Tampilkan postingan dengan label Connection. Tampilkan semua postingan
Tampilkan postingan dengan label Connection. Tampilkan semua postingan

How to Make VPS

Posted by Android On Selasa, 12 Juli 2011 0 komentar

Nowadays a lot of which can be used to create a vpn server from starting a direct form of hardware up to the only form of application, from the expensive to the free.

OpenVPN is a VPN application is free (opensource) is quite reliable. Some sources say OpenVPN is in fact not the safest but if the data must be transferred between two or more networks are not too sensitive like more than enough moreover OpenVPN OpenVPN is also very easy to install.

Here I will just tell you about the installation steps OpenVPN on FreeBSD. Although probably could have used some of his tricks on Linux or * nix like any other OS.

Ok long story rather than let's start it.

First OpenVPN on FreeBSD can be found in the folder / usr / ports / security / openvpn, which is required usually lzo library lib but since I installed it through the ports, then all the dependencies will automatically be installed.

For installation please follow these steps (all performed by root)

cd / usr / ports / security / openvpn
make config
Make the build
make install clean

Performed the above steps so that you have a chance to see what happens at each step. Actually you can just change directory and typing make install clean immediately.

After the installation process goes wrong and no significant errors, then input the following line to / etc / rc.conf with your favorite text editor.

openvpn_enable = "YES"

Now we will create a config file to be placed in the folder / usr / local / etc / openvpn if the folder does not exist yet please make advance with the command

mkdir / usr / local / etc / openvpn

Then please move to the folder and start creating openvpn.conf file with your favorite text editor.

cd / usr / local / etc / openvpn
pico openvpn.conf

Now please enter the following sample config.

# Specify device
dev tun

# # The server and client IP Pool
server 10.8.0.0 255.255.255.0
ifconfig-pool-persist ipp.txt

# Certificates for VPN Authentication
ca / usr / local / etc / openvpn / keys / ca.crt
cert / usr / local / etc / openvpn / keys / server.crt
key / usr / local / etc / openvpn / keys / server.key
dh / usr/local/etc/openvpn/keys/dh1024.pem

# Routes to client
push "route 192.168.0.0 255.255.255.0"
# Compression VPN link
comp-lzo

keepalive 10 60
ping-timer-rem
persist-tun
persist-key

# Run OpenVPN as a daemon and drop privileges to user / group nobody user nobody
group nobody
daemon

Save the file above, and we continue with cerificates. Copy the script to create a certificate from the folder / usr / local / share / doc / openvpn manner as follows (examples copied it to the folder / home / giest please be replaced with your user).

cp-r / usr / local / share / doc / openvpn / easy-rsa / home / guest /
cd / home / guest / easy-rsa

After successfully copying easy-rsa scripts then please adan edit the vars file with your favorite editor and adjust purposes (without dieditpun no problems then you will be given only a few questions over and over again). Here are examples of parts that you need to edit.

export KEY_COUNTRY = ID
export KEY_PROVINCE = "ENGLAND"
export KEY_CITY = LONDON
export KEY_ORG = "GUEST-VPN"
export KEY_EMAIL = "admin@guest.org"

Then we moved from the FreeBSD default shell (usually tcsh) to sh or bash first. If you do not move the shell I guarantee you will not succeed in making certificates for openvpn.

To switch to sh or bash please type the following command.

sh

Once you move the shell follow the steps below.

. vars
NOTE: Pls you run. / Clean-all, I Will be doing a rm-rf on / usr / home / Guest / easy-rsa / keys
. / Clean-all
. / Build-ca
Generating a 1024 bit RSA private key
....................................++++++
..............++++++
writing new private key to 'ca.key'
-----
You are about to be asked to enter information That Will be incorporated
into your certificate request.
What you are about to enter is what is Called a Distinguished Name or a DN.
There are quite a Few fields but you can leave some blank
For some fields there Will be a default value,
If you enter '.,' Will the field be left blank.
-----
Country Name (2 letter code) [ID]:
State or Province Name (full name) [ENLAND]:
Locality Name (eg, city) [LONDON]:
Organization Name (eg, company) [GUEST-VPN]:
Organizational Unit Name (eg, section) []:
Common Name (eg, your name or your server's hostname) []:
Email Address [admin@guest.org]:

Ok as you can see you are required to answer some questions, but because previously I've edit the file vars so I can just hit enter to use the default answer.

