Top 10 tips to keep that new computer spyware-free
Top 10 tips to keep that new computer spyware-free
Wednesday, December 28, 2005
Thursday, December 22, 2005
Thursday, November 10, 2005
LCD Or Plasma - What's Your Pleasure
Flat-panel displays are the future of television - whether consumers like them or not is another matter. HDTV, digital convergence, and high-resolution DVD will all have contributed to making CRT TVs obsolete within two years. That's not the case yet, but it is on the way. And if you're tempted to acquire a flat-panel TV, you will need to deal with another issue: the choice between two technologies that are complementary yet very different from one another: plasma and LCD.">Tom's Hardware Guide Displays: LCD Or Plasma - What's Your Pleasure? Understanding Modern Flat-Panel TV Technologies - Introduction: "Flat-panel displays are the future of television - whether consumers like them or not is another matter. HDTV, digital convergence, and high-resolution DVD will all have contributed to making CRT TVs obsolete within two years. That's not the case yet, but it is on the way. And if you're tempted to acquire a flat-panel TV, you will need to deal with another issue: the choice between two technologies that are complementary yet very different from one another: plasma and LCD
Wednesday, September 28, 2005
Thursday, September 22, 2005
Asterisk - the Open Source PBX!
Asterisk - the Open Source PBX!
Easily build your own multiprotocol PBX on Linux!
Asterisk is a complete PBX in software. It runs on Linux, BSD and MacOSX and provides all of the features you would expect from a PBX and more. Asterisk does voice over IP in many protocols, and can interoperate with almost all standards-based telephony equipment using relatively inexpensive hardware.
Asterisk provides Voicemail services with Directory, Call Conferencing, Interactive Voice Response and Call Queuing. It has support for three-way calling, caller ID services, ADSI, SIP and H.323 (as both client and gateway). Check the Features section for a more complete list.
Asterisk needs no additional hardware for Voice over IP. For interconnection with digital and analog telephony equipment, Asterisk supports a number of hardware devices, most notably all of the hardware manufactured by Asterisk's sponsors, Digium. Digium has single and quad span T1 and E1 interfaces for interconnection to PRI lines and channel banks as well as a single port FXO card and a one to four-port modular FXS and FXO card.
Easily build your own multiprotocol PBX on Linux!
Asterisk is a complete PBX in software. It runs on Linux, BSD and MacOSX and provides all of the features you would expect from a PBX and more. Asterisk does voice over IP in many protocols, and can interoperate with almost all standards-based telephony equipment using relatively inexpensive hardware.
Asterisk provides Voicemail services with Directory, Call Conferencing, Interactive Voice Response and Call Queuing. It has support for three-way calling, caller ID services, ADSI, SIP and H.323 (as both client and gateway). Check the Features section for a more complete list.
Asterisk needs no additional hardware for Voice over IP. For interconnection with digital and analog telephony equipment, Asterisk supports a number of hardware devices, most notably all of the hardware manufactured by Asterisk's sponsors, Digium. Digium has single and quad span T1 and E1 interfaces for interconnection to PRI lines and channel banks as well as a single port FXO card and a one to four-port modular FXS and FXO card.
Wednesday, September 21, 2005
Foxit PDF Reader
Foxit Reader is small (the download size less than 1MB), so you can download it quickly. It doesn't need any lengthy installation, so you can start to run it as soon as you can download it.
And it starts up immediately, so you don't need to wait the annoying 'Welcome' screen to disappear.
Foxit Reader is extremely easy to use, just double click it to start and then click open button to open your PDF document. If you want to print, click on 'Print' button. If you want to setup the page layout for printing, select 'Print Setup' from 'File' menu"
And it starts up immediately, so you don't need to wait the annoying 'Welcome' screen to disappear.
Foxit Reader is extremely easy to use, just double click it to start and then click open button to open your PDF document. If you want to print, click on 'Print' button. If you want to setup the page layout for printing, select 'Print Setup' from 'File' menu"
Thursday, September 15, 2005
Monday, September 12, 2005
Technorati
About Technorati
Currently tracking 17 million sites and 1.5 billion links.
Technorati is the authority on what's going on in the world of weblogs.
What is a weblog? A weblog, or blog, is a personal journal on the web. Weblogs express as many different subjects and opinions as there are people writing them. Some blogs are highly influential and have enormous readership while others are primarily intended for a close circle of family and friends.
IBM Lotus Notes/Domino Hints and Tips
IBM Lotus Notes/Domino Hints and Tips
Good source of tips for Lotus Domino.
Technorati
About Technorati
Currently tracking 17 million sites and 1.5 billion links.
Technorati is the authority on what's going on in the world of weblogs.
