? ??????????????Love Is All Around Us? ????? ?????? ???Rating: 0.0 (0 Ratings)??2 Grabs Today. 36 Total Gr
abs. ??????Get the Code?? ?? ?????Pink Roses? ????? ?????? ???Rating: 4.1 (341 Ratings)??2 Grabs Today. 33318 Total Grabs. ??????Get the Code?? ?? ???????Country Girl? ????? ?????? ???Rating: 3.6 CLICK HERE FOR BLOGGER TEMPLATES AND MYSPACE LAYOUTS ?

Friday

network attacks !!

Understanding Network Attacks

A network attack can be defined as any method, process, or means used to maliciously attempt to compromise network security.

There are a number of reasons that an individual(s) would want to attack corporate networks. The individuals performing network attacks are commonly referred to as network attackers, hackers, or crackers.

A few different types of malicious activities that network attackers and hackers perform are summarized here:

  • Illegally using user accounts and privileges
  • Stealing hardware
  • Stealing software
  • Running code to damage systems
  • Running code to damage and corrupt data
  • Modifying stored data
  • Stealing data
  • Using data for financial gain or for industrial espionagenetwork attacks Network Attacks
  • Performing actions that prevent legitimate authorized users from accessing network services and resources.
  • Performing actions to deplete network resources and bandwidth.

A few reasons for network attackers attempting to attack corporate networks are listed here:

  • Individuals seeking fame or some sort of recognition. Script kiddies usually seek some form of fame when they attempt to crash Web sites and other public targets on the Internet. A script kiddie could also be looking for some form of acceptance or recognition from the hacker community or from black hat hackers.
  • Possible motives for structured external threats include:
    • Greed
    • Industrial espionage
    • Politics
    • Terrorism
    • Racism
    • Criminal payoffs
  • Displeased employees might seek to damage the organization’s data, reliability, or financial standing.
  • There are some network attackers that simply enjoy the challenge of trying to compromise highly secured networks’ security systems. These types of attackers simply see their actions as a means of exposing existing security vulnerabilities.

Network attacks can be classified into the following four types:

  • Internal threats
  • External threats
    • Unstructured threats
    • Structured threats

Threats to the network can be initiated from a number of different sources, hence the reason for network attacks being classified as either external or internal network attacks/threats:

  • External threats: Individuals carry out external threats or network attacks without assistance from internal employees or contractors. A malicious and experienced individual, a group of experienced individuals, an experienced malicious organization, or inexperienced attackers (script kiddies) carry out these attacks. Such attackers usually have a predefined plan and the technologies (tools) or techniques to carry out the attack. One of the main characteristics of external threats is that they usually involve scanning and gathering information. Users can therefore detect an external attack by scrutinizing existing firewall logs. Users can also install an Intrusion Detection System to quickly identify external threats.
    External threats can be further categorized into either structured threats or unstructured threats:

    • Structured external threats: These threats originate from a malicious individual, a group of malicious individual(s), or a malicious organization. Structured threats are usually initiated from network attackers that have a premeditated thought on the actual damages and losses that they want to cause. Possible motives for structured external threats include greed, politics, terrorism, racism, and criminal payoffs. These attackers are highly skilled on network design, avoiding security measures, Intrusion Detection Systems (IDSs), access procedures, and hacking tools. They have the necessary skills to develop new network attack techniques and the ability to modify existing hacking tools for their exploitations. In certain cases, an internal authorized individual may assist the attacker.
    • Unstructured external threats: These threats originate from an inexperienced attacker, typically from a script kiddie. Script kiddie refers to an inexperienced attacker who uses cracking tools or scripted tools readily available on the Internet to perform a network attack. Script kiddies are usually inadequately skilled to create the threats on their own. They can be considered bored individuals seeking some form of fame by attempting to crash websites and other public targets on the Internet.

