Username: Save?
Password:
Home Forum Links Search Login Register
    News: Welcome to the TechnoWorldInc! Community!
Participate in the fastest growing Technical Encyclopedia! This website is 100% Free. Please register or login using the login box above if you have already registered. You will need to be logged in to reply, make new topics and to access all the areas. Registration is free! Click Here To Register.
  Show Posts
Pages: 1 ... 14 15 16 17 18 [19] 20 21 22 23 24 ... 27
253  THE TECHNO CLUB [ TECHNOWORLDINC.COM ] / Ethical Hacking / Security / Viruses / Beginners Guide to understanding Unix on: October 15, 2006, 12:15:16 PM
Beginners Guide to understanding Unix

NOTICE: TO ALL CONCERNED Certain text files and messages contained on this site deal with activities and devices which would be in violation of various Federal, State, and local laws if actually carried out or constructed. The webmasters of this site do not advocate the breaking of any law. Our text files and message bases are for informational purposes only. We recommend that you contact your local law enforcement officials before undertaking any project based upon any information obtained from this or any other web site. We do not guarantee that any of the information contained on this system is correct, workable, or factual. We are not responsible for, nor do we assume any liability for, damages resulting from the use of any information on this site.









UNIX for Beginning Users














Developed by:

User Liaison Section, D-7131
Denver Office

[Name and Phone number deleted at authors
Request]

Revision Date: September 16, 1991
I. INTRODUCTION

A. Audience

This course is for individuals who will be using the UNIX
operating system on a Reclamation computer platform. It is
assumed that the student has a general understanding of data
processing concepts.


B. Course Objectives

Upon successful completion of this course the student will be
able to:

1. Demonstrate a knowledge of basic UNIX ideas.

2. Recognize the different types of files and the file
structure.

3. Log in and out of UNIX using an interactive terminal.

4. Change the password and be aware of other
responsibilities of owning an account.

5. Demonstrate a knowledge of where to get help.

6. Use the appropriate UNIX commands to display/print
files, copy/move files, change file access permissions,
create/delete directories, and change the current
working directory.

7. Transfer a file to another computer platform using File
Transfer Protocol (FTP). Use FTP commands to do the
following: initialize FTP, establish connection, local
computer commands, remote computer commands, close
connection, exit FTP, help command, and special
functions.

8. Use an editor to create files, input text,
insert/replace text, copy/move text, and exit/save
changes.

9. Use the mail utility to send/receive/delete messages

10. Use basic Annex commands to reestablish connection to a
disconnected process.
C. Course Handout Conventions

There are several conventions used in this handout for
consistency and easier interpretation:

1. Samples of actual terminal sessions are single-lined
boxed.

2. User entries are shown in bold print and are
underlined.

QUIT

3. All keyboard functions in the text will be bold.

(Ret) Backspace
Tab Ctrl-F6
Print (Shift-F7) Go to DOS (1)

NOTE: (Ret) indicates the Return or Enter key
located above the right Shift key.

4. Examples of user entries not showing the computer's
response are in dotted-lined boxes.


5. Command formats are double-lined boxed.

6. Three dots either in vertical or horizontal alignment
mean continuation or that data is missing from the
diagram.

HuhHuhHuhHuhHuhHuhHuhHuhHuhHuhHuhHuhHuhHuhHuhHuhHuhHuhHuhHuhHuh??
? ?
? ?
? Multimax, Nanobus, and UMAX are trademarks of ?
? Encore Computer Corporation ?
? ?
? ?
? Annex is a trademark of XYLOGICS, Inc ?
? ?
? ?
? UNIX and Teletype are registered trademarks of ?
? AT&T Bell Laboratories ?
? ?
? ?
? Ethernet is a trademark of Xerox Corporation ?
? ?
? ?
? ?
HuhHuhHuhHuhHuhHuhHuhHuhHuhHuhHuhHuhHuhHuhHuhHuhHuhHuhHuhHuhHuh??

1. BASIC UNIX IDEAS

The UNIX operating system is a set of programs that act as a link
between the computer and the user. The programs that allocate
the system resources and coordinate all the details of the
computer's internals is called the operating system or kernel.

Users communicate with the kernel through a program known as the
shell. The shell is a command line interpreter; it translates
commands entered by the user and converts them into a language
that is understood by the kernel.

Here is a basic block diagram of a UNIX system.

Spread Sheet Compilers
Calculators ?
? ?
V V
HuhHuhHuhHuhHuhHuhHuhHuhHuhHuhHuh
? The Shell ? Mail and
? HuhHuhHuhHuhHuhHuhHuhHuh ?<- Message
Inventory ? ? UNIX system kernel ? ? Facilities
Control --->? ? HuhHuhHuhHuhHuh? ? ?
Systems ? ? ? ? ? ?<- Interpreters
? ? ? Hardware ? ? ?
Formatters ->? ? ? ? ? ?<- DBMS
? ? ? ? ? ?
Calendar ? ? HuhHuhHuhHuhHuh? ? ? Word
Systems ---->? ? ? ?<- Processors
? HuhHuhHuhHuhHuhHuhHuhHuh ?
Editors ---->? ?<- FTP
HuhHuhHuhHuhHuhHuhHuhHuhHuhHuhHuh

The designers of UNIX used the following Maxims while writing the
new operating system.

1. Make each program do one thing well. These simple
programs would be called "tools."

2. Expect the output of every program to be the input to
another program.

3. Don't stop building new "tools" to do a job. The
library of tools should keep increasing.
1.1 The UNIX System

The main concept that unites all versions of UNIX is the
following four basics:

Kernel

The kernel is the heart of the operating system. It schedules
tasks and manages data storage. The user rarely interfaces with
the kernel directly. This is the memory resident portion of the
operating system.

Shell

The shell is the utility that processes your requests. When you
type in a command at your terminal, the shell interprets the
command and calls the program that you want. The shell will
support multiple users, multiple tasks, and multiple interfaces
to itself. The shell uses standard syntax for all commands.
There are two popular shells currently available, the BourneShell
(standard System V UNIX) and the CShell (BSD UNIX). Because
separate users can use different shells at the same time, the
system can appear different to different users. There is another
shell known as the KornShell (named after its designer), which is
popular with programmers. This ability to provide a customized
user interface is one of the most powerful features of UNIX.

Commands and Utilities

Separate utilities can be easily combined to customize function
and output. They are flexible, adaptable, portable, and modular.
They use pipes and filters. There are over 200 standard commands
plus numerous others provided through 3rd party software.

Files and Directories

The directory system supports a multilevel hierarchy. Files and
directories have access protection. Files and directories are
accessed through pathnames. Files support multiple name links.
Removable filesystems are also supported.
1.2 File Structure

All data in UNIX is organized into files. All files are
organized into directories. These directories are organized into
a tree-like structure called the filesystem. The following
diagram describes the top level organization of the UNIX
filesystem:

/
(root)
?
HuhHuhHuhHuhHuhHuhHuhHuhHuhHuhHuhHuhHuhHuhHuh??
? ? ? ? ? ? ?
bin dev etc lib tmp usr users

These directories, in turn, are also organized hierarchically.

For example:
/
?
HuhHuhHuhHuhHuhHuhHuhHuhHuhHuhHuhHuhHuhHuh??
? ? ?
dev etc usr
? ? ?
HuhHuh?? HuhHuh?? HuhHuhHuhHuhHuhHuhHuhHuh?
? ? ? ? ? ? ?
dsk rmt init.d rc0.d mail adm spool
?
HuhHuhHuh
? ?
acct sa

In this example, dev, etc, usr, and adm are directories.
Directories contain other files or directories. Plain files
contain text or binary data and contain no information about
other files or directories.
Users can make use of this same structure to organize their
files.

For example:
/
?
HuhHuhHuhHuhHuhHuhHuhHuhHuhHuh??
? ? ?
bin users dev
?
HuhHuhHuhHuhHuhHuhHuhHuhHuhHuh?
? ?
bsmith sjones
? ?
HuhHuhHuhHuh HuhHuhHuhHuhHuhHuhHuhHuhHuh
? ? ? ? ?
memos progs physics chem history
? ? ? ? ?
HuhHuh? HuhHuh?? HuhHuh?? HuhHuh? Huh??
? ? ? ? ? ? ? ? ? ?
mfg eng c f77 mods calcs forms notes loc anc

Every file has a name. A filename is composed of one to fourteen
characters. Although you can use almost any character in a
filename, you will avoid confusion if you choose characters from
the following list.

1. upper case letters [A-Z]
2. lower case letters [a-z]
3. numbers [0-9]
4. underscore [_]
5. period [.]
6. comma [,]

The only exception is the root directory, which always uses the
symbol /. No other directory or file can use this symbol.

Like children of one parent, no two files in the same directory
can have the same name. Files in different directories, like
children of different parents, can have the same name.

The filenames you choose should mean something. Too often, a
directory is filled with important files with names like foobar,
wombat, and junk. A meaningless name won't help you recall the
contents of a file. Use filenames that are descriptive of the
contents.
1.3 UNIX System Files

In order for you to have a basic understanding of the contents of
some of the system directories, here is a partial list of those
directories and what files they contain:

/bin This is where the executable files are located.
They are available to all user.

/dev These are device drivers.

/etc Supervisor directory commands, configuration
files, disk configuration files, reboot files,
valid user lists, groups, ethernet, hosts, where
to send critical messages.

/lib compiler libraries

/tmp scratch processes, editors, compilers, and
databases

/bsd Berkeley commands

/mnt empty, used for disks

/stand boot information

/lost+found orphans go here (look here after system crash)

/unix* executable, bootable kernel

This is not an exhaustive list of directories that contain system
information but it is intended to remove some of the mystery
behind these directories and the types of files they contain.
1.4 Command Line Syntax

Users enter commands at the shell prompt. The default
BourneShell prompt is the dollar sign ($). In general, the shell
expects to see the following syntax:

HuhHuhHuhHuhHuhHuhHuhHuhHuhHuhHuhHuhHuhHuhHuhHuhHuhHuhHuhHuhHuh??
? Command Format: command options arguments ?
HuhHuhHuhHuhHuhHuhHuhHuhHuhHuhHuhHuhHuhHuhHuhHuhHuhHuhHuhHuhHuh??

Command - This is the UNIX command. Sometimes the command
is representative of the function. For example,
the command to list the contents of a directory is
ls. The first and third letters of the word
"list" are used. Unfortunately, this is not
always the case.

Options - These are also known as flags. The common form
is:
-A

where A is the abbreviation of the optional
function of the command. For example, the command
ls lists the contents of a directory, while the
command ls -l provides a long listing and ls -C
provides output in columns. Several options can
be combined following one '-'; for example -CF, or
they can be entered separately as -C -F.

Arguments - These can be file names, user names, or qualifiers
to the command or one of its options.
Example:

.................................................................
. $ls -CF sjones .
.................................................................

The UNIX command is ls list contents of directory the dash (-)
indicates the options.

C = Multiple-column output with entries sorted down the
columns

F = Put a slash (/) after each filename if that file is a
directory and put an asterisk (*) after each filename
that is executable.

sjones = name of the directory to list (it can be a
relative or absolute pathname)

Example:

.................................................................
. $diff memo1 memo2 .
.................................................................

diff - differential file comparator command

memo1 - filename argument

memo2 - filename argument

This command will tell what lines must be changed in two files to
bring them into agreement.
Here is another example that doesn't fit the general syntax for
UNIX commands.

Example:

.................................................................
. $find . -atime +7 -print .
.................................................................

find - find files

. - the current working directory

-atime - True if the file has been accessed in n days (n is
the +7)

-print - always true; causes the current path name to be
printed

So, this command will give a listing of all files in your current
working directory that have been accessed in the past seven days.

Some commands have several options and/or arguments; while
others, like passwd and mail, are interactive and will prompt the
user for additional input.
1.5 Correcting Mistakes

Because the shell and most other utilities do not interpret the
command line (or other text) until you press the (Ret) key, you
can correct typing mistakes before you press (Ret). There are
two ways to correct typing mistakes. You can erase one character
at a time, or you can back up to the beginning of the command
line in one step. After you press (Ret), it is too late to make
a correction.


1.5.1 Erasing Characters

When entering characters from the keyboard, you can backspace up
to and over a mistake by pressing the erase key (#) one time for
each character you wish to delete. The # will appear on the
screen, and the character preceding it will be discounted.

Example:

.................................................................
. $ls phajne#y .
.................................................................

In this example, the e will be ignored and ls phajny is sent to
the Multimax. Multiple typos can be erased; simply press one #
for each character to be erased. The erase key will back up as
many characters as you wish, but it will not back up past the
beginning of the line.


1.5.2 Deleting an Entire Line

You can delete an entire line you are entering any time before
you press (Ret) by pressing the kill key (@). When you press the
@ (kill key), the cursor moves down to the next line and all the
way to the left. The shell doesn't give you another prompt, but
it is as though the cursor is following a prompt. The operating
system does not remove the line with the mistake but instead
ignores it. Now enter the command (or text) again from the
start.
1.5.3 Aborting Program Execution

Sometimes you may want to terminate a running program. UNIX
might be performing a listing that is too long to display on your
screen or for some other reason you want to terminate execution.
To terminate program execution press the Delete key. The
operating system sends a terminal interrupt signal to the shell.
When the shell receives this signal, it displays a prompt and
waits for another command.


1.5.4 Controlling Output to the Screen

There are several ways to control the flow of characters to the
screen as a result of executing a command. Such as:

Ctrl-S - This keyboard function command will suspend
the flow of characters to the screen as the
result of executing a command. The screen
will not continue until the keyboard function
to resume output is given.

Ctrl-Q - This keyboard function command will resume
the output to the screen.

Hold Screen - If your terminal has this key (i.e. VT200),
you can press it once to stop output to the
screen. To resume output to the screen,
press the key again.

Denver BOR MULTIMAX

Each BOR Multimax 310 has four 15 Megahertz National
Semiconductor 32-bit processors with 64 kilobytes of cache memory
rated at 2 million instructions per second (MIPS) for a total of
8 MIPS. The main memory consists of 32 megabytes (million bytes).
There can be a maximum of 14 disk drives. Each drive has a
capacity of 600 megabytes for a total capacity of 8.4 gigabytes
(a gigabyte is one thousand million bytes)

Connection to the Multimax is accomplished through one of several
methods. Access is made through TCP/IP based Annex terminal
servers. The two Annex II servers have 32 ports each and the
Annex I has 16 ports. The Annex II servers will allow up to 64
users access to the two Multimax computers. The Annex I is used
for access to the on-line printers. CDCnet and TELNET are other
ways to gain access to the Multimaxes.