What is a weblog? A weblog, or blog, is a personal journal on the web. Weblogs express as many different subjects and opinions as there are people writing them. Some blogs are highly influential and have enormous readership while others are primarily intended for a close circle of family and friends.
Currently tracking 17 million sites and 1.5 billion links.
Technorati is the authority on what's going on in the world of weblogs.
What is a weblog? A weblog, or blog, is a personal journal on the web. Weblogs express as many different subjects and opinions as there are people writing them. Some blogs are highly influential and have enormous readership while others are primarily intended for a close circle of family and friends.
IBM Lotus Notes/Domino Hints and Tips
IBM Lotus Notes/Domino Hints and Tips
Good source of tips for Lotus Domino.
Good source of tips for Lotus Domino.
Friday, September 09, 2005
ThinkPad BackPack Carrying Case
With both storage and comfort features, the ThinkPad BackPack Carrying Case is the perfect solution for mobile users on the corporate or educational campus. Made of nylon material that's durable, lightweight and water-resistant, it has well padded, adjustable straps to help provide a comfortable fit around your shoulders and against your back. Top-loading for quick access to the ThinkPad notebook compartment, it sports many convenient pockets and pouches to store optional gear too.
ThinkPad BackPack Carrying Case
With both storage and comfort features, the ThinkPad BackPack Carrying Case is the perfect solution for mobile users on the corporate or educational campus. Made of nylon material that's durable, lightweight and water-resistant, it has well padded, adjustable straps to help provide a comfortable fit around your shoulders and against your back. Top-loading for quick access to the ThinkPad notebook compartment, it sports many convenient pockets and pouches to store optional gear too.
Targus BackPack
An Executive style backpac for those that prefer a hands free carrying case The Backpac offers the ultimate protection for your notebook, including Targus Air Protection and the new Dome Protection System, the first sidewall impact notebook protection system. The case is designed to accommodate notebook computers with screens up to 15/15.4 and features an ultra padded ergonomic mesh back support system with deluxe padded shoulder straps for ultimate comfort. The backpac also has plenty of space to hold all of today mobile accessories and power supplies. Constructed of lightweight 840D nylon with a rugged weather resistant bottom fabric This case is packed with extra features including, a hidden water bottle holder removable accessory pouch, cell phone holder and key clip. Unrivalled protection in this is a backpac makes it a must for the true Global Executive!
Wednesday, September 07, 2005
The Velocity PRO Laptop BackPack
The Velocity PRO Laptop BackPack is a great bag for the person always on the move. SLAPPA uses PRO-grade scuba-prene and thick molded rubber accents to provide a case that is lightweight, water resistant, never loses it's shape and provides excellent protection for your laptop or electronic gear. The Velocity BackPack series comes with either a tear away messenger bag strap OR the classic double should backpack straps (all are extra padded comfort straps). The Velocity BackPack has 4 main compartments (with LOTS of sub compartments) and a padded inner laptop sleeve in the main section (ideal for oversized laptops up to 16'). With a rubberized E.Z. grip SLAPPA handle, industrial strength zippers, 2 zipper pullers for each compartment and zipper head locks this case has everything the road warrior needs. We also throw in 3 SLAPPA combination locks, a removable phone case with a stainless steel epoxy finish belt clip and a 3-D rubber name card holder for I.D.
ThinkGeek :: Ethernet Crossover Adapter
You never know when you might need to crossover
There's this little series of numbers that goes something like '1, 2, 3, 6' to which the audience responds '3, 6, 1, 2'. Sure, it's not exactly the most exciting call and response game ever devised, but it will help you remember the pattern for making an ethernet crossover cable.
Or you could just carry the Ethernet Crossover Adapter on your keyring and forget about those stupid numbers. Along with our Ethernet Loopback Jack, the crossover adapter could just help you out of a tight network jam. And besides, having this adapter on your keyring quietly shows the world your status as a prepared geek.
There's this little series of numbers that goes something like '1, 2, 3, 6' to which the audience responds '3, 6, 1, 2'. Sure, it's not exactly the most exciting call and response game ever devised, but it will help you remember the pattern for making an ethernet crossover cable.
Or you could just carry the Ethernet Crossover Adapter on your keyring and forget about those stupid numbers. Along with our Ethernet Loopback Jack, the crossover adapter could just help you out of a tight network jam. And besides, having this adapter on your keyring quietly shows the world your status as a prepared geek.
RJ45 Crossover Adapter
RJ45 Crossover Adapter
[88.106B] £1.95 £1.45
RJ45 Crossover Adapter
Click to enlarge
This adapter converts a patch cable into a crossover cable. It can also be used to change a crossover cable into a straight through patch.
A perfect addition to any Network Administrators kit!
