Linux & Windows Tips, Tutorials, , Ideas

CEH Study Guide

che

book  CEH study download free 

Includes Real-World Scenarios, Hands-On Exercises, and
Leading-Edge Exam Prep Software Featuring:
• Custom Test Engine
• Hundreds of Sample Questions
• Electronic Flashcards
• Entire Book in PDF

Read more about CEH Study Guide

Share Button

Attacking The DNS Protocol

Attacking the DNS Protocol– Security Paper v2
• Typical DNS Attacks
• Cache Poisoning using DNS  Transaction ID Prediction
• Example of a Cache Poisoning Attack on a DNS Server
• Example of a Cache Poisoning Attack on a DNS Server
• DNS Vulnerabilities in Shared Host Environments
• Example DNS Flooding – Creating a DNS Denial of Service Attack
• DNS Man in the Middle Attacks DNS Hijacking
Security Associates Institute. All Rights Reserved
Permission is granted to freely copy, distribute and/or modify this document

Read more about Attacking The DNS Protocol

Share Button

Hacking.Exposed.Linux.3rd.Edition

ABOUT THE AUTHORS
This book was written according to the ISECOM (Institute for Security and Open
Methodologies) project methodology. ISECOM is an open, nonprofit security research
and certification organization established in January 2001 with the mission to make sense
of security. They release security standards and methodologies under the Open
Methodology License for free public and commercial use.
This book was written by multiple authors, reviewers, and editors—too many to all
be listed here—who collaborated to create the best Linux hacking book they could. Since
no one person can master everything you may want to do in Linux, a community wrote
the book on how to secure it.
The following people contributed greatly and should be recognized.

Read more about Hacking.Exposed.Linux.3rd.Edition

Share Button

Troubleshooting MySQL Database Connection Issues

Databases are the driving element of a website. Databases tell a website how to function on a dynamic level, meaning that the information can be smart enough to update without the user directly making those changes if need be. Without a proper connection to an SQL database, a website cannot function and you will likely be met with one of the following warnings:

Error establishing a database connection

OR

Read more about Troubleshooting MySQL Database Connection Issues

Share Button

rule : best ping mikrotik

Hello Do you suffer from high level of Ping in your network? just use this rule It adjusts the level of ping on a network /ip firewall mangle add action=mark-connection chain=postrouting comment=”East4ServQoS OF PING” disabled=\ no new-connection-mark=ping-ip passthrough=yes protocol=icmp add action=mark-packet chain=postrouting comment=” East4Serv QoS OF PING” \ connection-mark=ping-ip disabled=no new-packet-mark=packet_ip \ passthrough=yes /queue treeRead more about rule : best ping mikrotik[…]

Share Button

Basic MikroTik RouterOS Configuration using winbox .

This article ex”plains’ ho\”w to c\’onfigure a Mikrotik device straight out of the box. It goes through the Winbox configuratoin utility and some of the basic setup procedures to turn your MikroTik device into a home or office wireless and wired router. In this tutorial we will go through a step by step guide to make it as simple as possible to learn and implement these setting s on your own routers.

Read more about Basic MikroTik RouterOS Configuration using winbox .

Share Button