Bookmarks for 4 giu 2012 through 6 giu 2012

These are my links for 4 giu 2012 through 6 giu 2012:

  • – CPRules.html contains the description of the main program, how to create the html output from the Check Point files and how to influence the output.

    The program uses two supporting libraries and one supporting program. The first is specifically developed for this program to read and manipulate the Check Point databases in memory, called I hope to use this library for other projects involving Check Point FW-1 databases …

    The other library,, is used for creating the html pages from a template, giving more freedom in designing the web pages. The author of this module is Sam Tregar (

    The supporting program is to convert the exported userfiles to a CheckPoint database format to be used by CPRules. CPUsers.html describes how it works.

  • How To Calculate Bandwidth Utilization Using SNMP  [IP Application Services] – Cisco Systems – This document describes how to calculate bandwidth use with Simple Network Management Protocol (SNMP).
  • Long range WiFi antenna from Illy coffee can | John Graham-Cumming – I have a stack of half finished projects that I'm trying to complete. Happily, the first one was finished late last night: a long range WiFi antenna made using an empty coffee can. Working from the ideas here I made an antenna from the following:

    1. An empty 250g Illy Espresso ground coffee can

    2. A Type N bulkhead socket and a Type N plug

    3. A piece of WiFi antenna extension cable with a reverse SMA connector on the end.

    4. A short piece of coat hanger for the active element of the antenna

Bookmarks for 15 giu 2010 through 16 giu 2010

These are my links for 15 giu 2010 through 16 giu 2010:

  • grimwepa – Project Hosting on Google Code – GRIM WEPA was written in Java and is intended for use with the Linux Operating System (specifically the Backtrack 4 distribution).<br />
    [ via ]
  • The HACMP cheat sheet – Do you want to set up a redundant environment for high availability but don't know how AIX® can help you? Discover High Availability Cluster Multi-Processing (HACMP) and gain a cheat sheet on how to configure and set up a simple two-node cluster.
  • – Poiche' l'autenticazione degli utenti in ISA avviene per mezzo del "celebre" protocollo proprietario NTLM, nessun browser che non sia IE6 su Windows puo' accedere al web attraverso il proxy (complimenti a Microsoft anche per questo… ;))<br />
    <br />
    Fortunatamente, un'anima pia che risponde al nome di Dmitry Rozmanov ha creato questo:<br />
    <br /><br />
    <br />
    [nota personale: affanculo MS]