SHAREPOINT

SHAREPOINT
Spotlight on share server 2010

Saturday, December 18, 2010

IT WILL NOT, THAT EASY FOR A NOVICE TO HACK A SECURED SERVER

Dear Sir/Mam



Pls do not publish such critical security related articles .However , Sonal & Neha sharma are sucesseded , to provide information on Survilence/Detectives/Devices & technology Used by experts for Detecting and Preventing hacker's /Intruders from ill-legal access to Information Servers(Confidential). No one is born till now , who claims that he hack a computer on his ownself ( Enterprise & Govt. PC's) , somebody from the department (any) provide them MAC address of the

Server , or a Fool , who unintentionaly allowed intruders , to take the control remotely.Otherwise its Impossible to intrude into secured server's.

If you are receiving bounce back messages from emails that you HAVEN'T sent you have probably been 'spoofed' .

Email spoofing: is when the sender changes the name in an outgoing email so that it looks like the email came from somewhere or someone else. This practice is often used by spammers to stop people finding out who they are. It also means that when the spam mail is rejected by the addressee's mail server, the bounce back message goes to whoever was specified in the outgoing mail rather than to the spammer themselves.

Important Note:At present there is nothing we can do to avoid this nuisance. If you have been spoofed, please simply delete the bounce back messages. It doesn't mean that anyone has accessed your email account. You will probably find you receive a few for a short while and then they will stop. However we are trying very hard to devolp a Platform Common for all the server's in use at present. So , pls Ask people to , will not click on any mail msg they dont know , who is the sender & never provide information , asked Necssary for claim their winning lotto/Beneficery/Coca-Cola / Live etc.

Snooping, in a security context, is unauthorized access to another person's or company's data. The practice is similar to eavesdropping but is not necessarily limited to gaining access to data during its transmission. Snooping can include casual observance of an e-mail that appears on another's computer screen or watching what someone else is typing. More sophisticated snooping uses software programs to remotely monitor activity on a computer or network .

Device's.

Malicious hackers (crackers) frequently use snooping techniques and equipment such as keyloggers to monitor keystrokes, capture passwords and login information, and to intercept e-mail and other private communications and data transmissions. Corporations sometimes snoop on employees legitimately to monitor their use of business computers and track Internet usage; governments may snoop on individuals to collect information and avert crime and terrorism. Although snooping has a negative connotation in general, in computer technology snooping can refer to any program or utility that performs a monitoring function. For example, a snoop server is used to capture network traffic for analysis, and the snooping protocol monitors information on a computer bus to ensure efficient processing.


SEE HOW BIG ENTERPRISE's USED SNOOPING & WHY?

BIG Enterprise Data Governance Data masking hides information from testers: Start-up DataGuise enters the data masking market fueled by regulatory compliance pressures. One analyst says companies prefer masking over other techniques. Deperimeterization changing today's security practices: Royal Holloway authors explain how basic deperimeterization principles can ensure that security does not suffer when traditional boundaries are eroded.

Necessary Cooperation: The teaming of human resources and security pros is mission critical for protecting corporate data.



Frequently Asked Qestions:



Q : What is Spoofing/Snooping ?



Q : How to hack a pc ?



Q: Pls , tell me how can i protect my pc from malware/spyware?



Q : How to hack a cell phone or trace a cell phone ?



Q : How to track a spammer ?



So its not that easy for everyone , to intrude into someone elses computer. Hacking is Impossible on the net , becoz , one can use a public network



Like Internet , you can just able to see his IP Address & Domain. To hack a pc , you must have the physical address (MAC ADDRESS) of that machine , you want to Hack. MAC Address is unique for each single pc ( NIC : Network Intrface Card/Ethernet/Lan).



For more information , pls visit the sites given below.

For More Information pls visit our site



Sincerely
Gurbinder Sharma
IT Specialist/Security

Wednesday, December 15, 2010

10 POWER SHELL COMMANDS , SYSTEM ADMIN MUST KNOW

  • Over the last few years, Microsoft has been trying to make PowerShell the management tool of choice. Almost all the newer Microsoft server products require PowerShell, and there are lots of management tasks that can’t be accomplished without delving into the command line. As a Windows administrator, you need to be familiar with the basics of using PowerShell. Here are 10 commands to get you started.
Note: This article is also available as a PDF download.


