This is Virus Community

Your Ultimate Tech Destination On My Web.

This is Virus Community

Your Ultimate Gadgets Destination On My Web.

This is Virus Community

Your Ultimate Technology Updates Destination On My Web.

This is Virus Community

Your Ultimate Tech Articles Destination On My Web.

This is Virus Community

Your Ultimate Virus and Malware updates Destination On My Web.

Monday, 30 July 2018

Google Hacking

Google Queries for Locating Various Web Servers

“Apache/1.3.28 Server at” intitle:index.of
Apache 1.3.2
“Apache/2.0 Server at” intitle:index.of
Apache 2.0
“Apache/* Server at” intitle:index.of
any version of Apache
“Microsoft-IIS/4.0 Server at” intitle:index.of
Microsoft Internet Information Services 4.0
“Microsoft-IIS/5.0 Server at” intitle:index.ofMicrosoft Internet Information Services 5.0
“Microsoft-IIS/6.0 Server at” intitle:index.of
Microsoft Internet Information Services 6.0
“Microsoft-IIS/* Server at” intitle:index.of
any version of Microsoft Internet Information Services
“Oracle HTTP Server/* Server at” intitle:index.of
any version of Oracle HTTP Server
“IBM _ HTTP _ Server/* * Server at” intitle:index.of
any version of IBM HTTP Server
“Netscape/* Server at” intitle:index.of
any version of Netscape Server
“Red Hat Secure/*” intitle:index.of
any version of the Red Hat Secure server
“HP Apache-based Web Server/*” intitle:index.of
any version of the HP server
Queries for discovering standard post-installation
intitle:”Test Page for Apache Installation” “You are free”
Apache 1.2.6
intitle:”Test Page for Apache Installation” “It worked!” “this Web site!”
Apache 1.3.0 – 1.3.9
intitle:”Test Page for Apache Installation” “Seeing this instead”
Apache 1.3.11 – 1.3.33, 2.0
intitle:”Test Page for the SSL/TLS-aware Apache Installation” “Hey, it worked!”
Apache SSL/TLS
intitle:”Test Page for the Apache Web Server on Red Hat Linux”
Apache on Red Hat
intitle:”Test Page for the Apache Http Server on Fedora Core”
Apache on Fedora
intitle:”Welcome to Your New Home Page!”
Debian Apache on Debian
intitle:”Welcome to IIS 4.0!”
IIS 4.0
intitle:”Welcome to Windows 2000 Internet Services”
IIS 5.0
intitle:”Welcome to Windows XP Server Internet Services”
IIS 6.0
Querying for application-generated system reports
“Generated by phpSystem”

Operating system type and version, hardware configuration, logged users, open connections, free memory and disk space, mount points
“This summary was generated by wwwstat”
web server statistics, system file structure
“These statistics were produced by getstats”
web server statistics, system file structure
“This report was generated by WebLog”
web server statistics, system file structure
intext:”Tobias Oetiker” “traffic analysis”
systemperformance statistics as MRTG charts, network configuration
intitle:”Apache::Status” (inurl:server-status | inurl:status.html | inurl:apache.html)
server version, operating system type, child process list, current connections
intitle:”ASP Stats Generator *.*” “ASP Stats Generator” “2003-2004 weppos”
web server activity, lots of visitor information
intitle:”Multimon UPS status page”
UPS device performance statistics
intitle:”statistics of” “advanced web statistics”
web server statistics, visitor information
intitle:”System Statistics” +”System and Network Information Center”

System performance statistics as MRTG charts, hardware configuration, running services
intitle:”Usage Statistics for” “Generated by Webalizer”
web server statistics, visitor information, system file structure
intitle:”Web Server Statistics for ****”
web server statistics, visitor information
nurl:”/axs/ax-admin.pl” -script
web server statistics, visitor information
inurl:”/cricket/grapher.cgi”
MRTG charts of network interface performance
inurl:server-info “Apache Server Information”
web server version and configuration, operating system type, system file structure
“Output produced by SysWatch *”
operating system type and version, logged users, free memory and disk space, mount points, running processes, system logs.