Note: Whilst these adapters are not Category 5e certified, we do not anticipate issues arising from their use unless they are attached to the end of a cable nearing the length limit for Cat5 Ethernet (100m)"
[88.106B] £1.95 £1.45
RJ45 Crossover Adapter
Click to enlarge
This adapter converts a patch cable into a crossover cable. It can also be used to change a crossover cable into a straight through patch.
A perfect addition to any Network Administrators kit!
Note: Whilst these adapters are not Category 5e certified, we do not anticipate issues arising from their use unless they are attached to the end of a cable nearing the length limit for Cat5 Ethernet (100m)"
Friday, September 02, 2005
Playing The Bodhran
Just about everybody who sees and hears a bodhrán being played wants to have a go. That's when the tears can start to flow, since a good player can make it look very easy. The problem that most people encounter is that they are trying to 'force' the beat. When I'm playing, I sense that the bodhrán is actually doing a fair part of the work. My right hand is often channeling or harnessing the energy that the skin gives back to the cipin. It's this reactive control that gives the subtlety and variation to the beat.
Thursday, August 18, 2005
Digital Camera Resource Page: About
The Digital Camera Resource Page was the first of the 'big four' digital camera sites, founded in November 1997. The DCRP is designed to be an unofficial resource for current and future owners of digital cameras. It is aimed more towards the consumer end, rather than the high end (read: $20,000) professional cameras. The mission of this site is to:
1. To provide honest reviews of digital cameras, with no sugar coating. If I think a camera isn't a good choice, you'll know it. Reviews are written without a lot of technical jargon, so everyone can understand them.
2. Do #1 without shoving ads down the throats of our readers. That means no pop-ups, pop-unders, interstitials, or any other annoying ads.
The DCRP has been featured in many publications, most notably the Wall Street Journal, New York Times, Washington Post, San Francisco Chronicle, Money Magazine, Chicago Sun-Times, and the San Diego Union-Tribune, plus several books.
1. To provide honest reviews of digital cameras, with no sugar coating. If I think a camera isn't a good choice, you'll know it. Reviews are written without a lot of technical jargon, so everyone can understand them.
2. Do #1 without shoving ads down the throats of our readers. That means no pop-ups, pop-unders, interstitials, or any other annoying ads.
The DCRP has been featured in many publications, most notably the Wall Street Journal, New York Times, Washington Post, San Francisco Chronicle, Money Magazine, Chicago Sun-Times, and the San Diego Union-Tribune, plus several books.
Wednesday, August 17, 2005
F-Secure : News from the Lab
F-Secure : News from the Lab: "Welcome to the weblog of the F-Secure Antivirus Research Team, maintained by the personnel in charge of analysing virus samples at F-Secure."
Windows Spyware Survival Tools
Introduction
The spyware problem that exists on the Internet today is worse now than it's ever been before, and there is no sign that it's going to let up any time soon. Recently, the New York Times had a story about 'educated' people who were choosing to throw away their spyware infected PCs, rather than take out 'software tweezers' to painstakingly remove all the spyware from their infected operating systems. This article not only described a potential ecological nightmare, but also showed the extreme and completely unnecessary actions that frustrated people are taking to deal with the spyware problem.
The spyware problem that exists on the Internet today is worse now than it's ever been before, and there is no sign that it's going to let up any time soon. Recently, the New York Times had a story about 'educated' people who were choosing to throw away their spyware infected PCs, rather than take out 'software tweezers' to painstakingly remove all the spyware from their infected operating systems. This article not only described a potential ecological nightmare, but also showed the extreme and completely unnecessary actions that frustrated people are taking to deal with the spyware problem.
CNN.com - Worm strikes down Windows 2000 systems
Worm strikes down Windows 2000 systems
Microsoft in 'emergency response' as worm reported on three continents
WASHINGTON (CNN) -- A fast-moving computer worm Tuesday attacked computer systems using Microsoft operating systems, shutting down computers in the United States, Germany and Asia.
Microsoft in 'emergency response' as worm reported on three continents
WASHINGTON (CNN) -- A fast-moving computer worm Tuesday attacked computer systems using Microsoft operating systems, shutting down computers in the United States, Germany and Asia.
Windows Port of Nessus
What is the Windows port of Nessus?
Cenzic has ported the Nessus engine to the Microsoft Windows platform. This porting project was born out of Cenzic's interest in building a 'best in class' web application security assessment product. Nessus is highly regarded in the security community as an excellent tool for assessing infrastructure vulnerabilities. Porting the Nessus engine to Windows provided Cenzic's engineers with valuable insight into infrastructure assessment. We would now like to offer this port back to the security community
Cenzic has ported the Nessus engine to the Microsoft Windows platform. This porting project was born out of Cenzic's interest in building a 'best in class' web application security assessment product. Nessus is highly regarded in the security community as an excellent tool for assessing infrastructure vulnerabilities. Porting the Nessus engine to Windows provided Cenzic's engineers with valuable insight into infrastructure assessment. We would now like to offer this port back to the security community
Tuesday, August 16, 2005
Nokia IP330 reload
connect to the serial port with the serial cable that comes with the
box. settings: 9600 bps
then boot the box, when it says "hit any key now to enter boot
manager" hit any key and type "install" - then follow the infos on
the screen ...
