Monday, 22 December 2014

Cyber-Security is as important to National Security as soldier on border.

Cyber-Security is as important to National Security as soldiers on border-well as we speak about cyber -security we need to understand what is cyber-security.
Cybersecurity is the process of applying security measures to ensure confidentiality, integrity, and availability of data. Cybersecurity assures protection of assets, which includes data, desktops, servers, buildings, and most importantly, humans. The goal of cybersecurity is to protect data both in transit and at rest.
In India where common man spend there whole life in just earning his life necessities.Government is not at all concern about other threats to National Security
Nation Cyber Security policy of India is not under progress at all its just few pages of line written to finish the formalities of making Nation Cyber Security Policy.
While other countries have capabilities of tracking each and every person's whole life at any time , anywhere, in such era of surveillance we are still sitting far behind and waiting for any terrific act to happen. 
In India we never take precautions its in out habbit now for example
Mumbai Attack 26/11
So after Mumbai Attack government took following measures(remember after).
Government has planned to buy 36 speed boats to patrol the coastal areas, and several helicopters for the same purpose. It will also create an Anti-Terror force known as the Force One. and a anti- terrorism bill passed in Parliament that's all.
Mumbai attack could have been stopped if security agencies would have a clean way to share tracked emails information gathered by CIA, and British Secret Service 
Before that India Police was just quiped with a wooden stick to deal with any threat on our homeland. NSG (National Security Guard ) operation on Taj Hotel was so confidential and effective that its being broadcast live on all T.V channels so that master planner in Pakistan can give there commands easily.
 ---------------------------------------lets come to Cyber Terrorism------------------------------------
Such attack or riplica of such attack now can be done online from thousands of Kilo-meter away with just few person to handle attack, cyber Terrorism is not a kind of thing where you need thousands of hundreds of peoples to carry out an attack. A single Blackhat Hacker can damage our IT infrastructure like any group of terrorist which consist of 500 men.

Every months millions of sites are defaced by Unethical Hacker and Scriptkiddes from Several countries like USA, Europe, Brazil, Turkey, China, Pakistan, Bangladesh, Algeria and UAE.
according to Offical report submitted in Parliament 9,174 Indian websites were hacked by various hacker groups from different parts of the world till May 2014. 62,189 security incidents were reported during the same period to the Indian Computer Emergency Response Team (CERT-In).

The offensive and defensive cyber security capabilities of India are still missing.

Sophisticated Malware like Stuxnet & Duqu have already proved that Critical IT Infrastructures around the World like:-
 Power Grids,
 Nuclear Facilities,
 Satellites,
 Defense Networks,
 Governmental Informatics Infrastructures,
 etc... are vulnerable to diverse range of Cyber Attacks. The Reality is that Cyber Attacks are affecting Indian Critical Infrastructure even now at this moment and we are not even aware of that threat we don't even know whats happening in our cyber-space other countries have there own network traffic analysis centers where all the computer internet traffic is analysed regularly to detect any abnormal threat online.
for example any DDos Attack.

India have following sleeping Organisations and Authorities for Computer and Cyber Security

  • Datasecurity Council of India- www.dsci.in
  • National Critical Information Infrastructure Protection Centre NCIIPC
  • Cyber-society - www.cysi.in
  • Indian Computer Emergency Response Team (CERT-In)

most of time the work they do is just to report any incident.

DRDO- DEFENCE RESEARCH & DEVELOPMENT ORGANISATION of India does not even have a single project on Computer security, they don't have field near to Cyber Security 


 According to brief given by wikipedia on new National_Cyber_Security_Policy_2013
In short, India is not at all cyber prepared despite the contrary claims and declared achievements and the cyber security policy is just another policy document with no actual implementation and impact.The cyber security challenges in India would increase further and immediate action is required in this regard.

 According to report on Critical Infrastructure Security in india by Rajabahadur V. Arcot
this can be downloaded from here.
       Computer Emergency Response Teams (CERT) are regularly
issuing alerts about the vulnerabilities, it is annoying to find that even the website of its Indian counterpart (CERT-In) is not accessible most of the time. In matters such as the cyber security threats to the country’s critical infrastructure industry.

 According to article of Praveen Dalal about -Cyber Security Challenges Before The Narendra Modi Government-
There are no dedicated cyber security laws in India. Indian government has drafted thecyber security policy of India 2013 but the same has not been implemented so far. Further, the policy is also suffering from many shortcomings including lack of privacy and civil liberties protection and absence of cyber security breaches disclosure norms. The cyber security trends of India (PDF) have also shown poor cyber security preparedness of India to protect its cyberspace and critical infrastructures.

