Loading
Showing posts with label Windows. Show all posts
Showing posts with label Windows. Show all posts

Friday, November 11, 2011

Install Windows dengan USB DISK


USB flashdisk saat ini banyak dipakai sebagai pengganti cd/dvd atau media simpan lainnya karena gampang dibawa dan mudah digunakan. Apalagi harganya yang terjangkau, membuat flashdisk banyak digunakan untuk keperluan menyimpan data dan file. Bahkan USB flashdisk tidak hanya difungsikan sebagai media simpan file,  sekarang flashdisk mulai banyak digunakan untuk install windows dan linux melalui flashdisk. Artinya untuk menginstall windows xp/vista atau windows7 tidak harus memakai cd/dvd windows tapi cukup dengan flashdisk bootable yang berisi file-file installasi windows. Untuk membuat flashdisk windows xp yang bootable tidak bisa dengan kopi paste isi cd windows lalu dimasukkan kedalam flashdisk, tetapi membutuhkan software khusus seperti Flashboot yang akan membuat USBflashdisc menjadi bootable sekaligus mengkopikan file installasi windows keadalam flashdisk. Saya contohkan disini adalah cara membuat windows xp usb dengan memakai flashdisk 1 gb, Sebelumnya siapkan dulu software berikut ini:
Bila kedua software sudah didownload, lanjutkan langkah-langkah dibawah ini:
  1. Siapkan cd installasi windows xp, atau file iso-nya jika belum punya file image(iso) silahkan lihat artikel membuat iso file dari cd/dvd windows xp.
  2. Masukkan/ Tancapkan flashdisk ke komputer, ingat !! sebelumnya backup data penting didalam flashdisk, lalu jalankan program HPUSBDisk.exe untuk memformat flashdisc. Lalu formatlah flashdisk dengan software HPUSBDisk.exe. Pilih file system FAT32 untuk format flashdisk.
  3. Jalankan Flashboot 2.0b portable.exe.
  4. Setelah program terbuka, klik “Next
  5. Muncul pilihan FlashBoot Main Menu, lalu klik menu CD -> USBFlashBoot Main Menu
  6. Kemudian pilih drive cd/dvroom yang sudah berisi Windows XP CD, atau pilih opsi “Image file” Jika ingin mengambil dari file iso yang sudah dibuat dengan program iso maker lalu klikNext.Pilih sumber file
  7. Setelah itu keluar pilihan skenario, pilih Convert Windows XP/2000 Installation CD lalu klikNext lagi.Convert Windos XP/2000 Installation CD
  8. Kemudian pilih drive Flashdisk, Selanjutnya klik Next lagi.
  9. Masukkan pada Volume label terserah, dan file system pilih FAT32, klik Next.Volume label
  10. Lalu klik tombol “Format Now” untuk memulai proses pembuatan Windows XP Flashdisk.
  11. Tunggu proses format dan copy file Windows sampai selesai, sampai muncul Complete successfully.Click OK to exit.
Setelah berhasil membuat Windows XP USB sekarang sudah siap digunakan untuk install komputer lewat USB, Lanjut ke tahap Step by step install Windows XP dari flashdisk tapi sebelumnya set bios PC agar boot dari USB Flashdisk. Untuk memastikan atau sekedar mencoba gunakan aja MobaliveCD untuk menguji Flazhdick. Selamat mencoba semoga bermanfaat.

Thursday, January 7, 2010

Firewall

A firewall is a part of a computer system or network that is designed to block unauthorized access while permitting authorized communications. It is a device or set of devices configured to permit, deny, encrypt, decrypt, or proxy all (in and out) computer traffic between different security domains based upon a set of rules and other criteria.

Firewalls can be implemented in either hardware or software, or a combination of both. Firewalls are frequently used to prevent unauthorized Internet users from accessing private networks connected to the Internet, especially intranets. All messages entering or leaving the intranet pass through the firewall, which examines each message and blocks those that do not meet the specified security criteria.