Checkpoint R55 and Cisco PIX Site to Site VPN
This document from the Cisco site will help you.......
http://www.cisco.com/en/US/tech/tk583/tk372/technologies_configuration_example09186a00800ef796.shtml
http://www.cisco.com/en/US/tech/tk583/tk372/technologies_configuration_example09186a00800b4b40.shtml
http://www.cisco.com/en/US/tech/tk583/tk372/technologies_configuration_example09186a00800ef796.shtml
http://www.cisco.com/en/US/tech/tk583/tk372/technologies_configuration_example09186a00800b4b40.shtml
Configuring an IPSec Tunnel Between a Cisco Router and a Checkpoint NG
Configuring an IPSec Tunnel Between a Cisco Router and a Checkpoint NG
"This document demonstrates how to form an IPSec tunnel with pre-shared keys to join two private networks:
The 172.16.15.x private network inside the router.
The 192.168.10.x private network inside the CheckpointTM Next Generation (NG). "
"This document demonstrates how to form an IPSec tunnel with pre-shared keys to join two private networks:
The 172.16.15.x private network inside the router.
The 192.168.10.x private network inside the CheckpointTM Next Generation (NG). "
Configuring an IPSec Tunnel Between a Cisco Secure PIX Firewall and a Checkpoint NG Firewall
Configuring an IPSec Tunnel Between a Cisco Secure PIX Firewall and a Checkpoint NG Firewall
"This document demonstrates how to configure an IPSec tunnel with pre-shared keys to communicate between two private networks. In this example, the communicating networks are the 192.168.10.x private network inside the Cisco Secure PIX Firewall and the 10.32.x.x private network inside the CheckpointTM Next Generation (NG) Firewall."
Monday, August 15, 2005
little box » IIS: Setting up a self-signed SSL certificate
SSL is the industry standard encryption protocol used for encrypting sensitive data such as credit card information on pretty much all major ecommerce sites.
The problem is that SSL certificates can be expensive. One of the primary providers, Verisign charges up to $350 for one year (http://verisign.com/products/site/secure/index.html). Yes, you have to renew them on a subscription basis as well
Developing a website that uses SSL technology can therefore be expensive. However there is a way to create a self-signed cert. Note that self-sign certs are useless in the real world and should not be used. It will take too long to explain here why but basically SSL certs have to be verified by an authorised provider. And unless you are a large multinational SSL cert issuing company that ain’t you.
So anyway, on to how to create your own. It was something I had to do whilst building an eccomerce site and it took me a while to figure out how to do it so I thought I’d share
The problem is that SSL certificates can be expensive. One of the primary providers, Verisign charges up to $350 for one year (http://verisign.com/products/site/secure/index.html). Yes, you have to renew them on a subscription basis as well
Developing a website that uses SSL technology can therefore be expensive. However there is a way to create a self-signed cert. Note that self-sign certs are useless in the real world and should not be used. It will take too long to explain here why but basically SSL certs have to be verified by an authorised provider. And unless you are a large multinational SSL cert issuing company that ain’t you.
So anyway, on to how to create your own. It was something I had to do whilst building an eccomerce site and it took me a while to figure out how to do it so I thought I’d share
How to use makecert.exe to create a self-signed test certificate that can be used with IIS SSL
How to use makecert.exe to create a self-signed test certificate that can be used with IIS for SSL
Problem: Special options must be specified with makecert.exe, to create a self-signed certificate that can be used with IIS (Microsoft Internet Information Server).
Note: Microsoft recommends to install and use the 'Certificate Server' to generate an SSL test certificate (Q216907), instead of using makecert.exe. But using makecert is simpler.
Solution:
The following command can be used to create and import a self-signed SSL test certificate:
makecert -r -pe -n 'CN=www.yourserver.com' -b 01/01/2000 -e 01/01/2036 -eku 1.3.6.1.5.5.7.3.1 -ss my -sr localMachine -sky exchange -sp 'Microsoft RSA SChannel Cryptographic Provider' -sy 12
To install this certificate in IIS 5.0, open the IIS 'Web Site Properties', 'Directory Security', 'Server Certificate...', 'Assign an existing certificate' and select the new certificate from the list.
