Instant Banner Creator

iframe framespacing="0" frameborder="no" src="http://www.thisistoday.net/widget/small/" width="170" height="360">
iframe rc="http://www.thisistoday.net/widget/" width="460" height="945">

Tuesday, May 12, 2009

Internet Security Lesson Five 11 May

In this lesson, the class learned about different tools and software applications that hackers would use to hack into people's computer systerms if they were using Microsoft Windows operating systems.
NetStumbler
http://www.netstumbler.com/
Nmap
http://www.insecure.org/nmap/
Wellenreiter
http://www.sourceforge.net/projects/wellenreiter/index.jsp

Friday, May 8, 2009

Internet Secutiry Lesson Three 04 May

May 4, 2009
UNIX and Linux:
Grandfather of all operating systems
Command based operating system
Security is pretty tight
Due to command driven, require less power to operate
Root user/super user: God of computer operating system
Shadow directory: place passwords there are only those on computer have access to shadow
Every operating has a kernel: the heart of an operating system, the engine that runs everything
In order for an application to work it needs to access the kernel
Look at page 99.
INIT>>>INETD
>>>XINETD
You can manually process by simply running them in command box
ROT 13- Take the letter and go 13 letters down
Give groups permission, not individuals
IN networking world you need to audit…the only way you can do criminal charges for somebody who has cracked into files.
Hackers will log in and change files, and logs
Windows:
1975 when IBM was the superpower they had a competition for an operating system
Bill Gates was at Harvard and entered
Created DOS
Bill Gates would not sell his system but wanted the rights to it, and IBM said ok and then he became who he is today
In 1987 IBM and DOS separated and IBM created its own operating system
Windows 3.11, designed around networks
Windows NT was next…New Technology or by hackers NICE TRY
Windows 95 was next
Windows 98, also created was ME…ME was created to beat the millennium bug
Windows 2000- Almost a decade has passed since Windows created a new operating system. All others were updates
Aligned with better security features, still problems as the gap between work and personal systems were getting larger, commands were different, everything was different
Microsoft wanted bring all together so they created windows XP and Windows 2003
Windows 7 and Vista
Greatest feat was backwards compatibility-ability to run older operating systems on new windows…i.e. games for windows 2000 can run on XP
Software now runs the world not hardware running things
Due to wanting backwards capability, it leads to huge security problems and risks
PDC-Primary domain Controller
BDC- Backup domain Controller
Win2000-Every domain controller ran Active directory
When updating you computer you had option of going into Native or Mixed Control
If you went to Native mode you never went back…will not allow any Windows NT in its network
Mixed mode allowed you to run both 2000 and windows NT together
KNOW DIFFERENCE between native and Mixed
Hash- The more encrypted version of passwords, harder to crack
Patch, and test patches before upgrading all systems.
FAT: File allocation Table
Reconnaissance phase:
The first stage at which hackers look at
Make or break as a security person
Hackers look at companies or business and decide if it is worth it to try and hack in
1st thing in this stage is social engineering
Dumpster Dive: Gather as much info on competition, or person you want to hac

Thursday, May 7, 2009

Internet Secutiry Lesson Four 04 May

In this lesson, the class first went over how to use Angel, a WebCT product of the College. Then we went overr Chapters three through five. Next week we will work though chapter six and a bit of chapter seven.
http://www.counterhack.net/

Friday, May 1, 2009

Internet Secutiry Lesson Three 27 April

In this lesson the class continued to work on the Open Systems Interconnect (OSI) model and its seven layers. This model was created by the International Standards Organization (ISO). The class also looked at Domain Name System servers and DHCP servers and what they do.
http://www.iana.org/