Archive
Terminology in Hacking
Here’s the few terminology used/ called in hacking sphere.
Hacking run
essentially, a hacking run is a hacking session that lasts longer than normal working times, i.e. a hacking run that lasts for in excess of eight to ten hours.
White Hat
considered one of nice guys, a white hat hacker is one who hacks and the informs the owner of the hacking
Black Hat
in contrast, the black hat hacker is considered a criminal and uses his/her skills to break the law
Gray Hat
as one would imagine, a gray hat hacker sometimes is good, and sometimes is criminal; a combination of the white and black hat
Script Kiddie
a demeaning term, used for those who hack but do so by following directions and not creating anything of their own
Trojan horse
deceptive programs that pretend they do one thing, only to enter the computer system and do another; however, they need not be bad for the computer
Virus
a self-replicating program that inserts itself into executable codes or documents
Worm
also a self-replicating program, but a worm breeds itself in computer systems.
-Yuva
Robotics – Takes control of future
Yes, Its indeed… As humans are becoming very Costly/ Lazy/ Paranoid/ Phobia/ … What so ever.
Microsoft have also took its stand on this sector.
They have come up with MSRDS (Microsoft Robotics Development Studio)
Ever since I have presented a paper on Neural networks and Fuzzy logic in my graduation, I had liking towards this Robotics.
I have started learning this Robotics studio development and the Visual Programming language 2008 R3. This is real exiting.
Here’s the few samples
1. Don’t expect coffee on Sunday’s
Usually I don’t get coffee on holidays in my home, yes, Its an holiday for my mom too. In the usual Sunday morning I woke up my mom and was asking for a cup of coffee. She didn’t respond. Then bored of asking her, I made up a VPL program and asked my robot to ask for a coffee instead of me. Here’s the code.
Then also she didn’t respond, I have increased the looping count to 100 and the rest of the things you can imagine what could have happened.
2. Move your, Lego NXT Tribot (left, right, fwd, bwd)
Now serious one, I have a huge set of simulation environment set up with my computer along with the package. Yes, of course this simulation environments runs based on Physics engine. And also your computer must be smart(Fast) enough to run those simulation environments.
Lego robot is a simple educational robo from Mindstorms. You can program it through MSRDS. For test purpose, here’s the code which can be driven from your computer in the simulation environments provided.
This code below, will move the robo left, right, forward and backwards.
If you have the robo, and the respective joystick, here’s the same code which runs with joystick.
You can see the simulation environment snapshot here…
Will be posting more cool robotics stuff, hang on and subscribe to the RSS feed.
-Yuva
HTTP errors in IIS 7.0
Have you installed fresh IIS 7.0 into the server??
Yes, probably you could face this error at first time…
ERROR 1
HTTP Error 404.17 – Not Found
The requested content appears to be script and will not be served by the static file handler.
This is because ASP.net installation was not registered correctly. Try the following steps to register it.
run %windir%\Microsoft.NET\Framework\v4.0.21006\aspnet_regiis.exe –i
And the next possible error very often at first time is
ERROR 2
HTTP Error 404.17 – Not Found
The requested content appears to be script and will not be served by the static file handler.
This is because you have not enabled the permission for ISAPI and CGI restrictions
Just do the following steps and this will help
# Install the feature that handles this request. For example, if you get this error for an .ASPX page, you may have to install ASP.NET via IIS setup.
# Verify that the Web service extension requested is enabled on the server.
1. Open the IIS Manager and navigate to the server level.
2. In the Features view, double-click ISAPI and CGI Restrictions to verify that the Web service extension is set to Allowed.
3. If the extension is not in the list, click Add in the Actions pane.
4. In the Add ISAPI and CGI Restrictions dialog box, type the path of the .dll or .exe file in the ISAPI or CGI Path box, or click Browse to navigate to the location of the file.
5. In the Description box, type a brief description of the restriction.
6. (Optional) Check "Allow extension path to execute" to allow the restriction to run automatically. If you do not check this option, the restriction status is Not Allowed, which is the default. You can allow the restriction later by selecting it and clicking Allow on the Actions pane.
7. Click OK.
Explore IIS with freedom..
-Yuva
What happens in IIS?
Wanna know in depth on how request and response are processed: go to this link..
http://msdn.microsoft.com/en-us/magazine/cc188942.aspx
IIS (Internet Information Server) is one of the most powerful web servers from Microsoft that is used to host your ASP.NET Web application. IIS has it’s own ASP.NET Process Engine to handle the ASP.NET request. So, when a request comes from client to server, IIS takes that request and process it and send response back to clients.
When client request for some information from a web server, request first reaches to HTTP.SYS of IIS. HTTP.SYS then send the request to respective Application Pool. Application Pool then forward the request to worker process to load the ISAPI Extension which will create an HTTPRuntime Object to Process the request via HTTPModule and HTTPHanlder. After that the ASP.NET Page LifeCycle events starts.
Worker process(w3wp.exe) runs the web application in the web server.
Application pool is the container of the worker process.
HTTP.sys
HTTP.SYS is Responsible for pass the request to particular Application pool. Whenever we creates a new Application Pool, the ID of the Application Pool is being generated and it’s registered with the HTTP.SYS. So whenever HTTP.SYS Received the request from any web application, it checks for the Application Pool and based on the application pool it send the request.
Now the control request from the remote user moves from http.sys to the application pool and then to the worker process as discussed.
This is just the basic understanding and the birds eye view of the request processing in IIS.
-Yuva