Sabtu, 08 Oktober 2011

Hilangkan Key Logger

Masuk START pilih RUN kemudian ketik “RUNREFOG”. Jika muncul pesan “windows cannot find runrefog”, windows tidak menemukan runrefog/keylogger brarti aman. Tapi jika muncul sbuah window yg meminta password, hati-hati itu adalah keylogger. Bisa juga tidak memiliki password.
Bagaimana Cara menghilangkannya,,???
Hilangkan dulu password keylogger, dengan cara sbb:
  1. Masuk jendela RUN
  2. Ketik : %allusersprofile%\Application Data\MPK
  3. Cari file ini S0000 kemudian hapus.
· Jika Sudah d hapus, brarti keylogger sudah bisa di buka.
· Masuk RUN dan ketik RUNREFOG
· Softaware keylogger dah terbuka. Uninstall software, dan ikuti tahapannya..

moga ada manfaat,,haha
Seumpama :
  1. SSH (Partisi LVM)
  2. Konfigurasi Network
  3. DHCP ke eth1
  4. Aktifkan NAT dengan IPTABLES
  5. SQUID
  6. Aktifkan NAT dengan IPTABLES transparan port 3128
  7. SELESAI

1. MOUNTING
    # apt-cdrom add

2. Set IP Address eth0 dan eth1.
    Pengisian :
    Eth0 terhubung ke Modem ADSL IP 10.10.10.1
    Eth1 terhubung ke Jaringan Lokal / client internet
    Set eth0 dengan IP 10.10.10.15 dan eth1 dengan IP 192.168.50.1

    # nano /etc/network/interfaces
    auto eth0
    iface eth0 inet static
    address 10.10.10.20
    netmask 255.255.255.0
    network 10.10.10.0
    broadcast 10.10.10.255
    gateway 10.10.10.1
    # dns-* options are implemented by the resolvconf package, if installed dns-nameservers 10.10.10.1

    auto eth1
    iface eth1 inet static
    address 192.168.50.1
    network 192.168.50.0
    netmask 255.255.255.0
    broadcast 192.168.50.255

3. Mengaktifkan NAT
    Konfigurasi Routing IPTABLES
    # nano /etc/rc.local
    ** Masukkan rule iptables untuk share internet dari eth0 ke eth1.
# iptables -t nat -A POSTROUTING -s 192.168.50.1/24 –d 0/0 -j MASQUERADE

**Mengirim dari port 80 lalu lintas web ke squid (transparent) proxy (setelah squid terinstall)
# iptables -A PREROUTING -t nat -i eth1 -s 192.168.50.0/24 –p tcp --dport 80 -j REDIRECT --to-port 3128

Aktifkan nat
# iptables –L -t nat

** Lalu hilangkan tanda pagar (#) yang ada di depan komentar berikut :
# nano /etc/sysctl.conf
#net.ipv4.ip_forward =1
# sysctl –p

Di restart..
# /etc/init.d/networking restart

4. DHCP
#apt-get install dhcp3-server
#nano /etc/default/dhcp3-server
Cari baris : INTERFACES=”eth1”

#nano /etc/dhcp3/dhcpd.conf
Hapus, ganti dg script
subnet 192.168.50.0 netmask 255.255.255.0 {
range 192.168.50.2 192.168.50.254;
option domain-name-servers 10.10.10.1;
option domain-name “dikdik.sch.id”;
option routers 192.168.50.1;
option broadcast-address 192.168.50.255;
default-lease-time 600;
max-lease-time 7200;
}

# nano /etc/resolv.conf
Isi dengan script
name server 10.10.10.15
search 192.168.50.1

#/etc/init.d/dhcp3-server restart

Cek DNS server
# nano /etc/resolv.conf

5. SQUID
# apt-get install squid
Backup file asli squid untuk jaga-jaga..
# cd /etc/squid
# cp squid.conf squid.conf.iksu

File konfigurasi squid ada di
# nano /etc/squid/squid.conf
Cari dan tambahkan script berikut
http_port 3128 transparent
icp_port 3130
cache_mgr dikdik@iksu.cch.id
Cari kata INSERT YOUR kemudian dibawahnya kita tambahkan
acl dikdik src 192.168.50.0/24
http_access allow dikdik

Cari kata acl CONNECT kemudian dibawahnya kita tambahkan
acl url dstdomain "/etc/squid/blok.txt"
no_cache deny url
http_access deny url

#nano /etc/squid/blok.txt
Masukan script berikut.

