Friday, March 28, 2008

Who is running the popular tech news site www.funandtechpark.co.cc


From Yahoo! Answers (http://answers.yahoo.com/) I found This Interesting Question:

Does anyone know who is running the popular tech news site http://www.funandtechpark.co.cc ?

Ok, Let's Start Digging;)

=====> Step 1: Find Owner of This Domain:

First We need to know Who is the Owner of This Domain: http://www.funandtechpark.co.cc:

As 'www' is a common part of URL, We Should Search for this Second Level domain funandtechpark.co.cc from .CC Public Whois Server.

[root@log ~]# whois funandtechpark.co.cc
Whois Service 1.0 by BdNic (http://www.bdnic.net/whois/)
Copyright 2005-2007 Bangladesh Network Information Center
Request: funandtechpark.co.cc
whois server for *.cc is whois.nic.cc ...
connected to whois.nic.cc [72.13.32.29:43] ...

No match for "FUNANDTECHPARK.CO.CC".

Last update of whois database: Fri, 28 Mar 2008 08:04:52 EDT <<<

Ops! This Domain is not a 'Real Registered Domain'

Check http://www.bdnic.net/whois/index.php?domain=FUNANDTECHPARK.CO.CC for details.

Ok, Let's go to Top Level Domain CO.CC

=====> Step 2: Find Who Own CO.CC

[root@log ~]# whois co.cc
Whois Service 1.0 by BdNic (http://www.bdnic.net/whois/)
Copyright 2005-2007 Bangladesh Network Information Center
Request: co.cc
whois server for *.cc is whois.nic.cc ...
connected to whois.nic.cc [72.13.32.29:43] ...
connected to whois.moniker.com [64.49.213.249:43] ...
Moniker.Com Whois Server Version 2.1

Domain Name: CO.CC

Registrant [1280642]:
KAMSUNGCOMMUNICATION
JANGHANG-DONG, ILSAN-GU
GOYANG
GYEONGGI-DO
410380
KR


Administrative Contact [1280643]:
Jong Sung Kim CO.CC@domainservice.com
KAMSUNGCOMMUNICATION
JANGHANG-DONG, ILSAN-GU
GOYANG
GYEONGGI-DO
410380
KR
Phone: +1.9549848445
Fax: +1.9549699155


Billing Contact [738701]:
Moniker Privacy Services CO.CC@domainservice.com
Moniker Privacy Services
20 SW 27th Ave.
Suite 201
Pompano Beach
FL
33069
US
Phone: +1.9549848445
Fax: +1.9549699155


Technical Contact [738701]:
Moniker Privacy Services CO.CC@domainservice.com
Moniker Privacy Services
20 SW 27th Ave.
Suite 201
Pompano Beach
FL
33069
US
Phone: +1.9549848445
Fax: +1.9549699155


Domain servers in listed order:

NS1.CO.CC 222.122.45.50
NS2.CO.CC 58.121.85.222

Record created on: 1997-10-13 00:00:00.0
Database last updated on: 2008-03-05 02:29:53.61
Domain Expires on: 2013-03-26 00:00:00.0

[root@log ~]#

Ok, Found Something. Hmmm CO.CC is Directly Registered to Organization Details Above

Also Found the Whois Server for 'CO.CC' domain is:

whois.moniker.com [64.49.213.249]

Let's search on this server for domain 'funandtechpark.co.cc'

=====> Step 3: Direct Search to whois.moniker.com:

[root@log ~]# telnet whois.moniker.com 43
Trying 64.49.213.249...
Connected to whois.moniker.com (64.49.213.249).
Escape character is '^]'.
funandtechpark.co.cc
Moniker.Com Whois Server Version 2.1

No Match

[root@log ~]#

Yes, This is not a normal Registered Domain. It is belong to "CO.CC", Mean this is a tricks of CO.CC Owner. Owner of CO.CC Sell (SUB)Domain end with CO.CC and Give you a 'Redirect' URL. All POSSIBLE domains end with .CO.CC are resolved to two IP address.

=====> Step 4: Check IP for Domains End With .CO.CC :

Let's Check if ALL Possible Domain end With .CO.CC Domain Have Same IP:

[root@log ~]# nslookup www.funandtechpark.co.cc
Server: 116.212.104.81
Address: 116.212.104.81#53

Non-authoritative answer:
Name: www.funandtechpark.co.cc
Address: 222.122.45.50
Name: www.funandtechpark.co.cc
Address: 58.121.85.222

[root@log ~]# nslookup funandtechpark.co.cc
Server: 116.212.104.81
Address: 116.212.104.81#53

Non-authoritative answer:
Name: funandtechpark.co.cc
Address: 58.121.85.222
Name: funandtechpark.co.cc
Address: 222.122.45.50

[root@log ~]# nslookup www.bauani.co.cc
Server: 116.212.104.81
Address: 116.212.104.81#53

Non-authoritative answer:
Name: www.bauani.co.cc
Address: 58.121.85.222
Name: www.bauani.co.cc
Address: 222.122.45.50

