Archive for December 2013

20 ideas to make money online



A cash cow for the enterprising, the Internet is littered with opportunities to make a fast buck. While it rarely qualifies as a solitary source of income, the Net can easily help you supplement it. However, the amount you earn depends on the time and effort invested. Go through these 20 options and find out which ones work for you.

Blogging
If you're a passionate closet writer who wants to be published but can't find a way to do so, make each keystroke your way to wealth by penning your own blog. Starting a blog doesn't require extensive technical skills but it's important that you have expertise in the field you are writing on. This will attract visitors to your site. Building a large following will enable you to earn profit by luring advertisers, writing paid reviews or getting commissions for promoting other people's products.

Paid Writing
If maintaining a blog is difficult for you but you still want to indulge your passion for writing, you can jot down articles for other blogs or sites such as Weblogs, Helium or PayPerPost. Writing an e-book can also be a good option. E-books are investment free, with no cost for printing and shipping. If you have a strong command over languages, you can become a copy editor, where Webmasters will pay you to read articles and correct grammatical errors, sentence fragments, etc.

e-tuitions/Webinars
The demand for tutors is high and growing. So, if you like helping others learn, e-teaching could be the earning ticket for you. All you need to become an online tutor is expertise in your subject and a few spare hours per week. TutorVista, e-tutor, SmartThinking and Tutor.com are some of the sites you can enroll with. If you gain a good reputation as a coach, you could even conduct Webinars-lectures or seminars transmitted over the Net. College and university students are willing to pay to gain entry to a well-respected Webinar.

Affilliate/Reseller
For those who have the knack of selling, one of the best ways to make money online is to become an affiliate/reseller. An affiliate is a person who gets a commission for selling every product that he promotes, whether on his Website or through any other avenue such as eBay. You don't have to own the product. You only need to sign up for an affiliate program with a company and start selling its products under your referral link. Firms such as Commission Junction or Click Bank have a large pool of products.

Buying/Selling domains
Buying and selling domain names is another way to make money from home and requires very little investment or time. You can buy domains at their registration prices or even cheaper and trade them at a profit. However, always research on sites such as sedo.co.uk, afternic.com, ebay.com or other domain auction sites to get an estimate of the hottest selling names. The best way to find good ones is to use terminated domain lists, which contain several expired names that are back in the pool.

Freelancing for Professionals
Freelancing is a great option for professionals who are experts in their respective trades and know how to ensure customer satisfaction. Various freelancing and project-oriented sites allow companies that need help to describe their projects. Freelancers and small businesses offer bids, ideas or proposals, from which the buyers can choose what they find most suitable. Websites such as Elance cover everything from programming and writing to data entry and design, while RentACoder focuses on software programming.

Advertising
You can sell space on your Website or blog for advertisements and you earn when these ads are clicked by visitors to your site. The sorting and placing of ads is free. The profitability of pay-per-click advertising depends on the traffic level of the Website and, most importantly, on the clickthrough rate and cost per click. Google AdSense is the most popular option, while others are BidVertiser, Text Link Ads and Blogads. Direct banner and RSS feed are some other forms of online advertising.

GPT Programme
GPT or Get-paid-to sites are becoming increasingly popular among teens. You get paid for signing up for free Websites, newsletters, playing games and filling out online surveys. These are suitable for people who don't have a skill set but want to earn extra money. Taking online surveys is simple- register with a few legitimate, paid survey sites and answer questions. The topics range from shopping to politics. This might not help you make a living, but you can earn good pocket money. Contests2win is one of the trusted GPT Websites.

Online Marketing
Once a Website is created and optimised for search engine (SEO), the SEM or Search Engine Marketing begins. A treasure trove lies hidden here. An SEO/SEM expert, who is responsible for marketing a Website, can promote it in various ways. These include article marketing, writing press releases, forum posting, blog posting, submitting your site to directories and search engines, social bookmarking, etc. Most companies don't do this in-house and pay you to conduct the SEM for them.

