Friday, 6 February 2015

Youtube Channel

Hii friends now I am here with my youtube channel where you can watch tips and tricks video.
Visit:- Girdhari Agrawal

Monday, 17 November 2014

Girdhari Agrawal

Stay Connected

Hello Friends if You want to connect with me Please Visit: 
http://girdhariagrawal.github.io

Here you can find various details of mine.

DoS & DDoS

Denial of Service Attack (Dos) or Distributed DOS (DDos) Attack


During Last few year the number of instant hackers get a vertical growth not in knowledge but in numbers, They just use the tools freely available on internet and start hacking after a few attempts and few successful tries try find them self in the list of world's best hackers.
Today after a long time I am here with a one of the most famous attack in the field of Computer Hacking and Security i.e. Dos or DDos.

What is a DoS Attack?

Denial of Service or DoS attack is a type of network attack designed to flood the target network or machine with a large amount of useless traffic so as to overload it and eventually bring it down to its knees. The main intention behind DoS attack is to make the services running on the target machine (such as a website) temporarily unavailable to its intended users. DoS attacks are usually carried out on web servers that host vital services such as banking, e-commerce or credit card processing.

What is a DDoS Attack?

A common variant of DOS attack known as DDoS (Distributed Denial of Service) attack has become quite popular in the recent days as it is more powerful and hard to detect. A typical DoS attack has a single place of origin while a DDoS attack originates from multiple IP addresses distributed across two or more different network. The working of a DDoS attack is shown in the following diagram:
Unlike a DoS attack where the attacker uses one single computer or a network to attack the target, a DDoS the attack originates from different pre-compromised computers belonging to different networks. As the attacker uses a number of computer systems from different networks each residing in different geographical locations, the incoming traffic looks natural and therefore becomes hard to detect.

Protection Against DoS/DDoS Attacks:

DoS attacks can easily be handled by blacklisting the target IP (or range of IPs) that are found to be making too many requests/connections (in an unnatural way) to the server. However, DDoS attacks are complicated as the incoming requests seem more natural and distributed. In this case it is hard to find the difference between the genuine and malicious traffic. Taking an action at the firewall level to blacklist suspected IPs may result in false positives and therefore may affect the genuine traffic as well.

Methods Involved in DoS Attack:

The following are some of the commonly employed methods in carrying out a DoS attack:
  • SYN Flood Attack
  • Ping Flood Attack (Ping of Death)
  • Teardrop Attack
  • Peer-to-Peer Attacks

Tools For DoS or DDoS:  

Tuesday, 29 May 2012

TEXT TO VOICE CONVERT WITHOUT USEING ANY SOFTWARE

TODAY I WILL TELL U HOW TO CONVERT YOUR TEXT TO VOICE.....
Actually this is a utility of your windows operating system, by means of which you can convert the desired text in to the voice.

let's begin........
1:- Open the notepad.
2:- Paste the following code(without quotes){only blue color portion}
"Dim msg, sapi
msg=InputBox("Enter your text for Conversation")
Set sapi=CreateObject("sapi.spvoice")
sapi.Speak msg"

 3:- Save the file along with the extension ".vbs"
4:- Run the file and watch the fun...
How it was put your comments here.

Sunday, 22 January 2012

Hide your drive without lossing your data.

  1. for this first Right click on My Computer and choose manage.

 2.
A window will appear choose the second last option(Disk Management), select the desired drive.



3. Right click on the drive.Select the Change drive letter and paths option.A window will again appear.

 4. Click on Remove button.A alert box will appear.click on yes.Again a Alert Box will appear.Click on yes.



THANK YOU FOR WATCHING STAY CONNECTED..............................
POSTED BY :- Girdhari Agrawal