What is Port Scanning


Port Scanning

Port scanning is a way of figuring out which ports are listening and accepting connections. Because most services run on standard, documented ports, this information can be used to determine which services are running. The simplest form of port scanning involves trying to open TCP connections to every possible port on the target system. While this is effective, it's also noisy and detectable. Also, when connections are established, services will normally log the IP address. To avoid this, several clever techniques have been invented to avoid detection.

A SYN scan is also sometimes called a half-open scan. This is because it doesn't actually open a full TCP connection. Recall the TCP/IP handshake: When a full connection is made, first a SYN packet is sent, then a SYN/ACK packet is sent back, and finally an ACK packet is returned to complete the handshake and open the connection. A SYN scan doesn't complete the handshake, so a full connection is never opened. Instead, only the initial SYN packet is sent, and the response is examined. If a SYN/ACK packet is received in response, that port must be accepting connections. This is recorded, and a RST packet is sent to tear down the connection to prevent the service from accidentally being DoSed.

X-mas, and Null Scans

In response to SYN scanning, new tools to detect and log half-open connections were created. So, yet another collection of techniques for stealth port scanning evolved: FIN, X-mas, and Null scans. These all involve sending a nonsensical packet to every port on the target system. If a port is listening, these packets just get ignored. However, if the port is closed and the implementation follows protocol (RFC 793), a RST packet will be sent. This difference can be used to detect which ports are accepting connections, without actually opening any connections.

The FIN scan sends a FIN packet, the X-mas scan sends a packet with FIN, URG, and PUSH turned on (named because the flags are lit up like a Christmas tree), and the Null scan sends a packet with no TCP flags set. While these types of scans are stealthier, they can also be unreliable. For instance, Microsoft's implementation of TCP doesn't send RST packets like it should, making this form of scanning ineffective.

Another way to avoid detection is to hide among several decoys. This technique simply spoofs connections from various decoy IP addresses in between each real port-scanning connection. The responses from the spoofed connections aren't needed, because they are simply misleads. However the spoofed decoy addresses must use real IP addresses of live hosts; otherwise the target may be accidentally be SYN flooded.



Linux-Essential Root Subdirectories

  • bin Contains binary programs also known as an executables, which are programs that are ready to run. Most of the basic Unix commands such as ls and cp are in /bin. However, some of the files in /bin are not in binary format because shell scripts perform the tasks of binaries in modern systems.
  • dev Contains device files. 
  • etc The core system configuration directory (pronounced EHT-cee). User password, boot, device, networking, and other setup files are here. Many items in /etc are specific to the particular hardware on the machine — for example, the /etc/X11 directory contains the graphics card configuration.
  • home Holds personal directories for normal users on the system. Most Unix installations conform to this standard.
  • lib An abbreviation for library. In Linux, this directory holds library files containing code that executables can use. There are two types of libraries: static and shared. The /lib directory should contain only shared libraries, but other lib directories such as /usr/lib contain both varieties, as well as other auxiliary files.
  • proc Provides system statistics through a directory-and-file interface that you can browse with standard Unix tools. Much of the /proc subdirectory structure on Linux is unique, but many other Unix variants have similar features.
  • sbin The place to find system executables. Programs in sbin directories pertain to system management, so regular users usually do not have sbin components in their command paths. Many of the utilities don't work for normal users.
  • tmp The place to put smaller temporary files that you don't care much about. Any user may read to and write from /tmp, but they may not have permission to access another user's files there. Some programs use this directory as a workspace. If something is extremely important, don't put it in /tmp. Most distributions clear /tmp when the machine boots, and some even remove its old files periodically. Don't fill /tmp either, because its space is usually shared with something critical (like the rest of /, for example).
  • usr Pronounced as "user," but this subdirectory does not contain user files (there have been no user files in /usr on Unix systems long before Linux existed). Instead, /usr is a large directory hierarchy that looks a little like the root. The bulk of the Linux system resides in /usr. Many of the directory names in /usr are the same as in the root and hold the same type of files; /usr/bin and /usr/lib are two examples. The primary reason that the root does not contain the complete system is to keep space requirements low. 
  • var The "variable" subdirectory, where programs record runtime information. System logging, user tracking, caches, and other files that system programs create and tend all go into /var. There is a /var/tmp similar to /tmp, but the system doesn't wipe it clean on boot.

