Thursday, July 6, 2017

SECFND 210-255Implementing Cisco Cybersecurity Operations Exam and SECOPS 210-250 Understanding Cisco Cybersecurity Fundamentals [DUMPS]


FOR UPDATED Implementing Cisco Cybersecurity Operations Exam DUMPS you can email me at cryptographickeyx.509@gmail.com I will mail you the dumps immidiatly after payment
SECFND 210-250 $70
SECOPS 210-255 $70
CHALLENGE SECFND 210-250 $100
CHALLENGE SECFND 210-255 $100

Challenge Dumps to finish all chapters with golden medal is also available


Accepted Currency
- Bitcoin (BTC)
- Perfect Money (PM)

Friday, November 25, 2016

ADD PROGRAM TO RUN COMMAND EXECUTOR

ADD PROGRAM TO RUN COMMAND EXECUTOR

The RUN program is a small program is is use in quick command execution, without going into Command Prompt.
 



SECTION ONE: SETTING PROGRAM


TO SET PROGRAM TO RUN FOLLOW THE STEPS THAT FOLLOW:

1. Start + E
2. at the top click on "system properties"
3. on the side bar click on "advanced system settings"

4. click on "environmental variables"

5. click on "new "
6. type the "variable name" of your choice, Note: command to execute the program
7. click on browse as indicated by the picture
 

8. locate the location of the program
9. click ok, and ok again, to close the box

SECTION TWO: RUNNING



TO RUN THE PROGRAM



1. from your home screen (Desktop)
2. press: Start + R
3. type the name of the program (variable name) as in SECTION 1:6, in my own case I typed: notepad++

4. click ok...

you are free to post your comment or questions!...

Tuesday, November 22, 2016

How solve x64bit not showing in Virturalbox and VM Ware Problem

A lot of people do get across this problem of their system not showing x64bit among the list of OS in their VIRTUALIZATION SOFTWARES or Not Functioning, and blame their OS, Processor, the system manufacturers, the software and so on.
well this problem is mainly because of these three factors

● The Virtualization Technology is off from you BIOS
● The Virtualization software (Virtual Machine or Virtual Box) version is 32bit only.
● The Microsoft Virtualization software (Hyper V) is enabled

Virtualization Technology (VT), also known as Vanderpool, this technology enables a CPU to behave as if you have several independent computers, in order to allow many OS (operating systems) to run at the same time on same computer.
x86 = 32bit = i386
x64 =  64bit
What causes you to see 32bit list of operating system without the 64bit, while you have 64bit OS running.


let's take these problems one after the other

VIRTUALIZATION TECHNOLOGY OFF
(How to turn on Virtualization Technology)

○ Turn off your computer completely
○ power it on
○ look for the appropriate button to press for BIOS menu, as show in most boot screen "X" = boot menu
○ "X" represent the key indicate in your own boot screen, like in mine is F2
○ After getting to boot menu check under security or Advance settings or any other tab there for "Virtualization Technology" if using intel also for "Intel Virtualization Technology"
○ use the appropriate button of enabling and enable it
○ press F10 to save changes and Exit

VIRTUALIZATION SOFTWARE IS 32bit
(How to get 64bit VM)

This problem is not common in Windows version of Virtualbox, because they kind of have virtual box that work for both 32 and 64 bit,
but for those of you using other operating systems, especially Linux you will need to download the 64bit version
of the Virtualbox before it could run 64bit OS virtually, so click to download the x64bit as indicated in the picture below


[ HYPER V ] VIRTUALIZATION SOFTWARE IS ON
 ( How to turn off Hyper V )

● Click on start menu
● type: "program and features" to search
● click to open "program and features"
● on the left side of the windows look for "Turn Windows features on or off"
● click on it
● uncheck "Hyper-V if " if checked.


Saturday, November 19, 2016

USING THE ATTRIB COMMAND TO HIDE AND UN-HIDE FILES/FOLDERS


_______________________________________________________________________
ATTRIB
===============================================================
    After studying this command you come to understand the operation of common viruses
hides you files and folders in your removable media (Flash disk, Hard Disk and so on).

And also learn how to unhide the hidden files manually using the attrib command.
Displays or changes file attributes, that also include making file/folders visible or hidden

ATTRIB [+R | -R] [+A | -A ] [+S | -S] [+H | -H]

Command Pattern [drive:][path][filename] [/S [/D] [/L]]

Example c:/tutorial/test.txt

c:                 represents drive:
/tutorial/         represents path
filename         represents filename

  +   Sets an attribute.
  -   Clears an attribute.
 