#chown -R proxy.proxy /etc/squid/blok.txt

Restart # /etc/init.d/squid restart

6. Aktifkan NAT dengan IPTABLES transparan 3128
# iptables -A PREROUTING -t nat -p tcp –dport 80 -j REDIRECT –to-port 3128
# /etc/init.d/squid start

Senin, 09 Mei 2011

Arti Hidup Menurut Islam

Agar kita tidak memahami arti hidup secara dangkal, kita harus kembali memahaminya dari sumber atau rujukan yang benar, yaitu Al Quran dan Hadits shahih. Tentu saja, jika kita menggalinya lebih dalam menurut Al Quran dan Hadits akan menjadi pembahasan yang panjang. Yang akan saya tekan disini ialah, kita jangan menyerahkan pemahaman dari sumber yang tidak jelas tidak pasti. Pemahaman yang salah bisa mengubah kehidupan kita, bahkan kehidupan kita nanti di akhirat. Pada intinya, arti hidup dalam Islam ialah ibadah. Keberadaan kita dunia ini tiada lain hanyalah untuk beribadah kepada Allah. Makna ibadah yang dimaksud tentu saja pengertian ibadah yang benar, bukan berarti hanya shalat, puasa, zakat, dan haji saja, tetapi ibadah dalam setiap aspek kehidupan kita.
“Dan Aku tidak menciptakan jin dan manusia melainkan supaya mereka menyembah-Ku.” (QS Adz Dzaariyaat:56)
Ibadah… inilah arti hidup sesungguhnya.

slengkap ea lihat di http://www.motivasi-islami.com/arti-hidup/ dari Bapak Rahmat.

Jumat, 28 Januari 2011

Ringkasan ini tidak tersedia. Harap klik di sini untuk melihat postingan.

Kamis, 20 Januari 2011

PENGATURAN SERVER DEBIAN


Misal                    : 200.200.20.0/29
Nama Host           : server
Nama Domain      : iksu.co.id

# # LANGKAHNYA
*    Rakit PC Server dan Router
*    Install debian di server
*    Install debian di router
*    Install laptop + driver
*    Konfigurasi Acces Point
*    Interkoneksi
A.   Komfigurasi IP Address Server, host, Resolver DNS
# nano /etc/network/interfaces
Auto eth0
Iface eth0 inet static
Address 200.200.20.1
Netmask 255.255.248
Network 200.200.20.0
Broadcast 200.200.20.7
# nano /etc/hosts
200.200.20.1 server.iksu.co.id server
# nano /etc/resolv.conf
Search iksu.co.id
Nameserver 200.200.20.1
# /etc/init.d/networking restart
# ping 200.200.20.1
# ping server.iksu.co.id
B.   Konfigursi Repository
# apt-cdrom add
          Masukan cd satu-satu sampai selesai
C.   Install DHCP
# apt-get install dhcp3-server
# nano /etc/defaultdhcp3-server
          Cari baris : INTERFACES=”” à INTERFACES=”eth0”
# nano /etc/dhcp3/dhcpd.conf
          Hapus seluruh isi file, masukan script :
subnet 200.200.20.0 netmask 255.255.255.248 {
  range 200.200.20.2 200.200.20.6;
    option domain-name-servers 200.200.20.1;
    option domain-name “iksu.co.id”;
    option routers 200.200.20.1;
    option broadcast-address 200.200.20.7;
    default-lease-time 600;
    max-lease-time 7200;
# /etc/init.d/dhcp3-server restart
D.   Install DNS
# apt-get install bind9 dnsutils
# nano /etc/bind/named.conf
          Cari dan ketik :
zone “iksu.co.id” {
type master;
file “/etc/bind/db.iksu”;
};
zone “20.200.200.in-addr.arpa” {
type master;
file “/etc/bind/db.200”;
};
# cd /etc/bind
# ls
# cp db.local db.iksu
# cp db.127 db.200
# nano /etc/bind/db.smk
$TTL 604800
@      IN      SOA  server.iksu.co.id.  root.iksu.co.id. (
2                  ; Serial
604800       ; Refresh
86400                   ; Retry
2419200     ; Expire
604800 )     ; Negative Cache TTL
iksu.co.id.             IN      NS              server.iksu.co.id.
iksu.co.id.             IN      MX   10      mail.iksu.co.id.

iksu.co.id.             IN      A       200.200.20.1
server.iksu.co.id.  IN      A       200.200.20.1
mail.iksu.co.id.     IN      A       200.200.20.1

www.iksu.co.id.   IN      A       200.200.20.1
data.iksu.co.id.     IN      A       200.200.20.1
ftp.iksu.co.id.       IN      A       200.200.20.1
# nano /etc/bind/db.200
$TTL 604800
@      IN      SOA  server.iksu.co.id.  root.iksu.co.id. (
1                 ; Serial
604800       ; Refresh
86400                   ; Retry
2419200     ; Expire
604800 )     ; Negative Cache TTL
;
iksu.co.id.             IN      NS              server.iksu.co.id.
iksu.co.id.             IN      MX   10      mail.iksu.co.id.

