Saturday, August 28, 2010

ERP first - Quick Step

There are 3 types of people/companies that we interact with. Either a
person or a company is a prospect, a customer, BOTH prospect and customer,
or neither. Now what we need to do is before we even decide what a
company or person is, we need to first figure out the sales and procurement process.

1. Sales staff meets PERSON X from COMPANY X.
2. PERSON X is considered a CONTACT
3. PERSON X works for COMPANY X
4. COMPANY X can have many people working for it.
5. Sales staff meets PERSON Y from COMPANY X.
6. PERSON Y also works for COMPANY X
7. a Company is considered a THIRD PARTY

8. ADD A THIRD PARTY TO SYSTEM FIRST!
9. ADD CONTACT INTO SYSTEM SECOND

10. If we are planning to do business with COMPANY X, then COMPANY X is a PROSPECT
11. If we are ALREADY doing business with COMPANY X, then COMPANY X is a CUSTOMER
12. If COMPANY X has done business in the past, but has not used our services for a while, then COMPANY X is a PROSPECT/CUSTOMER
13. If COMPANY X is a supplier or not a company we wish to do or plan to do business with, then they are considered NOR PROSPECT NOR CUSTOMER

AFTER THIS POINT ASSUME WE DO BUSINESS WITH A COMPANY:

14. If COMPANY X becomes our customer, CHANGE this data in the db and
put as CUSTOMER (Any customer who has not used our services in 90 days is to be
changed to prospect/customer)
15. Create a PROJECT for the customer
16. Edit all project details and break down tasks
17. Create invoice based on project
18. Add products/services to invoice
19. Validate and email out invoice to customer
20. Receive payment from customer and indicate in

Monday, August 23, 2010

Do u think you are really secured ? part 1

Hai people. This time am going little geeky. Nothing but useful materials. I used to spend a lot of time investigating on these stuffs. Just for the sake interest..okay. Lets cut the bate.



Hotspots are very popular and widely available in all places. And most of us do make use of it while we are on move. And no one is really concerned about the potential vulnerability of these facilities. Ofcourse its very convinient and handy to make use of internet access from each and every nuke and corner of the world. But do u think that you are secured your datas and passwords all never been gonna loose.? If your answer is yes please read on. U might wanna reconsider your answer.

What is wifi?

def: A Wireless Local Area Network (WLAN) links two or more devices using some wireless distribution method (typically spread-spectrum or OFDM radio), and usually providing a connection through an access point to the wider internet. This gives users the mobility to move around within a local coverage area and still be connected to the network.


 blah blah blah...cut it.

This Wireless Distribution System is a system that enables the wireless interconnection of access points in an IEEE 802.11 network. Which is nothing but the so called protocol. For noobs : a set of rules and regulations or standards.

Here plays 2 cases. case 1: Most of the hotspots are open and does not use any encryption standards and keys to secure its authentication. Case 2: on the other side if it is a secrued it will have to use a encryption standard and key, which is probably not applicable in the case of hotspots. That means in both cases the data is transmitted through air. But in the open hotspots any one can capture these radio signals and read it. In the second case, even though anyone can capture it. They wont be able to read this without encryption key.

Now let me introduce an Application that has been used as a tools for professionals who deal with the deployment, maintenance, and security of WLANs.WireShark is free software that sniffs packets on wireless networks. Learn tips on configuring and using this tool when analyzing and troubleshooting 802.11 wireless networks. - Its the defenition given by the developers. Wireshark, a powerful wireless packet sniffer, network monitor, and protocol analyzer designed for WLAN administrators, security professionals, network programmers. Its a wonderful tool if we look at the good side. And ofcourse who cares.. "hot sushi" for like minded people ;)

Fortunately,Wireshark has sophisticated wireless protocol analysis support to help administrators troubleshoot wireless networks.With the appropriate driver support, Wireshark can capture traffic “from the air” and decode it into a format that helps administrators track down issues that are causing poor performance, intermittent connectivity, and other common problems. Possibly there is always a big chance to replace the term administrator by some one else. Remember this is a free tool. Any one can use it.

