Sunday, December 18, 2011

Cyberguard

We CyberGuard Solutions, are headquartered at Chandigarh, India .The main activity of CyberGuard Solutions is providing solutions for Network Design, Network Security, Penetration Testing & Training.

[private post]Welcome to LiveJournal




[info]corporate_cyber

December 13th, 0:00


Current Mood:
creative
Current Music:
FRNK Radio

Here are ways to help you customize your journal:





Ready to start writing? There are many ways in which you can post:



When you post an entry, you can use an "LJ-Cut" to hide
everything underneath it with a link. This is useful for really long
entries, hiding spoilers, and is usually done as a courtesy for your
friends' Friends page.



- Private: The eyeball by entries like this one means that only you can see it.



- Friends-Only: The lock means only people you've added as a friend can see this post. You can also create custom friend groups so only a select few can read your entry.



Other ways to post an entry:

Mobile Post - Post photos and text from your mobile phone.

Voice Post - Say your post over the phone and we'll magically post the audio to your journal.

TxtLJ - Interact and post via text message.

LJ Talk - Post to your journal with LiveJournal's instant messaging feature.



Discover LiveJournal's true sense of community:




Use LiveJournal for you mobile device:



















[private post]How to Secure Windows XP, Windows 7 using Syskey Password




[info]corporate_cyber

December 8th, 7:44


Syskey password protection is used to make you windows more secure as syskey password prompt open before windows login screen.


It is a utility that encrypts the hashed password information in a SAM database in a Windows system using a 128-bit encryption key.


Check out the Video.



For more info. on Syskey.

















[private post]Trojan: Functionality & Behavior ( using Let me rule v2.0 )




[info]corporate_cyber

December 8th, 7:29


Trojan, is malware that appears to perform a desirable function for the user prior to run or install, but ( perhaps in addition to the expected function) steals information or may take control over the system or harms the system.


Lets check out in the video how it works.


 



For more info. on trojan, Click Here.

















[private post]Scanning: How to Scan your network using N-Map and Advance IP Scanner




[info]corporate_cyber

December 8th, 7:22


Scanning a network is used for checking or monitoring purpose, i.e how many systems are used in your network, which services are they running, which ports are open and closed. In Security field, Penetration testers job is to Secure the network and systems for that they  use to scan the network for checking  open ports and services which can be vulnerable and will help an attacker to exploit the network or machine.


Here is a video which shows how to use Nmap and Advance IP scanner.


















[private post]Google-ing




[info]corporate_cyber

December 8th, 7:02


Google Hacking does not mean stealing data from Google or hacking Google’s databases, rather it means the art of using Google or using Google operators for enhancing your search. Through Google operators you can make the best use of Google’s Search engine so that you are provided with the most optimized result.


 The video shows some of the most commonly used Google keywords.



Basic Search Operators:


Phrase search (“”)

Used for Finding an Exact Match. For eg, a search for [“Wireless Hacking“] (with quotes)

will miss the pages that refer to WiFi Hacking.


Terms you want to exclude (-)

Use the Minus Sign to mention Negative Keywords. For example, when you search for

[Cyberguard -news - images] you will get a result of all pages which mentioned Cyberguard on

there page and no mention of the word “image & news”.


Fill in the blanks (*)

The *, or wildcard, is a little-known feature that can be very powerful. If you include *

within a query, it tells Google to try to treat the star as a placeholder for any unknown

term(s) and then find the best matches, like in Windows Search box.


The OR operator

As the Name suggests, if you place an OR operator between 2 keywords, it will find pages

which contain either of the keyword.


Advanced Operators:


Cache:

Used to Fetch the Google’s Cache of the Webpage.


Link:

Finds All the Web Pages which link to the Web Page in question.


Related:

Displays Web Pages which are related to the Web page in question.


Info:

Displays all the Information Google has about the website.


Site:

Used to conduct Site Specific Queries.


Intitle:

Searches for the Keyword in Titles of All Web Pages.


Inurl:


Searches for the keyword in URL.


