Catetan Join Domain Gagal Melulu

Leave a comment

Ini cuman catetan ngacapruk (ngawur) dimana eyke tidak membahas permasalahan ini secara jelas lugas lengkap dan padat.

Cuman pengen share inih kalo kalian pada udah bikin Aktip Direktori di Windows Serper terus pas kliennyah mau dijoinin ke Domain tidak mau.. Jalankan skrip inih di comen prom dan Ran Es Edministreyter:

netsh int ipv4 set dns “Local Area Connection” static “172.xx.xx.xx” primary

Setelah okeh, cek apakah si domain udah berhasil dibaca ama komputer dirimuh (klayen) atau belom, caranyah:

nslookup namadomainente.kom

Nnnnah, kalo udah berhasil dibaca, pasti nongol tuh nama domennya dan aypi adressnyah.. Kalo belom, coba jalanin inih:

nltest /dsgetdc:”namadomainente.kom” /force

Nnnnaaahh.. saatnya di nslookup kaya tadi lagih trus join domen deh, caranya: ubah Workgroup di Computer properties trus dijoinin ke domen.

*ga niat banget sheringnyah.. ntar dibuatin deh versi yahudnyah 🙂 hehehe.. salam!

Advertisements

Mencegah Spoofing

1 Comment

Awalnya saya tau masalah ini di tempat saya kerja, pas lagi browsing saya perhatiin ko browser selalu mengarahkan ke url yang sama dan antivirus mendetek alamat url itu sebagai sebuah virus, selalu seperti itu. Url nya kebetulan bermacam-macam, saya sendiri ga inget, yang saya inget selalu diakhiri dengan file ads.js, kemudian antivirus mendetek file bernama root.gif sebagai sebuah virus. Setiap kali browsing, membuka halaman apapun selalu begitu.

Bukan hanya itu saja, kecepatan akses internet pun berkurang bahkan cenderung putus koneksi ke WAN. Setelah saya cek menggunakan MAC Address Scanner ternyata yang saya temukan adalah nilai MAC Address Gateway sama dengan nilai MAC Address yang dimiliki oleh salah satu client di dalam LAN, sesuatu hal yang sebetulnya ga mungkin terjadi, mengingat alamat fisik (MAC Address) itu bersifat unik dan wajar ajah kalo ternyata koneksi WAN terputus, lha wong MAC Address Gateway = MAC Address Client. Kasus seperti ini dikenal dengan istilah ARP Spoofing.

Tips untuk mencegah ARP Spoofing:

  1. Lakukan pengecekan MAC Address dengan menggunakan tools, saya menggunakan Colasoft MAC Scanner
  2. Scan network kemudian lihat hasil yang didapat, jika terdapat 2 buah IP Address dengan nilai MAC Address yang sama dengan Gateway…
  3. Putus client tersebut dari jaringan, kemudian scan virus dengan menggunakan antivirus yang up-to-date virus databasenya
  4. Setelah dilakukan virus scanning, lakukan langkah penutup ini: buka Command Prompt lalu ketik: arp -s ip_address_gateway mac_address_gateway lalu tekan tombol Enter, selesai

Langkah terakhir di atas adalah untuk mengunci IP Address dan MAC Address milik gateway menjadi statis di komputer client tersebut. Maka untuk tujuan keamanan dari ARP Spoofing, sebaiknya lakukan langkah ini juga terhadap seluruh komputer client yang terkoneksi dengan LAN.

Tapi…, kepikiran ga sih kalo harus melakukan langkah ini tiap kali komputer booting, tidak semua user mengerti hal ini dan tentunya ini bukan tugas user. Solusinya adalah buat service yang menjalankan perintah ini dan dilakukan secara otomatis tiap kali komputer booting. Berikut adalah langkah pembuatan service tersebut:

  1. Ketikkan di dalam notepad/teks editor lain: sc.exe create “nama_service” C:\WINDOWS\system32\arp.exe -s ip_address_gateway mac_address_gateway
  2. Save dengan format nama_file.bat
  3. Jalankan file tersebut dengan melakukan double-click pada file tersebut
  4. Restart komputer, kemudian masuk ke Control Panel – Administrative Tools – Service
  5. Perhatikan, di dalam service seharusnya sudah terdapat nama service baru sesuai dengan nama yang dibuat tadi
  6. Klik kanan pada nama service tersebut kemudian pilih Properties
  7. Ubah parameternya menjadi Start dan Automatic start ketika komputer booting, selesai

