what is HTTPS

HTTP VS HTTPS
Hyper Text Transfer Protocol Secure (HTTPS) is the secure version of HTTP, the protocol over which data is sent between your browser and the website that you are connected to. The ‘S’ at the end of HTTPS stands for ‘Secure’. It means all communications between your browser and the website are encrypted. HTTPS is often used to protect highly confidential online transactions like online banking and online shopping order forms.

Web browsers such as Internet Explorer, Firefox and Chrome also display a padlock icon in the address bar to visually indicate that a HTTPS connection is in effect.

HTTP vs HTTPS
How Does HTTPS Work?
HTTPS pages typically use one of two secure protocols to encrypt communications – SSL (Secure Sockets Layer) or TLS (Transport Layer Security). Both the TLS and SSL protocols use what is known as an ‘asymmetric’ Public Key Infrastructure (PKI) system. An asymmetric system uses two ‘keys’ to encrypt communications, a ‘public’ key and a ‘private’ key. Anything encrypted with the public key can only be decrypted by the private key and vice-versa.

As the names suggest, the ‘private’ key should be kept strictly protected and should only be accessible the owner of the private key. In the case of a website, the private key remains securely ensconced on the web server. Conversely, the public key is intended to be distributed to anybody and everybody that needs to be able to decrypt information that was encrypted with the private key.

What is a HTTPS certificate?
When you request a HTTPS connection to a webpage, the website will initially send its SSL certificate to your browser. This certificate contains the public key needed to begin the secure session. Based on this initial exchange, your browser and the website then initiate the ‘SSL handshake’. The SSL handshake involves the generation of shared secrets to establish a uniquely secure connection between yourself and the website.

When a trusted SSL Digital Certificate is used during a HTTPS connection, users will see a padlock icon in the browser address bar. When an Extended Validation Certificate is installed on a web site, the address bar will turn green.

HTTPS Browsers
Why Is an SSL Certificate Required?
All communications sent over regular HTTP connections are in ‘plain text’ and can be read by any hacker that manages to break into the connection between your browser and the website. This presents a clear danger if the ‘communication’ is on an order form and includes your credit card details or social security number. With a HTTPS connection, all communications are securely encrypted. This means that even if somebody managed to break into the connection, they would not be able decrypt any of the data which passes between you and the website.

Benefits of Hypertext Transfer Protocol Secure
The major benefits of a HTTPS certificate are:

Customer information, like credit card numbers, is encrypted and cannot be intercepted
Visitors can verify you are a registered business and that you own the domain
Customers are more likely to trust and complete purchases from sites that use HTTPS

For More Information visit https://www.instantssl.com/ssl-certificate-products/https.html

Sites for progammer

http://www.studytonight.com
http://www.html5-tutorials.org/introduction-tohtml/the-structure-of-html/

Homepage


http://html.net/tutorials/
https://www.siteground.com/tutorials/joomla/
http://www.joomlashine.com/joomla-templates.html
http://j2eetutorials.50webs.com/
https://netbeans.org/kb/docs/javaee/ecommerce/

how to install kali linux side by side in window7/8

How to dual-boot Kali Linux 1.0.9 and Windows 7/8 on a PC with UEFI firmware

 
The last dual-boot tutorial on Kali Linux I wrote was back in March 2013 (see Dual-boot Windows 7 and Kali Linux), and that was on a computer with Legacy BIOS. That means it’s not a very useful guide if you wish to dual-boot a recent edition of Kali Linux and Windows 7 or Windows 8 on a computer with UEFI firmware.

So, following an exchange with a recent visitor to this site, I decided to make an attempt to dual-boot the latest edition of Kali Linux and Windows 7 on a computer with UEFI firmware. And since Windows 7 and Windows 8 share the same installer, it can also be used as a guide if Windows 8 is your choice of a Microsoft operating system.

The first attempt failed, but I quickly figured out why. So for the benefit of those who might want to do the same, this tutorial provides a step-by-step guide on how to get it done. If you are new to Linux and have never installed any distribution or attempted to dual-boot a Windows operating system and a Linux distribution, this guide gives you all you need to dual-boot Windows 7 or Windows 8 and the latest edition of Kali Linux on a computer with UEFI firmware. It will, however, help if you read A beginner’s guide to disks and disk partitions in Linux before attempting it.

By the time you’re through with this guide, you should have a computer with Kali Linux installed alongside Windows 7 or Windows 8 on the same hard drive, so that when you attempt to reboot into Kali Linux, the GRUB menu should look like the one shown in Figure 1.

