Posts

Showing posts from June, 2017

Note - Hakcing

Hacker     -is someone who likes to tinker with the electronics or computer systems and he is a person, full of...                 creativity         Will to learn         knowledge is power         patience         programming to be an elite hacker Hacker Heirachy         Script kiddies         wanna be hackers         have no hacking skills and use the tools developed by others         no knowledge of what's happening behind the scene     Intermediate Hackers         usually about computers, networks, and enough programning knowledge to understand what a script might do             Elite hackers         skilled hackers         write hacker tools and exploits         break into systems and hide their tracks Low Tech Methods     Social engineering     Shoulder surfing     Guessing High tech methods     Gmail system administrator's automatic responder     Dictionary attacks     Brute force attacks     phishing     Rainbow tables     GX Cookies     ARP Poisoning Ethical Hacking  

Note - Internet and HTTP

Internet     A global systems of interconnected computer networks and tangible network of computers sharing/exchanging information with the help of PROTOCOLS Internet Protocols     -Protocol is a form of etiquette. prescribed guide for conduct or action     -usually specifies:                    -The format of the messages         -How to handle the errors OSI Model Upper Layers         Application - HTTP, FTP, SMTP     Presentation - JPEG, GIF, MPEG     Session - Apple talk, winSock     Lower Layers         Transport - TCP, UDP, SPX     Network - IP, ICMP, IPX (router)     Data Link - Ethernet , ATM (Switch, Bridge)     Physical - Ethernet, Token Ring (hub, repeater) Hyper Text Transfer Protocol     -provides a set of rules and standards that govern how information is transmitted on the World Wide Web     -WWW uses the HTTP to talk with each other     -first part of the URL of a site on the internet, signifying a document written in HTML     -HTTP can

Note - Nmap

Nmap Introduction                - is a security scanner and Network Mapper is a free and opens source utility for network explorations and security audition.           -is used to discover hosts and services on the computer network thus creating a "map" of the network.          - sends specially crafted packets to the target host and then analyzes the response.          -uses raw IP packets in novel ways to determine what hosts are available on the network , what services those services are offering , what operation systems they are running supports all platform of OS like                    -linux                   -Microsoft                   - Mac In nMap, raw IP packets are used. Features     - Host discovery - identify the hosts on the network     - port planning - enumerating the open ports on the target hosts     - version detection - integrating network services on remote devices to determine the application name and the version number

Some on Git

Why use Source Control Systems? what is this?     A tool that helps to keep the different versions of the files and allow multiple users to work on a same code with minimum amount of collisions. why use?    It helps to keep the developing process simple and all the files are hosted. Some basic terminology     git - the shell command to work with git   repo - repository, where the code for a given project is kept   commit - verb, means the push the code to the server ,                    in Git Commit = (commit + push)  diff - the difference between the two versions of a file cat - it shows the content in the file

Networking interview questions

Few Interview questions for students who is intersted in networking can go for the questions .