Dorks for Finding Admin Page


admin1.php
admin1.html
admin2.php
admin2.html
yonetim.php
yonetim.html
yonetici.php
yonetici.html
admin/account.php
admin/account.html
admin/index.php
admin/index.html
admin/login.php
admin/login.html
admin/home.php
admin/controlpanel.html
admin/controlpanel.php
admin.php
admin.html
admin/cp.php
admin/cp.html
cp.php
cp.html
administrator/
administrator/index.html
administrator/index.php
administrator/login.html
administrator/login.php
administrator/account.html
administrator/account.php
administrator.php
administrator.html
login.html
modelsearch/login.php
moderator.php
moderator.html
moderator/login.php
moderator/login.html
moderator/admin.php
moderator/admin.html
account.php
account.html
controlpanel/
controlpanel.php
controlpanel.html
admincontrol.php
admincontrol.html
adminpanel.php
adminpanel.html
admin1.asp
admin2.asp
yonetim.asp
yonetici.asp
admin/account.asp
admin/index.asp
admin/login.asp
admin/home.asp
admin/controlpanel.asp
admin.asp
admin/cp.asp
cp.asp
administrator/index.asp
administrator/login.asp
administrator/account.asp
administrator.asp
login.asp
modelsearch/login.asp
moderator.asp
moderator/login.asp
moderator/admin.asp
account.asp
controlpanel.asp
admincontrol.asp
adminpanel.asp
fileadmin/
fileadmin.php
fileadmin.asp
fileadmin.html
administration/
administration.php
administration.html
sysadmin.php
sysadmin.html
phpmyadmin/
myadmin/
sysadmin.asp
sysadmin/
ur-admin.asp
ur-admin.php
ur-admin.html
ur-admin/
Server.php
Server.html
Server.asp
Server/
wp-admin/
administr8.php
administr8.html
administr8/
administr8.asp
webadmin/
webadmin.php
webadmin.asp
webadmin.html
administratie/
admins/
admins.php
admins.asp
admins.html
administrivia/
Database_Administration/
WebAdmin/
useradmin/
sysadmins/
admin1/
system-administration/
administrators/
pgadmin/
directadmin/
staradmin/
ServerAdministrator/
SysAdmin/
administer/
LiveUser_Admin/
sys-admin/
typo3/
panel/
cpanel/
cPanel/
cpanel_file/
platz_login/
rcLogin/
blogindex/
formslogin/
autologin/
support_login/
meta_login/
manuallogin/
simpleLogin/
loginflat/
utility_login/
showlogin/
memlogin/
members/
login-redirect/
sub-login/
wp-login/
login1/
dir-login/
login_db/
xlogin/
smblogin/
customer_login/
UserLogin/
login-us/
acct_login/
admin_area/
bigadmin/
project-admins/
phppgadmin/
pureadmin/
sql-admin/
openvpnadmin/
wizmysqladmin/
vadmind/
ezsqliteadmin/
hpwebjetadmin/
newsadmin/
adminpro/
Lotus_Domino_Admin/
bbadmin/
vmailadmin/
ccp14admin/
irc-macadmin/
banneradmin/
sshadmin/
phpldapadmin/
macadmin/
administratoraccounts/
admin4_account/
admin4_colon/
radmind-1/
Super-Admin/
AdminTools/
cmsadmin/
phpSQLiteAdmin/
server_admin_small/
database_administration/
system_administration/

Update Important Dorks


Dork: “inurl:dettaglio.php?id=”

Exploit :
www.victim.com/sito/dettaglio.php?id=[SQL]

Example :
http://www.cicloposse.com/dettaglio.php?id=61′

Dork: inurl:prodotto.php?id)

Exploit:
www.victim.com/prodotto.php?id=[SQL]

Example:
http://www.poderimorini.com/en/prodotto.php?id=14′

Sql Injection Dorks


allinurl: \”index php go buy\”
allinurl: \”index.php?go=sell\”
allinurl: \”index php go linkdir\”
allinurl: \”index.php?go=resource_center\”
allinurl: \”resource_center.html\”
allinurl: \”index.php?go=properties\”
allinurl: \”index.php?go=register\”

Error Message Queries

“A syntax error has occurred”filetype:ihtml
Informix database errors, potentially containing function names, filenames, file structure information, pieces of SQL code and passwords

“Access denied for user” “Using password”

authorization errors, potentially containing user names, function names, file structure information and pieces of SQL code

The script whose uid is ” “is not allowed to access”

access-related PHP errors, potentially containing filenames, function names and file structure information

“ORA-00921: unexpected end of SQL command”

Oracle database errors, potentially containing filenames, function names and file structure information

“error found handling the request” cocoon filetype:xml

Cocoon errors, potentially containing Cocoon version information, filenames, function names and file structure information

“Invision Power Board Database Error”

Invision Power Board bulletin board errors, potentially containing function names, filenames, file structure information and piece of SQL code

“Warning: mysql _ query()” “invalid query”

MySQL database errors, potentially containing user names, function names, filenames and file structure information

“Error Message : Error loading required libraries.”

