Jumat, 27 September 2013

Create Wi-Fi HotSpot in Wndows 8 (Ad-Hoc Network)

  1 komentar
2013 - Hallo sahabat Fx008z | Official Blogger, Pada Artikel yang anda baca kali ini dengan judul 2013, kami telah mempersiapkan artikel ini dengan baik untuk anda baca dan ambil informasi didalamnya. mudah-mudahan isi postingan Artikel Internet, Artikel Operating System, Artikel Tricks and Tips, Artikel Tutorial, Artikel Windows 8, yang kami tulis ini dapat anda pahami. baiklah, selamat membaca.

Judul : Create Wi-Fi HotSpot in Wndows 8 (Ad-Hoc Network)
link : Create Wi-Fi HotSpot in Wndows 8 (Ad-Hoc Network)

Baca juga


2013

Hello GreenHackerz Readers..
This Article is about to create Wi-Fi Hotspot in Windows 8 is not new but may be useful who want to create their laptop as a Wi-Fi Hotspot w/o third party tool. So Let's Start ....

Apart from Start Orb and classic Start Menu, what most Windows 7 users, who decided to take Windows 8 for a spin, miss in Windows 8 is ability to create ad-hoc network. If you’re a power users, you might’ve noticed that Windows 8 doesn’t include an option to create and setup ad hoc network connection to share files and internet with Wi-Fi enabled computers and devices. Windows 7 ad hoc connection feature does nothing except creating a shared connection with separate IP address to register the device on the virtual network. This allows users to use router’s default or specified DNS server address to easily connect to internet. Even though Windows 8 comes with ICS (Internet Connection Sharing) feature to allow devices  to connect to yours PC internet connection, it doesn’t allow creating a wireless network connection to share the internet. In this post, we will look at some tools that let you easily create and manage ad-hoc connections in Windows 8.



Using Windows Netsh Utility

The Network Shell (netsh) utility is basically developed to let users configure network devices in


Now, first you need to check weather your network interface supports virtualization or not. Simply, run the following command to view Hosted network supported status.
netsh wlan show drivers



In case, it says No, you will need to update your both client and server editions of Windows. The support for configuring WLAN using netsh was first introduced in Windows Vista, and it’s now available in Windows Server 2008, Windows 7 and Windows 8. Using netsh wlan command, one can easily use hosted network (virtualization) feature to create a virtual wireless connection. The Hosted Network is WLAN feature, which is designed to implement virtualization of physical network adapter. Since it plays a vital role in creating a virtual wireless adapter, it’s used by a majority of virtual Wi-Fi hotspot applications, such as Virtual WiFi Router, MyPublicWiFi, Marfi etc. So, if your NIC supports wireless hostednetwork / virtualization feature, then you can create an ad hoc wireless connection and turn your PC into Wi-Fi hotspot.
As stated earlier, both Windows 7 and Windows 8 natively support configuring ad hoc wireless connection using the netsh commands. In order to create an ad hoc connection in Windows 8 using netsh utility, run CMD with administrative privileges’; just type cmd on Start Screen, right-click it and select Run as administrator.

network adapter’s driver. If your NIC supports virtualization, you’re good to go. Now,
enter the following commands to configure an ad hoc wireless connection.
netsh wlan set hostednetwork mode=allow ssid=<network name> key=<passkey>


Once the hosted network has been set to allow, you need to start the mode to create an ad hoc connection. Just enter the command below.
netsh wlan start hostednetwork


If it says “hosted network couldn’t started”, you need to disable current wireless network device and then enable it. You may also need to refresh network adapter list from Device Manger to install a virtual network device driver.
When the hosted network is started, enable ICS for newly created Wi-Fi connection, so that you can share your internet connection with others. In order to enable ICS feature, head over to Network and Internet –> Network Connections, and open Properties dialog of network device (which is connected to internet). Now, open Sharing tab, enable Allow other network users to connect through this computer’s Internet connection, and then choose the newly created ad hoc connection from the list. In our case, it’s Wi-Fi 2, as shown in the screenshot below.



Once the internet connection is shared, check the IP address assigned to newly created ad hoc connection from TCP/IPv4 Properties. If it doesn’t assign IP address, then run netsh wlan start hostednetwork command in CMD.


After following the above steps, you will be able to connect Wi-Fi enabled devices with your Windows 8 PC.

Enjoy Wi-Fi HotSpot In Windows 8... :)


Hello GreenHackerz Readers..
This Article is about to create Wi-Fi Hotspot in Windows 8 is not new but may be useful who want to create their laptop as a Wi-Fi Hotspot w/o third party tool. So Let's Start ....