More info and up-to-date articles about viruses, visit: www.vaksin.com

picoFIREWALL: Configuration

Leave a comment

This is my simple firewall configuration in my openSuSE Box, heheh…

  1. Open console/terminal, go type: vi /etc/picofirewall/openlog
  2. Press “i” button on your keyboard to insert new line(s)
  3. To bypass special IP Address, type: 192.168.2.4
  4. The rule above means the openSuSE Box won’t blocked ANY port and connection type (TCP/UDP) for IP Address 192.168.2.4
  5. To bypass specific IP Address and port, type: 192.168.2.5,udp,445
  6. The rule above means the openSuSE Box will grant access from IP Address 192.168.2.5 to openSuSE Box through UDP Port 445, other than that port is blocked
  7. Type another rule(s) as you need line by line or one line for one rule
  8. After that, press “Ctrl + c” to quit from vi insert mode
  9. Press “Shift + :” then press “wq“to save the rule(s) and quit from editor
  10. To run the firewall, type: picofirewall start
  11. If there were no error(s) echoing, picoFIREWALL successfully started
  12. To stop the firewall, just type: picofirewall stop

Okay, selamat mencoba 😉

picoFIREWALL Installation In openSuSE Box

Leave a comment

Why picoFIREWALL..? Because it simple and easy, or let this site answer your question, hehehe…

  1. Download the package here
  2. Login as a Root in your openSuSE
  3. Run this command in the console/terminal: gunzip picofirewall.tar.gz
  4. If you dowloaded the .tar package, run this command: tar xvf picofirewall.tar
  5. If there were no errors, go to picoFIREWALL source directory: cd picofirewall
  6. In picoFIREWALL source directory, run: ./install
  7. Installation finish, go to: cd /etc/picofirewall to see the configuration files

Okay, I will share my firewall configuration for my File Server later, see you very soon 🙂

My Samba Configuration

Leave a comment

Here is my default samba configuration, i will complete and explain it more later

[global]
log file = /var/log/samba/log.%L
admin users = root
socket options = TCP_NODELAY IPTOS_LOWDELAY SO_SNDBUF=8192 SO_RCVBUF=8129
create mask = 777
domain master = yes
username map = /etc/samba/user.map
null passwords = yes
time server = yes
logon home = \%L\profiles%u
writebale = yes
usershare max shares = 100
server string = File Server – Samba %v on %L
invalid users = bin,daemon,sys,man,postfix,mail,ftp
password server = root
logon path = \%L\profiles%u
workgroup = backupserver
os level = 65
directory mask = 777
add machine script = /usr/bin/useradd -d /dev/null -g samba-clients -s /bin/false -M %u
domain logons = yes
log level = 2

[profiles]
path = /srv/samba/profiles
create mask = 0700
directory mask = 0700
browseable = no

[homes]
comment = Home Directories
browseable = no
read only = no

[netlogon]
path = /srv/samba/netlogon
browseable = no
public = no
writeable = no

[users]
comment = All users
path = /home
read only = No
inherit acls = Yes
veto files = /aquota.user/groups/shares/
[groups]
comment = All groups
path = /home/groups
read only = No
inherit acls = Yes
[printers]
comment = All Printers
path = /var/tmp
printable = Yes
create mask = 0600
browseable = No
[print$]
comment = Printer Drivers
path = /var/lib/samba/drivers
write list = @ntadmin root
force group = ntadmin
create mask = 0664
directory mask = 0775

[CustomSharedFolder]
writeable = yes
path = /path-folder-that-you-want-to-share
write list = user-a, user-b, user-c, root
revalidate = yes
valid users = user-a, user-b, user-c, root
user = user-a, user-b, user-c, root
create mode = 777
directory mode = 777

Backup Files Using RSync (Linux, openSUSE)

Leave a comment

I’m using RSync for two operations, backup my files into local harddisk and backup my files into another computer storage in LAN. For the second reason, we don’t need to type a password to make a connection with destination computer 🙂

Copy files into secondary storage in one computer

Just open a Konsole, then type rsync -avzp –delete /source-folder/ /destination-folder/

Copy files into secondary storage in another LAN computer

  1. Open a Konsole, type ssh-keygen -t rsa then push Enter/Return 3 times
  2. Type ssh-copy-id -i ~/.ssh/id_rsa.pub username@remote_host (I’m using root as username, ex: root@192.168.2.2)
  3. Enter your password for username on remote host (I’m using the same root password on the remote host computer/destination computer)
  4. Type rsync -e ‘ssh -p 22’ -avzp –delete /source-folder/ remote_host:/destination-folder/ (ex: rsync -e ‘ssh -p 22’ -avzp –delete /source-folder/ 192.168.2.2:/destination-folder/)

Explanation of these script will be explain soon 🙂

IP Conflict, With Who..?

Leave a comment

There’s a simple way how to know with who your IP is conflict wen the balloon warning message is appear on your right-bottom-corner side

  1. Go to Start – Control Panel – Administrative Tools – Event Viewer
  2. In the Event Viewer tree, select System and you eill find Warning Type system event named IP Conflict
  3. Double click that event then you will find out the MAC Address that using the same IP with yours

Older Entries