Friday, October 15, 2010

NTFS Basics

The Windows NT file system (NTFS) provides a combination of performance, reliability, and compatibility not found in the FAT file system. It is designed to quickly perform standard file operations such as read, write, and search - and even advanced operations such as file-system recovery - on very large hard disks.

Formatting a volume with the NTFS file system results in the creation of several system (metadata) files such as $MFT - Master File Table, $Bitmap, $LogFile and others, which contains information about all the files and folders on the NTFS volume.

The first information on an NTFS volume is the Partition Boot Sector ($Boot metadata file), which starts at sector 0 and can be up to 16 sectors long. This file describes the basic NTFS volume information and a location of the main metadata file - $MFT.

Tuesday, October 12, 2010

What is Security Audit?

Footprinting -- Applications to gain initial knowledge about a server, such as Whois and Dig.
Analysis -- Tools to analyze a network, such as Ethereal.
Scanning -- Tools to scan the network, such as Nmap.
Wireless -- Applications to test the wireless network.
Brute-forcing -- The brute-force password cracking word list holds more than 64 million word entries, according to the Auditor Web site.
Cracking -- Cracking tools to be used with the brute-force word lists.

How to count rows in a coloum

SELECT ROW_NUMBER () OVER (ORDER BY date) AS Rowid
FROM tblattendance

What Is Spyware?

Spyware is a broad category of malicious software designed to intercept or take partial control of a computer's operation without the informed consent of that machine's owner or legitimate user. While the term taken literally suggests software that surreptitiously monitors the user, it has come to refer more broadly to software that subverts the computer's operation for the benefit of a third party.

Spyware differs from viruses and worms in that it does not usually self-replicate. Like many recent viruses, however, spyware is designed to exploit infected computers for commercial gain. Typical tactics furthering this goal include delivery of unsolicited pop-up advertisements; theft of personal information (including financial information such as credit card numbers); monitoring of Web-browsing activity for marketing purposes; or routing of HTTP requests to advertising sites.

Regular Expression for Password

^(?=.{8,30})(?=.*[^A-Za-z])(?=.*[A-Z])(?=.*[a-z]).*

This means following:-

^ = starting from the beginning of the string...
(?=.{8,30}) = there is a string that is at least 8 characters long... (the upper bound of 30 cannot work this way)
(?=.*[^A-Za-z]) = somewhere in the string, there is at least one non-alphabetic character...
(?=.*[A-Z]) = somewhere in the string, there is at least one uppercase character...
(?=.*[a-z]) = somewhere in the string, there is at least one lowercase character....

.* match anyting, provided that all the above conditions are met.