CGI script errors, potentially containing information about operating system and program versions, user names, filenames and file structure information

“#mysql dump” filetype:sql

MySQL database errors, potentially containing information about database structure and contents

Dork for locating passwords

http://*:*@www” site

passwords for site, stored as the string “http://username:password@www…”

filetype:bak inurl:”htaccess|passwd|shadow|ht users”

file backups, potentially containing user names and passwords

filetype:mdb inurl:”account|users|admin|admin istrators|passwd|password”

mdb files, potentially containing password information

intitle:”Index of” pwd.db

pwd.db files, potentially containing user names and encrypted passwords

inurl:admin inurl:backup intitle:index.of

directories whose names contain the words admin and backup

“Index of/” “Parent Directory” “WS _ FTP.ini”

filetype:ini WS _ FTP PWD

WS_FTP configuration files, potentially containing FTP server access passwords

ext:pwd inurl:(service|authors|administrators |users) “# -FrontPage-”

files containing Microsoft FrontPage passwords

filetype:sql (“passwd values ****” | “password values ****” | “pass values ****” )

files containing SQL code and passwords inserted into a database

intitle:index.of trillian.ini

configuration files for the Trillian IM

eggdrop filetype:user

user configuration files for the Eggdrop ircbot

filetype:conf slapd.conf

configuration files for OpenLDAP

inurl:”wvdial.conf” intext:”password”

configuration files for WV Dial

ext:ini eudora.ini

configuration files for the Eudora mail client

filetype:mdb inurl:users.mdb

Microsoft Access files, potentially containing user account information

Searching for personal data and confidential documents

filetype:xls inurl:”email.xls”

email.xls files, potentially containing contact information

“phone * * *” “address *” “e-mail” intitle: “curriculum vitae”

CVs

“not for distribution”

confidential documents containing the confidential clause

buddylist.blt

AIM contacts list

intitle:index.of mystuff.xml

Trillian IM contacts list

filetype:ctt “msn”

MSN contacts list

filetype:QDF

QDF database files for the Quicken financial application

intitle:index.of finances.xls

finances.xls files, potentially containing information on bank accounts, financial summaries and credit card numbers

intitle:”Index Of” -inurl:maillog maillog size

maillog files, potentially containing e-mail

Network Vulnerability Assessment Report”
“Host Vulnerability Summary Report”
filetype:pdf “Assessment Report”
“This file was generated by Nessus”

reports for network security scans, penetration tests etc

Dork for locating network devices

“Copyright (c) Tektronix, Inc.” “printer status”

PhaserLink printers

inurl:”printer/main.html” intext:”settings”

Brother HL printers

intitle:”Dell Laser Printer” ews

Dell printers with EWS technology

intext:centreware inurl:status

Xerox Phaser 4500/6250/8200/8400 printers

inurl:hp/device/this.LCDispatcher

HP printers

intitle:liveapplet inurl:LvAppl

Canon Webview webcams

intitle:”EvoCam” inurl:”webcam.html”

Evocam webcams

inurl:”ViewerFrame?Mode=”

Panasonic Network Camera webcams

(intext:”MOBOTIX M1? | intext:”MOBOTIX M10?) intext:”Open Menu” Shift-Reload

Mobotix webcams

inurl:indexFrame.shtml Axis

Axis webcams

intitle:”my webcamXP server!” inurl:”:8080?

webcams accessible via WebcamXP Server

allintitle:Brains, Corp.

camera webcams accessible via mmEye

intitle:”active webcam page”.

Thursday, 5 July 2018

Airgeddon – A Swiss Army WiFi Hacking Tool


Airgeddon – A Swiss Army WiFi Hacking Tool

Today Virus Community have been looking at Airgeddon, on initial inspection it seems to be a multi purpose all-in-one Swiss army knife tool for hacking WiFi, the tool is pretty extensive, with over 11 thousand lines of bash goodness. This tool is free to download from GitHub and supports multiple Linux based platforms.

So what does it do?

The tool supports multiple methodologies for hacking WiFi, some of which include:
  • WEP All-in-One attack (combining different techniques: Chop-Chop, Caffe Latte, ARP Replay, Hirte, Fragmentation, Fake association, etc.)
  • Evil Twin attacks (Rogue AP) with Hostapd + DHCP + DoS + Ettercap + Sslstrip and also BEEF support
  • Multiple WPS cracking modes – Pixie Dust, Bully and Reaver
  • Offline password decryption for WPA/WPA2/WPA3 captured handshakes (dictionary, bruteforce and rule based) based on aircrack, crunch and hashcat tools.

Other features?

Cool!, any Other notable features include:
  • upport for 5GHZ and 2.4GHZ bands
  • Assisted Handshake file capturing
  • Drag and drop files on console window for entering file paths
  • Controlled Exit. Cleaning tasks and temp files. Restoring iptables after an attack that require changes on them. Option to keep monitor mode if desired on exit.

Platforms can it run on?

The tool is compatible on any Linux distribution that has the necessary tools installed needed to run. ideally Kali would be the best candidate for running it out of the box, but it can be run on Arch if you enjoy a challenge, the script will check for any tool dependencies it is missing when first run.

s you might expect with any bash script related tool, it offers intuitive menus and options that could allow even the most harebrained skid a way to easily perform a wide range of Wifi attacks.

Source code?

Source code link attach here you can also download from my private server.