Facebook


Facebook

Facebook
is a social utility that connects people with friends and others who work,
 study and live around them. People use Facebook to keep up with friends.
Boosting the effectiveness of your Facebook publishing strategy is easy
 if you know the answers to these seven questions.



 Facebook brands must finally resolve their fate with Hispanic consumers.

Facebook agreed to pay some $16 billion for an app called WhatsApp this week,
 leading to widespread confusion and surprise among analysts,

Samsung launch a 13.3-inch tablet


Samsung launch a 13.3-inch tablet

South Korean electronics giant Samsung is reportedly planning to launch its largest 13.3-inch tablet along with other two tablets.a couple of weeks' break and the Galaxy S5 is ready for the next round. And it's only getting harder for the Samsung flagship - who would've thought we'd say this ahead of a head-to-head involving a Chinese smartphone.





The Samsung Galaxy S5 Active doesn't exist officially but there are traces of it all over the place, including Samsung's own web site. The support page for Scandinavian countries (Norway, Sweden, Finland and Denmark) have a placeholder page for the Samsung SM-G850F. From previous leaks we know the Galaxy S5 Active will have the same base specs as the regular Galaxy S5, which carries an IP67 certification (matching the Galaxy S4 Active). The new Active model might be be tougher, however, with a MIL-STD-810G rating. This rating guarantees protection from salt water (IP only covers fresh water), impacts, thermal shock and other kinds of potential damage.


The unlocked version of the Samsung Galaxy S5 Prime is said to retail for KRW900,000, which is roughly equivalent to €640 or $880. This is roughly the same price tag as the one the Galaxy S5 carried at launch, although the current flagship has already received a price cut and can be found for just under €550 in many markets. It's not the first time we are hearing of June release for the Galaxy S5 Prime, but it's still hard to believe that Samsung will be ready to release another flagship in just a month.

Samsung Galaxy S5

Samsung announced that they wouldn't be bringing Android KitKat to their aging Samsung Galaxy S3 smartphone, but that didn't stop the XDA and Android hacking community from porting it over anyway. As long as you don't have an issue with rooting your device and following the instructions on the forum (posted in the source link below), then you'll be able to enjoy KitKat on your S3.



 However, as with most custom ROMs, the KitKat ROM for the S3 isn't perfect. There are still some stability and usability issues, and not all features of the phone may function properly. Users may experience some glitches as well. However, if nearly all previous custom ROMs are any indication, the KitKat S3 ROM will get better with time as the community continues to work out the kinks. The community should be a large one as well, considering that the Galaxy S3 is an extremely popular handset and its user base was livid when they discovered that Samsung wouldn't be porting over Google's latest iteration of its mobile OS to their beloved device. It's interesting to note that the KitKat ROM file is too large to fit onto the Galaxy S3's internal storage; Samsung's pre-loaded bloatware is primarily to blame. Once it was removed, the hackers were able to successfully port it without any storage space issues.

Google-Twitter-Facebook Likes-SEO Technique


SEO Technique

Social stuff is fantastic for your site, Google is relying a lot on
 social interaction with websites.Make sure you have each or
 one of these buttons for your website, all buttons can be added
easily to your site.

You will need a Twitter account for your site to get the followers.

Link Pyramid

This is a technique most will already know, I still like
 to use it because I noticed some fairly well known SEO
 companies still using Link Pyramid system to get your
 sites ranked.

The idea is to build backlinks to your backlinks, you 
can do this manually but first you need to have a list
 of backlinks, for example one of Angela’s Packets.