Apart from Start Orb and classic Start Menu, what most Windows 7 users, who decided to take Windows 8 for a spin, miss in Windows 8 is ability to create ad-hoc network. If you’re a power users, you might’ve noticed that Windows 8 doesn’t include an option to create and setup ad hoc network connection to share files and internet with Wi-Fi enabled computers and devices. Windows 7 ad hoc connection feature does nothing except creating a shared connection with separate IP address to register the device on the virtual network. This allows users to use router’s default or specified DNS server address to easily connect to internet. Even though Windows 8 comes with ICS (Internet Connection Sharing) feature to allow devices  to connect to yours PC internet connection, it doesn’t allow creating a wireless network connection to share the internet. In this post, we will look at some tools that let you easily create and manage ad-hoc connections in Windows 8.



Using Windows Netsh Utility

The Network Shell (netsh) utility is basically developed to let users configure network devices in


Now, first you need to check weather your network interface supports virtualization or not. Simply, run the following command to view Hosted network supported status.
netsh wlan show drivers



In case, it says No, you will need to update your both client and server editions of Windows. The support for configuring WLAN using netsh was first introduced in Windows Vista, and it’s now available in Windows Server 2008, Windows 7 and Windows 8. Using netsh wlan command, one can easily use hosted network (virtualization) feature to create a virtual wireless connection. The Hosted Network is WLAN feature, which is designed to implement virtualization of physical network adapter. Since it plays a vital role in creating a virtual wireless adapter, it’s used by a majority of virtual Wi-Fi hotspot applications, such as Virtual WiFi Router, MyPublicWiFi, Marfi etc. So, if your NIC supports wireless hostednetwork / virtualization feature, then you can create an ad hoc wireless connection and turn your PC into Wi-Fi hotspot.
As stated earlier, both Windows 7 and Windows 8 natively support configuring ad hoc wireless connection using the netsh commands. In order to create an ad hoc connection in Windows 8 using netsh utility, run CMD with administrative privileges’; just type cmd on Start Screen, right-click it and select Run as administrator.

network adapter’s driver. If your NIC supports virtualization, you’re good to go. Now,
enter the following commands to configure an ad hoc wireless connection.
netsh wlan set hostednetwork mode=allow ssid=<network name> key=<passkey>


Once the hosted network has been set to allow, you need to start the mode to create an ad hoc connection. Just enter the command below.
netsh wlan start hostednetwork


If it says “hosted network couldn’t started”, you need to disable current wireless network device and then enable it. You may also need to refresh network adapter list from Device Manger to install a virtual network device driver.
When the hosted network is started, enable ICS for newly created Wi-Fi connection, so that you can share your internet connection with others. In order to enable ICS feature, head over to Network and Internet –> Network Connections, and open Properties dialog of network device (which is connected to internet). Now, open Sharing tab, enable Allow other network users to connect through this computer’s Internet connection, and then choose the newly created ad hoc connection from the list. In our case, it’s Wi-Fi 2, as shown in the screenshot below.



Once the internet connection is shared, check the IP address assigned to newly created ad hoc connection from TCP/IPv4 Properties. If it doesn’t assign IP address, then run netsh wlan start hostednetwork command in CMD.


After following the above steps, you will be able to connect Wi-Fi enabled devices with your Windows 8 PC.

Enjoy Wi-Fi HotSpot In Windows 8... :)


Selasa, 24 September 2013

DNS HiJacking ( Introduction )

  Tidak ada komentar
2013 - Hallo sahabat Fx008z | Official Blogger, Pada Artikel yang anda baca kali ini dengan judul 2013, kami telah mempersiapkan artikel ini dengan baik untuk anda baca dan ambil informasi didalamnya. mudah-mudahan isi postingan Artikel Hacking, Artikel Internet, Artikel Malware, Artikel Phishing, Artikel RAT, Artikel Social Engineering, Artikel Tricks and Tips, Artikel Tutorial, Artikel Virus Infection, yang kami tulis ini dapat anda pahami. baiklah, selamat membaca.

Judul : DNS HiJacking ( Introduction )
link : DNS HiJacking ( Introduction )

Baca juga


2013

Hello GreenHackerz Readers...

DNS hijacking (sometimes referred to as DNS redirection) is a type of malicious attack that overrides a computer’s TCP/IP settings to point it at a rogue DNS server, thereby invalidating the default DNS settings. In other words, when an attacker takes control of a computer to alter its DNS settings, so that it now points to a rogue DNS server, the process is referred to as DNS hijacking.

As we all know, the “Domain Name System (DNS)” is mainly responsible for translating a user friendly domain name such as “google.com” to its corresponding IP address “74.125.235.46″. Having a clear idea of DNS and its working can help you better understand what DNS hijacking is all about.


How DNS Hijacking Works?

As mentioned before, DNS is the one that is responsible for mapping the user friendly domain names to their corresponding IP addresses. This DNS server is owned and maintained by your Internet service provider (ISP) and many other private business organizations. By default, your computer is configured to use the DNS server from the ISP. In some cases, your computer may even be using the DNS services of other reputed organizations such as Google. In this case, you are said to be safe and everything seems to work normally.




