Snort 2.9.2 installation on RHEL 6.2

Threats against an organization's information and integrity are more abundant and insidious than ever, with more than 8 million viruses and other forms of attack added in the last 12 months alone. As a result, organizations continue to turn to intrusion detection and prevention systems as foundational controls for an in-depth defense against identified attacks — while ensuring legitimate traffic reaches its intended destination for continued business operation.

This article describes the process of setting up a Snort Intrusion Detection System 2.9.2 (IDS) with Red Hat Enterprise Linux (RHEL) Server 6.2 on x86/64 hardware. 

Fake Research Papers BOTNET

Computer

More than 120 computer-generated "gibberish" research papers are being removed from the archives of scientific journal publishers Springer and the Institute of Electrical and Electronic Engineers (IEEE) after a French computer scientist determined the papers were fakes.

Intrusion Detection System with Bash

1. Introduction

For most of us WEP encryption has become a joke.  WPA is quickly going the same way thanks to many tools such as Aircrack-ng. On top of this, wired networks are no strangers to unwanted guests as well.  Anyone serious about security should have a good Intrusion Detection system in their toolbox.

Building a cheap and powerful intrusion-detection system


Snort and BASE

Two packages necessary for creating an effective open-source database areSnort and BASE (Basic Analysis Security Engine). BASE is built on the work of the defunct Analysis Console for Intrusion Databases (ACID) project.

Avoid PISHING attacks

Half of all Internet users report receiving one or more of the 100 Billion spam emails sent every day around the world. Phishing emails can look and sound very convincing, and the web sites they link to are often near-perfect replicas of those of the company they are imitating.What can be done to avoid being caught?

How to Fix an Overheating Computer

If your computer is overheating, it is most naturally a sign that something is wrong with your computer, either software related or most naturally hardware related. In this article we will go through some basic troubleshooting steps to determine what the cause is and most importantly how to fix it.
An overheating computer could be the symptom of a virus.

Turn Off The Location Services On Facebook

Geolocation services certainly have their place on social media. Those location services make it easy for your friends to find you and catch up with you during the day. Unfortunately, those same services can draw the bad guys right to your door.

Be Careful With Free Text Alerts

You may have heard this message on a radio station in your city: “For breaking newstext alerts, text the word ‘news’ to…” Or your bank may tell you how you can get free text alerts about your checking account. Is it a good idea to sign up for free text alerts from a business?

Network Intrusion Detection System?

To understand what is a network intrusion detection system one should first know what intrusion is. When a hacker tries to make way into your system, it is known as intrusion, and a network intrusion detection system is a system, which detects such intrusions. The word network is used for this system, because it keeps an eye on packets on a network wire and its main objective is to find out whether a cracker or a hacker is breaking into your system. It analyzes the traffic on your network to monitor signs of different malicious activity.

Things to do online when bored!!



There are millions and millions of websites, web services available online. But, it is hard to find them at one place. Each user uses on an average 25 websites that they login and check every day.
we started a blog named, "1001 fun things to do online ", with an objective to post an acitvity to do online - linking to the best website, web service available to do that job. One activity, one web site, every day of the year until we reach the 1001 things .
So, far the count has reached a cool 101 - each post provides a web link, and gives a 3 line descritption what it is about and why it would be truly helpful to you.
I have compiled an exhaustive list of the first 101 things that we blogged out in this collection. You can bookmark this, digg this or del.icio.us this. Enjoy!

Replace the Windows Task Manager With A More Powerful Alternative


windows-task-managerThe Windows Task Manager has always been an inconvenient and incomplete task manager for advanced users and network administrators. Advanced users need advanced and detailed monitoring and analysis of the processes and services running in Windows. The Power users have always preferred advanced third party task manager which can give them more details about the running system.

Ways To Find The Perfect Images On Web


Images constitute a large percentage of the digital content and perhaps are the most used ones. If you are a content creator and are looking for places to find the perfect images for your content, here are some of the best web tools that provide an aptly designed search engine for all kind of images available online.