Printouts are handled on a 600-line-per-minute line printer and a
10-page-per-minute laser printer. Each Multimax has a hardcopy
terminal and a CRT to serve as an operator console. There are two
tape drives capable of 1600 or 6250 bits per inch (bpi) on each
system. There is also a cassette tape drive.

Software available are FORTRAN, COBOL, C, and UNISOL (an
accounting package). The database management system is INGRES by
Relational Technology, Inc. PROCOMM+ will be the communication
interface with IBM PC's and compatibles. The operating system for
the Multimax is UMAX V. UMAX V is the name for the Encore
implementation of UNIX System V.
1.6 Logging on the Annex

This sample session shows how the login process is displayed on
the terminal screen and is uniform for all users. To bring the
standard menu onto the screen, press the Space Bar. If you are
using a PC, first start PROCOMM+. Then when you are in the
Terminal-Mode Screen, press the Space Bar; and the MICOM menu
will appear.

NOTE: Login procedures from the regions are included in the
back of this manual

Sample Session:

HuhHuhHuhHuhHuhHuhHuhHuhHuhHuhHuhHuhHuhHuhHuhHuhHuhHuhHuhHuhHuh??
? WELCOME TO THE B.O.R. NETWORK P/S:B ?
? SYSTEMS PRESENTLY AVAILABLE ARE: ?
? ?
? **SYSTEM** **NAME** ?
? ?
? VAX 8300'S VAX ?
? CYBER/CDCNET F.E. CDC ?
? ENCORE/UNIX MAX ?
? OUT DIAL OD ?
? ?
? TO SELECT A SYSTEM, ENTER THE SYSTEM ?
? NAME AND CARRIAGE RETURN AT NEXT ?
? PROMPT. ?
? ?
? CHANNEL 08/061. ENTER RESOURCE MAX ?
? ?
HuhHuhHuhHuhHuhHuhHuhHuhHuhHuhHuhHuhHuhHuhHuhHuhHuhHuhHuhHuhHuh??

MAX is the resource name you must enter to be connected to the
Annex, which is the Multimax front end processor. Some MICOM
menus might not have the MAX selection; in this case, enter MAX
to select the Annex. This is the same as if the menu showed the
option.
After entering MAX you will see something similar to the
following:

Sample Session:

HuhHuhHuhHuhHuhHuhHuhHuhHuhHuhHuhHuhHuhHuhHuhHuhHuhHuhHuhHuhHuh??
? CONNECTED TO 06/011 ?
HuhHuhHuhHuhHuhHuhHuhHuhHuhHuhHuhHuhHuhHuhHuhHuhHuhHuhHuhHuhHuh??

This indicates that you are connected to the port selector. Wait
two seconds, press (Ret) twice, and the annex prompt will appear
after a warning message.

Sample Session:

HuhHuhHuhHuhHuhHuhHuhHuhHuhHuhHuhHuhHuhHuhHuhHuhHuhHuhHuhHuhHuhHuhHuhHuhHuhHuh
? ?
? Annex Command Line Interpreter * Copyright 1988 Xylogics, Inc. ?
? ?
? ***WARNING***Unauthorized access to U.S. Government computers ?
? is punishable by fine and/or imprisonment. ***WARNING*** ?
? annex: ?
HuhHuhHuhHuhHuhHuhHuhHuhHuhHuhHuhHuhHuhHuhHuhHuhHuhHuhHuhHuhHuhHuhHuhHuhHuhHuh
1.7 Logging on the Multimax

To establish a connection between the Annex and the Multimax
enter the following command at the Annex prompt:

HuhHuhHuhHuhHuhHuhHuhHuhHuhHuhHuhHuhHuhHuhHuhHuhHuhHuhHuhHuhHuh??
? Command Format: rlogin <host> ?
? ?
? host - name of the Multimax ?
HuhHuhHuhHuhHuhHuhHuhHuhHuhHuhHuhHuhHuhHuhHuhHuhHuhHuhHuhHuhHuh??

The Denver Multimaxes have been assigned the names domax0 and
domax1. The names stand for the Denver Office Multimax System 0
and 1. The domax0 is used for production of Bureau-wide
applications. The domax1 is used for training and application
development and it is the one to use for exercises associated
with this course.

To enter domax1 type:

Sample Session:

HuhHuhHuhHuhHuhHuhHuhHuhHuhHuhHuhHuhHuhHuhHuhHuhHuhHuhHuhHuhHuh??
? annex:rlogin domax1 ?
HuhHuhHuhHuhHuhHuhHuhHuhHuhHuhHuhHuhHuhHuhHuhHuhHuhHuhHuhHuhHuh??
or
HuhHuhHuhHuhHuhHuhHuhHuhHuhHuhHuhHuhHuhHuhHuhHuhHuhHuhHuhHuhHuh??
? annex:r domax1 ?
HuhHuhHuhHuhHuhHuhHuhHuhHuhHuhHuhHuhHuhHuhHuhHuhHuhHuhHuhHuhHuh??

NOTE: Abbreviations are allowed for the Annex commands, the
only requirement is to type in enough characters to
make it unique.

When the Annex has opened communications with the selected host,
the following prompt will appear:

Sample Session:

HuhHuhHuhHuhHuhHuhHuhHuhHuhHuhHuhHuhHuhHuhHuhHuhHuhHuhHuhHuhHuh??
? login: ?
HuhHuhHuhHuhHuhHuhHuhHuhHuhHuhHuhHuhHuhHuhHuhHuhHuhHuhHuhHuhHuh??
To connect with the host, enter your login name at the prompt.
Your login name is assigned to you by the system administrator
and typically will be your first initial and last name, all one
word with no spaces. Only 8 characters are allowed for the
username so extra letters will be truncated.

Sample Session:

HuhHuhHuhHuhHuhHuhHuhHuhHuhHuhHuhHuhHuhHuhHuhHuhHuhHuhHuhHuhHuh??
? login:rharding ?
HuhHuhHuhHuhHuhHuhHuhHuhHuhHuhHuhHuhHuhHuhHuhHuhHuhHuhHuhHuhHuh??

Once the login name has been accepted, the next prompt will be
for the password. The following prompt will appear on the
screen.

Sample Session:

HuhHuhHuhHuhHuhHuhHuhHuhHuhHuhHuhHuhHuhHuhHuhHuhHuhHuhHuhHuhHuh??
? Password: ?
HuhHuhHuhHuhHuhHuhHuhHuhHuhHuhHuhHuhHuhHuhHuhHuhHuhHuhHuhHuhHuh??

Enter your password. For security reasons, the host will not
display your password as you type it.

Sample Session:

HuhHuhHuhHuhHuhHuhHuhHuhHuhHuhHuhHuhHuhHuhHuhHuhHuhHuhHuhHuhHuh??
? Password: secret ?
HuhHuhHuhHuhHuhHuhHuhHuhHuhHuhHuhHuhHuhHuhHuhHuhHuhHuhHuhHuhHuh??

Once you have entered the correct password. The login procedure
will continue and the following will appear on the monitor
screen.

Sample Session:

HuhHuhHuhHuhHuhHuhHuhHuhHuhHuhHuhHuhHuhHuhHuhHuhHuhHuhHuhHuhHuhHuhHuhHuhHuhHuhHuh?
? UNIX System V Release ax.2.2o ns32332 ?
? domax1 ?
? Copyright ? 1984 AT&T ?
? All Rights Reserved ?
? ***WARNING***Unauthorized access to/use of this U.S. Government ?
? computer is punishable by fine and/or imprisonment. ***WARNING***?
? $ ?
HuhHuhHuhHuhHuhHuhHuhHuhHuhHuhHuhHuhHuhHuhHuhHuhHuhHuhHuhHuhHuhHuhHuhHuhHuhHuhHuh?

At this point you are successfully signed on to the Multimax.
The dollar sign ($) is the default prompt for the BourneShell.


1.8 Logging Off the Multimax

At the shell prompt $, you can logout of the Multimax using one
of the following methods:

1. Enter the keyboard function command Ctrl-D.

2. Type the UNIX command exit.

Once you have entered the command to logout the following will
appear on the screen:

Sample Session:

HuhHuhHuhHuhHuhHuhHuhHuhHuhHuhHuhHuhHuhHuhHuhHuhHuhHuhHuhHuhHuh??
? $exit ?
? CLI: Connection closed. ?
? annex: ?
HuhHuhHuhHuhHuhHuhHuhHuhHuhHuhHuhHuhHuhHuhHuhHuhHuhHuhHuhHuhHuh??

Once you are back at the Annex prompt, you can establish another
connection or logout of the Annex.
1.9 Logging Off the Annex

When the Annex prompt (annex:) appears, you can enter the command
to logout of the Annex. The command to logout of the Annex is as
follows:

HuhHuhHuhHuhHuhHuhHuhHuhHuhHuhHuhHuhHuhHuhHuhHuhHuhHuhHuhHuhHuh??
? Command Format: hangup ?
HuhHuhHuhHuhHuhHuhHuhHuhHuhHuhHuhHuhHuhHuhHuhHuhHuhHuhHuhHuhHuh??

There is a 60 minute inactivity timeout programmed into the
Annex; however, it is a waste of resources if you don't enter
hangup. When you are finished with your session, be sure to enter
hangup at the annex: prompt.

If you don't type anything for 60 minutes, the Annex will log you
out of the system and display the following message:

Sample Session:

HuhHuhHuhHuhHuhHuhHuhHuhHuhHuhHuhHuhHuhHuhHuhHuhHuhHuhHuhHuhHuh??
? *** Annex Port Reset Due to Inactivity Timeout *** ?
? ?
? Annex Command Line Interpreter ?
? DISCONNECTED ?
HuhHuhHuhHuhHuhHuhHuhHuhHuhHuhHuhHuhHuhHuhHuhHuhHuhHuhHuhHuhHuh??

When the hangup command has been entered, the following will
appear on the screen:

Sample Session:

HuhHuhHuhHuhHuhHuhHuhHuhHuhHuhHuhHuhHuhHuhHuhHuhHuhHuhHuhHuhHuh??
? annex: hangup ?
? ?
? Resetting line and disconnecting. ?
? ?
? ?
? Annex Command Line Interpreter * Copyright 1988 Xylogics ?
? annex: ?
? DISCONNECTED ?
HuhHuhHuhHuhHuhHuhHuhHuhHuhHuhHuhHuhHuhHuhHuhHuhHuhHuhHuhHuhHuh??





1.10 Changing the Password

The following command will change the password.

HuhHuhHuhHuhHuhHuhHuhHuhHuhHuhHuhHuhHuhHuhHuhHuhHuhHuhHuhHuhHuh??
? Command Format: passwd ?
HuhHuhHuhHuhHuhHuhHuhHuhHuhHuhHuhHuhHuhHuhHuhHuhHuhHuhHuhHuhHuh??

You will be prompted to enter the existing password (this
question is skipped if you don't have a password). Next you will
be prompted to enter the new password. You will then be asked to
enter the new password again. This will verify that you have not
made a typographical error. If the two entries are the same, the
password will be changed. The new password must meet the
following criteria:

NOTE: Some of these items are configurable by the system
administrator and these reflect the settings for the Denver
Multimax only.

1. Each password must have at least six characters. Only
the first eight characters are significant.

2. Each password must contain at least two alphabetic
characters and at least one numeric or special
character. Alphabetic characters can be upper or lower
case.

3. Each password must differ from the login name and
any reverse or circular shift of that login name.
For comparison purposes, an upper case letter and
its corresponding lower case letter are
equivalent.

4. A new password must differ from the old by at
least three characters. For comparison purposes,
an upper case letter and its corresponding lower
case character are equivalent.
Passwords on the Multimax have a thirteen-week expiration period.
At the end of the thirteen weeks, you will be required to change
your password. Once you have changed the password, you cannot
change it again for two weeks. This prevents you from
immediately changing back to the old password and eliminates a
possible security violation. If you try to change the password
before two weeks have passed since the last change, a warning
message will be displayed.

Sample Session:

HuhHuhHuhHuhHuhHuhHuhHuhHuhHuhHuhHuhHuhHuhHuhHuhHuhHuhHuhHuhHuh??
? $passwd ?
? Changing password for teacher ?
? Old password: secret ?
? Sorry: < 2 weeks since the last change ?
? $ ?
HuhHuhHuhHuhHuhHuhHuhHuhHuhHuhHuhHuhHuhHuhHuhHuhHuhHuhHuhHuhHuh??

NOTE: This is about as friendly as UMAX will ever get.

Try to choose a password that is not easy for someone else to
guess. The increasing number of computer crimes involving thefts
all point to a need for protecting the system from unauthorized
access. Do not use words like your birthdate, telephone number,
spouse's name, child's name, etc. for passwords. Although you
may think passwords are an unnecessary nuisance, they are an
important way to strengthen the security of the computer system.

1.11 On-line Manual

The major source of on-line help is in the form of documentation
known as the on-line manual pages. The pages are divided into
eight sections. Section 1 contains entries for UMAX user
commands; the other sections describe administrative tools,
library functions, games, and internal system structure and
calls.

To gain access to the on-line manual pages enter the following
command:

HuhHuhHuhHuhHuhHuhHuhHuhHuhHuhHuhHuhHuhHuhHuhHuhHuhHuhHuhHuhHuh??
? Command Format: man <command> ?
? ?
? command - the UNIX command you want information about ?
HuhHuhHuhHuhHuhHuhHuhHuhHuhHuhHuhHuhHuhHuhHuhHuhHuhHuhHuhHuhHuh??

NOTE: The name 'man' stands for manual.

Example:

.................................................................
. $man ls .
.................................................................

This command will display the on-line manual pages for the ls
command.

The on-line manual pages entry begins with the command name and a
one line summary followed by a synopsis of the command line
syntax. Optional flags and arguments are enclosed by square
brackets []. A detailed description of the command and all of
its options and arguments follow the synopsis. The description
can include helpful examples. At the conclusion of the entry,
related files and commands are listed.

