Harnesgear

Out of Gear

Apr 14, 2019

How can I protect myself from viruses and such?

This FAQ answer was written by Theora: The most common viruses are boot sector infectors. You can help protect yourself against those by write protecting all disks which you do not need write access to. Definitely keep a set of write protected floppy system disks. If you get a virus, it will make things much simpler. And, they are good for coasters. Only kidding. Scan all incoming files with a recent copy of a good virus scanner. Among the best are F-Prot, Dr. Solomon's Anti-virus Toolkit, and Thunderbyte Anti-Virus. AVP is also a good proggie. Using more than one scanner could
be helpful. You may get those one or two viruses that the other guy happened to miss this month. New viruses come out at the rate of about 8 per day now. NO scanner can keep up with them all, but the four mentioned here do the best job of keeping current. Any _good_ scanner will detect the majority of common viruses. No virus scanner will detect all viruses.

Right now there are about 5600 known viruses. New ones are written all the time. If you use a scanner for virus detection, you need to make sure you get frequent updates. If you rely on behaviour blockers, you should know that such programs can be bypassed easily by a technique known as tunnelling. You may want to use integrity checkers as well as scanners. Keep in mind that while these can supply added protection, they are not foolproof.

You may want to use a particular kind of scanner, called resident scanners.
Those are programs which stay resident in the computer memory and
constantly monitor program execution (and sometimes even access to the
files containing programs). If you try to execute a program, the resident
scanner receives control and scans it first for known viruses. Only if no
such viruses are found, the program is allowed to execute.
Most virus scanners will not protect you against many kinds of trojans, any
sort of logic bombs, or worms. Theoretically, they _could_ protect you
against logic bombs and/or worms, by addition of scanning strings; however,
this is rarely done.
The best, actually only way, to protect yourself is to know what you have
on your system and make sure what you have there is authorised by you. Make
freqent backups of all important files. Keep your DOS system files write
protected. Write protect all disks that you do not need to write to. If you
do get a virus, don't panic. Call the support department of the company who
supplies your anti-virus product if you aren't sure of what you are doing.
If the company you got your anti-virus software from does not have a good
technical support department, change companies.
The best way to make sure viruses are not spread is not to spread them.
Some people do this intentionally. We discourage this. Viruses aren't cool.

Where can I get more information about viruses?

Assembly lanaguage programming books illustrate the (boring) aspect of
replication and have for a long time. The most exciting/interesting thing
about viruses is all the controversy around them. Free speech, legality,
and cute payloads are a lot more interesting than "find first, find next"
calls. You can get information about the technical aspects of viruses, as
well as help if you should happen to get a virus, from the virus-l FAQ,
posted on comp. virus every so often. You can also pick up on the various
debates there. There are alt.virus type newsgroups, but the level of
technical expertise is minimal, and so far at least there has not been a
lot of real "help" for people who want to get -rid- of a virus.
There are a lot of virus experts. To become one, just call yourself one.
Only Kidding. Understanding viruses involves understanding programming,
operating systems, and their interaction. Understanding all of the 'Cult of
Virus' business requires a lot of discernment. There are a number of good
papers available on viruses, and the Cult of Virus; you can get information
on them from just about anyone listed in the virus-l FAQ. The FTP site
ftp.informatik.uni-hamburg.de is a pretty reliable site for proggies and
text.

Apr 14, 2019

What is a trojan/worm/virus/logic bomb?

This FAQ answer was written by Theora:
Trojan: Remember the Trojan Horse? Bad guys hid inside it until they could get into the city to do their evil deed. A trojan computer program is similar. It is a program which does an unauthorized function, hidden inside an authorized program. It does something other than what it claims to do, usually something malicious (although not necessarily!), and it is intended by the author to do whatever it does. If it's not intentional, its called a 'bug' or, in some cases, a feature :) Some virus scanning programs detect some trojans. Some virus scanning programs don't detect any trojans. No virus scanners detect all trojans.
Apr 14, 2019

What is the Registry?

harnesgear.blogspot.comThe Registry is a database used to store settings and options for the 32 bit versions of Microsoft Windows including Windows 95, 98, ME and NT/2000. It contains information and settings for all the hardware, software, users, and preferences of the PC. Whenever a user makes changes to a Control Panel settings, or File Associations, System Policies, or installed software, the changes are reflected and stored in the Registry.

