arrow_upward

Posted by: Lampard - 10-26-2017, 07:38 PM - Forum: Offtopic - Replies (2)
Hello,

I have been finding for a good looking and latest forum softwares. Actually i am tired of some old softwares like MyBB, PHPBB, SMF due to their old style.

However IPB looks really great and modern however it is premium, same goes for Xenforo.

Can anyone recommend me a good modern forum software which also has good amount of plugins and modifications.
Posted by: Zorono - 10-26-2017, 07:39 AM - Forum: Offtopic - Replies (6)
Hello everybody, do anyone know how to get my Street and Street.No which must be listed on the vps application as i don't know it
Posted by: HMASERV - 10-25-2017, 08:58 AM - Forum: Others - Replies (3)
HmaServ provides DDoS protected VPS & Dedicated hosting in ( USA & UK ) . We provide free DDoS protection upto a level of 40 Gbps to all our customers. We supervise your server on a 24/7 basis by constantly monitoring the incoming packets for any sign of DDoS attack. We provide DDoS protection against the various levels of DDoS attacks including layer 3, 4 and 7,no worry after now we will host your Game Server or Website and protect it as well with good budget
our packages:

UK-1

4 GB Ram
50 GB HD
2 Cores
1 GB Network
DDOS Protected
Unlimited Traffic (fair usage)
Advanced Control Panel


Price:22$

====================================

UK-2

5 GB Ram
70 GB HD
2 Cores
1 GB Network
DDOS Protected
Unlimited Traffic (fair usage)
Advanced Control Panel


Price:38$


====================================


UK-3


6 GB Ram
100 GB HD
2 Cores
1 GB Network
DDOS Protected
Unlimited Traffic (fair usage)
Advanced Control Panel

Price:50$

====================================


UK-4


8GB Ram
150 GB HD
3 Cores
1 GB Network
DDOS Protected
Unlimited Traffic (fair usage)
Advanced Control Panel

Price:70$



For any question please :
Contact Us Here

Posted by: ashmi - 10-25-2017, 05:43 AM - Forum: Offtopic - No Replies
There are many essay writing services available in online. Essay writing services are launching day by day. At present, majority of students are seeking help from essay writing services to submit high quality essay for gaining higher grades in their academics.

There are many ways to choose best essay writing service.  A best essay writing service will always offer "Free Draft" Services for the customers to know their quality of papers before make the order.Proffessional essay writing service will offer experts to write essays for their orders
[font=Calibri]Best essay writing service will provide 100% guarantee to their work, and are very sure about on time delivery and some services may offer urgent delivery service.
[/font]

Posted by: ashmi - 10-25-2017, 05:20 AM - Forum: Offtopic - No Replies
cluster means it is a group of servers and other computer resources which acts like a single system.it enables high variety of load balancing and parallel computing.RAID is redundant array of independent disk which configures multiple computer hard disk drives.
DFS is a set of client and server which allows an organization using MS windows server to organize many distributed SMB files.
Posted by: perry - 10-24-2017, 04:59 PM - Forum: Announcements - No Replies
Hello,

Welcome to the FAQ page.
Current release: initial post.
Last edited: 9-2-2018 / missed an o in a word.

1. What is a VPS?
A VPS(virtual private server) is a server that is running on a dedicated server with its own resources that is within the main server resources.
it also runs it's own OS. this is commonly used by an internet industry.

2. What is considered low quality?
Low quality is considered one-liner, bump posting, Necroposting, hijacking other threads and irrelevant posting.
Bump posting are small text that doesn't mean anything than unnecessary attention

Also saying thanks and nothing else is considered spam.
Please tell us WHY you agree/disagree.
or by saying thanks tell is what you like about it.
And what are the downsides?.

3. How can I obtain a VPS?
Very simple makes 20 posts a month within the rules and quality see (2).
Have at least 100 points/credits.

4. Can I contact the provider directly?.
No. Not in any circumstances open a thread in this category here:
https://post4vps.com/forum-22.html

An admin will take care of your issue.
Why? this will keep the provider busy with free clients. endless support. while this community might have the answer as well.

5. I have been suspended can I have my stuff back?.
depends on the accusations. if you have violated any terms from your provider you have been kicked out.

6. I lost my VPS can I have it back next month?
Yes. We will deduct 100 points from your account but you need to reapply for the same VPS.

7. How do I connect to my server?
Simple,
install an ssh program:
I suggest you to start using putty:
https://www.chiark.greenend.org.uk/~sgta...atest.html

find your IP address of your server and put it in (hostname (or IP address))

login and login with root / and given password at vps request topic.