NOTE: Most on-line manual pages will fill more than one
screen. Be sure to control the output to your screen.
1.12 who and finger Commands

Once you have logged onto the Multimax, you can find out who is
logged on the system with the following commands:

HuhHuhHuhHuhHuhHuhHuhHuhHuhHuhHuhHuhHuhHuhHuhHuhHuhHuhHuhHuhHuh??
? Command Format: who [options] ?
? ?
? options - see man pages for a complete list ?
? ?
HuhHuhHuhHuhHuhHuhHuhHuhHuhHuhHuhHuhHuhHuhHuhHuhHuhHuhHuhHuhHuh??

The default output (no options) of the who command lists the
user's login name, terminal line, and the time that the user
logged in.

Sample Session:

HuhHuhHuhHuhHuhHuhHuhHuhHuhHuhHuhHuhHuhHuhHuhHuhHuhHuhHuhHuhHuh??
? $who ?
? jwheeler ttyp0 Aug 15 10:26 ?
? mvlsdba rt02190 Aug 15 09:25 ?
? teacher rt020b0 Aug 15 11:07 ?
? eholderf rt021c0 Aug 15 11:03 ?
? dbowman rt01150 Aug 15 08:58 ?
? $ ?
HuhHuhHuhHuhHuhHuhHuhHuhHuhHuhHuhHuhHuhHuhHuhHuhHuhHuhHuhHuhHuh??

Options will display other information about the users that are
currently logged onto the system. Some items available are the
amount of time that has elapsed since activity occurred on that
line, the process identifier (PID) of the login process,
comments, and exit information.
A UNIX command that provides a little more information about
users that are logged in the system is the finger command.

HuhHuhHuhHuhHuhHuhHuhHuhHuhHuhHuhHuhHuhHuhHuhHuhHuhHuhHuhHuhHuh??
? Command Format: finger [options] [user1] ?
? ?
? options - see on line manual for complete list ?
? ?
? user1 - login name ?
HuhHuhHuhHuhHuhHuhHuhHuhHuhHuhHuhHuhHuhHuhHuhHuhHuhHuhHuhHuhHuh??

The finger command with no options will list the login name, full
name, terminal name, write status (an asterisk (*) before the
terminal name indicates that write permission is denied), idle
time, login time, office location, and phone number (if known)
for each user that is currently logged in the system.

Sample Session:

HuhHuhHuhHuhHuhHuhHuhHuhHuhHuhHuhHuhHuhHuhHuhHuhHuhHuhHuhHuhHuh??
? $finger ?
? Login Name TTY Idle When Office ?
? Jwheeler Jim Wheeler ttyp0 16 Wed 10:26 MP ?
? mvlsdba Motor Veh Lic rt02190 16 Wed 09:25 d7160 ?
? teacher Teacher Acct *rt020b0 Wed 11:07 ?
? eholderf Eileen Holder rt021c0 1 Wed 11:03 ?
? dbowman Dale Bowman rt01150 Wed 08:58 ?
? $ ?
HuhHuhHuhHuhHuhHuhHuhHuhHuhHuhHuhHuhHuhHuhHuhHuhHuhHuhHuhHuhHuh??
Workshop 1

This workshop will reinforce your understanding of the ideas
presented in Chapter 1. Each student is to complete the entire
workshop.

DESK EXERCISES

1. What two organizations first developed UNIX?



2. In what high level programming language is UNIX written?



3. What are some characteristics of UNIX?



4. What is Encore Computer Corporations implementation of UNIX
called?



5. What part of UNIX controls the details of the computer's
internal operations?



6. What part of UNIX allows the user to communicate with the
computer?
254  THE TECHNO CLUB [ TECHNOWORLDINC.COM ] / Ethical Hacking / Security / Viruses / Batch File Potential on: October 15, 2006, 12:08:58 PM
Batch File Potential
by blip

NOTICE: TO ALL CONCERNED Certain text files and messages contained on this site deal with activities and devices which would be in violation of various Federal, State, and local laws if actually carried out or constructed. The webmasters of this site do not advocate the breaking of any law. Our text files and message bases are for informational purposes only. We recommend that you contact your local law enforcement officials before undertaking any project based upon any information obtained from this or any other web site. We do not guarantee that any of the information contained on this system is correct, workable, or factual. We are not responsible for, nor do we assume any liability for, damages resulting from the use of any information on this site.

Disclaimer

The contents of this file are not to be and must not be used maliciously but instead simply become an intellectual curiosity and inform readers to potentially serious security problems. I hold no responsibility for what damage you or others may inflict or have damage inflicted upon; I hold responsibility for NOTHING. With that out of the way, let's begin!

Batch files are much more powerful than most may initially believe, with sufficient knowledge one could use them to introduce directly executable code into a system. I will demonstrate how this can be done with a harmless example and explore other ways to perform the same task that may or may not be better in some way.

There are two main ways one could go about doing this, the first being incredibly easier. The first method utilizes echo statements that redirect their output to a file, this file being used much like a script by using its contents for "console input" into a program instead of the default keyboard. The program used is called debug and is on every computer running windows or dos AFAIK unless the user manually deletes it, and can be used to write and execute stuff in memory among other things. The second method is more difficult to prepare, but does not require debug to be present or accessible (many school machines e.g. disallow access to it) to execute the hidden code as if it were a program they downloaded instead of the batch (it actually uses the batch to write out the program to disk). when the programs are executed, it would be a good idea to have them wipe the script and/or program file itself so undeletion attempts won't yield any clues.

The example program will be an implementation of a program that goes full screen and makes your screen flash random colors (though inevitably optimizable). First off it would be wise to be fairly familiar with x86 assembly language and how dos works in order to write your own programs to be run, but I'll try to explain how things work for those who aren't. Yes it is possible to write it in something like C++, but you must be aware that it has to run in dos (though it could use dpmi in windows) and its easiest to do with .com files. Exes have lovely headers that you must meddle with for full compatibility, mmm fun (you can't load a .exe into memory via debug enter statements and expect it to execute properly at all because the way exe headers are interpreted during loading).

The example batch file before we start:


@echo off
echo e100 B8 13 00 CD 10 E4 40 88 C3 E4 40 88 C7 F6 E3 30>\z.dbg
echo e110 DF 88 C1 BA C8 03 30 C0 EE BA DA 03 EC A8 08 75>>\z.dbg
echo e120 FB EC A8 08 74 FB BA C9 03 88 D8 EE 88 F8 EE 88>>\z.dbg
echo e130 C8 EE B4 01 CD 16 74 CD B8 03 00 CD 10 C3>>\z.dbg
echo g=100>>\z.dbg
echo q>>\z.dbg
debug <\z.dbg>nul
del \z.dbg

Basically what this does is make your monitor flash pseudo-random colors for every screen refresh until you hit a key, at which point it exits. There's a lot to be explained, however, to completely understand HOW it works from the ground up, knowing little or nothing of assembly or dos internals. Good thing I won't be explaining everything in excruciating detail.

To keep the batch file's size to a minimum, the program contained must also be as small as possible. Usually this means that you must use as many system calls as possible that are practical to do and tend not to do everything yourself. Granted, there are things you can't call the system to do for you, in which case the code should be further size optimized. In DOS, system calls are usually done by an assembly instruction mnemonic called INT, short for INTerrupt. For now, you can think of them as little black boxes that do what you want with the proper inputs and outputs until you read an assembly tutorial off somewhere where you'll realize there's really much more to it. Anyway, most software interrupts (usually used for system calls) take inputs in registers, which are like a select few speedy memory locations contained in the CPU itself. I guess I'd better explain and list the registers before I go further:

General Purpose (GP) registers:


AX - Accumulator
BX - Base
CX - Counter
DX - Displacement
BP - Base Pointer
SP - Stack Pointer
SI - Source Index
DI - Destination Index

Segment Registers (not explained here because they're not needed to understand the example, go to a tut for info):


CS - Code Segment
DS - Data Segment
ES - Extra Segment
FS - Extra Segment #2 (386+)
GS - Extra Segment #3 (386+)
SS - Stack Segment

Half of the GPregs (general purpose registers as I call them) can be broken up into byte-sized chunks and used as such. These would be the ones ending in X such as AX, its component registers being AH (Accumulator High, high byte of AX) and AL (Accumulator Low, low byte of AX). The remaining half of the group can only be accessed as 16-bit quantities. All GPregs can also be accessed as 32-bit entities, prefixed with E as in EAX for Extended Accumulator, beginning with the 386 (not like anyone cares, most people today haven't even heard of a 386).

I wrote the program above in debug, although you could do it in some symbolic assembler like nasm or fasm. Remember EVERYTHING in debug is either in hex or ascii. Here is a disassembly with corresponding addresses and hex encoded machine code eqivalents preceding each instruction mnemonic:


1370:0100 B81300        MOV     AX,0013
1370:0103 CD10          INT     10
1370:0105 E440          IN      AL,40
1370:0107 88C3          MOV     BL,AL
1370:0109 E440          IN      AL,40
1370:010B 88C7          MOV     BH,AL
1370:010D F6E3          MUL     BL
1370:010F 30DF          XOR     BH,BL
1370:0111 88C1          MOV     CL,AL
1370:0113 BAC803        MOV     DX,03C8
1370:0116 30C0          XOR     AL,AL
1370:0118 EE            OUT     DX,AL
1370:0119 BADA03        MOV     DX,03DA
1370:011C EC            IN      AL,DX
1370:011D A808          TEST    AL,08
1370:011F 75FB          JNZ     011C
1370:0121 EC            IN      AL,DX
1370:0122 A808          TEST    AL,08
1370:0124 74FB          JZ      0121
1370:0126 BAC903        MOV     DX,03C9
1370:0129 88D8          MOV     AL,BL
1370:012B EE            OUT     DX,AL
1370:012C 88F8          MOV     AL,BH
1370:012E EE            OUT     DX,AL
1370:012F 88C8          MOV     AL,CL
1370:0131 EE            OUT     DX,AL
1370:0132 B401          MOV     AH,01
1370:0134 CD16          INT     16
1370:0136 74CD          JZ      0105
1370:0138 B80300        MOV     AX,0003
1370:013B CD10          INT     10
1370:013D C3            RET

The first instruction (MOV AX,0013) specifies the function number 00h in AH that sets the video mode, in this case it is mode 13h in AL which is a grainy graphics mode by today's standards of 320x200 with 256 colors. This mode is favored by some programmers because it is very convenient in ways which will not be discussed here. The mode number 13h also specifies whether or not to clear the screen according to bit7. If cleared (set to 0) as it is, the video BIOS clears the screen, otherwise it doesn't. After setting AX with the necessary parameters, it calls interrupt 10 to fulfill the video bios service request. Setting this mode in this way is a very short way of both clearing the screen and making the dos box go full screen if the program is running in windows. The next set of instructions at offsets 105h to 111h (the numbers after the colon) read two bytes from a timer port and perform simple calculations to make 3 pseudorandom bytes. The instructions at offsets 113h to 118h set the palette index to zero which starts off as black so later the palette values can be written, this is important to do every loop because after writing a palette value the index will autoincrement to index one which is not desired. Next, at offsets 119h to 124h, the program waits for a vertical retracing period to make its move. when a vertical retrace occurs, the computer can safely write to video memory, or in our case, the palette registers, without causing flickers or tearing or any other aesthetic nasties because this is one time when the video card is not actively drawing a picture to the monitor. Not every card supports this, but almost all do. There's a way to check it using some VESA calls to prevent it from looping infinitely during polling, but I opted to keep the program short and simple. After this, at offsets 126h to 131h the actual palette entry is written using the previously calculated pseudorandom numbers. Palette entries are by default six bits wide so the top two bits are ignored and each entry consists of separate red, green, and blue values that are written in that order. The bios is then called to see whether a key has been pressed, if not continue looping at offset 105h else set the video mode back to the most common text mode and exit using a RETurn instruction.

Ahh, now with that out of the way I can finally cover the second method. Beware that this is exceedingly unlikely to work if the batch file is sent using an ascii transfer instead of binary because it actually contains raw program code in segments of the batch file. For this reason and the fact that it most likely won't show up correctly on a web page I can't show the example batch file. But I can do the next best thing: guide you how to do it in the simplest editor ever. This idea was developed independently of, but later with help from, an apj9 article. As you know the dos copy command can copy files, but it can also copy to and from files and devices. In order to be able to type up a file's contents without an editor or without a picky one in dos, use copy con filename.ext and con stands for console being your keyboard or monitor depending on the direction of data flow. The program is then entered with alt+numeric keypad sequences.