Apr 14, 2019

How much bandwidth do you need for your website, here all explanation about bandwidth

harnesgear.blogspot.comMost hosting companies offer a variety of bandwidth options in their plans. So exactly what is bandwidth as it relates to web hosting? Put simply, bandwidth is the amount of traffic that is allowed to occur between your web site and the rest of the internet. The amount of bandwidth a hosting company can provide is determined by their network connections, both internal to their data center and external to the public internet.
Apr 14, 2019

What you will do if you hacked a website root?

Ok..... You've been at it for all night. Trying all the exploits you can think of. The system seems tight. The system looks tight. The system *is* tight. You've tried everything. Default passwds, guessable passwds, NIS weaknesses, NFS holes, incorrect permissions, race conditions, SUID exploits, Sendmail bugs, and so on... Nothing. WAIT! What's that!?!? A "#" ???? Finally! After seeming endless toiling, you've managed to steal root. Now what? How do you hold onto this precious super-user privilege you have worked so hard to achieve....? 

What you will do if you hacked a website root?
May 2, 2018

Kick the Hornet's Nest, How to burn drug crops in far cry 3?

Kick the Hornet's Nest is the thirteenth mission of Far Cry 3. This mission is little freaky. I have finished this mission after trying twelve times. But if you follow some trick you can finish this mission in first time. In this mission you have to burn all drug crops one after another. If you don’t follow this sequence, you never could finish killing all enemies. They will grow up all time.
In this mission Jason meet a man in white suit (as Willis Huntley, a CIA agent) to rescue his friends. Jason deal with him that he should destroy Hoyt's drug fields to get help from Willis.
Willis introduces a Flamethrower. Willis gave it Jason to make it easy.

Main Objectives

  • Enter the hut and keep eyes on the strange man(Willis)
  • Follow Willis keeping safe distance
  • Go talk to Willis when he reached his hut
  • Exit the hut
  • Go to drug fields
  • Burn all the drug crops in the area
  • Find the next drug crops and Reach the fishing village
  • Destroy the boat

Playing Procedures

  • You can use the hang glider or parachute to reach the marijuana fields fast. Located at nearby hill around the drug fields. You can also clear nearest enemy outpost that will make you safe way. Then you can also get vehicle from Rakyat member. I have got a vehicle with machine gun from Rakyat member.
  • First fields you will see two enemies with two dogs. You can kill them by an AK47 easily.
  • The crop can be burnt any way the player chooses. It is not mandatory to use the flamethrower. You can use Molotov cocktails or exploding barrels in the hut around the drug field.
  • Then Fire throw to the yellow barrel by an AK47 from safe distance. In the other side of the field you will get flamethrower with some ammo. You can take this now or after some time. Then go next field.
  • If you have sniper you could burst the entire yellow barrel first. Then back to the first field and replace the flamethrower with sniper. Then go throw the second field and kill enemies AK47 and burn missing crops serially. Don’t go next field without finish all crops on that field, otherwise enemy coming will not finish. If you finish one field that will make safe to stay that field.
  • In the last village is most difficult because there is a enemy with bullet protection. You can kill him with flamethrower standing up in the rock. When you run to the boat, the boat will start and run.
  • You can burn the boat with flame thrower or you will found a RPG (Like Rocket Launcher) inside the boat, aim to the boat and destroy it.
  • If the fields are unable to burn, it is recommended to restart the mission and give it some time before attempting it again.

Music

The music played throughout this mission is entitled "Make It Bun Dem" by Skrillex & Damian "Jr. Gong" Marley. After you got to the fields and Jason says "That's a lot of weed." or "Gotta try the flamethrower.” it is played in constant loop until the mission is completed.
Apr 30, 2018

What is internet? Who owned it? What is the component of internet?




The Internet is just a large computer network that connected worldwide. Nobody knows precisely what number of computer and devices are connected with the Internet. But It is sure, that number should be bigger than of million.

No one is in charge of the Internet. There are organizations which develop technical aspects of this network and set standards for creating applications on it, but no governing body is in control. The Internet backbone, through which Internet traffic flows, is owned by private companies.



All computers on the Internet communicate with one another using the Transmission Control Protocol/Internet Protocol suite, abbreviated to TCP/IP. Computers on the Internet use a client/server architecture. This means that the remote server machine provides files and services to the user's local client machine. Software can be installed on a client computer to take advantage of the latest access technology.

An Internet user has access to a wide variety of services: electronic mail, file transfer, vast information resources, interest group membership, interactive collaboration, multimedia displays, real-time broadcasting, shopping opportunities, breaking news, and much more.