Download from GitHub server
Download from my Private server

Wednesday, 10 January 2018

WhatsApp Flaw Could Allow 'Potential Attackers' to Spy On Encrypted Group Chats

WhatsApp Flaw Could Allow 'Potential Attackers' to Spy On Encrypted Group Chats

A more dramatic revelation of 2018—an outsider can secretly eavesdrop on your private end-to-end encrypted group chats on WhatsApp and Signal messaging apps.

Considering protection against three types of attackers—malicious user, network attacker, and malicious server—an end-to-end encryption protocol plays a vital role in securing instant messaging services.

The primary purpose of having end-to-end encryption is to stop trusting the intermediate servers in such a way that no one, not even the company or the server that transmits the data, can decrypt your messages or abuse its centralized position to manipulate the service.

In order words—assuming the worst-case scenario—a corrupt company employee should not be able to eavesdrop on the end-to-end encrypted communication by any mean.

However, so far even the popular end-to-end encrypted messaging services, like WhatsApp, Threema and Signal, have not entirely achieved zero-knowledge system.

Researchers from Ruhr-Universität Bochum (RUB) in Germany found that anyone who controls WhatsApp/Signal servers can covertly add new members to any private group, allowing them to spy on group conversations, even without the permission of the administrator.

As described by the researchers, in the pairwise communication (when only two users communicate with each other) server plays a limited role, but in case of multi-user chats (group chat where encrypted messages are broadcasted to many users), the role of servers increases to manage the entire process.

That's where the issue resides, i.e. trusting the company's servers to manage group members (who eventually have full access to the group conversation) and their actions.

As explained in the newly published RUB paper, titled "More is Less: On the End-to-End Security of Group Chats in Signal, WhatsApp, and Threema," since both Signal and WhatsApp fail to properly authenticate that who is adding a new member to the group, it is possible for an unauthorized person—not a group administrator or even a member of the group—to add someone to the group chat.

What's more? If you are wondering that adding a new member to the group will show a visual notification to other members, it is not the case.

According to the researchers, a compromised admin or rogue employee with access to the server could manipulate (or block) the group management messages that are supposed to alert group members of a new member.

"The described weaknesses enable attacker A, who controls the WhatsApp server or can break the transport layer security, to take full control over a group. Entering the group, however, leaves traces since this operation is listed in the graphical user interface. The WhatsApp server can therefore use the fact that it can stealthily reorder and drop messages in the group," the paper reads. 
"Thereby it can cache sent messages to the group, read their content first and decide in which order they are delivered to the members. Additionally, the WhatsApp server can forward these messages to the members individually such that a subtly chosen combination of messages can help it to cover the traces."

WhatsApp has acknowledged the issue, but argued that if any new member is added to a group, let's say by anyone, other group members will get notified for sure.

"We've looked at this issue carefully. Existing members are notified when new people are added to a WhatsApp group. We built WhatsApp so group messages cannot be sent to a hidden user," a WhatsApp spokesperson told Wired. 
"The privacy and security of our users is incredibly important to WhatsApp. It's why we collect very little information and all messages sent on WhatsApp are end-to-end encrypted."
But if you are not part of a group with very selected members, I'm sure many of you would relatively ignore such notifications easily.
Researchers also advised companies to fix the issue just by adding an authentication mechanism to make sure that the "signed" group management messages come from the group administrator only.
However, this attack is not easy (exception—services under legal pressure) to execute, so users should not be worried about it.

WPA3 The New Wi-Fi Security Protocol To Be Launched In 2018

WPA3 The New Wi-Fi Security Protocol To Be Launched In 2018

Remember the Krack Wi-Fi vulnerability from October last year that has put all internet users to a dismay? Well, the good news is that it’s very possible we won’t have to go through that risky situation again.

Just a few days ago, during the annual CES event (one of the biggest technology and innovation shows), the Wi-Fi Alliance has announced the launch of a new wireless security protocol—Wi-Fi Protected Access WPA3 this year.

WPA3 will replace the current WPA2—the security protocol that all Wi-Fi networks have been using for over 15 years.

Why is WPA2 considered vulnerable?

The main insecurity issue of WPA2 is given by the “unencrypted” open Wi-Fi networks that makes it incredibly easy for anyone who uses the same network to access other devices.

Secondly, one of the WPA2 protocols is that the same password is used by clients and business owners when joining a Wi-Fi network (for instance the clients of a coffee shop and the owner of the coffee shop).

Due to these vulnerabilities, hackers can intercept Wi-Fi traffic and steal online data quite effortlessly.

In what way is WPA3 going to be safer?


  • Improved user privacy
WPA3 will increase users’ privacy when they connect to open Wi-Fi networks (such as those in cafes, restaurants, etc.) by introducing individualized data encryption.
  • Higher security standard
The future Wi-Fi security protocol will introduce a 192-bit security suite for increased protection; the 192-bitis a security requirement used by governments and big industrial organization.