However, the numbers you enter must be in decimal, not hex, and some characters aren't allowed for various reasons, and this includes also not being able to use them in the batch file. The disallowed characters are 0, 3, 6, 8, 10 (0Ah), 13 (0Dh), 16 (10h), 19 (13h), 26 (1Ah), and 27 (1Bh); the first is the null character and e.g. notepad with convert it to a space (32, 20h) if resaved, 3 is Ctrl-C which would exit the "editor", 6 I don't know, 8 is backspace, 13 and 10 can only be used together in that order by hitting enter, 16 and 19 I don't know, 26 tells the editor you're done, and 27 I don't know (my reference says so, so I'll take their word for it). Just by looking at the machine code dump you can see already that some of these are present, especially character 3. Moving some things around, doing some "unnecessary" calculations, and doing things in completely different ways can remove all instances of these illegal characters. Here's the code I've come up with, and it's almost 1.5 times as large as the previous code (I could have done better, but oh well):


1370:0100 30E4          XOR     AH,AH
1370:0102 1F            POP     DS
1370:0103 B012          MOV     AL,12
1370:0105 BB01FF        MOV     BX,FF01
1370:0108 9C            PUSHF
1370:0109 40            INC     AX
1370:010A FF9F3F01      CALL    FAR [BX+013F]
1370:010E E440          IN      AL,40
1370:0110 88C3          MOV     BL,AL
1370:0112 E440          IN      AL,40
1370:0114 88C7          MOV     BH,AL
1370:0116 F6E3          MUL     BL
1370:0118 30DF          XOR     BH,BL
1370:011A 88C1          MOV     CL,AL
1370:011C BAC802        MOV     DX,02C8
1370:011F FEC6          INC     DH
1370:0121 30C0          XOR     AL,AL
1370:0123 EE            OUT     DX,AL
1370:0124 BADA02        MOV     DX,02DA
1370:0127 FEC6          INC     DH
1370:0129 EC            IN      AL,DX
1370:012A D0E8          SHR     AL,1
1370:012C A804          TEST    AL,04
1370:012E 75F9          JNZ     0129
1370:0130 EC            IN      AL,DX
1370:0131 D0E8          SHR     AL,1
1370:0133 A804          TEST    AL,04
1370:0135 74F9          JZ      0130
1370:0137 BAC902        MOV     DX,02C9
1370:013A FEC6          INC     DH
1370:013C 88D8          MOV     AL,BL
1370:013E EE            OUT     DX,AL
1370:013F 88F8          MOV     AL,BH
1370:0141 EE            OUT     DX,AL
1370:0142 88C8          MOV     AL,CL
1370:0144 EE            OUT     DX,AL
1370:0145 B401          MOV     AH,01
1370:0147 CD16          INT     16
1370:0149 74C3          JZ      010E
1370:014B 30E4          XOR     AH,AH
1370:014D B002          MOV     AL,02
1370:014F 40            INC     AX
1370:0150 BB01FF        MOV     BX,FF01
1370:0153 9C            PUSHF
1370:0154 FF9F3F01      CALL    FAR [BX+013F]
1370:0158 CD20          INT     20

To make the batch file, type copy con vret.bat at the prompt and hit enter, then type the following except spaces unless it says :

@echo off
echo 0 ALT+228 ALT+31 ALT+176 ALT+18 ALT+187 ALT+1 ALT+255 ALT+156 @ ALT+255 ALT+159 ? ALT+1 ALT+228 @ ALT+136 ALT+195 ALT+228 @ ALT+136 ALT+199 ALT+246 ALT+227 0 ALT+223 ALT+136 ALT+193 ALT+186 ALT+200 ALT+2 ALT+254 ALT+198 0 ALT+192 ALT+238 ALT+186 ALT+218 ALT+2 ALT+254 ALT+198 ALT+236 ALT+208 ALT+232 ALT+168 ALT+4 u ALT+249 ALT+236 ALT+208 ALT+232 ALT+168 ALT+4 t ALT+249 ALT+186 ALT+201 ALT+2 ALT+254 ALT+198 ALT+136 ALT+216 ALT+238 ALT+136 ALT+248 ALT+238 ALT+136 ALT+200 ALT+238 ALT+180 ALT+1 ALT+205 ALT+22 t ALT+195 0 ALT+228 ALT+176 ALT+2 @ ALT+187 ALT+1 ALT+255 ALT+156 ALT+255 ALT+159 ? ALT+1 ALT+205 > blah.com
blah
del blah.com

Now hit F6 or Ctrl-Z or Alt-26 (all do the same thing) and then hit enter.

Yes, that is one long echo statement so don't start others or hit enter until you're done entering the sequence. And there you have it!
255  THE TECHNO CLUB [ TECHNOWORLDINC.COM ] / Ethical Hacking / Security / Viruses / The Hacker's Manifesto on: October 15, 2006, 12:07:15 PM
The Hacker's Manifesto
by The Mentor

Another one got caught today, it's all over the papers. "Teenager Arrested in Computer Crime Scandal", "Hacker Arrested after Bank Tampering"...

Damn kids. They're all alike.

But did you, in your three-piece psychology and 1950's technobrain, ever take a look behind the eyes of the hacker? Did you ever wonder what made him tick, what forces shaped him, what may have molded him? I am a hacker, enter my world...

Mine is a world that begins with school... I'm smarter than most of the other kids, this crap they teach us bores me...

Damn underachiever. They're all alike.

I'm in junior high or high school. I've listened to teachers explain for the fifteenth time how to reduce a fraction. I understand it. "No, Ms. Smith, I didn't show my work. I did it in my head..."

Damn kid. Probably copied it. They're all alike.

I made a discovery today. I found a computer. Wait a second, this is cool. It does what I want it to. If it makes a mistake, it's because I screwed it up. Not because it doesn't like me...

Or feels threatened by me...

Or thinks I'm a smart ass...

Or doesn't like teaching and shouldn't be here...

Damn kid. All he does is play games. They're all alike.

And then it happened... a door opened to a world... rushing through the phone line like heroin through an addict's veins, an electronic pulse is sent out, a refuge from the day-to-day incompetencies is sought... a board is found.

"This is it... this is where I belong..."

I know everyone here... even if I've never met them, never talked to them, may never hear from them again... I know you all...

Damn kid. Tying up the phone line again. They're all alike...

You bet your ass we're all alike... we've been spoon-fed baby food at school when we hungered for steak... the bits of meat that you did let slip through were pre-chewed and tasteless. We've been dominated by sadists, or ignored by the apathetic. The few that had something to teach found us willing pupils, but those few are like drops of water in the desert.

This is our world now... the world of the electron and the switch, the beauty of the baud. We make use of a service already existing without paying for what could be dirt-cheap if it wasn't run by profiteering gluttons, and you call us criminals. We explore... and you call us criminals. We seek after knowledge... and you call us criminals. We exist without skin color, without nationality, without religious bias... and you call us criminals. You build atomic bombs, you wage wars, you murder, cheat, and lie to us and try to make us believe it's for our own good, yet we're the criminals.

Yes, I am a criminal. My crime is that of curiosity. My crime is that of judging people by what they say and think, not what they look like. My crime is that of outsmarting you, something that you will never forgive me for.

I am a hacker, and this is my manifesto. You may stop this individual, but you can't stop us all... after all, we're all alike.
256  GENERALLY GENERAL / The Introduction Lounge / Hi All on: October 15, 2006, 11:20:18 AM
Hi members..

This is Technoarea Admin here...
257  THE TECHNO CLUB [ TECHNOWORLDINC.COM ] / Google / Re: How Google Works on: October 15, 2006, 11:09:38 AM
gr8 post taruna..keep it up!  Smiley
258  THE TECHNO CLUB [ TECHNOWORLDINC.COM ] / Perl & Cgi / Perl on: October 14, 2006, 11:45:18 PM
Perl

With a worldwide community of users and more than a million dedicated programmers, Perl has proven to be the most effective language for the latest trends in computing and business.Every programmer must keep up with the latest tools and techniques. This updated version of Advanced Perl Programming from O'Reilly gives you the essential knowledge of the modern Perl programmer. Whatever your current level of Perl expertise, this book will help you push your skills to the next level and become a more accomplished programmer.

Perl is a general-purpose programming language originally developed for text manipulation and now used for a wide range of tasks including system administration, web development, network programming, GUI development, and more.

The language is intended to be practical (easy to use, efficient, complete) rather than beautiful (tiny, elegant, minimal). Its major features are that it's easy to use, supports both procedural and object-oriented (OO) programming, has powerful built-in support for text processing, and has a large collection of third-party modules.

The Common Gateway Interface (CGI) is a standard protocol for interfacing external application software with an information server, commonly a web server. This allows the server to pass requests from a client web browser to the external application. The web server can then return the output from the application to the web browser.

CGI arose out of discussions on the www-talk mailing list between Rob McCool, John Franks, Ari Luotonen, George Phillips and Tony Sanders in 1993. Rob McCool, working at NCSA, drafted the initial specification and provided a reference implementation in the NCSA HTTPd web server using environment variables to store parameters passed from the web server execution environment before spawning the CGI program as a separate process.

The way CGI works from the Web server's point of view is that certain locations (e.g. http://www.example.com/wiki.cgi) are defined to be served by a CGI program. Whenever a request to a matching URL is received, the corresponding program is called, with any data that the client sent as input. Output from the program is collected by the Web server, augmented with appropriate headers, and sent back to the client.
259  THE TECHNO CLUB [ TECHNOWORLDINC.COM ] / Downloads Zone / Firefox Browser (Recommended) on: October 14, 2006, 07:47:59 PM
FIREFOX

The Fastest Browser

New! Enhanced Search Box Search smarter with instant suggestions, spelling corrections, and history as you type

New! Safe Browsing Get warnings about web pages that may be unsafe

SpellCheck Check your spelling whenever you type in web forms

AutoFill Automatically fill out forms for faster online shopping

Click Here to download the software
260  THE TECHNO CLUB [ TECHNOWORLDINC.COM ] / Web Design / Graphics Design/ Animation / Submit your website to 380 directories on: October 14, 2006, 04:00:32 PM
Submitting your website to the directories

Part of the overall process of submitting one's website to the search engines is getting your site listed in the top directories. Directories are different from standard search engines in that a search engine will query a database of indexed websites before it produces results and a directory is a database of websites that have been arranged by subject. Directories do indeed have search functions but the websites are still listed in specific categories of which one may search by drilling through the various subjects the directory offers.


No   Domain   Price   PRank   
1    www.01webdirectory.com    F/$49    PR5(nc)    
2    www.123kidzarea.com    F    PR6(nc)    
3    www.19230.com    F    PR2(nc)    
4    www.2-surf.net    F    PR2(nc)    
5    www.4-every-1.ws    F    PR3(nc)    
6    www.4-fun.biz/directory/    F    PR4(+1)    
7    www.4do.org    F    PR3(nc)    
8    www.4ppl.com    F    PR5(nc)    
9    www.777media.com    F/$5    PR4(nc)    
10    www.a-free-directory.info    F    PR3(nc)    
11    www.a-web-directory.info    F    PR3(nc)    
12    www.a1directorysearch.com    F    PR2(+1)    
13    www.abifind.com    F/$8    PR0(0)    
14    www.abilogic.com    F/$19    PR6(nc)    
15    www.abizdirectory.com    F/$10    PR5(nc)    
16    www.absolutedirectory.com    F    PR4(nc)    
17    www.accessweb.ws    F    PR4(nc)    
18    www.add-link.info    F    PR4(nc)    
19    www.addsite-submitfree.com    F    PR0(0)    
20    www.addurl-free.com    F    PR5(nc)    
21    www.addyourlinks.net    F    PR0(0)    
22    www.addyoursitefreesubmit.com    F    PR4(nc)    
23    www.agada.info/web-directory/    F    PR0(-4)    
24    www.agreatdirectory.com    F    PR4(+4)    
25    www.aigam.com    F    PR0(0)    
26    www.aindabem.com.br    F    PR3(nc)    
27    www.airsysinc.com/_directory.html    F    PR3(nc)    
28    www.alldotnet.com    F    PR4(+1)    
29    www.allfreethings.com    F    PR4(nc)    
30    www.allinorder.org    F/$20    PR4(-1)    
31    www.allthebizz.com    F/$15    PR0(0)    
32    www.allthewebsites.org    F    PR5(nc)    
33    www.alphadir.com    F    PR3(+1)    
34    www.americasbest.com    F/$10    PR6(nc)    
35    www.amfibi.com    F/$3    PR0(0)    
36    www.amray.com    F/$20    PR5(nc)    
37    mkdir.anchorbase.com    F    PR3(nc)    
38    www.anglersmarina.com/links.htm    F    PR3(nc)    
39    www.anotherwebdirectory.com    F    PR3(+3)    
40    www.anthonyparsons.com    F/$10    PR5(nc)    
41    www.anywhere.ca    F    PR4(nc)    
42    www.askfrank.info    F    PR4(nc)    
43    www.askrobo.com    F    PR4(-1)    
44    www.axelis.com    F    PR5(nc)    
45    www.best-websites.net    F    PR5(+5)    
46    www.bestbusinessdirectory.com    F    PR4(nc)    
47    www.bestsitedirectory.com    F/$19/y    PR0(0)    
48    www.bhanvad.com    F/$20    PR4(nc)    
49    www.bigall.com    F/$15    PR6(nc)    
50    www.biobidet.com/_directory.htm    F    PR4(nc)    

Therefore, the submission process to a directory differs from that of submitting to regular crawler based search engines. With a regular search engine, one will submit their home page URL and then crawler will visit that site as well as follow other links it finds from the home page, forming its own title and description of each page. A directory does not work this way. They do not crawl your website and they are not able to decipher the content of the site. Rather one will select the most appropriate category related to the subject matter of the site and then submit, suggesting a title, description and any other information the directory may require. This is why it is very important to submit correctly the first time. Not only will if affect the way the site will appear when people are searching but it is often times difficult to get it changed at a later date.


51    www.bizunited.com    F/$20    PR5(nc)    
52    www.blisswolff.com/directory    F    PR4(+4)    
53    www.bluefind.com    F    PR0(0)    
54    www.bluenoserlinks.com    F    PR3(nc)    
55    http://www.bramptonlistings.info    F/$3    PR0(0)    
56    www.business-listing.com    F    PR0(0)    
57    www.businessdir.co.uk    F    PR1(+1)    
58    www.businessdirectoryofusa.com    F    PR0(0)    
59    www.businessplexus.com    F    PR5(+1)    
60    www.businesspowerusa.com    F    PR4(nc)    
61    www.businessseek.biz    F/$10    PR6(nc)    
62    www.buy-modern-art.co.uk    F    PR4(nc)    
63    www.buzzle.com    F    PR6(nc)    
64    www.c2000.com    F    PR5(nc)    
65    www.c2000.com/links    F    PR4(nc)    
66    www.canadawebdirectory.com    F/$20    PR5(nc)    
67    www.canlinks.net    F    PR6(nc)    
68    www.cantufind.com    F    PR0(-5)    
69    www.cash-for-surveys.com/dir    F    PR3(nc)    
70    directory.cipinet.com    F    PR5(nc)    
71    www.clickey.com    F    PR6(nc)    
72    www.clothingwebdirectory.com    F/$5    PR0(0)    
73    www.cluboo.com    F/$15/y    PR5(nc)    
74    www.clubspage.net    F    PR4(+1)    
75    webmastertag.com    F    PR0(0)    
76    wikidweb.com    F    PR3(nc)    
77    internetmarketingwebsites.com/    F    PR5(nc)    
78    apexoo.com/directory    F    PR0(-4)    
79    searchsight.com/Directory.htm    F    PR5(nc)    
80    coolgrandma.com/odp/directory.php    F    PR0(-4)    
81    www.commerce-directory.co.uk    F/$37    PR3(nc)    
82    www.commercedir.com    F/$16    PR0(0)    
83    www.comoestamos.com    F    PR4(nc)    
84    www.completeonlinedirectory.com    F    PR1(-1)    
85    www.computer-remote-control.com    F    PR2(nc)    
86    www.consultant-directory.com    F    PR5(nc)    
87    www.content-directory.co.uk    F    PR3(nc)    
88    www.cyborginfo.com    F/$10    PR4(+4)    
89    www.cyngoseek.com    F    PR3(-1)    
90    www.cypruspages.com    F    PR3(nc)    
91    blue.daffodil.uk.com    F    PR3(nc)    
92    www.deep-directory.com    F    PR3(-1)    
93    www.depodirectory.com    F    PR3(+3)    
94    www.deregular.com    F    PR0(0)    
95    www.dhundo.com    F    PR0(-4)    
96    www.digitalseo.info/dir    F    PR3(+3)    
97    www.dir-submission.com    F    PR4(+4)    
98    www.direct-o-ry.com    F    PR4(+1)    
99    www.directory-active.info    F    PR3(nc)    
100    www.directory-business.info    F    PR3(nc)    

The format for submitting will work with most directories but we will also look at some specific requirements of directories as well. While there are many directories on the Internet, we will only be exploring the top ones here which are Yahoo! ( www.yahoo.com ), Looksmart ( www.looksmart.com ), The Open Directory ( www.dmoz.org ), GoGuides.org ( www.goguides.org ), JoeAnt ( www.joeant.com ), Hotrate ( www.hotrate.com ), Wherewithal/Xoron ( www.xoron.com ) and Zeal ( www.zeal.com ). First let us look at how to properly submit in general and then look at some specific requirement at each directory listed above.


