Test

Powered by Blogger.

Wednesday 4 December 2019

Fwd: Offer of Employment


---------- Forwarded message ---------
From: <CnBOffers@infosys.com>
Date: Wed, 4 Dec 2019, 08:53
Subject: Offer of Employment
To: <kumar.anil.342011@gmail.com>
Cc: <yashika.khatri@infosys.com>



      Candidate Id : 11830061


      Dear Anil,

      Welcome to the Infosys family.

      We are delighted to extend you the offer of Senior Associate Consultant. Your role is critical to us and we look
      forward to a positive working relationship.

      The enclosed letter and FAQ document provide you with all the details of our offer. We are here to support you in your
      joining our company and you may contact Ms. Yashika Khatri ( YASHIKA.KHATRI@INFOSYS.COM ) for any
      information you need.


      Please verify the digitally signed offer letter before taking the print out.

      Steps to validate the Digital Signature:

      1.  Right Click on the Digital Signature
      2.  Click on Show Signature properties
      3.  Validate Signature
      4.  Show Signer's Certificate
      5.  Go to Trust tab
      6.  Add to Trusted certificates
      7.  Validate Signature & Close, now you will see the Digital Signature with the Tick Signature Valid


      We look forward to receiving your acceptance of our offer.

      Warm regards,
      Human Resources Development,
      Infosys Limited

      This e-mail contains PRIVILEGED AND CONFIDENTIAL INFORMATION intended solely for the use of the
      addressee(s). If you are not the intended recipient, please notify the sender by e-mail and delete the original message.
      Further, you are not to copy, disclose, or distribute this e-mail or its contents to any other person and any such actions
      that are unlawful. This e-mail may contain viruses. Infosys has taken every reasonable precaution to minimize this
      risk, but is not liable for any damage you may sustain as a result of any virus in this e-mail. You should carry out your
      own virus checks before opening the e-mail or attachment. Infosys reserves the right to monitor and review the content
      of all messages sent to or from this e-mail address. Messages sent to or from this e-mail address may be stored on the
      Infosys e-mail system.

Saturday 28 September 2019

Friday 27 September 2019

Saturday 24 January 2015

ssl Tunneling

SSL for unsecured Servers

A client can establish an encrypted SSL connection to the Membrane Router. The router terminates the SSL channel and communicates in plain HTTP or SOAP with the server. Using this configuration you can provide SSL encryption and authentication even if your service does not provide SSL. The Membrane Router can also doloadbalancing or access control.

Figure1: SSL Encryption for unsecured Server

See also the example/ssl-server directory of the Membrane distribution for example configuration files for this scenario.

SSL Tunnel to the Server

Membrane Router can enable clients that do not support SSL to communicate with a SSL secured server. To secure the connection the traffic is encrypted by the router before it enters the unsecured network.

Figure2: Non SSL Client communicates with secured Server

See also the example/ssl-client directory of the Membrane distribution for example configuration files for this scenario.

Monitoring a SSL Connection

Because a SSL connection is encrypted it is not possible to monitor the traffic between the client and the server. By using two SSL connections, one between client and monitor and one between monitor and server, it is possible to analyze and monitor the traffic. So both client and server think they are communicating point to point securely with their peer.

Figure3: Logging SSL encrypted Traffic

SSL Tunnel and VPN

A SSL tunnel can route traffic between an unsecured client and an unsecured server over the hostile internet. At each organisation a Membrane Router can work as SSL termination point and provide the desired encryption and authentication.

Figure4: SSL VPN Tunnel

Technical Configuration

Inbound and outbound SSL can be configured using thessl element in proxies.xml.

Sunday 11 January 2015

Customization of ROM on your Android Phone

You might have read or heard people talking about custom ROMs they have installed on their Android devices. Here's how to do it quickly and safely… 

One of the main reasons people like to root their devices is to install a new or different version of the operating system. The open source nature of the OS means that it's possible for anyone to view the code that makes up Android and then modify it as they see fit, in a similar way to which the Linux-based desktop operating systems work.

Custom ROMs can offer new features over the standard ones, allowing you to tailor your device to your needs. They also allow developers to port other manufacturers' interfaces to other device makes – for instance, HTC's Sense UI onto Samsung phones – or to remove a heavily customised ROM altogether. Another reason is to hurry along the update process: you are no longer tied to waiting on the phone manufacturers and the mobile operators to push out the latest version of Android. Installing a new ROM is a relatively simple and quick process thanks to the ROM Manager app which can be downloaded for free from the Android Market.

First of all you need to root your phone and there are a few methods for doing so. Some of the most popular are: SuperOneClick, Universal Androot and Z4Root. Check the compatibility with your particular device before attempting to gain root access. Here's how we'll do it:

For this example we'll use Z4 Root. Download it from here, as it isn't available on the Market. You will need to register first. Now, copy the .apk file you've downloaded to your SD card and then install using an app such as 'Easy Installer' or by clicking on the apk in your favourite file manager.

Open Z4Root and in the centre you will see a button saying 'Root'. Click on the button and wait for a short while, for the process to complete; the progress is shown in the bottom bar. After it has finished, the phone will reboot. You now have root access!

Once you've rooted your phone, ROM Manager makes backing up, installing a custom recovery and downloading the new one a breeze – and will even enable you to restore your original ROM if you prefer! This tutorial will take you through the process step by step and help you on the way to a fresh new experience with your phone…

Disclaimer
Rooting your phone and installing ROMs on your device may void your manufacturer warranty. You undertake the procedure outlined in this tutorial at your own risk. Android Magazine and Imagine Publishing Ltd. cannot be held responsible for loss of data or damage to your device.

Words by: Kieron Howard

  1. How to install a new ROM on your Android smartphone

    Installing ROM Manager

    First off, you will need to install the ROM Manager app. The good news its that it's a free one (although there is a premium version that offers more features). Open up the Android Market from your apps list and search for 'ROM Manager', then click the icon and install.

