These are my links for 5 lug 2012 through 6 lug 2012:
- NetHogs: What program is using that bandwidth? – NetHogs is a small 'net top' tool. Instead of breaking the traffic down per protocol or per subnet, like most tools do, it groups bandwidth by process. NetHogs does not rely on a special kernel module to be loaded. If there's suddenly a lot of network traffic, you can fire up NetHogs and immediately see which PID is causing this. This makes it easy to indentify programs that have gone wild and are suddenly taking up your bandwidth.
[ via http://www.zarrelli.org/ ]
- LiveUSB image with OpenBSD – carry your OS on a memory stick – It is trivial to a create a bootable USB stick with OpenBSD. I wanted to create one and realized that this will be of general use for anyone who likes a UNIX USB memory stick that they can carry with them on a keychain.
If you wish to have LiveCD/LiveDVD instead, please refer to our other LiveCD-OpenBSD project on sourceforge!
This USB image shall not touch your hard disk in any way. All the operations are done in the USB stick and main memory. Nothing will be written to your MBR or boot loaders!
- Jon Hart’s Blog: OpenBSD on Soekris — A Cheater’s Guide – Below are the steps I recently used to get my NET4801 running OpenBSD 4.2 -current. The difference here is that I use qemu to make use of the considerably faster CPU on my desktop to breeze through the install and initial configuration.
These are my links for 4 giu 2012 through 6 giu 2012:
- http://www.wormnet.nl/cprules – CPRules.html contains the description of the main program, how to create the html output from the Check Point files and how to influence the output.
The program uses two supporting libraries and one supporting program. The first is specifically developed for this program to read and manipulate the Check Point databases in memory, called CheckPoint.pm. I hope to use this library for other projects involving Check Point FW-1 databases …
The other library, Template.pm, is used for creating the html pages from a template, giving more freedom in designing the web pages. The author of this module is Sam Tregar (firstname.lastname@example.org).
The supporting program CPUsers.pl is to convert the exported userfiles to a CheckPoint database format to be used by CPRules. CPUsers.html describes how it works.
- How To Calculate Bandwidth Utilization Using SNMP [IP Application Services] – Cisco Systems – This document describes how to calculate bandwidth use with Simple Network Management Protocol (SNMP).
- Long range WiFi antenna from Illy coffee can | John Graham-Cumming – I have a stack of half finished projects that I'm trying to complete. Happily, the first one was finished late last night: a long range WiFi antenna made using an empty coffee can. Working from the ideas here I made an antenna from the following:
1. An empty 250g Illy Espresso ground coffee can
2. A Type N bulkhead socket and a Type N plug
3. A piece of WiFi antenna extension cable with a reverse SMA connector on the end.
4. A short piece of coat hanger for the active element of the antenna
These are my links for 13 feb 2012 through 15 feb 2012:
- Configuring a site-to-site VPN between a Sonicwall and Linux Openswan – Mike A. Leonetti – I have had the fortune of having the challenge to set up a site-to-site (or BOVPN/Branch Office VPN) between a Sonicwall and Openswan. I have searched for other articles that cover this topic and found plenty of information that got me far enough to get some of it working. However, getting the whole thing working took quite some time and I found the guides to be incomplete. So for the sake of even my own remembrance, I will write a mini guide up. Of course I will link all of the guides I've used in a references section.
- VPN Site-to-Site Openswan x ASA (Cisco) – House of Linux – Ladies and gentleman, today I am going to demonstrate how to integrate technologies from different platforms. It is possible to use Cisco to integrate with Windows and Linux using protocol such as LDAP. In this case the communication between Linux and ASA (Adaptive Security Appliances) is straight. We will only need to check the cryptography configuration and that it, the connection is established.
- Linux Commands – SkullSecurity – Recon, scanning, exploitation and password from comman line in linux (netcat, metasploit, etc)
- Windows Commands – SkullSecurity – Recon, scanning and exploitation in a windows command line
These are my links for 1 feb 2012 through 2 feb 2012:
- WP WAF – WordPress Web Application Firewall | Gianni Amato – Ecco la preview di ciò che inizialmente è nato come IDS per monitorare gli attacchi ai miei blog e man mano cresciuto fino a prendere le sembianze di un IPS.
WP WAF è un plugin per WordPress (leggero e per nulla invasivo) il cui scopo è quello di bloccare ed eventualmente notificare alla propria casella di posta i dettagli dell’attacco alla piattaforma.
[via http://www.afhome.org/2012/02/01/un-firewall-per-wordpress/ ]
- Sumo Paint | Online Image Editor – Sumo Paint – online image editor and drawing application
- PHP and AJAX shell console – Ever wanted to execute commands on your server through php to mimick a shell login? Now you can. I'm calling this file (see below) shell.php and it allows you to run commands on your web server with the same permissions that your php executable has.