Looking for a decent camcorder these days is a real mess as there are hundrends of cameras out there with lots of characteristics, specifications and features. I recently came down to Sony HDR-CX220E Handycam with Full HD recording which I bought for 230€ (approx. 300$).
Unboxing the Camera
When opening the pack, you will find inside the CX220E camera, battery, USB extension cable, HDMI cable and user manual (printed, no CD or DVD is included). [Read More...]
Although VMware Workstation is a commercial program, you can still perfom this installation on VMware’s FREE VMware player.
BackTrack Linux is an Ubuntu based operating system that is distributed for free. It is primarily used for security auditing, and penetration testing and comes with a respective number of security assesment tools.
The following video will show you how you can easily run BackTrack 5 R3 as a live CD through VMware every time you power on the specific vm. In order to copy with the installation you must download: [Read More...]
In order to start an SQL injection attack, we must find a vulnerable website. You can use “inurl:” command for Google in order to find vulnerable links from websites like wordpress, joomla etc. With a quick search on “item.php?id=” we find that http://www.noborder.org/item.php?id=480 seems like a vulnerable link, in order to confirm we must type http://www.noborder.org/item.php?id=480′. If browser shows the following message:
Error: You have an error in your SQL syntax; check the manual that corresponds to your MySQL server version for the right syntax to use near ”’ at line 1
then it is most likely that this is a good candidate to perform an sql injection.
We are going to use Backtrack along with sqlmap for this tutorial. Open up sqlmap from your Backtrack installation. [Read More...]
I have been trying to figure out how to save my data from being lost with my old LACIE external hard drive. Tha fact is, I’ ve misused it so much, I found it difficult to even transfer my files to a brand new Western Digital My Passport external HD 2.5″ 500GB. A pouch case would be a good solution, but I though it would be better to add more protection, specifically from drops. While looking online I fell on the Western Digital Nomad Rugged Hard Drive Case which looked perfect.
The Western Digital Nomad has a polycarbonate exterior and padded interior to protect the hard drive within. This is a specialized enclosure; it only works with the Western Digital My Passport series of 2.5-inch external hard drives. [Read More...]
The concept of iptables operation includes a simple configuration but somehow sophisticated operation architecture as well. Iptables are based on rules that the security policy need to imply on a firewall. Packet trafficking in iptables is being performed by taking under consideration tables, chains, rules and targets.
Chains in iptables are basically used for defining direction hook points through the kernel process. Chains have three sequences of directions, INPUT, FORWARD and OUTPUT.
Going back through history, one can infer that the concept of keeping out attackers and intruders is thousands of years old. The Great Wall that the Chinese empire built almost two thousand years ago, served this kind of concept keeping foreigners outside these walls. Furthermore, a building that one can meet more commonly in the European area is the castle. Castles firstly appeared in the middle ages and they were concealed by high walls that were able to confront enemy armies and invaders. This concept of concealing an area of great interest finds great implementation in network security in a more modern setting with the use of firewalls.