The Internet consists primarily of a variety of access protocols. Many of these protocols feature programs that allow users to search for and retrieve material made available by the protocol.


--------------------------------------------------------------------------------

COMPONENTS OF THE INTERNET


--------------------------------------------------------------------------------


WORLD WIDE WEB

The World Wide Web (abbreviated as the Web or WWW) is a system of Internet servers that supports hypertext to access several Internet protocols on a single interface. Almost every protocol type available on the Internet is accessible on the Web. This includes e-mail, FTP, Telnet, and Usenet News. In addition to these, the World Wide Web has its own protocol: HyperText Transfer Protocol, or HTTP. These protocols will be explained later in this document.

The World Wide Web provides a single interface for accessing all these protocols. This creates a convenient and user-friendly environment. It is no longer necessary to be conversant in these protocols within separate, command-level environments. The Web gathers together these protocols into a single system. Because of this feature, and because of the Web's ability to work with multimedia and advanced programming languages, the Web is the fastest-growing component of the Internet.

The operation of the Web relies primarily on hypertext as its means of information retrieval. HyperText is a document containing words that connect to other documents. These words are called links and are selectable by the user. A single hypertext document can contain links to many documents. In the context of the Web, words or graphics may serve as links to other documents, images, video, and sound. Links may or may not follow a logical path, as each connection is programmed by the creator of the source document. Overall, the Web contains a complex virtual web of connections among a vast number of documents, graphics, videos, and sounds.

Producing hypertext for the Web is accomplished by creating documents with a language called HyperText Markup Language, or HTML. With HTML, tags are placed within the text to accomplish document formatting, visual features such as font size, italics and bold, and the creation of hypertext links. Graphics and multimedia may also be incorporated into an HTML document. HTML is an evolving language, with new tags being added as each upgrade of the language is developed and released. The World Wide Web Consortium (W3C), led by Web founder Tim Berners-Lee, coordinates the efforts of standardizing HTML. The W3C now calls the language XHTML and considers it to be an application of the XML language standard.

The World Wide Web consists of files, called pages or home pages, containing links to documents and resources throughout the Internet.

The Web provides a vast array of experiences including multimedia presentations, real-time collaboration, interactive pages, radio and television broadcasts, and the automatic "push" of information to a client computer. Programming languages such as Java, JavaScript, Visual Basic, Cold Fusion and XML are extending the capabilities of the Web. A growing amount of information on the Web is served dynamically from content stored in databases. The Web is therefore not a fixed entity, but one that is in a constant state of development and flux.

For more complete information about the World Wide Web, see Understanding The World Wide Web.

E-MAIL

Electronic mail, or e-mail, allows computer users locally and worldwide to exchange messages. Each user of e-mail has a mailbox address to which messages are sent. Messages sent through e-mail can arrive within a matter of seconds.

A powerful aspect of e-mail is the option to send electronic files to a person's e-mail address. Non-ASCII files, known as binary files, may be attached to e-mail messages. These files are referred to as MIME attachments.MIME stands for Multimedia Internet Mail Extension, and was developed to help e-mail software handle a variety of file types. For example, a document created in Microsoft Word can be attached to an e-mail message and retrieved by the recipient with the appropriate e-mail program. Many e-mail programs, including Eudora, Netscape Messenger, and Microsoft Outlook, offer the ability to read files written in HTML, which is itself a MIME type.

TELNET

Telnet is a program that allows you to log into computers on the Internet and use online databases, library catalogs, chat services, and more. There are no graphics in Telnet sessions, just text. To Telnet to a computer, you must know its address. This can consist of words (locis.loc.gov) or numbers (140.147.254.3). Some services require you to connect to a specific port on the remote computer. In this case, type the port number after the Internet address. Example: telnet nri.reston.va.us 185.

Telnet is available on the World Wide Web. Probably the most common Web-based resources available through Telnet have been library catalogs, though most catalogs have since migrated to the Web. A link to a Telnet resource may look like any other link, but it will launch a Telnet session to make the connection. A Telnet program must be installed on your local computer and configured to your Web browser in order to work.

With the increasing popularity of the Web, Telnet has become less frequently used as a means of access to information on the Internet.

FTP

FTP stands for File Transfer Protocol. This is both a program and the method used to transfer files between computers. Anonymous FTP is an option that allows users to transfer files from thousands of host computers on the Internet to their personal computer account. FTP sites contain books, articles, software, games, images, sounds, multimedia, course work, data sets, and more.