101    www.directory-directory.info    F    PR0(-3)    
102    www.directory-free.com    F    PR4(nc)    
103    www.directory-free.info    F    PR3(nc)    
104    www.directory-internet.info    F    PR3(nc)    
105    www.directory-link.info    F    PR4(nc)    
106    www.directory-list.info    F    PR3(nc)    
107    www.directory.kalius.net    F    PR3(nc)    
108    www.directory.ldmstudio.com    F    PR4(nc)    
109    www.directory.portalit.net    F    PR5(nc)    
110    www.directory.uquick.com    F/$5    PR0(0)    
111    www.directory123.info    F    PR0(-3)    
112    www.directorydelux.com    F    PR4(nc)    
113    www.directorydirectory.info    F    PR0(-3)    
114    www.directoryforce.com    F    PR4(+1)    
115    www.directorygeneral.com    F    PR3(nc)    
116    www.directorygold.com    F/$10    PR5(+1)    
117    www.directoryhi.com    F    PR3(nc)    
118    www.directoryone.info    F    PR3(nc)    
119    www.directorystation.com    F    PR4(+4)    
120    www.directorystorm.com    F    PR4(nc)    
121    www.dirone.com    F/$15    PR0(-7)    
122    www.dirone.com    F/$30    PR0(0)    
123    www.dirspace.com    F    PR5(nc)    
124    www.dmole.org    F    PR4(nc)    
125    www.dmoz.org    F    PR9(nc)    
126    www.dwff.com    F    PR1(+1)    
127    www.e-commerce-directory.com    F    PR0(0)    
128    www.earth-directory.info    F    PR3(+3)    
129    www.ecommerce-directory.org    F/$15    PR5(nc)    
130    www.elib.org    F/$65    PR7(nc)    
131    www.ettflorida.com/_directory.html    F    PR3(nc)    
132    www.eurofind.biz    F    PR5(nc)    
133    www.exactseek.com    F/$12    PR6(nc)    
134    www.explodesearch.com    F    PR0(0)    
135    www.ezilon.com    F    PR6(nc)    
136    www.fabarooni.com    F    PR3(nc)    
137    www.familyfriendlysites.com    F    PR6(nc)    
138    www.fastpaths.com    F    PR3(nc)    
139    www.favouritelink.com    F    PR4(nc)    
140    www.findhopper.com    F    PR2(-1)    
141    www.findhound.com    F/$15    PR5(+1)    
142    www.finditfred.com    F    PR4(+4)    
143    www.findrex.com    F    PR4(nc)    
144    www.findwhatwhere.info    F    PR4(nc)    
145    www.firstdirectory.org    F    PR0(-2)    
146    www.foundya.co.uk    F    PR4(nc)    
147    www.free-website-directory.com    F    PR3(nc)    
148    www.free.catalog.nasze.net    F    PR3(+3)    
149    www.freeclubs.net    F    PR4(+1)    
150    www.freewebdirectory.org    F/$15    PR0(0)    

Now before we begin, it will be assumed that you have already optimized your site for good positioning on the crawler-based engines. This will help us in category selection as well as what title and description to use when submitting. If you have not yet optimized your website, you'll need to do so.

The first step is to select the most appropriate category. For an example, we will use a site that we own and operate called "Arizona Builders' Zone" ( www.builderszone.com ). To select a category, you will first need to know which keywords or phrases (combination of keywords) are most important or relevant to your business. For our example site, the most important phrases that we want to target are as follows:

"Arizona builders"
"Arizona construction"
"Arizona contractors"

Sure we can target many others, but these are the most important in regards to this site. Also keep in mind that with a directory you are limited to having one page (usually your home page) included. There are rare cases where a directory will include other pages of your site in different categories but this does not happen often. It is also important to understand that in the search engine optimization (SEO) process, one can really only effectively promote two to three keyword phrases at the most for each page of the website.
151    www.freewebdirectory.org    F/$15    PR0(0)    
152    www.freewebsitedirectory.com    F    PR1(nc)    
153    www.freshdir.com    F    PR3(+1)    
154    www.friendly-directory.co.uk    F    PR5(+1)    
155    www.fx1.co.uk    F    PR5(nc)    
156    www.fxdir.com    F    PR4(nc)    
157    www.geeksonsteroids.com/directory    F    PR4(nc)    
158    www.geniusfind.com    F    PR0(0)    
159    www.gimpsy.com    F/$40    PR6(nc)    
160    www.gloose.com/dir.html    F    PR3(nc)    
161    directory.google.com    F    PR8(nc)    
162    www.google.com    F/$0    PR10(+10)    
163    www.goongee.com    F/$20    PR5(nc)    
164    www.greatnexus.com/directory/    F/$15    PR5(nc)    
165    www.greece.snn.gr    F    PR3(nc)    
166    www.grizzlyweb.com    F    PR4(nc)    
167    www.guide-directory.info    F    PR3(nc)    
168    www.haabaa.com    F/$48    PR6(nc)    
169    www.hand-code-directory.com    F/$5    PR4(+1)    
170    www.he-directory.com    F    PR3(+3)    
171    www.hedir.com    F/$14    PR5(nc)    
172    www.hedir.com    F/$25    PR5(nc)    
173    english.hispanoempresa.com    F    PR4(nc)    
174    www.homedecorgiftshop.com    F    PR0(0)    
175    www.hotlinksdirectory.com    F    PR4(nc)    
176    www.hotvsnot.com    F/$54/y    PR0(-3)    
177    www.hrent.com/_directory.html    F    PR4(nc)    
178    www.iconcave.com/partners    F    PR4(nc)    
179    www.idorel.com    F    PR2(nc)    
180    www.idorel.com    F/$2    PR2(nc)    
181    www.illumirate.com    F    PR5(nc)    
182    www.imegamall.com    F/$60    PR6(nc)    
183    www.indexunlimited.com    F/$29    PR5(-5)    
184    www.indexwebdirectory.com    F    PR0(0)    
185    www.infignos.com    F    PR5(nc)    
186    www.info-listings.com    F    PR6(nc)    
187    www.info-places.com    F    PR0(-3)    
188    www.infoclicks.net    F    PR5(nc)    
189    www.infopeek.net    F    PR3(nc)    
190    www.informationdirectory.info    F    PR0(-3)    
191    www.informativeinfo.info    F    PR0(-3)    
192    www.infosniff.com    F    PR0(0)    
193    www.infotiger.com    F    PR5(nc)    
194    www.infowebworld.com    F    PR5(nc)    
195    directory.inmeres.com    F/$28    PR2(nc)    
196    www.inneedof.co.uk    F    PR4(nc)    
197    www.iozoo.com    F    PR6(nc)    
198    www.iqair.us/_directory.html    F    PR4(+1)    
199    www.ir8.ne    F    PR0(0)    
200    www.itzalist.com    F    PR0(-5)    

To select a category, simply go to the directory you want to submit to and conduct a search using your most important keywords or phrases. You will then see one or more categories displayed along with in some cases actual websites that are listed in those categories. If more than one category is listed, you can explore each one and view the websites that are listed there. If you have competitors listed there, then you most likely want to be listed as well. The bottom line is to submit to the category that is best related to your business.

Once you locate a category, log it somewhere. This is so you can go back at a later date and see if your site was listed or not. With some directories you will receive an email response on whether your site was listed or not providing that you supply a valid email address when submitting. With others, you will have to manually check to see if your site is listed which is why it is a good practice to make a note of which directories you submitted to as well as to which categories.
201    www.jayde.com    F    PR6(nc)    
202    www.jimac.co.uk    F    PR4(nc)    
203    www.jlinternet.co.uk/directory/    F    PR4(nc)    
204    www.joeant.com    F/$40    PR6(nc)    
205    www.jtrotta.com    F/$10    PR5(-1)    
206    www.kabooli.com    F/$20    PR4(nc)    
207    www.keralaclick.com/dir    F    PR0(0)    
208    www.kingbloom.com    F    PR5(nc)    
209    www.kingoftheweb.net    F/$4    PR3(+3)    
210    www.knowbe.com    F    PR3(nc)    
211    www.kwikgoblin.com    F    PR5(nc)    
212    www.l10s.com    F/$29    PR7(nc)    
213    www.lambshead.com    F    PR3(-1)    
214    www.landoflinks.com    F    PR0(-5)    
215    www.link-pimp.com    F/$20    PR5(nc)    
216    www.linkcentre.com    F    PR5(nc)    
217    www.linketeria.com    F    PR5(nc)    
218    www.linkland.info    F    PR0(-2)    
219    www.linkop.com    F/$10    PR4(nc)    
220    www.linksmatch.com    F    PR5(nc)    
221    www.linksnavigator.com    F    PR0(0)    
222    www.linkwith.us    F    PR4(+2)    
223    www.list-directory.info    F    PR0(-3)    
224    www.look4business.org    F    PR4(nc)    
225    www.lybot.com    F    PR4(-1)    
226    www.mammoth-directory.com    F/$30    PR4(nc)    
227    www.massivelinks.com    F/$10    PR5(nc)    
228    www.maxpromo.com    F/$12    PR5(nc)    
229    www.megri.com    F    PR5(nc)    
230    www.monkey-directory.com    F    PR3(nc)    
231    www.morrison-directory.com    F    PR3(-1)    
232    www.mostpopularsites.net    F    PR5(nc)    
233    www.mywebspider.com    F    PR4(nc)    
234    www.nationaldirectory.com    F    PR7(+7)    
235    directory.nawigator.biz    F    PR4(nc)    
236    www.netinsert.com    F    PR6(+1)    
237    www.netkushi.com/directory/    F    PR3(nc)    
238    www.network-room.com    F    PR4(nc)    
239    www.nintra.com/directory/index.pl    F    PR4(nc)    
240    www.one-way-link.com    F    PR5(+1)    
241    www.onebigindex.com    F    PR5(nc)    
242    www.onemission.com    F    PR4(nc)    
243    www.online-shopping-directory.net    F    PR4(+4)    
244    www.opendirectory.in    F    PR3(+1)    
245    www.openhere.com    F    PR0(0)    
246    www.osy-directory.com    F    PR4(nc)    
247    www.pawnt.info    F    PR0(-3)    
248    www.pedsters-planet.co.uk    F    PR5(+1)    
249    www.perfext.com    F/$5    PR3(-1)    
250    www.pharos-search.com    F/$26    PR4(nc)    
251    www.phatlinks.com    F    PR4(nc)    
252    www.pileiton.com    F    PR3(nc)    
253    directory.planetonline.com    F/$40    PR0(0)    
254    www.platinax.co.uk/directory/    F/$19    PR5(nc)    
255    www.pleaseretrieve.com    F    PR5(nc)    
256    www.poddys.com    F    PR5(nc)    
257    http://www.point-directory.com    F    PR0(0)    
258    dir.portprophecy.com    F    PR2(nc)    
259    www.pr3.co.uk    F    PR4(nc)    
260    www.primodirectory.com    F/$10    PR0(-4)    
261    www.product-pages.com    F    PR2(+2)    
262    www.putmyfinger.co.uk    F    PR3(nc)    
263    www.qango.com    F/$50    PR6(nc)    
264    www.qango.com    F/$50    PR6(nc)    
265    www.qettle.com    F/$5/y    PR0(0)    
266    www.querycube.com/    F/$2    PR4(+4)    
267    www.ranked1.net    F    PR4(nc)    
268    www.rankingdirectory.com/    F    PR4(+1)    
269    www.rankland.com    F    PR0(0)    
270    www.rdirectory.net    F    PR4(nc)    
271    www.redjuniper.com    F    PR4(nc)    
272    www.refrozen.com    F    PR5(nc)    
273    www.relevant-links.com    F    PR3(-1)    
274    www.relevant-links.com    F    PR3(-1)    
275    www.resourcehelp.com    F    PR4(-1)    
276    www.rkdirectory.com    F/$5    PR0(0)    
277    www.rlrouse.com    F/$30/y    PR6(nc)    
278    www.san24.com    F    PR0(0)    
279    www.search-group.com    F/$40    PR2(+1)    
280    www.search-the-world.com    F    PR4(nc)    
281    www.search.able2know.com    F    PR1(-1)    
282    www.searchave.com    F    PR3(-1)    
283    www.searchcity.biz    F    PR3(nc)    
284    www.searchpole.com    F    PR0(-5)    
285    www.searchtheweb.com    F    PR5(nc)    
286    www.searchtwentyfour.com    F    PR4(nc)    
287    www.searchwarp.com    F    PR5(nc)    
288    www.searchwebworld.com    F    PR0(0)    
289    www.searchwiz.com    F    PR6(+1)    
290    www.searchwiz.org    F    PR4(nc)    
291    www.searchworth.com    F    PR3(+1)    
292    www.secrethole.net    F    PR2(nc)    
293    www.sedsearch.com    F    PR4(+1)    
294    www.seekabove.com    F    PR4(nc)    
295    www.seekon.com    F    PR0(0)    
296    dir.seo7.net    F    PR4(+1)    
297    www.seolinking.com    F    PR3(+1)    
298    www.sezza.com    F    PR5(nc)    
299    www.sgtsearch.com    F    PR4(nc)    
300    www.sharedirectory.com    F/$25    PR4(nc)    
301    www.shoula.com    F    PR4(nc)    
302    www.simpledir.com    F/$44    PR4(-1)    
303    www.sitefolders.com    F    PR2(-1)    
304    www.siteinclusion.com    F    PR5(nc)    
305    www.sitelibrary.net/directory    F    PR1(-3)    
306    www.sitesondisplay.com    F    PR5(nc)    
307    www.sitetutor.us    F    PR5(nc)    
308    www.skaffe.com    F/$40    PR6(+1)    
309    www.skaloosh.com    F/$2    PR3(+3)    
310    www.smallerbizz.com    F/$10    PR0(0)    
311    www.smartfind.org    F    PR2(-1)    
312    www.socengine.com    F/$7    PR5(nc)    
313    www.software-pointers.com    F    PR4(nc)    
314    www.softzdirectory.com    F    PR4(nc)    
315    www.somuch.com    F    PR6(+1)    
316    www.sonicquest.com    F    PR5(+1)    
317    directory.sootle.com    F/$20    PR6(+1)    
318    www.sootle.com    F    PR6(nc)    
319    www.sorve.com    F    PR4(nc)    
320    www.speedydirectory.com    F    PR0(-4)    
321    www.spheri.com    F    PR5(nc)    
322    www.splatsearch.com    F    PR6(nc)    
323    www.stopat.com    F    PR3(-1)    
324    www.stormer.net    F    PR5(nc)    
325    www.Submiturlhere.com    F    PR0(0)    
326    www.sumwd.com    F    PR4(nc)    
327    www.sunnydating.com/dir    F    PR1(-2)    
328    www.surfsafely.com    F    PR5(nc)    
329    www.synergy-dti.com    F    PR5(nc)    
330    www.the-free-directory.co.uk    F/$5    PR0(0)    
331    www.thebusinessdir.com    F/$9    PR4(nc)    
332    www.thelanka.com    F/$10    PR6(+1)    
333    www.theorangepages.com    F    PR4(+1)    
334    www.thermokarst.net    F    PR2(+2)    
335    www.theseoking.com    F    PR3(+3)    
336    www.thewebis.com/directory/    F    PR2(-1)    
337    www.thewebknot.com    F    PR0(-4)    
338    www.thommo.info    F    PR0(-3)    
339    directory.ticketretriever.com    F    PR5(nc)    
340    www.toponlineshopping.com    F    PR5(nc)    
341    www.trafficportal.co.uk    F/$49    PR0(0)    
342    www.tsection.com    F    PR5(nc)    
343    www.turnpike.net    F    PR6(nc)    
344    www.tygo.com/dir    F/$20    PR6(nc)    
345    www.uk-web-index.co.uk    F    PR4(nc)    
346    www.ultisearch.co.uk    F    PR5(nc)    
347    www.uranus-directory.info    F    PR3(+3)    
348    www.urlcan.com    F    PR3(nc)    
349    www.uudir.com    F    PR4(nc)    
350    www.uuiq.com    F    PR3(nc)    
351    www.velendi.com    F    PR4(+4)    
352    www.verticaldirectories.com    F/$20    PR4(nc)    
353    www.virgils.biz    F/$13    PR3(nc)    
354    www.vxbox.com    F    PR6(nc)    
355    www.wallydrag.com    F    PR2(nc)    
356    www.wamchu.com    F    PR4(+1)    
357    www.web-beacon.com    F/$40    PR5(-1)    
358    www.web-central.info    F    PR4(+1)    
359    www.webdesigncorp.com    F    PR4(nc)    
360    www.webdirectory.co.in    F    PR3(+1)    
361    www.webs-best-directory.com    F/$20    PR5(nc)    
362    www.websavvy.cc    F    PR5(nc)    
363    www.websearches.info    F    PR4(nc)    
364    www.websitetop.com    F    PR3(nc)    
365    www.websmadeeasy.com    F    PR2(nc)    
366    www.webworldindex.com    F/$25    PR6(+1)    
367    www.webxperience.org    F    PR5(nc)    
368    www.wholesalepimp.com    F    PR4(-1)    
369    www.wholesalespotter.com    F    PR3(nc)    
370    www.world-click.com/dir    F/$10/y    PR0(0)    
371    www.worlddirectory.in    F    PR4(+4)    
372    www.worldhot.com    F    PR7(nc)    
373    www.worldsiteindex.com    F/$13    PR5(nc)    
374    www.worldsiteindex.com    F/$5    PR5(nc)    
375    www.worldwidesearchengine.com    F/$299    PR4(nc)    
376    www.wowdirectory.com    F/$25    PR6(nc)    
377    www.wowyellowpages.com    F/$20    PR4(nc)    
378    www.xeoweb.biz    F    PR0(-4)    
379    www.xland.info    F    PR4(+1)    
380    www.yeandi.com    F/$10    PR5(nc)    
381    www.yourfreelink.com    F    PR2(-1)    
382    www.yourwebloghere.com    F    PR6(+1)    
383    www.z5-directory.com    F    PR0(0)    
384    www.zeal.com    F    PR8(nc)    
385    www.zeezo.com    F    PR5(nc)    
386    www.zerovis.com/dir    F/$10    PR3(nc)    

