Featured Posts

<< >>

mac os x server file sharing not taking parent folder permission

The problem arises when someone other than me makes a folder in this shared directory. No one but the person who made that folder can write into it, not even

block ads in Mac OS X – mountail lion / lion/ snow leopard


you can block most of the ads and pop ups from sites by blocking them in local DNS file simply open terminal and edit thisfile   $ sudo vi /private/etc/hosts

Traceroute – starwars story


[root@ajay ~]# traceroute traceroute to (, 30 hops max, 38 byte packets 1 196-47-64-59 ( 0.918 ms 0.948 ms 0.652 ms 2 196-47-64-66 ( 1.223 ms 2.747 ms

Squid – make HTTPS proxy


There seems to be a bit of confusion about configuring SQUID to transparently intercept SSL (read: HTTPS) connections. Some sites say it’s plain not possible: http://www.faqs.org/docs/Linux-mini/TransparentProxy.html#ss2.3 Recent development in SQUID

merge directories in Linux


To merge one folder to another : you can use rsync to do a incremental copy of source folder to destination Try something like this as root: # rsync -av

New Crypto-Ransomware variants spotted

Security Researchers have come across a new variants of the Crypto-Ransomware that is designed to encrypt files on infected machines.

One of the variants spotted by Trend Micro, dubbed as CryptoBlocker, infects only files smaller than 100Mb in size and will not infect system and application files. 

TrendMicro said this new variant does not use CryptoAPIs and uses Advanced Encryption Standard(AES) to encrypt files instead of RSA.

Researchers believe the author of this variant might be new to creation of ransomware because the compiler notes haven't been removed from this binary.

Another variant spotted by both Symantec and TrendMicro Researchers uses GnuPG, an open source implementation of the OpenPGP standard, to encrypt files.

"The threat downloads the 1024-bit RSA public key and imports this key through an option in GnuPG. The malware then encrypts the victims’ files by using GnuPG’s Encrypt Files option with the public key." Symantec researchers wrote.

The victims won't be able to decrypt the encrypted files without the private key which is in the hands of cyber criminals.  The malware asks users to pay about $200 to get the key.

One more variant of the Ransomware spotted by TrendMicro as Critroni or Curve-Tor-Bitcoin (CTB) Locker, uses TOR to mask its command and control server(C&C) communications.

[solved] KLOXO: Awstats Error – You don’t have permission to access /awstats/awstats.pl on this server.


After updating kloxo panel to new version, clients complained about awstat not loading , got this error


Forbidden 403

You don’t have permission to access /awstats/awstats.pl on this server.



just change permission to all awstat folder

chmod 755 -R /home/kloxo/httpd/awstats

define fully deligated subdomains in single zone file – bind


This is very helpful when you need to add MX records for a sub domain, Instead of adding a separate zone file, you can add a virtual sub domain in zone file of the main domain.


with named

In named services you can add sub domains as below, here is my zone file

; zone fragment for ajayadas.com
; name servers in the same zone
$TTL 14400
$ORIGIN ajayadas.com.
ajayadas.com. IN     SOA   ns1.ajayadas.com. root.ajayadas.com. (
               2014072400 ; serial number
               2h         ; refresh =  2 hours 
               15M        ; update retry = 15 minutes
               3W12h      ; expiry = 3 weeks + 12 hours
               2h20M      ; minimum = 2 hours + 20 minutes

; mail server for main domain
; will support email with addresses of the format 
; user@ajayadas.com

              IN      MX 10  mail.ajayadas.com.

; mail server for subdomain 'india'
; will support email with addresses of the format 
; user@india.example.com

india            IN      MX 10  mail.india.ajayadas.com.

; A record for main mail server above 

mail          IN      A

; other domain level hosts and services

; sub-domain definitions

$ORIGIN india.ajayadas.com.

; A record for subdomain mail server

mail          IN      A

; the record above could have been written as 
; mail.india.ajayadas.com. A if it's less confusing
; other subdomain definitions as required 

New variant of Android Ransomware ‘SimpLocker’ spotted

A New variant of the Android Ransomware known as 'SimpLocker' has been spotted by Security researchers at ESET.

This new variant has a few significant improvements including the language in which the fake warning message is written, it is now in English rather than Russian.

The malware is masquerading as a flash player for the Android and tricks users into installing it with administrator privileges .

Once the device is infected, it will show a ransom message saying that your device is locked because you were doing illegal things and demands you to pay around $300.

One of the variant attaches the photo of the victim taken by the front camera in the ransom message.  This trick will definitely scare victims into paying the ransom.

One of the worst features added to this variant is now it encrypts the compressed files such as ZIP, RAR and 7ZIP.  It means even your backup files are being encrypted by this trojan.

ESET has released a tool to decrypt the files that have been encrypted by Simplocker.  The say prevention is better than cure, so better focus on prevention - Be careful while installing apps from unknown sources.

Cyber Security & Privacy Foundation certifies Security Products

Cyber Security and Privacy Foundation(CSPF) has certified a few security products after extensive testing.

CSPF has selected Avast Antivirus and ESET Nod32 as best anti virus products which is suitable for Indian environment.

"DiskCryptor" in disk encryption category, "React OS" in operating system category, 'Zemana' and 'Keyscrambler' in Anti keylogger category, "IronWASP" in Web Application pentesting tool category have all been certified by the CSPF.

We asked the founder of CSPF  Mr. J. Prasanna if CSPF will certify any other products in the future and on what basis these tools were chosen for testing? He said "We will only certify tools after they have been extensively tested for the Indian market, we do not take any funding or sponsorships from companies that own these products."

"We were recently approached by some other companies to test their products, but we discovered that many of them do not even pass the eligibility criteria."
We at EHN hope that CSPF will test many such products in the future and thus enable the public make better decisions about the softwares they run in their computers.