But, imagine a situation where a hacker or a malware program gains unauthorized access to your computer and changes the DNS settings, so that your computer now uses one of the rogue DNS servers that is owned and maintained by the hacker. When this happens, the rogue DNS server may translate domain names of desirable websites (such as banks, search engines, social networking sites etc.) to IP addresses of malicious websites. As a result, when you type the URL of a website in the address bar, you may be taken to a fake website instead of the one you are intending for. Sometimes, this can put you in deep trouble!


What are the Dangers of DNS Hijacking?

The dangers of DNS hijacking can vary and depend on the intention behind the attack. Many ISPs such as “OpenDNS” and “Comcast” use DNS hijacking for introducing advertisements or collecting statistics. Even though this can cause no serious damage to the users, it is considered as a violation of RFC standards for DNS responses.

Other dangers of DNS hijacking include the following attacks:

Pharming: This is a kind of attack where a website’s traffic is redirected to another website that is a fake one. For example, when a user tries to visit a social networking website such as Facebook.com he may be redirected to another website that is filled with pop-ups and advertisements. This is often done by hackers in order to generate advertising revenue.
Phishing: This is a kind of attack where users are redirected to a malicious website whose design (look and feel) matches exactly with that of the original one. For example, when a user tries to log in to his bank account, he may be redirected to a malicious website that steals his login details.


How to Prevent DNS Hijacking?

In most cases, attackers make use of malware programs such as a trojan horse to carry out DNS hijacking. These DNS hijacking trojans are often distributed as video and audio codecs, video downloaders, YoTube downloaders or as other free utilities. So, in order to stay protected, it is recommended to stay away from untrusted websites that offer free downloads. The DNSChanger trojan is an example of one such malware that hijacked the DNS settings of over 4 million computers to drive a profit of about 14 million USD through fraudulent advertising revenue.
Also, it is necessary to change the default password of your router, so that it would not be possible for the attacker to modify your router settings using the default password that came with the factory setting. For more details on this topic you can read my other post on How to Hack Ethernet ADSL Router.
Installing a good antivirus program and keeping it up-to-date can offer a great deal of protection to your computer against any such attacks.


What if you are already a victim of DNS hijacking?

If you suspect that your computer is infected with a malware program such as DNSChanger, you need not panic. It is fairly simple and easy to recover from the damage caused by such programs. All you have to do is, just verify your current DNS settings to make sure that you are not using any of those DNS IPs that are blacklisted. Otherwise re-configure your DNS settings as per the guidelines of your ISP.

Hello GreenHackerz Readers...

DNS hijacking (sometimes referred to as DNS redirection) is a type of malicious attack that overrides a computer’s TCP/IP settings to point it at a rogue DNS server, thereby invalidating the default DNS settings. In other words, when an attacker takes control of a computer to alter its DNS settings, so that it now points to a rogue DNS server, the process is referred to as DNS hijacking.

As we all know, the “Domain Name System (DNS)” is mainly responsible for translating a user friendly domain name such as “google.com” to its corresponding IP address “74.125.235.46″. Having a clear idea of DNS and its working can help you better understand what DNS hijacking is all about.


How DNS Hijacking Works?

As mentioned before, DNS is the one that is responsible for mapping the user friendly domain names to their corresponding IP addresses. This DNS server is owned and maintained by your Internet service provider (ISP) and many other private business organizations. By default, your computer is configured to use the DNS server from the ISP. In some cases, your computer may even be using the DNS services of other reputed organizations such as Google. In this case, you are said to be safe and everything seems to work normally.




But, imagine a situation where a hacker or a malware program gains unauthorized access to your computer and changes the DNS settings, so that your computer now uses one of the rogue DNS servers that is owned and maintained by the hacker. When this happens, the rogue DNS server may translate domain names of desirable websites (such as banks, search engines, social networking sites etc.) to IP addresses of malicious websites. As a result, when you type the URL of a website in the address bar, you may be taken to a fake website instead of the one you are intending for. Sometimes, this can put you in deep trouble!


What are the Dangers of DNS Hijacking?

The dangers of DNS hijacking can vary and depend on the intention behind the attack. Many ISPs such as “OpenDNS” and “Comcast” use DNS hijacking for introducing advertisements or collecting statistics. Even though this can cause no serious damage to the users, it is considered as a violation of RFC standards for DNS responses.

Other dangers of DNS hijacking include the following attacks:

Pharming: This is a kind of attack where a website’s traffic is redirected to another website that is a fake one. For example, when a user tries to visit a social networking website such as Facebook.com he may be redirected to another website that is filled with pop-ups and advertisements. This is often done by hackers in order to generate advertising revenue.
Phishing: This is a kind of attack where users are redirected to a malicious website whose design (look and feel) matches exactly with that of the original one. For example, when a user tries to log in to his bank account, he may be redirected to a malicious website that steals his login details.


How to Prevent DNS Hijacking?