Note: This list was originally compiled by Bob Mutch. It should not be distributed without having legal permissions from the original author.
261  THE TECHNO CLUB [ TECHNOWORLDINC.COM ] / Web Design / Graphics Design/ Animation / Free Hosting Sites on: October 14, 2006, 03:54:48 PM
theys are some free hosting for your images and anything else

FREE PROHOSTING

* 100 Megabytes of Disk Storage
* 1.2 Gigabytes of Monthy Bandwidth
* ProBuilder Site Builder
* 1 FTP account

http://free.prohosting.com/

freeservers

5 MB (~50 photos)
0 Mailboxes
Easy-to-use site builder
File Manager (no FTP)

http://www.freeservers.com/


50Megs

Our FREE hosting package gives you so much more than anyone else's free offer, along with the opportunity to upgrade when you're ready!

http://www.50megs.com/



Free web hosting

50 MB Web Storage
free web site 1000 MB Monthly Transfer
free web hosting PHP Allowed !
free web site hosting FTP Access
hosting free Web Control Panel
web hosting free Online File Manager
NO Pop-Ups
Free Sub-domain
name.fbhosting.com
Can host domain name
www.yourname.com

http://www.fbhosting.com/


NetFreeHost

50 MB Web Space
5 GB Monthly Transfers
FTP Access for Uploading
Server-Side Includes (SSI)
IE Based File Manager
No Ads, No Banners, No Pop-Ups
Hosted Message Board, Hit Counter
Sub Domain Name (YOU.BizHat.com)

http://www.netfreehost.com/


100webspace

100MB disk space
3GB bandwidth
3 POP3 e-mails & Webmail
Free 24/7 technical support
PHP, Perl/CGI-BIN
MySQL database
FTP access
Web-based file manager
Small banner

http://www.100webspace.com/



freewebsites






Free sub domain eg. yourname.
Use up to 50mb of free web site space!
Real FTPaccess for uploading
2mb file size limits!
NO POPUPS OR BANNER ADS!
Unlimited hits and bandwidth!
Secure, stable unix servers!
Unlimited e-mail addresess! (anything)@yourname.freewebsites.com
Unlimited subdomain aliases for your site!
ie. http://(anythingyoulike).yourname.freewebsites.com/
or http://anything.yourdomain.com/


http://www.freewebsites.com/



freewebpage

150 MB of space
Direct FTP
Your own sub-domain
Personal guestbook
Personal message board
Form mail so your visitors can e-mail you directly from within a web page
One-click easy upload utility allows you to upload multiple files easily and conveniently
EZ page builder (no knowledge of html needed)
Free "One-Click" submission to many search engines to promote your site
And much more..


http://www.freewebpage.org/
262  THE TECHNO CLUB [ TECHNOWORLDINC.COM ] / Web Design / Graphics Design/ Animation / Top Ten Mistakes in Web Design on: October 14, 2006, 03:53:10 PM
Author: Jakob Nielsen

Summary:
The ten most egregious offenses against users. Web design disasters and HTML horrors are legion, though many usability atrocities are less common than they used to be.
Since my first attempt in 1996, I have compiled many top-10 lists of the biggest mistakes in Web design. See links to all these lists at the bottom of this article. This article presents the highlights: the very worst mistakes of Web design. (Updated 2004.)

1. Bad Search
Overly literal search engines reduce usability in that they're unable to handle typos, plurals, hyphens, and other variants of the query terms. Such search engines are particularly difficult for elderly users, but they hurt everybody.
A related problem is when search engines prioritize results purely on the basis of how many query terms they contain, rather than on each document's importance. Much better if your search engine calls out "best bets" at the top of the list -- especially for important queries, such as the names of your products.

Search is the user's lifeline when navigation fails. Even though advanced search can sometimes help, simple search usually works best, and search should be presented as a simple box, since that's what users are looking for.

2. PDF Files for Online Reading
Users hate coming across a PDF file while browsing, because it breaks their flow. Even simple things like printing or saving documents are difficult because standard browser commands don't work. Layouts are often optimized for a sheet of paper, which rarely matches the size of the user's browser window. Bye-bye smooth scrolling. Hello tiny fonts.
Worst of all, PDF is an undifferentiated blob of content that's hard to navigate.

PDF is great for printing and for distributing manuals and other big documents that need to be printed. Reserve it for this purpose and convert any information that needs to be browsed or read on the screen into real web pages.

> Detailed discussion of why PDF is bad for online reading

3. Not Changing the Color of Visited Links
A good grasp of past navigation helps you understand your current location, since it's the culmination of your journey. Knowing your past and present locations in turn makes it easier to decide where to go next. Links are a key factor in this navigation process. Users can exclude links that proved fruitless in their earlier visits. Conversely, they might revisit links they found helpful in the past.
Most important, knowing which pages they've already visited frees users from unintentionally revisiting the same pages over and over again.

These benefits only accrue under one important assumption: that users can tell the difference between visited and unvisited links because the site shows them in different colors. When visited links don't change color, users exhibit more navigational disorientation in usability testing and unintentionally revisit the same pages repeatedly.

> Usability implications of changing link colors
> Guidelines for showing links

4. Non-Scannable Text
A wall of text is deadly for an interactive experience. Intimidating. Boring. Painful to read.
Write for online, not print. To draw users into the text and support scannability, use well-documented tricks:

subheads
bulleted lists
highlighted keywords
short paragraphs
the inverted pyramid
a simple writing style, and
de-fluffed language devoid of marketese.


5. Fixed Font Size
CSS style sheets unfortunately give websites the power to disable a Web browser's "change font size" button and specify a fixed font size. About 95% of the time, this fixed size is tiny, reducing readability significantly for most people over the age of 40.
Respect the user's preferences and let them resize text as needed. Also, specify font sizes in relative terms -- not as an absolute number of pixels.

6. Page Titles With Low Search Engine Visibility
Search is the most important way users discover websites. Search is also one of the most important ways users find their way around individual websites. The humble page title is your main tool to attract new visitors from search listings and to help your existing users to locate the specific pages that they need.
The page title is contained within the HTML <title> tag and is almost always used as the clickable headline for listings on search engine result pages (SERP). Search engines typically show the first 66 characters or so of the title, so it's truly microcontent.

Page titles are also used as the default entry in the Favorites when users bookmark a site. For your homepage, begin the with the company name, followed by a brief description of the site. Don't start with words like "The" or "Welcome to" unless you want to be alphabetized under "T" or "W."

For other pages than the homepage, start the title with a few of the most salient information-carrying words that describe the specifics of what users will find on that page. Since the page title is used as the window title in the browser, it's also used as the label for that window in the taskbar under Windows, meaning that advanced users will move between multiple windows under the guidance of the first one or two words of each page title. If all your page titles start with the same words, you have severely reduced usability for your multi-windowing users.

Taglines on homepages are a related subject: they also need to be short and quickly communicate the purpose of the site.

7. Anything That Looks Like an Advertisement
Selective attention is very powerful, and Web users have learned to stop paying attention to any ads that get in the way of their goal-driven navigation. (The main exception being text-only search-engine ads.)
Unfortunately, users also ignore legitimate design elements that look like prevalent forms of advertising. After all, when you ignore something, you don't study it in detail to find out what it is.

Therefore, it is best to avoid any designs that look like advertisements. The exact implications of this guideline will vary with new forms of ads; currently follow these rules:

banner blindness means that users never fixate their eyes on anything that looks like a banner ad due to shape or position on the page
animation avoidance makes users ignore areas with blinking or flashing text or other aggressive animations
pop-up purges mean that users close pop-up windoids before they have even fully rendered; sometimes with great viciousness (a sort of getting-back-at-GeoCities triumph).

8. Violating Design Conventions
Consistency is one of the most powerful usability principles: when things always behave the same, users don't have to worry about what will happen. Instead, they know what will happen based on earlier experience. Every time you release an apple over Sir Isaac Newton, it will drop on his head. That's good.
The more users' expectations prove right, the more they will feel in control of the system and the more they will like it. And the more the system breaks users' expectations, the more they will feel insecure. Oops, maybe if I let go of this apple, it will turn into a tomato and jump a mile into the sky.

Jakob's Law of the Web User Experience states that "users spend most of their time on other websites."

This means that they form their expectations for your site based on what's commonly done on most other site. If you deviate, your site will be harder to use and users will leave.

9. Opening New Browser Windows
Opening up new browser windows is like a vacuum cleaner sales person who starts a visit by emptying an ash tray on the customer's carpet. Don't pollute my screen with any more windows, thanks (particularly since current operating systems have miserable window management).
Designers open new browser windows on the theory that it keeps users on their site. But even disregarding the user-hostile message implied in taking over the user's machine, the strategy is self-defeating since it disables the Back button which is the normal way users return to previous sites. Users often don't notice that a new window has opened, especially if they are using a small monitor where the windows are maximized to fill up the screen. So a user who tries to return to the origin will be confused by a grayed out Back button.

Links that don't behave as expected undermine users' understanding of their own system. A link should be a simple hypertext reference that replaces the current page with new content. Users hate unwarranted pop-up windows. When they want the destination to appear in a new page, they can use their browser's "open in new window" command -- assuming, of course, that the link is not a piece of code that interferes with the browser’s standard behavior.

10. Not Answering Users' Questions
Users are highly goal-driven on the Web. They visit sites because there's something they want to accomplish -- maybe even buy your product. The ultimate failure of a website is to fail to provide the information users are looking for.
Sometimes the answer is simply not there and you lose the sale because users have to assume that your product or service doesn't meet their needs if you don't tell them the specifics. Other times the specifics are buried under a thick layer of marketese and bland slogans. Since users don't have time to read everything, such hidden info might almost as well not be there.