  2.  
  3. How to install a new ROM on your Android smartphone

    Install Clockwork recovery

    When you rooted your Android device (see page 68), it's quite likely that at the same time you installed a piece of 'custom recovery' software. ROM Manager will check that you have this installed and that you have the latest version that's available.

  4.  
  5. How to install a new ROM on your Android smartphone

    Back up your ROM, part 1

    Open up ROM Manager, click on the Backup Current ROM button, give the backup a name (perhaps something like 'Standard ROM Backup') and then click OK. You might be asked to allow ROM Manager superuser access and you'll need to grant this.

  6. How to install a new ROM on your Android smartphone

    Back up your ROM, part 2

    The phone will now automatically reboot into recovery mode. The backup process can take a little while, so make sure you aren't expecting any important calls! The recovery backs up your current ROM to the microSD card, so it's important not to format this.

  7.  
  8. How to install a new ROM on your Android smartphone

    Choose your ROM

    Back in ROM Manager, click 'Download ROM'. This will bring up a list of available ROMs for your device. In this example we will install CyanogenMod 7, one of the most popular custom versions of Android due to its stability and wide device support.

  9.  
  10. How to install a new ROM on your Android smartphone

    Download the ROM

    Choose the CyanogenMod version you wish to download – the latest version at time of writing is 7.1.0-RC. It's strongly advisable to stay away from the 'Nightly' builds, as these are largely experimental. Google apps don't come as standard, so click to download them.

  11. How to install a new ROM on your Android smartphone

    Installing the ROM, part 1

    Once the ROM and Google Apps have finished downloading, reopen ROM Manager and you will see the ROM pre-installation screen. Tick the 'Wipe Dalvik' and 'Wipe Data and Cache' boxes. Click OK and the phone will now reboot into recovery again.

  12.  
  13. How to install a new ROM on your Android smartphone

    Installing the ROM, part2

    The new ROM will now install. This might take a little while. Once complete, the phone will reboot again. The first boot of any new ROM can take a while, sometimes up to 15 minutes, so be patient and don't panic if the device appears to have frozen.

  14.  
  15. How to install a new ROM on your Android smartphone

    Set up Google account

    Once the phone has booted up, you will then be prompted to enter your Google account details. Doing this will automatically download and set up all your contacts, settings and apps back onto the phone. You now have a brand new ROM to explore!

  16. How to install a new ROM on your Android smartphone

    Calibrate battery (optional)

    Plug in your Android device while it's on and let it charge fully. Disconnect and turn off, then reconnect the power cable and wait until the LED goes green. Disconnect and turn back on, turn off again and reconnect the charger until the LED goes green again.

Build your Own Kernel with Ubuntu

Create a kernel specifically for your Android device in just 10 steps

One of the reasons Android has been able to do so well in the mobile markets is thanks to the open source, Linux base for the system. Because it has this open system, it means that the development and licensing is a lot cheaper for phone and tablet manufacturers and Google still gets to make its money via advertising revenue and the Google Play store.

While the business model is interesting in itself, it's the core kernel, though, that we're focussing on today. This is the element that bridges the gap between the software and the hardware, which also includes drivers and modules for specific chips in the device. On full-blown Linux distributions, you can get busy changing what modules are compiled along with the kernel, making it smaller and faster to create a speed boost on your system.

When it comes to an Android system, the kernels are quite well optimised for individual devices, however there's always a little bit more you can do to optimise it for the way you use your phone. Removing the bluetooth module or various input drivers are a couple of examples, however you can also add elements to the kernel for if you think you are going to do some physical hacks to the device.

In order to build the kernel, you'll need to use the Linux distribution Ubuntu. You don't have to go to install it though; you just need to have it on some flash storage or a CD so you can live boot it on a PC or laptop. Then you are ready to get kernal building!

This tutorial first appeared in Android Magazine issue 44, which is available from all good shops and to download now.

 

  1. Build you own Android kernel with Ubuntu

    Go to Ubuntu

    If you're using Ubuntu 12.04 or later already, you're all good to go. Otherwise, head to the Ubuntu website and download the latest version of the operating system. Once done, burn the ISO to a disc or use Unetbootin in order to create a live-bootable USB stick.

  2.  
  3. Build you own Android kernel with Ubuntu

    Boot into Ubuntu

    Reboot your computer with the USB stick or disc in your system. Look out for an option to open the boot menu right as it turns on and select the medium on which you're accessing Ubuntu from. After a little wait you'll be asked if you want to try or install Ubuntu, so click Try.

  4.  
  5. Build you own Android kernel with Ubuntu

    Preparing Ubuntu for building

    Ubuntu is not quite ready yet for making the kernel, so first you need to install some extra software. Press the Ubuntu logo or the Windows key and search for the terminal and then type in: $ sudo apt-get install build-essential kernel-package libncurses5-dev bzip2

  6. Build you own Android kernel with Ubuntu

    Get your kernel source

    Each device has a specific kernel and you'll need to Google your device to get the exact one. There are some general ones on AOSP, and HTC and Samsung have dedicated pages for kernels. Download the appropriate one to the main hard drive and create a new folder for it.

  7.  
  8. Build you own Android kernel with Ubuntu

    Download the NDK

    Head to the Android NDK site and download the 32 or 64-bit Linux version depending on what you're live booting. Put it in the same folder as kernel source code and extract it. If the kernel source was compressed, make sure you extract that as well.

  9.  
  10. Build you own Android kernel with Ubuntu

    Prepare to configure

    Back in the terminal, use cd to navigate to the kernel folder and use:
    $ export CROSS_COMPILE=[folder location]/androidkernel/android-ndk-r10b/toolchains/arm-linux-androideabi-4.6/prebuilt/linux-x86_64/bin/arm-linux-androideabi-
    In the kernel source, find the defconfig file with your devices code on and rename it to maker.defconfig or maker_defconfig.

  11. Build you own Android kernel with Ubuntu

    Go to the kernel menu

    Back in the terminal use the two following commands:
    make maker.config
    make menuconfig
    After the second you'll be shown the kernel configuration menu where you can start making changes to what modules are included in your kernel.

