Posts

Showing posts from November, 2014

Enabling .Net Framework 3.5 in Windows Server 2012 using Command prompt

Image
Enabling .Net Framework 3.5 in Windows Server 2012 using Command prompt 
You need


Media of Windows Server 2012
insert your media in your dvd drive or mound it via iLo or pendrive

please not your drive letter which is assigned to that media


now open up your command prompt

press windows key and R key same time now run windows will appear  , now  type CMD  then press enter 
this will open your command prompt

now mound your drive letter

in this case my drive letter is  "  D   "


so i need to type D: in the command prompt



now type following command

dism /online /enable-feature /featurename:NetFx3 /All /Source:d:/sources/sxs
Note*  in command line letter d may vary 



now wait for some time


done !

lets check on server manager




restart your server 
good luck 

Some Security Softwares

Image
Most organizations use several types of network-based
and host-based:

security software to detect malicious activity, protect systems and data, and support incident response efforts. Accordingly, security software is a major source of computer security log data. Common types of network-based and host-based security software include the following 

Network Quarantine Servers : Some organizations check each remote host’s security posture before allowing it to join the network. This is often done through a network quarantine server and agents placed on each host. Hosts that do not respond to the server’s checks or that fail the checks are quarantined on a separate virtual local area network segment. Network quarantine servers log information about the status of checks, including which hosts were quarantined and for what reasons.

Routers: Routers may be configured to permit or block certain types of network traffic based on a policy. Routers that block traffic are usually configured to log onl…

Network Threat : The Trojan Horse

Image
What is a Trojan Horse ?

A trojan horse is used to enter a victim’s computer, granting the attacker ‘wrapped’ into a program meaning that this program may therefore have hidden fuctions that you are not aware of.
unrestricted access to the data stored on that computer and causing great damage to the victim. A trojan can be a hidden program that runs on your system  without your information,
or it can be


Different types of trojans :



1) FTP torjans : These trojans open an FTP server on the victim’s machine that might store and serve illegal software and/or sensitive data, and allow attackers to connect to your machine via FTP.

2) Destructive trojans : The only function of these trojans is to destroy and delete files. This makes them very simple to use. They can automatically delete all the core system files on your machine. The trojan can either be activated by the attacker or can work like a logic bomb that starts on a specific day and time.
A destructive trojan is a danger to any compu…

Configuring Raid 5 With 1 Hot Spare in HP Proliant ML310e Gen8

Image
What is RAID 5f
RAID 5 comprises block-level striping with distributed parity. Unlike in RAID 4, parity information is distributed among the drives. It requires that all drives but one be present to operate. Upon failure of a single drive, subsequent reads can be calculated from the distributed parity such that no data is lost. RAID 5 requires at least three disks.
In comparison to RAID 4, RAID 5's distributed parity evens out the stress of a dedicated parity disk among all RAID members. Additionally, read performance is increased since all RAID members participate in serving of the read requests.

Diagram of a RAID 5 setup with distributed parity with each color representing the group of blocks in the respective parity block (a stripe). This diagram shows left asymmetric algorithm
HOT SPARE
hot spare disk is a disk or group of disks used to automatically or manually, depending upon the hot spare policy, replace a failing or failed disk in a RAID configuration.


The hot spare disk …

Client-side Storage using HTML5, really secure or just an abuse ?

Image
HTML5 has introduced some new ways to save huge amount of data on the PC through the browser (use chromium or chrome to see how this work) Hakcers could steal or modify sensitive data online or offline. If a web application which uses this kind of storage ( client-side ) is vulnerable to XSS attacks we can use an attack payload to read or modify the content of known storage keys on the computer’s victim. If the web application loads data or code from the local storage, could be also quite powerful to inject malicious code that will be executed every time the web application will request it.

Working technique : ( 100% working technique, i got success while doing this, you just have to use your brain )


Storage Object Enumeration

var ss = "";
for(i in window.sessionStorage)
{
ss += i + " ";
}
var ls = "";
for(i = 0; i < localStorage.length; i++)
 {
ls += localStorage.key(i) + " ";
 }


Database Object Enumeration

var db = "";
for(i in windo…

Tips on Learning PowerShell from a PowerShell Noob

Image
What is PowerShell PowerShell is an object-oriented programming language and interactive command line shell for Microsoft Windows. PowerShell was designed to automate system tasks, such as batch processing, and create systems management tools for commonly implemented processes. The PowerShell language is similar to Perl. PowerShell includes more than 130 standard command line tools for functions that formerly required users to create scripts in VB, VBScript or C#.

Adding License key in HP iLO

Image
How to add License key to HP iLO 

go to this url  www.hp.com/go/ilo then click on License tab

choose license you want

for this tutorial i have chosen 60 days trial license



you will receive an e-Software confirmation mail


follow the link which is given in you email 
you will get your License 
after that enter your iLO 
Click administration
Licensing 


Enter you Licence Key 
Click Install 


Done Enjoy HP iLO !

HP OneView PowerShell moves to Github

Image
What is HP OneView  HP OneView software provides management tools for converged infrastructure and are used by system administrators to provision, control, and manage software-defined data center components. System administrators use one unified interface, HP OneView to automate data center maintenance and management tasks. These data center maintenance and management tasks traditionally required numerous manual steps and multiple management tools.HP OneView PowerShell Library's new project home page is http://hewlettpackard.github.io/POSH-HPOneView/HP OneView PowerShell library has moved to Github , before it was hosted on CodePlex ! Moving HP OneView to Github will ensure that every one can easily access HP Oneview Project , Here is the HP Github Organization Page https://github.com/HewlettPackard ,