Posts

Install MySQL In Ubuntu On VMware And Connect Through The Host Pc (windows or any host pc)

Image
This article explain how to install MySql 5.5 with Ubuntu 12.04 on VMware (VMware Workstation 8.0.1) and connect through the virtual pc to access the MySql databases in Host pc (Windows or what ever os on host pc).  1.Install MYSQL On Ubuntu 12.04 sudo apt-get install mysql-server   (make sure you are log in as root user,fast internet connection help to download package's correctly.if network connection slow,then download packages may be corrupted!) 2.Install MYSQL Workbench sudo apt-get install mysql-workbench  

Vmware ubuntu 12.04 - windows 7 networking

Virtual machine settings : ------------------------- Network adapter - Host Only IPv4 Settings - Method Automatic DHCP IPv6 Settings -  Method Automatic Host-PC --------- Select your network adapter  eg: Celcome3G BroadBand Right click - > properties -> goto Sharing-> select  Allow to other network  users to connect through this computer's internet  connection. Then select vmware network adapter VMNet1. Then Press OK.

Reboot VMware -Ubuntu

sudo reboot

VMWare Tool Installation for Ubuntu

#Mount the CD drom sudo mkdir /mnt/cdrom sudo mount /dev/cdrom /mnt/cdrom #Run this command to find the exact name of the VMware Tools bundle; the file name varies depending on your version of Fusion: ls /mnt/cdrom #Extract contents of cdrom to tmp directory tar -zxvf /mnt/cdrom/VMwareTools- .tar.gz -C /tmp/ Note: is the version discovered in the previous step which at the time of writing was  VMwareTools-8.3.7-341836.tar.gz #now move into the vmware tools directory in tmp directory. cd /tmp/vmware-tools-distrib/ #Run the installer with the -d switch to accept defaults. sudo ./vmware-install.pl -d

Enabling the root account in ubuntu

sudo -i To enable the Root account (i.e. set a password) use: sudo passwd root

Keyloggers: Implementing low level keyloggers in Windows. Part Two

Image
SPECIALTHANKS TO http://www.securelist.com  Nikolay Grebennikov (2007) This article is a continuation of the previous report on keyloggers. It offers a detailed analysis of the technical aspects and inner workings of keyloggers. As was noted in the first article, keyloggers are essentially designed to be injected between any two links in the chain whereby a signal is transmitted from a key being pressed to symbols appearing on the screen. This article provides both an overview of which links exist in this chain, and how both software and hardware keyloggers work. This article is written for technical specialists and experienced users. Other users, who are not part of this target group, should simply be aware that Windows offers a multitude of ways in which data entered via the keyboard can be harvested, although the vast majority of keyloggers only use two of these methods (see:  Designing keyloggers, the first part of the article ). It should be stressed that thi...

Keyloggers How they work and how to detect them - part 1

Image
SPECIALTHANKS TO http://www.securelist.com  Nikolay Grebennikov (2007) In February 2005, Joe Lopez, a businessman from Florida, filed a  suit  against Bank of America after unknown hackers stole $90,000 from his Bank of America account. The money had been transferred to Latvia. An investigation showed that Mr. Lopez’s computer was infected with a malicious program, Backdoor.Coreflood, which records every keystroke and sends this information to malicious users via the Internet. This is how the hackers got hold of Joe Lopez’s user name and password, since Mr. Lopez often used the Internet to manage his Bank of America account. However the court did not rule in favor of the plaintiff, saying that Mr. Lopez had neglected to take basic precautions when managing his bank account on the Internet: a signature for the malicious code that was found on his system had been added to nearly all antivirus product databases back in 2003. Joe Lopez’s losses were caused by a ...