Sometimes people think of these programs as MS-DOS commands, but they have nothing to do with the Disk Operating System! They are simpl...
Sometimes people think of these programs as MS-DOS commands, but they have nothing to do with the Disk Operating System! They are simply Command-Line (or Window's Console) programs which were included with the Windows 95/98 OSs. They are all full 32-bit programs which means they cannot be exectued until after Windows (a 32-bit operating system) is up and running. These programs are found in your WINDOWS directory.
The Network programs discussed over here are:
NETSTAT.exe (TCP/IP Net Connections)
PING.exe
TRACERT.exe (Trace Route)
NBSTAT.exe
ROUTE.exe
ARP.exe
NETSTAT.exe TCP/IP Network Statistics
Displays protocol statistics and current TCP/IP network connections.
NETSTAT [-a] [-e] [-n] [-s] [-p proto] [-r] [interval]
-a Displays all connections and listening ports.
-e Displays Ethernet statistics. This may be combined with the
-s option.
-n Displays addresses and port numbers in numerical form.
-p proto Shows connections for the protocol specified by proto; proto
may be TCP or UDP. If used with the -s option to display
per-protocol statistics, proto may be TCP, UDP, or IP.
-r Displays the routing table.
-s Displays per-protocol statistics. By default, statistics
are shown for TCP, UDP and IP; the -p option may be used
to specify a subset of the default.
interval Redisplays selected statistics, pausing interval seconds
between each display. Press CTRL+C to stop redisplaying
statistics. If omitted, netstat will print the current
configuration information once.
First, I would recommend that you always use the '-a' parameter so you can see UDP 'listening ports' as well (often used by trojans), and not just the active TCP connections; then switch between using the '-a' and no parameters at all, to see the differences. When you're offline, you normally shouldn't see any connection data! If you do see an OPEN PORT NUMBER 'listening' for a connection (using the '-a' parameter), it may be that your computer has been infected with a trojan! Click this link for a few more ideas on how you can check to see if your computer is Trojan Free?
If you're running a server, such as the free XITAMI server, you might see something like this ("My_Comp" is the name of my computer):
C:\WINDOWS>netstat -a
Active Connections
Proto Local Address Foreign Address State
TCP My_Comp:ftp localhost:0 LISTENING
TCP My_Comp:80 localhost:0 LISTENING
Or with the "-an" parameters:
C:\WINDOWS>netstat -an
By simply opening a browser connection to both the HTTP (port 80) and FTP (port 21) servers (while still offline!), I saw the following:
C:\WINDOWS>netstat -a
Active Connections
Proto Local Address Foreign Address State
TCP My_Comp:ftp localhost:0 LISTENING
TCP My_Comp:80 localhost:0 LISTENING
TCP My_Comp:1104 localhost:0 LISTENING
TCP My_Comp:ftp localhost:1104 ESTABLISHED
TCP My_Comp:1102 localhost:0 LISTENING
TCP My_Comp:1103 localhost:0 LISTENING
TCP My_Comp:80 localhost:1111 TIME_WAIT
TCP My_Comp:1104 localhost:ftp ESTABLISHED
TCP My_Comp:1107 localhost:0 LISTENING
PING.exe
Usage: ping [-t] [-a] [-n count] [-l size] [-f] [-i TTL] [-v TOS]
[-r count] [-s count] [[-j host-list] | [-k host-list]]
[-w timeout] destination-list
Options:
-t Ping the specifed host until interrupted.
-a Resolve addresses to hostnames.
-n count Number of echo requests to send.
-l size Send buffer size.
-f Set "Don't Fragment" flag in packet.
-i TTL Time To Live.
-v TOS Type Of Service.
-r count Record route for count hops.
-s count Timestamp for count hops.
-j host-list Loose source route along host-list.
-k host-list Strict source route along host-list.
-w timeout Timeout in milliseconds to wait for each reply.
There's one special IP number everyone should know about:
127.0.0.1 - localhost (or loopback).
This is used to connect ( through a browser, for example) to a Web server on your own computer. (127 being reserved for this purpose.) You can use this IP number at all times. It doesn't matter if you're connected to the Internet or not.
It's also called the loopback address because you can ping it and get returns even when you're offline (not connected to any network). If you don't get any valid replies, then there's a problem with the computer's Network settings. Here's a typical response to the 'ping' command:(Attachment)
Traceroute (tracert) adalah suatu perintah / cmd di windows yang bertujuan melihat jalan yang di lalui paket untuk sampai ke tujuannya ...
Traceroute (tracert) adalah suatu perintah / cmd di windows yang bertujuan melihat jalan yang di lalui paket untuk sampai ke tujuannya dengan mengirim pesan Internet Control Messages Protocol (ICMP). Traceroute / tracert akan menampilkan informasi IP router yang di lalui. Dengan maksimal lompatan / hops 30 IP router
Cara penggunaan:
C:\WINDOWS>tracert [website tujuan]
Trace route ke [www.google.com] [172.217.27.132]
Install laptop-mode-tools $yaourt -S laptop-mode-tools $yaourt -S hdparm Run service for laptop mode tools #systemctl enable ...