Figure 1: GRUB menu of Kali Linux 1.0.9 showing entries for Kali Linux and Windows 7.
For that to happen, you’ll first have to download the latest edition of Kali Linux from https://www.kali.org/downloads/. The edition used for this tutorial is Kali Linux 1.0.9a, which has support for UEFI booting. After downloading it, transfer it to a USB stick (recommended) or a blank DVD. See this forum post for how to transfer it to a USB stick in Linux.

Related Post:  Kali Linux 1.0.7 review
You’ll also, of course, need a computer with Windows 7 or Windows 8 installed. The computer could be an OEM unit (store bought) or custom-built. Then you’ll have to shrink the C drive to create enough disk space that Kali Linux will be installed on. For this tutorial, I used a custom-built unit and installed Windows 7 on it. The hard drive is a 500 GB piece, so I recovered about 200 GB from it to use for Kali Linux. Figure 2 shows the partitions on the system as seen from the Windows 7 partition manager.

Figure 2: Windows 7 partitions as seen from the Windows partition manager. The C drive is highlighted.
And this is what it looks like after shrinking the C drive. See this forum post for help on how to shrink a Windows 7 or Windows 8 C drive. That Unallocated space will be used for Kali Linux. Note that on a store-bought computer, there’ll likely be more partitions than shown here. But that does not have an impact here because the only partitions that come into play are the C drive and the EFI System Partition. In Figure 3, that partition is the 100 MB partition.

Figure 3: Windows 7 partition manager showing the free recovered from the C drive.
Once you have all you need in place, insert the installation media (USB stick or DVD) into the appropriate place and reboot the computer. It should boot into the installation media if it was configured to boot from it. Otherwise, access the computers boot menu and select the entry that points to the UEFI-aware version of the installer. Figure 4 shows the entries on the boot menu of the computer used for this tutorial. The PNY entries are for the UEFI- and non-UEFI versions of the installer.

Figure 4: Entries on the boot menu of the test computer used for this tutorial.
After selecting the UEFI-aware version of the installer, you should be presented with the Kali Linux installer’s menu. Pressing ENTER should cause it to boot into the Live desktop. From there, launch the installer by accessing it from Applications > System Tools > Install Kali Linux.

Figure 5: Entries in the Kali Linux 1.0.9a install menu.
After the installer starts, click through the first few steps until you get to the step shown in Figure 6. All the entries sown here are the partition methods. The installation will fail if you select any automatic partitioning method, so select Manual and click Continue.

Figure 6: Partition methods of the Kali Linux installer.
You should now see a window with the disks connected to the system listed, along with their partitions. In Figure 7, the first three partitions are the Windows 7 partitions. Partition #1 is the EFI system partition, while partition #3 is the C drive. Below that is the Unallocated space that was recovered from the C drive. I’ll address the EFI system partition later, but for now, let’s install Kali Linux on that free space. To do that, double click on it.

Figure 7: Kali Linux install showing free space derived from the C drive.

Related Post:  Epidemic 3.1 installation guide
You should be presented with the entries shown in Figure 8. Select Automatically partition the free space, then click Continue. Or just double click it.

Figure 8: Kali Linux free space partition methods.
The next step lets you decide how many partitions the installer should create. The first option will cause the installer to create just two partitions – the root partition and another partition for Swap space. That’s recommended for new users, but if you want your home directory on a separate partition, select the next option. Whichever option you select, click Continue afterwards.

Figure 9: Kali Linux option to create a partition for /home.
Figure 10 shows the result of the last operation. Partitions #4, #5 and #6 are the newly created partitions. The partition number might not match with yours, but that’s not important. What’s now important is that you have to make a slight change to partition #1, the EFI system partition. To do that, double-click it.

Figure 10: Kali Linux system boot EFI partition
You need to change its Use as entry to something else, so double-click the Use as line and select EFI boot partition from the list of options you’re presented with.

Figure 11: The EFI partition is unset in Kali Linux Debian Installer.
If completed correctly, you should have a Use as line that looks exactly like the one shown in Figure 12. Click Done setting up the partition, then Continue.

Figure 12: The EFI partition must be set for installation to succeed.
If you neglected to complete the task in the previous step, the installation of GRUB will fail and the installer will show you the message just like the one in Figure 13.

Figure 13: The result of a failed GRUB installation attempt of Kali Linux.
This is the installer letting you know what its about to do. Select Yes, then click Continue.

Figure 14: Partitions to be created and formatted by the Kali Linux installer.
If installation completes successfully, you should get a message just like the oen shown in Figure 15. You may reboot the computer at this point.

Figure 15: The result of a successful installation of Kali Linux 1.0.9.
And be sure to remove the installation media else the computer will boot into the installer again.

Figure 16: Rebooting the Live system after a successful installation of Kali Linux 1.0.9.
If you access the computer’s boot menu (via the F11 or F12 key) before it boots into the default OS, you should see entries for Windows Boot Manager (boots into Windows 7 or Windows 8) debian (boots into Kali Linux).