  12.  
  13. Build you own Android kernel with Ubuntu

    Configure the kernel

    It's very important that you know what you're changing in the menu. Removing random modules will likely just result in your phone not booting but some may actually damage your device. Google the options if you don't know what you want to change.

  14.  
  15. Build you own Android kernel with Ubuntu

    Build your new kernel

    Once you're happy with the configurations and have saved what you've done, you can now begin to build your brand new kernel. Use the following command, replacing X with the number of cores in your devices' CPU:
    $ make -jX ARCH=arm

  16. Build you own Android kernel with Ubuntu

    Flash to phone

    To use the shiny new kernal on your phone, you'll first need to find a flashable kernel zip for your device and then copy the zImage created from the build into the kernel. This is also your chance to add even more modules, such as Wi-Fi, to fully customise your phone to run exactly as you want.

Android Kernel Customization

The kernel, in this regard, is extremely customizable. Not only does the manufacturer have to plug in the necessary drivers to get all of the hardware to work correctly, but there are a lot of variables that they need to set. They can mess with all sorts of things, such as:

  • the minimum and maximum frequencies that the CPU can scale up or down to
  • how busy the CPU should be before it enables extra cores that it normally has disabled to save battery
  • the frequency the CPU should boost to whenever it detects touch input (to ensure a smoother wake up)
  • the CPU governor (which determines how quickly it tends to ramp up the frequency or not) that should be used
  • change the voltage of the CPU during all possible frequencies
  • the maximum frequency of the GPU
  • enable USB fast charge (for USB 3.0 ports)
  • configure the I/O scheduler that is used

How A Replacement Kernel Benefits You

That's great and all, but what can a custom kernel do for you? There are many different custom kernels for virtually every Android device in existence, so you'll have a lot of options to choose from. Depending on your needs, you can pick kernels that are optimized for performance, or ones that are optimized for power savings. Others have a good balance of both.

custom_kernel_franco
There are some developers who switch out some drivers with others (for varying reasons), or develop their own patches for problems they identify. A lot of developers also try to include upstream Linux kernel patches, or use their own toolkits for compilation. For example, for my Nexus 5, there's one developer who uses his own toolkit, which includes the latest version of GCC, a Linaro toolchain with optimizations specifically for the CPU architecture used, and maximum optimization flags for the compiler.

Developers can even add some additional features from other kernels that don't officially exist for your device. For example, there are some kernels for the Nexus 5 that include the "double tap to wake" feature that first appeared on the LG G2.

Most of all, a handful of kernels allow you to access the configurable variables yourself, so that you can use the code that the kernel developers release but tweak it to adjust its behavior to your liking. However, you'll want to research some of the options available before you actually start to change values for them. In other words, a custom kernel can provide improvements, extra features, specialization, and extreme configurability.

Where To Find Android Kernels

It's rather easy to find a kernel for your device. Assuming that you have your device rooted and acustom recovery installed, you can browse through the XDA-Developers forum, look in the subforum for your specific device, search through the threads for any that have a [KERNEL] tag in the thread's title, download one that you like, and flash the .zip file via your custom recovery.

custom_kernel_xda
There may also be a sticky thread that may contain a list of popular kernels available for easy searching. Once you've decided on a kernel you'd like to use, just download it (it should be in a .zip file) and flash it using the custom recovery. Be sure to adhere to all instructions that the kernel developer may provide, and any of their instructions would override any of my advice.

Sunday 21 December 2014

Malicious File Extensions


angerous and malicious file extension list

Group of file extensions, which can be dangerous and harmful for your computer, but it may be also a regular program or data files. You should run a virus scan before opening any unknown file type from this group.

Malicious software, also known as malware, is an application or a file, which is harmful to the computer user. Malicious software includes computer viruseswormstrojan horsesspywareadware or rootkits.

Computer virus - virus is a program or programming code, which replicates by being copied or initiating its copying to another program, computer boot sector or document. Viruses can be transmitted as attachments to an e-mail note or in a downloaded file, or can be present on a diskette or CD. Some viruses wreak their effect as soon as their code is executed, other lie dormant until circumstances cause their code to be executed by the computer.

Computer worm - worm is a self-replicating virus, which does not alter files, but resides in active memory and duplicates itself. Worms use parts of the operating system that are automatic and usually invisible to the user. It is common for worms to be noticed only after their uncontrolled replication consumes system resources, slowing or halting other tasks.

Trojan horses - trojan horse (also known as trojan), is non-self-replicating malware, which appears to perform a desirable function for the user, while facilitates unauthorized access to the user's computer system.

Spyware - spyware is any technology, which aids in gathering information about a person or organization without their knowledge. Spyware is a program that is installed in someone's computer to secretly gather information about the user and to relay it to advertisers or other interested parties. Spyware can get in the computer as a software virus or as the result of installing a new program.

Adware - adware is any software package, which automatically plays, displays or downloads advertisements to the computer after the software is installed on it or while the application is being used.

Rootkits - rootkit is a collection of programs that enable administrator-level access to a computer or computer network. Typically, a cracker installs a rootkit on a computer after first obtaining user-level access, either by exploiting a known vulnerability or cracking the password. Once the rootkit is installed, it allows the attacker to mask intrusion and gain root or privileged access to the computer and possibly also to other machines in the network.