How to Add Safe Mode to The Windows 8 Boot Menu


win8boot-resultSafe mode is something present in every Windows version since Windows 95 came out. It has helped millions of geeks diagnose issues with their systems by loading only the bare essentials required for Windows to run. This mode, although convenient on its own, is annoying to access and might really bum out those who don’t have the patience to try loading it with the “F8″ key on their keyboards. Early versions of the software don’t show a lot of promise to making this process any easier. It seems like you’re going to have to get around this. With Windows 8, you can actually add the option to start in safe mode to the boot menu when you turn on your computer. Let’s see how!

How to Check If A Website is Safe for Browsing


Safe-malwareIt used to be that we would get funny and interesting links shared with us through numerous emails. Now, more often than not, we get those same links shared on Facebook. No matter how you get these links, though, if you’ve been burned by opening up a bad site before, it makes you somewhat leery to end up in that position again. No one wants to get phished or run into malware and get personal information stolen.
It leaves you in a quandary; should you just go ahead and open the link your friend posted and hope for the best, or should you not even try out of fear of being phished or worse? There are actually a few different ways to tell if a website is safe, for both desktop and mobile devices.

How To Use Your Android Phone As A Wireless Mouse For Your Computer


andromouse-bannerAndroid phones can do some amazing things. More and  more they are becoming our one-stop device for everything. If you have a computer, you can either pay and buy a wireless mouse, or use a bit of software on your Android phone to do the same thing for free.

Best 101 Free Computer Software For Your Daily Use


Good things in life do not necessarily cost you a bomb. Below I have compiled a list of the top 100 101 free computer software you can make use of.
Enjoy!

12 Reasons to Start Twittering


 reasons:

Facebook Timeline May Be A Threat For Google +


Top 5 Computer Security Risks to Avoid


Computer security is the best way to keep your computer alive and active every time you want to use it without stress. With good computer security measure in place, your computer can perform at the top of its capability without stress on your side. Because of the consequences that will normally occurs when you leave your computer system unsecured will make you to look for a better way to protect it to avoid the unpredictable condition.

How To Create a Torrent File


Torrent is certainly one of the best ways to share a big file online. Websites like The Pirate Bay make the work too easy for all of us so that sharing can become an awesome experience.
The best part I see in torrents is that big files can be shared easily and also with constant breaks making the downloading process easier for all the people who have a slow internet connection.If you also want to create a torrent it is too easy for you to create it and hardly takes a few seconds.

Web Start-Ups Which Will Redefine The Future Of The Web!


Over the last decade the web has proved itself as one of the most profitable ventures as this tends to make people share and put forward their views and also get a lot more than this for no cost. Beyond just communication this has made the platform easier for creation of content and various other things.

VLC Player Neverending Trick


Well VLC player seems to be one of the biggest ever made software for video purposes on the web. Used by million around the world this software can be used for a lot of purposes and even tricks.
One of the funniest and an interesting trick that is well known throughout the web is the never ending screen trick on VLC.

Super Duper Multiplayer Online Games


This post lists some popular massive multiplayer online games. Some of the games are free without subscription or payments. And for others you need to either subscribe or pay for them.
1. Allegiance – Multiplayer 3D real time strategy and player piloted space combat game. Microsoft released this game for windows on March 16, 2000.

10 Great Windows 7 Keyboard Shortcuts


windows-keyboard-shortcuts-mainMany of you have probably been using Windows 7 for quite a while now. It’s really quite a solid operating system, with stability and functionality far exceeding anything Microsoft has offered before. You may, however, be unaware of one of the great productivity advantages that Windows offers you. That is keyboard integration, which is far more advanced than other platforms like Mac OSX. Windows is entirely functional without a mouse cursor, and indeed many features can be accessed much faster through the use of keyboard shortcuts. Hopefully the shortcuts below will be of use to some of you. I know I learnt a few new ones when researching this article!

Access Internet On Your Mobile Using PC's Internet Connection

Access Internet From Mobile Using Computers Internet Connection yes, you read it right.
I am not talking about using mobile to access internet on your PC. Its the opposite I am demonstrating here. 
                      So you will be able to use FREE internet on mobile. Of course, you may need to pay for internet service you use already on PC. Now as with most mobile hacks, this is limited to symbian mobileswhich includes almost all Nokia Series60 and Many Sony Ericsson phones. 

 
Twitter Bird Gadget