[Managers] 2 Tips For Managers

I was talking to a very young manager at a startup the other day and this article jists down the facts i learned from this Young Manager who happens to be a girl. These tips can help you gain more respect from your fellow peers and subordinates.

As a Human Being we all yearn for two things and these two things should be the basic qualities of every manager. 

1.) We all Wish to be Acknowledged for the Good Deeds that we do. So if you are manager reading this post, it gets important that you acknowledge the contributions of your fellow teammate(s). There are a lot of ways of doing so and it all depends on how you wish to acknowledge your fellow peers and subordinates.

 

Being Acknowledged and Cared for are the qualities every manager must possess

Image: Being Acknowledged and Cared for are the qualities every manager must possess

2.) We all Wish to be Cared For. This is another human tendency which all managers should be considerate about. We all wish to be cared for, especially during the times of distress. So in today’s gloomy economical environment, if you wish to get more respect from your fellow peers, start caring for them. You will surely get to learn a lot about them.

There definitely can be more tips, but this post was specifically meant to share my learnings after having met this charismatic lady at a startup event yesterday.

Advertisements

Amazon’s discount stores open up for Black Friday

Black Friday brings with it huge discounts for shoppers at Amazon.com . If you have been waiting for days to buy that gadget or that wonderful book, this is the time. 

Amazon's black friday deals are now open.

Amazon

For those of you who are not aware of Black Friday, Black Friday is the Friday after Thanksgiving in the United States, where it is the beginning of the traditional Christmas shopping season. Since Thanksgiving falls on the fourth Thursday in November in the United States, Black Friday may be as early as the 23rd and as late as the 29th of November.

Unlike few years back when people didnt have broadband at home and used to wait till the Monday ( which eventually was named as Cyber Monday), now dealers and store owners bring up huge deals for buyers.

Check out the Amazon Black Friday Deals page.

Also Read: [How-To] Stay safe while surfing from a Cybercafe

Spoofing Explained : Another attempt to cover Hacking fundas

You can follow me on Twitter at http://twitter.com/vaibhav1981

Do stay tuned to Technofriends for more, one of the best ways of doing so is by subscribing to our feeds. You can subscribe to Technofriends feed by clicking here.

Cheers

Vaibhav Pandey

[How-To] Create Powerpoint Presentation in Five Minutes

This post talks about creating Powerpoint Presentations in relatively very less time. Below is an embedded video from Youtube which talks very clearly about creating Powerpoint presentations using in-built templates and SmartArt.

Another interesting post worth having a look at is available at Lifepal, it talks about Creating Powerful Powerpoint Presentation by Nancy Duarte.

Some point to note when you go in for the presentation

1.) Remember to KISS, i.e. Keep it short and Simple.

2.) Use more of graphic than the text: More text means more attention diversion.

3.) Keep the humor going: Its important that while delivering presentation, you keep your Humor Quotient up. This helps the audience stay focussed.

4.) Practice makes a man perfect: Before you deliver your presentation, do rehearse it once in front of a mirror or some friends and seek feedback for further improvement.

Also read: Kingsoft Office 2007: Microsoft Office comes free « Technofriends

How-To: Copy and Align Shapes in Microsoft Powerpoint

You can also follow me on Twitter at http://twitter.com/vaibhav1981

Do stay tuned to Technofriends for more, one of the best ways of doing so is by subscribing to our feeds. You can subscribe to Technofriends feed by clicking here.

Cheers

Vaibhav

Some notes on Ethical Hacking

I will be writing here on this blog about some notes which i had prepared long back while understanding web application security and also the methodologies.

Web application security

Web application security and Ethical Hacking

What is Ethical Hacking?

Art and Science of determining vulnerabilities within the existing network architecture. The idea of Ethical hacking is to put yourself in the shoes of the hacker and access and monitor the flaws in your own network. It is used to determine the security flaws in the network before the hacker does by using similar tools and techniques as the hacker. If we go by what history has to tell us, Hackers have always been many steps ahead of network security professionals therefore it definitely makes a lot of sense to be prepared.

Types of Ethical Hacking

White Box: Full knowledge of the system. What this means is that you have full information about the system. i.e. you know what IP the database server is running on and what version of the operating system is running on that box etc. This makes it easy for you to learn about the various details and then fingerprint that very system.

Black Box: You have NO knowledge of the system infrastructure. As a Ethical hacker, this should be the one that can help you see things from a hacker’s perspective as you like the hacker doesnt have any initial knowledge about the system. ( Also read: Notes on Web Application testing)

Vulnerability Assessment: Usually done by using an automated script. The only negative is that your testing will be as good as your tool. The positive is pretty clear, you run an automated script which covers certain things and you are all set for those covered topics.

Penetration Testing: Comprehensive review of vulnerabilities, how to exploit those vulnerabilities and understanding how networks react to them.

Also, when talking to a lot of students who are new in the arena of web application development, i get a feeling that they want to know a lot about how hackers are able to do all “those things”. For such enthusiasts i would like to share some of the skills of a good hacker.

Skills of the Hacker
1.) Should possess Extensive Knowledge : This means that you need to know everything about everything. Though it sounds unrealistic, but this is true.
2.) Should already be a security expert in other areas ( like perimeter security etc).
3.) Should have experience as network or system administrator. The concept is pretty simple, you can’t hack a PBX box, if you don’t know how to operate one. Or you can’t hack a Linux/Unix box if you don’t know various Unix commands.
4.) Should have good working knowledge of various OS.
5.) Good understanding of ports, protocols and TCP/IP.
6.) You also need to have a good understanding of common security vulnerabilities and their fixes like buffer overflow etc.
7.) Good understanding of the various security tools and techniques.

