Wednesday, June 4, 2014

how to break root pasword of linus with snapshot?

How to break root pasword of linus with snapshot?  Or,
How to set new password of root without log into the root user?

Step 01 : Press any button or space bar in the window . And Press "a" to modify.



Step 3: After that this window will come . after rhgb quiet >> write "1" . it will give you access to single user interface. 


Step 3 : After that when this window come . Write "passwd" and it will prompt to set the password . Now set the new password as your wish ! and reboot ! And enjoy :- )


Any Question ask me without any hesitation ?

Tuesday, June 3, 2014

ALL ABout Linux RedHut for EX300 (Will be continue updateing .. )

(1) Configure Host Name
# vim /etc/sysconfig/network

(2) Configure IP Address, Gateway and DNS.
Validate these profiles:
a) Check gateway: # vim / etc / sysconfig / network
b) Check Host Name: # vim /etc/hosts
c) Check DNS: # vim /etc/resolv.conf
d) Check Gateway: # vim /etc/sysconfig/network-scripts/ifcfg-eth0


Question 1
In accordance with the following requirements to deploy ssh login service:
(1) Make  example.com which can remote login your systems.
(2) Where, users of remote.test can not use ssh login to your machine.


[root@server1 ~]# grep sshd /etc/hosts.allow
sshd:.example.com
[root@server1 ~]# grep sshd /etc/hosts.deny
sshd:.remote.test

Note:
tcp_wrappers has two configuration files and their priority level is
/etc/hosts.allow->/etc/hosts.deny




Sunday, June 1, 2014

Trying to Explain TCP/IP Protocols, Components etc

Actually TCP and IP both are protocol suite.

Transmission Control Protocol(TCP) and Internet protocol(IP):- 


1. IP :- they control  Routing of information to different devices, servers , etc. deals with default address , gateway, DNS , It is routable protocol.

Internet protocol is used for transmission of data over the internet. IP uses IP addresses to identity each machine uniquely. Message is sent using small packets. The packet contains both the sender and receivers address. IP does not guarantee the delivery in the same order as sent. This is because the packets are sent via different routes. It is a connectionless communication protocol at the third level (network) of the OSI model.

2. TCP :- It actually means when Two computer connected it is the process the determined how this computer may talked to each other. It is OSI layer 4 (Transport Layer)

Transmission control Protocol is used to establish communication between nodes or networks and exchange data packets. It guarantees delivery of data packets in the order they were sent. Hence it is most commonly used in all applications that require guaranteed delivery of data. It can handle both timeouts (if packets were delayed) and retransmission (if packets were lost). The stream of data is transmitted in segments. The segment header is 32 bit. it is a connectionless communication protocol at the third level (network) of the OSI model.

How these computer talked to each other? When they are connected what they do they started to send packet to each other. So, They Exchange packet with each other and they double their sending of packets from 1,2,4,8,16 ...  but every time they are facing interruption then they again staring they are from starting point means from 1 packets then 2 , 4, 8 . 16 ... And this process is called windowing.

How TCP/IP works:-

Components : - 
  • IP:- Every computer need IP address to communicate with each other. example:- 10.0.0.1,192.168.2.1 etc
  • Subnet mask :- Next you need Subnet mask and which helps to segment a network logically . but remember router connects different subnets. 
  • Default Gateway :- Then comes Default Gateway is the router for subnetwork. 
  • DNS :- Lastly comes DNS server which is used to mapped domain name with the ip address. 