[root@log ~]# nslookup www.bauani.org.co.cc
Server: 116.212.104.81
Address: 116.212.104.81#53

Non-authoritative answer:
Name: www.bauani.org.co.cc
Address: 58.121.85.222
Name: www.bauani.org.co.cc
Address: 222.122.45.50

[root@log ~]# nslookup ANYTHING.co.cc
Server: 116.212.104.81
Address: 116.212.104.81#53

Non-authoritative answer:
Name: ANYTHING.co.cc
Address: 58.121.85.222
Name: ANYTHING.co.cc
Address: 222.122.45.50

[root@log ~]#

Can you See? All the site is pointed to Two IP Address: 58.121.85.222 & 222.122.45.50

=====>Step 5: Let's See the Header Reply of .CO.CC Domain

[root@log ~]# telnet 58.121.85.222 80
Trying 58.121.85.222...
Connected to cc.cc (58.121.85.222).
Escape character is '^]'.
HEAD / HTTP/1.0
HOST:funandtechpark.co.cc

HTTP/1.1 200 OK
Date: Fri, 28 Mar 2008 12:33:42 GMT
Server: Apache/1.3.39 (Unix) PHP/5.2.3 mod_ssl/2.8.30 OpenSSL/0.9.8g
Vary: Host
X-Powered-By: PHP/5.2.3
Connection: close
Content-Type: text/html

Connection closed by foreign host.
[root@log ~]# telnet 58.121.85.222 80
Trying 58.121.85.222...
Connected to cc.cc (58.121.85.222).
Escape character is '^]'.
HEAD / HTTP/1.0
Host:mycheck-from-blog.co.cc

HTTP/1.1 200 OK
Date: Fri, 28 Mar 2008 12:34:50 GMT
Server: Apache/1.3.39 (Unix) PHP/5.2.3 mod_ssl/2.8.30 OpenSSL/0.9.8g
Vary: Host
X-Powered-By: PHP/5.2.3
Connection: close
Content-Type: text/html

Connection closed by foreign host.
[root@log ~]#quit


=====>Summary: Website http://www.funandtechpark.co.cc is redirected to http://funandtech.blogspot.com/. You will not normally know who run the site: www.funandtechpark.co.cc unless authority tell you. If you really want to know the the Author of This Site, Contact Directly to http://www.everything.co.cc/. Others, Who Can Help You is support_AT_blogpost_DOT_COM as it is hosted to BLOGPOST (www.blogpost.com)

Thanks
Ahamed Bauani

** This is a Initial Query - I will Update it with More Details Within Very Short Time.

Who is running the popular tech news site www.funandtechpark.co.cc


From Yahoo! Answers (http://answers.yahoo.com/) I found This Interesting Question:

Does anyone know who is running the popular tech news site http://www.funandtechpark.co.cc ?

Ok, Let's Start Digging;)

=====> Step 1: Find Owner of This Domain:

First We need to know Who is the Owner of This Domain: http://www.funandtechpark.co.cc:

As 'www' is a common part of URL, We Should Search for this Second Level domain funandtechpark.co.cc from .CC Public Whois Server.

[root@log ~]# whois funandtechpark.co.cc
Whois Service 1.0 by BdNic (http://www.bdnic.net/whois/)
Copyright 2005-2007 Bangladesh Network Information Center
Request: funandtechpark.co.cc
whois server for *.cc is whois.nic.cc ...
connected to whois.nic.cc [72.13.32.29:43] ...

No match for "FUNANDTECHPARK.CO.CC".

Last update of whois database: Fri, 28 Mar 2008 08:04:52 EDT <<<

Ops! This Domain is not a 'Real Registered Domain'

Check http://www.bdnic.net/whois/index.php?domain=FUNANDTECHPARK.CO.CC for details.

Ok, Let's go to Top Level Domain CO.CC

=====> Step 2: Find Who Own CO.CC

[root@log ~]# whois co.cc
Whois Service 1.0 by BdNic (http://www.bdnic.net/whois/)
Copyright 2005-2007 Bangladesh Network Information Center
Request: co.cc
whois server for *.cc is whois.nic.cc ...
connected to whois.nic.cc [72.13.32.29:43] ...
connected to whois.moniker.com [64.49.213.249:43] ...
Moniker.Com Whois Server Version 2.1

Domain Name: CO.CC

Registrant [1280642]:
KAMSUNGCOMMUNICATION
JANGHANG-DONG, ILSAN-GU
GOYANG
GYEONGGI-DO
410380
KR


Administrative Contact [1280643]:
Jong Sung Kim CO.CC@domainservice.com
KAMSUNGCOMMUNICATION
JANGHANG-DONG, ILSAN-GU
GOYANG
GYEONGGI-DO
410380
KR
Phone: +1.9549848445
Fax: +1.9549699155


Billing Contact [738701]:
Moniker Privacy Services CO.CC@domainservice.com
Moniker Privacy Services
20 SW 27th Ave.
Suite 201
Pompano Beach
FL
33069
US
Phone: +1.9549848445
Fax: +1.9549699155