 


There are numerous Google operators, you can find their actual working in Google Advanced Search option.


 


 

















[private post]Steganography using Windows Command Prompt (cmd)




[info]corporate_cyber

December 6th, 10:59


In this video we are going to show you how to use command prompt as your steganographic tool, i.e. you can hide a important piece of information behind an image without letting anyone know.


Lets check out in  the video !.


 


















[private post]Sniffing: Hacking telnet password using Backtrack 5 – Ettercap-GTK




[info]corporate_cyber

December 6th, 7:16


In this video we will show you how to sniff or hack the telnet passwords using ettercap in Backtrack Operating System.

For this we require two machines for telnet communication, and a third system i.e Hacker’s System using Backtrack, Blackbuntu or any other modified linux OS having ettercap installed.

See the Video Tutorial…




For info. on sniffing..Click here.


For info. on Telnet..Click here.


For Downloading Backtrack.


For Downloading Ettercap for Linux users only.

















[private post]Steganography using S-Tools : Hiding a Text file behind an Image




[info]corporate_cyber

December 5th, 13:35


Steganography means art of hiding information. Eg. A very common usage of steganography is hiding text behind an image.


This can be done with the help of S-Tools, you can download them from Here.


The video Demonstrates how to use S-Tools for hiding a text file behind an Image.


















[private post]Metasploit: Hacking Windows XP professional SP1,SP2,SP3 using ms087_067_NETAPI Exploit




[info]corporate_cyber

December 5th, 13:12



This video demonstrates how to create a new user on windows machine remotely with the help of metasploit.


Before watching this video you should be familiar with basics of metasploit & Linux.


However the video has been made in a way that is very much easy to understand for beginners.



Metasploit is a open source framework which comes with preloaded exploits, that is used by penetration testers and computer security experts for vulnerability assessment and penetration testing.


For downloading  metasploit for windows. Click Here


For any queries contact us @ cybrguard@gmail.com


 

















[private post]Distance Learning




[info]corporate_cyber

December 2nd, 6:27


CyberGuard’s Computer Based Training (CGCBT) is a Distance Learning Programme from CyberGuard which comes with a series of best video tutorials, tools and documentation on Ethical Hacking & Network Security.


Salient Features



  • Covers tutorials from beginners to experts.


Our tutorials contains video for all kind of learners, i.e. from beginners to experts.



  • Top quality training and tutorials.


Our video training technology and techniques are made by professional editors for showing our content in the best manner for successful learning.



  • A wide selection of latest topics and Softwares.


You will be provided with the latest software’s in the DVD’s and current topics on security loopholes and vulnerabilities etc.



  • Learn at your own pace: Play, pause, rewind.


You can watch our tutorials on Desktop, Laptop, TV and even on mobile phones.



  • Searchable closed captions.


Videos will be played with subtitles n captions for people with hearing impairments and for easy understanding.



  • Stay up to date and keep your skills sharp.


Up to date latest ethical hacking and security techniques. Latest videos on our website and  YouTube channel every week.



  • Learn from Experienced instructors.


Tutorials are made by expertise in field of  Network Security, Vulnerability Assesment and Penetration testing. We have CCIE, MCITP and RHCE experts in our Team.



  • Gain Confidence and Marketability.


Be an IT Security analyst with complete knowledge of Computer security.



  • Economic training.


The price you pay here is very much less than career growth in this feild.



  • Online Technical support.


You will be provided technical support staff for any doubt and queries, you can have a telephonic conversation or for practical problems you can connect us remotely with team viewer.



  • Online Chat option with our faculties.


This option is for having chat with our faculty regarding any technical doubts and queries.



  • Socially available


You can connect with us on our website with SOCIAL+ or any social networking media, i.e Facebook, Twitter, Google+,YouTube,LinkedIn.



  • Certification of Completion


You will be given a certificate of completion after the course is complete and you clear our online examination whose value will be globally recognized.


 


Computer Based Training for Ethical Hacking.


Computer Based Training for Network Security.


 

Read more at corporate-cyber.livejournal.com
 

No comments:

Post a Comment