Next is to build certificate and key follow the steps below

. / Build-key-server server
Generating a 1024 bit RSA private key
..........++++++
.................................................. ++++++
writing new private key to 'server.key'
-----
You are about to be asked to enter information That Will be incorporated
into your certificate request.
What you are about to enter is what is Called a Distinguished Name or a DN.
There are quite a Few fields but you can leave some blank
For some fields there Will be a default value,
If you enter '.,' Will the field be left blank.
-----
Country Name (2 letter code) [ID]:
State or Province Name (full name) [ENGLAND]:
Locality Name (eg, city) [LONDON]:
Organization Name (eg, company) [GUEST-VPN]:
Organizational Unit Name (eg, section) []:
Common Name (eg, your name or your server's hostname) []: SERVER
Email Address [admin@guest.org]:

Please enter the following 'extra' attributes
to be sent with your certificate request
A challenge password []: 123456
An optional company name []: ARSENAL
Using configuration from / usr / home / Guest / easy-rsa / openssl.cnf
Check That the request matches the signature
Signature ok
The Subject's Distinguished Name is as follows
countryName : P RINTABLE: 'ID'
stateOrProvinceName: P RINTABLE: 'ENGLAND'
localityName : RINTABLE: 'LONDON'
OrganizationName : RINTABLE: 'GUEST-VPN'
commonName : RINTABLE: 'SERVER'
emailAddress : IA5STRING: 'admin@guest.org'
Certificate is to be certified until July 12 18:04:29 2019 GMT (3650 days)
Sign the certificate? [Y / n]: y

1 out of 1 certificate requests certified, commit? [Y / n] y
Write out database with 1 new entries
Data Base Updated

See if we do not edit the file vars we need to answer that question once again. now we will build certificate and key for use by the client. I emulated this will make the client certificate for 2 only. if you have more than two clients please adjusted.

. / Build-key client1
Generating a 1024 bit RSA private key
.........++++++
....................................++++++
writing new private key to 'client1.key'
-----
You are about to be asked to enter information That Will be incorporated
into your certificate request.
What you are about to enter is what is Called a Distinguished Name or a DN.
There are quite a Few fields but you can leave some blank
For some fields there Will be a default value,
If you enter '.,' Will the field be left blank.
-----
Country Name (2 letter code) [ID]:
State or Province Name (full name) [ENGLAND]:
Locality Name (eg, city) [LONDON]:
Organization Name (eg, company) [GUEST-VPN]:
Organizational Unit Name (eg, section) []:
Common Name (eg, your name or your server's hostname) []: CLIENT1
Email Address [admin@giest.org]:

Please enter the following 'extra' attributes
to be sent with your certificate request
A challenge password []: 123456
An optional company name []: ARSENAL
Using configuration from / usr / home / Guest / easy-rsa / openssl.cnf
DEBUG [load_index]: unique_subject = "yes"
Check That the request matches the signature
Signature ok
The Subject's Distinguished Name is as follows
countryName: P RINTABLE: 'ID'
stateOrProvinceName: P RINTABLE: 'england'
localityName: P RINTABLE: 'london'
OrganizationName: P RINTABLE: 'GUEST-VPN'
commonName: P RINTABLE: 'CLIENT1'
emailAddress: IA5STRING: 'admin@guest.org'
Certificate is to be certified until July 12 18:10:43 2019 GMT (3650 days)
Sign the certificate? [Y / n]: y

1 out of 1 certificate requests certified, commit? [Y / n] y
Write out database with 1 new entries
Data Base Updated

To client2 just typing

. / Build-key client2

you should replace only the part

[Source] Common Name (eg, your name or your server's hostname) []: CLIENT2 [/ source]

If you do not make changes here the certificates and keys for the client to the two would not formed.

Next we build dh parameters with a command like the following

1. #. / Build-dh
2. Generating DH parameters, 1024 bit long safe prime, generator 2
3. This is going to take a long time
4.

ok now completed the process of making key right now you just exit back to your default shell with the command exit

Now copied keys folder to / usr / local / etc / openvpn with the command

cp-r keys / usr / local / etc / openvpn /

Before we start running the openvpn server we first prepare a file for the log. Please edit the file / etc / syslog.conf and add the following line at the bottom of the syslog.conf file.

! Openvpn
.* / Var / log / openvpn.log

then create the file and restart syslog openvpn.log ny

touch / var / log / openvpn.log
killall-HUP syslogd

Now we load the first module tun / tap tun device that could arise later.

kldload if_tun
kldload if_tap

if you find errors kldload: can not load if_tun: File exists mean tun or tap and it was too load so do not worry.

