Skip to content
These are my links for 22 lug 2014 through 23 lug 2014:
- DMARC Weekly Digests by Postmark – DMARC is a standard that prevents spammers from using your domain to send email without your permission — also known as spoofing. Learn why DMARC is important. We will process reports from major ISPs about your domain's DMARC alignment and turn them into beautiful, human-readable weekly email digests, absolutely free. [ via http://www.webappers.com/2014/07/21/free-tool-monitor-implement-dmarc/ ]
- .bashrc generator: create your .bashrc PS1 with a drag and drop interface – Generate your .bashrc PS1 prompt easily with a drag and drop interface [ via http://www.cyberciti.biz/ ]
- ssaw/openross – The OpenRoss image service provides a way of serving dynamically resized images from Amazon S3 in a way that is fast, efficient, and auto-scales with traffic. We have a blog post describing this service in more detail at http://developers.lyst.com/data/images/2014/06/23/openross/. [ via http://onethingwell.org/post/92152951705/openross ]
These are my links for 13 feb 2012 through 15 feb 2012:
- Configuring a site-to-site VPN between a Sonicwall and Linux Openswan – Mike A. Leonetti – I have had the fortune of having the challenge to set up a site-to-site (or BOVPN/Branch Office VPN) between a Sonicwall and Openswan. I have searched for other articles that cover this topic and found plenty of information that got me far enough to get some of it working. However, getting the whole thing working took quite some time and I found the guides to be incomplete. So for the sake of even my own remembrance, I will write a mini guide up. Of course I will link all of the guides I've used in a references section.
- VPN Site-to-Site Openswan x ASA (Cisco) – House of Linux – Ladies and gentleman, today I am going to demonstrate how to integrate technologies from different platforms. It is possible to use Cisco to integrate with Windows and Linux using protocol such as LDAP. In this case the communication between Linux and ASA (Adaptive Security Appliances) is straight. We will only need to check the cryptography configuration and that it, the connection is established.
- Linux Commands – SkullSecurity – Recon, scanning, exploitation and password from comman line in linux (netcat, metasploit, etc)
- Windows Commands – SkullSecurity – Recon, scanning and exploitation in a windows command line
jtheo is Stephen Fry proof thanks to caching by WP Super Cache