1        IN      PTR  iksu.co.id.
1        IN      PTR  server.iksu.co.id.
1        IN      PTR  mail.iksu.co.id.

1        IN      PTR  www.iksu.co.id.
1        IN      PTR  data.iksu.co.id.
1        IN      PTR  ftp.iksu.co.id.
# cd
# /etc/init.d/bind9 restart
# nslookup mail.iksu.co.id
# dig mail.iksu.co.id
# ping mail.iksu.co.id               (ulangi s/d semua tampil www,ftp,data)
E.    Install Webserver
# apt-get install apache2 mysql-server php5 phpmyadmin
# nano /etc/apache2/apache2.conf
          Cari baris terakhir, dan ketik:
# NameServer iksu.co.id
# nano /etc/apache2/sites-available/default
          Buat di baris paling bawah

<VirtualHost *>
          ServerAdmin root@iksu.co.id
          ServerName data.iksu.co.id

          DocumentRoot     /var/www/data
          <Directory /var/www/data/>
                   Options FollowSymlinks
                   AllowOverride None
          </Directory>
          <Directory /var/www/data/>
                    Options Indexes FollowSymlinks Multiviews
                   AllowOverride None
                   Order allow,deny
allow from all
</Directory>
</VirtualHost>
# a2ensite default
# mkdir /var/www/data
# chmod 777 /var/www/data
# nano /var/www/data/index.html
          Isi pakai script web
<html>
<title> iksu_dhe_ia,! </title>
<body bgcolor="cuy">
<marquee> <strong>
<font color="red" size=9 face="chiller">
"selamat datang"<------->"www.iksu_dhe_ia.com"
</font> </strong> </marquee>
<br> Nama : DIKDIK SUPRIYADI </br>
<br> NIS    : 080910088 </br>
</body> </html>
# nano /var/www/data/test.php
          Isi script test.php
<?
Phpinfo ();
?>
# etc/init.d/apache2 restart
          Ujicoba di client pake browser dg alamat:
http://iksu.co.id
http://www.iksu.co.id
http://data.iksu.co.id
http://www.iksu.co.id/test.php
# a2enmod dir
# mkdir /etc/skel/public_html
# mkdir /etc/skel/Maildir
# adduser admin
          Masukan keterangan username dan passwordnya
# /etc/init.d/apache2 restart
          Ujicoba di client pake web browser dg alamat:
http://www.iksu.co.id/~admin
F.     
Install Mail Server
# apt-get install postfix courier-pop courier-imap php5-imap
# nano /etc/postfix/main.cf
# /etc/init.d/postfix restart

Selasa, 18 Januari 2011

IP TabLEs

 














IP TABLES TUTOR
 
iptables is a tool used in linux distributions to control kernel's netfilter's firewall. Here is a tutorial on iptables.

iptables firewall contains 3 tables, every table contains chains. Those chains are default. User is able to define new chains and link from default chains to those user defined chains.


1. iptables tables
--------------------
iptables contains 3 tables:
a. filter table
b. nat table
c. mangling table


a. filter tableThis table is used to filter packets that pass the firewall. Its purpose is only packet filtering, and will filter packets that comes to the machine (incoming), packets that goes out (outgoing) and packets that are forwarded between network cards (filtering), in case that machine has two or more network cards.

That table contains 3 chains: INPUT chain, OUTPUT chain and FORWARD chain.

INPUT chain -
used to filter incoming packets
OUTPUT chain - used to filter outgoing packets
FORWARD chain - used to filter forwarded packets (between network cards).

b. nat tableThis table is used to change source of the IP.
PREROUTING chain - used to change IP before forwarding take place
POSTROUTING chain - used to change IP after forwarding take place
OUTPUT chain - used to filter on outgoing

c. mangle
This tables is used to modify packets.