What can be done in this situation?
well first of all we need to invoke our government attention towards this issue which is very important, the current condition of Indian cyber space is very fragile if anyone attack on right place at right time his efforts can leads to a catastrophic results on our national security.
   Imagine a day when mobile phones, telephone not working , no trains available, banks not functioning, Stock Exchange Market crashed, all the communication methods fails , and military satellites becomes useless, Internet access unavailable. this is not joke if you are still not frighten then imagine condition of any nation with such situation no doubt nation will collapse in a week.

Solution to all this India has to develop its own defensive and Offensive Capabilities for such purpose.


Indian Government has to laid a foundation of National Research lab on Cyber- Security and National Security like :-

and We need to build a National Cyber Command Center to defend and prevent our Cyber space.

big thanks to http://cybersecurityofindia.blogspot.in/ f

or guidance
please share this article as much as you can .....

Tuesday, 9 December 2014

Process Management from Linux Command Line


Process Management from Linux Command Line


Running a foreground application you can use terminal or icon from launcher




you can use command <app name> bg to keep running it in background
i.e.. artha bg

or you can bring any background running application on screen by doing same type <app name> fg
i.e.. artha fg

Top


Top command provide a system stat view, The top program provides a dynamic real-time view of a running system. It can display system summary information as well as a
list of processes or threads currently being managed by the Linux kernel.


kill

kill - The kill command will kill a process using the kill signal and PID given by the user. To use the SIGKILL signal with "kill", type one of the following for a process with a PID of 0710.

To view all the current processes from your teminal type command

ps -A


scroll around and choose the process which you want to kill and notice its Pid
(PID- its is the process Id, every process running in Linux have a certain Id its mostly a integer value.)
Use the following command to kill that particular process:-
kill -9 <pid> for example kill -9 0710


If you want to know pid of specific application then use this command pidof <appname>

i.e.. pidof firefox 

kill -SIGKILL 0710

kill -L

List the available signal choices in a nice table.
kill -9 -1

Kill all processes you can kill.

killall - The killall command kills all process with a particular name .
killall -9 firefox

pkill 

pkill- This command is a lot like killall except it allows partial names. So, "pkill -9 unity"

ps -aux | less


As the list of processes can be very long, the output of ps -aux can be piped (means transferred) to the less command, which lets it be viewed one screenful at a time. The list can be advanced one screen forward by pressing the SPACE bar and one screen backward by pressing the b key in above command.

The pstree command can also be a useful tool for finding offending processes. this command displays the names of all processes on the system in the form of a tree diagram, thatshow showing all of their parent/child inter-relationships. When used with its -p option, pstree also shows the PIDs of the processes, i.e.,
pstree -p | less

pstree can simplify terminating a series of related processes (i.e., a process and all of its descendants) because it makes it immediately clear which process is the parent; all that is necessary is to kill the parent in order to also terminate all of its descendant processes. That is, it is not necessary to manually search through a list of processes to find and individually terminate each one as would be necessary using ps.

Because Unix-like operating systems and many of their application programs are inherently very robust (i.e., stable and resistant to crashing), it is not necessary to use the kill command as often as it is to terminate programs or reboot on some other operating systems. May be anytime you want to close a application but its not responding then you can simply use this kill command to kill it instead.




Note that "ps -aux" is distinct from "ps aux". The POSIX and UNIX

standards require that "ps -aux" print all processes owned by a user

named "x", as well as printing all processes that would be selected by

the -a option. If the user named "x" does not exist, this ps may

interpret the command as "ps aux" instead and print a warning.

To see every process on the system:-
ps -e ps -ef ps -eF ps -ely

To see every process on the system using BSD syntax:-
ps ax ps axu

To print a process tree:-
ps -ejH ps axjf

To get info about threads:-
ps -eLf ps axms

To get security info:-

ps -eo euser,ruser,suser,fuser,f,comm,label ps axZ ps -eM

To see every process running as root (real & effective ID) in user

format:
ps -U root -u root u

Nice 

nice - run a program with modified scheduling priority
nice -n 'Nice value' process name

nice -n 19 firefox
 type man nice in terminal to know more.

Proper way to install nvidia 390 fix error

Proper way to install nvidia 390 if you see any error in the process look below; command  sudo apt purge --autoremove '*nvidia*...