Be careful to Malicious Commands in Ubuntu

ubuntu-trasparent-termial

Users in Ubuntu (UNIX) use a lot the Terminal window to run different commands. But some of this commands can be extremely dangerous for you system. From these commands your files can be deleted, a huge number of processes can make your system freezes or deleting all hidden entries in a directory. Is better that everybody knows this commands so I will list some of these commands below and please be careful look but don’t run.

Continue reading

Learn Ethical Hacking

Ankit Fadia is an internationally renowned independent computer security consultant who has authored several internationally best-selling books on Computer Security. Want to become an Ankit Fadia Certified Ethical Hacker?

The BBC says at 14 years of age, Ankit Fadia defaced the front page of an Indian magazine and sent an e-mail to the editor confessing to the hack and suggesting counter measures. He wrote a book on “ethical hacking” at the age of 15, becoming the youngest ever author to be published by Macmillan India.

Ankit Fadia Certified Ethical Hacker

Now you can be trained and certified by computer security guru Ankit Fadia himself. AFCEH or “Ankit Fadia Certified Ethical Hacker” course is a certification program on computer security. It is a computer security course that helps IT security professionals protect internet enabled computer security systems against cyber security threats and hacking. It helps people become more aware about cyber crime and IT security measures to counter it.

Continue reading

How to have automatic backups of your mySQL database

The following guide provides a walk-through for setting up automatic backups of your mySQL databases using the AutoMySQLBackup file bash script. After reading the guide, it should be quick and easy to implement. This is an indispensable tool for webmasters. Once the backup system is in place you’ll have daily, weekly and monthly backups of your mySQL databases neatly organized in a private folder on your web server. They are automatically rotated so that they don’t eat up your storage space. Anytime you download a backup of your home directory all of the database backups will be included. This is much better than creating manual backups and can be a huge time saver if you have multiple databases.

Prologue

If you already know why you should be backing up your databases and want to skip ahead to the actual tutorial. Websites based on any type of content management system are pretty much guaranteed to be database driven. It is assumed that most people running their websites on virtual or dedicated servers already have a backup system in place and know how to set this up. If you are reading this tutorial, chances are you are using a shared hosting provider with a LAMP configuration (Linux Apache MySQL PHP). It is also likely that you have CPanel for site administration.

Reasons why automatic database backup is a good idea

Continue reading

How to install AutoMySQLBackup

  1. Get the script: AutoMySQLBackup is a wonderful tool that can be downloaded for free. The first thing you need to do is get yourself a copy. Download AutoMySQLBackup.
  2. Configure the script: The next step is configuring AutoMySQLBackup before uploading it to your server. You can edit the script using any text editor. Take note – Windows Notepad has terrible formatting for these kinds of files. It is better to use a dedicated text editor. If you don’t have a decent text editor, check out the freeware program PSPad, which also has some really cool tools for working with other files such as CSS, XTHML, PHP etc.
    Once you have the AutoMySQLBackup script open for editing, you’ll need to set the parameters. There are a lot of configuration options, but I am just going to focus on the important settings that will be applicable to most users.

Continue reading

eLearning – Botnet

botnet

Botnet is a jargon term for a collection of software robots, or bots, which run autonomously and automatically. They run on groups of "zombie" computers controlled remotely by crackers. This can also refer to the network of computers using distributed computing software.

While the term "botnet" can be used to refer to any group of bots, such as IRC bots, the word is generally used to refer to a collection of compromised computers (called zombie computers) running programs, usually referred to as worms, Trojan horses, or backdoors, under a common command and control infrastructure. A botnet’s originator (aka "bot herder") can control the group remotely, usually through a means such as IRC, and usually for nefarious purposes. Individual programs manifest as IRC "bots". Often the command and control takes place via an IRC server or a specific channel on a public IRC network. A bot typically runs

Continue reading