Sort by: ExtensionSort by: File type description
 file extension gzquarBitDefender quarantine file
bin file icon file extension binCD/DVD binary image file
eml file icon file extension emlEmail message file
exe file icon file extension exeProgram executable file
jar file icon file extension jarCompressed archive file package for Java classes and data file
lnk file icon file extension lnkWindows Shortcut file
dll file icon file extension dllDynamic Link Library file
shs file icon file extension shsMicrosoft Windows Shell Scrap Object file
 file extension sysSystem file
zix file icon file extension zixWinZix compressed archive file
swf file icon file extension swfShockWave Flash, Animated vector format for the Internet
scr file icon file extension scrMicrosoft Windows screensaver file
vsd file icon file extension vsdMicrosoft Visio diagram document file
chm file icon file extension chmMicrosoft compiled HTML help file
 file extension aruAutorun.aru malicious file
bat file icon file extension batBatch file (executable)
ocx file icon file extension ocxActiveX control file
 file extension vexeInfected executable file
js file icon file extension jsJavaScript file
 file extension ozdWin32.TrojanDownloader.Agent.OZD trojan
ini file icon file extension iniText configuration file
wmf file icon file extension wmfWindows metafile format
 file extension scrScript file
ws file icon file extension wsMicrosoft Windows script file
pif file icon file extension pifMicrosoft Windows Program Information File
drv file icon file extension drvMicrosoft Windows device driver
 file extension ctblMalware encrypted file
cpl file icon file extension cplMicrosoft Windows Control Panel file
386 file icon file extension 386Windows virtual device driver
com file icon file extension comCommand executable file
 file extension bukMalicious file
 file extension smtmpTrojan:Win32/FakeSysdef folder
php3 file icon file extension php3PHP version 3 script file
 file extension rsc_tmpTemporary file
class file icon file extension classJava bytecode class file
 file extension exe1Renamed executable file
vbs file icon file extension vbsVisual Basic script file
 file extension smmAmi Pro macro file
wss file icon file extension wssMicrosoft Windows Sound System file
dev file icon file extension devWindows Device Driver file
vbe file icon file extension vbeVisual Basic encoded script file
xlm file icon file extension xlmMicrosoft Excel Macro file
pcx file icon file extension pcxPaintbrush bitmap image
vxd file icon file extension vxdMicrosoft Windows virtual device driver
cmd file icon file extension cmdMicrosoft Windows command script file
 file extension wlpginstallPossible Malware file
 file extension bkdBook Library Local Dos exploit file
vba file icon file extension vbaVisual Basic VBA module file
 file extension dxzTrojan backdoor virus file
 file extension cihChernobyl virus file
 file extension tpsScam torrent file
hlp file icon file extension hlpHelp file
 file extension kcdrshiphop.kcd malware file
 file extension xirBackDoor.Generic9.XIR trojan file
 file extension cryptowallEncrypted file by Cryptowall ransomware
 file extension sopMalware word.sop file
 file extension dyzBackdoor.Win32.ProRat.dyz trojan file
 file extension hlwwin32/AMalum.EDHZ file
wsf file icon file extension wsfMicrosoft Windows scripting file
 file extension fnrTrojan-Dropper.Win32.Flystud.lc. file
 file extension booMicrosoft Booasm.arc encoded file archive
 file extension fjlRootkit.Win32.Agent.fjl virus file
 file extension likTrojan.Win32.Agent.lik file
 file extension s7pSubSeven trojan file
 file extension rhkBackdoor.Win32.Rbot.rhk trojan virus file
 file extension dlbTroj/Dloadr-AHT file
 file extension domDomPlayer malicious file
 file extension tsajnana.tsa malware file
php2 file icon file extension php2PHP version 2 script (HyperText PreProcessor)
pgm file icon file extension pgmPortable graymap file format
 file extension bllVBS/European-A worm file
vb file icon file extension vbMicrosoft Visual Studio Visual Basic script file
 file extension mjzTrojan.Win32.Agent.mjz file
 file extension osaW32/Sober-AD file
 file extension fagWin32.AutoRun.fag
cla file icon file extension claJava Class file
 file extension nlsTroj/Agent-GIS file
 file extensionexe_renamedRenamed EXE file
 file extension bxzitaup.bxz malware file
 file extension mfuBackdoor.Win32.Agent.mfu virus file
vbx file icon file extension vbxMicrosoft Visual Basic Extension file
 file extension eztWorm.Win32.AutoRun.ezt file
 file extension cryptolockerCryptoLocker encrypted file
 file extension iwsTrojan-Downloader.JS.Agent file
wsc file icon file extension wscMicrosoft Windows scripting component file
 file extension dllxBackdoor.Bot file
 file extension dbdDemoShield project file
 file extension uzyBackdoor.Sokacaps file
 file extension xduBackdoor.Win32.PcClient.xdu file
 file extension tkoWin32/Oficla malware file
 file extension dyvWORM_AUTORUN.DYV Worm file
 file extension oarHSQLDB database file
 file extension skaHappy99 virus file
 file extension blfBeast Trojan File
 file extension mjgTrojan file
 file extension txsBeast Trojan file
 file extension ccTrojan Spymaster.A text file
 file extension cfxxePossibly Malware file
atm file icon file extension atmTroj/ProAgent-A
 file extension rnaMalware file
 file extension ttiBeast Trojan file
 file extension upaFake download file
 file extension cxqSillyDl.CXQ downloading trojan file
wsh file icon file extension wshMicrosoft Windows Scripting Host file
 file extension delfMalicious or virus file
xlv file icon file extension xlvMicrosoft Excel VBA module file
 file extension lkhWorm.Generic.LKH virus file
 file extension ce0Winewar worm file
 file extension dliWin32.Sober.AD@mm file
 file extension vzrSinowal.vzr malware file
 file extension spamSpam e-mail message
 file extension ceoWinewar worm file
 file extension fujWorm.Win32.AutoRun.fuj virus file
 file extension xntW32/Sober-AD file
 file extension bmwW32/Liji-A virus file
 file extension ssyW32/Sober-AD file
 file extension lokW32/Rbot-WE log file
 file extension zvzMalware file
 file extension plcLotus add-in functions macros applications
 file extension aeplTrojan file
 file extension qitBackdoor.QIT trojan horse file
 file extension letNuke Randomic Life Generator file
 file extension prW32/Brontok-DP worm file
 file extension pidW32/Yayin-A worm data file
 file extension ivaDementia.4207 virus file
 file extension htsTroj/DelSpy-E file
 file extension hsqQaz Trojan data file
 file extension cywRbot.CYW worm file
 file extension bqfBackdoor.Win32.Ciadoor.bqf trojan file
 file extension autMalware AutoStartup file
 file extension dxWin32/Alureon file

RSS

Categories

Followers

Blog Archive

rTechIndia

RtechIndia->technology ahead

rtech

rtechindia

RtechIndia

Go rtechindia

Go rtechindia

RtechIndia

Wednesday 4 December 2019

Fwd: Offer of Employment


---------- Forwarded message ---------
From: <CnBOffers@infosys.com>
Date: Wed, 4 Dec 2019, 08:53
Subject: Offer of Employment
To: <kumar.anil.342011@gmail.com>
Cc: <yashika.khatri@infosys.com>



      Candidate Id : 11830061


      Dear Anil,

      Welcome to the Infosys family.