The worst example of not answering users' questions is to avoid listing the price of products and services. No B2C ecommerce site would make this mistake, but it's rife in B2B, where most "enterprise solutions" are presented so that you can't tell whether they are suited for 100 people or 100,000 people. Price is the most specific piece of info customers use to understand the nature of an offering, and not providing it makes people feel lost and reduces their understanding of a product line. We have miles of videotape of users asking "Where's the price?" while tearing their hair out.

Even B2C sites often make the associated mistake of forgetting prices in product lists, such as category pages or search results. Knowing the price is key in both situations; it lets users differentiate among products and click through to the most relevant ones.
263  THE TECHNO CLUB [ TECHNOWORLDINC.COM ] / Ethical Hacking / Security / Viruses / Spoofed/Forged Email on: October 14, 2006, 03:51:30 PM
This document provides a general overview of email spoofing and the problems that can result from it. It includes information that will help you respond to such activity.

Introduction

I. Description

II. Technical Issues

III. What You Can Do

1. Reaction
2. Prevention (Deterrence)

IV. Additional Security Measures That You Can Take

I. Description
Email spoofing may occur in different forms, but all have a similar result: a user receives email that appears to have originated from one source when it actually was sent from another source. Email spoofing is often an attempt to trick the user into making a damaging statement or releasing sensitive information (such as passwords).

Examples of spoofed email that could affect the security of your site include:

* email claiming to be from a system administrator requesting users to change their passwords to a specified string and threatening to suspend their account if they do not do this
* email claiming to be from a person in authority requesting users to send them a copy of a password file or other sensitive information

If, after investigating the activity, you find that there is more to the incident than spoofed email (such as a compromise at your site or another site), please refer to Section IV below.
II. Technical Issues

* If you provide email services to your user community, your users are vulnerable to spoofed or forged email.
* It is easy to spoof email because SMTP (Simple Mail Transfer Protocol) lacks authentication. If a site has configured the mail server to allow connections to the SMTP port, anyone can connect to the SMTP port of a site and (in accordance with that protocol) issue commands that will send email that appears to be from the address of the individual's choice; this can be a valid email address or a fictitious address that is correctly formatted.
* In addition to connecting to the SMTP port of a site, a user can send spoofed email via other protocols (for instance, by modifying their web browser interface).

III. What You Can Do

1. Reaction
1. You may be alerted to spoofed email attempts by reports from your users or by investigating bounced email error messages.
2. Following relevant policies and procedures of your organization, review all information (such as mail headers and system log files) related to the spoofed email.

Examine tcp_wrapper, ident, and sendmail logs to obtain information on the origin of the spoofed email.

The header of the email message often contains a complete history of the "hops" the message has taken to reach its destination. Information in the headers (such as the "Received:" and "Message-ID" information), in conjunction with your mail delivery logs, should help you to determine how the email reached your system.

If your mail reader does not allow you to review these headers, check the ASCII file that contains the original message.

NOTE: Some of the header information may be spoofed; and if the abuser connected directly to the SMTP port on your system, it may not be possible for you to identify the source of the activity.
3. Follow up with other sites involved in this activity, if you can identify the sites. Contact them to alert them to the activity and help them determine the source of the original email.

We would appreciate a cc to "[email protected]" on your messages; this facilitates our work on incidents and helps us relate ongoing intruder activities.

If you have a CERT# reference for this incident, please include it in the subject line of all messages related to this incident. (NOTE: This reference number will be assigned by the CERT/CC, so if you do not have a reference number, one will be assigned once we receive the incident report.)

To find site contact information, please refer to

http://www.cert.org/tech_tips/finding_site_contacts.html

You may also want to contact the postmaster at sites that may be involved. Send email to

postmaster@[host.]site.domain (for example, [email protected])

Please include a copy of this document in your message to sites.
4. To provide as much information as possible to help trace this type of activity, you can increase the level of logging for your mailer delivery daemon.
5. Realize that in some cases, you may not be able to identify the origin of the spoofed email.
2. Prevention (Deterrence)
1. Use cryptographic signatures (e.g., PGP "Pretty Good Privacy" or other encryption technologies) to exchange authenticated email messages. Authenticated email provides a mechanism for ensuring that messages are from whom they appear to be, as well as ensuring that the message has not been altered in transit. Similarly, sites may wish to consider enabling SSL/TLS in their mail transfer software. Using certificates in this manner increases the amount of authentication performed when sending mail.
2. Configure your mail delivery daemon to prevent someone from directly connecting to your SMTP port to send spoofed email to other sites.
3. Ensure that your mail delivery daemon allows logging and is configured to provide sufficient logging to assist you in tracking the origin of spoofed email.
4. Consider a single point of entry for email to your site. You can implement this by configuring your firewall so that SMTP connections from outside your firewall must go through a central mail hub. This will provide you with centralized logging, which may assist in detecting the origin of mail spoofing attempts to your site.
5. Educate your users about your site's policies and procedures in order to prevent them from being "social engineered," or tricked, into disclosing sensitive information (such as passwords). Have your users report any such activities to the appropriate system administrator(s) as soon as possible. See also CERT advisory CA-1991-04, available from

http://www.cert.org/advisories/CA-1991-04.social.engineering.html

IV. Additional Security Measures That You Can Take

1. If you have questions concerning legal issues, we encourage you to work with your legal counsel.

U.S. sites interested in an investigation of this activity can contact the Federal Bureau of Investigation (FBI). Information about how the FBI investigates computer crimes can be found here

http://www.cert.org/tech_tips/FBI_investigates_crime.html

For information on finding and contacting your local FBI field office, see

http://www.fbi.gov/contact/fo/fo.htm

Non-U.S. sites may want to discuss the activity with their local law enforcement agency to determine the appropriate steps for pursuing an investigation.
2. For general security information, please see

http://www.cert.org/

3. To report an incident, please complete and return

http://www.cert.org/reporting/incident_form.txt

Or use the web-based Incident Reporting Form at

https://irf.cc.cert.org
264  THE TECHNO CLUB [ TECHNOWORLDINC.COM ] / Techno News / Microsoft Brings Business Intelligence to Office 12 on: October 14, 2006, 03:15:15 PM
Microsoft has announced that it will include data-culling technology in the upcoming version of Microsoft Office, codenamed Office 12.



The company said the business-intelligence technology will provide easy access to critical company data through tighter integration with Microsoft's SQL Server and SharePoint Products and Technologies.

Office 12, scheduled for release in 2006, will aim to make better use of the Excel spreadsheet program to analyze company data by enhancing server-side analysis and dashboard options in its SharePoint portal and collaboration environment.

SQL Server Integration

The company also is touting better Office integration with SQL Server 2005, the newest version of Microsoft's enterprise-class database software. New functions include greater spreadsheet capacity, improved sorting and filtering, and data-visualization capabilities.

Before Office 12 hits the streets, however, some of the technology will be available in November with the release of Business Scorecard Manager 2005, which uses Microsoft's SQL server on the back end and the Office suite on the front end.

The debut will mark Microsoft's entry into a billion-dollar market that heretofore had been the domain of enterprise-scale organizations such as Business Objects SA. Microsoft said the software is a response to "extensive customer research" that found customers wanted a scorecard application for business-process management.

Everyone Together Now

The new emphasis on business-intelligence technology comes as Microsoft attempts to expand the market for Office by changing the perception that the application is primarily a personal productivity tool.

Keith Giles, principal analyst at Forrester Research, said that with just 25 percent of corporations running the latest version of Office, Microsoft is sending a message that it has the "strongest productivity product in Office." Giles also said that Office should offer the best level of integration with SQL Server.

Previous versions of Excel lacked the ability to integrate metadata or build robust applications in the same fashion a business-intelligence tool could, Giles said. Office 12 "brings together two strong components, the SQL Server component and the Office component, in way they have not been brought together in large organizations," he said.

"Excel is used tremendously by both small and midsize businesses and larger corporate entities," Giles said. "The enhancements not only will make it more attractive within the small and midsize business market, but also make it more attractive at the enterprise level."
265  THE TECHNO CLUB [ TECHNOWORLDINC.COM ] / Messengers / Chats / Yahoo Messenger Security on: October 14, 2006, 03:12:07 PM
Yahoo Messenger
Instant Messaging is a very fast and convenient form of communication. However it has opened up a new medium for hackers and script kiddies to mess around. In this paper, we'll take a look at yahoo messenger and see what we can do to keep our PCs safe.

We will look at two levels at which you can protect your PC. The first one will include configuring yahoo messenger's default settings and installing a firewall. The second level will deal with third party programs which either replace yahoo messenger or create a safer environment by constantly monitoring your system.


Floating Hacks - The Problem

Let us first take a look at some of the types of hacks floating around. These fall into the following categories:

Booters
A booter is something that disconnectes (or "boots") the target from the chat/IM service. Usually, a lot of junk traffic is sent to your client causing yahoo to disconnect you.


Bombers
If you have suddenly found many windows opening, covering up all of your screen, starving your system of resources and eventually crashing your computer, you've just been bombed! This is usually the result of programming error/ not taking too much trouble in designing the protocol/ oversight by the programmers at yahoo. An unchecked bombing will crash your system and you'll have to reboot your machine.


Internet Explorer vulnerabilities
Later versions of yahoo use internet explorer to display all the chat/IM text. If you haven't lived on Mars all your life (or you are a fellow penguin lover [wtf are you doing here anyway?]), you must have heard of the various patches/security updates released by microsoft. These vulnerabilities range from the annoying to the severe and can be really dangerous in the right (wrong?) hands. You can loose all data, all your personal info can be read, your mails and correspondence peeked at and your computer can be taken over.

Fortunately, most of the internet explorer vulnerabilities can be exploited only in rare circumstances but your best bet is to stay updated.

The Solution
Level I

The first thing to do is to check whether messengers' settings are set properly. These are found under Login -> Preferences in the menu.



Messages - One of the ways of freezing the victims computer has been to send too many messages each with a different yahoo ID. Many windows pop up as a result using up all your memory eventually causing your computer to crash.

To avoid this to a certain extent, select 'Messages are shown in a single message box'. This will still cause a crash if you are being bombarded with messages. For better protection, follow the instructions under 'Privacy'.


Archiving - Imagine someone breaking into you computer and having access to all your conversations! Uncheck "Enable Archiving" and delete the folder Archive typically present under C:\Program Files\Yahoo!\Messenger\Profiles\your-username\Archive.


File Transfer - Disable automatic download of files. This way nobody can send you files without your permission. To do this, select "Ask me for permission before downloading files" and "Ask me for permission to get files".


Webcam settings - Avoid Peeping Toms. Choose "Always ask for my permission" under Login -> Preferences -> Webcam.


Privacy - Do not allow people other than your friends to IM you. This way you'll avoid most of PM boots and other nasty stuff. Select "Ignore anyone who is not on my Friend List".
Installing a firewall
A firewall is a program that monitors incoming and outgoing packets and performs a (preconfigured) action on them. What this means is that a firewall will check that data coming into your computer is from an expected (previously configured) address and that the data going out of your computer is from an expected (previously configured) program.

Any good firewall will do.

Level II
A number of programs have been created to address the problem of stability. Use a search engine to locate these programs.
Ym!lite - This program has no known boots.

Update: Ym!lite now supports cam and voice is under development.

Yahelite - This is the most popular proggy out there. It supports voice chat and video cams.
266  THE TECHNO CLUB [ TECHNOWORLDINC.COM ] / Ethical Hacking / Security / Viruses / Re: Home Computer Security on: October 14, 2006, 03:03:26 PM
The Location test: What’s the Internet location of the computer system to which your computer wants to connect? Locations consist of an address and a port number. Sometimes a program is allowed to connect to any Internet location, such as a web browser connecting to any web server. Again, you want to limit programs so that they only connect to specific locations where possible.

The Allowed test: Is this connection allowed or denied? Your firewall rules will contain some of each.

The Temporary test: Is this connection temporary or permanent? For example, if you’re going to connect to this specific location more than five times each time you use the computer, you probably want to make the connection permanent. This means that you ought to add a rule to your firewall rules. If you aren’t going to make this connection often, you should define it as temporary.

With each connection, apply the PLAT tests to get the information you need to build a firewall rule. The answer to the PLAT tests tells you if you need to include a new firewall rule for this new connection. For most firewall programs, you can temporarily allow a connection but avoid making it permanent by not including it in your rules. Where possible, allow only temporary connections.

As you run each program on your home computer, you’ll learn how it uses the Internet. Slowly you’ll begin to build the set of rules that define what traffic is allowed into and out of your computer. By only letting in and out what you approve and denying all else, you will strike a practical balance between allowing everything and allowing nothing in or out.

Along the way, you may come across exceptions to your rules. For example, you might decide that anybody who uses your home computer can visit any web site except a chosen few web sites. This is analogous to the security guard letting every employee pass except a few who need more attention first.

To do this with firewall rules, the exception rules must be listed before the general rules. For example, this means that the web sites whose connections are not allowed must be listed before the rules that allow all connections to any web site.

Why? Most firewall programs search their rules starting from the first through the last. When the firewall finds a rule that matches the packet being examined, the firewall honors it, does what the rule says, and looks no further. For example, if the firewall finds the general rule allowing any web site connections first, it honors this rule and doesn’t look further for rules that might deny such a connection. So, the order of firewall rules is important.

Many firewalls can be programmed to require a password before changing the rules. This extra level of protection safeguards against unwanted changes no matter their source, that is, you, an intruder, or another user. Follow the guidance in Task 6 - Use Strong Passwords when assigning a password to your firewall.

Finally, make a backup of your firewall rules. You’ve probably taken a lot of time to build and tune them to match how your home computer is used. These rules are important to your computer’s security, so back them up using the guidance in Task 5 - Make Backups of Important Files and Folders.

Firewalls come in two general types: hardware and software (programs). The software versions also come in two types: free versions and commercial versions (ones that you purchase). At a minimum, you should use one of the free versions on your home computer. This is especially important if you have a laptop that you connect to your home network as well as a network at a hotel, a conference, or your office.

If you can afford a hardware firewall, you should install one of these too. We’ve recommended this as something to do later. (Firewall programs are Task 4 on our list of recommended actions, and hardware firewalls are Task 8.) The same issues apply to the hardware versions that apply to the software versions. Many can also be password protected against unwanted changes. Search the Internet with your browser to see what’s available and what they cost. The price of hardware firewalls is coming down as the demand grows.