Technical Contact [738701]:
Moniker Privacy Services CO.CC@domainservice.com
Moniker Privacy Services
20 SW 27th Ave.
Suite 201
Pompano Beach
FL
33069
US
Phone: +1.9549848445
Fax: +1.9549699155


Domain servers in listed order:

NS1.CO.CC 222.122.45.50
NS2.CO.CC 58.121.85.222

Record created on: 1997-10-13 00:00:00.0
Database last updated on: 2008-03-05 02:29:53.61
Domain Expires on: 2013-03-26 00:00:00.0

[root@log ~]#

Ok, Found Something. Hmmm CO.CC is Directly Registered to Organization Details Above

Also Found the Whois Server for 'CO.CC' domain is:

whois.moniker.com [64.49.213.249]

Let's search on this server for domain 'funandtechpark.co.cc'

=====> Step 3: Direct Search to whois.moniker.com:

[root@log ~]# telnet whois.moniker.com 43
Trying 64.49.213.249...
Connected to whois.moniker.com (64.49.213.249).
Escape character is '^]'.
funandtechpark.co.cc
Moniker.Com Whois Server Version 2.1

No Match

[root@log ~]#

Yes, This is not a normal Registered Domain. It is belong to "CO.CC", Mean this is a tricks of CO.CC Owner. Owner of CO.CC Sell (SUB)Domain end with CO.CC and Give you a 'Redirect' URL. All POSSIBLE domains end with .CO.CC are resolved to two IP address.

=====> Step 4: Check IP for Domains End With .CO.CC :

Let's Check if ALL Possible Domain end With .CO.CC Domain Have Same IP:

[root@log ~]# nslookup www.funandtechpark.co.cc
Server: 116.212.104.81
Address: 116.212.104.81#53

Non-authoritative answer:
Name: www.funandtechpark.co.cc
Address: 222.122.45.50
Name: www.funandtechpark.co.cc
Address: 58.121.85.222

[root@log ~]# nslookup funandtechpark.co.cc
Server: 116.212.104.81
Address: 116.212.104.81#53

Non-authoritative answer:
Name: funandtechpark.co.cc
Address: 58.121.85.222
Name: funandtechpark.co.cc
Address: 222.122.45.50

[root@log ~]# nslookup www.bauani.co.cc
Server: 116.212.104.81
Address: 116.212.104.81#53

Non-authoritative answer:
Name: www.bauani.co.cc
Address: 58.121.85.222
Name: www.bauani.co.cc
Address: 222.122.45.50

[root@log ~]# nslookup www.bauani.org.co.cc
Server: 116.212.104.81
Address: 116.212.104.81#53

Non-authoritative answer:
Name: www.bauani.org.co.cc
Address: 58.121.85.222
Name: www.bauani.org.co.cc
Address: 222.122.45.50

[root@log ~]# nslookup ANYTHING.co.cc
Server: 116.212.104.81
Address: 116.212.104.81#53

Non-authoritative answer:
Name: ANYTHING.co.cc
Address: 58.121.85.222
Name: ANYTHING.co.cc
Address: 222.122.45.50

[root@log ~]#

Can you See? All the site is pointed to Two IP Address: 58.121.85.222 & 222.122.45.50

=====>Step 5: Let's See the Header Reply of .CO.CC Domain

[root@log ~]# telnet 58.121.85.222 80
Trying 58.121.85.222...
Connected to cc.cc (58.121.85.222).
Escape character is '^]'.
HEAD / HTTP/1.0
HOST:funandtechpark.co.cc

HTTP/1.1 200 OK
Date: Fri, 28 Mar 2008 12:33:42 GMT
Server: Apache/1.3.39 (Unix) PHP/5.2.3 mod_ssl/2.8.30 OpenSSL/0.9.8g
Vary: Host
X-Powered-By: PHP/5.2.3
Connection: close
Content-Type: text/html

Connection closed by foreign host.
[root@log ~]# telnet 58.121.85.222 80
Trying 58.121.85.222...
Connected to cc.cc (58.121.85.222).
Escape character is '^]'.
HEAD / HTTP/1.0
Host:mycheck-from-blog.co.cc

HTTP/1.1 200 OK
Date: Fri, 28 Mar 2008 12:34:50 GMT
Server: Apache/1.3.39 (Unix) PHP/5.2.3 mod_ssl/2.8.30 OpenSSL/0.9.8g
Vary: Host
X-Powered-By: PHP/5.2.3
Connection: close
Content-Type: text/html

Connection closed by foreign host.
[root@log ~]#quit


=====>Summary: Website http://www.funandtechpark.co.cc is redirected to http://funandtech.blogspot.com/. You will not normally know who run the site: www.funandtechpark.co.cc unless authority tell you. If you really want to know the the Author of This Site, Contact Directly to http://www.everything.co.cc/. Others, Who Can Help You is support_AT_blogpost_DOT_COM as it is hosted to BLOGPOST (www.blogpost.com)

Thanks
Ahamed Bauani

** This is a Initial Query - I will Update it with More Details Within Very Short Time.

ZoneAlarm from ZoneLab Currently Check Point Is Back to My PC


ZoneAlarm, World's Number One Personal Firewall is Back on My Win PC. Yes, I mean Windows from Micro$oft. Though Personally I don't Like to Use This OS. I Had to Install and Use This OS on my PC:( . I Have a Requirement for My Clients, Who use it and Want Strong(!) Solution on Security Related Issue(s) on Their Network.

