Friday, September 9, 2016

USB Killer Kill Your PC, No Virus needed, Now Up For Sale


We have come across USB drives that have malware hidden inside. The malware makes your device its home as soon as the USB drive is connected to your computer. The health of your computer starts degrading and it moves towards a slow death.
There are another kind of ruthless USB Killer drives which can kill your computer or any hardware device with a USB port almost instantly and that too painfully. Last year, we heard about a USB Killer prototype and the USB Killer v2.0 testing. Now, the USB Killer V2.0 has become powerful than ever and is available on http://sh.st/NaRek at a cost of $49.95.

The USB Kill V2.0 can permanently damage any device with a USB port, e.g., a computer, laptop, DVR, television, etc. An important point to consider is that the USB Kill is not made to serve any evil intention. Instead, it’s a power surge test device that can be used by hardware developers to observe the effects of such a disastrous thing on their hardware.

When the USB Kill stick is connected to the USB port of a device, it charges itself using the 5V power line until the voltage value reaches 240V. It then discharges itself into the data lines of the USB port causing a power surge leading to malfunctioning of the device. The charge and discharge cycle repeats until the USB Kill is removed from the device.
Almost 95 percent of the devices couldn’t stand in front the USB Killer V2.0 during the tests, says the company. However, the latest MacBooks were the only devices which weren’t affected by the USB Killer v2.0 stick.
If you want to test your hardware but don’t want to burn your device, the company has made a USB Killer Tester which protects your hardware when the USB Kill stick is used to test its surge protection capabilities. The Tester Shield also doubles up as a data protection tech. It prevents juice jacking data thefts when your device is connected to a USB port. The is available at $13.95.

Thursday, March 10, 2016

MYSQL HIVE HADOOP

How to Configure MySQL Metastore for Hive? 

 

Hive by default comes with Derby as its metastore storage, which is suited only for testing purposes and in most of the production scenarios it is recommended to use MySQL as a metastore. This is a step by step guide on How to Configure MySQL Metastore for Hive in place of Derby Metastore (Default).
Assumptions : Basic knowledge of Unix is assumed and also It’s assumed that Hadoop and Hive configurations are in place.Hive with default metastore Derby is properly configured and tested out.


1-Install  MySQL - 
$ sudo apt-get install mysql-server
2. Install the MySQL Java Connector –
$ sudo apt-get install libmysql-java

ln -s /usr/share/java/mysql-connector-java.jar $HIVE_HOME/lib/mysql-connector-java.jar
 
4. Create the Initial database schema using the hive-schema-0.14.0.mysql.sql file ( or the file corresponding to your installed version of Hive) located in the $HIVE_HOME/scripts/metastore/upgrade/mysql directory.
 
mysql -u root -p
Enter password:
mysql> CREATE DATABASE metastore;
mysql> USE metastore;
mysql> SOURCE /usr/local/hive/scripts/metastore/upgrade/mysql/hive-schema-0.14.0.mysql.sql;

5. You also need a MySQL user account for Hive to use to access the metastore. It is very important to prevent this user account from creating or altering tables in the metastore database schema.

mysql> CREATE USER 'hiveuser'@'localhost' IDENTIFIED BY 'hivepassword'
mysql> GRANT ALLon *.* to 'hiveuser'@localhost identified by 'hivepassword';
 
mysql>  flush privileges;
 
6. Create hive-site.xml ( If not already present) in $HIVE_HOME/conf folder with the configuration below –
 
 <configuration>
<property>
<name>javax.jdo.option.ConnectionURL</name>
<value>jdbc:mysql://localhost/metastore?createDatabaseIfNotExist=true</value>
<description>metadata is stored in a MySQL server</description
</property>
<property>
<name>javax.jdo.option.ConnectionDriverName</name>
<value>com.mysql.jdbc.Driver</value>
<description>MySQL JDBC driver class</description>
</property>
<property>
<name>javax.jdo.option.ConnectionUserName</name>
<value>hiveuser</value>
<description>user name for connecting to mysql server</description>
</property>
<property>
<name>javax.jdo.option.ConnectionPassword</name>
<value>hivepassword</value>
<description>password for connecting to mysql server</description>
</property>
</configuration>
 
7. We are all set now. Start Hadoop and the hive console. 






  

 

 

Wednesday, March 2, 2016

Incorrect configuration: namenode address dfs.namenode.servicerpc-address or dfs.namenode.rpc-address is not configured.


