Tuesday, 23 December 2014

Structuring Documents for the Web

Together, the <html>, <head>, and <body> elements make up the skeleton of an HTML document—
they are the foundation upon which every web page is built.
Inside the <head> element of the first example page, you see a <title> element:
<head>
<title>Popular Websites: Google</title>
</head>
Between the opening <title> tag and the closing </title> tag are the words “Popular Websites:
Google,” or the title of this web page. Figure 1-1 shows the words at the top of the browser window,
which is where browsers such as Internet Explorer, Firefox, and Chrome display the title of a document.
It is also the name they use when you save a page in your Favorites List, and it helps search
engines understand what your page is about. The <title> element is mandatory for all web pages.
The real content of your page is held in the <body> element, which is what you want users to read,
and this is shown in the main browser window.
WARNING The <head> element contains information about the document, which
is not displayed within the main page. The <body> element holds the actual content
of the page viewed in your browser.
You may have noticed that the tags in this example appear in a symmetrical order. If you want to
have one element inside another, both the element’s opening and closing tags must be inside the
containing element. For example, the following is allowed:
<p> This paragraph contains some <em>emphasized text.</em></p>
whereas the following is wrong because the closing </em> tag is not inside the paragraph element:
<p> This paragraph contains some <em>emphasized text. </p></em>
In other words, if an element is to contain another element, it must wholly contain that element.
This is referred to as nesting your elements correctly.
Attributes Tell You about Elements
Attributes in HTML are much like the attributes you experience every day. They are the qualities
that describe a person or thing, such as a tall man or a brown dog. Similarly, HTML elements can
be described in ways that web browsers can understand. This section looks at attributes, starting
with the most important one that beats at the heart of the web.
What differentiates web documents from standard documents are the links (or hyperlinks) that take
you from one web page to another. Look at a link by adding one to the example you just looked at.
Links are created using an <a> element. (The a stands for anchor.)

Introducing Html

As its name suggests, HTML is a markup language, which may sound complicated until you realize
that you come across markup every day. When creating a document in a word processor, you can add
styles to the text to explain the document’s structure. For example, you can distinguish headings from
the main body of the text using a heading style (usually with a larger font). You can use the Return
(or Enter) key to start a new paragraph. You can insert tables into your document to hold data or create
bulleted lists for a series of related points, and so on. Although this does affect the presentation of
the document, the key purpose of this kind of markup is to provide a structure that makes the document
easier to understand.
When marking up documents for the web, you perform a similar process, except you do it by adding
things called tags to the text. With HTML, the key thing to remember is that you must add the tags
to indicate the structure of the document (not how you want it to be presented); for example, which
part of the document is a heading, which parts are paragraphs, what belongs in a table, and so on.
Browsers such as Internet Explorer, Firefox, and Google Chrome all use this markup to help present
the text in a familiar fashion, similar to that of a word processor—main headings are bigger than the
text in paragraphs, there is space above and below each paragraph, and lists of bullet points have a
circle in front of them.
NOTE Although earlier versions of HTML enabled you to control the presentation
of a document—such as which typefaces and colors a document
should use—HTML markup is not supposed to be used to style the document;
that is the job of Cascading Style Sheets (CSS), which you meet in Chapter 7,
“Cascading Style Sheets.”
Now have a look at a simple web page (ch01_eg01.html). You don’t need any special programs to
write web pages; you can simply use a text editor such as Notepad on Windows or TextEdit on a
Mac and save your files with the .html or .htm file extension.
<html>
<head>
<title>Popular Websites: Google</title>
</head>
<body>
<h1>About Google</h1>
<p>Google is best known for its search engine, although
Google now offers a number of other services.</p>
<p>Google's mission is to organize the world's
information and make it universally accessible and
useful.</p>
<p>Its founders Larry Page and Sergey Brin started
Google at Stanford University.</p>
</body>
</html>
This may look a bit confusing at first, but it will all make sense soon. As you can see, there are several
sets of angle brackets with words or letters between them, such as <html>, <head>, </title>, and
</body>. These angle brackets and the words inside them are known as tags, and these are the markup
previously mentioned. Figure 1-1 illustrates what this page would look like in a web browser

God Mode in Windows 7 (Work in Vista & win8 too)

This hidden feature will conveniently put hundreds of settings from all over the OS into one place.

Step:

Create a new folder on your desktop and name it

GodMode.{ED7BA470-8E54-465E-82
5C-99712043E01C}

270 items will automatically be added to the folder consisting of every configurable option in Windows 7.

Happy Computing Folks!!!

Monday, 22 December 2014

Router

It is a layer of three device which is responsible for 
Choosing the best path between source to destination.
it is used in wide Area network. 

 Manufacturer of Router
CISCO , JUNIPER , NORTEN , D-LINK , DAX , IBM Etc.

 

Active Directory Backup & Restoration in Server 2008

Before Going Through this install Backup from Server Manager
1. Open up your command prompt by clicking Start and type “cmd” and hit enter.
2. In your command prompt type 
wbadmin start systemstatebackup -backuptarget:e: 
and press enter.
Note: You can use a different backup target of your choosing
3. Type “y” and press enter to start the backup process.

When the backup is finished running you should get a message that the backup completed successfully. If it did not complete properly you will need to troubleshoot.