In order to tun and tap was loaded each time the boot please edit the file / boot / defaults / loader.conf then locate the following lines and change to YES

if_tap_load = "YES" # Ethernet tunnel software network interface
if_tun_load = "YES" # Tunnel driver (user process ppp)

Ok lah is now complete we are ready to run the OpenVPN server for the first time. To run OpenVPN please type the following command.

/ Usr / local / etc / rc.d / openvpn start

Next we check whether everything is ready or not we check first with the command ifconfig tun device

tun0: flags = 8051 mtu 1500
inet 10.8.0.1 -> 10.8.0.2 netmask 0xffffffff
Opened by PID 10147

If you've seen a display like the above means that the OpenVPN server is already successful path.

It remains to add the following rules for your pf.conf

# VPN Interface
vpn_if = "tun0"

# VPN Network
vpn_network = "10.8.0.0/24"

# NAT VPN connections
nat on $ ext_if from $ vpn_network to any -> ($ ext_if)

# Inbound VPN connections
pass in on $ ext_if proto udp from any to port 1194 keep state
pass quick on $ vpn_if


READ MORE

Get Free Access Internet WiFi

Posted by Android On Minggu, 26 Juni 2011 0 komentar

WiFi HotSpot As we know, hotspots or wireless internet access with standard 802.11b / g are not familiar stuff our ears, and when we go in public places like the Mall, Cafe, hotels and offices, with our easy to find the facility ..

Unfortunately not all providers offer wireless Internet facilities for free, or if free. extremely limited.
One of the protection used wireless service providers is to restrict Internet access based on MAC Address.
What is MAC Address?
In computer networking a Media Access Control address (MAC address) or Ethernet Hardware Address (EHA) or hardware address or adapter address is a quasi-unique identifier attached to most network adapters (NICs) ..
Okay so the conclusion MAC Address is a unique number that distinguishes each network device that is attached dikomputer us.
An example is the hotspot in hotel hilton. At hilton hotspot The Wireless Internet service providers, limiting the use of the Internet is free only for 3 hours, after that you can not access the Internet again, and would not be able to access again tomorrow. Type of protection used is MAC Address Filtering.
How to break through the protection with a MAC Address?

There is a very useful tool for anda.Tools was named K-MAC Download Dicini
With this tool you will be able to change your MAC-Address instantly and what does it mean? You can break the MAC Address Protection!. Each share of Internet access you run out in 3 hours, you need to do is change your MAC address, and do the connection.
I add more for info. WEP/WPA/WPA-2 cracking passwords using
programs are available in packages of OS backtrack
kismet
Kismet is a security tool that runs Linux, Kismet is used to eavesdrop on data traffic in the Internet network.
Aircrak-Aircrak-PTW PTW is a tool used to crack wireless protected. Each of these notebooks with different specs, so any way to use aircrack different.
One trick is also used to search for passwords which are used by someone to access hotspots that use prepaid cards.
Simple tool that prepared aja sih:
Software required:
1. Angry IP Scanner
2. Technitium MAC Address
Immediately wrote now to how:
# Find the location of the hotspot service provider, certainly in the area of ​​affordable hotspot network is ..
# Turn on your laptop, and also turn on your wireless network and see the wireless network system tray icon, then right click and select view avalible wireless network, and of course after that you must connect to a wireless hotspot your destination.
# After connect, right click the system tray and select status> choose details tab> look there ip given to us. Write down the ip.
# Open the program AngryIP Scanner 2.21 and enter the ip range that we will scan (ip data used were we) at the top. For example: 135.125.1.13 IP that we can then enter the ip in the first column of our range in accordance with an earlier but instead of ip numbers at the end of the first to be 135.125.1.1 and the second column write the same but the number one end was replaced with 255 to 135 125 .1.255. result is 135.125.1.1 to 135.125.1.255 and click start (red button).
# After scanning then we'll get a live ip data connected with these hotspots. after scanning is complete then see the ip of the living (alive hosts) blue right click on the live ip ip Right-click on the blue color was right click> show> mac address and there will be a code mac address (mac addresses sometimes there does not appear, select Just the other ip). Write down the mac address that we get.
# Open the program Technitium MAC Address v5 release 3 which we have prepared. There is a mac address field. well now just change the mac address with which we got earlier and press change mac id.
# Wait for our mac will be replaced and a temporary connection and connect again automatically disconnected itself.
# Go to the firefox web browser, or anything goes. Enjoy Free Internet.
One thing to remember is that our system is the transfer of passenger data to hack an account that we had.
It can outsmart the status of hotspot login page enter it (to account). For example status and so go there it looks prepaid card code number and we simply keep track of, then logout and log back into the hotspot's login page quickly enter the password earlier. This will make us can directly access the Internet without a ride again (because that make us prepaid card code) so if anyone wants to login to use the card (which had a code) when you log in using the card of course he can not enter because prepaid cards.
"Already logged".
How about it, interesting is not it?
But I suggest, as I do is to ride alone, because I do not want to go too far, like the way I Tell to log off and log in again will surely make the owner can not log in. Request permission directly is also a possibility that had not refused, the origin of his interests is urgent.
For Ip Scanning can also use the application Dude, download it here, to determine the condition of the computers connect to the hotspot. Can be tried too ya ..
Hmm, i have some usefull tools again, check it.
WEP and WPA KeyGenerator
Wireless Key Generator
run it live programs generate,, and coffee directly into the network key. ...
Or also you used this application "wifi password finder"
seach it self in search engine :D, all this is just for learning, as long as we are still able to use the legal why not wrote. And this can also be used by the hotspot owner, if in this way can still be used to break into. So it needs more security.
READ MORE