Problem: Special options must be specified with makecert.exe, to create a self-signed certificate that can be used with IIS (Microsoft Internet Information Server).
Note: Microsoft recommends to install and use the 'Certificate Server' to generate an SSL test certificate (Q216907), instead of using makecert.exe. But using makecert is simpler.
Solution:
The following command can be used to create and import a self-signed SSL test certificate:
makecert -r -pe -n 'CN=www.yourserver.com' -b 01/01/2000 -e 01/01/2036 -eku 1.3.6.1.5.5.7.3.1 -ss my -sr localMachine -sky exchange -sp 'Microsoft RSA SChannel Cryptographic Provider' -sy 12
To install this certificate in IIS 5.0, open the IIS 'Web Site Properties', 'Directory Security', 'Server Certificate...', 'Assign an existing certificate' and select the new certificate from the list.
Monday, August 08, 2005
How to set your IP address + gateway + DNS from DOS
In order to automate setting the IP address, e.g. by using this commands in a batch file, or by having to switch quickly between different IP settings (e.g. for your laptop when having to connect to the network on different locations, and so needing different IP settings) you can use the the netshell command: netsh
OS exploits are 'old hat'
Security issues involving Cisco kit highlighted in Michael Lynn’s presentation at Black Hat are characteristic of networking vendors in general. Cisco is just the most visible of these vendors to target as hackers raise their sights from attacking operating systems towards attacking network infrastructure and database systems, security researchers warn.
According to vulnerability management firm nCircle, virtually all the network vendors tend to run monolithic, closed OSs that are mission-critical for their customers and doesn't lend itself well to the simplistic desktop patching models currently in place. nCircle reckons as Microsoft's security gradually improves hackers will look to others mechanisms of attack - a trend that puts networking equipment in the firing line.
According to vulnerability management firm nCircle, virtually all the network vendors tend to run monolithic, closed OSs that are mission-critical for their customers and doesn't lend itself well to the simplistic desktop patching models currently in place. nCircle reckons as Microsoft's security gradually improves hackers will look to others mechanisms of attack - a trend that puts networking equipment in the firing line.
Cisco 'eyes' Nokia network biz
Is Cisco pursuing a merger with Nokia? That's certainly what UK newspaper the Sunday Business claimed this weekend.
The paper said Cisco is looking to merge with a network infrastructure provider, and it believes Nokia is the firm CEO John Chambers has in mind.
The paper said Cisco is looking to merge with a network infrastructure provider, and it believes Nokia is the firm CEO John Chambers has in mind.
Friday, July 29, 2005
Free Space Optics :: Technology
What is Free Space Optics (FSO)?
The Technology at the Heart of Optical Wireless
Imagine a technology that offers full-duplex Gigabit Ethernet throughput. A technology that can be installed license-free worldwide, can be installed in less than a day. A technology that offers a fast, high ROI.
That technology is free-space optics (FSO).
This line-of-sight technology approach uses invisible beams of light to provide optical bandwidth connections. It's capable of sending up to 1.25 Gbps of data, voice, and video communications simultaneously through the air — enabling fiber-optic connectivity without requiring physical fiber-optic cable. It enables optical communications at the speed of light. And it forms the basis of a new category of products — optical wireless products from LightPointe, the recognized leader in outdoor wireless bridging communications.
This site is intended to provide valuable background and resource information on FSO technology. Whether you're a student, an engineer, account manager, partner, or customer, this site provides the FSO insight you may require. And for providing high-speed connections, across Enterprises and between cell-site towers, it is the best technology available.
FSO is a line-of-sight technology that uses invisible beams of light to provide optical bandwidth connections that can send and receive voice, video, and data information. Today, FSO technology — the foundation of LightPointe's optical wireless offerings — has enabled the development of a new category of outdoor wireless products that can transmit voice, data, and video at bandwidths up to 1.25 Gbps. This optical connectivity doesn't require expensive fiber-optic cable or securing spectrum licenses for radio frequency (RF) solutions. FSO technology requires light. The use of light is a simple concept similar to optical transmissions using fiber-optic cables; the only difference is the medium. Light travels through air faster than it does through glass, so it is fair to classify FSO technology as optical communications at the speed of light.
The Technology at the Heart of Optical Wireless
Imagine a technology that offers full-duplex Gigabit Ethernet throughput. A technology that can be installed license-free worldwide, can be installed in less than a day. A technology that offers a fast, high ROI.
That technology is free-space optics (FSO).
This line-of-sight technology approach uses invisible beams of light to provide optical bandwidth connections. It's capable of sending up to 1.25 Gbps of data, voice, and video communications simultaneously through the air — enabling fiber-optic connectivity without requiring physical fiber-optic cable. It enables optical communications at the speed of light. And it forms the basis of a new category of products — optical wireless products from LightPointe, the recognized leader in outdoor wireless bridging communications.