In most cases, attackers make use of malware programs such as a trojan horse to carry out DNS hijacking. These DNS hijacking trojans are often distributed as video and audio codecs, video downloaders, YoTube downloaders or as other free utilities. So, in order to stay protected, it is recommended to stay away from untrusted websites that offer free downloads. The DNSChanger trojan is an example of one such malware that hijacked the DNS settings of over 4 million computers to drive a profit of about 14 million USD through fraudulent advertising revenue.
Also, it is necessary to change the default password of your router, so that it would not be possible for the attacker to modify your router settings using the default password that came with the factory setting. For more details on this topic you can read my other post on How to Hack Ethernet ADSL Router.
Installing a good antivirus program and keeping it up-to-date can offer a great deal of protection to your computer against any such attacks.


What if you are already a victim of DNS hijacking?

If you suspect that your computer is infected with a malware program such as DNSChanger, you need not panic. It is fairly simple and easy to recover from the damage caused by such programs. All you have to do is, just verify your current DNS settings to make sure that you are not using any of those DNS IPs that are blacklisted. Otherwise re-configure your DNS settings as per the guidelines of your ISP.

Sabtu, 13 Juli 2013

Superman Memory Crystal: 5D Nano-Glass to Preserve Data for Million Years

  Tidak ada komentar
2013 - Hallo sahabat Fx008z | Official Blogger, Pada Artikel yang anda baca kali ini dengan judul 2013, kami telah mempersiapkan artikel ini dengan baik untuk anda baca dan ambil informasi didalamnya. mudah-mudahan isi postingan Artikel Internet, Artikel News, Artikel Tutorial, yang kami tulis ini dapat anda pahami. baiklah, selamat membaca.

Judul : Superman Memory Crystal: 5D Nano-Glass to Preserve Data for Million Years
link : Superman Memory Crystal: 5D Nano-Glass to Preserve Data for Million Years

Baca juga


2013

A research group in Britain has recorded data into a crystal of nanostructured glass. This future storage with practically unlimited lifetime and capacity exceeding Blu-Ray’s by 2,800 times might save civilization’s data for aliens if humankind is gone.



A group of scientists from University of Southampton has developed a ‘five-dimensional’ optical memory, having experimentally proven a possibility of recording data into nanostructured glass using a high speed (femtosecond) laser, which creates self-assembled nanostructures in fused quartz.
The creators of 5D memory has dubbed their invention ‘Superman memory crystal’, following the ‘memory crystals’ used in a number of movies featuring the superhero.
The method is called 5D because in addition to the three dimensional position of these nanostructures their refraction and polarization characteristics work as two additional parameters.
The newly-developed storage promises unprecedented data capacity of 360 Terabyte for a DVD-sized disc. The maximum capacity of a latest generation quad-layer Blu-Ray DVD is “only” 128 Gigabytes. The largest heat-assisted magnetic recording hard drive (HAMR), yet to be commercially produced, will have about 20 terabytes per disc.
Glass storage could preserve data for millions of years whereas a DVD guarantees only about seven years of faultless playback.
The nanostructured glass remains stable if exposed to temperatures up to 1,000°C.
“We are developing a very stable and safe form of portable memory using glass, which could be highly useful for organizations with big archives. At the moment companies have to back up their archives every five to ten years because hard-drive memory has a relatively short lifespan,” said the head of the project Jingyu Zhang, pointing out that museums and national archives with their huge numbers of documents are going to be the first to benefit.
A joint project of University of Southampton’s Optoelectronics Research Centre (ORC) and Eindhoven University of Technology has presented ‘5D Data Storage by Ultrafast Laser Nanostructuring in Glass’ report at the Conference on Lasers and Electro-Optics (CLEO’13) in San Jose, California.
The ORC’s physical optoelectronics group supervisor Prof. Peter G. Kazansky, follower of the Nobel Prize laureate for the invention of laser, Aleksandr Prokhorov, shared that “It is thrilling to think that we have created the first document which will likely survive the human race. This technology can secure the last evidence of civilization: all we’ve learnt will not be forgotten.”



Technology similar to polarized sunglasses

Technically speaking, the process appears as follows. A femtosecond laser that produces extremely short (280 femtoseconds – or 280 quadrillionths of a second) and intense pulses of light encrypts data file into layers of nanostructured dots inside a quartz glass. The layers are placed very close, with mere five micrometers (one millionth of a meter) between them. 
These light impulses modify polarization and refraction of self-assembled dots as the light travels through the glass, somehow similar to the principle used in polarized sunglasses. Later the information encoded in dots’ 5D parameters can be read using an laser scanning device similar to the one used to read CD, DVD and Blu-ray discs and an optical microscope capable of untangling the polarized light reflected by the three-bit spots.
So far there is no talk about re-writing glass discs so they are going to be write-once-read-many (WORM).
Unlike modern DVD and Blu-Ray disks which record data on up to four layers, the 5D data storage will have hundreds of layers (around 400 layers for standard 1.2 mm CD), but will be made of glass instead of plastic encasing metal spraying with data.
So far the developers reported of a successful recording and reading of a 300kb text file on three layers of glass, but this is regarded only as a technological demonstration of this ground-breaking new technology with a very bright future.