Making themes
As more and more people seek an online presence, the demand for Website templates and WordPress (Blog) themes will keep increasing. If you are good at Web designing and coding, you can earn a lot from designing Web themes. In this segment, there are mainstream Websites, such as TemplateMonster and ThemeForest, which act as a marketplace where you can sell your themes. Templates are sold and priced depending on the rights and features that are bundled with them.

Selling photos
If you enjoy photography and are good with a camera, you could be sitting on a huge reserve of revenue. There are people who will be interested in your collection of images. Nowadays, it's easy to take your photos to the public, providing a convenient way to build a secondary income stream. Many stock photo agencies, such as Fotolia, Dreamstime and Shutterstock, offer incentives for people to earn from their photos.

Support & service
Providing coding or fixing other Webmasters' issues is another great way to earn extra bucks. There are simple jobs ranging from adding a script to setting up sites, but knowledge of Web coding is essential. One can offer support for Web CMS (content management systems) like Drupal or Joomla. After you are comfortable with your own installation, you can help other people to set these up and configure them.

Stock/forex trading
Joining the stock/forex market may seem a bit risky. However, you can start small and continue researching till you gain experience in this area. Once you do, it will be easy to earn from exchanging foreign currencies and/or stocks. Their rates fluctuate depending on supply and demand, and economic and political influences in the world. The aim of any trader is to spot which currency/stock is likely to rise or fall in value against another. The more time you put in, the more you will earn.

Selling your own brand
If you have a flair for designing cool images, don't bother about creating your own inventory. As long as your design can be printed on a product, you can pocket some money. You can upload designs on various Websites such as CafePress, and if somebody orders these designs, the company will print them and distribute the products. It could be designs for T-shirts, hats, bags, books, posters, calendars, greeting cards, etc. You will receive a commission for each sale. Other such sites include Lulu and Zazzle.

Virtual Assistant
Small businesses always need help in running their processes, but may not be willing to hire a full-time employee. As a virtual assistant, you are expected to perform practically any administrative task that a traditional secretary or assistant would, such as make travel reservations, handle expense reimbursements or pay bills. You can do it from the comfort of your home, interacting with clients either online or by phone. Your expertise will decide how much moolah you rake in.

Inbound call centre
Many companies, who are facing space constraints, especially those in metro cities, prefer to hire workers outside their offices or outsource certain processes. You can set up an inbound call centre at home to handle such jobs. Research different companies that are outsourcing their work as they may have opportunities for inbound call centre agents. You can work for more than one company. This can be either a part-time or fulltime engagement, depending on your need.

You Tube
If there's a dramatic performer hidden inside you who craves applause and adulation, upload yourself on YouTube. You can be a filmmaker, musician or comedian who wants a wider audience. Your earnings will come from ads displayed on your video page. This process is similar to the pay-per-click advertising program common to other Websites and blogs. Sites such as Flixya and Mediaflix can be helpful in this regard.

Researching for others
Don't be morose if you can't write, design or code. Lack of talent cannot stop you from making money online. If you're willing to work hard for a few hours a week, you can take up simple research jobs for other people who don't have the time to do it themselves. You could search for opportunities in organisations that provide funding for research and offer to assist them through online investigation.

Building Applications
With smartphones gaining popularity, the demand for their applications, or apps as they are popularly known, has also shot up. There are over 3 million apps for the iPhone and over a million apps in Google's Android market. Most of these are selling like hot cakes. Developing and selling your own smartphone app is becoming a lucrative way to make money on the Internet. Apps cost virtually nothing to develop and entail no storage or shipping costs. So they enjoy the best profit margins.

Transcription
Medical transcription involves making written copies of oral material dictated by doctors or other medical experts. These may include history and physical reports, clinical notes, consultation notes, reports, letters, psychiatric evaluation and so on. The dictated material needs to be transcribed swiftly and accurately, which is the most challenging aspect of the job. To become a medical transcriptionist, you need to have a good knowledge of medical terminology and a high typing speed along with accuracy.
Saturday, December 28, 2013
Tag :

Top Ten Penetration Testing Linux Distributions



1. The mamma or best known of Linux pentesting distros. BackTrack has a very cool strapline: “The quieter you become, the more you are able to hear.” That just sounds cool….

