IT Security and Hacking knowledge base – SecDocs – Hacking and security documentation: slides, papers, video and audio recordings. All in high-quality, daily updated, avoiding security crap documents. Spreading hacking knowledge, for free, enjoy.
These are my links for 30 apr 2014 through 6 mag 2014:
Ralentir le débit de postfix pour wanadoo/orange – Le blog de Michauko – Si vous avez un serveur d’envoi de mails (je ne parle pas d’être un spammeur) et beaucoup d’abonnés chez Wanadoo et Orange, vous risquez fort le rejet temporaire de votre serveur si le débit d’envoi est trop fort. C’est ce qui m’est arrivé et hop, 5000 mails entassés dans la file de postfix.
smtp-in.orange.fr refused to talk to me: postfix solution | floriancrouzat.net – Orange sadly limits inbound connexion to it’s MX to 1 connexion per IP, which is a total pain in the ass when you try to deliver newsletter, or manage a MTA. Here is a sample log from their MX: Jul 4 10:42:42 smtp.example.com postfix/smtp: 0123456789: host smtp-in.orange.fr[220.127.116.11] refused to talk to me: 421 mwinf5c34 ME Trop de connexions, veuillez verifier votre configuration. Too many connections, slow down. OFR004_104  However, since they won’t change anything, we have to take mesures, here’s what you can do if you run postfix: you have to set a per-destination concurrency limit.
Tmux: A Simple Start – In all likelihood, you’ve probably already heard of tmux. However, you may not be using it everyday. If tmux is on your “Someday” list because you think it is too complicated (I mean, c’mon, the word “multiplexer” is just plain scary), then I am here to show you just how easy it is to put tmux into your workflow.
Tyblog | Yet Another Vim Setup – Vim is an excellent text editor. I’ve used it for many years and like most vim users, have collected a fairly large collection of settings in my .vimrc and learned how to grok my vim usage effectively through a lot of trial and error. To that end, I’ve tried to assemble a useful overview of my experience with vim.
These are my links for 5 lug 2012 through 6 lug 2012:
NetHogs: What program is using that bandwidth? – NetHogs is a small 'net top' tool. Instead of breaking the traffic down per protocol or per subnet, like most tools do, it groups bandwidth by process. NetHogs does not rely on a special kernel module to be loaded. If there's suddenly a lot of network traffic, you can fire up NetHogs and immediately see which PID is causing this. This makes it easy to indentify programs that have gone wild and are suddenly taking up your bandwidth.
If you wish to have LiveCD/LiveDVD instead, please refer to our other LiveCD-OpenBSD project on sourceforge!
This USB image shall not touch your hard disk in any way. All the operations are done in the USB stick and main memory. Nothing will be written to your MBR or boot loaders!
Jon Hart’s Blog: OpenBSD on Soekris — A Cheater’s Guide – Below are the steps I recently used to get my NET4801 running OpenBSD 4.2 -current. The difference here is that I use qemu to make use of the considerably faster CPU on my desktop to breeze through the install and initial configuration.
These are my links for 4 giu 2012 through 6 giu 2012:
http://www.wormnet.nl/cprules – CPRules.html contains the description of the main program, how to create the html output from the Check Point files and how to influence the output.
The program uses two supporting libraries and one supporting program. The first is specifically developed for this program to read and manipulate the Check Point databases in memory, called CheckPoint.pm. I hope to use this library for other projects involving Check Point FW-1 databases …
The other library, Template.pm, is used for creating the html pages from a template, giving more freedom in designing the web pages. The author of this module is Sam Tregar (firstname.lastname@example.org).
The supporting program CPUsers.pl is to convert the exported userfiles to a CheckPoint database format to be used by CPRules. CPUsers.html describes how it works.