Now you have a system state backup of your 2008 Server!
Authoritative Restore of Active Directory
So now what if you accidentally delete an OU, group, or a user account and it’s already replicated to your other servers? We will need to perform an authoritative restore of the Active Directory object you accidentally deleted.
1. To do this you will need to boot into DSRM (Directory Services Restore Mode) by restarting your server and pressing F8 during the restart.
2.Choose Directory Services Restore Mode from the Advanced Boot menu.

3. Login to your server with your DSRM password you created during Active Directory installation.
4. Once you’re logged into your server and in DSRM safe mode, open a command prompt by clicking Start, type “cmd“, and press enter.
5. To make sure you restore the correct backup it’s a good idea to use the “wbadmin get versions” command and write down the version you need to use.

6. Now we need to perform a non-authoritative restore of Active Directory by typing
wbadmin start systemstaterecovery -version:04/14/2009-02:39
Note: The version of backup will vary depending on your situation. Type “y” and press enter to start the non authoritative restore.
7. Go grab some coffee and take a break while the restore completes.

8. You can mark the sysvol as authoritative by adding the –authsysvol switch to the end of the wbadmin command.

9. But if you want to restore a specific Active Directory object then you can use the ever familiar ntdsutil.
For this example we are going to restore a user account with a distinguished name of 
"CN=Test User,CN=Users,DC=example,DC=com"
So the commands would be:
ntdsutil
activate instance ntds
authoritative restore
restore object “cn=Test User,cn=Users,dc=example,dc=com”
Note: The quotes are required

10. Reboot your server into normal mode and you’re finished. The object will be marked as authoritative and replicate to the rest of your domain.

Using Active Directory Snapshots
There is a really cool new feature in Windows Server 2008 called Active Directory Snapshots. Volume Shadow Copy Service now allows us to take a snapshot of Active Directory as a type of backup. They are very quick to create and serve as another line of defense for your backup strategy.
With your server booted into normal mode open a command prompt by clicking Start, type “cmd“, and press enter.
We are going to use the ntdsutil again for creating the Active Directory snapshots. The commands are:
ntdsutil
snapshot
activate instance ntds
create
quit
quit

So now that you have a snapshot of AD, how do you access the data? First we need to mount the snapshot using ntdsutil. The commands are:
ntdsutl
snapshot
list all
mount 1
— (Note: You should mount the correct snapshot you need; for this example there is only 1.)
quit
quit

Your snapshot is mounted, but how do you access the data? We need to use the dsamain command to accomplish this. Then we need to select an LDAP port to use. The command is as follows:

dsamain –dbpath c:\$SNAP_200905141444_VOLUMEC$\WINDOWS\NTDS\ntds.dit –ldapport 10001
The result should look like this:

Now we need to go to Start, Administrative Tools, then Active Directory Users and Computers.
Right click Active Directory Users and Computers and select Change Domain Controller.

In the area that says < Type a Directory Server name [:port] here > enter the name of your server and the LDAP port you used when running the dsamain command.
For my example it would be: WIN-V22UWGW0LU8.HOME.LOCAL:10001

Now you can browse the snapshot of Active Directory without affecting anything else negatively.

Saturday, 20 December 2014

Alternate Data Stream

ADS(Alternate Data Stream):- Windows Has a weired feature in NTFS file system. Which can be used for different purpose. Its upto you. Using this you can hide a file/folder inside an another file so that no one else can see that, most amazingly the file size will not increase. I am giving you an example to hide an exe into a text file. Try it. Visit Ethical hacking Section of my blog & request for detail if you want to know all the aspect of this feature & counter forensic technique.

copy calc.exe from windows\system32 folder to c: drive
Now create a text file (say sample.txt) in c: drive

now run following command
C:\>type calc.exe>sample.txt:calc.exe
Delete the calc.exe.
Now open sample.txt & check its isze also . & then run

C:\>start .\sample.txt:calc.exe

Finding Alternate Data Stream Finding Alternate Data Stream

We can use LADS to find if any Alternate Data Stream is hidden in Our System
Syntax are pretty simple. adding /s is also look for subdirectory

C:\>lads c:\
LADS - Freeware version 4.00

(C) Copyright 1998-2004 Frank Heyne Software (http://www.heysoft.de)
This program lists files with alternate data streams (ADS)
Use LADS on your own risk!
Scanning directory C:\

size ADS in file

---------- ---------------------------------
Error 32 opening C:\pagefile.sys
368146432 C:\sample.txt:pp.avi
18 C:\sample.txt:secret.txt
21 C:\data\:mean.txt
The following summary might be incorrect because there was at least one error!

368132511 bytes in 3 ADS listed



C:\>lads /?

LADS - Freeware version 4.00
(C) Copyright 1998-2004 Frank Heyne Software (http://www.heysoft.de)
This program lists files with alternate data streams (ADS)
Use LADS on your own risk!

Usage: LADS [Directory] [/S] [/D] [/A] [/Xname]
Directory: directory to scan, current if ommitted
/S include Subdirectories
/D Debug LADS ;-)
/V Verbose error reports
/A give a summary of All bytes used in the scanned directories
(All files and directories are considered as uncompressed
and all security decriptions are skipped
for calculating this number!)
/Xname eXclude any ADS "name"
/Pfile read Parameters from "file"

C:\> 

Download LADS from LADS DOWNLOAD

In Windows Vista & Higher OS you can try
DIR /R command for the same

SQL Server Services and Tools

  Microsoft provides both data management and business intelligence (BI) tools and services together with SQL Server. For data management, S...