allow-hotplug eth1
iface eth1 inet dhcp
The second line instructs the interface to obtain an IP via DHCP. However, doing it would only wor
after I've called ifup eth1. So I added the first line, which would load the interface at boot tim
EDIT: full /etc/network/interfaces:
=======================
# This file describes the network interfaces available on your system
# and how to activate them. For more information, see interfaces(5).
# The loopback network interface
auto lo
iface lo inet loopback
# The primary network interface
allow-hotplug eth0
iface...
analysing a Blue Screen issue
Most Blue Screens are caused by drivers or other kernel mode software attempting to access protected memory. The tools for analyzing the crash dump created during a Blue Screen are not very friendly. Follow these steps to determine the cause of the Blue Screen.
Download WinDbg.
Firstly down load the Standalone Debugging Tools for Windows (WinDbg) from:
https://msdn.microsoft.com/en-us/windows/hardware/hh852365.aspx
Install WinDbg
Run the installer
Select Install the Windows Software Development Kit for Windows to this computer.
Accept the...
LFI: beyond /proc/self/environ
Let’s suppose that we have a simple php application. The web app has a login form and a small news system based on txt files.
So a user can simple log into the system
And access the company’s internal board:
After looping through all the pages, one can guess that the web app is loading the content for each section from a plain text file.
Reviewing the code clarifies the question.
So at this point, an evil user could perform some local file inclusion and read files in the remote system.
We all know how to exploit that via the “/proc/self/environ”...
SQL INJECTION INTRODUCTION
SQL INJECTION INTRODUCTION
SQL INJECTION INTRODUCTION--
SQL Injection is the most common vulnerability on the internet.
It is mainly flaw in the web application & not a Database or web server issue.
most programmer are still not aware of this threat.
What is SQL Injection ????
Sql
injection is a technique used to take advantage of non-validate Input
vulnerabilities to pass SQL commands through a web Application for
execution by back-end Database.
In
Other words,Sql injection is a basic techniques /attack used to either...
How to Create a Bootable Windows 7
How to Create a Bootable Windows 7
# Run Command Prompt as an administrator. To open a command prompt, go to the Start menu and search for CMD. Right-click on it and select Run as Administrator to use it with admin rights.
# Using the Diskpart utility find the drive number of your flash drive. To do so, type in the following command in the command prompt: DISKPART
Running DISKPART will display the version of DISKPART you are running and the name of your PC.
Type “list disk” to see a display of all your connected disk drives. Make a note...
الاشتراك في:
الرسائل (Atom)

- Ali BawazeEer
- طالب يمني , متخصص في تقنية المعلومات متحمس في معرفة كل مايختص بأمن المعلومات و تحقيق جرائم أمن المعلومات محب للكل ومحارب للعنصرية بشتى أشكالها ............................................................................. an enthusiastic student, from yemen lover not fighter specialize in BscIT interested in everything related to information security specially in terms of computer forensics
The measure of a mans life is not how well he dies, but how well he lives..