BackTrack is based on the ever-popular Ubuntu. The pentesting distro used to be only available within a KDE environment but Gnome become was added as an option with the release of BackTrack v5. For those working in Information Security or intrusion detection, BackTrack is one of the most popular pentesting distros that can run on a live CD or flash drive. The distribution is ideal for wireless cracking, exploiting, web application assessment, learning, or social-engineering a client.
Here is a list of some of the awesome tools available in BackTrack 5r3 (the latest release).
To identify Live Hosts:
dnmap – Distributed NMap
address6 – (which acts as a IPV6 address conversion)
Information Gathering Analysis (Social Engineering)
Jigsaw – Grabs information about company employees
Uberharvest – Email harvester
sslcaudit – SSL Cert audit
VoIP honey – VoIP Honeypot
urlcrazy – Detects URL typos used in typo squatting, url hijacking, phishing
Web Crawlers
Apache_users – Apache username enumerator
Deblaze – Performs enumeration and interrogation against Flash remote end points
Database Analysis
Tnscmd10g – Allows you to inject commands into Oracle
BBQSQL – Blind SQL injection toolkit
* If you are interested in Database Security see our Hacker Halted summary here.
Bluetooth Analysis
Blueranger – Uses link quality to locate Bluetooth devices
Vulnerability Assessment
Lynis – Scans systems & software for security issues
DotDotPwn – Directory Traversal fuzzer
Exploitation Tools
Netgear-telnetable – Enables Telnet console on Netgear devices
Terminator – Smart Meter tester
Htexploit – Tool to bypass standard directory protection
Jboss-Autopwn – Deploys JSP shell on target JBoss servers
Websploit – Scans & analyses remote systems for vulnerabilities
Wireless Exploitation Tools
Bluepot – Bluetooth honeypot
Spooftooph – Spoofs or clones Bluetooth devices
Smartphone-Pentest-Framework
Fern-Wifi-cracker – Gui for testing Wireless encryption strength
Wi-fihoney – Creates fake APs using all encryption and monitors with Airodump
Wifite – Automated wireless auditor
Password Tools
Creddump
Johnny
Manglefizz
Ophcrack
Phrasendresher
Rainbowcrack
Acccheck
smbexec

2. Like BackTrack, NodeZero is an Ubuntu based distro used for penetration testing using repositories so every time Ubuntu releases a patch for its bugs, you also are notified for system updates or upgrades. Node Zero used to be famous for its inclusion of THC IPV6 Attack Toolkit which includes tools like alive6, detect-new-ip6, dnsdict6, etc, but I think that these days BackTrack 5r3 also includes these tools.

Whereas BackTrack is touted as being a “run-everywhere” distro, i.e. running it live, NodeZero Linux (which can also be run live) state that the distros real strength comes from a hard install. NodeZero, in their own words, believe that a penetration tester “requires a strong and efficient system [achieved by using] a distribution that is a permanent installation, that benefits from a strong selection of tools, integrated with a stable Linux environment. Sounds cool. Ever tried it? Let us know in the comments below.

3. BackBox is getting more popular by the day. Like BackTrack and NodeZero, BackBox Linux is an Ubuntu-based distribution developed to perform penetration tests and security assessments. The developers state that the intention with BackBox is to create a pentesting distro that is fast and easy to use. BackBox does have a pretty concise looking desktop environment and seems to work very well. Like the other distros BackBox is always updated to the latest stable versions of the most often used and best-known ethical hacking tools through repositories.
BackBox has all the usual suspect for Forensic Analysis, Documentation & Reporting and Reverse Engineering with tools like ettercap, john, metasploit, nmap, Social Engineering Toolkit, sleuthkit, w3af, wireshark, etc.

4. Yes, as the name clearly suggests, this is yet another distro that is based on Ubuntu. Here is a list of Security and Penetration Testing tools – or rather categories available within the Blackbuntu package, (each category has many sub categories) but this gives you a general idea of what comes with this pentesting distro: Information Gathering, Network Mapping, Vulnerability Identification, Penetration, Privilege Escalation, Maintaining Access, Radio Network Analysis, VoIP Analysis, Digital Forensic, Reverse Engineering and a Miscellaneous section. This list is hardly revolutionary but the tools contained within might be different to the other distros.