    External attacks can also occur either remotely or locally:

    • Remote external attacks: These attacks are usually aimed at the services that an organization offers to the public. The various forms that remote external attacks can take are:
      • Remote attacks aimed at the services available for internal users. This remote attack usually occurs when there is no firewall solution implemented to protect these internal services.
      • Remote attacks aimed at locating modems to access the corporate network.
      • Denial of service (DoS) attacks to place an exceptional processing load on servers in an attempt to prevent authorized user requests from being serviced.
      • War dialing of the corporate private branch exchange (PBX).
      • Attempts to brute force password authenticated systems.
    • Local external attacks: These attacks typically originate from situations where computing facilities are shared and access to the system can be obtained.
  • Internal threats: Internal attacks originate from dissatisfied or unhappy inside employees or contractors. Internal attackers have some form of access to the system and usually try to hide their attack as a normal process. For instance, internal disgruntled employees have local access to some resources on the internal network already. They could also have some administrative rights on the network. One of the best means to protect against internal attacks is to implement an Intrusion Detection System and to configure it to scan for both external and internal attacks. All forms of attacks should be logged and the logs should be reviewed and followed up.

With respect to network attacks, the core components that should be included when users design network security are:

  • Network attack prevention
  • Network attack detection
  • Network attack isolation
  • Network attack recovery

Lebih rela menjadi Fatimah

Kasih seorang ayah jelas terpancar dengan ungkapannya, "Fatimah sebahagian daripadaku. Siapa yang menyakitinya beerti menyakitiku." (HR Bukhari).

Bersyukurlah Abi Haura' dan Thorfina mencontohi kewibaan Rasulullah SAW dalam mencintai puteri-puteri baginda.

Bibirmu terkunci,
Senyummu terpaksa,
Demi maruah suami,
Kau diamkan segala.

Tangismu hiba di malam gelita,
Batinmu mengadu pada Yang Esa.
Kau tak mahu mengaibkan sesiapa,
Agar orang melihat tiada apa-apa.

Meskipun rahsiamu kemas tersimpan,
Allah tak rela kau menangis sendirian,
Kisah keluarga Nabi, Allah dedahkan,
Sebagai tauladan sepanjang zaman.

Konflik para isteri Nabi menjelaskan,
Betapa perit mengurus kecemburuan,
Walaupun oleh wanita paling beriman,
Apatah lagi dirimu wanita akhir zaman.

Terima-kasih buatmu Nabi,
Atas kebaikan cara, kemuliaan tujuan,
Atas kelembutan dan keadilan,
Wujudkah lelaki kini sebaik Nabi?

Aku belajar dari kepahitan mereka,
Bukan memilih kepahitan untuk belajar,
Terima-kasih Tuhanku tidak memaksa,
Menjaga agamaku daripada tercalar.

Pernikahan bukan medan percaturan,
Poligami bukan cuba-cubaan,
Tanpa keperluan ia bukan pilihan,
Hanya rukhsah ketika tiada jalan.

Syarat ta'liqku kukuh terpateri,
Kerana tiada lelaki sebaikNabi,
Dan aku tak akan sebaik Aisyah,
Aku lebih rela menjadi Fatimah.

Thursday

Article Review 1

for MISS NORLIYANA BT BAUDIN

link for my miss :)
http://www.stuff.co.nz/national/health/5353403/Nearly-100-baby-deaths-potentially-avoidable

Nearly 100 Baby Deaths Potentially Avoidable

Dear Miss Yana,
For your information, I am a babies lover :) .
From the article at the link above, I know that in 2009, 100 newborn babies died and could potentially been saved. For me, this is a serious issue and it involve the innocent life. very cute innocent life :). I think the recommandations that have been made by the committee have to considered by the government because that is the best solution can be done as soon as possible.

As Professor Cindy Farquhar said:
" The death of a baby or mother is a tragedy and we need to learn from these deaths to make improvements that will ultimately, save lives. "
So, it is well-earned if government establish a new "body of mother and child" to concern about all their problems and certainly to decrease the amount of mother and baby death. Well, the body can work out the best way of providing maternity services to young mothers. This will help young mothers a lot, because they do not have any experience yet. They can get any important information about their baby and of course themselves too from the body.

Moreover, as responsible communities, we also should concerned about mother and their baby around us. Such as in a public transport, if we are waiting for a taxi and there is a pregnant mother, we should give her first if the taxi arrive. That is because a pregnant mother can be easy to feel tired and if they are too tired it can be pressures to the baby. In other situation such as in the bus, we should give a pregnant mother have a sit so they can be more relax in their journey.
Acctually it is very easy to be a good community if you want it and you prove it.

So, the main point that I want all of you know is, even a baby is very important because that little cute baby will grow up and maybe will be a visionary leader.





Wednesday

















































































ni untuk bie je amik la banyak mane pun...huhu











Monday


happiee ramadhan la...

Wednesday

busana muslimah ceremony!!!