  • Protection on IoT devices
Wi-Fi Alliance, which is composed of 15 major tech companies (including Apple, Cisco, Dell, Intel, Microsoft, Qualcomm and more) stated that WPA3 will also offer smoother security for IoT devices.

  • New handshake protocol
WPA3 standard will use a new handshake protocol, which will be far less vulnerable to dictionary attacks (the method hackers use of exhausting all possible password possibilities).

Transition from WPA2 to WPA3 could take a while

WPA3 won’t come into force until in a few months. Meanwhile, Wi-Fi Alliance said it will continue to optimize WPA2 since it was the target of severe attacks.

Regardless of WPA2 or WPA3, you should always secure your Wi-Fi network with the help of a VPN, simply to supplement the protection of your data.



Friday, 29 December 2017

Three more Malicious Backdoor plugins with More than 89,000 Active Installs found in WordPress Repository

Three more Malicious Backdoor plugins with More than 89,000 Active Installs found in WordPress Repository


WordPress has such a massive ecosystem consist of a number of plugins and themes, threat actors involved in various malicious activities such as hiding the PHP backdoor scripts into the WordPress Security Plugin.

In this incident, the attackers sell existing unsupported plugins to new authors with backdoor code inserted and their goal is to insert SEO spam to the sites with the plugin installed.

Wordfence uncovers the incident and WordPress security team has closed the plugin from the store which means the plugin not available to download from the repository.

There is too many up’s and down’s in WordPress usage, it requires a security improvement, so the WordPress Penetration testing is essential to find the vulnerabilities and to secure your WordPress powered blog.

Malicious WordPress backdoor Plugins


Duplicate Page and Post



The Functionality of the plugin is to create a cloned post or the page, now the Current Owner of the plugin inserted backdoor scripts which makes a request to cloud-wp.org and injects cloaked backlinks to the site.

It has more than 50,000+ Active Installs and the plugins Removed from WordPress.org on December 14, 2017.

No Follow All External Links



Behaviour same as like Duplicate Page and Post this backdoor requests to cloud.wpserve.org and returns content based URLs and the backdoor used in injecting backlinks for SEO. It has more than 9,000++ Active Installs and the plugins Removed from WordPress.org on December 19, 2017.

WP No External Links


It is same as the previous two backdoors it requests wpconnect.org and returns content based on the URL and the backdoor used in injecting backlinks for SEO.

It has more than 30,000+ Active Installs and the plugins Removed from WordPress.org on December 22, 2017.



If you have the plugin installed it is highly recommended to uninstall them immediately and scan the website for infection with sucuri and gravity scan.

Thousands of WordPress websites get hacked every day, so securing your blog must be top of mind. Luckily, it’s not all rocket-science as you need to make most of the tweaks only once.Here you can find Most Important Considerations Check to Setup Your WordPress Security.


Friday, 13 October 2017

Intel Introduced Its First Quantum Processor


Intel Introduced Its First Quantum Processor

The future of computing undoubtedly passes through the quantum computer. So far, research around quantum computers has proved quite promising and Intel has already realized the potential of this area.

Last week, the market leader in the manufacture and marketing of chips and processors for computers announced that it is creating a quantum processor. So, now let’s explore all the details about this new quantum processor.

The World of Qubits

This is yet another major move by Intel, which shows that Intel is committed to being present in the future. This future will certainly not be far behind.

Quantum computers have the power to revolutionize industries and areas of science, for example, in
the area of Artificial Intelligence, making the process of operating neural networks faster or in biology, allowing to analyze in more detail small molecular structures.

While normal computers encode information in bits, quantum computers use quantum bits, that is, Qubits, which take advantage of surprising quantum phenomena and can, therefore, be in 2 different states at the same time.

The new Intel Quantum Processor

This new Intel processor has 17 Qubits and proves to be quite promising. Thus, this is the first processor of the company since the 50 million dollar partnership with QuTech was announced. In addition, the processor has a special protection system that allows it to last longer.

In fact, one of the main difficulties of computer scientists and physicists at this point in terms of the development of quantum computers is related to the life of the processor and to the isolation of the system.

“The new design improves quality, thermal performance and reduces radio frequency interference” stated by the Jim Held, the Director of Technology Research at Intel.

This move from Intel makes perfect sense since the tech giant Google, Microsoft and IBM have also publicly shown the results of their efforts in the field of quantum computing. Being one of the leading processor producers, Intel wants to ensure its influence in the future. However, this does not mean that the current processors will soon become obsolete.

Sunday, 9 July 2017

Top Interview Questions for IT Pro


Top Interview Questions for IT Pro

1. What is the difference between a hub and a switch?
2. What is a network?
3. What is Active Directory?
4. What is TCP/IP and what does it stand for?
5. What is a default gateway?
6. What does DHCP stand for?
7. What is an IP Address?
8. What is the significance of the IP address 255.255.255.255?
9. What are the 3 major classes of an IP network?
10. What is a Class D IP address?
11. What is OSPF?
12. A user is complaining of delays when using the network. What would you do?