If your computer is directly connected to the Internet via an Ethernet cable, you can use one of several PC software programs, such as WS_FTP for Windows, to conduct a file transfer.

FTP transfers can be performed on the World Wide Web without the need for special software. In this case, the Web browser will suffice. Whenever you download software from a Web site to your local machine, you are using FTP. You can also retrieve FTP files via search engines such as FtpFind, located at /http://www.ftpfind.com/. This option is easiest because you do not need to know FTP program commands.

E-MAIL DISCUSSION GROUPS

One of the benefits of the Internet is the opportunity it offers to people worldwide to communicate via e-mail. The Internet is home to a large community of individuals who carry out active discussions organized around topic-oriented forums distributed by e-mail. These are administered by software programs. Probably the most common program is the listserv.

A great variety of topics are covered by listservs, many of them academic in nature. When you subscribe to a listserv, messages from other subscribers are automatically sent to your electronic mailbox. You subscribe to a listserv by sending an e-mail message to a computer program called a listserver. Listservers are located on computer networks throughout the world. This program handles subscription information and distributes messages to and from subscribers. You must have a e-mail account to participate in a listserv discussion group. Visit Tile.net at /http://tile.net/ to see an example of a site that offers a searchablecollection of e-mail discussion groups.

Majordomo and Listproc are two other programs that administer e-mail discussion groups. The commands for subscribing to and managing your list memberships are similar to those of listserv.

USENET NEWS

Usenet News is a global electronic bulletin board system in which millions of computer users exchange information on a vast range of topics. The major difference between Usenet News and e-mail discussion groups is the fact that Usenet messages are stored on central computers, and users must connect to these computers to read or download the messages posted to these groups. This is distinct from e-mail distribution, in which messages arrive in the electronic mailboxes of each list member.

Usenet itself is a set of machines that exchanges messages, or articles, from Usenet discussion forums, called newsgroups. Usenet administrators control their own sites, and decide which (if any) newsgroups to sponsor and which remote newsgroups to allow into the system.

There are thousands of Usenet newsgroups in existence. While many are academic in nature, numerous newsgroups are organized around recreational topics. Much serious computer-related work takes place in Usenet discussions. A small number of e-mail discussion groups also exist as Usenet newsgroups.

The Usenet newsfeed can be read by a variety of newsreader software programs. For example, the Netscape suite comes with a newsreader program called Messenger. Newsreaders are also available as standalone products.

FAQ, RFC, FYI

FAQ stands for Frequently Asked Questions. These are periodic postings to Usenet newsgroups that contain a wealth of information related to the topic of the newsgroup. Many FAQs are quite extensive. FAQs are available by subscribing to individual Usenet newsgroups. A Web-based collection of FAQ resources has been collected by The Internet FAQ Consortium and is available at /http://www.faqs.org/.

RFC stands for Request for Comments. These are documents created by and distributed to the Internet community to help define the nuts and bolts of the Internet. They contain both technical specifications and general information.

FYI stands for For Your Information. These notes are a subset of RFCs and contain information of interest to new Internet users.

Links to indexes of all three of these information resources are available on the University Libraries Web site at /http://library.albany.edu/reference/faqs.html.

CHAT & INSTANT MESSAGING

Chat programs allow users on the Internet to communicate with each other by typing in real time. They are sometimes included as a feature of a Web site, where users can log into the "chat room" to exchange comments and information about the topics addressed on the site. Chat may take other, more wide-ranging forms. For example, America Online is well known for sponsoring a number of topical chat rooms.

Internet Relay Chat (IRC) is a service through which participants can communicate to each other on hundreds of channels. These channels are usually based on specific topics. While many topics are frivolous, substantive conversations are also taking place. To access IRC, you must use an IRC software program.

A variation of chat is the phenomenon of instant messaging. With instant messaging, a user on the Web can contact another user currently logged in and type a conversation. Most famous is America On-line's Instant Messenger. ICQ, MSN and Yahoo are other commonly-used chat programs.

Other types of real-time communication are addressed in the tutorial Understanding the World Wide Web.

MUD/MUSH/MOO/MUCK/DUM/MUSE


MUD stands for Multi User Dimension. MUDs, and their variations listed above, are multi-user virtual reality games based on simulated worlds. Traditionally text based, graphical MUDs now exist. There are MUDs of all kinds on the Internet, and many can be joined free of charge.