Source:http://rt.com/news/5d-nanostructured-glass-optical-memory-941

 

A research group in Britain has recorded data into a crystal of nanostructured glass. This future storage with practically unlimited lifetime and capacity exceeding Blu-Ray’s by 2,800 times might save civilization’s data for aliens if humankind is gone.



A group of scientists from University of Southampton has developed a ‘five-dimensional’ optical memory, having experimentally proven a possibility of recording data into nanostructured glass using a high speed (femtosecond) laser, which creates self-assembled nanostructures in fused quartz.
The creators of 5D memory has dubbed their invention ‘Superman memory crystal’, following the ‘memory crystals’ used in a number of movies featuring the superhero.
The method is called 5D because in addition to the three dimensional position of these nanostructures their refraction and polarization characteristics work as two additional parameters.
The newly-developed storage promises unprecedented data capacity of 360 Terabyte for a DVD-sized disc. The maximum capacity of a latest generation quad-layer Blu-Ray DVD is “only” 128 Gigabytes. The largest heat-assisted magnetic recording hard drive (HAMR), yet to be commercially produced, will have about 20 terabytes per disc.
Glass storage could preserve data for millions of years whereas a DVD guarantees only about seven years of faultless playback.
The nanostructured glass remains stable if exposed to temperatures up to 1,000°C.
“We are developing a very stable and safe form of portable memory using glass, which could be highly useful for organizations with big archives. At the moment companies have to back up their archives every five to ten years because hard-drive memory has a relatively short lifespan,” said the head of the project Jingyu Zhang, pointing out that museums and national archives with their huge numbers of documents are going to be the first to benefit.
A joint project of University of Southampton’s Optoelectronics Research Centre (ORC) and Eindhoven University of Technology has presented ‘5D Data Storage by Ultrafast Laser Nanostructuring in Glass’ report at the Conference on Lasers and Electro-Optics (CLEO’13) in San Jose, California.
The ORC’s physical optoelectronics group supervisor Prof. Peter G. Kazansky, follower of the Nobel Prize laureate for the invention of laser, Aleksandr Prokhorov, shared that “It is thrilling to think that we have created the first document which will likely survive the human race. This technology can secure the last evidence of civilization: all we’ve learnt will not be forgotten.”



Technology similar to polarized sunglasses

Technically speaking, the process appears as follows. A femtosecond laser that produces extremely short (280 femtoseconds – or 280 quadrillionths of a second) and intense pulses of light encrypts data file into layers of nanostructured dots inside a quartz glass. The layers are placed very close, with mere five micrometers (one millionth of a meter) between them. 
These light impulses modify polarization and refraction of self-assembled dots as the light travels through the glass, somehow similar to the principle used in polarized sunglasses. Later the information encoded in dots’ 5D parameters can be read using an laser scanning device similar to the one used to read CD, DVD and Blu-ray discs and an optical microscope capable of untangling the polarized light reflected by the three-bit spots.
So far there is no talk about re-writing glass discs so they are going to be write-once-read-many (WORM).
Unlike modern DVD and Blu-Ray disks which record data on up to four layers, the 5D data storage will have hundreds of layers (around 400 layers for standard 1.2 mm CD), but will be made of glass instead of plastic encasing metal spraying with data.
So far the developers reported of a successful recording and reading of a 300kb text file on three layers of glass, but this is regarded only as a technological demonstration of this ground-breaking new technology with a very bright future.


Source:http://rt.com/news/5d-nanostructured-glass-optical-memory-941

 

Kamis, 13 Juni 2013

Install Android 4.0 on virtual box

  Tidak ada komentar
2013 - Hallo sahabat Fx008z | Official Blogger, Pada Artikel yang anda baca kali ini dengan judul 2013, kami telah mempersiapkan artikel ini dengan baik untuk anda baca dan ambil informasi didalamnya. mudah-mudahan isi postingan Artikel Android, Artikel Tricks and Tips, Artikel Tutorial, yang kami tulis ini dapat anda pahami. baiklah, selamat membaca.

Judul : Install Android 4.0 on virtual box
link : Install Android 4.0 on virtual box

Baca juga


2013



Hello GreenHackerz Readers.....................

The mobile smartphone and tablet industry seems to have a very prominent divide, with a lot of consumers having their favorite operating system and choosing to stick to hardware which is powered by their chosen OS. Obviously fans of Apple’s iOS use the iPhone and iPad devices, whereas Android lovers have a wide range of hardware to choose from due to the fact that the OS is available to multiple manufacturers.But what happens if you are a die hard fan of iOS, or Windows Phone but you still want to sample the delights that Android Ice Cream Sandwich has to offer? After recently getting my first taste of Android, I am severely tempted to shell out for a second device so I can have the benefits that both provide. For those that can’t, or won’t, purchase a second device then why not run Android 4.0 in virtualization on your desktop or laptop in order to see the Ice Cream Sandwich experience first hand? Android 4.0 is an operating system in its own right, but instead of running on a dual boot setup, we install and run ICS within a free of charge virtualization application known as VirtualBox. VirtualBox runs like any other application or program on your machine, but offers the benefits of being able to install a secondary OS within it which can be invoked quickly by the user. For all those die hard iOS and Windows Phone fans out there, this is a perfect way to experience the delights of Android.