Network Administrator Positions


Some of these questions may also be included in the previous category for Help Desk Technician positions. In either case, they’re worth preparing for.

13. What is the difference between layer 2 and layer 3 in the OSI model?
14. What is the difference between a hub, switch, and router?
15. What is a VLAN?
16. What is the difference between TCP and UDP?
17. How do you distinguish a DNS problem from a network problem?
18. What are a runt, Giant, and collision?
19. What is a broadcast storm?
20. What is the purpose of VRRP?
21. What is a VPN?
22. What is a default route?
23. How do you set a default route on an IOS Cisco router?
24. What is a metric?
25. What is a MAC address?
26. What is ARP/RARP?
27. Describe a TCP connection sequence.
28. What is MTU?
29. What other TCP setting can you modify besides MTU to shorten packets?

System Administration Position


Here are a few more questions that are a little bit more difficult. System Admins should know all these answers by heart in addition to the Network Administrator questions.

30. What is the difference between layer 2 and layer 3 devices?
31. What is the subnet for a class C network?
32. Have you configured a NIS server/client before? If so, describe what you did.
33. Have your configured a NFS server?
34. What are RAID 1 and RAID 5?
35. What are the required components of Windows Server 2003 for installing Exchange 2003?
36. What must be done to an AD forest before Exchange can be deployed?
37. What Exchange process is responsible for communication with AD?
38. What connector type would you use to connect to the Internet, and what are the two methods of sending mail over that connector?
39. How would you optimize Exchange 2003 memory usage on Windows Server 2003 with more than 1Gb of memory?
40. What are the standard port numbers for SMTP, POP3, IMAP4, RPC, LDAP and Global Catalog?
41. Name the process names for the following: System Attendant, Information Store, SMTP/POP/IMAP/OWA.
42. What is the maximum amount of databases that can be hosted on Exchange 2003 Enterprise?
43. What are the disadvantages of circular logging?
44. What is Active Directory schema?
45. What are the domain functional levels in Windows Server 2003?
46. What is the default domain functional level in Windows Server 2003?
47. What are the forest functional levels in Windows Server 2003?
48. What is a global catalog server?
49. How can we raise domain functional and forest functional levels in Windows Server 2003?
50. What is the default protocol used in directory services?
51. What is IPv6?
52. What are the physical & logical components of ADS?
53. In which domain functional level, we can rename a domain name?
54. What is multimaster replication?
55. What is a site?
56. Which is the command used to remove active directory from a domain controller?
57. What is the file that’s responsible for keeping all Active Directory databases?

General HR Questions


These general questions can be the toughest ones to get through. They might sound easy, but they require a lot of thought and preparation. I would suggest writing down your answers first, then reading them over a few times so that you’re comfortable in answering them.
Some of these questions are very tricky and can get you in trouble. So if you run into problems finding a good answer, check out these 64 Interview Questions for some help.

58. Tell us a little bit about yourself.
59. What are your greatest strengths?
60. What are your greatest weaknesses?
61. What do you like about your current job or what did you like about your last job?
62. Give us an example of when you handled a stressful situation.
62. Give us an example of one of the toughest problems you had to face, and how did you deal with it?
63. Why do you think you should get this position?
64. Do you think you are the best person for this job? If so, why?
65. Why did you apply for this position?
66. Why did you apply for a position with our company and what do you know about us?
67. Why should we hire you?
68. Tell us about your short and long term goals?
69. Where do you see yourself five years from now?
70. Please explain, what does customer service mean to you?
71. What does being a team player mean to you?
72. Give us an example of how you handled a conflict with another employee?
73. What are your salary expectations?
74. What would you consider your most important accomplishment?
75. How would you define success?
76. At your last review, what improvements did your manager suggest you make?
77. What would your co workers say about you?

Saturday, 17 June 2017

Israeli Spies Hacked ISIS Computers, Exposed Their Plans For “Laptop Bomb”


Israeli Spies Hacked ISIS Computers, Exposed Their Plans For “Laptop Bomb”

Israeli government spies have hacked into the operations of ISIS. The group is inventing a laptop computer bomb that could have blasted the commercial aircraft to the US. However, Israeli cyber researchers have hacked into the operations of ISIS months ago and revealed their plans.


Recently, Israeli government spies have hacked into the operations of ISIS. The group is inventing a laptop computer bomb that could have blasted the commercial aircraft to the US. However, Israeli cyber researchers have hacked into the operations of ISIS months ago and revealed their plans.

Experts David Sanger and Eric Schmitt along with two of the American officials have stated that the process of bomb encryption and protection is what supported them to analyze how such bombs works.

A ban was also executed by the Department of Homeland Security on allowing electronic devices onto aircraft which are larger than the smartphones. The ban was implemented in ten countries in the Middle East and Africa.