A firewall is your security guard that stands between your home computer and the Internet. It lets you control which traffic your computer accepts. It also controls which of your programs can connect to the Internet. With a firewall, you define which connections between your computer and other computers on the Internet are allowed and which are denied. There are free firewall products that provide the capabilities you need to secure your home computer. Commercial versions have even more features that can further protect your computer.

Firewalls are an important part of your home computer’s security defenses.


Task 5 - Make Backups of Important Files and Folders

Whether you know it or not, you’ve divided everything you own into two broad categories: those items you can replace and those you can’t. For the items you can’t replace, you’ve probably stored them in a safe place, either somewhere in your living space or elsewhere, in a lockbox at a bank, for example. In either case, you’ve probably also bought insurance that provides the funds you’d need to buy replacements. Your insurance policy covers almost everything you own.

On your home computer, have you similarly divided everything into the same categories? What have you done about the items – files in this case – that you can’t replace? Examples are the files that make up your checking account records, that novel you’ve been writing for the past few years, and those pictures you took last summer with your digital camera. What happens if your computer malfunctions or is destroyed by a successful attacker? Are those files gone forever?

Now think about your car for a moment. Do you have a spare tire? Is it inflated? When was the last time you used it? Can you imagine buying a car without a spare tire? Even if you bought a used car without a spare, how soon did you buy a spare so that you’d have one when you needed it?

Think back to your home computer. Do you have a “spare tire,” meaning a way to continue computing when you have a “blowout” caused by a malfunction or an intruder? Said another way, can you back up your files onto some other media so that you can recover them if you need to? If you’d never buy a car without a spare tire, why did you buy a computer without a device to back up your files?

When deciding what to do about backing up files on your computer, ask these questions:

The Files question: What files should you back up? The files you select are those that you can neither easily recreate nor reinstall from somewhere else, such as the CD-ROMs or the floppy disks that came with your computer.

Be realistic. That check register you printed does not constitute a backup from which you can easily recreate the files needed by your checking account program. You’re probably not going to re-enter all that data if the files are destroyed. Just as you protect your irreplaceable valuables, back up the files you cannot replace, easily or otherwise.

The Often question: How often should you back them up? In the best of all cases, you should back up a file every time it changes. If you don’t, you’ll have to reintroduce all the changes that happened since your last backup. Just as you store your precious jewelry in a lockbox at the local bank lest the lucky robber find it in your jewelry box, you need to store your files safely (back them up) after every use (change in the file) lest an intruder destroys the file or there’s a system catastrophe.

The Media question: Where should you back them up to; that is, what media should you use to hold backed up files? The answer is: whatever you have. It’s a question of how many of that media you have to use and how convenient it is. For example, most computers have a floppy disk drive. You could back up your irreplaceable files to floppies. That process just takes lots of time and may not be as convenient as using another media. Larger capacity removable disk drives and writable CD-ROMs also work well, take less time, and are more convenient.

If you don’t have a backup device, there are alternatives. There are Internet services that let you back up your files to another Internet computer. Some of these services provide “transparent access” to the backups. That is, they look like another hard drive attached to your computer. You use the file copy scheme that your computer provides to back up files and recover them from backed up storage. To find these services, do some Internet searches using your browser.

Remember that the information you transfer across the Internet could be viewed and captured by others; that is, the information is in the clear. Be sensitive to that if you use an Internet-based backup computer. In addition, you need to be able to trust the information when you recover a file from that service.

The Store question: Where should you store that media once it contains your backed up files? No matter how you back up your files, you need to be concerned about where those backed up copies live.

You already know that intruders try to break into your home computer to gain access to your files and your computer’s resources. Another way to gain access to the same information is by stealing your backups. It is more difficult, though, since a robber must physically be where your backups are, whereas an intruder can access your home computer from literally anywhere in the world. The key is to know where the media is that contains your backed up files.

Just like important papers stored in a fireproof container at your house, you also need to be concerned about your backups being destroyed if your living space is destroyed or damaged. This means that you ought to keep a copy of your backed up files in a fireproof container or somewhere beyond your living space, your office for example. It is the eternal compromise between security and usability. If you need to recover a file and the backed up copies are at the office, that’s inconvenient. However, while storing them at home is more convenient and more usable, they share the same risks that your computer faces should your living space be destroyed. Be aware of the issues and make a conscious decision, perhaps keeping copies in both places.

If you have that spare tire for your car or a lockbox for your valuables, you’ve already planned for the worst that can happen around your living space. Continue that good practice by backing up your critical files onto media that you can safely store elsewhere. Do those backups often enough that you can capture the changes you’ve made. With the FOMS questions, you have a structured approach to use to back up your critical files. You’ve now planned for the worst.

As you computerize the routine aspects of your daily life, making backup copies of important files and folders becomes critical. Even if you can’t store the backup copies in a fireproof container or somewhere outside your home, make backups anyway. Any backup is better than none.


Task 6 - Use Strong Passwords

Your living space has doors and windows, and perhaps most of the time they’re locked. For each lock that uses a key, chances are that each key is different. You know to lock up and not to share the keys with strangers, and probably not with most of your friends. You should not hide keys under the mat or in a flowerpot on your front porch.

Passwords for computers are much the same. For each computer and service you use (online purchasing, for example), you should have a password. Each password should be unique and unrelated to any of your other passwords. You shouldn’t write them down nor should you share them with anyone, even your best friends.

Take a look at your front door key. It’s pretty complicated. There are lots of notches and grooves. If there weren’t so many possible variations, a thief could easily make a key for every possible combination and then try each on your front door. This trial-and-error method, (for computers, called brute force) is likely to be effective even if it takes a long time. Nonetheless, no matter how complicated, if the thief gets hold of your key, he or she can copy it and use that copy to open your door.

A password can also be complicated. Most schemes let you use any combination of letters, both upper and lower case, and numbers; and some also let you use punctuation marks. Lengths can vary. You can create a password to be as complicated as you want. The key (no pun intended) is to be able to remember this password whenever you need it without having to write it down to jog your memory.

Like the thief at your door, computer intruders also use trial-and-error, or brute-force techniques, to discover passwords. By bombarding a login scheme with all the words in a dictionary, they may “discover” the password that unlocks it. If they know something about you, such as your spouse’s name, the kind of car you drive, or your interests, clever intruders can narrow the range of possible passwords and try those first. They are often successful. Even slight variations, such as adding a digit onto the end of a word or replacing the letter o (oh) with the digit 0 (zero), don’t protect passwords. Intruders know we use tricks like this to make our passwords more difficult to guess.

Just like the front door key, even a complicated password can be copied and the copy reused. Remember the earlier discussion about information on the Internet being in the clear? Suppose that really strong password you took a long time to create – the one that’s 14 characters long and contains 6 letters, 4 numbers, and 4 punctuation marks, all in random order – goes across the Internet in the clear. An intruder may be able to see it, save it, and use it. This is called sniffing and it is a common intruder practice.

The point is that you need to follow the practice of using a unique password with every account you have. Below is a set of steps that you can use to help you create passwords for your accounts:

The Strong test: Is the password as strong (meaning length and content) as the rules allow?

The Unique test: Is the password unique and unrelated to any of your other passwords?

The Practical test: Can you remember it without having to write it down?

The Recent test: Have you changed it recently?

In spite of the SUPR tests, you need to be aware that sniffing happens, and even the best of passwords can be captured and used by an intruder.

You should use passwords not only on your home computer but also for services you use elsewhere on the Internet. All should have the strongest passwords you can use and remember, and each password should be unique and unrelated to all other passwords. A strong password is a password that is longer than it is short, that uses combinations of uppercase and lowercase letters, numbers, and punctuation, and that is usually not a word found in a dictionary. Also remember that no matter how strong a password is, it can still be captured if an intruder can see it “in the clear” somewhere on the Internet.

Task 7 - Use Care When Downloading and Installing Programs

When you buy an appliance, you give little thought to it doing you or your house any harm. Why? Because there are organizations like Underwriters Laboratories that set standards and certify products. When you see a certifier’s label, you have more confidence that a product will be safer than a competing product that does not carry the same label. You’re willing to accept the risk because you believe the product has met some standards and has been certified by a respected authority.

Unfortunately, the Internet is not the same. There are neither standards nor many certification organizations. Anyone who writes a program can distribute it through any means available, such as through the web or by sending you a copy. Speaking of that, have you ever received a CD-ROM in the mail? How do you know that it contains what the label says? The answer is: you don’t know. More importantly, it’s difficult to know.

No matter how you acquire a program, it runs on your computer at the mercy of the program’s author. Anything, any operation, any task that you can do, this program can also do. If you’re allowed to remove any file, the program can too. If you can send email, the program can too. If you can install or remove a program, the program can too. Anything you can do, the intruder can do also, through the program you’ve just installed and run.

Sometimes there’s no explanation of what a program is supposed to do or what it actually does. There may be no user’s guide. There may be no way to contact the author. You’re on your own, trying to weigh a program’s benefits against the risk of the harm that it might cause.

What’s the problem you’re trying to solve here? You are trying to determine if the program you’ve just found satisfies your needs (say it provides a service that you want or you’re just experimenting) without causing harm to your computer and ultimately the information you have on the computer. How do you decide if a program is what it says it is? How do you gauge the risk to you and your computer by running this program?

You address these same risk issues when you purchase an appliance; you may just not have realized that’s what you were doing. When you make that purchase, you buy from either a local store you know or a national chain with an established reputation. If there’s a problem with your purchase, you can take it back to the store and exchange it or get your money back. If it causes you harm, you can seek relief through the legal system. The reputation of the merchant, the refund/return policy, and the availability of the legal system reduce your risk to a point where you make the purchase.

Apply these same practices when you buy a program. You should

Learn as much as you can about the product and what it does before you purchase it.

Understand the refund/return policy before you make your purchase.

Buy from a local store that you already know or a national chain with an established reputation.

Presently, it is not as clear what the legal system’s role is for a program that causes harm or does not work as advertised. In the meantime, the LUB practices are a good first step.

Today’s Internet has a feature that standard products don’t have, or at least have but to a lesser extent. This feature is free programs. There is a multitude of free programs available for all types of systems, with more available each day. The challenge is to decide which programs deserve your confidence and are, therefore, worth the risk of installing and running on your home computer.

So then, how do you decide if a program is worth it? To decide if you should install and run a program on your home computer, follow these steps:

The Do test: What does the program do? You should be able to read a clear description of what the program does. This description could be on the web site where you can download it or on the CD-ROM you use to install it. You need to realize that that if the program was written with malicious intent, the author/intruder isn’t going to tell you that the program will harm your system. They will probably try to mislead you. So, learn what you can, but consider the source and consider whether you can trust that information.

The Changes test: What files are installed and what other changes are made on your system when you install and run the program? Again, to do this test, you may have to ask the author/intruder how their program changes your system. Consider the source.

The Author test: Who is the author? (Can you use email, telephone, letter, or some other means to contact them?) Once you get this information, use it to try to contact them to verify that the contact information works. Your interactions with them may give you more clues about the program and its potential effects on your computer and you.

The Learn test: Has anybody else used this program, and what can you learn from him or her? Try some Internet searches using your web browser. Somebody has probably used this program before you, so learn what you can before you install it.

If you can’t determine these things – the DCAL tests for short – about the program you’d like to install, then strongly consider whether it’s worth the risk. Only you can decide what’s best. Whatever you do, be prepared to rebuild your computer from scratch in case the program goes awry and destroys it. Task 5 - Make Backups of Important Files and Folders tells you how to make a copy of your important information should you need it.

Your anti-virus program prevents some of the problems caused by downloading and installing programs. However, you need to remember that there’s a lag between recognizing a virus and when your computer also knows about it. Even if that nifty program you’ve just downloaded doesn’t contain a virus, it may behave in an unexpected way. You should continue to exercise care and do your homework when downloading, installing, and running new programs.



Task 8 - Install and Use a Hardware Firewall

Complement your firewall program by installing a hardware firewall. Together, these two firewalls stand between your home computer and the Internet. This is another place where your money is well spent.

Please go to Task 4 - Install and Use a Firewall Program to learn more about firewalls. That section concentrates primarily on firewall programs, but much of the information applies to hardware firewalls as well. To find out what hardware firewall products are available, search the Internet with your web browser.


Task 9 - Install and Use a File Encryption Program and Access Controls

Let’s return to your living space and our original analogy. Think about your checkbook, your insurance policies, perhaps your birth certificate or passport, and other important documents you have at home. Where are they? They’re probably stored in a filing cabinet or a safe, either of which that can be or is routinely locked. Why do you store these important items in a locked container?

Without realizing it, you are satisfying one of the three components of information security – confidentiality. Confidentiality means keeping secrets secret. Only those who are supposed to see that information should have access to it. You are keeping information sensitive to you and others away from those who should not be able to get to it, for example a family member or an intruder. By the way, the other two components of information security are integrity (Has my information changed?) and availability (Can I get to my information whenever I need it?).

You further protect information confidentiality when you enforce it by using an access control device, namely the lock on your filing cabinet or safe. This device stands between the information and those seeking access, and it grants access to all who have the combination, the key, or whatever tool unlocks the container. When several layers of access control devices are used (called “defense in depth”) – you might also find that these containers are themselves in locked rooms. Would-be intruders must pass through several levels of protection before finally gaining access to the information they seek.

Now, think back to your home computer. The problem is to control access to files and folders. The access control device here is the access control list or ACL. ACLs define who can perform actions on a file or folder: reading and writing, for example. ACLs are equivalent to a locked filing cabinet for paper documents.

Different computer systems provide different types of ACLs. Some have fine-grained controls while others have virtually none. The key is to use all the controls that are available on your computer.

Frequently, vendors define ACLs that are overly permissive. This satisfies their need to ensure that access limitations don’t get in the way of using their systems. Your challenge is to tighten those ACLs so that they properly restrict access to only those who need access. This means that you need to modify the ACLs from the settings set by the vendor. We’ll talk more about how to do this shortly.

Returning to the home environment, do you remember a t
Pages: 1 ... 14 15 16 17 18 [19] 20 21 22 23 24 ... 27
Copyright © 2006-2023 TechnoWorldInc.com. All Rights Reserved. Privacy Policy | Disclaimer
Page created in 0.37 seconds with 23 queries.