5. This is a live Linux distro that has been pre-configured with some of the best of open source and free tools that focus on testing and attacking websites. (The difference with Samurai Web Testing Framework is that it focuses on attacking (and therefore being able to defend) websites. The developers outline four steps of a web pen-test. These steps are incorporated within the distro and contain the necessary tools to complete the task.
Step 1: Reconnaissance – Tools include Fierce domain scanner and Maltego.
Step 2: Mapping – Tools include WebScarab and ratproxy.
Step 3: Discovery – Tools include w3af and burp.
Step 4: Exploitation – Tools include BeEF, AJAXShell and much more.

Of interest as well, the Live CD also includes a pre-configured wiki, set up to be a central information store during your pen-test.
The Samurai Web Testing Framework is a live Linux distro that focuses on web application vulnerability research and web pentesting within a “safe environment” – i.e. so you can ethical hack without violating any laws. This is a pentesting distro recommended for penetration testers who wants to combine network and web app techniques.

6. This distro is based on Debian and originated in Germany. The architecture is i486 and runs from the following desktops: GNOME, KDE, LXDE and also Openbox. Knoppix has been around for a long time now – in fact I think it was one of the original live distros.
Knoppix is primarily designed to be used as a Live CD, it can also be installed on a hard disk. The STD in the Knoppix name stands for Security Tools Distribution. The Cryptography section is particularly well-known in Knoppix.


7. Pentoo is a security-focused live CD based on Gentoo. In their own words “Pentoo is Gentoo with the pentoo overlay.” So, if you are into Pentoo then this is the distro for you. Their homepage lists some of their customized tools and kernel, including: a Hardened Kernel with aufs patches, Backported Wifi stack from latest stable kernel release, Module loading support ala slax, XFCE4 wm and Cuda/OPENCL cracking support with development tools.


8. This penetration distribution is built from Debian Squeeze and uses Fluxbox for its’ desktop environment. This pentesting distro is particularly well adjusted for WiFi hacking since it contains many Wireless tools. Here is a quick summary of WEAKERTH4N’s tool categories: Wifi attacks, SQL Hacking, Cisco Exploitation, Password Cracking, Web Hacking, Bluetooth, VoIP Hacking, Social Engineering, Information Gathering, Fuzzing, Android Hacking, Networking and Shells.



9. This linux distro is, I believe, is the first security distribution based directly on Debian, (after WEAKERTH4N?) if I am wrong please comment below! There are 300 security tools to work, called “arsenals”. The arsenals allow for penetration testing, ethical hacking, system and network administration, security testing, vulnerability analysis, cyber forensics investigations,  exploiting, cracking and data recovery. The last category, data recovery, doesn’t seem to be prevalent in the other distros.


10. The latest version is DEFT 7 which is based on the new Linux Kernel 3 and the DART (Digital Advanced Response Toolkit). This distro is more orientated towards Computer Forensics and uses LXDE as desktop environment and WINE for executing Windows tools under Linux. The developers, (based in Italy) hope that their distro will be used by the Military, Police, Investigators, IT Auditors and professional penetration testers. DEFT is an abbreviation for “Digital Evidence & Forensic Toolkit”


11. A reader to our blog suggested to add CAINE which we duly have. CAINE Stands for Computer Aided Investigative Environment, and like many information security products and tools – it is Italian GNU/Linux live distribution. CAINE offers a comprehensive forensic environment that is organized to integrate existing software tools that are composed as software modules, all displayed within a friendly graphical interface. CAINE states to have three objectives. These are, to ensure that the distro works in an interoperable environment that supports the digital investigator during the four phases of the digital investigation. Secondly that the distro has a user friendly graphical interface and finally that it provides a semi-automated compilation of the final forensic report. As you would likely expect, CAINE is fully open-source.