Are you ready for a whirlwind journey down Ice Cream Sandwich lane? Buckle in and follow the simple steps below.

1. Head over to the official Oracle VM VirtualBox site and download the relevant VirtualBox binary for your computers operating system (Windows/Mac OS X/Linux/Solaris).

2. Find the saved location of the downloaded VirtualBox binary and install as you would with any other native application making sure to follow all on screen prompts and instructions.

3. Head on over to the VMLite website and download a copy of the Ice Cream Sandwich which has been preconfigured for virtualization and features seamless mouse support for navigation. The download weighs in at 89MB in size so may take a while to download depending on your connection.

4. Locate the downloaded "VMLite-Android-v4.0.4"file and extract the contents from within.

5. Once the VMLite-Android-v4.0.4 file has been opened, locate a file from within the archive called ‘VMLite-Android-v4.0.4.vbox‘ which as you can tell by the file extension is a pre configured VirtualBox file.


 6. Double click on the VMLite-Android-v4.0.4.vbox file which will load the VirtualBox application and boot up the ICS file.



7. When the boot menu is presented in VirtualBox, press ‘start‘ on the top toolbar and then if required select the ‘Android Startup from /dev/sda‘ option.


8. All steps are complete. Android 4.0 ICS should now be booting up allowing you to enjoy that Android goodness.



Windows and Linux users may find that an alternative, specific version Android 4.0 may be required, which can be found by visting the Android-x86 page. The performance of the Android ICS virtual installation will obviously not be as smooth as intended on an actual device built for purpose, but it does give a feel of the OS with apps being able to launch as well as widget customization.


I hope you all learned & enjoyed the article on installing android in virtual box
.

espérons qu'il vous plaira.
Enjoy the article.



Hello GreenHackerz Readers.....................

The mobile smartphone and tablet industry seems to have a very prominent divide, with a lot of consumers having their favorite operating system and choosing to stick to hardware which is powered by their chosen OS. Obviously fans of Apple’s iOS use the iPhone and iPad devices, whereas Android lovers have a wide range of hardware to choose from due to the fact that the OS is available to multiple manufacturers.But what happens if you are a die hard fan of iOS, or Windows Phone but you still want to sample the delights that Android Ice Cream Sandwich has to offer? After recently getting my first taste of Android, I am severely tempted to shell out for a second device so I can have the benefits that both provide. For those that can’t, or won’t, purchase a second device then why not run Android 4.0 in virtualization on your desktop or laptop in order to see the Ice Cream Sandwich experience first hand? Android 4.0 is an operating system in its own right, but instead of running on a dual boot setup, we install and run ICS within a free of charge virtualization application known as VirtualBox. VirtualBox runs like any other application or program on your machine, but offers the benefits of being able to install a secondary OS within it which can be invoked quickly by the user. For all those die hard iOS and Windows Phone fans out there, this is a perfect way to experience the delights of Android.

Are you ready for a whirlwind journey down Ice Cream Sandwich lane? Buckle in and follow the simple steps below.

1. Head over to the official Oracle VM VirtualBox site and download the relevant VirtualBox binary for your computers operating system (Windows/Mac OS X/Linux/Solaris).

2. Find the saved location of the downloaded VirtualBox binary and install as you would with any other native application making sure to follow all on screen prompts and instructions.

3. Head on over to the VMLite website and download a copy of the Ice Cream Sandwich which has been preconfigured for virtualization and features seamless mouse support for navigation. The download weighs in at 89MB in size so may take a while to download depending on your connection.

4. Locate the downloaded "VMLite-Android-v4.0.4"file and extract the contents from within.

5. Once the VMLite-Android-v4.0.4 file has been opened, locate a file from within the archive called ‘VMLite-Android-v4.0.4.vbox‘ which as you can tell by the file extension is a pre configured VirtualBox file.


 6. Double click on the VMLite-Android-v4.0.4.vbox file which will load the VirtualBox application and boot up the ICS file.



7. When the boot menu is presented in VirtualBox, press ‘start‘ on the top toolbar and then if required select the ‘Android Startup from /dev/sda‘ option.


8. All steps are complete. Android 4.0 ICS should now be booting up allowing you to enjoy that Android goodness.



Windows and Linux users may find that an alternative, specific version Android 4.0 may be required, which can be found by visting the Android-x86 page. The performance of the Android ICS virtual installation will obviously not be as smooth as intended on an actual device built for purpose, but it does give a feel of the OS with apps being able to launch as well as widget customization.


I hope you all learned & enjoyed the article on installing android in virtual box
.

espérons qu'il vous plaira.
Enjoy the article.