Install laptop-mode-tools
$yaourt -S laptop-mode-tools
$yaourt -S hdparm
Run service for laptop mode tools
#systemctl enable laptop-mode.service
Install acpid
$yaourt -S acpid
Run service for acpid
#systemctl enable acpid.service
Install cpupower
$yaourt -S cpupower
Run Service for cpupower
#systemctl enable cpupower.service
Run Service fancontrol
#systemctl enable fancontrol
Detect the sensor
#sensors-detect
Run Service for lm_sensor
#systemctl enable lm_sensors.service
This is my own notes, and it's works for me to cooling down the temperatur my note nook
This is my personal notes when i try to learn Vi editor To input press 'i' Finish input press 'esc' To change cursor,...
This is my personal notes when i try to learn Vi editor
To input press 'i'
Finish input press 'esc'
To change cursor, don't forget to press "esc" after that:
Button Function
h Left one character
j Down one character
k Up one character
l Right one character
Simple editing:
Button Function
x Delete One character in cursor position
4x Delete 3 character to right
X (Uppercase) Delete one character to left
3dw(Fast) Delete 3 word
dd Delete 1 row
2dd Delete two rows
D (Uppercase) Delete all rows to end (start from cursor)
r Change character in cursor
'esc' and press r to input
cw Change Words
C (Uppercase) Change Rows
a Insert character in the end of row
o Insert new row
u Undo
:w (Press shift) To save but for the first you must press 'esc'
:q (Press shift) Quit
/ Find words
Install tor and vidalia #pacman -S tor Run the services #systemctl enable tor #systemctl start tor Create this bash script: ...
Install tor and vidalia
#pacman -S tor
Run the services
#systemctl enable tor
#systemctl start tor
Create this bash script:
#############################################################
#!/bin/bash
export TORCHROOT=/opt/torchroot
mkdir -p $TORCHROOT
mkdir -p $TORCHROOT/etc/tor
mkdir -p $TORCHROOT/dev
mkdir -p $TORCHROOT/usr/bin
mkdir -p $TORCHROOT/usr/lib64
mkdir -p $TORCHROOT/var/lib
ln -s /usr/lib $TORCHROOT/lib64
cp /etc/hosts $TORCHROOT/etc/
cp /etc/host.conf $TORCHROOT/etc/
cp /etc/localtime $TORCHROOT/etc/
cp /etc/nsswitch.conf $TORCHROOT/etc/
cp /etc/resolv.conf $TORCHROOT/etc/
cp /etc/tor/torrc $TORCHROOT/etc/tor/
cp /usr/bin/tor $TORCHROOT/usr/bin/
cp /lib/libnss* /lib/libnsl* /lib/ld-linux.so* /lib/libresolv* /lib/libgcc_s.so* $TORCHROOT/u$
cp $(ldd /usr/bin/tor | awk '{print $3}'|grep "^/") $TORCHROOT/usr/lib64/
cp -r /var/lib/tor $TORCHROOT/var/lib/
chown -R tor:tor $TORCHROOT/var/lib/tor
sh -c "grep ^tor /etc/passwd > $TORCHROOT/etc/passwd"
sh -c "grep ^tor /etc/group > $TORCHROOT/etc/group"
mknod -m 644 $TORCHROOT/dev/random c 1 8
mknod -m 644 $TORCHROOT/dev/urandom c 1 9
mknod -m 666 $TORCHROOT/dev/null c 1 3
#################################################################
Run that script
Copy file in /usr/lib/ld-linux-x86-64.so* to /opt/torchroot/usr/lib/
Run chroot
# chroot /opt/torchroot /usr/bin/tor
Firefox
In Preferences > Advanced > Network tab > Settings manually
set Firefox to use the SOCKS proxy localhost with port 9050.
Then you must type about:config into the address bar and void your warranty.
Change network.proxy.socks_remote_dns to true and restart the browser.
This channels all DNS requests through TOR's socks proxy.
Alternatively, install the Tor Browser Bundle (tor-browser-en)
from the AUR. This will allow you to toggle very easily between
Tor navigation and normal navigation instead of changing the preferences.
This is my personal notes when i try to install burg Install burg: $yaourt -S burg-bios-bzr Install burg to your MBR #burg-insta...
This is my personal notes when i try to install burg
Install burg:
$yaourt -S burg-bios-bzr
Install burg to your MBR
#burg-install /dev/sda
Configure burg (Detect OS in sda)
#burg-mkconfig -o /boot/burg/burg.cfg
This is some burg themes:
$yaourt -S burg-themes
$yaourt -S burg-themes-extras
$yaourt -S persia-theme-burg
$yaourt -S arch-theme-burg
Don't foreget, after you install burg, you must re-Configure your burg:
#burg-mkconfig -o /boot/burg/burg.cfg