As per requirement of client, who are currently using Micro$oft WinDowS on their Corporate Network, I started using Win XP Pro with SP2.

When Installing this OS on my hardware, which is going to be connected on open Internet, at first I have to think about the security of my Data which is accessible via my OS.

What can I do?? Let's go for the Old Wine in New Bottle! Our last resort 'Zone Alarm'. Currently it is 'ZoneAlarm by Check Point'. When I last use it, about 6 years ago it was 'Zone Alarm from ZoneLab'.

Seems ZoneAlarm by Check Point have multi feature like FREE and PAID version, Including the Email Security, Virus Scanner, Browser Security and much more!!!

No, I just need the basic 'Zone Alarm' which can control incoming and outgoing traffic from my M$ WinDoz Host..

Let's see what this ZoneAlarm Can Do by Closing Windows -- Opening Doors....on my Doz Box....

ZoneAlarm from ZoneLab Currently Check Point Is Back to My PC


ZoneAlarm, World's Number One Personal Firewall is Back on My Win PC. Yes, I mean Windows from Micro$oft. Though Personally I don't Like to Use This OS. I Had to Install and Use This OS on my PC:( . I Have a Requirement for My Clients, Who use it and Want Strong(!) Solution on Security Related Issue(s) on Their Network.

As per requirement of client, who are currently using Micro$oft WinDowS on their Corporate Network, I started using Win XP Pro with SP2.

When Installing this OS on my hardware, which is going to be connected on open Internet, at first I have to think about the security of my Data which is accessible via my OS.

What can I do?? Let's go for the Old Wine in New Bottle! Our last resort 'Zone Alarm'. Currently it is 'ZoneAlarm by Check Point'. When I last use it, about 6 years ago it was 'Zone Alarm from ZoneLab'.

Seems ZoneAlarm by Check Point have multi feature like FREE and PAID version, Including the Email Security, Virus Scanner, Browser Security and much more!!!

No, I just need the basic 'Zone Alarm' which can control incoming and outgoing traffic from my M$ WinDoz Host..

Let's see what this ZoneAlarm Can Do by Closing Windows -- Opening Doors....on my Doz Box....

Wednesday, March 26, 2008

New Web Robot NaverBot very bad manners


A new Web Robot/Spider Out There Name NeverBoT, Version 1.0 from NHN Corp. / +82-2-3011-1954 / nhnbot AT naver.com

Have you check your web log in last few days? If yes, then you may notice a new Spider having footprint of "Mozilla/4.0 (compatible; NaverBot/1.0; " with a URL pointed to help.never.com and there is not a single English Word to read.

Never.Com is one of big search engine in Korea. This web spider/bot run by: NHN Corporation. Though they claim that this new Robot Maintain robot.txt file, I am not convinced.

For last few week, I keep an eye on this bot and found it normally ignore robot.txt file.

Summary of NeverBot:

Name: NaverBot
Current Version: 1.0
Current Agent_String: Mozilla/4.0 (compatible; NaverBot/1.0; http://help.naver.com/delete_main.asp)
Current IP Block where It Live: 202.179.176.0-202.179.183.255
Old Living IP Block Found in Different Site: 220.72.0.0 to 220.87.255.255, 61.78.61.192 61.78.61.193 61.78.61.206 61.78.61.220 61.78.61.221 61.78.61.222
Old Agent_String1: * Mozilla/4.0 (compatible; NaverBot/1.0; nhnbot@naver.com)
Old Agent_String2: * NaverBot-1.0 (NHN Corp. / +82-31-784-1989 / nhnbot@naver.com)

This robot, named NaverBot has many major error on it. No Rate Limit, Multiple Request at a time etc etc. When it find a host with hough bandwidth web server, you can see how first it sent request to web server. In Last 1 week, I found footprint of this bot more then 1000!

Suggestions: As This Web Spider Ignore robot.txt, you may ban it via source address block (202.179.176.0-202.179.183.255) from your Router or web server;)


Anyone Here to Comments?

I Found a BLOG http://www.cerkit.com/cerkitBlog/Naverbot+Bad+Korea+Banned.aspx, where author is really frustrated to found the mass on his log.

Comments Are Welcome..

With Thanks


Ahamed Bauani

New Web Robot NaverBot very bad manners


A new Web Robot/Spider Out There Name NeverBoT, Version 1.0 from NHN Corp. / +82-2-3011-1954 / nhnbot AT naver.com

Have you check your web log in last few days? If yes, then you may notice a new Spider having footprint of "Mozilla/4.0 (compatible; NaverBot/1.0; " with a URL pointed to help.never.com and there is not a single English Word to read.