After U.S laptop ban, Britain announced a similar prohibition for flights originating from six countries. The reports from The New York Times states that the laptop bomb was developed in such a way that it can cross through airport X-ray machines without detection.

The bomb was intelligently placed in the place of laptop battery which is capable of tricking the X-ray detectors in the airport. The reports also said that Israel had shared this information with U.S. in the past two years. Israel and U.S are working together against cyber terrorism. Most of their cooperating have been against Iran.

President Donald Trump made this information on this bomb attack public, which exposes it to Russia. This event has been the source of a trouble for Israeli officials. Trump had also tweeted that he did share the information with Russia and that he has full right to do so.

Wednesday, 7 June 2017

Intel Core i9 Extreme – Most extreme Desktop Processor Ever

Intel Core i9 Extreme Most Extreme Desktop Processor Ever

The war of processors between AMD and Intel is very well known. This month AMD revealed its first monstrous Ryzen Threadripper processors with up to 16 cores and 32 threads. AMD intended to target the world’s fastest ultra-premium desktop systems. Yesterday, Intel also introduced its new Core X-series, and it’s anchored by the company’s first 18-core CPU, the Core i9 Extreme. The i9 Extreme is a befitting reply to AMD’s 16-core/32-thread Ryzen Threadripper.


Last week, the picture was leaked on a tech forum and it was showing that Intel Likely to Launch a high-end Core i9 CPU with 12 cores. However, the 18 core processor is a good surprise from Intel.
“The Intel Core X-series processor family introduces a series of firsts that reflect the extreme performance we are delivering,”

Intel said today.

“This family includes Intel’s first teraflop desktop CPUs, a prime example of just how much raw compute these processors can handle. We’re also introducing the entirely new Intel Core i9 processor, representing the highest performance for advanced gaming, VR and content creation.”

About the Core i9, these Intel chips feature a base clock speed of 3.3GHz, reaching up to 4.3GHz dual-core speed with Turbo Boost 2.0 and 4.5GHz with Turbo Boost 3.0, which implies that there’s plenty of room for overclocking. At the top of the line-up is the new Intel Core i9 Extreme Edition processor – the first consumer desktop CPU with 18 cores and 36 threads.


All of the latest X-Series chips run on Intel’s new x299 chipset, replacing the x99 platform used by their predecessors. New x299-based motherboards and full desktop systems will be available “in the coming weeks”.
The Core i9 Extreme Edition i9-7980XE, what Intel calls the first teraflop desktop PC processor ever, will be priced at $1,999. The lower-tier Core i9 family: Core i9 X-series chips in 16-core, 14-core, 12-core, and 10-core versions, with prices climbing from $999 to $1,699. If these Core i9 X-series chips are too rich, Intel also introduced three new Core i7 X-series chips, priced from $339 to $599, and a $242 quad-core Core i5. All of the new chips are due “in the coming weeks,” Intel said.


Tuesday, 6 June 2017

Face Swap

Android users there is a good news for you! Microsoft just released an Android app in Google play store. The app had been launched in Play Store and the iOS version is already on its way. The new app launched by Microsoft was called Face Swap.



Android users there is a good news for you! Microsoft just released an Android app in Google play store. The app had been launched in Play Store and the iOS version is already on its way.
The new app launched by Microsoft was called Face Swap. As its name suggests this app does a simple job to put your face on pictures it finds online using Microsoft’s super-advance facial recognition method and Bing image search.
Well, users need to click a selfie which will trigger the facial recognition system. Once the facial recognition system recognizes your face it will let you search online for images or you can even choose pictures from your camera roll for popular faces and displays.
This app has the potential to match skin tones, lighting conditions, head turns and tilts automatically. This app also lets you put multiple faces in a single scene, which is perfect for group shots.

The firm says “Face Swap was developed from conception to app store over 5 months by the small incubation team within the Bing organization. The engineering team included developers in remote locations, allowing us to work around the clock and iterate rapidly on the product. We employed continuous user research studies with external participants, which helped us build a product that is easy and intuitive to use”

For Download Click Here

Saturday, 13 May 2017

Protect Against WannaCry: Microsoft Issues Patch For Unsupported Windows (Xp, Vista, Windows 8 & 8.1 Users)


Protect Against WannaCry: Microsoft Issues Patch For Unsupported Windows (Xp, Vista, Windows 8 & 8.1 Users

Update —  If you are thinking that activating the kill-switch has completely stopped the WannaCry Ransom ware, then you are mistaken. WannaCry 2.0 version has just arrived without any 'kill-switch' function. Get prepared for the next massive wave of ransom ware attacks.