There are several types of firewall techniques:
Packet filter: Packet filtering inspects each packet passing through the network and accepts or rejects it based on user-defined rules. Although difficult to configure, it is fairly effective and mostly transparent to its users. In addition, it is susceptible to IP spoofing.
Application gateway: Applies security mechanisms to specific applications, such as FTP and Telnet servers. This is very effective, but can impose a performance degradation.
Circuit-level gateway: Applies security mechanisms when a TCP or UDP connection is established. Once the connection has been made, packets can flow between the hosts without further checking.
Proxy server: Intercepts all messages entering and leaving the network. The proxy server effectively hides the true network addresses.

Function
A firewall is a dedicated appliance, or software running on a computer, which inspects network traffic passing through it, and denies or permits passage based on a set of rules.

It is a software or hardware that is normally placed between a protected network and an unprotected network and acts like a gate to protect assets to ensure that nothing private goes out and nothing malicious comes in.

A firewall's basic task is to regulate some of the flow of traffic between computer networks of different trust levels. Typical examples are the Internet which is a zone with no trust and an internal network which is a zone of higher trust. A zone with an intermediate trust level, situated between the Internet and a trusted internal network, is often referred to as a "perimeter network" or Demilitarized zone (DMZ).

A firewall's function within a network is similar to physical firewalls with fire doors in building construction. In the former case, it is used to prevent network intrusion to the private network. In the latter case, it is intended to contain and delay structural fire from spreading to adjacent structures.

Without proper configuration, a firewall can often become worthless. Standard security practices dictate a "default-deny" firewall ruleset, in which the only network connections which are allowed are the ones that have been explicitly allowed. Unfortunately, such a configuration requires detailed understanding of the network applications and endpoints required for the organization's day-to-day operation. Many businesses lack such understanding, and therefore implement a "default-allow" ruleset, in which all traffic is allowed unless it has been specifically blocked. This configuration makes inadvertent network connections and system compromise much more likely.

History
The term "firewall" originally meant a wall to confine a fire or potential fire within a building, cf. firewall (construction). Later uses refer to similar structures, such as the metal sheet separating the engine compartment of a vehicle or aircraft from the passenger compartment.

Firewall technology emerged in the late 1980s when the Internet was a fairly new technology in terms of its global use and connectivity. The predecessors to firewalls for network security were the routers used in the late 1980s to separate networks from one another.[1] The view of the Internet as a relatively small community of compatible users who valued openness for sharing and collaboration was ended by a number of major internet security breaches which occurred in the late 1980s
Clifford Stoll's discovery of German spies tampering with his system
Bill Cheswick's "Evening with Berferd" 1992 in which he set up a simple electronic jail to observe an attacker
In 1988 an employee at the NASA Ames Research Center in California sent a memo by email to his colleagues  that read,“ We are currently under attack from an Internet VIRUS! It has hit Berkeley, UC San Diego, Lawrence Livermore, Stanford, and NASA Ames. ”

The Morris Worm spread itself through multiple vulnerabilities in the machines of the time. Although it was not malicious in intent, the Morris Worm was the first large scale attack on Internet security; the online community was neither expecting an attack nor prepared to deal with one.

First generation - Packet filters

The first paper published on firewall technology was in 1988, when engineers from Digital Equipment Corporation (DEC) developed filter systems known as packet filter firewalls. This fairly basic system was the first generation of what became a highly evolved and technical internet security feature. At AT&T Bell Labs, Bill Cheswick and Steve Bellovin were continuing their research in packet filtering and developed a working model for their own company based upon their original first generation architecture.

Packet filters act by inspecting the "packets" which represent the basic unit of data transfer between computers on the Internet. If a packet matches the packet filter's set of rules, the packet filter will drop (silently discard) the packet, or reject it (discard it, and send "error responses" to the source).

This type of packet filtering pays no attention to whether a packet is part of an existing stream of traffic (it stores no information on connection "state"). Instead, it filters each packet based only on information contained in the packet itself (most commonly using a combination of the packet's source and destination address, its protocol, and, for TCP and UDP traffic, the port number).

TCP and UDP protocols comprise most communication over the Internet, and because TCP and UDP traffic by convention uses well known ports for particular types of traffic, a "stateless" packet filter can distinguish between, and thus control, those types of traffic (such as web browsing, remote printing, email transmission, file transfer), unless the machines on each side of the packet filter are both using the same non-standard ports.

