THOUSANDS OF FREE BLOGGER TEMPLATES

Wednesday, February 9, 2011

Project Of The Week_Cable Tester


peralatan yg diperlukan:-

--         LED,Base,Battery 9v dan clip,Resistor


-         -solder  tool

-         -face plate, straight cable

langkah-langkah:-

  • -         tebuk lubang di atas face plate utk masukkan led dan suiz.
  • -         sambungkan kesemua kaki LED (anod)dengan menggunakan jumper wire, kemudian pintaskan jumper wire bateri clip(negative) pada suiz
  • -         sambungkan kesemua katod dengan wire oren-putih, biru-putih , hijau-putih dan coklat-putih
  • -         sambungkan wire oren,biru, hijau dan coklat dengan resistor
  • -         pintaskan jumper wire pada resistor dengan suiz
  • -         test cable tester yg dh siap.pasangkan battery pada battery clip,masukkan cable pada face plate.seterusnya on suiz.
  • -         kalau semua LED menyala maksudnya operation success..dan sebaliknya...

dan......inilah hasilnyaa....

Tuesday, February 8, 2011

CARA PEMASANGAN UTP CABLE DAN RJ-45



Alat2 atau tools yg diperlukan:
1. Crimper 



2. Stripper/Pemotong cabel (pisau/gunting, etc)

3. Cable Tester

4. RJ-45(2unit)

5. Cabel UTP 5e



Langkah-langkah utk memasang UTP cable dan RJ-45


  • potong 2cm shield kabel dengan menggunakan stripper ( pelindung kabel biasanya bewarna kelabu ) 


  • kemudian luruskan cable tersebut, dan masukkkan cable berdasarkan pewarnaannya di salah satu ujung cable UTP tersebut.Susunan cable adalah seperti gambar di atas

 collage pixta sepanjang pembikinan cable..hehe.candid.....




Wednesday, January 26, 2011

PART 1:BASIC NETWORK CABLING


Type of cable      – twisted pair (STP, UTP)
                        - coaxial cable
                        - fiber  optic
  STP (shielded twisted pair)

-          Include shielding.

-          More expensive n difficult to install but it has better electrical than UTP


-          Contain pairs of thin copper wires. Use 3 types of insulation:-

i)             Each single wire is covered in color-coded plastic insulation

ii)            Each pair of wired is twisted together with an insulator (pair shield) around them


iii)          All the wires in the cable are covered by a shield called the overall shield


UTP (unshielded twisted pair)

-          Consists of pair of thin cooper wired that are twisted together  and covered in color-coded plastic insulation

-           The wire pairs are then covered with a plastic outer jacket


-          Advantages of UTP:-
i)             Not required grounded. So it’s the easiest to add connectors to the end.

ii)            Small diameter makes it more flexible – easier to work


iii)          Support the same data speeds as other cooper media.
UTP CABLE CATEGORY
PURPOSE
COMMENTS
Cat 1
Telephones
Not suitable for data
Cat 2
Token ring
Support 4-Mbps token ring
Cat 3
Telephones and 10BASE-T
10BASE-T was created with a design goal of supporting the large installed base of cat 3 cable in `80`s
Cat 4
Token ring
Supports 16-mbps token ring
Cat 5
Ethernet
Supports 10BASE-T and 100BASE-T
Cat 5e
Ethernet
Uses the same cable as cat 5 but with more stringent requirement on the connector and the cable testing. Support gigabit Ethernet
Cat 6
Ethernet
Officially support 1-gbps Ethernet, with work being done that could use cat 6 cable for 10-gbps Ethernet

Friday, January 21, 2011

KEYLOGGER N FOLDER LOCK


APA ITU KEYLOGGER?

  •   merupakan software yang digunakan untuk memantau kegiatan keyboard komputer.
  •   setiap keyboard yang di tekan oleh user akan direkod semua dan disimpan dengan keylogger.
  •   Semua jenis aplikasi yang mengunakan keyboard dapat dilihat spt paparan data,file tracking,website (facebook,google) serta chat (ym,kampungchat,mirc)

 
BENEFITS
  •   Provides real-time remote monitoring
  •   Records all email and webmail sent and received
  •   Records all online searches
  •   Records instant messaging and chats
  •   Takes screenshots
  •   Tracks all keyword strokes, including passwords
  •   Blocks undesired websites
  •   Monitors all websites visited
  •   Has powerful features
  •   Is invisible to the computer user

WHAT IS ‘MY LOCKBOX’

  •   My Lockbox Control Panel allows you to easily change software parameters: password, location of the protected folders, hotkeys, trusted processes.
  •   The protected folder is hidden and locked from any user.
  •   Is a security software enabling you to password protect folders on your computer.
  •   Have a valid password to unlocked it and protected a folder.

ADVANTAGES

  •   Extremely easy in use.
  •   Trusted processes feature lets backup, antivirus or similar software to backup or scan your protected folder.
  •   Instant protection - no file scrambling or moving to another place.
  •   Almost any folder on your computer can be password protected.
  •   Supports all modern Windows operating systems (XP, Vista, 7) including 64-bit editions.
  •   Effective password protection.
  •   Freeware

 

Encryption

Symmetric Encryption
Symmetric encryption is the oldest and best-known technique. A secret key, which can be a number, a word, or just a string of random letters, is applied to the text of a message to change the content in a particular way. This might be as simple as shifting each letter by a number of places in the alphabet. As long as both sender and recipient know the secret key, they can encrypt and decrypt all messages that use this key.
Asymmetric Encryption
The problem with secret keys is exchanging them over the Internet or a large network while preventing them from falling into the wrong hands. Anyone who knows the secret key can decrypt the message. One answer is asymmetric encryption, in which there are two related keys--a key pair. A public key is made freely available to anyone who might want to send you a message. A second, private key is kept secret, so that only you know it.