8. can i keep track of my posts each month?
yes, https://hmrworld.tk/counter/list.php


more to come.
Posted by: ashmi - 10-24-2017, 07:49 AM - Forum: Offtopic - No Replies
A VPS is virtual private server.VPS hosting gives us the power of dedicated server.It offers grate privacy,control and dedicated services Technology of VPS hosting is similar to that of VMware or Virtualbox.they may allows to run virtualised OS in one machine.
Posted by: arsalahmed786 - 10-23-2017, 11:48 AM - Forum: General - Replies (8)
Hi Everyone,

I've OGP installed on my VPS first thanks dynamo to help.

Problem: MTA:SA and SAMP Working perfect currently even if i install new SAMP it's also worked. but then i install new MTA:SA or Rsync install it.

i face same error every time even i tried many ports or Duplicate old one and change port to create new it.
   

Hope someone help me. Also if anyone provide me CS 1.6 installation tutorial on Debian it's would be awesome.
Posted by: humanpuff69 - 10-22-2017, 05:20 AM - Forum: Hardware & Technology - Replies (15)
[Image: logo.png]
Recently an exploit for WPA/WPA2 Network is discovered and most of wifi is using the WPA2 that mean all your wifi is exploitable . all your device . and after this exploit discovered you should treat your wpa2 wifi as open because the hacker can easily see the packet and espesically on victim running linux and android 6.0+ the explit is much much easier

the exploit is discovered by KrackAttacks the explit basically repeat the 3 way of handshake again and again making the victim using the same key and because the victim is using the same key the hacker can easily decrypt the key epescially on linux and android 6.0+ its just replace it with blank key making it very easy for hacker to decrypt it

and yes this exploit can be used for almost all of wifi device today . so dont feel safe . your data can be compromised . for now the best solution is to use VPN and update your software

if you dont belive me here what they said
Code:
We discovered serious weaknesses in WPA2, a protocol that secures all modern protected Wi-Fi networks. An attacker within range of a victim can exploit these weaknesses using [u]k[/u]ey [u]r[/u]einstallation [u]a[/u]tta[u]ck[/u]s (KRACKs). Concretely, attackers can use this novel attack technique to read information that was previously assumed to be safely encrypted. This can be abused to steal sensitive information such as credit card numbers, passwords, chat messages, emails, photos, and so on. [b]The attack works against all modern protected Wi-Fi networks[/b]. Depending on the network configuration, it is also possible to inject and manipulate data. For example, an attacker might be able to inject ransomware or other malware into websites.
The weaknesses are in the Wi-Fi standard itself, and not in individual products or implementations. Therefore, any correct implementation of WPA2 is likely affected. To prevent the attack, users must update affected products as soon as security updates become available. Note that [b]if your device supports Wi-Fi, it is most likely affected[/b]. During our initial research, we discovered ourselves that Android, Linux, Apple, Windows, OpenBSD, MediaTek, Linksys, and others, are all affected by some variant of the attacks. For more information about specific products, consult the [url=https://www.kb.cert.org/vuls/byvendor?searchview&Query=FIELD+Reference=228519&SearchOrder=4]database of CERT/CC[/url], or contact your vendor.
The research behind the attack will be presented at the [url=https://acmccs.github.io/session-F3/]Computer and Communications Security (CCS)[/url] conference, and at the [url=https://www.blackhat.com/eu-17/briefings/schedule/#key-reinstallation-attacks-breaking-the-wpa2-protocol-8861]Black Hat Europe[/url] conference. Our [url=https://www.krackattacks.com/#paper]detailed research paper[/url] can already be downloaded.

Quoted From [url=https://www.krackattacks.com/]KrackAttacks.com[/url]

Demonstration


FAQ


Do we now need WPA3?

No, luckily implementations can be patched in a backwards-compatible manner. This means a patched client can still communicate with an unpatched access point (AP), and vice versa. In other words, a patched client or access point sends exactly the same handshake messages as before, and at exactly the same moment in time. However, the security updates will assure a key is only installed once, preventing our attack. So again, update all your devices once security updates are available. Finally, although an unpatched client can still connect to a patched AP, and vice versa, both the client and AP must be patched to defend against all attacks!