Solving Name Node Hadoop problem:

Incorrect configuration: namenode address dfs.namenode.servicerpc-address or dfs.namenode.rpc-address is not configured.

Online meal chaos to find, try a variety of methods while chaos, do not solve the problem. Then, suddenly thought, the problem may be the right start to the day
yesterday to start doing some of the changes between the error caused,the solution is add environment variables.

These steps solved the problem for me:

export HADOOP_CONF_DIR = $HADOOP_HOME/etc/hadoop

echo $HADOOP_CONF_DIR

hdfs namenode -format

hdfs getconf -namenodes

./start-dfs.sh


Then, Hadoop can properly started.

Saturday, January 30, 2016

Best Hacking Tools Of 2016 For Linux, Windows and Mac OS X.



Disclaimer: We are publishing this article just for educational purposes and we don’t promote any malicious practices.


        Metasploit:

Rather than calling Metasploit a collection of exploit tools, I’ll call it an infrastructure that you can utilize to build your own custom tools. This free tool is one of the most popular cybersecurity tool around that allows you to locate vulnerabilities at different platforms. Metasploit is backed by more than 200,000 users and contributors that help you to get insights and uncover the weaknesses in your system.

         Acunetix WVS:

Acunetix is a web vulnerability scanner (WVS) that scans and finds out the flaws in a website that could prove fatal. This multi-threaded tool crawls a website and finds out malicious Cross-site Scripting, SQL injection, and other vulnerabilities. This fast and easy to use tool scans WordPress websites form more than 1200 vulnerabilities in WordPress.

        oclHashcat:

If password cracking is something you do on daily basis, you might be aware of the free password cracking tool Hashcat. While Hashcat is a CPU-based password cracking tool, oclHashcat is its advanced version that uses the power of your GPU.
This tool employs following attack modes for cracking:
  • Straight
  • Combination
  • Brute-force
  • Hybrid dictionary + mask
  • Hybrid mask + dictionary

    Nessus Vulnerability Scanner:

    This top free hacking tool of 2016 works with the help of a client-server framework. Developed by Tenable Network Security, the tool is one of the most popular vulnerability scanners we have. Nessus serves different purposes to different types of users – Nessus Home, Nessus Professional, Nessus Manager and Nessus Cloud.

    Maltego:

    Maltego is an open source forensics platform that offers rigorous mining and information gathering to paint a picture of cyber threats around you. Maltego excels in showing the complexity and severity of points of failure in your infrastructure and the surrounding environment.
    Maltego is a great hacker tool that analyzes the real world links between people, companies, websites, domains, DNS names, IP addresses, documents and whatnot. Based on Java, this tool runs in an easy-to-use graphical interface with lost customization options while scanning.


    Other top hacking tools in multiple categories:

    Web Vulnerability Scanners – Burp Suite, Firebug, AppScan, OWASP Zed, Paros Proxy
    Vulnerability Exploitation Tools – Netsparker, sqlmap, Core Impact, WebGoat, BeEF
    Forensic Tools – Helix3 Pro, EnCase, Autopsy
    Port Scanners – Unicornscan, NetScanTools, Angry IP Scanner
    Traffic Monitoring Tools – Nagios, Ntop, Splunk, Ngrep, Argus
    Debuggers – IDA Pro, WinDbg, Immunity Debugger, GDB
    Rootkit Detectors – DumpSec, Tripwire, HijackThis
    Encryption Tools – KeePass, OpenSSL, OpenSSH/PuTTY/SSH, Tor
    Password Crackers – John the Ripper, Aircrack, Hydra, ophcrack

     


 

 


