IT Technologies

IT technologies and concepts explorer and analyser in the web.

  • RSS
  • Delicious
  • Digg
  • Facebook
  • Twitter
  • Linkedin

New IT Concepts

Share Your Comments

  • Virtualization - The new technology evelution

    Virtualization, in computing, is the creation of a virtual (rather than actual) version of something, such as a hardware platform, operating system, a storage device or network resources.....

  • http://ittechnologies.blogspot.com/2011/04/common-security-vulnerabilities-in-e.html

    Security Vulnerabilities in E-Commerce Systemin

    Most of these attacks have utilized vulnerabilities that have been published in reusable third-party components utilized by websites, such as shopping cart software and poor design of such websites. Other factor is user awareness of security vulnerabilities.

  • VPN - Virtual Private Network

    VPN is a technology which is making secure private network through the public accessible network infrastructure. Virtual Private Network represent by the short name VPN. ...

  • Saas - Cloud Computing

    The cloud computing : is based on this three concepts. IaaS (Infrastructure as a service), PaaS (Platform as a Service) and SaaS (Software as a Service).

Posted by Priyan Fernando - - 0 comments


Beware Your Self | Dont Open unknown attachements | Get backup your valueble data

Ransomware attacks dubbed as “WannaCry” started to spread around the world on the 12th May 2017. In these attacks, data is encrypted with the extension “.WCRY” added to the file names. According to the reports, this attack initiated through an SMBv2 remote code execution vulnerability in Microsoft Windows code-named “EternalBlue”. The exploit “EternalBlue” has been made available on the internet through the Shadowbrokers dump on 14th April 2017.

Affected Versions


  • Windows XP 
  • Windows Vista (all editions)
  • Windows Server 2008 (all editions)
  • Windows 7 (all editions)
  • Windows Server 2008 R2 (all editions)
  • Windows 8.1 (all editions)
  • Windows RT 8.1 (all editions)
  • Windows Server 2012 and Windows Server 2012 R2 (all editions)
  • Windows 10 (all editions)
  • Windows Server 2016 (all editions)
  • Some of the obsolete Microsoft Operating Systems are also vulnerable (Patches available through Microsoft Custom Support)

References :











[ Read More ]

Posted by Priyan Fernando - - 0 comments

STEP 1 - create the redirect_uri page

First, create a simple php script in your local web server, which has the Canvas URL (redirect_uri) you set creating your Facebook App in STEP 3. I set this URL to http://localhost/fb-tokens/. My local web server

Put the following code.


<?php
print_r($_GET);
?>
This code will just print the php $_GET array, in other words what Facebook will pass to you from query string.

STEP 2 - authorize your app (give permissions)

On your browser, give the following url, where client_id is App ID and redirect_uri is the URL defined as Canvas URL
The part &scope=manage_pages,publish_stream of this URL defines thw permissions you will assign to your app.
Read about Facebook permissions:
  • an introduction here.
  • about Facebook publish_stream permission here.
  • about Facebook manage_pages permission here.
The result will be
authorize your app to access your profile
(click the thumb for full image)
click OK
authorize your app to post to your friends on your behalf
(click the thumb for full image)
click OK
authorize your app to manage your Pages
(click the thumb for full image)
Get the code value
(click the thumb for full image)
You will get somenthing like this
1
2
3
4
5
Array
(
[code] =>
AQCnhrD8RSxJRmGJdYCfFD33hGPv84xa-xqXKD1-3i3qmsPjqHODEn1cROQkYv6LSKhKlPBxkPHD9gUs-9W0GSwDJVvarX70QiLAYmcLsGhN2u0Ib1OF512TvMljg8WLjx0FaAFCB1DHiTqYE-6ZNtWqtZpe4aIecOw949QNcWbZOf2BiCH_yECCNfamKdatV5Nv1Oa1IvIi_8_zVGc_cQqujVC_O2Apkzyj7M1cypoucGc02NzpAQv3yPqCnIuz5TWglcvhr2YNL7HAClLW0ydWgmq7FyfXOfrbFLoRjd-GRTevmTCffA2iV_A1i-itStY
)
After getting the code value, give the following url, where client_id is App ID and redirect_uri is the URL defined as Canvas URL, client_secret is App Secret and code is the code got.
(click the thumb for full image)
You will get the Access Token (!)
1
access_token=CAACYHYyWcnIBAJ1LwRLTERQNXJ4qRCqoTf2pgs1V2AiZCOreWAH0bY2UKaoyD3elfcEZAZAs6fZAEYPAZC5OlU6ZCg8Org32D13LiencxZA0PsNzkQPPuZCiZAukgMnqLXM0F2ZBlYZAnZB08qVwOo6DgiCJSlkoZCb9VVs0ARsleZBcduzTQKZBvIcvjLZBXXr5ye8R4FcZD&expires=5183831