This site is intended to provide valuable background and resource information on FSO technology. Whether you're a student, an engineer, account manager, partner, or customer, this site provides the FSO insight you may require. And for providing high-speed connections, across Enterprises and between cell-site towers, it is the best technology available.
FSO is a line-of-sight technology that uses invisible beams of light to provide optical bandwidth connections that can send and receive voice, video, and data information. Today, FSO technology — the foundation of LightPointe's optical wireless offerings — has enabled the development of a new category of outdoor wireless products that can transmit voice, data, and video at bandwidths up to 1.25 Gbps. This optical connectivity doesn't require expensive fiber-optic cable or securing spectrum licenses for radio frequency (RF) solutions. FSO technology requires light. The use of light is a simple concept similar to optical transmissions using fiber-optic cables; the only difference is the medium. Light travels through air faster than it does through glass, so it is fair to classify FSO technology as optical communications at the speed of light.
Thursday, July 28, 2005
VoIPong - Voice over IP ( VoIP ) sniffer and call detector
"What is VoIPong
VoIPong is a utility which detects all Voice Over IP calls on a pipeline, and for those which are G711 encoded, dumps actual conversation to seperate wave files. It supports SIP, H323, Cisco's Skinny Client Protocol, RTP and RTCP.
It's been written in C language for performance reasons, proved to be running on Solaris, Linux and FreeBSD; though it's thought to compile and run on other platforms as well.
On a 45 Mbit/sec actual network traffic, it's been verified that VoIPong successfully detected all VoIP gateways and the VoIP calls. CPU utilization during the run has been found ranging between 66% - 80% on a 256MB RAM, Celeron 1700 Mhz Toshiba notebook."
VoIPong is a utility which detects all Voice Over IP calls on a pipeline, and for those which are G711 encoded, dumps actual conversation to seperate wave files. It supports SIP, H323, Cisco's Skinny Client Protocol, RTP and RTCP.
It's been written in C language for performance reasons, proved to be running on Solaris, Linux and FreeBSD; though it's thought to compile and run on other platforms as well.
On a 45 Mbit/sec actual network traffic, it's been verified that VoIPong successfully detected all VoIP gateways and the VoIP calls. CPU utilization during the run has been found ranging between 66% - 80% on a 256MB RAM, Celeron 1700 Mhz Toshiba notebook."
Windows XP DoS Bug Worse Than Thought
"It affects several other editions of Windows, and could have buffer overflow potential
A bug in Windows that went public last week may be more dangerous than originally believed, Microsoft confirmed Saturday in a weekend advisory. One security analyst fears that the vulnerability -- which for now looks limited to a denial-of-service attack -- may soon be found to cause more severe problems for Windows users.
According to the Security Advisory posted Saturday, the bug in Windows Remote Desktop Service affects not just Windows XP SP2, as originally thought, but all the supported editions of Windows, including Windows 2000, Windows XP SP1, Windows XP Professional x64, Windows Server 2003, Windows Server 2003 SP1, and Windows Server x64.
Since May, Microsoft has had the advisory service in place to warn users of confirmed vulnerabilities before a patch is available, and if possible, provide advice on how to contain or prevent an exploit.
Microsoft downplayed the danger posed by the flaw. "
A bug in Windows that went public last week may be more dangerous than originally believed, Microsoft confirmed Saturday in a weekend advisory. One security analyst fears that the vulnerability -- which for now looks limited to a denial-of-service attack -- may soon be found to cause more severe problems for Windows users.
According to the Security Advisory posted Saturday, the bug in Windows Remote Desktop Service affects not just Windows XP SP2, as originally thought, but all the supported editions of Windows, including Windows 2000, Windows XP SP1, Windows XP Professional x64, Windows Server 2003, Windows Server 2003 SP1, and Windows Server x64.
Since May, Microsoft has had the advisory service in place to warn users of confirmed vulnerabilities before a patch is available, and if possible, provide advice on how to contain or prevent an exploit.
Microsoft downplayed the danger posed by the flaw. "
Celtic League - The Borders first up for Munster
Munster will begin their Celtic League campaign with a home game against Border Reivers and follow that a week later when they entertain title holders Neath-Swansea Ospreys. Ospreys open with a game against Leinster at their new Morfa Stadium on September 4th."
