Watch this new video from Digium to learn how you can get started with Asterisk! During this Steve Sokol presentation you will learn: What is Asterisk? What can I do with Asterisk? Which version should I use? How do I get started? Enjoy it! More Information HERE
OpenDNS is a free DNS (Domain Name System) resolution service. OpenDNS offers faster resolution and advanced features, such as misspelling correction, phishing protection, and optional filtering. And for parents, OpenDNS give parental control for your kids. OpenDNS provide fast, reliable and secure service consumers and businesses as an alternative to using their Internet service provider’s […]
Linux :sun java 6 on lucid lynx To install sun-java6-jre on Ubuntu 10.04 LTS, type the commands below in Terminal: kartook@Dwarez:~$sudo add-apt-repository “deb http://archive.canonical.com/ lucid partner” kartook@Dwarez:~$sudo apt-get update kartook@Dwarez:~$sudo apt-get install sun-java6-jre
Some Times system we need to kill the memory eater process. When your system become slower, check the following command and find the memory eater. Open a terminal and Type the following command kartook@Dwarez:~$ sudo ps aux | sort -nrk 4 | head Outputlooks like Below kartook@Dwarez:~$ sudo ps aux | sort -nrk 4 | […]
I was tried to conenct my BT4 guest to network but i was facing a lot of issues i was tried NAT and Bridged mode . Finally i found the solution . 1 – VMware network setting > NAT 2 – Launch BT4 3 – Open a shell 4 – /etc/init.d/networking start
I used VMware Workstation 7 to test this. The BackTrack kernel sources are already in place, so all that’s left to do is install BackTrack in VMware and start the VMware tools install. BackTrack uses up around 5 GB once installed, so plan accordingly. mkdir /mnt/cdrom mount /dev/cdrom3 /mnt/cdrom cp -rf /mnt/cdrom/VMwareTools-7.8.5-156735.tar.gz /tmp/ cd /tmp/ […]
What is JSky? JSky is a windows-based GUI Web Application Vulnerability Scanner, which is totally FREE. ; ) What can JSky do? It’s a vulnerability scanner, so it can scan these vulnerabilities: * SQL Injection * XSS * Unsecure object using * Local path disclosure * Unsecure directory permissions * Server vulnerabilities like buffer overflow […]
The suspects, who are 17 and 18 years old, were arrested on Wednesday by appointment at a central London police station, the Metropolitan Police said in a statement. They are still being held on suspicion of conspiracy to commit fraud and of contravening the Computer Misuse Act. The two are thought to have participated in […]
Metasploit – Penetration Testing Resources Metasploit provides useful information and tools for penetration testers, security researchers, and IDS signature developers. This project was created to provide information Metasploit Unleashed – Mastering the Framework Learn Here