Never.Com is one of big search engine in Korea. This web spider/bot run by: NHN Corporation. Though they claim that this new Robot Maintain robot.txt file, I am not convinced.

For last few week, I keep an eye on this bot and found it normally ignore robot.txt file.

Summary of NeverBot:

Name: NaverBot
Current Version: 1.0
Current Agent_String: Mozilla/4.0 (compatible; NaverBot/1.0; http://help.naver.com/delete_main.asp)
Current IP Block where It Live: 202.179.176.0-202.179.183.255
Old Living IP Block Found in Different Site: 220.72.0.0 to 220.87.255.255, 61.78.61.192 61.78.61.193 61.78.61.206 61.78.61.220 61.78.61.221 61.78.61.222
Old Agent_String1: * Mozilla/4.0 (compatible; NaverBot/1.0; nhnbot@naver.com)
Old Agent_String2: * NaverBot-1.0 (NHN Corp. / +82-31-784-1989 / nhnbot@naver.com)

This robot, named NaverBot has many major error on it. No Rate Limit, Multiple Request at a time etc etc. When it find a host with hough bandwidth web server, you can see how first it sent request to web server. In Last 1 week, I found footprint of this bot more then 1000!

Suggestions: As This Web Spider Ignore robot.txt, you may ban it via source address block (202.179.176.0-202.179.183.255) from your Router or web server;)


Anyone Here to Comments?

I Found a BLOG http://www.cerkit.com/cerkitBlog/Naverbot+Bad+Korea+Banned.aspx, where author is really frustrated to found the mass on his log.

Comments Are Welcome..

With Thanks


Ahamed Bauani

Monday, March 24, 2008

Denial-of-service attack DoS DDoS Detection and Prevention


What is DoS (Denial-of-Service attack) or DDoS (Distributed Denial-of-Service attack)? And How we Detect and Prevent it?

Denial-of-Service attack DoS, or Distributed Denial-of-Service attack DDoS is an attempt to make a computer resource unavailable to its intended users. Although the means to, motives for, and targets of a DoS attack may vary, it generally consists of the concerted, malevolent efforts of a person or persons to prevent an Internet site or service from functioning efficiently or at all, temporarily or indefinitely.

One common method of attack involves saturating the target (victim) machine with external communications requests, such that it cannot respond to legitimate traffic, or responds so slowly as to be rendered effectively unavailable. In general terms, DoS attacks are implemented by:

=> Forcing the targeted computer(s) to reset, or consume its all resources so that it can no longer provide its service;

=> Obstructing the communication media between the intended users and the victim so that they can no longer communicate adequately.

The CERT (Computer Emergency Readiness Team) defines symptoms of DoS or DDoS attacks to include:

+ Unusually slow network performance
+ Unavailability of a particular web site
+ Inability to access any web site(s)
+ Dramatic increase in the number of spam emails received (Mail Bomb )

There is Many Kinds of DoS or DDoS Attack Characterized By Methods, Includes:

+ Flooding a network, thereby preventing legitimate network traffic;
+ Disrupting a server by sending more requests than it can possibly handle, thereby preventing access to a service;
+ Preventing a particular individual from accessing a service;
+ Disrupting service to a specific system or person.

Currently There are Five Basic Types of DoS or DDoS Attack are Common in Internet:

1. consumption of computational resources, such as bandwidth, disk space, or CPU time;
2. disruption of configuration information, such as routing information;
3. disruption of state information, such as unsolicited resetting of TCP sessions;
4. disruption of physical network components.
5. obstructing the communication media between the intended users and the victim so that they can no longer communicate adequately.

Some Common DoS or DDoS Attack Type:

==> ICMP floods ***

==> Teardrop attack ***

==> Peer-to-peer attacks ***

==> Application level floods ***

==> Nuke ***

==> Distributed attack ***

==> Reflected attack ***

==> Unintentional attack ***

To Prevention and Response Including Surviving Attacks, I will add more on my spare time. By this Time You May Go Through Links Bellow:

Useful Links Related To DoS or DDoS:

=> RFC 4732 By Internet Denial-of-Service Considerations
=> How to Prevent Denial of Service Attacks

=> CERT's Guide to DoS attacks.

=>Some CISCO IoS tips for Internet Service Providers By Mehmet Suzen


Any Idea in Your Mind? Please Add it to Comment Section.

Thanks

Ahamed Bauani

HP: +880-1818-BAUANI

-->[*** More Content Is Coming Soon]

Denial-of-service attack DoS DDoS Detection and Prevention


What is DoS (Denial-of-Service attack) or DDoS (Distributed Denial-of-Service attack)? And How we Detect and Prevent it?

Denial-of-Service attack DoS, or Distributed Denial-of-Service attack DDoS is an attempt to make a computer resource unavailable to its intended users. Although the means to, motives for, and targets of a DoS attack may vary, it generally consists of the concerted, malevolent efforts of a person or persons to prevent an Internet site or service from functioning efficiently or at all, temporarily or indefinitely.