12. Bugtraq is another reader submitted pentesting distro. Based on the 26.6.38 kernel, this distro offers a really wide range of penetration and forensic tools. Like most of the others in this list, Bugtraq can hard-install of obviously run as a Live DVD or from a USB drive. Bugtraq claims to have recently configured and updated the kernel for better performance but also importantly so that it can recognize more hardware, including wireless injection patches pentesting. The team at Bugtraq seem solid because they are clearly making an effort to get the kernel to work with more hardware – something which the other distributions don’t always place enough importance.

Some of the special features included with Bugtraq include (as stated) an expanded range of recognition for injection wireless drivers, (i.e. not just the usual Alfa rtl8187), a patched 2.6.38 kernel and solid installation of the usual suspects: Nessus, OpenVAS, Greenbone, Nod32, Hashcat, Avira etc.
Unique to Bugtraq (as claimed on their site) is the ability to, or better said, ease, of deleting tracks and backdoors. Just by having read about Bugtraq I’m really glad that I can add this to the list because it just sounds like a job well done. If you are interested in any of the following pentesting and forensic categories, then do go and check out Buqtraq: Malware, Penetration Shield, Web audit, Brute force attack, Communication and Forensics Analytics, Sniffers, Virtualizations, Anonymity and Tracking, Mapping and Vulnerability detection.
Quick Summary: You can’t go wrong with any Ubuntu based distro. BackTrack does the job well but I guess, of course, it’s all personal – i.e. does the distro do the job for you? Every penetration tester needs a lean towards a particular tool or tool-set. Frankly they are all good, and it would be prudent to use several of these pentesting distros as live versions. For WiFi hacking then WEAKERTH4N is likely your better friend, whilst to stay within the law, use Samurai.
Bugtraq looks really good – the team behind it seems to have taken considerable time to tick all the boxes. Once we test it I’ll update the post.
Here is a list of other distros (which we think are still alive and kicking – please correct us if we are wrong).
Other Distro’s
Damn Vulnerable Linux (reader comment: more of an operating system for attacking purposes)
Hakin9 (an educational and training distro that you can use to play-along with when subscribing to the Hacking Magazine Hak9)
Helix
nUbuntu
Network Security Toolkit (NST)
OWASP Labrat
Frenzy
grml
Ophcrack
FCCU
OSWA Assistant
Russix
Chaox-NG
GnackTrack
Katana
Securix-NSM
Auditor
And here is a list of distros that, regrettably, have passed on to Linux Heaven.
KCPentrix
Protech
FIRE
Arudius
INSERT
Local Area Security (LAS)
NavynOS
Operator
PHLAK
PLAC
SENTINIX
Talos
ThePacketMaster
Trinux
WarLinux
Whoppix
WHAX
HeX
Stagos FSE
SNARL

Specifications for CAT5, CAT6 and CAT6e Cables

Category 5, 5e, 6, and 6e are progressively enhanced specifications for the Ethernet over twisted-pair cables. These networking cables contain several pairs of wires twisted together in order to reduce signal interference. Ethernet cables typically use an 8P8C (eight positions, eight contacts) modular connector and a common wiring schematic referenced by the Telecommunications Industry Association.




  1. Category 5

    • Category 5 transmits at 100MHz frequencies, providing a rated line speed of up to 100Mbit/s and a max cable segment length of 100 meters. Most Category 5 cables, designed for early networks, only used two twisted pairs. Older Category 5 cables continue to make up the bulk of the world’s network infrastructure.

    Category 5e

    • An improved specification to Category 5 was later introduced. By reducing noise and signal interference, Category 5e was capable of increasing rated transfer speeds to 350 Mbit/s over 100 meters. The new standard also required all cables to include four twisted pairs (all eight contacts). An optimized encoding scheme allows up to 50-meter lengths of Category 5e cable to perform at, or near, Gigabit Ethernet (1000BASE-T) speeds.

    Category 6

    • The mainstream adoption of Gigabit Ethernet (1000BASE-T) required new industry-standard cables capable of transmitting at a higher frequency of 250 MHz. Category 6 cable uses thicker-gauge wire, increased shielding, and more pair twists per inch to reduce signal noise and interference. The tighter specifications guarantee that 100-meter runs of Category 6 are capable of 1000 Mbit/s transfer speeds. 10-Gigabit Ethernet speeds are achievable when reducing cable lengths to less than 50 meters.