Should I change my Wi-Fi password?
Changing the password of your Wi-Fi network does not prevent (or mitigate) the attack. So you do not have to update the password of your Wi-Fi network. Instead, you should make sure all your devices are updated, and you should also update the firmware of your router. Nevertheless, after updating both your client devices and your router, it's never a bad idea to change the Wi-Fi password.
I'm using WPA2 with only AES. That's also vulnerable?
Yes, that network configuration is also vulnerable. The attack works against both WPA1 and WPA2, against personal and enterprise networks, and against any cipher suite being used (WPA-TKIP, AES-CCMP, and GCMP). So everyone should update their devices to prevent the attack!
You use the word "we" in this website. Who is we?
I use the word "we" because that's what I'm used to writing in papers. In practice, all the work is done by me, with me being Mathy Vanhoef. My awesome supervisor is added under an honorary authorship to the research paper for his excellent general guidance. But all the real work was done on my own. So the author list of academic papers does not represent division of work Smile

Is my device vulnerable?
Probably. Any device that uses Wi-Fi is likely vulnerable. Contact your vendor for more information.
What if there are no security updates for my router?
Our main attack is against the 4-way handshake, and does not exploit access points, but instead targets clients. So it might be that your router does not require security updates. We strongly advise you to contact your vendor for more details. In general though, you can try to mitigate attacks against routers and access points by disabling client functionality (which is for example used in repeater modes) and disabling 802.11r (fast roaming). For ordinary home users, your priority should be updating clients such as laptops and smartphones.
Is it sufficient to patch only the access point? Or to patch only clients?
Currently, all vulnerable devices should be patched. In other words, patching the AP will not prevent attacks against vulnerable clients. Similarly, patching all clients will not prevent attacks against vulnerable access points. Note that only access points that support the Fast BSS Transition handshake (802.11r) can be vulnerable.

That said, we are working on access points modifications that do prevent attacks against vulnerable clients. These modifications are different from the security patches for vulnerable access points! So unless your access point vendor explicitly mentions that their patches prevent attacks against clients, you must also patch clients.
Can we modify an access point to prevent attacks against the client?
Yes, it is possible to modify the access point such that connected clients cannot be attacked. These modifications only prevent attacks when a vulnerable client is connected to such a modified access point. When a vulnerable client connects to a different access point, it can still be attacked.
Technically, this is accomplished by modifying the access point such that it does not retransmit message 3 of the 4-way handshake. Additionally, the access point is modified to not retransmit message 1 of the group key handshake. The hostapd project has such a modification available. They are currently evaluating to which extend this impacts the reliability of these handshakes. We remark that it's also possible to prevent attacks against clients by retransmitting the above handshake messages using the same (previous) EAPOL-Key replay counter. The attack against the group key handshake can also be prevented by letting the access point install the group key in a delayed fashion, and by assuring the access only accepts the latest replay counter (see section 4.3 of the paper for details).
How did you discover these vulnerabilities?
When working on the final (i.e. camera-ready) version of another paper, I was double-checking some claims we made regarding OpenBSD's implementation of the 4-way handshake. In a sense I was slacking off, because I was supposed to be just finishing the paper, instead of staring at code. But there I was, inspecting some code I already read a hundred times, to avoid having to work on the next paragraph. It was at that time that a particular call to ic_set_key caught my attention. This function is called when processing message 3 of the 4-way handshake, and it installs the pairwise key to the driver. While staring at that line of code I thought “Ha. I wonder what happens if that function is called twice”. At the time I (correctly) guessed that calling it twice might reset the nonces associated to the key. And since message 3 can be retransmitted by the Access Point, in practice it might indeed be called twice. “Better make a note of that. Other vendors might also call such a function twice. But let's first finish this paper...”. A few weeks later, after finishing the paper and completing some other work, I investigated this new idea in more detail. And the rest is history.
The 4-way handshake was mathematically proven as secure. How is your attack possible?
The brief answer is that the formal proof does not assure a key is installed once. Instead, it only assures the negotiated key remains secret, and that handshake messages cannot be forged.
The longer answer is mentioned in the introduction of our research paper: our attacks do not violate the security properties proven in formal analysis of the 4-way handshake. In particular, these proofs state that the negotiated encryption key remains private, and that the identity of both the client and Access Point (AP) is confirmed. Our attacks do not leak the encryption key. Additionally, although normal data frames can be forged if TKIP or GCMP is used, an attacker cannot forge handshake messages and hence cannot impersonate the client or AP during handshakes. Therefore, the properties that were proven in formal analysis of the 4-way handshake remain true. However, the problem is that the proofs do not model key installation. Put differently, the formal models did not define when a negotiated key should be installed. In practice, this means the same key can be installed multiple times, thereby resetting nonces and replay counters used by the encryption protocol (e.g. by WPA-TKIP or AES-CCMP).
Some attacks in the paper seem hard
We have follow-up work making our attacks (against macOS and OpenBSD for example) significantly more general and easier to execute. So although we agree that some of the attack scenarios in the paper are rather impractical, do not let this fool you into believing key reinstallation attacks cannot be abused in practice.
If an attacker can do a man-in-the-middle attack, why can't they just decrypt all the data?
As mentioned in the demonstration, the attacker first obtains a man-in-the-middle (MitM) position between the victim and the real Wi-Fi network (called a channel-based MitM position). However, this MitM position does not enable the attacker to decrypt packets! This position only allows the attacker to reliably delay, block, or replay encrypted packets. So at this point in the attack, they cannot yet decrypt packets. Instead, the ability to reliably delay and block packets is used to execute a key reinstallation attack. After performing a key reinstallation attack, packets can be decrypted.
Are people exploiting this in the wild?
We are not in a position to determine if this vulnerability has been (or is being) actively exploited in the wild. That said, key reinstallations can actually occur spontaneously without an adversary being present! This may for example happen if the last message of a handshake is lost due to background noise, causing a retransmission of the previous message. When processing this retransmitted message, keys may be reinstalled, resulting in nonce reuse just like in a real attack.