Rabu, 27 Februari 2013

Apply Proxy Settings System Wide In Linux Box

  1 komentar
2013 - Hallo sahabat Fx008z | Official Blogger, Pada Artikel yang anda baca kali ini dengan judul 2013, kami telah mempersiapkan artikel ini dengan baik untuk anda baca dan ambil informasi didalamnya. mudah-mudahan isi postingan Artikel Hacking, Artikel Linux, Artikel Tricks and Tips, Artikel Tutorial, Artikel Unix, yang kami tulis ini dapat anda pahami. baiklah, selamat membaca.

Judul : Apply Proxy Settings System Wide In Linux Box
link : Apply Proxy Settings System Wide In Linux Box

Baca juga


2013

 

Hello GreenHackerz Readers......... 

This article is about the "Proxy Tunneling" in Linux and where it is necessary to use proxy tunneling.
First of all we talk about : What is Proxy and Proxy Tunneling?

PROXY SERVER:-
In computer networks, a proxy server is a server (a computer system or an application) that acts as an intermediary for requests from clients seeking resources from other servers. A client connects to the proxy server, requesting some service, such as a file, connection, web page, or other resource available from a different server and the proxy server evaluates the request as a way to simplify and control its complexity. Today, most proxies are web proxies, facilitating access to content on the World Wide Web.

A proxy server has a variety of potential purposes, including: 

1. To keep machines behind it anonymous, mainly for security.
2. To speed up access to resources (using caching). Web proxies are commonly used
     to cache web pages from a web server.
3. To prevent downloading the same content multiple times (and save bandwidth).
4. To log / audit usage, e.g. to provide company employee Internet usage reporting.
5. To scan transmitted content for malware before delivery.
6. To scan outbound content, e.g., for data loss prevention.
7. Access enhancement/restriction:
    * To apply access policy to network services or content, e.g. to block undesired sites.
    * To access sites prohibited or filtered by your ISP or institution.
    * To bypass security / parental controls.
    * To circumvent Internet filtering to access content otherwise blocked by governments.
    * To allow a web site to make web requests to externally hosted
        resources (e.g. images, music files, etc.) when cross-domain restrictions 
        prohibit the web site from linking directly to the outside domains.
    * To allow the browser to make web requests to externally hosted content on  
       behalf of a website when cross-domain restrictions (in place to protect 
       websites from the likes of data theft) prohibit the browser from directly   
       accessing the outside domains. 

PROXY TUNNEL:-
Proxy Tunnel is a program that connects stdin and stdout to a server somewhere on the network, through a standard HTTPS proxy. We mostly use it to tunnel SSH sessions through HTTP(S) proxies, allowing us to do many things that wouldn't be possible without ProxyTunnel.

Proxy tunnel can currently do the following:
> Create tunnels using HTTP and HTTPS proxies (That understand the 
    HTTP CONNECT command).
> Work as a back-end driver for an OpenSSH client, and create SSH connections
    through HTTP(S) proxies.
> Work as a stand-alone application, listening on a port for connections, and then
    tunneling these connections to a specified destination.

If you want to make effective use of ProxyTunnel, the proxy server you are going to be tunneling through must adhere to some requirements.

1) Must support HTTP CONNECT command.
2) Must allow you to connect to destination machine and host, with or without
    HTTP proxy authentication.

Bypassing Proxy server in Linux client.

Now, as we understood what is proxy and Proxy tunnel, Let's see where it is needed and how to overcome in linux box.

In school, colleges, and Industries, most of the time internet connection are diverted through proxy server, so its critical task to bypass proxy for all those applications who does not have the facility to configure proxy setting.

So, the below technique force individual applications to use proxies, even if the applications themselves don't support proxies.

For that you need to locate and modify two files namely bash.bashrc and apt.conf . Both these files are located in the directory /root/etc

For bash.bashrc, enter the following command in your terminal

gedit /etc/bash.bashrc

This will open the file bash.bashrc in gedit. Scroll down straight to the bottom and add the following lines in the file:

export http_proxy="http://username:password@proxyIP:port"
export ftp_proxy="ftp://username:password@proxyIP:port"
export https_proxy="https://username:password@proxyIP:port"
export socks_proxy="https://username:password@proxyIP:port"

The final file should look something like this then

 

Replace proxyIP and port with your Proxy IP address and port number respectively, and replace the username and password with your authentication username and password respectively. In case there's no need of authentication, just write the part which follows the @ symbol and leave the rest.

Now you need to modify the apt.conf file similarly. You might need to create the file if it's not already there. But gedit will take care of that anyway and create the file for you if it doesn't exist already. So you can just enter the following command in your terminal.

gedit /etc/apt/apt.conf

Now this will be an empty file, so write the following inside it

Acquire::http::proxy "http://username:password@proxyIP:port/";
Acquire::ftp::proxy "ftp://username:password@proxyIP:port/";
Acquire::https::proxy "https://username:password@proxyIP:port/";
Acquire::socks::proxy "https://username:password@proxyIP:port/";

The final file should look something like this then

 
That's all. Save and close the file. Log out and Login to activate the new settings and all your applications shall connect to the internet perfectly now.