STEP 3 - Access Tokens for your Facebook Pages (if any)

If you have any Facebook Pages (except your Personal Profile), you can get Access Tokens for them, using the following URL, where access_token is the Access Token you just got for your Personal Profile
The result will be the following JSON string
1
2
3
4
5
6
7
8
9
10
11
12
13
14
15
16
17
18
19
20
21
{
   "data": [
      {
         "category": "Website",
         "name": "pontikis.net",
         "access_token": "CAACYHYyWcnIBAMK1y2tqiRKx8bBXGFFzjdUamOlMZCBJrTSL8ic1z5sZBarBi3DbTh9mMUz3aiZCAQRNHvOmcMxLZC53FNtkrVCq8rZCLsyjbQVZAt8o7S6Rd1UT0LK7AkgyZAlu11MC9rWND8eZBiKjjiYjwmBMLWko7k6GGPZCREehKRNFCsyM1Ll7sFb1hXycZD",
         "perms": [
            "ADMINISTER",
            "EDIT_PROFILE",
            "CREATE_CONTENT",
            "MODERATE_CONTENT",
            "CREATE_ADS",
            "BASIC_ADMIN"
         ],
         "id": "466400200079875"
      }
   ],
   "paging": {
   }
}
Except of getting Access Token for your Fan Pages, the above step is useful to get your Fan Pages Facebook id. You will need it, when you try to post to your Fan Pages. However, this procedure is described independently (see below: How to Find your Facebook id)

STEP 4 - Check your Access Token

Facebook Access Tokens will expire in about an hour. Access Token obtained with the above procedure are long-lived Access Tokens and will expire after two months (60 days).
offline_access permission, used to prevent tokens expiration, was depreceted since 2012. Read more at https://developers.facebook.com/roadmap/offline-access-removal/.
Since offline access is deprecated you cannot create an access token which doesn’t expire. The best you can get is a long-lived Access Token (expires in 60 days).
So, it is very important to know your Access Token expiration time. Just use the URL
https://developers.facebook.com/tools/debug/access_token
For example, to check (debug) the Access Token obtained for this demo
(click the thumb for full image)
Notice that this Access Token will expire after 60 days.
I remind you that this app (Demo_auto_post_php) has been deleted, so the above URL will not give you the same results. The above screenshot is taken before app deletion.

Renew Access Token after expiration

Facebook long-lived Access Tokens will expire after about two months (60 days). In order your app to remain functioning, you (unfortunately) have to repeat "How to Get Facebook Access Token - STEP 2".

How to Find your Facebook id

The Facebook id of a Personal Profile of Fan Page or Business Page is public information, available using Facebook Graph API. Just use a URL like:
http://graph.facebook.com/username
For example:
To find my Facebook Personal Profile id, use:
http://graph.facebook.com/chr.pontikis
To find Facebook id of my Fan Page (the Fan Page of this blog), use:
http://graph.facebook.com/pontikis.net

You may also use some online tools like http://findfacebookid.com/
[ Read More ]

Posted by Priyan Fernando - - 0 comments

All the data in pendrive gets hiden or shows empty. This because of some virus infection.

The hidden files on your computer then one of the ways to see those files is to select the ‘Show Hidden Files’ option in Folder Options. But now most of the time pen drives are infected by viruses cant be recovered in this way.

Do following steps to recover and show your hidden files in flash drive.


Scan your pendrive using anti malware software and Antivirus.

1. Do not format the pendrive in hurry

2. Go to command prompt 
               Start ----> Run ----> type cmd click ok

3. type your pen--drive (drive) Example G: or g: etc

4. Then type attrib -h -r -s /s /d g:\*.*  
           Assumed pen drive letter is G

5. Wait for a few seconds (depends upon your system)

6. open your pendrive

7. all the data in your pendrive will be shown
[ Read More ]

Posted by Priyan Fernando - - 0 comments

Android allows for more customisation and has cheaper apps - there's so much you can do

IPhone users love to brag about their phones. They line up around the block and stand in line for hours when a new one is released. Yet, for many users, Android is clearly the superior platform. Yes, its Achilles' heel is a big one: security. Android's openness and large market share mean that it's a juicy target for attackers.
Yet, Android's openness also provides serious benefits. It allows for more customisation; its apps are usually cheaper and various handset manufacturers are able to offer significantly different form factors, such as the smartphone-tablet hybrid, the Samsung Galaxy Note.
With a little tweaking, you can speed up and optimise Android in ways that will make iPhone users' heads spin. Here are 10 ways to make Android faster, more productive and more secure than iPhone:

Make your Android faster
1. Get a better browser
One of the major benefits of using the popular browser Opera Mini is that its cloud engine compresses data by as much as 90%. It features tabbed browsing, support for widgets and the ability to set advanced privacy features, such as the ability to automatically clear passwords, cookies and browsing history.
The advantage for Android users: the ability to use Opera Mobile instead of Opera Mini. Opera Mobile supports Flash and 3D graphics, has an HTML 5 engine and has a device-side web rendering engine for higher fidelity browsing. You can set up the rendering engine to work locally when on a Wi-Fi network and default to the cloud-based rendering engine when on a 3G or 4G network to minimize expensive data usage (if you're not on an all-you-can-eat data plan). It also allows you to access your camera from your browser. Expect cool new widgets to start using this feature soon.
2. Install an Android optimiser
Apps like Android Booster and Android Assistant give you the power to automatically kill apps that run in the background, gobbling up battery life and draining CPU. You can set a monthly data limit and monitor exactly how much data you've downloaded over 3G and 4G networks, and you can purge your cache, history, etc.
3. Conserve your battery
Nothing slows you down more than a dead battery. One advantage Android phones have over iPhones is that you can swap out your battery. But proper power management can save you from that trouble. Apps like JuiceDefender and Battery Stretch help you regulate your power use.
With more than 7 million downloads, JuiceDefender is the most popular of these apps. It offers three different profiles: "Balanced," "Aggressive" or "Extreme."
The Balanced setting is the default and requires no configuration on your part. If you bump it up to "Aggressive," the app will automatically disable data connections when the battery is low. If you're really worried about a dead battery, the "Extreme" setting disables data connections by default. You can turn them back on manually, and you are able to whitelist apps that you want to have connectivity.

Make your Android more productive

4. Dig deeper into which apps hog data
If you constantly go over your data limits, an app like Android Assistant may not be enough. Sure, you will be alerted when you are nearing your limit, but what exactly is causing the problem?
Is it Facebook, podcasting software, the MLB Gameday app? Who knows?
Well, with Onavo you can find out. The main menu displays statistics on your data use over the prior month, and it fingers the apps hogging the most bandwidth. Many of these are obvious, such as any video or streaming app, but I was surprised to see how much data Google Calendar used with its constant synching, and after consulting with Onavo, I decided to synch less frequently
You'll also discover the apps that go online even when they haven't been launched. Don't be surprised to see that many games do this, so if you haven't played them in a while, you might want to get rid of them. Otherwise, those free Android games may end up costing you money if they push you over your data limit.
For international travelers, Onavo can help you avoid (or limit) costly data roaming charges.
And Onavo is actually an app that has more octane on iPhone, for which it will also compress data. (On Android, this feature is currently limited to Ice Cream Sandwich users.)
5. Tether your phone
So you've signed up for an expensive all-you-can-eat data plan, yet when you try to tether your laptop to your phone to use that 4G connection you paid a premium for, you are stymied. Carriers will try to charge you $20 or $30 a month for tethering privileges, meaning they're trying to charge you twice for network access that you've really already purchased.
For most people, this is more of a nuisance than anything. Wi-Fi is available everywhere, but if you are using your laptop for business, wouldn't it be smarter to stay on a 4G network rather than connecting to an open Wi-Fi one?
On iPhone, tethering is a no-go. On Android, tethering may technically violate your user license, but you can do it, and you no longer need to root your phone. Apps like Clockworkmod's Tether will have you up and running in a few minutes.
Tether isn't a free app, but at $4.99 (approximately £3.10), one stay in a hotel that still charges for Wi-Fi will make this app a no-brainer.
6. Pick your own keyboard
Siri has been getting all kinds of press lately, and, sure, it can be amusing to try to get Siri to say off-color things. Yet, when I'm using data on my phone, I prefer text-based input.
For years, one of the main reasons I've considered iPhone inferior is its hostility to apps like Swype. On Android, you have the ability to choose your own keyboard. (Well, iPhone users can jailbreak their phones to get Swype, but that fact reinforces my point.)
Many Android phones come with Swype pre-loaded, but it's not usually the default keyboard. Just press any text entry area for a few seconds and a menu will pop up. Select "Input method" and then choose "Swype." That's it.
I used to avoid texting like the plague because I hated entering data on my phone. That all changed with Swype, which lets you drag your finger across the screen from letter to letter. Its predictive engine figures out what word you are going for (it gets better the more you use it), and you just keep chugging along.
I can't Swype as fast as I type, but I'm a fast typist. Scroll around the Inter-webs a bit, and you'll find plenty of people claiming to achieve 40 or 50 words per minute with Swype. And now that Swype has been acquired by Nuance, you should have even more input options coming your way soon.