 
  R   Read-only file attribute.
  A   Archive file attribute.
  S   System file attribute.
  H   Hidden file attribute.
      Specifies a file or files for attrib to process.
  /S  Processes matching files in the current folder
      and all sub-folders.
  /D  Processes folders as well.

USAGE EXAMPLE
 attrib +h *
attrib    - is the command for the attribution of files or folders
  +        - indicates the action should be postive, that is make active
  h        - means to hide
  *          - star or wildcard it a character that indicates that, the action should include everything
within that folder.

HIDING FILES USING THE ATTRIB COMMAND

UN-HIDING FILES USING THE USING THE ATTRIB COMMAND

Command
 attrib +h *
attrib    - is the command for the attribution of files or folders
  -        - indicates the action should be Negative, that is make deactivate "h"
  h        - means to hide
  *          - star or wildcard it a character that indicates that, the action should include everything
within that folder.

Note: you can only hide and unhide folders by using the ( /s /d ) switches.

USEFUL ATTRIB COMMAND

attrib -s -h -r /s /d *.*

This command will show all the hidden files hid by virus in your removable media.

But before running this command you will need to change the command execution
folder to the removable media path. If your removable media is F: for example, you will need to
use the command F:
cd means change working directory/folder and F: is the device drive letter, that is the path or location

    After doing this the command prompt will change its location to my removable media "F"


Print Friendly Version of this pagePrint Get a PDF version of this webpagePDF

Thursday, November 10, 2016

INTRODUCTION TO MICROSOFT WINDOWS COMMAND PROMPT




        A command prompt is an entry point for typing computer commands in the Command Prompt window. By typing commands at the command prompt, you can perform tasks on your computer without using the Windows graphical interface.
The command line interpreter application Command Prompt is officially called Windows Command Processor but is also sometimes called the command shell or by its filename cmd.exe.

HOW TO LOCATE AND OPEN COMMAND PROMPT

  • Click on start icon
  • Type “command prompt” or “cmd” without quotes
  • Click on Command Prompt from the search result
  • To run Command Prompt as Administrator you need to
  • Right click on the application
  • And click run as administrator, to
  • As shown in the figure below





REFERENCE
https://windows.microsoft.com/en-ie/windows-vista/open-a-command-prompt-window
https://en.wikipedia.org/wiki/Cmd.exe

Sunday, May 22, 2016

ComputerSecurityStudent (CSS)





ComputerSecurityStudent(CSS)
    Computer Security Student, LLC is pleased to offer a unique training certification in "Hac-King-Do (HKD)", which is a "Cyber Security Martial Arts Framework."

    Hac-King-Do bridges the gap between theory and actual hands-on experience. Computer Security Student, LLC offers hundreds of technical labs in the following subjects:

    1) Building, Installing and/or Securing Operating Systems: Fedora, Ubuntu, CentOS, BackTrack 5R1, Kali, Windows XP, Windows 7, Windows 2K8, and more.

    2) Installing and Securing Applications: SSH, Apache, Samba, NFS, Mail, DNS and more.

    3) Performing Penetration Testing against both Operating Systems and Applications.

    4) Performing Vulnerability Assessment against both Operating Systems and Applications.

    5) Illustrating the following exploitation techniques: Password attacks, Trojan Horse Creation, Social Engineering, Buffer Overflows, Backdoors, Rootkits, Zero-Day Vulnerabilities, Web Injections, Man-in-the-Middle Attacks, and much more.

    6) Performing Web injection techniques against the following capture the flag web applications: DVWA, Mutillidae, and bWAPP.

    7) Performing Forensic Analysis and Assessments against the above Operating Systems and Applications.

    Computer Security Student, LLC provides assistance and help through a unique ticket system that allows the student to show the administrator exactly where the issue is taking place. Please go to the following link to see the curriculum in its entirety.

    # Hac-King-Do Curriculum
    http://www.computersecuritystudent.com/START/HOWTO/lesson9/index.html
  • Mission
    To provide Students and Cyber Security Professions with hands-on training, that is equivalent to the popular industry certificates, for a very affordable price.

    Why spend $3000 for just one week, when you can spend $10 a month for 3 times as much content?
  • Price Range
    $10
  • Products
    Computer Security Hands-on Lessons, Step by Step Directions, and unlimited assistance.
  • Email
    computersecuritystudent@gmail.com
  • Website
    http://www.computersecuritystudent.com


1. LinkedIn (https://www.linkedin.com/pub/);
2. Twitter (https://twitter.com/HKD_); and on
3. Facebook (https://www.facebook.com/).