NetContinuum Launches the NC-2000 Application Security Gateway
New High Performance Platform Sets Industry Benchmarks for Fully Secured and Managed Web Transactions
July 18, 2005 Santa Clara, CA
NetContinuum, the company that helps IT organizations secure and optimize the delivery of web applications, today announced the immediate availability of the NC-2000 Application Security Gateway. The new high performance appliance sets industry benchmarks for processing fully secured and managed web transactions, advancing the trend toward consolidating application security and application delivery capabilities in a single appliance. NetContinuum also announced the industry's first integrated console, giving data center managers a single management interface to effectively control the converged security and traffic management feature set. "
July 18, 2005 Santa Clara, CA
NetContinuum, the company that helps IT organizations secure and optimize the delivery of web applications, today announced the immediate availability of the NC-2000 Application Security Gateway. The new high performance appliance sets industry benchmarks for processing fully secured and managed web transactions, advancing the trend toward consolidating application security and application delivery capabilities in a single appliance. NetContinuum also announced the industry's first integrated console, giving data center managers a single management interface to effectively control the converged security and traffic management feature set. "
Cisco, ISS file suit against rogue researcher | The Register
"LAS VEGAS--Networking giant Cisco and security company Internet Security Systems filed on Wednesday a restraining order against the management of the Black Hat Conference and a security expert who told conference attendees that attackers can broadly compromise Cisco routers.
The legal action followed a presentation by security researcher Michael Lynn, a former ISS employee, who brushed off threats of legal action and a broad effort to delete his presentation from conference materials to warn attendees that malicious programs could be run on Cisco routers."
The legal action followed a presentation by security researcher Michael Lynn, a former ISS employee, who brushed off threats of legal action and a broad effort to delete his presentation from conference materials to warn attendees that malicious programs could be run on Cisco routers."
NG Command Line - Topic Powered by Groupee Community
NG COMMAND LINE INTERFACE excluding switch options)
SETUP
cpconfig – reconfigures an existing VPN-1/Firewall-1 installation
cpstart – starts all Check Point applications running on a machine
(invokes fwstart, fgstart, uagstart, etc.)
cpstop – stops all Check Point applications running on a machine
fwstart – loads the VPN-1/Firewall-1 Module and starts:
VPN-1/Firewall-1 daemon (fwd)
The Management Server (fwm)
VPN-1/Firewall-1 SNMP daemon (snmpd)
The authentication daemons
fwstop – kills the following processes:
VPN-1/Firewall-1 daemon (fwd)
The Management Server (fwm)
VPN-1/Firewall-1 SNMP daemon (snmpd)
The authentication daemons
It also unloads the VPN-1/Firewall-1 Module
cp_permission – sets up the permissions for CPMI
CONTROL
fw load – compiles and installs a Security Policy to the target’s VPN-1/Firewall-1 Modules.
This is done in two ways:
1. fw load compiles and installs an Inspection Script (*.pf) file to the designated VPN-1/Firewall-1 Modules.
2. fw load converts a Rule Base (*.W) file created by the GUI into an Inspection Script (*.pf) file, then installs it to the designated VPN-1/Firewall-1 Modules.
fw bload – compiles and installs a Security Policy to the target’s embedded
VPN-1/Firewall-1 Modules. This is done in one of two ways.
1. fw bload compiles and installs an Inspection Script (*.pf) file to the Firewall-1 embedded system specified by
targets.
2. fw bload converts a Rule Base (*.W) file created by the GUI into an Inspection Script (*.pf) file and then compiles and installs it to the Firewall-1 embedded system specified by targets.
fw unload – uninstalls the currently loaded Inspection Code from selected targets
fw fetch – fetches the Inspection Code from the specified host and installs it to the kernel
fw putkey – installs a VPN-1/Firewall-1 authentication password on a host.
This password is used to authenticate internal communications between VPN-1/Firewall-1 Modules and between a Check Point Module and Management Server. That is, the password
is used to authenticate the control channel the first time communication is established.
fw dbload – downloads the user database and network object information (for example, encryption keys) to selected targets
MONITOR
cpstat – displays the status of target hosts in various formats (replaces fwstat, fw fgstat, fgate state, etc.)
cpstat_monitor – a utility that runs on the Check Point Management Station which can trigger pre-defined actions when the system changes its status or when an event has occurred. This is done by defining limits (or thresholds) on status Parameters, and actions to be taken.
fw lichosts – prints a list of hosts protected by the VPN-1/Firewall-1/n products. The list of hosts is in the file $FWDIR/database/fwd.h
fw ver – displays the VPN-1/Firewall-1 major version number, the build number, and a copyright notice
fw sam – inhibits (blocks) connections to and from specific IP addresses without the need to change the Security Policy. The command is logged
UTILITIES
fw ctl – sends control information to the VPN-1/Firewall-1 Kernel Module
pstat – displays VPN-1/Firewall-1 internal statistics
iflist – displays the IP interfaces known to the kernel by name and
internal number
arp – displays ARP proxy table
fw kill – sends a signal to a VPN-1/Firewall-1 daemon
fwm – the VPN-1/Firewall-1 Management Server in the Client/Server implementation of the Management Server, and is used for communicating with the GUI and adding, updating, and removing administrators.