      We are delighted to extend you the offer of Senior Associate Consultant. Your role is critical to us and we look
      forward to a positive working relationship.

      The enclosed letter and FAQ document provide you with all the details of our offer. We are here to support you in your
      joining our company and you may contact Ms. Yashika Khatri ( YASHIKA.KHATRI@INFOSYS.COM ) for any
      information you need.


      Please verify the digitally signed offer letter before taking the print out.

      Steps to validate the Digital Signature:

      1.  Right Click on the Digital Signature
      2.  Click on Show Signature properties
      3.  Validate Signature
      4.  Show Signer's Certificate
      5.  Go to Trust tab
      6.  Add to Trusted certificates
      7.  Validate Signature & Close, now you will see the Digital Signature with the Tick Signature Valid


      We look forward to receiving your acceptance of our offer.

      Warm regards,
      Human Resources Development,
      Infosys Limited

      This e-mail contains PRIVILEGED AND CONFIDENTIAL INFORMATION intended solely for the use of the
      addressee(s). If you are not the intended recipient, please notify the sender by e-mail and delete the original message.
      Further, you are not to copy, disclose, or distribute this e-mail or its contents to any other person and any such actions
      that are unlawful. This e-mail may contain viruses. Infosys has taken every reasonable precaution to minimize this
      risk, but is not liable for any damage you may sustain as a result of any virus in this e-mail. You should carry out your
      own virus checks before opening the e-mail or attachment. Infosys reserves the right to monitor and review the content
      of all messages sent to or from this e-mail address. Messages sent to or from this e-mail address may be stored on the
      Infosys e-mail system.

Saturday 28 September 2019

Saturday 24 January 2015

ssl Tunneling

SSL for unsecured Servers

A client can establish an encrypted SSL connection to the Membrane Router. The router terminates the SSL channel and communicates in plain HTTP or SOAP with the server. Using this configuration you can provide SSL encryption and authentication even if your service does not provide SSL. The Membrane Router can also doloadbalancing or access control.

Figure1: SSL Encryption for unsecured Server

See also the example/ssl-server directory of the Membrane distribution for example configuration files for this scenario.

SSL Tunnel to the Server

Membrane Router can enable clients that do not support SSL to communicate with a SSL secured server. To secure the connection the traffic is encrypted by the router before it enters the unsecured network.

Figure2: Non SSL Client communicates with secured Server

See also the example/ssl-client directory of the Membrane distribution for example configuration files for this scenario.

Monitoring a SSL Connection

Because a SSL connection is encrypted it is not possible to monitor the traffic between the client and the server. By using two SSL connections, one between client and monitor and one between monitor and server, it is possible to analyze and monitor the traffic. So both client and server think they are communicating point to point securely with their peer.

Figure3: Logging SSL encrypted Traffic

SSL Tunnel and VPN

A SSL tunnel can route traffic between an unsecured client and an unsecured server over the hostile internet. At each organisation a Membrane Router can work as SSL termination point and provide the desired encryption and authentication.

Figure4: SSL VPN Tunnel

Technical Configuration

Inbound and outbound SSL can be configured using thessl element in proxies.xml.

Sunday 11 January 2015

Customization of ROM on your Android Phone

You might have read or heard people talking about custom ROMs they have installed on their Android devices. Here's how to do it quickly and safely… 

One of the main reasons people like to root their devices is to install a new or different version of the operating system. The open source nature of the OS means that it's possible for anyone to view the code that makes up Android and then modify it as they see fit, in a similar way to which the Linux-based desktop operating systems work.

Custom ROMs can offer new features over the standard ones, allowing you to tailor your device to your needs. They also allow developers to port other manufacturers' interfaces to other device makes – for instance, HTC's Sense UI onto Samsung phones – or to remove a heavily customised ROM altogether. Another reason is to hurry along the update process: you are no longer tied to waiting on the phone manufacturers and the mobile operators to push out the latest version of Android. Installing a new ROM is a relatively simple and quick process thanks to the ROM Manager app which can be downloaded for free from the Android Market.

First of all you need to root your phone and there are a few methods for doing so. Some of the most popular are: SuperOneClick, Universal Androot and Z4Root. Check the compatibility with your particular device before attempting to gain root access. Here's how we'll do it:

For this example we'll use Z4 Root. Download it from here, as it isn't available on the Market. You will need to register first. Now, copy the .apk file you've downloaded to your SD card and then install using an app such as 'Easy Installer' or by clicking on the apk in your favourite file manager.

Open Z4Root and in the centre you will see a button saying 'Root'. Click on the button and wait for a short while, for the process to complete; the progress is shown in the bottom bar. After it has finished, the phone will reboot. You now have root access!

Once you've rooted your phone, ROM Manager makes backing up, installing a custom recovery and downloading the new one a breeze – and will even enable you to restore your original ROM if you prefer! This tutorial will take you through the process step by step and help you on the way to a fresh new experience with your phone…

Disclaimer
Rooting your phone and installing ROMs on your device may void your manufacturer warranty. You undertake the procedure outlined in this tutorial at your own risk. Android Magazine and Imagine Publishing Ltd. cannot be held responsible for loss of data or damage to your device.

Words by: Kieron Howard

  1. How to install a new ROM on your Android smartphone

    Installing ROM Manager

    First off, you will need to install the ROM Manager app. The good news its that it's a free one (although there is a premium version that offers more features). Open up the Android Market from your apps list and search for 'ROM Manager', then click the icon and install.