Note that we could do this from the network proxy tool too and use 'Apply System Wide' but that is a little buggy with authentication. Since we're working on Linux, this is something you should be knowing anyway!

I hope you all learned & enjoyed the article on Apply Proxy Settings System Wide in Linux.
espérons qu'il vous plaira.
Enjoy the article.

 

Hello GreenHackerz Readers......... 

This article is about the "Proxy Tunneling" in Linux and where it is necessary to use proxy tunneling.
First of all we talk about : What is Proxy and Proxy Tunneling?

PROXY SERVER:-
In computer networks, a proxy server is a server (a computer system or an application) that acts as an intermediary for requests from clients seeking resources from other servers. A client connects to the proxy server, requesting some service, such as a file, connection, web page, or other resource available from a different server and the proxy server evaluates the request as a way to simplify and control its complexity. Today, most proxies are web proxies, facilitating access to content on the World Wide Web.

A proxy server has a variety of potential purposes, including: 

1. To keep machines behind it anonymous, mainly for security.
2. To speed up access to resources (using caching). Web proxies are commonly used
     to cache web pages from a web server.
3. To prevent downloading the same content multiple times (and save bandwidth).
4. To log / audit usage, e.g. to provide company employee Internet usage reporting.
5. To scan transmitted content for malware before delivery.
6. To scan outbound content, e.g., for data loss prevention.
7. Access enhancement/restriction:
    * To apply access policy to network services or content, e.g. to block undesired sites.
    * To access sites prohibited or filtered by your ISP or institution.
    * To bypass security / parental controls.
    * To circumvent Internet filtering to access content otherwise blocked by governments.
    * To allow a web site to make web requests to externally hosted
        resources (e.g. images, music files, etc.) when cross-domain restrictions 
        prohibit the web site from linking directly to the outside domains.
    * To allow the browser to make web requests to externally hosted content on  
       behalf of a website when cross-domain restrictions (in place to protect 
       websites from the likes of data theft) prohibit the browser from directly   
       accessing the outside domains. 

PROXY TUNNEL:-
Proxy Tunnel is a program that connects stdin and stdout to a server somewhere on the network, through a standard HTTPS proxy. We mostly use it to tunnel SSH sessions through HTTP(S) proxies, allowing us to do many things that wouldn't be possible without ProxyTunnel.

Proxy tunnel can currently do the following:
> Create tunnels using HTTP and HTTPS proxies (That understand the 
    HTTP CONNECT command).
> Work as a back-end driver for an OpenSSH client, and create SSH connections
    through HTTP(S) proxies.
> Work as a stand-alone application, listening on a port for connections, and then
    tunneling these connections to a specified destination.

If you want to make effective use of ProxyTunnel, the proxy server you are going to be tunneling through must adhere to some requirements.

1) Must support HTTP CONNECT command.
2) Must allow you to connect to destination machine and host, with or without
    HTTP proxy authentication.

Bypassing Proxy server in Linux client.

Now, as we understood what is proxy and Proxy tunnel, Let's see where it is needed and how to overcome in linux box.

In school, colleges, and Industries, most of the time internet connection are diverted through proxy server, so its critical task to bypass proxy for all those applications who does not have the facility to configure proxy setting.

So, the below technique force individual applications to use proxies, even if the applications themselves don't support proxies.

For that you need to locate and modify two files namely bash.bashrc and apt.conf . Both these files are located in the directory /root/etc

For bash.bashrc, enter the following command in your terminal

gedit /etc/bash.bashrc

This will open the file bash.bashrc in gedit. Scroll down straight to the bottom and add the following lines in the file:

export http_proxy="http://username:password@proxyIP:port"
export ftp_proxy="ftp://username:password@proxyIP:port"
export https_proxy="https://username:password@proxyIP:port"
export socks_proxy="https://username:password@proxyIP:port"

The final file should look something like this then

 

Replace proxyIP and port with your Proxy IP address and port number respectively, and replace the username and password with your authentication username and password respectively. In case there's no need of authentication, just write the part which follows the @ symbol and leave the rest.

Now you need to modify the apt.conf file similarly. You might need to create the file if it's not already there. But gedit will take care of that anyway and create the file for you if it doesn't exist already. So you can just enter the following command in your terminal.

gedit /etc/apt/apt.conf

Now this will be an empty file, so write the following inside it

Acquire::http::proxy "http://username:password@proxyIP:port/";
Acquire::ftp::proxy "ftp://username:password@proxyIP:port/";
Acquire::https::proxy "https://username:password@proxyIP:port/";
Acquire::socks::proxy "https://username:password@proxyIP:port/";

The final file should look something like this then

 
That's all. Save and close the file. Log out and Login to activate the new settings and all your applications shall connect to the internet perfectly now.

Note that we could do this from the network proxy tool too and use 'Apply System Wide' but that is a little buggy with authentication. Since we're working on Linux, this is something you should be knowing anyway!

I hope you all learned & enjoyed the article on Apply Proxy Settings System Wide in Linux.
espérons qu'il vous plaira.
Enjoy the article.