Using BT4 On VirtualBox  

Tuesday, March 16, 2010

 

Just some quick installation notes for those looking wanting to install the recent Virtualbox release (3.0.4) for Backtrack 4. In case you don't know yet - BT4 is the most top rated linux live distribution focused on penetration testing. The new Debian core (Ubuntu 8.10) makes Backtrack 4 easily extendable.

I'm a huge fan of Backtrack and use it as primary Operating System (HD Installation) on one of my laptops, currently studying for the Offensive Security course "Penetration Testing with BackTrack".

If you are looking for some pointers to get BT4 persistent changes without HD installation, @kriggins "Backtrack 4 USB persistent changes Nessus HowTo" is highly recommended.

Installation

Add the following line to your /etc/apt/sources.list:

deb http://download.virtualbox.org/virtualbox/debian intrepid non-free
Add the following key to your keyring (verify!):

# wget -q http://download.virtualbox.org/virtualbox/debian/sun_vbox.asc -O- | sudo apt-key add -
Update your package cache

# apt-get update
Install Virtualbox packages

# apt-get install virtualbox-3.0
answer the prompt "Should the vboxdrv kernel module be compiled now?" with "Yes"

If it fails, have a look at /var/log/vbox-install.log and re-run /etc/init.d/vboxdrv setup after fixing the problem (usually missing header files, compiler, etc.)

start via "/usr/bin/VirtualBox" (case-sensitive!)
Virtualbox is now ready, have fun!

Note:
Thanks to dkms, the VirtualBox host kernel modules (vboxdrv,
vboxnetflt and vboxnetadp) will be updated automatically if the linux kernel
version changes during the next apt-get upgrade.

source marsmenschen.com

AddThis Social Bookmark Button

Kaspersky Internet Security 2010 Improved Features  

In the areas where it really counts, Kaspersky Internet Security 2010 does a fantastic job at detecting, preventing, and eliminating viruses, spyware, adware, and other malicious software.

We like Kaspersky a lot, and they've consistently been one of the best, most innovative antivirus security software vendor for many years.

Our testing showed excellent results in all areas of security protection with only a couple of areas that could use further revision.

Overall, Kaspersky delivers excellent virus and malware protection, but only average anti-phishing and parental controls, and a less-than-perfect firewall.

IMPROVED FEATURES
• Great Antivirus Protection
• Better Spyware Protection
• Solid Real-time Coverage


Every year brings significant progress from Kaspersky; we hope they'll improve some of their deficiencies this year (and lower the price.) Regardless though, Kaspersky is a terrific Internet Security suite for anyone.

AddThis Social Bookmark Button

HTTP Header 1.1  

Monday, March 1, 2010

Header Field Definitions
This section defines the syntax and semantics of all standard HTTP/1.1 header fields. For entity-header fields, both sender and recipient refer to either the client or the server, depending on who sends and who receives the entity.
Accept

The Accept request-header field can be used to specify certain media types which are acceptable for the response. Accept headers can be used to indicate that the request is specifically limited to a small set of desired types, as in the case of a request for an in-line image.

Accept = "Accept" ":"
#( media-range [ accept-params ] )
media-range = ( "*/*"
| ( type "/" "*" )
| ( type "/" subtype )
) *( ";" parameter )
accept-params = ";" "q" "=" qvalue *( accept-extension )
accept-extension = ";" token [ "=" ( token | quoted-string ) ]

The asterisk "*" character is used to group media types into ranges, with "*/*" indicating all media types and "type/*" indicating all subtypes of that type. The media-range MAY include media type parameters that are applicable to that range.
Each media-range MAY be followed by one or more accept-params, beginning with the "q" parameter for indicating a relative quality factor. The first "q" parameter (if any) separates the media-range parameter(s) from the accept-params. Quality factors allow the user or user agent to indicate the relative degree of preference for that media-range, using the qvalue scale from 0 to 1. The default value is q=1.

Note: Use of the "q" parameter name to separate media type
parameters from Accept extension parameters is due to historical
practice. Although this prevents any media type parameter named
"q" from being used with a media range, such an event is believed
to be unlikely given the lack of any "q" parameters in the IANA
media type registry and the rare usage of any media type
parameters in Accept. Future media types are discouraged from
registering any parameter named "q".

The example

Accept: audio/*; q=0.2, audio/basic

SHOULD be interpreted as "I prefer audio/basic, but send me any audio type if it is the best available after an 80% mark-down in quality."
If no Accept header field is present, then it is assumed that the client accepts all media types. If an Accept header field is present, and if the server cannot send a response which is acceptable according to the combined Accept field value, then the server SHOULD send a 406 (not acceptable) response.
A more elaborate example is

Accept: text/plain; q=0.5, text/html,
text/x-dvi; q=0.8, text/x-c

Verbally, this would be interpreted as "text/html and text/x-c are the preferred media types, but if they do not exist, then send the text/x-dvi entity, and if that does not exist, send the text/plain entity."
Media ranges can be overridden by more specific media ranges or specific media types. If more than one media range applies to a given type, the most specific reference has precedence. For example,

Accept: text/*, text/html, text/html;level=1, */*

have the following precedence:

1) text/html;level=1
2) text/html
3) text/*
4) */*

The media type quality factor associated with a given type is determined by finding the media range with the highest precedence which matches that type. For example,

Accept: text/*;q=0.3, text/html;q=0.7, text/html;level=1,
text/html;level=2;q=0.4, */*;q=0.5

would cause the following values to be associated:

text/html;level=1 = 1
text/html = 0.7
text/plain = 0.3
image/jpeg = 0.5
text/html;level=2 = 0.4
text/html;level=3 = 0.7

Note: A user agent might be provided with a default set of quality
values for certain media ranges. However, unless the user agent is
a closed system which cannot interact with other rendering agents,
this default set ought to be configurable by the user.

Source and keep reading

Download via Ziddu Mirror

AddThis Social Bookmark Button

Intrusion Detection System Tutorial  

An intrusion detection system (IDS) is a device (or application) that monitors network and/or system activities for malicious activities or policy violations.
Intrusion detection is the process of monitoring the events occurring in a computer system or network and analyzing them for signs of possible incidents, which are violations or imminent threats of violation of computer security policies, acceptable use policies, or standard security practices. Intrusion prevention is the process of performing intrusion detection and attempting to stop detected possible incidents. Intrusion detection and prevention systems (IDPS) are primarily focused on identifying possible incidents, logging information about them, attempting to stop them, and reporting them to security administrators. In addition, organizations use IDPSs for other purposes, such as identifying problems with security policies, documenting existing threats, and deterring individuals from violating security policies. IDPSs have become a necessary addition to the security infrastructure of nearly every organization.

IDPSs typically record information related to observed events, notify security administrators of important observed events, and produce reports. Many IDPSs can also respond to a detected threat by attempting to prevent it from succeeding.They use several response techniques, which involve the IDPS stopping the attack itself, changing the security environment (e.g., reconfiguring a firewall), or changing the attack’s content.

Source

AddThis Social Bookmark Button

Design by Amanda @ Blogger Buster