  2.  
  3. How to install a new ROM on your Android smartphone

    Install Clockwork recovery

    When you rooted your Android device (see page 68), it's quite likely that at the same time you installed a piece of 'custom recovery' software. ROM Manager will check that you have this installed and that you have the latest version that's available.

  4.  
  5. How to install a new ROM on your Android smartphone

    Back up your ROM, part 1

    Open up ROM Manager, click on the Backup Current ROM button, give the backup a name (perhaps something like 'Standard ROM Backup') and then click OK. You might be asked to allow ROM Manager superuser access and you'll need to grant this.

  6. How to install a new ROM on your Android smartphone

    Back up your ROM, part 2

    The phone will now automatically reboot into recovery mode. The backup process can take a little while, so make sure you aren't expecting any important calls! The recovery backs up your current ROM to the microSD card, so it's important not to format this.

  7.  
  8. How to install a new ROM on your Android smartphone

    Choose your ROM

    Back in ROM Manager, click 'Download ROM'. This will bring up a list of available ROMs for your device. In this example we will install CyanogenMod 7, one of the most popular custom versions of Android due to its stability and wide device support.

  9.  
  10. How to install a new ROM on your Android smartphone

    Download the ROM

    Choose the CyanogenMod version you wish to download – the latest version at time of writing is 7.1.0-RC. It's strongly advisable to stay away from the 'Nightly' builds, as these are largely experimental. Google apps don't come as standard, so click to download them.

  11. How to install a new ROM on your Android smartphone

    Installing the ROM, part 1

    Once the ROM and Google Apps have finished downloading, reopen ROM Manager and you will see the ROM pre-installation screen. Tick the 'Wipe Dalvik' and 'Wipe Data and Cache' boxes. Click OK and the phone will now reboot into recovery again.

  12.  
  13. How to install a new ROM on your Android smartphone

    Installing the ROM, part2

    The new ROM will now install. This might take a little while. Once complete, the phone will reboot again. The first boot of any new ROM can take a while, sometimes up to 15 minutes, so be patient and don't panic if the device appears to have frozen.

  14.  
  15. How to install a new ROM on your Android smartphone

    Set up Google account

    Once the phone has booted up, you will then be prompted to enter your Google account details. Doing this will automatically download and set up all your contacts, settings and apps back onto the phone. You now have a brand new ROM to explore!

  16. How to install a new ROM on your Android smartphone

    Calibrate battery (optional)

    Plug in your Android device while it's on and let it charge fully. Disconnect and turn off, then reconnect the power cable and wait until the LED goes green. Disconnect and turn back on, turn off again and reconnect the charger until the LED goes green again.

Build your Own Kernel with Ubuntu

Create a kernel specifically for your Android device in just 10 steps

One of the reasons Android has been able to do so well in the mobile markets is thanks to the open source, Linux base for the system. Because it has this open system, it means that the development and licensing is a lot cheaper for phone and tablet manufacturers and Google still gets to make its money via advertising revenue and the Google Play store.

While the business model is interesting in itself, it's the core kernel, though, that we're focussing on today. This is the element that bridges the gap between the software and the hardware, which also includes drivers and modules for specific chips in the device. On full-blown Linux distributions, you can get busy changing what modules are compiled along with the kernel, making it smaller and faster to create a speed boost on your system.

When it comes to an Android system, the kernels are quite well optimised for individual devices, however there's always a little bit more you can do to optimise it for the way you use your phone. Removing the bluetooth module or various input drivers are a couple of examples, however you can also add elements to the kernel for if you think you are going to do some physical hacks to the device.

In order to build the kernel, you'll need to use the Linux distribution Ubuntu. You don't have to go to install it though; you just need to have it on some flash storage or a CD so you can live boot it on a PC or laptop. Then you are ready to get kernal building!

This tutorial first appeared in Android Magazine issue 44, which is available from all good shops and to download now.

 

  1. Build you own Android kernel with Ubuntu

    Go to Ubuntu

    If you're using Ubuntu 12.04 or later already, you're all good to go. Otherwise, head to the Ubuntu website and download the latest version of the operating system. Once done, burn the ISO to a disc or use Unetbootin in order to create a live-bootable USB stick.

  2.  
  3. Build you own Android kernel with Ubuntu

    Boot into Ubuntu

    Reboot your computer with the USB stick or disc in your system. Look out for an option to open the boot menu right as it turns on and select the medium on which you're accessing Ubuntu from. After a little wait you'll be asked if you want to try or install Ubuntu, so click Try.

  4.  
  5. Build you own Android kernel with Ubuntu

    Preparing Ubuntu for building

    Ubuntu is not quite ready yet for making the kernel, so first you need to install some extra software. Press the Ubuntu logo or the Windows key and search for the terminal and then type in: $ sudo apt-get install build-essential kernel-package libncurses5-dev bzip2

  6. Build you own Android kernel with Ubuntu

    Get your kernel source

    Each device has a specific kernel and you'll need to Google your device to get the exact one. There are some general ones on AOSP, and HTC and Samsung have dedicated pages for kernels. Download the appropriate one to the main hard drive and create a new folder for it.

  7.  
  8. Build you own Android kernel with Ubuntu

    Download the NDK

    Head to the Android NDK site and download the 32 or 64-bit Linux version depending on what you're live booting. Put it in the same folder as kernel source code and extract it. If the kernel source was compressed, make sure you extract that as well.

  9.  
  10. Build you own Android kernel with Ubuntu

    Prepare to configure

    Back in the terminal, use cd to navigate to the kernel folder and use:
    $ export CROSS_COMPILE=[folder location]/androidkernel/android-ndk-r10b/toolchains/arm-linux-androideabi-4.6/prebuilt/linux-x86_64/bin/arm-linux-androideabi-
    In the kernel source, find the defconfig file with your devices code on and rename it to maker.defconfig or maker_defconfig.

  11. Build you own Android kernel with Ubuntu

    Go to the kernel menu

    Back in the terminal use the two following commands:
    make maker.config
    make menuconfig
    After the second you'll be shown the kernel configuration menu where you can start making changes to what modules are included in your kernel.