One common method of attack involves saturating the target (victim) machine with external communications requests, such that it cannot respond to legitimate traffic, or responds so slowly as to be rendered effectively unavailable. In general terms, DoS attacks are implemented by:

=> Forcing the targeted computer(s) to reset, or consume its all resources so that it can no longer provide its service;

=> Obstructing the communication media between the intended users and the victim so that they can no longer communicate adequately.

The CERT (Computer Emergency Readiness Team) defines symptoms of DoS or DDoS attacks to include:

+ Unusually slow network performance
+ Unavailability of a particular web site
+ Inability to access any web site(s)
+ Dramatic increase in the number of spam emails received (Mail Bomb )

There is Many Kinds of DoS or DDoS Attack Characterized By Methods, Includes:

+ Flooding a network, thereby preventing legitimate network traffic;
+ Disrupting a server by sending more requests than it can possibly handle, thereby preventing access to a service;
+ Preventing a particular individual from accessing a service;
+ Disrupting service to a specific system or person.

Currently There are Five Basic Types of DoS or DDoS Attack are Common in Internet:

1. consumption of computational resources, such as bandwidth, disk space, or CPU time;
2. disruption of configuration information, such as routing information;
3. disruption of state information, such as unsolicited resetting of TCP sessions;
4. disruption of physical network components.
5. obstructing the communication media between the intended users and the victim so that they can no longer communicate adequately.

Some Common DoS or DDoS Attack Type:

==> ICMP floods ***

==> Teardrop attack ***

==> Peer-to-peer attacks ***

==> Application level floods ***

==> Nuke ***

==> Distributed attack ***

==> Reflected attack ***

==> Unintentional attack ***

To Prevention and Response Including Surviving Attacks, I will add more on my spare time. By this Time You May Go Through Links Bellow:

Useful Links Related To DoS or DDoS:

=> RFC 4732 By Internet Denial-of-Service Considerations
=> How to Prevent Denial of Service Attacks

=> CERT's Guide to DoS attacks.

=>Some CISCO IoS tips for Internet Service Providers By Mehmet Suzen


Any Idea in Your Mind? Please Add it to Comment Section.

Thanks

Ahamed Bauani

HP: +880-1818-BAUANI

-->[*** More Content Is Coming Soon]

Wednesday, March 12, 2008

One and Only CentOS Mirror in Dhaka Bangladesh


One and Only CentOS Mirror in Dhaka Bangladesh

Dear All

I am happy to Announce our First, One and Only Mirror of CentOS in Dhaka, Bangladesh - A little country of south Asia.


Details of our CentOS Mirror:

Organization: Bangladesh Network Information Center http://www.bdnic.net/
Contact: centos-org at bauani.org
Protocols: HTTP
Centos Versions: ALL
Arch: ALL official of CentOS
HTTP URL: http://www.bdnic.net/mirrors/centos/
Syncing: 2 to 3 Times a day
DVD ISOs: We are Currently Working with Kernel.Org to Get Access to Their Mirror for DVD IOS(s).
Bandwidth: 10Mb/s for Bangladesh, 3Mb/s for International
Location: Telnet Data Center, Dhaka, Bangladesh


Due to high charge for Bandwidth, we have to limit 3Mb/s for International and 10Mb/s for our Country, Bangladesh
Also this is First, One and Only CentOS Mirror in Bangladesh

1Gb/s Bandwidth for organizations who have Direct Peering with Telnet Communication Limited (http://www.telnet-bd.com/) Data Center.

Please add our mirror to your list of mirror sites. Within Short Time it will have 100Mb/s for International.

With Thanks

Ahamed Bauani
Bangladesh Network Information Center
http://www.bdnic.net/

Sunday, March 2, 2008

Secure a Wallet - wikiHow


Secure a Wallet - wikiHow


How to Secure a Wallet


from wikiHow - The How to Manual That You Can Edit

Pickpocketing happens everywhere. Many times, it occurs because people aren't careful enough with their valuables. Men's wallets are especially vulnerable. Follow these steps to keep your wallet safe.

Steps


  1. Buy a short length of link chain, two feet long at most, strong and not so long you look like a teen gangster, and not so long you could die if it gets caught on something.
  2. Secure it to your belt in a hole you punch, or put it on a round ring and then secure it.
  3. Secure it to your wallet by punching a hole in the wallet, or by buying a new wallet with a hole punched already (or even the whole chain thing included), or pay someone to make a magnificent new one for you.
  4. Wear it and feel secure that no one's grabbing your wallet when it's attached to you with a chain.


Tips


  • When buying the short length of link chain, make sure it is strong enough but not so thick and high weight, which may feel uncomfortable.


Warnings


  • Rule of thumb: If your chain swings a lot, it's too long. The longer it is, the better chance of it getting caught somewhere.

  • Careful when you are passing a metal detector or any other secure place, where you chain will hit the alarm button.