Packet filtering firewalls work on the first three layers of OSI reference model which means all the work done between the network and physical layers. When a packet originates from the sender and filters through a firewall the device checks for matches to any of the packet filtering rules that are configured in the firewall and drops or rejects the packet accordingly. When the packet passes through firewall it filters the packet on a protocol/port number basis. For example if a rule in the firewall exists to block telnet access then the firewall will block IP protocol for port number 23.

Second generation - Application layer
Main article: Application layer firewall

The key benefit of application layer filtering is that it can "understand" certain applications and protocols (such as File Transfer Protocol, DNS, or web browsing), and it can detect whether an unwanted protocol is being sneaked through on a non-standard port or whether a protocol is being abused in any harmful way.

An application firewall is much more secure and reliable when comparing to packet filter firewall because it works on all seven layers of the OSI reference model which means application to physical Layer. This is similar to a packet filter firewall but here we can also filter information on Content Basis. The best example of application firewall is ISA (Internet Security and Acceleration) server. An application firewall can filter Higher Layer Protocols such as FTP, TELNET, DNS, DHCP, HTTP, TCP, UDP and TFTP. For example if an organization wants to block all the information related to "spam" word then we can enable content filtering on the firewall to block that particular word. an application firewall is a software based firewall thus it is much slower then statefull firewall.

Third generation - "stateful" filters
Main article: Stateful firewall

From 1989-1990 three colleagues from AT&T Bell Laboratories, Dave Presetto, Janardan Sharma, and Kshitij Nigam developed the third generation of firewalls, calling them circuit level firewalls.

Third generation firewalls in addition regard placement of each individual packet within the packet series. This technology is generally referred to as a stateful packet inspection as it maintains records of all connections passing through the firewall and is able to determine whether a packet is either the start of a new connection, a part of an existing connection, or is an invalid packet. Though there is still a set of static rules in such a firewall, the state of a connection can in itself be one of the criteria which trigger specific rules.

This type of firewall can help prevent attacks which exploit existing connections, or certain Denial-of-service attacks.

Circuit level firewalls are highly in demand because of they are secure also is a hardware based firewall and much faster then application firewall which is software based. It has all the features of application firewall plus support for content and port filtering. It operates on all the seven layer's of OSI reference model application to physical. In terms of performance stateful Firewall is the best option when comparing to application firewall. Both application and stateful firewall have VPN (Virtual Private Network) service capabilities. An example of a stateful firewall is the Cisco Pix Firewall.

Subsequent developments

In 1992, Bob Braden and Annette DeSchon at the University of Southern California (USC) were refining the concept of a firewall. The product known as "Visas" was the first system to have a visual integration interface with colours and icons, which could be easily implemented to and accessed on a computer operating system such as Microsoft's Windows or Apple's MacOS. In 1994 an Israeli company called Check Point Software Technologies built this into readily available software known as FireWall-1.

The existing deep packet inspection functionality of modern firewalls can be shared by Intrusion-prevention systems (IPS).

Currently, the Middlebox Communication Working Group of the Internet Engineering Task Force (IETF) is working on standardizing protocols for managing firewalls and other middleboxes.

Another axis of development is about integrating identity of users into Firewall rules. Many firewalls provide such features by binding user identities to IP or MAC addresses, which is very approximate and can be easily turned around. The NuFW firewall provides real identity based firewalling, by requesting user's signature for each connection.

Types

There are several classifications of firewalls depending on where the communication is taking place, where the communication is intercepted and the state that is being traced.

Network layer and packet filters

Network layer firewalls, also called packet filters, operate at a relatively low level of the TCP/IP protocol stack, not allowing packets to pass through the firewall unless they match the established rule set. The firewall administrator may define the rules; or default rules may apply. The term "packet filter" originated in the context of BSD operating systems.

Network layer firewalls generally fall into two sub-categories, stateful and stateless. Stateful firewalls maintain context about active sessions, and use that "state information" to speed packet processing. Any existing network connection can be described by several properties, including source and destination IP address, UDP or TCP ports, and the current stage of the connection's lifetime (including session initiation, handshaking, data transfer, or completion connection). If a packet does not match an existing connection, it will be evaluated according to the ruleset for new connections. If a packet matches an existing connection based on comparison with the firewall's state table, it will be allowed to pass without further processing.