  12.  
  13. Build you own Android kernel with Ubuntu

    Configure the kernel

    It's very important that you know what you're changing in the menu. Removing random modules will likely just result in your phone not booting but some may actually damage your device. Google the options if you don't know what you want to change.

  14.  
  15. Build you own Android kernel with Ubuntu

    Build your new kernel

    Once you're happy with the configurations and have saved what you've done, you can now begin to build your brand new kernel. Use the following command, replacing X with the number of cores in your devices' CPU:
    $ make -jX ARCH=arm

  16. Build you own Android kernel with Ubuntu

    Flash to phone

    To use the shiny new kernal on your phone, you'll first need to find a flashable kernel zip for your device and then copy the zImage created from the build into the kernel. This is also your chance to add even more modules, such as Wi-Fi, to fully customise your phone to run exactly as you want.

Android Kernel Customization

The kernel, in this regard, is extremely customizable. Not only does the manufacturer have to plug in the necessary drivers to get all of the hardware to work correctly, but there are a lot of variables that they need to set. They can mess with all sorts of things, such as:

  • the minimum and maximum frequencies that the CPU can scale up or down to
  • how busy the CPU should be before it enables extra cores that it normally has disabled to save battery
  • the frequency the CPU should boost to whenever it detects touch input (to ensure a smoother wake up)
  • the CPU governor (which determines how quickly it tends to ramp up the frequency or not) that should be used
  • change the voltage of the CPU during all possible frequencies
  • the maximum frequency of the GPU
  • enable USB fast charge (for USB 3.0 ports)
  • configure the I/O scheduler that is used

How A Replacement Kernel Benefits You

That's great and all, but what can a custom kernel do for you? There are many different custom kernels for virtually every Android device in existence, so you'll have a lot of options to choose from. Depending on your needs, you can pick kernels that are optimized for performance, or ones that are optimized for power savings. Others have a good balance of both.

custom_kernel_franco
There are some developers who switch out some drivers with others (for varying reasons), or develop their own patches for problems they identify. A lot of developers also try to include upstream Linux kernel patches, or use their own toolkits for compilation. For example, for my Nexus 5, there's one developer who uses his own toolkit, which includes the latest version of GCC, a Linaro toolchain with optimizations specifically for the CPU architecture used, and maximum optimization flags for the compiler.

Developers can even add some additional features from other kernels that don't officially exist for your device. For example, there are some kernels for the Nexus 5 that include the "double tap to wake" feature that first appeared on the LG G2.

Most of all, a handful of kernels allow you to access the configurable variables yourself, so that you can use the code that the kernel developers release but tweak it to adjust its behavior to your liking. However, you'll want to research some of the options available before you actually start to change values for them. In other words, a custom kernel can provide improvements, extra features, specialization, and extreme configurability.

Where To Find Android Kernels

It's rather easy to find a kernel for your device. Assuming that you have your device rooted and acustom recovery installed, you can browse through the XDA-Developers forum, look in the subforum for your specific device, search through the threads for any that have a [KERNEL] tag in the thread's title, download one that you like, and flash the .zip file via your custom recovery.

custom_kernel_xda
There may also be a sticky thread that may contain a list of popular kernels available for easy searching. Once you've decided on a kernel you'd like to use, just download it (it should be in a .zip file) and flash it using the custom recovery. Be sure to adhere to all instructions that the kernel developer may provide, and any of their instructions would override any of my advice.

Sunday 21 December 2014

Malicious File Extensions


angerous and malicious file extension list

Group of file extensions, which can be dangerous and harmful for your computer, but it may be also a regular program or data files. You should run a virus scan before opening any unknown file type from this group.

Malicious software, also known as malware, is an application or a file, which is harmful to the computer user. Malicious software includes computer viruseswormstrojan horsesspywareadware or rootkits.

Computer virus - virus is a program or programming code, which replicates by being copied or initiating its copying to another program, computer boot sector or document. Viruses can be transmitted as attachments to an e-mail note or in a downloaded file, or can be present on a diskette or CD. Some viruses wreak their effect as soon as their code is executed, other lie dormant until circumstances cause their code to be executed by the computer.

Computer worm - worm is a self-replicating virus, which does not alter files, but resides in active memory and duplicates itself. Worms use parts of the operating system that are automatic and usually invisible to the user. It is common for worms to be noticed only after their uncontrolled replication consumes system resources, slowing or halting other tasks.

Trojan horses - trojan horse (also known as trojan), is non-self-replicating malware, which appears to perform a desirable function for the user, while facilitates unauthorized access to the user's computer system.

Spyware - spyware is any technology, which aids in gathering information about a person or organization without their knowledge. Spyware is a program that is installed in someone's computer to secretly gather information about the user and to relay it to advertisers or other interested parties. Spyware can get in the computer as a software virus or as the result of installing a new program.

Adware - adware is any software package, which automatically plays, displays or downloads advertisements to the computer after the software is installed on it or while the application is being used.

Rootkits - rootkit is a collection of programs that enable administrator-level access to a computer or computer network. Typically, a cracker installs a rootkit on a computer after first obtaining user-level access, either by exploiting a known vulnerability or cracking the password. Once the rootkit is installed, it allows the attacker to mask intrusion and gain root or privileged access to the computer and possibly also to other machines in the network.