Related wikiHows





Article provided by wikiHow, a collaborative writing project to build the world's largest, highest quality how-to manual. Please edit this article and find author credits at the original wikiHow article on How to Secure a Wallet. All content on wikiHow can be shared under a Creative Commons license.

Secure a Wallet - wikiHow


Secure a Wallet - wikiHow


How to Secure a Wallet


from wikiHow - The How to Manual That You Can Edit

Pickpocketing happens everywhere. Many times, it occurs because people aren't careful enough with their valuables. Men's wallets are especially vulnerable. Follow these steps to keep your wallet safe.

Steps


  1. Buy a short length of link chain, two feet long at most, strong and not so long you look like a teen gangster, and not so long you could die if it gets caught on something.
  2. Secure it to your belt in a hole you punch, or put it on a round ring and then secure it.
  3. Secure it to your wallet by punching a hole in the wallet, or by buying a new wallet with a hole punched already (or even the whole chain thing included), or pay someone to make a magnificent new one for you.
  4. Wear it and feel secure that no one's grabbing your wallet when it's attached to you with a chain.


Tips


  • When buying the short length of link chain, make sure it is strong enough but not so thick and high weight, which may feel uncomfortable.


Warnings


  • Rule of thumb: If your chain swings a lot, it's too long. The longer it is, the better chance of it getting caught somewhere.

  • Careful when you are passing a metal detector or any other secure place, where you chain will hit the alarm button.


Related wikiHows





Article provided by wikiHow, a collaborative writing project to build the world's largest, highest quality how-to manual. Please edit this article and find author credits at the original wikiHow article on How to Secure a Wallet. All content on wikiHow can be shared under a Creative Commons license.

Make a Playing Cards Wallet


Make a Playing Cards Wallet - wikiHow


How to Make a Playing Cards Wallet


from wikiHow - The How to Manual That You Can Edit

Be the only one in the room to have a playing cards wallet at your next card game. With just a few cards and some packing tape, you can make a unique wallet that'll draw second looks when you pull it out.

Steps


  1. Find three playing cards you like the most. Lay them about 1/4 inch (.63 cm) apart. Take a piece clear packing tape and cover the top area of the cards so that they make one long, even strip. Trim the edges. Repeat this process to make another set of three playing cards.
  2. Lay the two sets of cards beside each other so that the cards make a 3 x 2" (7.5 cm x 5 cm) rectangle, with the faces towards you. Once again, connect the two pieces with clear packing tape.
  3. Turn the cards over, and cover any sticky parts with tape (sticky part to sticky part). Turn the cards over again. Fold the cards toward each other, so that the faces are pointing outwards. Tape the two shorts sides together. Three of the four sides should now be joined together. Your wallet is complete.
  4. Put your money in, fold it up, and put it in your pocket.


Tips


  • 4 cards work well also, if you would like the wallet a little longer.
  • Laminate the cards before attaching them. The wallet is much sturdier that way.
  • Take the face card, cut the face out, and use the center for an ID or a photo.
  • Instead of a deck of cards, you might like to try some alternative cards. For instance, you could use the fake credit cards that arrive in the mail, old Pokémon cards, foreign money or flags.
  • On the flaps of the wallet (the parts that fold in), cut an additional playing card in half, and tape it to the flaps on the inside. This can create a neat little pocket to store your driver's license, identification, etc. Just make sure not to accidentally tape part of your wallet closed!
  • Be careful not to bind the cards too closely together. If you do not leave enough space between the cards, the wallet won't stay shut. One solution is to tape small, flat pieces of magnet where it closes. Even then, however, your wallet will only hold a few bills. Make sure it can hold money comfortably!


Things You'll Need


  • 6 of your favorite playing cards
  • Clear packing tape


Related wikiHows




Sources and Citations


  • How To Do Stuff Original source of this page. Shared with permission. Visit their site for many more interesting crafts.



Article provided by wikiHow, a collaborative writing project to build the world's largest, highest quality how-to manual. Please edit this article and find author credits at the original wikiHow article on How to Make a Playing Cards Wallet. All content on wikiHow can be shared under a Creative Commons license.

Make a Playing Cards Wallet


Make a Playing Cards Wallet - wikiHow


How to Make a Playing Cards Wallet


from wikiHow - The How to Manual That You Can Edit

Be the only one in the room to have a playing cards wallet at your next card game. With just a few cards and some packing tape, you can make a unique wallet that'll draw second looks when you pull it out.

Steps


  1. Find three playing cards you like the most. Lay them about 1/4 inch (.63 cm) apart. Take a piece clear packing tape and cover the top area of the cards so that they make one long, even strip. Trim the edges. Repeat this process to make another set of three playing cards.
  2. Lay the two sets of cards beside each other so that the cards make a 3 x 2" (7.5 cm x 5 cm) rectangle, with the faces towards you. Once again, connect the two pieces with clear packing tape.
  3. Turn the cards over, and cover any sticky parts with tape (sticky part to sticky part). Turn the cards over again. Fold the cards toward each other, so that the faces are pointing outwards. Tape the two shorts sides together. Three of the four sides should now be joined together. Your wallet is complete.
  4. Put your money in, fold it up, and put it in your pocket.


