Backdoor Found in Netsarang Server Manager Software

Articles, Updates
Cyber criminals always come up with more and more innovative methods and became more stealthy and lethal. Their techniques are getting more and more sophisticated and are not just limited to direct attacks. They are becoming more keen on corrupting the sources.   Recently, they have managed to inject malicious APT in the update process of a popular software package used by many reputed organizations in Finance, Media, Energy and Medical Industry. This advanced backdoor is an APT and resides in the system without detection unless someone activates it.   It took researchers only 17 days before they discovered it and dissected the process by which they have achieved it.   This secret backdoor is named "ShadowPad", this backdoor gives attackers complete control over networks hidden behind crytographically signed software…
Read More

Resetting CentOS6 Forgotten Password

Articles, Solutions
   " Resetting a Centos Forgotten Password" Although passwords must be kept safe but in case of losing linux's password a simple procedure can be followed to log in without password in order to change it. Simply follow the steps: 1. During boot at the screen where you are prompted to press any key. Press a key to come to the following menu     2. Pressing Enter will open another menu as given below highlight the kernel option and press 'e' 3. On the next menu simply insert "type single" or "init 1" in the next line or after a space in the given line as shown below.   4.  Pressing enter will take you back to the 2nd menu and simply press " b " which will boot…
Read More
Magento Store Migration

Magento Store Migration

Articles, Database, Solutions
Chapter 1: Preparing Backup   To prepare for migration first of all we need to take backup of the magento stores and their databases. All the generic terms used throughout this document i.e. user, password, db1, folder1 etc are to be replaced with actual data as these terms are used her for conceptual purpose only. All text which is in bold is the command used in linux CLI. In order to log in to the server which holds these files use any ssh client. Normally there is a client used for this purpose i.e. putty, or mRemote. Normally any client you use to ssh into any server needs the following information. Hostname or IP Username Password So, you ought to have this information before you can ssh into any server.…
Read More
MySql Database Access Remotely

MySql Database Access Remotely

Articles, Database
To Enable Mysql user to connect remotely via any programme (tested on Heidisql) OS: Ubuntu 12.04 LTS MYSQL: mysql  Ver 14.14 Distrib 5.5.31, for debian-linux-gnu (i686) using readline 6.2 To enable user to access the DB remotely from any IP first of all edit my.cnf i.e. choosing any editor nano /etc/mysql/my.cnf change the port bind address to the public address if you are using it from outside the network if being used locally put in the private address such as “ 192.168.1.xxx” bind-address = 107.170.x.xxx (public address) then connect mysql user with mysql –u ‘user’ -p  (where user can be whichever user you are using) after that simply give the following commands CREATE USER 'myuser'@'localhost' IDENTIFIED BY 'mypass'; CREATE USER 'myuser'@'107.170.xxx.xxx' IDENTIFIED BY 'mypass'; ( For access from a specified…
Read More

mRemoteNG confCons.xml Missing Problem

Articles, Solutions, Uncategorized
mRemoteNG confCons.xml Missing Problem   For some time now i have been using mRemoteNG and due to many reasons i like this software due to its remote access suite as i would call it. I came across this problem of mremote giving an error of "Cannot load due to confCons.xml missing from c:\users\xyz user\AppData\Roaming\mRemoteNG in windows 7. The simple remedy to this would be go to the above mentioned link. If you cannot see this folder then unhide folders from folder options. [caption id="attachment_89" align="alignmiddle" width="386"] Unhide Folders[/caption] The image on the right shows how to unhide folders from any windows explorer window. Simply put when you have unhidden folders you will see the above mentioned folder i.e. "AppData" in your users folder. Open that location and you will see…
Read More

MySQL Quick Tutorial for Mysql on Ubuntu

Articles, Database, Solutions
Databases have been here since the beginning of time (the IT Reveolution). The tutorial given below is a quick introduction of MySQL. Introduction Before we dive into working with MySQL, I want to explain a few things about MySQL and databases in general. If this is old news for you, feel free to skip on over. First, you might be wondering what the difference is between SQL and MySQL. SQL (which stands for Structured Query Language) is a programming language designed specifically for working with databases. Database servers that want to use SQL will implement the language specification. MySQL is one such database server; others include SQLite, PostgreSQL, Oracle, and SQL Server. It’s helpful to know how a database is structured. (It’s very simple, but it was by no means…
Read More

Saving Memory on Your Qmobile Smart Phone

Articles, Solutions
[caption id="attachment_20" align="alignright" width="300"] Qmobile A500[/caption] Saving Memory on your Qmobile Smart Phone As it appears Qmobile Smart Phones are capable of handling all day to day tasks people require from it but for reasons not unknown it keeps on consuming memory and it is a well known qmobile issue of being on "Low Memory" all the time. This is mainly because all the useless apps working in the background. Calm down .. take a deep breath; as it appears A500 is a model which does not even use the 4th core of its processor for anything and i mean it anything but we can make it dance and sing like a canary in no time. First of all make a list of all the useless apps such as dhingna,…
Read More

Techrevo Blog: Another Technology Blog

Articles, General
[siteorigin_widget class="SiteOrigin_Widget_Image_Widget"][/siteorigin_widget] This blog aims to focus on the rapid changing IT world around Pakistan, their strategic importance in the development of Pakistan's IT infrastructure; their implementation and upcoming technologies. With technology evolving around us everyday it has become a challenge for the IT community to cope up with changes by keeping themselves well read about issues surrounding technology; its implementation and the risks involving its usage. Along with the development this world has to grow responsibly without interrupting nature; hence, developing technology in such a manner that it should be environment friendly. Organizations around the world are going paperless to save more trees and forests whilst we are chopping them down for more paper and furniture. The solution lies in using Information Technology to your advantage which will help…
Read More