Tuesday, December 28, 2010

RSS Feeds

RSS (most commonly expanded as Really Simple Syndication) is a family of web feed formats used to publish frequently updated works—such as blog entries, news headlines, audio, and video—in a standardized format. An RSS document (which is called a "feed", "web feed", or "channel") includes full or summarized text, plus metadata such as publishing dates and authorship. Web feeds benefit publishers by letting them syndicate content automatically.

Rather than checking your favorite blogs and news sites every day for updates, you can subscribe to a feed so that all the content from those sites comes to you. Software that checks feeds for updates and sends them to you is called a "feed reader".
Feeds come in a few different formats, the most common being RSS (Really Simple Syndication). Other formats include Atom and XML. Any good feed reader can accept any of these formats.

How Can I Find a Feed?

Websites that have an available feed you can subscribe to typically will show one of the following icons in the browser toolbar:
How it Works
The feed or RSS icon shows that there is content on that page or site that you can subscribe to through a feed reader. By clicking on the icon you can look at the feed and see what kind of content is there.

You can create feed for any page using page2rss.com.But reading feeds regularly may be a problem.Some prefer the feed to be delivered to their inbox.In that case you can visit feedmyinbox.com which sends feeds to your inbox for free.

Monday, December 13, 2010

TCP/IP protocols--various protocols

TCP/IP is a large collection of different communication protocols.

A Family of Protocols

TCP/IP is a large collection of different communication protocols based upon the two original protocols TCP and IP.

TCP - Transmission Control Protocol

TCP is used for transmission of data from an application to the network.
TCP is responsible for breaking data down into IP packets before they are sent, and for assembling the packets when they arrive.

IP - Internet Protocol

IP takes care of the communication with other computers.
IP is responsible for the sending and receiving data packets over the Internet.

HTTP - Hyper Text Transfer Protocol

HTTP takes care of the communication between a web server and a web browser.
HTTP is used for sending requests from a web client (a browser) to a web server, returning web content (web pages) from the server back to the client.

HTTPS - Secure HTTP

HTTPS takes care of secure communication between a web server and a web browser.
HTTPS typically handles credit card transactions and other sensitive data.

SSL - Secure Sockets Layer

The SSL protocol is used for encryption of data for secure data transmission.

SMTP - Simple Mail Transfer Protocol

SMTP is used for transmission of e-mails.

MIME - Multi-purpose Internet Mail Extensions

The MIME protocol lets SMTP transmit multimedia files including voice, audio, and binary data across TCP/IP networks.

IMAP - Internet Message Access Protocol

IMAP is used for storing and retrieving e-mails.

POP - Post Office Protocol

POP is used for downloading e-mails from an e-mail server to a personal computer.

FTP - File Transfer Protocol

FTP takes care of transmission of files between computers.

NTP - Network Time Protocol

NTP is used to synchronize the time (the clock) between computers.

DHCP - Dynamic Host Configuration Protocol

DHCP is used for allocation of dynamic IP addresses to computers in a network.

SNMP - Simple Network Management Protocol

SNMP is used for administration of computer networks.

LDAP - Lightweight Directory Access Protocol

LDAP is used for collecting information about users and e-mail addresses from the internet.

ICMP - Internet Control Message Protocol

ICMP takes care of error-handling in the network.

ARP - Address Resolution Protocol

ARP is used by IP to find the hardware address of a computer network card based on the IP address.

RARP - Reverse Address Resolution Protocol

RARP is used by IP to find the IP address based on the hardware address of a computer network card.

BOOTP - Boot Protocol

BOOTP is used for booting (starting) computers from the network.

PPTP - Point to Point Tunneling Protocol

PPTP is used for setting up a connection (tunnel) between private networks.


Source:w3schools.com

Monday, December 6, 2010

All About Keyloggers

Keylogger is a software program or hardware device that is used to monitor and log each of the keys a user types into a computer keyboard. The user who installed the program or hardware device can then view all keys typed in by that user. Because these programs and hardware devices monitor the keys typed in a user can easily find user passwords and other information a user may not wish others to know about.
Keyloggers, as a surveillance tool, are often used by employers to ensure employees use work computers for business purposes only. Unfortunately, keyloggers can also be embedded in spyware allowing your information to be transmitted to an unknown third party.

There are two types of software key loggers:

The first is one you would personally install on a spouse's or child's computer to see what they are up to. The software runs in stealth mode (although most anti viruses pick them up) and emails you the results or stores them in a hidden folder that only you have access to.

The second (and most vicious) is received by downloading a file or visiting an infected website. These malicious key loggers record everything you type including passwords and account numbers. They then zip up on a pre-scheduled basis and send the recording back to the source where some jerk tries to filter your banking, investment, and other online funds for him (or her) self. This is why having a good anti virus, spyware sweeper, and malware sweeper are so important.

A keylogger normally consists of two files: a DLL which does all the work and an EXE which loads the DLL and sets the hook. Therefore when you deploy the hooker on a system, two such files must be present in the same directory.
There are other approaches to capturing info about what you are doing.
  • Some keyloggers capture screens, rather than keystrokes.
  • Other keyloggers will secretly turn on video or audio recorders, and transmit what they capture over your internet connection.
A keyloggers might be as simple as an exe and a dll that are placed on a machine and invoked at boot via an entry in the registry. Or a keyloggers could be which boasts these features:
  • Stealth: invisible in process list
  • Includes kernel keylogger driver that captures keystrokes even when user is logged off (Windows 2000 / XP)
  • ProBot program files and registry entries are hidden (Windows 2000 / XP)
  • Includes Remote Deployment wizard
  • Active window titles and process names logging
  • Keystroke / password logging
  • Regional keyboard support
  • Keylogging in NT console windows
  • Launched applications list
  • Text snapshots of active applications.
  • Visited Internet URL logger
  • Capture HTTP POST data (including logins/passwords)
  • File and Folder creation/removal logging
  • Mouse activities
  • Workstation user and timestamp recording
  • Log file archiving, separate log files for each user
  • Log file secure encryption
  • Password authentication
  • Invisible operation
  • Native GUI session log presentation
  • Easy log file reports with Instant Viewer 2 Web interface
  • HTML and Text log file export
  • Automatic E-mail log file delivery
  • Easy setup & uninstall wizards
Because a keylogger can involve dozens of files, and has as a primary goal complete stealth from the user, removing one manually can be a terrifying challenge to any computer user. Incorrect removal efforts can result in damage to the operating system, instability, inability to use the mouse or keyboard, or worse. Further, some key loggers will survive manual efforts to remove them, re-installing themselves before the user even reboots.