Friday, December 30, 2011

Install Xen 4.1 on ubuntu 12.04

Ubuntu support xen officially from 11.10 version. But there is some issue while creating DomU. Here you can find some easy step to configure xen 4.1 on 64 bit version of ubuntu 12.04 and solve issue in DomU creation.

1. Install xen and utilities
$sudo apt-get install xen-hypervisor-4.1-amd64 xen-utils-4.1 xenwatch xen-tools xen-utils-common xenstore-utils
$sudo apt-get install virtinst
$sudo apt-get install virt-viewer virt-manager

2.Restart OS and Select Xen Kernal
Verify the Xen installation using


$sudo xm info

If this command does not return any error, then the installation is correct.

3.Xend Configuration
Edit
/etc/xen/xend-config.sxp and uncomment this line

(xend-unix-server no)

and change to
(xend-unix-server yes)

Edit .bashrc file using

#vi ~/.bashrc
, add the following line:
export VIRSH_DEFAULT_CONNECT_URI="xen:///"

4. Restart OS and Select Xen Kernel

Verify libvirt Installation

$sudo virsh version 

Compiled against library: libvir 0.8.3
Using library: libvir 0.8.3
Using API: Xen 3.0.1
Running hypervisor: Xen 4.0.0
If got output like this, you have installed every package correctly.
5.Creating VM using virt-manager
Here I am telling about virtual machine creation using virt-manger
Type $sudo virt-manager for getting GUI for virt-manager
Create new VM using virt-manager(Learn More)
Solution for common error during DomU is given below..
1. Show Something like this
Fix it using
$sudo mkdir /usr/lib64/xen -p
$sudo cp /usr/lib/xen-4.1/* -r /usr/lib64/xen/
2. Get like this
Solve it using
$sudo mkdir  /usr/share/qemu
$sudo cp -r /usr/share/qemu-linaro/keymaps /usr/share/qemu/

Sunday, November 20, 2011

How To Disable Guest Session in Ubuntu 11.10 Oneiric Ocelot

Ubuntu 11.10 added guest account by default.This is the part of new display manager lightDM. To disable his feature follow the below step

1. Open terminal
2. Type ' sudo vi /etc/lightdm/lightdm.conf ' .Then you got a file like this

[SeatDefault]
greeter-session=unity-greeter
user-session=ubuntu


3. Add the line 'allow-guest=false' to the end of the file
4. Save file and exist
5. Reboot your system or restart lightdm service using “sudo restart lightdm” command


For video demonstration visit: http://www.youtube.com/watch?v=qBmF6rZCYh8

Sunday, July 24, 2011

Mount Virtual Box Image in Ubuntu

VirtualBox provides a tool called vdfuse, which is a FUSE-based filesystem package that can mount any VirtualBox VDI image.It support VDI, VMDK, VHD and raw format

Install vdfuse package using the following command

$ sudo apt-get install virtualbox-ose-fuse

You can now mount the VDI file like this:

$ sudo vdfuse [options] -f /path/to/file.vdi /path/to/mountpoint

The options are

-h help
-r readonly
-t specify type (VDI, VMDK, VHD, or raw; default: auto)
-f VDimage file
-a allow all users to read disk
-w allow all users to read and write to disk
-g run in foreground
-v verbose
-d debug

This command creates file like 'EntireDisk', 'Partition1', etc at the mount point.

To mount the filesystem, just use:

mount /path/to/mountpoint/Partition1 /path/to/someother/mountpoint

Then view the file system at /path/to/someother/mountpoint

Tuesday, April 19, 2011

Whitepaper on Getting Started With Eucalyptus Cloud

Abstract

Cloud computing is a new area of computation systems which provide users with access to large amounts of computer resources and data. The principle behind the cloud is that any computer connected to the internet is connected to the same pool of computing power, applications, and files.Eucalyptus is an open source cloud computing framework provide Infrastructure as a Service(IaaS). It can be used to create private and public cloud.It provides an EC2-compatible cloud computing platform and S3-compatible cloud storage platform.
Download full Pdf

Error

1. While installing os to image file, system crash by showing the error "there is no enough space on hard disk" but already system has 10GB memory
2. While accessing eucalyptus community cloud, port is not opened

Wednesday, March 16, 2011

Whitepaper on Misuse and Anomaly Based Model For Botnet Detection

Abstract

Today bot and botnet become the primary platform for various types of attacks in the internet. Because of this reason, there are many types of detection mechanisms that are proposed to detect the bot activity. These detection mechanisms are based on common malware detection model. Most of the existing systems uses two types of models – misuse and anomaly based. In misuse detection model, the system detects the attacks based on known signatures where as, in anomaly detection model it is based on abnormal behaviour of the system. Both these methods have its own advantages and disadvantages.

Download pdf

Saturday, January 8, 2011

Kollam cyber cell visit



Date: 29 December 2010

Team Members: Jinesh M.K, Manu R Krishnan, Vinitha V Prabhu, Shyju Mol

What is cybercrime?

Any crime which is done using devices which have an IC (Integrated Chip) is termed as a cybercrime. So comes the doubt that is taking a photo in a mobile phone is a crime or not? According to cyber law it is not actually a crime, but capturing, editing and transferring is a crime

Procedures to complaint a cyber crime

Initially we have to give written complaint to our nearest local police station,but not directly to cyber cell. If the complaint comes under cyber law, then it will be forward to cyber cell.
The main aim of cyber cell is to just assist the investigation team having technical support.

Main area of crime they handle?

Most of the crime they handle is based on mobile phones and computer. But because of infrastructure limitations in the district cyber cell, they will handle only crime related to mobile phones.

How do victims can help in the investigation?

“Crime may be any type,but only with victim’s help , investigation can be speed up”.
If we take an example, cybercrime related to mobile phone.ie when we lose our mobile phone, IMEI(type *#06#) number of our mobile phone will help cyber cell team to find the phone easily.
So it will be better to save IMEI number of your mobile in secure place (not in your mobile phone)

Cyber cell team in the crime scene

In the case of computer system
1. If it’s working, pull down CPU power cable(Why? post your comment)
2. Seize and seal all the connected devices along with that system in the presences of a witness having computer knowledge
3. Send all this devices to responsible authority for analysis

Who are these authorities?

C-DAC and cyber forensics lab.

How to find the accused?

Let us take an example: suppose a person’s account get hacked and post bad comments, or send fake mails ,then according to victim’s complaint the cyber team will contact with corresponding service providers and get login details, ip address and location of machine. If it is an internet café, then with the register team will find the accused and if it is a home then with the house owner team can find who were the visitors of his computer.

What will do if accused is giving fake address?

Actually the cyber team states that the internet café staffs has to check the identity of each person entering to the café. Now a day’s no one is following this rule .But if the location to find the accused is a internet café then the owner of café will be arrested along with the accused.

What will do if accused is giving spoofed ip (fake ip)?

In all our mail servers like yahoo, gmail, there is an option called full header option. when we go through that option we can find the path through which the mail has arrived.