Sort by: ExtensionSort by: File type description
 file extension gzquarBitDefender quarantine file
bin file icon file extension binCD/DVD binary image file
eml file icon file extension emlEmail message file
exe file icon file extension exeProgram executable file
jar file icon file extension jarCompressed archive file package for Java classes and data file
lnk file icon file extension lnkWindows Shortcut file
dll file icon file extension dllDynamic Link Library file
shs file icon file extension shsMicrosoft Windows Shell Scrap Object file
 file extension sysSystem file
zix file icon file extension zixWinZix compressed archive file
swf file icon file extension swfShockWave Flash, Animated vector format for the Internet
scr file icon file extension scrMicrosoft Windows screensaver file
vsd file icon file extension vsdMicrosoft Visio diagram document file
chm file icon file extension chmMicrosoft compiled HTML help file
 file extension aruAutorun.aru malicious file
bat file icon file extension batBatch file (executable)
ocx file icon file extension ocxActiveX control file
 file extension vexeInfected executable file
js file icon file extension jsJavaScript file
 file extension ozdWin32.TrojanDownloader.Agent.OZD trojan
ini file icon file extension iniText configuration file
wmf file icon file extension wmfWindows metafile format
 file extension scrScript file
ws file icon file extension wsMicrosoft Windows script file
pif file icon file extension pifMicrosoft Windows Program Information File
drv file icon file extension drvMicrosoft Windows device driver
 file extension ctblMalware encrypted file
cpl file icon file extension cplMicrosoft Windows Control Panel file
386 file icon file extension 386Windows virtual device driver
com file icon file extension comCommand executable file
 file extension bukMalicious file
 file extension smtmpTrojan:Win32/FakeSysdef folder
php3 file icon file extension php3PHP version 3 script file
 file extension rsc_tmpTemporary file
class file icon file extension classJava bytecode class file
 file extension exe1Renamed executable file
vbs file icon file extension vbsVisual Basic script file
 file extension smmAmi Pro macro file
wss file icon file extension wssMicrosoft Windows Sound System file
dev file icon file extension devWindows Device Driver file
vbe file icon file extension vbeVisual Basic encoded script file
xlm file icon file extension xlmMicrosoft Excel Macro file
pcx file icon file extension pcxPaintbrush bitmap image
vxd file icon file extension vxdMicrosoft Windows virtual device driver
cmd file icon file extension cmdMicrosoft Windows command script file
 file extension wlpginstallPossible Malware file
 file extension bkdBook Library Local Dos exploit file
vba file icon file extension vbaVisual Basic VBA module file
 file extension dxzTrojan backdoor virus file
 file extension cihChernobyl virus file
 file extension tpsScam torrent file
hlp file icon file extension hlpHelp file
 file extension kcdrshiphop.kcd malware file
 file extension xirBackDoor.Generic9.XIR trojan file
 file extension cryptowallEncrypted file by Cryptowall ransomware
 file extension sopMalware word.sop file
 file extension dyzBackdoor.Win32.ProRat.dyz trojan file
 file extension hlwwin32/AMalum.EDHZ file
wsf file icon file extension wsfMicrosoft Windows scripting file
 file extension fnrTrojan-Dropper.Win32.Flystud.lc. file
 file extension booMicrosoft Booasm.arc encoded file archive
 file extension fjlRootkit.Win32.Agent.fjl virus file
 file extension likTrojan.Win32.Agent.lik file
 file extension s7pSubSeven trojan file
 file extension rhkBackdoor.Win32.Rbot.rhk trojan virus file
 file extension dlbTroj/Dloadr-AHT file
 file extension domDomPlayer malicious file
 file extension tsajnana.tsa malware file
php2 file icon file extension php2PHP version 2 script (HyperText PreProcessor)
pgm file icon file extension pgmPortable graymap file format
 file extension bllVBS/European-A worm file
vb file icon file extension vbMicrosoft Visual Studio Visual Basic script file
 file extension mjzTrojan.Win32.Agent.mjz file
 file extension osaW32/Sober-AD file
 file extension fagWin32.AutoRun.fag
cla file icon file extension claJava Class file
 file extension nlsTroj/Agent-GIS file
 file extensionexe_renamedRenamed EXE file
 file extension bxzitaup.bxz malware file
 file extension mfuBackdoor.Win32.Agent.mfu virus file
vbx file icon file extension vbxMicrosoft Visual Basic Extension file
 file extension eztWorm.Win32.AutoRun.ezt file
 file extension cryptolockerCryptoLocker encrypted file
 file extension iwsTrojan-Downloader.JS.Agent file
wsc file icon file extension wscMicrosoft Windows scripting component file
 file extension dllxBackdoor.Bot file
 file extension dbdDemoShield project file
 file extension uzyBackdoor.Sokacaps file
 file extension xduBackdoor.Win32.PcClient.xdu file
 file extension tkoWin32/Oficla malware file
 file extension dyvWORM_AUTORUN.DYV Worm file
 file extension oarHSQLDB database file
 file extension skaHappy99 virus file
 file extension blfBeast Trojan File
 file extension mjgTrojan file
 file extension txsBeast Trojan file
 file extension ccTrojan Spymaster.A text file
 file extension cfxxePossibly Malware file
atm file icon file extension atmTroj/ProAgent-A
 file extension rnaMalware file
 file extension ttiBeast Trojan file
 file extension upaFake download file
 file extension cxqSillyDl.CXQ downloading trojan file
wsh file icon file extension wshMicrosoft Windows Scripting Host file
 file extension delfMalicious or virus file
xlv file icon file extension xlvMicrosoft Excel VBA module file
 file extension lkhWorm.Generic.LKH virus file
 file extension ce0Winewar worm file
 file extension dliWin32.Sober.AD@mm file
 file extension vzrSinowal.vzr malware file
 file extension spamSpam e-mail message
 file extension ceoWinewar worm file
 file extension fujWorm.Win32.AutoRun.fuj virus file
 file extension xntW32/Sober-AD file
 file extension bmwW32/Liji-A virus file
 file extension ssyW32/Sober-AD file
 file extension lokW32/Rbot-WE log file
 file extension zvzMalware file
 file extension plcLotus add-in functions macros applications
 file extension aeplTrojan file
 file extension qitBackdoor.QIT trojan horse file
 file extension letNuke Randomic Life Generator file
 file extension prW32/Brontok-DP worm file
 file extension pidW32/Yayin-A worm data file
 file extension ivaDementia.4207 virus file
 file extension htsTroj/DelSpy-E file
 file extension hsqQaz Trojan data file
 file extension cywRbot.CYW worm file
 file extension bqfBackdoor.Win32.Ciadoor.bqf trojan file
 file extension autMalware AutoStartup file
 file extension dxWin32/Alureon file