Figure 17: Entries in the computer’s boot menu after installing Kali Linux on the same drive as Windows 7.
If you attempt to boot into Kali Linux, you’ll see the GRUB menu. However, it will not have an entry for Windows as it should.

Figure 18: GRUB menu after installing Kali Linux alongside Windows 7 on the same hard drive.
You can fix that by booting into Kali, launch a terminal and type the following command:

Related Post:  Install Elisa Media Center on Foresight Linux
update-grub. The output of that command should be just like that in this code block:
Output of ‘update-grub’ on Kali Linux 1.0.9aShell
1
2
3
4
5
6
Generating grub.cfg …
Found background image: /usr/share/images/desktop-base/desktop-grub.png
Found linux image: /boot/vmlinuz-3.14-kali1-amd64
Found initrd image: /boot/initrd.img-3.14-kali1-amd64
  No volume groups found
Found Windows Boot Manager on /dev/sda1@/EFI/Microsoft/Boot/bootmgfw.efi
done
Finally, when you log into Windows, you may launch the partition manager to see how the number of partitions has changed.
Figure 19 shows the Windows 7 and Kali Linux partitions as seen from the Windows partition manager of the test system. In this screenshot, D is the root partition, E is the home partition of Kali Linux. In between is the Swap partition. If at any time you wish to “uninstall” Kali Linux, just log into Windows and delete its partitions from the Windows partition manager.

how to Repair window7

Please follow this link and read more …………
http://windows.microsoft.com/en-us/windows/advanced-startup-options-including-safe-mode#1TC=windows-7

Start Windows
Insert the Windows Vista or Windows 7 installation disc in the drive, and then restart the computer.
When you are prompted to start from the disc, press any key.
When you are prompted, configure the Language to install, Time and currency format, and Keyboard or input method options that you want, and then click Next.
lick Repair your computer.
Select a restore point
On the System Recovery Options page, click the version of the Windows operating system that you want to repair, and then click Next.
On the System Recovery Options page, click System Restore.
On the System Restore page, click Next.
Select a restore point at which you know that the operating system was working, and then click Next.

The restore point should be a date before the first time that you experienced the error. To select a date, use the Choose a different restore point option, and then click Next.
If you are prompted to specify which disk to restore, select the hard disk, and then click Next.
On the Confirm your restore point page, click Finish.
When the restoration process is complete, click Restart.

Computer solution2

Format Flash disk with command prompt

https://www.techhack.co.uk/2011/03/31/format-a-hard-drive-with-command-prompt/

In Windows I would normally be driven to either format a drive through the Disk Management console or by right-clicking on a drive in Windows Explorer and selecting the “Format…” option, but there can be advantages to formatting a driver through Command Prompt. For example if you are reformatting a drive which previously had an Operating System on the drive you can find there are System Partitions on the drive which can’t be seen in Windows Explorer and refuse to format in the Disk Management console.

Note this is only a quick guide for Formatting Drives from Command Line, there are many more options available at your disposal. For a detailed insight to the options available for the DiskPart tool visitMicrosofts Technet. In the example I have formatted an external hard drive for use of file storage in a Windows Operating System environment.

In order to format a drive through Command Prompt firstly lets open the prompt.

Click Start > Run and type “CMD”, pressing Enter should open a new terminal.

Start CMD

 

We need to next start the Disk Part tool, type “DISK PART” into the Command Line and press Enter.

Start Disk Part

 

Next let’s display and identify which volume we would like to format. Type “list volume” and press Enter. You should see a list of available volumes. Identify the one which you wish to format, be careful selecting the wrong volume will spell disaster!

List Volume

 

Type “select volume <x>” and press Enter, where <x> is the volume you wish to focus on.

Select Volume

 

Type “clean” and press Enter. This removes any and all partition or volume formatting from the disk in focus.

Clean

 

Type “create partition primary” and press Enter. This creates a primary partition on the current disk. After you create the partition, the focus automatically shifts to the new partition. It is possible to create multiple partitions if you like. To do this you would add the option size=<x> where <x> is the size in megabytes (MB) you would like the partition to be. If no size is specified, like in my example, the partition continues until there is no more unallocated space.

Create Partition

 

Type “format fs=ntfs quick label=test” and press Enter. This will now perform a quick format, using a ntfs file system and labelling the drive “test”. You may wish to use the file system fat32 in place of ntfs if you would like to use the drive with other operating systems.

Format

 

Lastly type “assign letter <x>” and press Enter, where <x> is the letter you would like to assign the drive.

 

Top Tips to remove virus,spyware,malware,adware

Getting a computer viruses or some nasty on your system can be a pain in the backside. Here are some top tips to beat it and get back on track.