Hope this posts helps in laying a foundation. In the coming posts, i will write more about how ethical hacking can help you know some of the most dreaded flaws that exist in your network. Stay tuned.

Also read: [Notes]: Web Application Security Testing

Hacking Ruby on Rails.

Learn to Hack )

Serial Numbers and CD Keys of Softwares brought to you by Google.

[How-To]Bypassing Passwords in Windows

You can follow me on Twitter at http://twitter.com/vaibhav1981

Do stay tuned to Technofriends for more, one of the best ways of doing so is by subscribing to our feeds. You can subscribe to Technofriends feed by clicking here.

Cheers

Vaibhav Pandey

[How-To] Access Computer Tutorials on VTC for Free

VTC.com offers an online university with numbers of screencast tutorials for anything related to computers. The tutorials are well compiled and are easy to understand.

Virtual Training

Virtual Training

Under a promotional offer, you could now get access to VTC.com tutorials for free. Digital Inspiration has the following process for accessing them for free

To get access to all these training videos for free, go to this sign-up page and enter coupon code “u5atr3alvtcfr33” (without quotes) in the field that says “FileMaker Promotional Code.” The old “rtm” code seems to have expired.

Officially, this will give you free access to the tutorials for a period of one week. Unofficially, you can always have more access by creating new user id’s.

Source: Digital Inspiration

Also read: Whos.amung.us gives you simple yet effective analytics

Kingsoft Office 2007: Microsoft Office comes free

[How-To] Send and Receive Faxes over the Internet for FREE

You can follow me on Twitter at http://twitter.com/vaibhav1981

Do stay tuned to Technofriends for more, one of the best ways of doing so is by subscribing to our feeds. You can subscribe to Technofriends feed by clicking here.

Cheers

Vaibhav

[Notes]: Web Application Security Testing

Being in the Web Application industry since 4+ yrs now, i have learnt quite a lot of things and this post is all about sharing some of my learnings on the Web Application Security Testing.

When talking abut Web Application Security Testing, there are two fundamental things to understand:

1.) Whitebox testing (a.k.a Code Review)
– The tester has access to source code, configuration files, and the actual
deployed application
2.) Blackbox testing (a.k.a Penetration Testing)
– The tester has access to the application’s end-user interface only and does all the testing based on what he/she sees as part of the interface.

In my honest opinion, out of these two methods of testing, Whitebox testing is always going to produce a more accurate result based on the fact that the source code is available. In this type of testing methodology, the testers are able to review data flows through the application from the presentation tier all the way through to the data access tier. Therefore, the results yielded from whitebox testing are going to be far more precise than the results gathered from blackbox testing.

Testing Web Application Security

Testing Web Application Security

For example lets take up a scenario, Assuming if there is a SQL injection vulnerability discovered in 50 different areas of a web application, a blackbox penetration-tester will identify 50 vulnerabilities ( based on different modules tested using the user interface) . However, in practise, there may be a single library that makes the database calls, which a whitebox tester can identify as one vulnerability.

In addition to the above, a whitebox review can reveal vulnerabilities in configuration and integration points.

For instance, an auction website might be communicating with a banking application to actually debit the winner’s bank account. A review of auction website application configuration files may uncover the location of the Bank’s web services endpoint, which you might explore for additional vulnerabilities.

Based on my experience with Web Application development i would suggest that anyone with a development background should perform a code review first, and then perform the blackbox penetration test. This will validate the earlier review.

For non-developers, the blackbox test is most appropriate.

Also read: Hacking Ruby on Rails.

Learn to Hack 🙂

You can follow me on Twitter at http://twitter.com/vaibhav1981

Do stay tuned to Technofriends for more, one of the best ways of doing so is by subscribing to our feeds. You can subscribe to Technofriends feed by clicking here.

Cheers

Vaibhav

Tips for preventing your laptop from getting stolen.

Laptop theft is one of the fastest growing problems in this age of Information Technology and Security. Who can forget the nightmare scenario that occurred at the U.S. Department of Veterans Affairs around 2006 May?
A department analyst loaded a file onto his laptop and took it home for the night, where burglars promptly walked off with it — along with identifying information on 26.5 million veterans. While the laptop was eventually retrieved, most are not.

Laptop theft prevention tips

I derive the motivation for this post from such incidents. In this post, lets learn about a few basic tips which can certainly prevent your laptop from getting stolen.

1. Visual deterrentsA laptop in the office environment should be secured with a lock or put into a secure locker when not in use. An opportunistic burglar could be put off by a lock as they have only a small window of time to get out before they are discovered.

2. Don’t make it obvious
you are carrying a laptop – Rather that a tell-tale laptop bag, laptops should be carried in inconspicuous bags, such as backpacks or tote bags.

3. Avoid leaving laptops unattendedLock them in cupboards or other secure facilities when not being used. If they must be left in a car, they should be covered up or locked in the boot.

4. Discourage theft by publicising the use of security products such as asset tracking software – If thieves think that they might be caught, they will be less likely to take it in the first place.

5. Add identification to your laptop
For example, adding barcodes or engraving details onto the device will act as a deterrent. Thieves usually steal laptops to immediately sell them on. Obvious identification makes it a less desirable target.

6. When flying, never check your laptop in as luggage
Laptops should be taken onto a plane as hand luggage. Be aware of thieves swapping briefcases coming out of the x-ray machine at security.

Also read: [How-To] Disable Simple File Sharing on Windows XP

[How-To] Recover lost Outlook PST Password

[How-To]Bypassing Passwords in Windows

Source: Astalavista

You can also follow me on Twitter at http://twitter.com/vaibhav1981

Do stay tuned to Technofriends for more, one of the best ways of doing so is by subscribing to our feeds. You can subscribe to Technofriends feed by clicking here.

Cheers

Vaibhav