Stateless firewalls require less memory, and can be faster for simple filters that require less time to filter than to look up a session. They may also be necessary for filtering stateless network protocols that have no concept of a session. However, they cannot make more complex decisions based on what stage communications between hosts have reached.

Modern firewalls can filter traffic based on many packet attributes like source IP address, source port, destination IP address or port, destination service like WWW or FTP. They can filter based on protocols, TTL values, netblock of originator, of the source, and many other attributes.

Commonly used packet filters on various versions of Unix are ipf (various), ipfw (FreeBSD/Mac OS X), pf (OpenBSD, and all other BSDs), iptables/ipchains (Linux).

Application-layer
Main article: Application layer firewall

Application-layer firewalls work on the application level of the TCP/IP stack (i.e., all browser traffic, or all telnet or ftp traffic), and may intercept all packets traveling to or from an application. They block other packets (usually dropping them without acknowledgment to the sender). In principle, application firewalls can prevent all unwanted outside traffic from reaching protected machines.

On inspecting all packets for improper content, firewalls can restrict or prevent outright the spread of networked computer worms and trojans. The additional inspection criteria can add extra latency to the forwarding of packets to their destination.

Proxies
Main article: Proxy server

A proxy device (running either on dedicated hardware or as software on a general-purpose machine) may act as a firewall by responding to input packets (connection requests, for example) in the manner of an application, whilst blocking other packets.

Proxies make tampering with an internal system from the external network more difficult and misuse of one internal system would not necessarily cause a security breach exploitable from outside the firewall (as long as the application proxy remains intact and properly configured). Conversely, intruders may hijack a publicly-reachable system and use it as a proxy for their own purposes; the proxy then masquerades as that system to other internal machines. While use of internal address spaces enhances security, crackers may still employ methods such as IP spoofing to attempt to pass packets to a target network.

Network address translation
Main article: Network address translation

Firewalls often have network address translation (NAT) functionality, and the hosts protected behind a firewall commonly have addresses in the "private address range", as defined in RFC 1918. Firewalls often have such functionality to hide the true address of protected hosts. Originally, the NAT function was developed to address the limited number of IPv4 routable addresses that could be used or assigned to companies or individuals as well as reduce both the amount and therefore cost of obtaining enough public addresses for every computer in an organization. Hiding the addresses of protected devices has become an increasingly important defense against network reconnaissance.

COMPUTER MANAGER V.2.17

If you're connected to a LAN, the ordinary file managers wont help you a bit. When working with tens of computers the operations you need to do are so many and so complex that a window split in two is not enough. COMPUTER MANAGER is more than a file manager for LAN users.

Select files and subdirectories from different directories/computers (!), make your computer a http, ftp server, powerfull search engine(!), lan chat, file splitter, automatic resume of file copying to/from network when it becomes unavailable(!), show/hide drives/partitions, shows ip and mac address of other lan computers, ftp explorer, list of known computers(used when having network crashes)(!), automatic update when a newer version is available(!).........A must for LAN users.

TERMS AND CONDITIONS

This freeware software is released for non-comercial use with no warranties of any kind.

Though this software has been tested i am not responsible for any damage done to your computer system, loss of data, loss of profits, or any other direct or indirect damage that results from the use of this software.

Use it on your own risk and don't modify(alter) it.

How to dual-boot Vista with XP (with XP installed first) - step-by-step guide with screenshots



Want to install Vista on your PC but don't want to get rid of XP just yet? Here's how to install it so you can dual-boot between them, in an easy-to-follow, step-by-step guide

Scenario: You want to install Vista on your PC alongside your XP installation, on the same drive. You have already installed XP. (If you installed Vista first, see our other tutorial on How to dual-boot Vista and XP - with Vista installed first.)

Tutorial Summary: We're going to shrink the Windows XP partition on the hard disk and create enough space for an installation of Vista. There are two easy methods of doing this - using the GPartEd Live CD and the DISKPART utility on the Vista DVD. On some systems, depending on the primary storage controller, We'll then install Vista and use the EasyBCD utility to modify Vista's bootloader to get XP loading properly.

Get Started - Using GParted

We assume that before you start this tutorial, you have backed up the drive (partitions and data) that will host the two operating systems.