High PR backlinks are what you want pointing at your site. 
To find them is a bit of a hassle but you can use Google, 
and a Firefox Tool called SEO quake.

First you will just do a quick search in Google.
site:.com inurl:blog "post a comment" "keyword"
site:.com inurl:forum "post a comment" "keyword"
One will find blogs, and one will find Forums.

Wiki Links

If you are not sure what a Wiki is, these are sites that users
 can  add content to, and modify or delete current content.
This has enabled backlinks to be left on these high PR sites.

Squidoo
A Squidoo Lens is a great way to get a good backlink,
 and even some extra traffic if it is written well.
You can do this your self.

PAD Backlinks
PAD = Portable Application Description
This means software authors can easily leave a 
description about their application.

Blog Comments
Google still seems to like Blog Comments so I will
 keep doing them until I see otherwise.

Video
Videos are easy to rank in Google, in fast they shoot
 up very fast through the rankings.


New Content
Content is King for your website, a well written article
with SEO can rank high very quickly.

Tabah - 'Heropanti'

HEROPANTI has some chartbusting 

numbers like Whistle Baja and Raat Bhar



simple seo Tip website


Simple Seo Tips

key phrases within the text of your web pages. Directory One
 will rewrite your web pages subject to your approval to
 include the main key phrases you want your site to rank for.

Heading Tags
Bold headings, which are called H1, H2, and H3 tags, appear
 directly above paragraphs on a web page todescribe what
 the paragraph is about. These tags are important to both
 search engines and website visitorsfor exactly the same
 reason. People hardly ever read every word of a web
 page. So when your pages have heading tags, visitors
 are able to quickly scan your pages and easily
tell what they are about.

Anchor Text Links
These are links within your content based on a
 single key phrase that links directly to another page on your
site that is also about that specific keyword or phrase.

Alt Tags
An alt tag is the text you see when you mouse-over a
 photo or graphic on a website. Alt tags are best when
they contain a key phrase that describes in words
 what the picture is about.

Google Analytics
We generate and send Google Analytics reports to
 you by email that tell you exactly what keywords your
visitors searched for and even which search engine
 they used to find your site.

Html Sitemap
We generate and add two sitemaps to your website.
The first, called an html sitemap, appears as a
 web pageon your site. The html sitemap is
 helpful to both visitors and search engines when
 navigating through your website.

XML Sitemap
The second is called an xml sitemap and it is a file
 that lists URLs for a site along with additional metadata
about each URL when it was last updated, how
often it usually changes, and how important it is,
 relative toother URLs in the site so that search engines
 can more intelligently crawl the site.seo analysis tool

Website Redesign
Directory One will redesign and rebuild your current
 website to include proper html coding, cross browser
compatibility, CSS architecture, search engine friendly
 navigation and image optimization.

CSS Architecture
The way your site looks, for example font styles, colors
 and sizes will be separated from your content. By creating
 what are called include files; CSS enables much greater
efficiency should website changes berequired in the future.
 In other words, when we change something once,
it will automatically change everywhere.

Site Structure
The file names that appear in the address field of your
web browser will contain your primary key phrase for
that page separated by dashes.seo marketing strategies tips

Jacqueline Fernandez


Jacqueline-Fernandez

Jacqueline Fernandez born 11 August 1985 is an India-based
 Sri Lankan/Malaysian/Canadan film actress, former model,
 and the winner of the Miss Sri Lanka Universe
Pins about Bollywood Fashion








Bollywood Actress Mandira Bedi

Bollywood Actress

Mandira Bedi the Hot Sexy and Bold Actress. Mandira Bedi
with Gul Panag Sexy Looks. Mandira Hot and Bold
Shop to buy Designer Mandira Bedi Sarees.
 Buy Colorful Sarees from Fashion Designer,
 Anchor and Actress Mandira Bedi Here.