The first step is to arm yourself with a toolkit of anti-virus / malware removal programs. Many malicious programs have the ability to block access to download sites of popular virus removal tools or worse still divert the user to an entirely different web page, who knows what unsuspecting victims will be installing next, so having copies of these programs to hand can decide your fate!

A none rewritable media such as a CD would be safest bet to store your toolkit to prevent the risk of further spreading an infection. The downside of this is your virus definitions for removing infections are more likely to be out dated, possibly rendering them useless. Anti-Virus and Anti-Malware applications are reactive in creation not proactive – it would be virtually impossible to cure an infection which hasn’t existed yet. So do your best to keep up-to-date.

It could be considered wise to disable any access to other network resource, hopefully killing the connection before the infection has had chance to replcate itself to other devices, the easiest and quickest way to acheive this would be to remove the network cable.

Some decent free tools to help get you started are Malwarebytes Anti-Malware, SUPERAntiSpyware, Spybot Search & Destroy, Ad-Aware, Microsoft Security Essentials, Combofix and possibly evenCCleaner. There are many more available too, but be careful what you download and where you download them from. Try and stick to trusted familiar brands and original official vendor webpages for downloads as there are plenty of malicious programs out there posing as the real deal when infact they are themselves malware.

Generally it is recommended that you should only really install one real-time protection anti-virus program at a time, to help limit over-straining your system resources and avoid conflicts between scanners. However it’s usually safe to install as many on-demand scanners as you like. I tend to stick with one real-time protection anti-virus program and one on-demand anti-malware scanner. Although some may prefer several on-demand anti-malware scanners to tackle malicious software on numerous fronts, after all there’s always a chance one scanner has a virus definition for something another may not. It’s a case of how paranoid you are and how much time you have to spare!

Some other useful tools which may aid but not really designed as first line anti-virus defence include Sysinternals Process Explorer and Autoruns for Windows these can be used to monitor what processes are running and being started on your machine and with a little patience and knowledge help you track down the location of the infection. Often helpful in removing an infection manually.

 

explorer.exe

If you’re having trouble running or installing your virus removal programs you can simply try and outsmart the malicious software by renaming your executable explorer.exe and then running it again.

Explorer.exe is part of the Microsoft Windows Operating System. The explorer.exe file is a Windows GUI shell. Its graphical user interface lets you see your hard drives, folders, and files. At first explorer.exe was used only to browse files, but with the release of newer Windows versions it evolved to being a task-based file management system. Although not vital this process is pretty important to the system, so is usually over looked by viruses, hence why this neat little trick often does the charm.

 

HOSTS

If you are having trouble accessing or downloading things from the web, check that your hosts files has not been maliciously altered. This is a quick and dirty trick malicious programs often do to redirect you to their own servers, often with popular domains such as Google – so that you are actually really searching on the exploiters version of Google despite appearances.

The hosts file is a computer file used by Windows to map hostnames to IP addresses. The hosts file can be found in your Windows directory:

C:WindowsSystem32driversetchosts

You can open this file in notepad. Unless you have altered this file, by default apart from some commented lines represented by a hash symbol #, you should only have one entry or two entries for IP6 enabled computers.

127.0.0.1 localhost
::1 localhost

These are your loopback addresses to your own machine.

 

Safe-Mode

If your Anti-Virus program seems to finds entries but does not appear capable to remove them you can try booting up into Safe-mode and running the scan again.

Windows Safe Mode bypasses start-up programs and drivers that are not required for Windows to load and will allow you to fix Windows problems.

To get into Safe-mode, as the computer is booting press and hold your “F8 Key” which should bring up the “Windows Advanced Options Menu”. Use your arrow keys to move to “Safe Mode” and press your Enter key.

 

Login as a Different User

You may notice the infection your computer has picked up only appear to affect a particular user. This is because many malicious programs live in the users profile in locations such as Application Data or Temporary Internet Files.

A very easy trick is to run your scans as a different user, you are then able to safely scan a system without the hassle of malicious scripts blocking your virus removal tools.

 

Remove temporary files

Related to the subject above of many malicious programs living in the users profile, a simple clean-up of temporary files maybe enough in some cases to remove that nasty program.

You can do this manually or with the aid of programs such as CCleaner.

 

Reformat

If all else fails or you just want to bypass all the hurdles, the only way to truly guarantee that you are virus free is to flatten and reformat your system with a fresh copy of windows.

After all just because you don’t have applications opening themselves all over the place doesn’t necessarily mean that your system is clean. When it comes down to it what’s really worse some bloated in-your-face program asking innocent onlookers for credit card details or the cleverly devised invisible packet sniffing exploit which sits patiently in the background waiting for bystanders to do some online banking before so that it may r report back to Major Tom with your credentials.