Skip to main content

Posts

Showing posts from 2010

Red Hat Enterprise Linux 6 Beta

Finally we got new for Red Hat Enterprise Linux 6, RedHat released first public Beta version of RHEL6 on April 21, 2010, with many changes like good power management, changes in virtualizations (Xen Replaced by KVM) and you can run RHEL 5 Virtual image on it with converting Xen virtualization images to KVM. and good work on performance, EXT 4 and so many changes.Lear more on RHEL 6 from RedHat NewsDownload RHEL 6 Beta 1

Financial Assistance for academically bright students

If you have come across any bright students coming from poor financial background who have finished their 10th standard this year (April 2010) and scored more than 80%, please ask them to contact the NGO-Prerana (supported by Infosys foundation). The NGO is conducting a written test and those who clear the test will be eligible for financial help for their further studies. Please ask the students to contact the people mentioned below to get the application form:
580,Shubhakar, 44th cross, 1st A main road, Jayanagar 7th block, BangaloreContact numbers:
1. Ms. Saraswati 99009 06338
2. Mr. Shivkumar 99866 30301
3. Ms. Bindu -
99645 34667Even if you don't know anyone, please pass on this info, someone might be in need of this help.Thanks Vijiya for sharing this info.

Identify other end PC...or OS!!!

IP packet contains n number of information within. One important protocol is TTL i.e. Time To Live.
It is an eight-bit field helps prevent datagrams from persisting (e.g. going in circles) on an internet. This field limits a datagram's lifetime. It is specified in seconds, but time intervals less than 1 second are rounded up to 1. In latencies typical in practice, it has come to be a hop count field. Each packet switch (or router) that a datagram crosses decrements the TTL field by one. When the TTL field hits zero, the packet is no longer forwarded by a packet switch and is discarded. Typically, an ICMP message is sent back to the sender that it has been discarded.
In addition to that there is a good reason to use this field, i.e. for identifying the other end PC, device or OS. How? Lets check:
goto command prompt (in linux goto terminal)
and use ping command to identify the availability of other end device.
You will find : Here you can see the TTL (highlighted) value is 30 the end pc…

IIS - HRESULT 0x80070020 - The process cannot access the file because it is being used by another process.

I was facing this issue since last few days and never realized that this is due to Skype program that I have recently installed. So looks like Skype try to use Port 80 on your machine and interfere with IIS server. Following are additional details on this issue:IIS Manager Error: The process cannot access the file because it is being used by another process. (Exception from HRESULT: 0x80070020) - http://forums.iis.net/t/1086489.aspx IIS: The process cannot access the file because it is being used by another process.

Why websites have still default HTTP?

Internet theft cases, spoofing, fishing are common these days. Most information security agencies like Computer Emergency Response Team (CERT), OWAPS SANS are taking action to stop these frauds. In order to secure the web application agencies have given idea to the bank and other financial corporations to use Secure Socket Layer (SSL) protocol, Transport Layer Security (TLS).
But if this is that much secure then why web applications are still having default protocol HTTP (port no. 80)?
This we can understand by this conversation:
Client: Hello!!
http://www.laksha.net/
Client connects to TCP port 80 and wants this host
Here http tells webserver which host is requested with which configuration and what content shall be presented to the client
Webserver: Hi!! I have
http://www.laksha.net/
Gives respective configuration and presents content at the client.
But in other hand SSH and other secure service like TLS behaves like they are possessed. They don’t even tell webserver which webserver is requ…

What is Information Security?

Better to start with Information Security, we first know what is Information. Information is an asset that has value to the organization's business. In sort we can say asset which has some value to organization is called information. The information may be in any form of hard, soft or spoken in conversation. If an asset that has some value i.e. information, consequently needs some appropriate protection.
Security is a protection to any thing. So Information security is protection of organizational valuated assets from any kind of treats, to ensure low business risk, business continuity and maximum benefits from the investments.
Security may concern from outsiders (e.g. Hacker), or insiders (e.g. Disgruntled Employee).
Information Security can achieved by set of policy, procedures & process i.e. controls. The Information Security is covered under ISO-27001:5000.


Hrishikesh Dubey
Information Security Consultant
New Delhi, India.

HAPPY HOLI

Happy Holi to all blog redar Happy Holi

Email Virus Alert - W32.Ackantta.C@mm Virus - Please Read

My company AHS found many people receiving emails related to the virus, W32.Ackantta.C@mm, which is a mass-mailing worm that spreads through file-sharing programs and sends spam email that contains links to malicious files.The email has the below types of characteristics.  If you receive an email with the below Subjects or Attachments, please do not open the attachment or click any of the links in the email, please just delete the email.
Email Characteristics· Subject of Email: · You have received A Hallmark E-Card!· Your friend invited you to twitter!· Jessica would like to be your friend on hi5!, · Shipping update for your Amazon.com order 254-78546325-658742
· Name of Attachment: · Postcard.zip · Invitation Card.zip· Shipping documents.zip Please feel free to share this information with others.