Skip to main content

Posts

Showing posts from September, 2014

Creating a vpn connection with OpenVpn and vpnbook

Creating a vpn connection is now made easy and free by combining openvpn and vpnbook. OpenVPN is an open source software application that implements virtual private network (VPN) techniques for creating secure point-to-point or site-to-site connections in routed or bridged configurations and remote access facilities. It uses a custom security protocol that utilizes SSL/TLS for key exchange. Source: wikipedia Vpnbook Free VPN (Virtual Private Network) server is designed with the latest technologies and most advanced cryptographic techniques to keep you safe on the internet from prying eyes and hackers. Source : vpnbook Download the Euro1 OpenVPN Certificate Bundle, extract to C:\Program Files (x86)\OpenVPN\config or where you \config folder is. Run Opnevpn as admin From the taskbar, connect to one of the servers Go to www.vpnbook.com/freevpn and get a user name and password if you don'y already have one. Note: The password changes weekly bu...

CVE-2014-6271-Bash Vulnerability

An  exploitable remotely vulnerability called Shellshock has been discovered by Stephane Chazelas. This affect bash shell (Bourne again shell) on Linux and Unix Operating system.The vulnerability has the CVE identifier CVE-2014-6271 it affects versions 1.14 through 4.3. This vulnerabilty affects http requests and cgi script and rated  7.5 by access.redhat.com . So get on patching you systems. For more informatin see here .

Converting your webpages to pdf

      Sometime when surfing the internet, you may require that you want to have that page offline.We sometimes save the pages but its hard to have control of alot of saved pages.  For fire fox users, you should just get a plugin called Print page to pdf from here .          All you need to do is to right click on the web page and print active tab. You have the option of printing all the tabs that are currently on the browser.

Getting school project ideas

Get help with the topic you are going to choose for your school project from the following websites. Kashipara.com bebtechmcaprojects.com/ projects.students3k.com/  enggroom.com http://www.webdevelopplus.com/category/php-projects/  

Looking for Similar websites to the one you are visiting.

Sometime you acces some websites and wish to know other sites that is similar to that website you are accessing. There are plenty solutions outhere but the one i make use of very often is similarsites.com . It makes it possible to get similar site easily and free.

Windows and passwords

We all agree that microsoft operating system is the most used through out the world. Some people even have their lives duplicated on the their Personal Computer (PC) (CVs, passwords, Pictures, Bank details e.t.c. ). Password is now an important part of the design of Windows. The problem with password is that one has to remember the words (characters they use) and also we are adviced to use differnt passwords on differnt accounts with the charcters above eight(8) with combination of lower case, Uppercase, numbers and special characters.     With all these, it is still posible to completely bypass and even remove entirely the password used on a windows machine. Two applications i have used that works very well include: 1. Konboot 2. Windows Password Unlocker Enterprise With these applications, windows dont stand the chance. Konboot can bypass and remove passwords and Windows Password Unlocker Enterprise can remove it all together. My recomendation is to turn on you...

Requirements to become a Pentreation Tester (aka hacker)

The term hacking is always seen has a bad term term. The media has succesfully let believe believe that when you say you are a hacker, you are a destroyer of anything technological. Hacking is a term which means the ability to make something to work in an uncommon way. A mechanic who can fix a car with less proffesional tools is a hacker, a doctor(surgeon) who can perform soffisticated surgery is a hacker. So a person who knows how to make computers and technologies in an uncommon way. This makes us all hackers. A penetration test, or the short form pentest, is an attack on a computer system with the intention of finding security weaknesses, potentially gaining access to it, its functionality and data The process involves identifying the target systems and the goal, then reviewing the information available and undertaking available means to attain the goal. A penetration test target may be a white box or black box. A penetration test will advise if a system is vulnerable to ...

Importance of doing updates on a computer and other deices

  With time very new feature on a computer becomes obsolete. You see version 1 of an applcation today and by tomorrow it can be version 2. Changes made to programs are called updates. It can be from a security point of view where bugs and vulnerabilities are fixed or it can be from a design point of view where new looks is to the application and it can also be from the functionality point of view where additional functionalities are added. Sometime a new product entirely with same functionality can be designed.     It is adviced to do updates to the following devices: 1. Operating system ( especially security updates and hotfixs) 2.  Application to get the latest and the greatest functionalities. 3.  Anitivirus and other malware aoolications gets the latest updates for better protection. 4. Some devices already in the market comes with known vulneabilities. Updating those deices will secure those devices. 5. Updating your devices makes you curren...