 Get-HelpThe first PowerShell cmdlet every administrator should learn is Get-Help. You can use this command to get help with any other command. For example, if you want to know how the Get-Process command works, you can type:


  • Get-Help -Name Get-Processand Windows will display the full command syntax.
       you can also use Get-Help with individual nouns and verbs. For example, to find out all the commands     you can use with the Get verb, type: 
  • Get-Help -Name Get-*2: Set-ExecutionPolicyAlthough you can create and execute PowerShell scripts, Microsoft has disabled scripting by default in an effort to prevent malicious code from executing in a PowerShell environment. You can use the Set-ExecutionPolicy command to control the level of security surrounding PowerShell scripts. Four levels of security are available to you: 
  • Restricted — Restricted is the default execution policy and locks PowerShell down so that commands can be entered only interactively. PowerShell scripts are not allowed to run.
  • All Signed — If the execution policy is set to All Signed then scripts will be allowed to run, but only if they are signed by a trusted publisher.  
  • Remote Signed — If the execution policy is set to Remote Signed, any PowerShell scripts that have been locally created will be allowed to run. Scripts created remotely are allowed to run only if they are signed by a trusted publisher.  
  • Unrestricted — As the name implies, Unrestricted removes all restrictions from the execution policy.  
  • You can set an execution policy by entering the Set-ExecutionPolicy command followed by the name of the policy. For example, if you wanted to allow scripts to run in an unrestricted manner you could type: 
  • Set-ExecutionPolicy Unrestricted3: Get-ExecutionPolicyIf you’re working on an unfamiliar server, you’ll need to know what execution policy is in use before you attempt to run a script. You can find out by using the Get-ExecutionPolicy command.
  • 4: Get-ServiceThe Get-Service command provides a list of all of the services that are installed on the system. If you are interested in a specific service you can append the -Name switch and the name of the service (wildcards are permitted) When you do, Windows will show you the service’s state. 
  • 5: ConvertTo-HTMLPowerShell can provide a wealth of information about the system, but sometimes you need to do more than just view the information onscreen. Sometimes, it’s helpful to create a report you can send to someone. One way of accomplishing this is by using the ConvertTo-HTML command. 
  • To use this command, simply pipe the output from another command into the ConvertTo-HTML command. You will have to use the -Property switch to control which output properties are included in the HTML file and you will have to provide a filename. 
  • To see how this command might be used, think back to the previous section, where we typed Get-Service to create a list of every service that’s installed on the system. Now imagine that you want to create an HTML report that lists the name of each service along with its status (regardless of whether the service is running). To do so, you could use the following command: 
  • Get-Service
  • ConvertTo-HTML -Property Name, Status > C:\services.htm6: Export-CSVJust as you can create an HTML report based on PowerShell data, you can also export data from PowerShell into a CSV file that you can open using Microsoft Excel. The syntax is similar to that of converting a command’s output to HTML. At a minimum, you must provide an output filename. For example, to export the list of system services to a CSV file, you could use the following command: 
  • Get-Service
  • Export-CSV c:\service.csv7: Select-ObjectIf you tried using the command above, you know that there were numerous properties included in the CSV file. It’s often helpful to narrow things down by including only the properties you are really interested in. This is where the Select-Object command comes into play. The Select-Object command allows you to specify specific properties for inclusion. For example, to create a CSV file containing the name of each system service and its status, you could use the following command: 
  • Get-Service
  • Select-Object Name, Status
  • Export-CSV c:\service.csv8: Get-EventLogYou can actually use PowerShell to parse your computer’s event logs. There are several parameters available, but you can try out the command by simply providing the -Log switch followed by the name of the log file. For example, to see the Application log, you could use the following command: 
  • Get-EventLog -Log "Application"Of course, you would rarely use this command in the real world. You’re more likely to use other commands to filter the output and dump it to a CSV or an HTML file. 
  • Get-ProcessJust as you can use the Get-Service command to display a list of all of the system services, you can use the Get-Process command to display a list of all of the processes that are currently running on the system. 
  • Stop-ProcessSometimes, a process will freeze up. When this happens, you can use the Get-Process command to get the name or the process ID for the process that has stopped responding. You can then terminate the process by using the Stop-Process command. You can terminate a process based on its name or on its process ID. For example, you could terminate Notepad by using one of the following commands:
  • Stop-Process -Name notepadStop-Process -ID 2668Keep in mind that the process ID may change from session to session.
Warm Regards
Gurbinder Sharma
IT Professional

THANKS TO TECH REPUBLIC TO CONTINOUSLY SENDING UPDATION MAILS.
www.techrepublic.com

 http://groups.google.com/group/microsoft-certification-exams

Tuesday, December 14, 2010

AirMagnet Spectrum XT (2.0.1) is now available

AirMagnet Spectrum XT provides a more efficient method for troubleshooting RF interference issues, saving time and costly IT resources .
AirMagnet Spectrum XT (2.0.1) is now available. With this release, users can create custom signatures for any RF interference issue or source in the wireless LAN spectrum, regardless of device or environment. In addition, AirMagnet Spectrum XT delivers the industry’s most comprehensive RF interferer classification library. With these capabilities, wireless professionals no longer have to depend on spectrum analyzer vendors to deliver database updates for detection of new interference sources.

Summary of new key features:

Detection for new RF interferers

Ability to create customized signatures

Remote Spectrum analysis

AirMagnet Spectrum XT Viewer

SNMP support

Enhanced Bluetooth analysis

64-bit OS support

You can request for a Demo version for trial period to be more user friendly with this amazig Product.

http://www.airmagnet.com/ 

www.talktoht.com/gurbinder