Enable Internet Connection Firewall using VBScript

Posted by Android On Senin, 15 November 2010 0 komentar
Windows Firewall helps to protect computers from unsolicited network traffic. The Windows Firewall APIs make it possible to programmatically manage the features of Windows Firewall by allowing applications to create, enable, and disable firewall exceptions.
Windows Firewall API is intended for situations in which a software application or setup program must operate with adjustments to the configuration of the networking environment in which it runs. For example, a service that needs to receive unsolicited traffic can use this API to create exceptions that allow the unsolicited traffic.
Windows Firewall API is designed for use by programmers using C/C++, Microsoft Visual Basic development system, Visual Basic Scripting Edition, and JScript development software. Programmers should be familiar with networking concepts such as stateful packet filtering, TCP/IP protocol concepts, and network address translation (NAT).
Windows Firewall API is supported on Windows XP with Service Pack 2 (SP2). For more specific information about which operating systems support a particular programming element, refer to the Requirements sections in the documentation.

[Internet Connection Firewall may be altered or unavailable in subsequent versions. Instead, use the Windows Firewall API.
The following VBScript code first determines if Internet Connection Sharing and Internet Connection Firewall are available on the local computer. If so, the code enumerates the connections on the local computer, and enables Internet Connection Firewall on the connection that is specified as a command line argument.


' Copyright (c) Microsoft Corporation. All rights reserved.

OPTION EXPLICIT

DIM ICSSC_DEFAULT, CONNECTION_PUBLIC, CONNECTION_PRIVATE, CONNECTION_ALL
DIM NetSharingManager
DIM PublicConnection, PrivateConnection
DIM EveryConnectionCollection

DIM objArgs
DIM con

ICSSC_DEFAULT = 0
CONNECTION_PUBLIC = 0
CONNECTION_PRIVATE = 1
CONNECTION_ALL = 2

Main( )

sub Main( )
Set objArgs = WScript.Arguments

if objArgs.Count = 1 then
con = objArgs(0)

WScript.Echo con

if Initialize() = TRUE then
GetConnectionObjects()

FirewallTestByName(con)
end if
else
DIM szMsg
szMsg = "Invalid usage! Please provide the name of the connection as the argument." & chr(13) & chr(13) & _
"Usage:" & chr(13) & _
" " + WScript.scriptname + " " + chr(34) + "Connection Name" + chr(34)
WScript.Echo( szMsg )
end if

end sub


sub FirewallTestByName(conName)
on error resume next
DIM Item
DIM EveryConnection
DIM objNCProps
DIM szMsg
DIM bFound

bFound = false
for each Item in EveryConnectionCollection
set EveryConnection = NetSharingManager.INetSharingConfigurationForINetConnection(Item)
set objNCProps = NetSharingManager.NetConnectionProps(Item)
if (ucase(conName) = ucase(objNCProps.Name)) then
szMsg = "Enabling Firwall on connection:" & chr(13) & _
"Name: " & objNCProps.Name & chr(13) & _
"Guid: " & objNCProps.Guid & chr(13) & _
"DeviceName: " & objNCProps.DeviceName & chr(13) & _
"Status: " & objNCProps.Status & chr(13) & _
"MediaType: " & objNCProps.MediaType

