how to protect against internet threats

Increasing internet threats are becoming a big headache thesedays.Hence it seems very difficult to protect against internet threats during online activities.But with few basic precautions it is very easy to secure yourself fr0m most of the crackers and script kiddies;most of the crackers and script kiddies succeeded due to the ignorancy of the end user.Most …

how to manage e-books collection/library

Now e-books are becoming more popular and useful.When you have a number of e-books on different categories then it is difficult to keep track of  them.That’s why you need a library manager so that you can manage your collections more effectively.I am going to introduce you with an open source software which is a complete …

new features of ubuntu 10.04

Mozilla firefox : ubuntu 10.04 beta came with the latest verson of mozilla firefox 3.6 ,and the default search engine is yahoo. Desktop : ubuntu 10.04 beta lts came with the latest verson of GNOME desktop(as default) with some new features and programs. Linux-cernel : it has come with 2.6.32-16.25 kernel. Hal removal : the …

how to hijack a tcp connection|hacking tcp sessions

Hijacking a tcp connection requires just a little bit knowledge about IP spoofing and ACK numbers. IP spoofing is a simple technique in which the attacker/hacker replaces the IP address of the sender i.e sends some data by confusing the receiver.ACK or SEQ numbers are used by the web servers to distinguished between different sessions and …

what is ip fragment attacks|IP fragmentation hacks

IP Fragment IP fragments is useful in keeping tracks of the different parts of a datagram in TCP/IP suite.When the data packets arrived at the destination field then it is used to reassemble the datagrams.The identification value of all the IP fragments are same so the fragmentation offset is used to indicates the actual position …