Showing posts with label closed. Show all posts
Showing posts with label closed. Show all posts

Thursday, 4 February 2016

What Is a Port Scan Attack on a Computer?In Feburary 2016 04,

In Feburary 2016 04,
A linear port scan involves scanning every port on a system. Internet Protocol ports use a 16-bit numbering system, which means a total of 65,536 ports can exist on a single IP address. A liner port scan will scan all of these ports to see which ones are open, closed or hidden.
Random Port Scan
A random port scan is similar in concept to a linear port scan. However, with a random port scan, only a specified number of random ports are scanned instead of all of the available port numbers. The reason for doing this is to speed up the scan, particularly when the attacker is scanning multiple computers in attempt to find vulnerabilities. With a random port scan, if any of the scanned ports are found to be open, the attacker will investigate that computer further.
Well-Known Service Port Scan
Many services run on established 'Well-Known' ports, such as ports 25 and 110 for e-mail, 21 for FTP and 80 for the Internet. A port scan that only targets well-known ports is similar in concept to a random port scan, except the port numbers are predefined instead of random. Like a random port scan, if any of the tested ports are found to be open, the attacker will investigate the computer further.
Reconnaisance
After the specified method of port scanning has completed, the attacker views the results and further investigates those computers containing open ports. When a port is found to be open, it means that some type of service is running on that port, and there's a chance that the attacker can exploit it for the purposes of gaining remote access to the computer system. With a proper access exploit in place, an attacker could potentially gain control of the computer system.
In Feburary 2016 04,

Wednesday, 3 February 2016

How to Build a Website for a School ProjectIn Feburary 2016 03,

In Feburary 2016 03,
Open a text editor. Click 'Start.' Then navigate to 'All Programs' and 'Accessories.' Select 'Notepad.'
Type:
My School Project
This is the first paragraph.
This is the second paragraph.
'
' are the opening tags while '
' are the closing tags. Most tags need to be opened, then closed. For example, all Web pages start with
and close with
. For example 'My School Project' means than you open the '', or heading 1, tag, then write the text of the heading, then close the heading tag.
Save the file as 'index.html.' Remember, however, to specify the 'Save as type' as 'All Files' rather than 'Text Documents' when saving the file.
Register your website for free at any of the free hosting websites that exist on the Web. You can find two such websites in the Resources section of this article. The registration process is easy. After you register, you'll get a username and password to be able to upload your 'index.html' file. When registering, write down the domain name of your website (for example, http://somehost.yourname.com).
Log onto the password-protected area of the hosting website with which you registered. Click 'Upload' and select the 'index.html' file you saved in Step 3.
Go to the domain name that you received when registering your free website (e.g., http://somehost.yourname.com). You should see this: My School Project (large letters)
This is the first paragraph.
This is the second paragraph.
In Feburary 2016 03,

Monday, 1 February 2016

OpenSSH Vs. PuTTYIn Feburary 2016 01,

In Feburary 2016 01,
Secure Shell protocol was invented by the SSH Communications Security company to address the security problems inherent in remote connections between computers. SSH uses public-key encryption to encrypt messages against hacker interception. This hides data when it is in-transit between computers, meaning that files and user commands sent through the SSH channel are encrypted and protected until they reach their destination.
OpenSSH
SSH was originally free, but eventually the licensing for the code was closed as the SSH technology was moved into a corporate setting through more restrictive licensing. However, developers 'forked,' or split, the free code remaining in SSH -- the 1.2.12 release -- and created the openSSH project. The project was then made part of the OpenBSD operating system, itself a free fork of the Unix operating system that had also undergone more restrictive license.
PuTTY
Some licensing schemes limited the use of openSSH to non-Windows operating systems. PuTTY acts as a terminal emulator for networked connections between computers. Typically, Windows computers do not have the capability to connect to SSH servers from the terminal. PuTTY mimics the Unix command terminal, and through a Wizard Interface allows users to create network sessions to other computers through various connection protocols.
Usage
OpenSSH is implemented across multiple platforms, including Linux and Mac operating systems. These implementations allow users to create SSH servers to receive and create connections to other SSH servers. PuTTY presents only a graphical client for Windows and Linux users to create quick connections over multiple protocols, such as SSH and Telnet. OpenSSH also runs from the command line natively, while PuTTY provides a Graphical User Interface, or GUI, with options to store sessions and modify connection settings.
In Feburary 2016 01,