·    Explain the classes of IP address

IP addresses are organized into classes. For convenience of humans, IP addresses are expressed in the decimal format. Every number in each class is represented as binary to computers.
The four numbers in an IP address are known as ‘octets’. Each of them has eight bit positions. The octets are divided into two sections: Net and Host. The first octet represents Net for identifying the network and the Host contains the last octet. There are five IP classes.
Class A: The class A is used for very large networks. There are 1 to 126 are part of this class. That means there are 126 Class A networks. Class A networks accounts for half of the total available IP addresses.
Class B: It is used for medium size networks. The IP address with a first octet from 128 to 191 is part of this class. Class B networks have a first bit value of 1 and a second bit value of 0 in the first octet.
Class C: Class C is used for small to middle size networks. IP address with a first octet starts from 192-223. Class C networks have a first bit value of 1, second bit value of 1 and a third bit value of 0 in the first octet.
Class D: It has first, second and third bit value as 1 and the fourth bit as 0. The other 28 bits are used for identifying the group of computers which is intended for multicast messages.
Class E: Class E is used for identification purpose. The four bits value is 1. The other 28 bits are used for identifying the group of computers which is intended for multicast messages.


·     Define Subnetting:- 

A subnet describes a set of networked computers which have common IP address routing prefix.


Breaking the networking into smaller and more efficient subnets is known as subnets. Subnetting prevents Ethernet packet collision which has excessive rates in a large network. Routers are used to manage the traffic and constitute borders among subnets.

Subnetting is dividing a network into several subnets.
This is usually done for the following purposes:
  • Reducing network traffic by decreasing the number of broadcasts
  • Exceeding the limitations in a local area network
  • Enabling people to connect to the network remotely without opening the entire network 

DHCP:- Dynamic Host Configuration Protocol :- 

·        Dynamic Host Configuration Protocol is used assigning IP addresses to computers in a network. The IP addresses are assigned dynamically. Certainly, using DHCP, the computer will have a different IP address every time it is connected to the network. In some cases the IP address may change even when the computer is in network. This means that DHCP leases out the IP address to the computer for some time. Clear advantage of DHCP is that the software can be used to manage IP address rather than the administrator. 

DHCP vs Static IP:- 

With static IP addressing, addresses are assigned manually, and have to be provisioned carefully so that each device has its own address—with no overlap. When you connect a new device, you would have to select the "manual" configuration option and enter in the IP address, the subnet mask, the default gateway and the DNS server(s). If you understood any of what I just said, you probably have the skills and knowledge necessary to manage static IP addresses on a home network. If it was basically gibberish, you’d probably be more comfortable with DHCP.

DHCP takes all of the manual work out of IP addressing. Generally, the device that's at the "top" of your home network—whether it's a standalone firewall or a router/gateway device or your Control4 home controller—will provide DHCP by default as a service on the network. When DHCP is enabled, a new device connected to the network asks the DHCP server for an address, and the server assigns one from its pool of unused locations. The server itself tracks which addresses are used and which addresses are available, and keeps a record of which addresses have been assigned to the various devices. This ensures that addresses don't conflict with each other. However, it also means that, if a device goes offline, when it reconnects it may not have the same IP address it had before.

What is Network address translation (NAT

It enables us to reuse IP address. For these every computer or device did not have to use unique ip address. 


Network Address Translation translates and IP address used in a network to another IP address known within another network. A NAT table is maintained for global to local and local to mapping of IP’s. NAT can be statically defined or dynamically translate from a pool of addresses. The NAT router is responsible for translating traffic coming and leaving the network. NAT prevents malicious activity initiated by outside hosts from reaching local hosts by being dependent on a machine on the local network to initiate any connection to hosts on the other side of the router.

It is basically Short for Network Address Translation, an Internet standard that enables a local-area network (LAN) to use one set of IP addresses  for internal traffic and a second set of addresses for external traffic. A NAT box located where the LAN meets the Internet makes all necessary IP address translations.

NAT serves three main purposes:

  • Provides a type of firewall by hiding internal IP addresses 
  • Enables a company to use more internal IP addresses. Since they're used internally only, there's no possibility of conflict with IP addresses used by other companies and organizations. 
  • Allows a company to combine multiple ISDN connections into a single Internet connection.

I found a very useful video , where it explained it very easily .






Featured Post

Managing CA Certificates on Red Hat Linux 9: Understanding update-ca-trust extract

  Managing CA Certificates on RHEL9 RHEL8 OracleLinux9 OracleLinux8 In today's digital landscape, securing communications and verifying ...