Sunday, January 30, 2011

Where Can I Learn To Drive 7.5 Tonne

Digital Image - Digital image. CRDI - Cinema Museum

CRDI Video made by showing the inner workings of a digital camera and explains in a didactic process of creating the image, from reception of light by the sensor to the data storage memory card.

< p >

Source: CRDI

Monday, January 24, 2011

London Ontario Silver City Prices

Metasploit Express

Hola!

During these weeks, during Computer Security Training Cycle Intermediate SMR, we are studying techniques and countermeasures to hacker attacks.

We have seen how to perform a penetration test using Metasploit Express tool, a graphical application framework Metasploit. Its operation is simple, the interface is very friendly and documentation is quite detailed. The only drawback is that you need to use an email account that is not free (hotmail, gmail ...).

I leave it catches on you can see the process followed to obtain access to a computer network, specifically to this machine with Windows XP in which the user is browsing the Internet safely:


After creating a project, the first thing to do is scan the network to discover machines, open ports, operating systems, versions of the service ...




then we must seek the right to exploit vulnerable services found, but the whole process is automated:



If we were lucky, there will be open metasploit a session on the target computer and can interact with it:




can, for example, to obtain sensitive data on the target machine, such as screenshots, passwords and system information:




can upload a file to the target machine. The example file shows how to climb the Trojan , keeping it in the C: drive with the name index.php :



Or we can launch a shell and execute commands directly. As you can see it has listed the contents of the directory and displays the routing table:



The truth is that it's easy and fun :-) In the project's own website can download machine Ubuntu virtual ready software and services with vulnerabilities to play with her.

Greetings!

Sunday, January 16, 2011

Fireplace Mantel Blueprints




PRIMARY

Dynamic Advertising.
By Enrique Regidor, Jose Vicente Garcia, Miguel Angel Simal (2 of Primary Education 2011). http://prezi.com/vjo94yppjqqf/educacion/

School 2.0.
By Elena Borrego, Marta Lopez and Laura Ruiz (2 of Primary Education 2011) http://www.slideshare.net/ElenaMagisterio/escuela-20-7828463

Social Networks and Learning Communities.
By Aitor Lirola, Ana Martín, Carmen Mora, Eva María Orgaz and Ivan Palmero (3 Primary Education 2011) http://prezi.com/qzwui6n20gmi/redes-sociales-comunidades-de-aprendizaje/


MUSICAL EDUCATION

Lamus in the Middle Ages
By Javier Rodríguez Herrero (Ed. Musical 2011). old learn through it again: The music in the Middle Ages. This presentation leads us to understand the styles of music that emerged in the Middle Ages. The presentation takes us to an online resource for understanding enriching any aspect of medieval music.
http://prezi.com/n7etaumpi2kh/aprendemos-lo-antiguo-a-traves-de-lo-nuevo-la-musica-medieval/

Sunday, January 2, 2011

Indianhandset Market Share 2009

DHCP - Cisco IOS

Hola!

These slides are also the course Planning and Network Management Training Cycle Higher Level Management Information Systems and Networks .

Right now we are studying the application level protocols, in particular, in these slides explain how to configure the DHCP service on a Cisco router using IOS commands.

After a brief introduction, shows how to define a scope and a pool of addresses, how to set exclusions for the chosen range and how to assign values \u200b\u200bto all the network parameters that the server offers customers (domain, dns, gateway link ...).

Finally, it explains how to start and stop the service, how to view a list of IP addresses assigned by the server and clients who have received and how to use the debug command to diagnose faults.



Greetings!