WScript.Echo(szMsg)
bFound = true
EveryConnection.EnableInternetFirewall
exit for
end if
next

if( bFound = false ) then
WScript.Echo( "Connection " & chr(34) & conName & chr(34) & " was not found" )
end if

end sub

function Initialize()
DIM bReturn
bReturn = FALSE

set NetSharingManager = Wscript.CreateObject("HNetCfg.HNetShare.1")
if (IsObject(NetSharingManager)) = FALSE then
Wscript.Echo("Unable to get the HNetCfg.HnetShare.1 object")
else
if (IsNull(NetSharingManager.SharingInstalled) = TRUE) then
Wscript.Echo("Sharing isn't available on this platform.")
else
bReturn = TRUE
end if
end if
Initialize = bReturn
end function

function GetConnectionObjects()
DIM bReturn
DIM Item

bReturn = TRUE

if GetConnection(CONNECTION_PUBLIC) = FALSE then
bReturn = FALSE
end if

if GetConnection(CONNECTION_PRIVATE) = FALSE then
bReturn = FALSE
end if

if GetConnection(CONNECTION_ALL) = FALSE then
bReturn = FALSE
end if

GetConnectionObjects = bReturn

end function


function GetConnection(CONNECTION_TYPE)
DIM bReturn
DIM Connection
DIM Item
bReturn = TRUE

if (CONNECTION_PUBLIC = CONNECTION_TYPE) then
set Connection = NetSharingManager.EnumPublicConnections(ICSSC_DEFAULT)
if (Connection.Count > 0) and (Connection.Count < 2) then
for each Item in Connection
set PublicConnection = NetSharingManager.INetSharingConfigurationForINetConnection(Item)
next
else
bReturn = FALSE
end if
elseif (CONNECTION_PRIVATE = CONNECTION_TYPE) then
set Connection = NetSharingManager.EnumPrivateConnections(ICSSC_DEFAULT)
if (Connection.Count > 0) and (Connection.Count < 2) then
for each Item in Connection
set PrivateConnection = NetSharingManager.INetSharingConfigurationForINetConnection(Item)
next
else
bReturn = FALSE
end if
elseif (CONNECTION_ALL = CONNECTION_TYPE) then
set Connection = NetSharingManager.EnumEveryConnection
if (Connection.Count > 0) then
set EveryConnectionCollection = Connection
else
bReturn = FALSE
end if
else
bReturn = FALSE
end if

if (TRUE = bReturn) then

if (Connection.Count = 0) then
Wscript.Echo("No " + CStr(ConvertConnectionTypeToString(CONNECTION_TYPE)) + " connections exist (Connection.Count gave us 0)")
bReturn = FALSE
'valid to have more than 1 connection returned from EnumEveryConnection
elseif (Connection.Count > 1) and (CONNECTION_ALL <> CONNECTION_TYPE) then
Wscript.Echo("ERROR: There was more than one " + ConvertConnectionTypeToString(CONNECTION_TYPE) + " connection (" + CStr(Connection.Count) + ")")
bReturn = FALSE
end if
end if
Wscript.Echo(CStr(Connection.Count) + " objects for connection type " + ConvertConnectionTypeToString(CONNECTION_TYPE))

GetConnection = bReturn
end function

function ConvertConnectionTypeToString(ConnectionID)
DIM ConnectionString

if (ConnectionID = CONNECTION_PUBLIC) then
ConnectionString = "public"
elseif (ConnectionID = CONNECTION_PRIVATE) then
ConnectionString = "private"
elseif (ConnectionID = CONNECTION_ALL) then
ConnectionString = "all"
else
ConnectionString = "Unknown: " + CStr(ConnectionID)
end if

ConvertConnectionTypeToString = ConnectionString
end function






READ MORE

Slow WiFi connection Solution

Posted by Android On Rabu, 03 November 2010 0 komentar
computers as exhibiting the same slow connectivity, chances are good it has something to do with the WiFi. For example, perhaps the router got moved to a location that's blocking some of the signal.
It could also be that the router is failing, or that more library patrons are sharing a fixed amount of bandwidth (like more cars on a highway leading to slow-moving traffic). Without having more information, it can be tricky to troubleshoot a problem like this.
However, there's one step worth trying for anyone vexed by sluggish WiFi: try a direct connection to the router. (Actually, that should be your second step; the first is to reset both the modem and router.)

In other words, disable your PC's WiFi, then connect it directly to the router using an Ethernet cable. Windows should automatically detect the new connection and get you online accordingly, though you may have to reboot.

Problem solved? If so, you know there's some kind of WiFi issue to blame. If not, the culprit is probably a bad router, bad router settings, or the Internet connection itself (check with your service provider). Space doesn't permit me to address all these possibilities here, but at least you'll have narrowed down the problem.
READ MORE