In the wake of the largest ransom ware attack in the history that had already infected over 114,000 Windows systems worldwide since last 24 hours, Microsoft just took an unusual step to protect its customers with out-of-date computers.
Microsoft has just released an emergency security patch update for all its unsupported version of Windows, including Windows XP, Vista, Windows 8, Server 2003 and 2008 Editions.
So, if your organization, for some reason, is still running on Windows XP ,Vista, Windows 8 & 8.1 you are strongly advised to download and Apply The Patch Apply The Patch.


WannaCrypt, or also known as WannaCry, is a new ransom ware that wreaked havoc across the world last night, which spreads like a worm by leveraging a Windows SMB vulnerability (MS17-010) that has been previously fixed by Microsoft in March.

A large number of successful infections of the WannaCry ransom ware at an astonishing pace concludes that either significant number of users have not yet installed the security patch released in March (MS17-010) or they are still running an unsupported version of Windows for which Microsoft is no longer releasing any security update.

So far, Criminals behind WannaCry Ransom ware have received nearly 100 payments from victims, total 15 Bitcoins, equals to USD $26,090.



Moreover, if you are using Windows 10, you are on the safe side.

"The exploit code used by WannaCrypt was designed to work only against unpatched Windows 7 and Windows Server 2008 (or earlier OS) systems, so Windows 10 PCs are not affected by this attack," Microsoft says.

Once infected, WannaCry locks files on the computers and requires victims to pay $300 in Bitcoins to get back the control of their systems, along with a threat to double the price to $600.
But there's no guarantee of getting your files back even after paying the ransom.

How is WannaCry Spreading?

Such ransom ware infection typically leverages social engineering or spam emails as a primary attack vector, tricking users into downloading and executing a malicious attachment.
WannaCry is also leveraging one such social engineering trick, as FoxIT researchers uncovered one variant of the ransom ware that is initially distributed via an email containing a link or a PDF file with payload, which if clicked, installs WannaCry on the targeted system.
Once executed, the self-spreading WannaCry ransom ware does not infect the targeted computers immediately, as malware reverse engineers found that the dropper first tries to connect the following domain, which was initially unregistered:

hxxp://www[.]iuqerfsodp9ifjaposdfjhgosurijfaewrwergwea[.]com

If the connection to the above-mentioned unregistered domain fails (which is obvious), the dropper proceeds to infect the system with the ransom ware that would start encrypting files.
But if the connection is successful, the dropper does not infect the system with the WannaCry ransom ware module.
A security researcher, tweeting as MalwareTech, did the same and registered the domain mentioned above, accidentally triggering a "kill switch" that can prevent the spread of the WannaCry ransom ware, at least for now.
Malware Tech registered this domain by spending just £10, which makes the connection logic successful.
"In other words, blocking the domain with firewall either at ISP or enterprise network level will cause the ransom ware to continue spreading and encrypting files," Microsoft warned.
If infected, the malware scans the entire internal network and spread like a worm into all unlatched Windows computers with the help of SMB vulnerability.
The SMB vulnerability has been identified as EternalBlue, a collection of hacking tools allegedly created by the NSA and then subsequently dumped by a hacking group calling itself "The Shadow Brokers" over a month ago.

So Far, Over 114,000 Infections Detected in 99 Countries


WannaCry Ransom ware attack has become the largest ransom ware infection in history within just a few hours.

  • A total of 16 U.K. organizations has been affected by the ongoing attack, including the National Health Service (NHS), which was forced to reject patients, cancel operations, and reschedule appointments due to malware infection.
  • WannaCry also targeted Spanish telecom giant Telefónica infecting by some of its computers on an internal network, but did not affect clients or services.
  • Other victims of the attack include Portugal Telecom and Russia’s MegaFon.
  • Delivery company FedEx was also a victim.
  • Users from Japan, Turkey, and the Philippines were also affected.

7 Easy Steps to Protect Yourself

Currently, there is no WannaCry decryption tool or any other solution available, so users are strongly advised to follow prevention measures in order to protect themselves.

  • Keep your system Up-to-date: First of all, if you are using supported, but older versions of Windows operating system, keep your system up to date, or simply upgrade your system to Windows 10.
  • Using Unsupported Windows OS? If you are using unsupported versions of Windows, including Windows XP, Vista, Server 2003 or 2008, apply the emergency patch released by Microsoft today. (Click Here to Download)
  • Enable Firewall: Enable firewall, and if it is already there, modify your firewall configurations to block access to SMB ports over the network or the Internet. The protocol operates on TCP ports 137, 139, and 445, and over UDP ports 137 and 138.
  • Disable SMB: Follow steps described by Microsoft to disable Server Message Block (SMB).
  • Keep your Antivirus software up-to-date: Virus definitions have already been updated to protect against this latest threat. (KasperSky Internet Security Premium Click Here to Download) 
  • Backup Regularly: To always have a tight grip on all your important files and documents, keep a good backup routine in place that makes their copies to an external storage device that is not always connected to your PC.
  • Beware of Phishing: Always be suspicious of uninvited documents sent an email and never click on links inside those documents unless verifying the source.