    Category 6e

    • Category 6 Enhanced (6e) is an augmented specification designed to double transmission frequency to 500 MHz. By wrapping Category 6e in grounded foil shielding, full 10-Gigabit Ethernet speeds can be reached without sacrificing the max cable length of 100 meters.

    Ethernet Cable Wiring Specification

    • All Ethernet cables use either the T568A or T568B wiring standard. Mixing multiple cables is permitted, but using a different wiring standard on each end of a single cable will result in an Ethernet crossover cable.
      T568A
      Pin 1 – White/Green – Pair 3, tip
      Pin 2 – Green– Pair 3, ring
      Pin 3 – White/Orange – Pair 2, tip
      Pin 4 – Blue – Pair 1, ring
      Pin 5 – White/Blue – Pair 1, tip
      Pin 6 – Orange – Pair 2, ring
      Pin 7 – White/Brown – Pair 4, tip
      Pin 8 – Brown – Pair 4, ring
      T568B
      Pin 1 – White/Orange – Pair 2, tip
      Pin 2 – Orange – Pair 2, ring
      Pin 3 – White/Green – Pair 3, tip
      Pin 4 – Blue – Pair 1, ring
      Pin 5 – White/Blue – Pair 1, tip
      Pin 6 – Green – Pair 3, ring
      Pin 7 – White/Brown – Pair 4, tip
      Pin 8 – Brown – Pair 4, ring
Wednesday, December 18, 2013

Chassis

Chassis
Alternatively referred to as the computer case and sometimes referred to as the system unit or base unit, the chassis is the housing that helps protect and organize all the components that make up your computer. In the picture to the right, is an empty computer chassis.

Why do we need a computer case?
Most people overlook the computer case as just a box, but it does provide the below important features.

·         Structure - The case is what holds everything together in a compact and organized fashion.
·         Protection - Without the case, each of the sensitive components within the computer would be vulnerable to dirt, foreign objects, kids, animals, as well as electrical interference.
·         Cooling - The case helps keep the air properly flowing over all components, which keeps everything cool and running properly.
·         Noise - Many computers and components have fans that generate noise. Having those components within a confined case reduces the overall noise.
·         Aesthetics - Although some may disagree, most people would rather look at the case instead of all the circuit boards, wires, and all the components of a computer.


Monday, December 16, 2013
1U - 7U
The 1U, 2U, 3U, 4U, 5U, 6U and 7U are all different sized rackmount servers; the U following the number is short for unit. The number indicates the size of the rackmount, 1U being the smallest rackmount and 7U being the biggest rackmount. Below is a listing of each of the different units and their dimensions, although theWidth and Height of a rackmount may be standard, the depth of a rackmount may change, as can be seen below. If your rackmount server is going to be placed in a constrained area, it's best to verify with the manufacturer of the rackmount what the exact dimensions are. In the picture to the right, is a picture Courtesy of Dell Inc. of some of the DellPowerEdge servers and examples of different rackmount units.

Unit
Dimension (W x H x D)
1U
19" x 1.75" x 17.7"
19" x 1.75" x 19.7"
19" x 1.75" x 21.5"
2U
19" x 3.5" x 17.7"
19" x 3.5" x 20.9"
19" x 3.5" x 24"
3U
17.1" x 5.1" x 25.5"
4U
19" x 7" x 17.8"
19" x 7" x 26.4"
5U
19" x 8.34" x 19.67"
19.1" x 8.75" x 26.4"
6U
19" x 10.5" x 19.5"
7U
17" x 12.2" x 19.8"
Most collocations and ISPs accept 1U, 2U or 5U chassis; however, it is still a good idea to check with whomever is planning to host your server to verify what they support and at what cost.


Pageviews

Followers

Powered by Blogger.

- Copyright © 2013 Selva Sharing -Selvasharing- Powered by Blogger - Designed by @ Access -