Should I temporarily use WEP until my devices are patched?
NO! Keep using WPA2.

Will the Wi-Fi standard be updated to address this?
There seems to be an agreement that the Wi-Fi standard should be updated to explicitly prevent our attacks. These updates likely will be backwards-compatible with older implementations of WPA2. Time will tell whether and how the standard will be updated.

Read More FAQ Here >>


Conclusion
This exploit is really dangerous . it is much more dangerous than wannacry exploit because it can be used not only for windows but all device that using a wifi network . and this attack is client based so you need to patch all your device and router to make sure you safe from the exploit once it is available

and as i said before for now your choice is to use VPN or virtual private network to encrypt your data
Posted by: OldMeister - 10-21-2017, 03:28 PM - Forum: Suggestions and Feedback - Replies (14)
i suggest you to add FAQ... to make people ask less questions and create topics for no reason

[EDIT]: i see there is one. but can you add more questions and answers?
Pages (305): Jump to page 
Welcome, Guest
You have to register before you can post on our site.

Username
  

Password
  





Search Forums

(Advanced Search)

Forum Statistics
» Members: 2,271
» Latest member: orzpainter
» Forum threads: 3,094
» Forum posts: 34,818

Full Statistics

Online Users
There are currently 286 online users.
» 0 Member(s) | 285 Guest(s)
Bing

Latest Threads
Buy DemoTiger Videos on c...
Forum: Others
Last Post: DewlanceHosting
Yesterday, 09:31 AM
» Replies: 6
» Views: 3,394
LLHOST — VPS in the Nethe...
Forum: Cheap Providers
Last Post: LLHOST
05-08-2025, 07:36 AM
» Replies: 0
» Views: 60
LLHOST — VPS hosting for ...
Forum: Value VPS Providers
Last Post: LLHOST
04-30-2025, 12:10 PM
» Replies: 0
» Views: 85
Get 25% OFF all LLHOST ne...
Forum: Cheap VPS Providers
Last Post: LLHOST
04-22-2025, 11:04 AM
» Replies: 0
» Views: 197
LLHOST: VPS in the Nether...
Forum: Others
Last Post: LLHOST
04-15-2025, 07:32 PM
» Replies: 0
» Views: 259
Hello all!
Forum: Meet & Greet!
Last Post: perry
03-26-2025, 11:28 AM
» Replies: 1
» Views: 299
VisualWebTechnologies | 7...
Forum: Others
Last Post: visualwebtechnologies
03-11-2025, 02:58 AM
» Replies: 0
» Views: 227
Post2Host.com domain on a...
Forum: Others
Last Post: Variable
03-10-2025, 04:04 PM
» Replies: 0
» Views: 185
KVM & OpenVZ Yearly VPS f...
Forum: Cheap VPS Providers
Last Post: HostNamaste
03-05-2025, 12:15 PM
» Replies: 0
» Views: 396
Create Unlimited Virtual ...
Forum: Hardware & Technology
Last Post: bestadvisor
03-01-2025, 09:47 AM
» Replies: 0
» Views: 716

Sponsors: VirMach - Host4Fun - CubeData - Evolution-Host - HostDare - Hyper Expert - Shadow Hosting - Bladenode - Hostlease - RackNerd - ReadyDedis - Limitless Hosting