Any message (text, binary files, or documents) that are encrypted by using the public key can only be decrypted by applying the same algorithm, but by using the matching private key. Any message that is encrypted by using the private key can only be decrypted by using the matching public key.

This means that you do not have to worry about passing public keys over the Internet (the keys are supposed to be public). A problem with asymmetric encryption, however, is that it is slower than symmetric encryption. It requires far more processing power to both encrypt and decrypt the content of the message.

CAESAR'S CIPHER
A substitution cipher is an extremely simple example of conventional cryptography. A substitution cipher substitutes one piece of information for another. This is most frequently done by offsetting letters of the alphabet. In Julius Caesar's cipher, the algorithm is to offset the alphabet and the key is the number of characters to offset it.
For example, if we encode the word "SECRET" using Caesar's key value of 3, we offset the alphabet so that the 3rd letter down (D) begins the alphabet.

Plaintext    ABCDEFGHIJKLMNOPQRSTUVWXYZ

Ciphertext
          DEFGHIJKLMNOPQRSTUVWXYZABC

where A=D (A encrypts as D) , B=E, C=F, and so on.

Using this scheme, the plaintext, "SECRET" encrypts as "VHFUHW." To allow someone else to read the ciphertext, you tell them that the key is 3.



Thursday, January 13, 2011

SECURITY ATTACK

mgu ni dpt b;jar byk benda coz we r dividi into 8 group to present bout security attack..mean ada 8 tjuk yg berkaitan..antaranya DOS D-DOS,hijacking, viruses n my group cover bout SPOOFING...



What is spoofing’?
-         is a common phishing tactic
-         is the creation of TCP/IP packets using somebody else's IP address. Routers use the "destination IP" address in order to forward packets through the Internet, but ignore the "source IP" address

Examples of spoofing:
- caller ID spoofing
- email spoofing
- man-in-the-middle
- routing redirect
- source routing
- blind spoofing
- flooding

Caller ID spoofing

ž the act of using a spoof card or other tool to call someone's phone under a false name.
ž is a service that allows a caller to masquerade as someone else by falsifying the number that appears on the recipient's caller ID display
Email Spoofing
a technique used by hackers to fraudulently send email messages in which the sender address and other parts of the email header are altered to appear as though the email originated from a source other than its actual source
The first step in spoofing
--determining the IP address of a host the intended target trusts.
--the attacker can change the headers of packets to make it seem like the transmissions are originating from the trusted machine.

Prevention of Caller ID Spoofing
1.     Block spoofing calls. Services such as trapcall.com or safercall.com allow you to block calls that display false caller information. Such calls cannot go through unless the callers display their true identities.

2.     Password protect your voicemail. Failure to password protect your voicemail allows criminals to hack into your voicemail and steal your personal information and contacts. Criminals can use this information to make spoof calls to your contacts and phish for sensitive information.


3.     Avoid revealing sensitive information, such as your credit card or bank account number, via phone. Banks will never call you and request such information; they only request such information over phone when you initiate the contact. One of the main reasons that criminals spoof is to obtain your information. Hence, always be on guard, and do not assume the caller ID is always accurate.
Prevention of Email Spoofing
1.     Safeguard your email address and avoid disclosing it. Spammers are one of the biggest perpetrators of spoofed emails. Use a spam filter, and always use an image to display your email online.

2.     Distinguish real emails from spoofed ones. Look at the part of the email after the "@" sign. Make sure that this part fully matches the company's name.


3.     Examine the email's language, tone and appearance, and note if it is different than usual. A sudden difference in tone or appearance as well as excessive grammar errors are warning signs
.
4.     Do not disclose personal information. Many spoofing emails will request your Social Security number, date of birth or bank account number. Most legitimate financial institutions, however, will never request such information via email.

5.     Report suspicious emails to the company being spoofed. Call the company, or find the email address for reporting suspicious activity on its website. Doing so encourages the company to alert other customers.


Tuesday, January 4, 2011

moment wit MR KAMAL

today lesson juz refresh n wat blik revision wit Encik Kamal bout TCP/IP...
pendekatan yg digunakan tu mudah sket nk phm walopun agk keretapi sket.hehe...ekceli sama je pa yg cik asyraf ajar.. how to calculate IP, cmna nk diffrentiate whether IP tu valid or invalid.
da sket exercise utk nk tgok sejauh mne knowledge yg kitowg dpt..besides, wat pektis ping meng`ping..finally baru laa phm nape aritu ping asek request time out je..its because the firewall laa...

cover sket bout last day activities....
in a group of 2 km ditugaskan utk cri software bout remote control..im wit my buddy; kak fiza pilih tuk guna ACCESS REMOTE CONTROL PC..dua ari satu malam kot cri bru jumpa yg bersesuaian.huhu..topic remote control ni quite interesting for me coz we know how to control pc len..AKA hack secara simple2..huhu.bley ke cmtu..haha
..
then ptg semalam sessi wit Mr. Kamal..juz a talk focus on how to market ourself bila dh kuaq dr Kismec..pe yg beliau cakap tu mmg perkara yg normal jd kt student2..tp pape pun benda yg dicakapkan tu mmg open my mind kot.rs cm lbey bermotivasi gitu..