Using Wireshark’s display filtering and protocol decoders, you can easily sift through large amounts of wireless traffic to identify security vulnerabilities in the wireless network, including weak encryption or authentication mechanisms, and information disclosure risks. Yes, your commonly using email services like Gmail, yahoo, hotmail etc uses standard encryption and tranfer methods like GET and POST. You what what i mean by standard? "its already defined" every one knows it..

Let me give an over all idea how to do it.

1. Identifying open channel and selecting one.

Today most AP uses multiple channels. Even if two wireless users are sitting side-by-side, their computers may be operating on different wireless channels. If the attacke aim a particular user. he have to find which channel the victim is using. BIG TASK :) but not necesserly for random trap.

2. Set the filers up .

This is a techinque that is dont to reduce the junk of data that is being trapped while sniffing. The attacker can filter whathe need ny making using a varity of paramaters like Protocol, Port address, IP , mac etc.

3. Start snifing :)



The packet capture will display the details of each packet as they were transmitted over the wireless LAN. This is a screenshot of a sample packet capture window. The top panel of the window identifies each packet’s source and destination nodes, protocol implemented, and information about each packet. You can select a specific packet to display more details. The one selected in Figure 1, packet 3, is an 802.11 beacon frame. The middle panel displays information about this packet, and you can choose a specific field of the packet (such as Duration field shown in the figure), and the contents of that field are displayed in hex and ASCII format in the bottom panel. As a result, you’re able to analyze the flow and view each field (including data field payloads) of all packets.

In short with the help of HTTP filter in wireshark can capture any web data that is being transmitted over air. :) including your username and password, credit card numbers, etc. :P

Saturday, August 14, 2010

The 10 things...

Alright another Tag.. from my sweet blogger friend :) Lopa ..

Um.. Its really about somethings that i can't pretend. ok I'll post th eriles first the lets go for what i think..

Rules of Tagging:

  • Tell your readers 10 things about yourself that they may or may not know, but are true.
  • Tag 10 people with the award, and be sure to let them know they’ve been tagged (a quick comment on their blog will do).
  • Link back to the blogger who tagged you.
10 things huh .. sound easy. Let me give t a try..

As a small briefing i tell u .. i dont like to tell about my self. i feel like little awkward. I would dare to ask a girl her number or for a date or for movie on the first meeting itself. but this is little weird. ok starting.. lets keep it  short and cute.

1. first one let me make it simple in one sentence . i am Noobcake, pretentious & 'hot blooded',  used to try to fill in a minimal sketch of the playing field before delving into concepts and i follow the ethics with basic rules that generally dont fall into the category of so called 'assholes' & 'vanilla buffers'

2. dont care about style.. :)  .. like casual jeans with less tearing and holes.

3. I like dancing .. Argentinan tango, Hip hops, rumba..  but dont know any one of these.

4. I love football, i mean soccer ..I love it. i love it, i love it ..  i love this game so much that even 'girls' comes  after it, in my list of interests. and i am better in dancing with the football in ground . :D

5. I can cook :) i like cooking.. :P  *secret ..  Dont tell my friends for this reason they will eat me for one month.*

6. Camera (moble) is one f the weakness i used carry in my pocket. First thing that come into my mind if i ever see a beautiful or interesting stuff.. "Click it bro ... click it".

7. Changes are the one (some) thing that i like very much.

8. I really dont want to be the one who battles all the truth. I am sure about the power of the almighty and never want to mess up with him, his people and his likings. I dont know whats worth fighting... whats worth crying .. whats worth screaming.. whats worth shouting.. whats worth my head weight.. whats worth my time.. whats worth my money.. whats worth my health... whats worth my deeds.. what worth my do's and dont,s. Inside real life i am confused. All i need is to make my self sure that i believe in god. Yes i believe in him and i have a thousand reason for it.

9. i love my dad and mom and my brothers. but i dont know how to express it. :(

10. i'm single :)   pheeeeeeew ha ha ha..:D  lol i cant find any other best that suits here,


and here my award


ok lets get to the Give away.. mm i dont know how many of them likes tags.

1. Raaji
2. PP
3. Nasra
4. Hasna Fathima
5 Tanvi
6. Aruna
7. Anu
8. COMMUNI
9
10

You might like this.

Related Posts Plugin for WordPress, Blogger...

My Blog List