Tips


  • 4 cards work well also, if you would like the wallet a little longer.
  • Laminate the cards before attaching them. The wallet is much sturdier that way.
  • Take the face card, cut the face out, and use the center for an ID or a photo.
  • Instead of a deck of cards, you might like to try some alternative cards. For instance, you could use the fake credit cards that arrive in the mail, old Pokémon cards, foreign money or flags.
  • On the flaps of the wallet (the parts that fold in), cut an additional playing card in half, and tape it to the flaps on the inside. This can create a neat little pocket to store your driver's license, identification, etc. Just make sure not to accidentally tape part of your wallet closed!
  • Be careful not to bind the cards too closely together. If you do not leave enough space between the cards, the wallet won't stay shut. One solution is to tape small, flat pieces of magnet where it closes. Even then, however, your wallet will only hold a few bills. Make sure it can hold money comfortably!


Things You'll Need


  • 6 of your favorite playing cards
  • Clear packing tape


Related wikiHows




Sources and Citations


  • How To Do Stuff Original source of this page. Shared with permission. Visit their site for many more interesting crafts.



Article provided by wikiHow, a collaborative writing project to build the world's largest, highest quality how-to manual. Please edit this article and find author credits at the original wikiHow article on How to Make a Playing Cards Wallet. All content on wikiHow can be shared under a Creative Commons license.

Labels / Category

2013 (1) 3G (4) Adsense (2) AKTEL (2) Amateur Radio (3) APNIC (5) Bajaj Discovery (1) Bajaj Pulsar (1) Bangla News (5) Bangladesh (29) Bangladesh Computer Market (1) Bangladesh Cricket (2) Bangladesh earthquake (3) Bangladesh Educational Board (1) Bangladesh Energy (4) Bangladesh ICT (15) Bangladesh Internet Service (15) Bangladeshi Credit Card (3) Bangladeshi News Site (3) Bank in Bangladesh (7) Bank of Bangladesh (10) Banking in Bangladesh (10) BGMEA Bulding (1) Big File Download (3) blackhat (1) BLOG (6) Bogon (3) bot (2) BTCL (3) BTRC (14) BTTB Internet (10) BTTB Submarine Cable (9) Byke Hijack (1) Cacti (1) Call Block (1) Carbon Credit (1) CentOs (2) CentOs Bangladesh (2) Charity (2) Chrome (2) Computer Booting (1) Credit Card (10) Credit Card in Bangladesh (8) Crime (3) CyberCrime (11) Cyclon (1) DDoS (8) Dengue (1) Denmark (1) Dhaka earthquake (5) DNS (3) DNSSEC (2) Domain (9) DoS (4) dot bd domain (3) Dot CO.CC (2) Download (4) Drive not opening on click (1) DV Lottery 2010 (2) E-Learning (1) earthquake (5) EARTHQUAKE BANGLADESH (2) EARTHQUAKE DHAKA (2) earthquake in Bangladesh (5) earthquake in Dhaka (5) Email (7) Email Full Header (3) Email Sender Identify (4) Entertainment (2) Fake Email Sender (5) Firefox (8) FTP (1) Funny (4) GMail (4) Google (18) GPRS Settings (1) GrameenPhone (1) HAM (4) Health (3) Hobby (1) IGW (3) IIG (3) India (1) Indian ICT (1) Indian IT (1) Internet (19) Internet Mail (1) Internet Security (9) iPhone (3) iPhone Bangla (2) iPhone Bangladesh (2) iPhone in Dhaka (2) iPod (1) IPv4 Allocation (8) ipv6 (10) islam (4) ISOC (3) Linux Articles (6) Metal News (1) Microsoft (4) Microsoft buy Yahoo (1) Mirror Server (1) Mobile Phone (3) Mobile Phone Internet (1) Mobile Phone News (3) Mobile Phone Operator (6) Mobile Phone User (3) Mozilla (8) Mozilla Firefox (8) Myself (1) Mystery (1) Netcraft (4) Network Monitoring (4) neverBot (2) News Site (1) Nokia (3) Oil Price (2) Online Security (7) Paypal in Bangladesh (6) Personal View (1) Phishing (2) Pigeons (1) Postfix (7) PSTN (2) RANGS Bulding (1) Relay Host (2) robot.txt (1) robots.txt (2) Scour (2) Scour.com (2) Second submarine cable (3) Sendmail (4) Share Market (4) Smart Relay (3) SSC Result (1) SSC Result 2008 (1) Stock Market (3) Technology (1) Ubuntu (4) UCB (5) UCBL (5) URL Redirect (2) Virus (3) Virus Infected Windows (3) Virus Information (3) Warid (2) Web Spider (3) Webhosting (6) Wimax (4) Windows (1) Windows Problems (1) Wireless Internet in Bangladesh (5) Yahoo (4) Yahoo Sold (1)

Share it