19 September 2010

This is a test post

09 June 2010

Finally we got new for Red Hat Enterprise Linux 6, RedHat released first public Beta version of RHEL6 on April 21, 2010, with many changes like good power management, changes in virtualizations (Xen Replaced by KVM) and you can run RHEL 5 Virtual image on it with converting Xen virtualization images to KVM. and good work on performance, EXT 4 and so many changes.

Lear more on RHEL 6 from RedHat News

Download RHEL 6 Beta 1

12 May 2010

If you have come across any bright students coming from poor financial background who have finished their 10th standard this year (April 2010) and scored more than 80%, please ask them to contact the NGO-Prerana (supported by Infosys foundation). The NGO is conducting a written test and those who clear the test will be eligible for financial help for their further studies. Please ask the students to contact the people mentioned below to get the application form:

580,Shubhakar, 44th cross, 1st A main road, Jayanagar 7th block, Bangalore

Contact numbers:
1. Ms. Saraswati 99009 06338
2. Mr. Shivkumar 99866 30301
3. Ms. Bindu -
99645 34667

Even if you don't know anyone, please pass on this info, someone might be in need of this help.

Thanks Vijiya for sharing this info.

12 April 2010

Visual Studio 2010 is now released. Get it from your MSDN download.

01 April 2010

IP packet contains n number of information within. One important protocol is TTL i.e. Time To Live.
It is an eight-bit field helps prevent datagrams from persisting (e.g. going in circles) on an internet. This field limits a datagram's lifetime. It is specified in seconds, but time intervals less than 1 second are rounded up to 1. In latencies typical in practice, it has come to be a hop count field. Each packet switch (or router) that a datagram crosses decrements the TTL field by one. When the TTL field hits zero, the packet is no longer forwarded by a packet switch and is discarded. Typically, an ICMP message is sent back to the sender that it has been discarded.
In addition to that there is a good reason to use this field, i.e. for identifying the other end PC, device or OS.
How? Lets check:
goto command prompt (in linux goto terminal)
and use ping command to identify the availability of other end device.
You will find :
Here you can see the TTL (highlighted) value is 30 the end pc or device or os is windows NT machine. Its range could be 28 to 32. Similarly for linux machine (open source machines) it would be 62-64, for windows (windows machines) 126-128. For routers it would be 255-256.
You can also check this with following list.

OS/Device Version Protocol TTL value
AIX 3.2, 4.1 ICMP 255
BSDI BSD/OS 3.1 and 4.0 ICMP 255
Cisco ICMP 254
Juniper ICMP 64
Linux 2.0.x kernel ICMP 64
Linux 2.2.14 kernel ICMP 255
Linux 2.4 kernel ICMP 255
Linux Red Hat 9 ICMP and TCP 64
Solaris 2.5.1, 2.6, 2.7, 2.8 ICMP/TCP 255/64
SunOS 5.7 ICMP and TCP 255
Windows for Workgroups TCP and UDP 32
Windows 95 TCP and UDP 32
Windows 98 ICMP/TCP 128
Windows NT 4.0 TCP and UDP 128
Windows Server 2003 128
Windows XP ICMP/TCP/UDP 128

22 March 2010

As per the Rob Caron blog, Visual Studio 2010 and .NET Framework 4 will launch on Monday, 12 April 2010. The original launch date for Visual Studio 2010 and .NET Framework 4 was March 22.

09 March 2010

I was facing this issue since last few days and never realized that this is due to Skype program that I have recently installed. So looks like Skype try to use Port 80 on your machine and interfere with IIS server. Following are additional details on this issue:

IIS Manager Error: The process cannot access the file because it is being used by another process. (Exception from HRESULT: 0x80070020) - http://forums.iis.net/t/1086489.aspx

IIS: The process cannot access the file because it is being used by another process.

02 March 2010

Internet theft cases, spoofing, fishing are common these days. Most information security agencies like Computer Emergency Response Team (CERT), OWAPS SANS are taking action to stop these frauds. In order to secure the web application agencies have given idea to the bank and other financial corporations to use Secure Socket Layer (SSL) protocol, Transport Layer Security (TLS).
But if this is that much secure then why web applications are still having default protocol HTTP (port no. 80)?
This we can understand by this conversation:
Client: Hello!!
Client connects to TCP port 80 and wants this host
Here http tells webserver which host is requested with which configuration and what content shall be presented to the client
Webserver: Hi!! I have
Gives respective configuration and presents content at the client.
But in other hand SSH and other secure service like TLS behaves like they are possessed. They don’t even tell webserver which webserver is requested. SSH require any server IP address can have only on website hosted on it. It means when client connect to webserver through port number 443, it needs a signed certificates.
HTTP & HTTPS both are different in their behaviour. One wants to tell every things and other will tell when you will ask with some signed authorization i.e. certificate.

01 March 2010

Better to start with Information Security, we first know what is Information. Information is an asset that has value to the organization's business. In sort we can say asset which has some value to organization is called information. The information may be in any form of hard, soft or spoken in conversation. If an asset that has some value i.e. information, consequently needs some appropriate protection.
Security is a protection to any thing. So Information security is protection of organizational valuated assets from any kind of treats, to ensure low business risk, business continuity and maximum benefits from the investments.
Security may concern from outsiders (e.g. Hacker), or insiders (e.g. Disgruntled Employee).
Information Security can achieved by set of policy, procedures & process i.e. controls. The Information Security is covered under ISO-27001:5000.

Hrishikesh Dubey
Information Security Consultant
New Delhi, India.
Happy Holi to all blog redar Happy Holi


20 January 2010

My company AHS found many people receiving emails related to the virus, W32.Ackantta.C@mm, which is a mass-mailing worm that spreads through file-sharing programs and sends spam email that contains links to malicious files.

The email has the below types of characteristics.  If you receive an email with the below Subjects or Attachments, please do not open the attachment or click any of the links in the email, please just delete the email.

Email Characteristics

· Subject of Email:

· You have received A Hallmark E-Card!

· Your friend invited you to twitter!

· Jessica would like to be your friend on hi5!,

· Shipping update for your Amazon.com order 254-78546325-658742

· Name of Attachment:

· Postcard.zip

· Invitation Card.zip

· Shipping documents.zip

Please feel free to share this information with others.