We CyberGuard Solutions, are headquartered at Chandigarh, India .The main activity of CyberGuard Solutions is providing solutions for Network Design, Network Security, Penetration Testing & Training.
Read more at corporate-cyber.livejournal.com
- Welcome to LiveJournal
- Current Mood:
- creative
- Current Music:
- FRNK Radio
Here are ways to help you customize your journal:
- Change the look of your journal to make it look the way you want it.
- Upload Userpics and let other people know that you mean business.
Ready to start writing? There are many ways in which you can post:
When you post an entry, you can use an "LJ-Cut" to hide
everything underneath it with a link. This is useful for really long
entries, hiding spoilers, and is usually done as a courtesy for your
friends' Friends page.- Private: The eyeball by entries like this one means that only you can see it.
- Friends-Only: The lock means only people you've added as a friend can see this post. You can also create custom friend groups so only a select few can read your entry.
Other ways to post an entry:
Mobile Post - Post photos and text from your mobile phone.
Voice Post - Say your post over the phone and we'll magically post the audio to your journal.
TxtLJ - Interact and post via text message.
LJ Talk - Post to your journal with LiveJournal's instant messaging feature.Discover LiveJournal's true sense of community:
- Find people by Interest - Do you like fluffy bunnies? Well, so do 272 other people on LiveJournal.
Use LiveJournal for you mobile device:
- LiveJournal Mobile – use LJ’s mobile opportunities.
Tags: livejournal, welcome
- How to Secure Windows XP, Windows 7 using Syskey Password
Syskey password protection is used to make you windows more secure as syskey password prompt open before windows login screen.
It is a utility that encrypts the hashed password information in a SAM database in a Windows system using a 128-bit encryption key.
Check out the Video.
For more info. on Syskey.
- Trojan: Functionality & Behavior ( using Let me rule v2.0 )
A Trojan, is malware that appears to perform a desirable function for the user prior to run or install, but ( perhaps in addition to the expected function) steals information or may take control over the system or harms the system.
Lets check out in the video how it works.
For more info. on trojan, Click Here.
- Scanning: How to Scan your network using N-Map and Advance IP Scanner
Scanning a network is used for checking or monitoring purpose, i.e how many systems are used in your network, which services are they running, which ports are open and closed. In Security field, Penetration testers job is to Secure the network and systems for that they use to scan the network for checking open ports and services which can be vulnerable and will help an attacker to exploit the network or machine.
Here is a video which shows how to use Nmap and Advance IP scanner.
- Google-ing
Google Hacking does not mean stealing data from Google or hacking Google’s databases, rather it means the art of using Google or using Google operators for enhancing your search. Through Google operators you can make the best use of Google’s Search engine so that you are provided with the most optimized result.
The video shows some of the most commonly used Google keywords.
Basic Search Operators:
Phrase search (“”)
Used for Finding an Exact Match. For eg, a search for [“Wireless Hacking“] (with quotes)
will miss the pages that refer to WiFi Hacking.Terms you want to exclude (-)
Use the Minus Sign to mention Negative Keywords. For example, when you search for
[Cyberguard -news - images] you will get a result of all pages which mentioned Cyberguard on
there page and no mention of the word “image & news”.Fill in the blanks (*)
The *, or wildcard, is a little-known feature that can be very powerful. If you include *
within a query, it tells Google to try to treat the star as a placeholder for any unknown
term(s) and then find the best matches, like in Windows Search box.The OR operator
As the Name suggests, if you place an OR operator between 2 keywords, it will find pages
which contain either of the keyword.Advanced Operators:
Cache:
Used to Fetch the Google’s Cache of the Webpage.Link:
Finds All the Web Pages which link to the Web Page in question.Related:
Displays Web Pages which are related to the Web page in question.Info:
Displays all the Information Google has about the website.Site:
Used to conduct Site Specific Queries.Intitle:
Searches for the Keyword in Titles of All Web Pages.Inurl:
Searches for the keyword in URL.
There are numerous Google operators, you can find their actual working in Google Advanced Search option.
- Steganography using Windows Command Prompt (cmd)
In this video we are going to show you how to use command prompt as your steganographic tool, i.e. you can hide a important piece of information behind an image without letting anyone know.
Lets check out in the video !.
- Sniffing: Hacking telnet password using Backtrack 5 – Ettercap-GTK
In this video we will show you how to sniff or hack the telnet passwords using ettercap in Backtrack Operating System.
For this we require two machines for telnet communication, and a third system i.e Hacker’s System using Backtrack, Blackbuntu or any other modified linux OS having ettercap installed.
See the Video Tutorial…
For info. on sniffing..Click here.For info. on Telnet..Click here.
For Downloading Backtrack.
For Downloading Ettercap for Linux users only.
- Steganography using S-Tools : Hiding a Text file behind an Image
Steganography means art of hiding information. Eg. A very common usage of steganography is hiding text behind an image.
This can be done with the help of S-Tools, you can download them from Here.
The video Demonstrates how to use S-Tools for hiding a text file behind an Image.
- Metasploit: Hacking Windows XP professional SP1,SP2,SP3 using ms087_067_NETAPI Exploit
This video demonstrates how to create a new user on windows machine remotely with the help of metasploit.
Before watching this video you should be familiar with basics of metasploit & Linux.
However the video has been made in a way that is very much easy to understand for beginners.
Metasploit is a open source framework which comes with preloaded exploits, that is used by penetration testers and computer security experts for vulnerability assessment and penetration testing.
For downloading metasploit for windows. Click Here
For any queries contact us @ cybrguard@gmail.com
- Distance Learning
CyberGuard’s Computer Based Training (CGCBT) is a Distance Learning Programme from CyberGuard which comes with a series of best video tutorials, tools and documentation on Ethical Hacking & Network Security.
Salient Features
- Covers tutorials from beginners to experts.
Our tutorials contains video for all kind of learners, i.e. from beginners to experts.
- Top quality training and tutorials.
Our video training technology and techniques are made by professional editors for showing our content in the best manner for successful learning.
- A wide selection of latest topics and Softwares.
You will be provided with the latest software’s in the DVD’s and current topics on security loopholes and vulnerabilities etc.
- Learn at your own pace: Play, pause, rewind.
You can watch our tutorials on Desktop, Laptop, TV and even on mobile phones.
- Searchable closed captions.
Videos will be played with subtitles n captions for people with hearing impairments and for easy understanding.
- Stay up to date and keep your skills sharp.
Up to date latest ethical hacking and security techniques. Latest videos on our website and YouTube channel every week.
- Learn from Experienced instructors.
Tutorials are made by expertise in field of Network Security, Vulnerability Assesment and Penetration testing. We have CCIE, MCITP and RHCE experts in our Team.
- Gain Confidence and Marketability.
Be an IT Security analyst with complete knowledge of Computer security.
- Economic training.
The price you pay here is very much less than career growth in this feild.
- Online Technical support.
You will be provided technical support staff for any doubt and queries, you can have a telephonic conversation or for practical problems you can connect us remotely with team viewer.
- Online Chat option with our faculties.
This option is for having chat with our faculty regarding any technical doubts and queries.
- Socially available
You can connect with us on our website with SOCIAL+ or any social networking media, i.e Facebook, Twitter, Google+,YouTube,LinkedIn.
- Certification of Completion
You will be given a certificate of completion after the course is complete and you clear our online examination whose value will be globally recognized.
Computer Based Training for Ethical Hacking.
Computer Based Training for Network Security.
No comments:
Post a Comment