Sunday, September 13, 2015

مسابقة واحدة يمكنها إنقاذ العالم من الكوارث ... أبطالها الروبوتات


حرائق ، عواصف، سيول جارفة، أعاصير، حروب مدمرة، نزاعات محلية أو دولية، كلها تشكل حال كوكب الأرض اليوم. ومن باب التحلي بالمسؤولية والخوف على مصير البشرية، قررت وكالة أبحاث مشاريع الدفاع المتقدمة التابعة لوزارة الدفاع الأمريكية إدخال الروبوتات في عمليات مواجهة الكوارث الطبيعية أو التي من صنع الإنسان، ومن أجل ذلك قامت بتنظيم مسابقة يتحدد من خلالها الروبوت المنقذ للبشرية ... تعالوا معنا لنتعرف سوية على المسابقة التي ستساهم في إنقاذ البشر من الكوارث ومساعدتهم على مواجهتها. المهام التي يتعين على الروبوتات اجتيازها خلال منافسة تحدي روبوتات داربا 






أن تبني روبوتاً فهو بحق أمرٌ رائع، ولكن أن تقوم بتنظيم تحدي لهذه الروبوتات للتنافس فيما بينها فهو أمر أكثر من رائع.



60 دقيقة أو أقل، وثمانية مهام متسلسلة هي كل ما تحتاجه روبوتات وكالة أبحاث مشاريع الدفاع المتقدمة (داربا) التابعة لوزارة الدفاع الأمريكية لكي تتسابق من أجل الفوز بتحدي روبوتات داربا. في مقالنا التالي سنلقي الضوء على هذه المهام، وسنقوم بتحليل وتفصيل جميع القواعد التي يجب على 

الروبوتات إتباعها للفوز بالمسابقة.



ما هو تحدي روبوتات وكالة أبحاث مشاريع الدفاع المتقدمة؟


إن تحدي روبوتات داربا هو عبارة عن منافسة تقام بين أنظمة الروبوت وفرق البرمجة الخاصة بها من أجل تطوير روبوتات قادرة على مساعدة البشر في الاستجابة والتعامل مع الكوارث الطبيعية والمسببة من قبل البشر. وقد تم تصميم هذه المسابقة لتكون صعبة للغاية تحاكي الظروف الواقعية. وفي ختام هذه المسابقة، يحصل الفريق الفائز على 2 مليون دولار أمريكي.



تمثل الفرق المشاركة في المسابقة أكثر منظمات التطوير والبحث تقدماً في العالم في مجال الأنظمة الروبوتية، وعلى هذه الفرق التعاون وابتكار أنظمة روبوتية جديدة خلال فترة زمنية قصيرة جداً ويتم خلالها أيضاً تطوير العتاد الصلب والبرمجيات، والحساسات، وواجهات التحكم البشرية التي تقوم بتمكين روبوتاتهم من إكمال مهام التحدي التي تحددها وكالة أبحاث مشاريع الدفاع المتقدمة لمحاكاة وتقييم أداء هذه الروبوتات مع الكوارث.

مخطط سير المهام ضمن المنافسة، مع الإشارة إلى عامل الوقت الذي يبلغ ساعة واحدة فقط.



refference:http://www.syr-res.com/article/7570.html



Thursday, September 3, 2015

RaspberryPI-NOIP-WAN

Create Account on no-ip.com


Confirm your account

Log in to your account

Add a host or domain to your account

Configure your router(Set your ip address and port number)

Install the client No-IP to your Raspberry Pi

mkdir noip
cd noip
sudo wget http://www.no-ip.com/client/linux/noip-duc-linux.tar.gz
sudo tar vzxf NOIP Duke-linux.tar.gz
cd noip-2.1.9-1
sudo make
sudo make install


The client is now installed and configured, you can start:
sudo / usr / local / bin / noip2
a script found in 
/etc/init.d

sudo nano /etc/init.d/noipscript

Launch the script automatically at startup 

sudo update-rc.d noipscript defaults


Conclusion

With this script NOIP, you will be able to publish your services (web, ftp ...) on the Internet.

Already using No-IP service or this tutorial has given you ideas of use? Do not hesitate to ask in the comments below ... They are made for!

Wednesday, September 2, 2015