Your first step will be to modify the Windows XP system partition to make space for Vista using GParted

The GParted Live CD ISO is available here – burn it to CD and boot the system from the disc. The version we used was 0.3.7-7.

When you boot from the GParted LiveCD, depending on your system, you should just need to select the auto-configuration boot option

During boot, press Enter twice when prompted to select the keymap and language settings.

When the main GUI loads, right-click on the main Windows XP NTFS partition (depending on your setup, probably /dev/hda1) and select Resize/Move.

Use the slider to reduce the partition size and free up enough room to install Vista (at least 10GB) and click Resize/Move

The changes haven’t actually been made, they’ve just been scheduled to run. To commit the changes and resize the partition, click Apply. GParted will ask to confirm the changes – hit OK and away you go.

 Get Started - Using DISKPART

Boot the machine from the Vista DVD. Select the appropriate language and then "Install Now".

On the product key page, press SHIFT + F10 to launch a Windows PE 2.0 command window. Then type in DISKPART and press enter to get into the DISKPART utility.

Now type in LIST VOLUME - this gives you a readout of the volumes available on the system. Select the main Windows XP volume by typing in SELECT VOLUME 0 (in most cases it will be Volume 0 - in our lab in was Volume 1).

Now type in SHRINK. Vista will reduce the size the selected Volume by around 50%.

Now Install Vista

If you used the GParted LiveCD to shrink the XP partition, you'll need to reboot the system from the Vista install DVD. If you've used DISKPART then you just need to continue the installation. Once the install gets to the install location, there should be at least two options: a partition marked as Primary and unallocated space. Select the unallocated space and click Next. The install will then commence.

The Vista boot manager will take over the system completely, and Windows XP effectively loads via Vista. It’s all pretty seamless though, and you shouldn’t encounter any technical problems.

Modify Vista's Bootloader

Once Vista is installed and the system reboots, you’ll be presented with a boot menu with two options: “Microsoft Windows Vista” and "Earlier Version of Windows”.

This is perhaps a little bit bland, so you’ll probably want to change it. Here’s where one of the new features of Vista comes in, and it’s not so terrific. In Windows XP if you want to modify the bootloader, just right-click on My Computer, select Properties, go to the Advanced Tab, and click Settings under Startup and Recovery, then click Edit. This opens a local file – boot.ini. It’s just a standard text file and you can change pretty much anything. Unfortunately it’s not that easy in Vista – you can still navigate to the Startup and Recovery settings, but all you can do is select which operating system is the default and modify the timeout settings.

To edit Vista’s boot manager you have to use the command line BCDEDIT utility. To access BCDEDIT, run the Command Window as an administrator and type in BCDEDIT.

Unfortunately BCDEDIT isn’t an easy tool to come to terms with, especially as it’s purely command line-driven. So, a great tool to use here is EasyBCD by NeoSmart Technologies. EasyBCD offers a GUI frontend to BCDEDIT, and makes life much easier.

Once Vista is installed, call up the browser and navigate to the EasyBCD download page - download the latest version (1.7.2 at the time of writing), install and launch the application.

To configure the bootloader go to “Change Settings”. Here you can change the default OS if you prefer to boot into XP first. Under "Entry-Based Settings" you'll see the field which refers to the the XP partition. Overwrite "Earlier Version of Windows" with "Windows XP" and click "Save Settings".

Reboot the system and the changes are visible. You have a dual-booting Vista and XP system. That's all there is to it.

Open up Windows Explorer and there’s two hard drives – the primary disk running Vista and the secondary disk with XP installed. Restart the system and load up Windows XP, and the XP disk is now the primary, with the Vista partition running on the secondary D: drive

If you decide that dual-booting Vista and XP is not for you, EasyBCD lets you wind back the clock.

All you have to do is remove Vista’s boot manager – go to “Manage Bootloader”, select “Uninstall the Vista Bootloader” and then “Write MBR”. Restart the machine and that’s it – the XP boot loader is the only one left on the system and XP loads. You can then delete the Vista partition and use GParted to re-extend the partition to take up the entire disk, or the Extend command in Vista DISKPART.

let's try...+++

Sponsor Link

Popular Posts

Sponsor Link