Make your phone more secure

7. Turn on screen lock, but don't use a pattern
The easiest screen unlocking method is to trace a pattern on your screen. It's easier and more convenient than entering a PIN or password. However, if you lose your phone or it is stolen, you better hope you just cleaned your screen.
The oil on your finger will leave a distinct pattern on your screen. Unless you wipe it down religiously after each unlocking, the pattern lock will only deter the stupidest criminals.
8. Install anti-virus software
Why have you not done this already? Malware writers are flocking to Android. We're seeing much of what happened in the desktop world being repeated with smartphones. Android is more open, has a larger market share and is a juicer target.
IPhone is a closed ecosystem and may eventually, like Mac, benefit from security through obscurity (though I doubt iPhone will ever shrink to Mac-like numbers). For iPhone users, this is good-news, bad-news scenario. Yes, Apple does more to lock down apps and prevent third-party software from exploiting key system resources, but you are trusting one company for your security. If Apple screws up, all iPhone users are in trouble. Exhibit A: the Path privacy fiasco.
Android, on the other hand, may be less secure due to its openness, but it's welcoming to third-party security tools. There's no excuse not to have anti-virus software on your phone. There are plenty of free options, such as Lookout, and with a simple download, you can significantly reduce your risks. Most of these antivirus apps also allow you to remotely lock and wipe your phone if it is lost or stolen, and some even allow you to set off an obnoxious alarm, which will either help you find the device if its tucked behind a couch cushion or convince a thief to toss it.
Of course, we'd like to see handset OEMs and the carriers bake antivirus into their various Android versions. It's a simple step that would benefit them, carriers especially, saving bandwidth, protecting against fraudulent charges and so on. We would also like to see carriers adopt network-based mobile malware scanning, such as the solution from Kindsight Security Labs.
9. Stay away from App Stores you do not know
Google has taken steps to tame the Wild West that was its Market. It now has a "Bouncer" that scans the Market for malware, and despite what Apple apologists may claim, Android was designed from the get-go to make malware less disruptive on phones than it is on PCs by sandboxing apps and forcing apps to ask for permissions (yes, the same permissions that everyone just ignores, but at least they tried).
The trouble is that Android users can download apps anywhere. Don't be lured into doing this. If you aren't using Android Market, make sure you are in a store you know and trust, such as Amazon. Most Android models come with the default setting that doesn't allow you to download apps from "unknown sources." If you've fallen for social-engineering attacks in the past, it's best to leave that box checked.

When you download an app, try to get into the practice of checking permissions. If a game wants to send out text messages, for instance, that should be a red flag.

10. Stay away from mobile payments
Mobile payments are starting to take off, especially in Europe and Asia, and consumers should be wary. The problem with mobile payments is that they are often simply added to your mobile phone bill, and if you find a suspicious charge, your liability will vary from carrier to carrier.

In contrast, if a hacker gets your credit card number and goes on a spending spree, your maximum liability for credit card fraud is £50. In other words, credit card fraud is not your problem, it's the bank's. Until you have that level of protection for mobile payments, it's probably smarter and safer to stick with the credit card.

Source : http://howto.techworld.com

Link : http://howto.techworld.com/operating-systems/3357784/how-to-make-your-android-more-productive-more-secure-and-faster-than-iphone/?intcmp=ros-md-hwt


[ Read More ]

Posted by Priyan Fernando - - 0 comments


STEP BY STEP GUIDE FOR SAP INSTALLATION - VIDEO

The demo shows how an installation is performed with the SAP standard installation tool, SAPinst (SAP installation).



[ Read More ]

Posted by Priyan Fernando - - 0 comments


For SAP for Oracle, use the BRBACKUP program from the SAP command line to back up data. The BRBACKUP program can back up control files, data files within one or more table spaces, and (if necessary) online redo log files. BRBACKUP can back up all of these file types with the database either online or offline. Also, BRBACKUP saves the profiles and logs relevant to the backup.

[ Read More ]

Posted by Priyan Fernando - - 0 comments

Virtualization offers huge benefits in flexibility, cost-effectiveness and eco-friendliness. However, some design choices need to be made towards deploying Active Directory Domain Controllers in virtual environments. Some of these choices are general choices, but some of them apply to Hyper-V enabled environments specifically.
When deploying an Active Directory environment, either for test or production purposes, either virtual or physical, be sure to deploy at least two Domain Controllers per Active Directory domain, whenever possible. When either Domain Controller fails you don't lose your Active Directory information and any applications, services and users depending on it can continue to operate, unless specifically pointed to.
   
[ Read More ]