4ckfreak

Thursday, March 18, 2010

Cisco Best Overall Home Network

Cisco has announced the Grand Prize winner of its competition for the best overall home network using Cisco equipment. This competition is run among Cisco employees. The winner is Iwan Eberhart, Frauenfeld, Switzerland. His Home Network is shown in the figure below:“I enjoy having the latest and greatest technologies at home, too,” he says. In fact, not a day goes by that Eberhart doesn’t use his home network for work, play, or both. As you can see, Eberhart uses his home network for TV and Movies, Centralized Storage of his media collection, Sound and Music, IP Telephony, Home LAN gaming etc.Eberhart’s prize-winning home network evolves...

How to Configure DHCP on Cisco 851 or 871 Router

DHCP stands for Dynamic Host Configuration Protocol. Basically it’s a mechanism which assigns IP addresses to computers dynamically. Usually DHCP is a service running on a server machine in the network in order to assign dynamic IP addresses to hosts. All Cisco 800 series models have the ability to work as DHCP servers, thus assigning addresses to the internal LAN hosts. Without a DHCP server in the network, you would have to assign IP addresses manually to each host. These manually assigned addresses are also called “static IP addresses”.In this post I will show you how to configure a Cisco 851 or 871 router to work as DHCP server....

Prevent Spoofing Attacks on Cisco ASA using RPF

A common attack found on TCP/IP networks is IP spoofing. This is usually used for Denial-of-Service, Identity hiding, or even to bypass firewalls or Access-Lists security rules. The spoofing attack works like that: A malicious attacker sends packets towards a target host. The attacker disguises itself by inserting a fake source IP into the packet. This fake source IP address in the packet either does not exist at all or it might be a legitimate IP address of some other host located on some other network. The reply traffic from the target will never reach the attacker because the attacker’s source address is bogus. Therefore the identity...

All About IP`S:

Getting Ip's:--To see the ip all computers you are connected to (web servers, people attempting to hack into your computer). Go to dos (start>run>type command) and run the netstat command. Type netstat /? for details.Type netstat -r at the command prompt to see the ip of all computers you are connected toIn MSN (and other programs) when you are chatting to someone everything you type goes through the MSN servers first (they act as a proxy) so you see their ip rather than who you are chatting to. You can get round this by sending them a file as MSN doesn't send file through its proxy. When you type the netstat -r (or -a for a...

All about Telnet 101

Don't use this for illegal stuff:: Introduction: Telnet is used to connect to remote machines through emulation. This means that it can connect to a server, any server instantly because of it's ability to emulate (copy) remote computers. Lets Start: In Windows, Telnet can be found by going to Start -> Run and then typing telnet. The application should then pop up. If you don't have Windows, there are many Telnet alternatives for mac, linux etc. Since I don't know any,search the internet for Telnet for Linux or Telnet for Mac and you should find something instantly. If you have a PC and are using Windows 98/95, 2000, Me, or...

Converting an IP address to an IP Number

IP address (IPv4 / IPv6) is divided into 4 sub-blocks. Each sub-block has a different weight number each powered by 256. IP number is being used in the database because it is efficient to search between a range of number in database. Beginning IP number and Ending IP Number are calculated based on following formula: Quote: IP Number = 16777216*w + 65536*x + 256*y + z (Formula 1) Quote: where IP Address = w.x.y.z Quote: For example, if IP address is "202.186.13.4", then its IP Number "3401190660" is based on the Formula 1. Quote:IP Address = 202.186.13.4 So, w = 202, x = 186, y = 13 and z = 4 Quote:IP Number = 16777216*202 + 65536*186 + 256*13 + 4 = 3388997632 + 12189696 + 3328 + 4 = 3401190660 To reverse IP number to IP address, Quote: w = int ( IP Number / 16777216...

How To Close Port 445 In Windows XP For Good

Even after you disable local file and print sharing, Windows XP still leaves port 445 open and listening for incoming connections. If you are not using local networking, this can pose a security risk. To close this port you need to make a quick change to an entry in the Windows registry. NOTE: It is very important that if you do not feel comfortable editing the registry or have never done it before that you avoid doing this right away and learn more about the Windows registry. Changing the wrong setting or changing a setting incorrectly can cause Windows to not function correctly. Please be advised that Vectro Security takes no responsibility for any damage caused to the operating system. Here are the step-by-step instructions to close port 445 in Windows XP: Click "Start" ...

Renaming The Start Button:

To rename the start button, you will need a hex editor. My preference is UltraEdit Copy the \windows\explore.exe file to a new name (e.g. explorer_1.exe) With the hex editor, open that file and go to offset 412b6 You will see the word start with blanks between each letter Edit it be any 5 characters or less Save the file Boot to DOS Copy the existing c:\windows\explorer.exe to explorer.org Copy explorer_1.exe to explorer.exe You will also need to replace the explorer.exe in the c:\windows\system32\dllcache file as well with the new one. Note: If the partition is NTFS and you can't access the files from DOS: Start Regedit Go to HKEY_LOCAL_MACHINE \ SOFTWARE \ Microsoft \ Windows NT \ CurrentVersion \ Winlogon. Change the value of Shell from Explorer.exe to explorer_1.exe...

How to Clear and Don’t Display Last User Name who Logged In On Windows Logon Screen

Windows operating system, including Windows Vista, Windows 7 and Windows Server, is designed in a way that the last user who logged into the system is remembered, and is displayed automatically on next log in, so that user has to just enter the password to log on. In the Welcome Screen, user account names are listed, or in the case of only single account available, automatically selected to prompt for password. In classic Windows logon box (including the Logon to Windows box after press Ctrl + Alt + Delete shortcut), the user name who logged in most recently is displayed as user name to log on. The behavior to remember and display the last user name who logged in to the Windows system most recently is built into Windows operating system to allow user to login quickly by just entering...

Pages 381234 »