2. Syntax of a iptables rule:

------------------------------------
iptables name_of_table name_of_chain layer3_object layer4_object jump_target

Notes:
- by default if name of table is not specify (with "-t nat" for example, for nat table, or "-t mangle" for mangle table), default table is used: filter table;
- layer4_object is not mandatory;

iptables Examples:
iptables -A INPUT -s 192.168.0.1 -j DROP       # will drop all packets that comes from IP 192.168.0.1


3. Chain management
-----------------------------
List tables and chains:
iptables -L                                   # will list all rules from all chains from filter table
iptables -L -v #                            # will list all rules from all chains from filtering table, in verbose mode,
                                                    # showing also packets and bytes that matched that rules
iptables -L -v --line-numbers       # will show above and also rule numbers

iptables -L INPUT                        # will show all rules from INPUT chain from filter table

iptables -L -t nat                          # will show all rules from all chains from nat table
iptables -t nat -L PREROUTING   # will show all rules from PREROUTING chain from nat table

iptables -L -t mangle                   # will show all rules from all chains from mangle table


Adding rules to chains:
To add a rule to a chain use:
iptables -A INPUT -s 192.168.0.1 -j ACCEPT     # will allow traffic from source IP 192.168.0.1
iptables -A INPUT -p tcp --dport 22 -j DROP      # will drop all traffic to destination port 22 (our ssh port)

iptables -A will append rule at the end of rules list  in your specified chain. if you want to insert a rule on a specific position in your chain, then you must use -I.

iptables -I INPUT 1 -s 192.168.0.1 -j ACCEPT    # will add rule in position 1 in your INPUT chain
iptables -I INPUT 10 -p tcp --dport 22 -j DROP   # will add a rule in position 10 of your INPUT chain.

Rules are evaluated from first to last rule. On ACCEPT or DROP rules, if a rule is matched, it will not be evaluated to next rules.

Note 1:  if you want to block traffic that comes to your machine you must add rule on INPUT chain. If you want to block traffic to a destination IP from your machine you must add rule in OUTPUT chain. Also you must have networking knowledge and you must understand how firewall works.

Note 2:
Each chain have a default policy. Policy can be ACCEPT or DROP, by default all CHAIN have ACCEPT policy.

Note 3: When adding a rule -j parameter (jump) can have the following values: ACCEPT, DROP, REJECT, DENY, LOG.

Delete all rules from all chains:iptables -F                                 # will delete all rules from filter table
iptables -F -t nat                       # will delete all rules from nat table
iptables -F -t mangle                 # will delete all rules from mangle table


Deleting a rule from a chain:
To delete a rule from a chain you have two posibilities: to delete a rule using rule number or to delete using syntax used when rule was added:

iptables -D INPUT 10                          # will delete rule 10 from INPUT chain
iptables -D PREROUTING 10 -t nat     # will delete rule 10 from PREROUTING chain from nat table

iptables -D INPUT -s 192.168.0.1 -j ACCEPT      # will delete rule that was added with iptables -A INPUT -s 192.168.0.1 -j ACCEPT

Note: On our previous example, the first rule that match that syntax will be deleted. If are many similar rules, only first will be deleted. To delete all rules that match that syntax, you must use previous command multiple times until you delete all rules.

To delete all rules you can also use (on some old versions of linux, it will not work with -F but with --flush, because of some bugs):
iptables --flush

Saving / Restoring iptables rules:
iptables-save >rules.txt
iptables-restore <rules.txt

(If iptables is not in your path, you can use absolute paths: /sbin/iptables-save, and /sbin/iptables-restore).
Running iptables-save will output rules on standard output (usualy this is screen, so because of that you must use redirections).

4. Chain policy

As I said previously, each chain have a default policy that can be ACCEPT or DROP and by default all CHAIN have ACCEPT policy.
To change chain policy use:

iptables -P INPUT DROP

Note 1: If you are logged to your machine remotely via SSH (and you are not at console) be careful when you change default policy to drop, to not lock you out. Usualy when sysadmins tests firewall remotely it is a good practice to add to your CRON service a rule that will open the firewall, and you enable that script to run every half an hour or 15 minutes, so if you will lock out of your box, after 15 minutes the firewall will be opened.

Note 2: When you design firewall rules to allo access to your machine and block everything else, take in consideration that traffic goes both ways. If you allow traffic on INPUT chaing but your OUTPUT chain block everything, your rule will not work. Usualy is a good practice when you protect your machine to allow everything on OUTPUT ( you want to be able from your machine to do anything), and block everything on INPUT (incoming) for connections that are not initiated from your machine. If your machine run public services, like for example a web server, or a mail server then you must allow connections from outside on INPUT only on ports used by those services (for example allow incoming on port 80 - http, port 25 - smtp, port 110 - pop3 and 143 -imap, mail services.) So as a conclusion when you design your firewall, setup your default policy on INPUT to drop all packets and on OUTPUT leave it default, to allow everything. And then design your firewall.

Note 3: If your machine is not only connected to Internet, but is also a router for your LAN clients, then you must also filter connections from LAN. It is recommended to change policy on FORWARD chain to DROP and then allow only IPs you want from LAN to be able to access Internet.