fwell – manages Access Lists for Wellfleet (Bay Networks) routers
fw tab – displays the content of INSPECT tables on the target hosts in
various formats.
snmp_trap – sends an SNMP trap to the specified host. The message may appear in the command line, or as one in the program input (stdin)
dynamic_objects – specifies an IP address to which the dynamic object will be resolved on this machine
dbedit – edits the objects file on the Management Server
queryDB_util – enables searching the object database according to search parameters
Log File Management
fw log – displays the content of Log Files
fw logswitch – creates a new Log File. The current Log File is closed and renamed $FWDIR/log/date.log and a new Log File with the default name ($FWDIR/log/fw.log) is created
fw logexport – exports the Log File to an ASCII file
fw repairlog – rebuilds a Log file’s pointer files. The three files fw.logptr, fw.loginitial_ptr and fw.logaccount_ptr are recreated from data in the specified Log file
HIGH AVAILABILITY
cphastart - enables the High Availability feature on the machine. In NT, this is done when the VPN-1/Firewall-1 Module is started. In Solaris, the cphastart command is part of the fwstart script
cphastop - disables the High Availability feature on the machine
cphaprob - defines critical processes. When a critical process fails, the machine is considered to have failed.
cpha_export (Solaris only) – writes MAC address information to stdout. If the output is redirected to a file, it can be input (stdin) to cpha_import on another machine.
cpha_import (Solaris only) – imports MAC address information from stdin
and updates the machine’s MAC address
accordingly. The normal procedure is to
redirect stdin to read a file created by
cpha_export on the primary machine
fw hastat – displays information about High Availability machines and their states.
USER DATABASE MANAGEMENT
fw dbimport – imports users into the VPN-1/Firewall-1 User Database from an external file. You can create this file yourself, or use a file generated by fw dbexport
fw dbexport - exports the VPN-1/Firewall-1 User Database to a file.
The file may be in one of the following formats:
1. the same Usage as the import file for fw dbimport
2. LDIF Usage, which can be imported into an LDAP
Server using ldapmodify
ldapmodify - imports users to an LDAP server. The input file must be in the LDIF format
fw ldapsearch - queries an LDAP directory and returns the results
fw expdate - changes the expiration date of users (but not templates) in the VPN-1/Firewall-1 User Database to the date specified by the first parameter. This change can be optionally applied only to selected users by specifying the second parameter
Certificates
fw ca putkey – distributes the Certificate Authority Key to a Check Point Module
fw ca genkey - is used to generate the Certificate Authority Key on a Management Server
fw certify ssl – is used to generate a Certificate Authority certificate on a
Check Point Module
fw internalca - enables hybrid authentication mode, which allows the server to perform IKE key exchange with the clients using authentication schemes non-interoperable with IKE.
Instructs the Management Server to initiate an Internal CA, which involves creating an Internal CA database, generating public and private keys, issuing a certificate and saving it.
fw ikecrypt - encrypts the password of a SecuRemote user using IKE. The resulting string must then be stored in the LDAP database.
fw sic_reset - resets Secure Internal Communication (SIC) on the Management Server. The user will be prompted before the operation actually takes place.
This command deletes the internal Certificate Authority,deletes the Management Server certificate, deletes the Certificate Revocation List (CRL), and updates the objects database.
LICENSING
cplic put - is used to install one or more Local licenses. This command installs a license on a local machine – it cannot be performed remotely.
cplic print - prints details of Check Point licenses on the local machine. On a Module, this command will print all licenses that are installed on the local machine – both Local and Central licenses.
cplic del - deletes a single Check Point license on a host. Use it to delete unwanted evaluation, expired and other licenses. On a Module,this command will work only for a Local license.
cplic check – is used to check whether the license on the machine will allow a given feature to be used. This command is used mainly for Technical Support purposes.
cprlic put – can be used only from the Management Server, to attach (install) one or more:
- Central licenses on an NG Module
- Local licenses on the appropriate NG Module
- Version 4.1 licenses on the appropriate version 4.1 Module
cprlic add - is used to add one or more licenses to the license repository on the Management Server.
cprlic print - displays the details of Check Point licenses stored in the license repository on the Management Server
cprlic del – used to detach a Central license from an NG Module. This command deletes the license from the Module. A Central license remains in the repository an an unattached license. The license is available for attachment to another Module.
This command can be executed only on a Management Server.
cprlic rm - removes a license from the license repository on the Management Server. It can be executed ONLY after the license was detached using the cprlic del command.
Once the license has been removed from the repository, it can no longer be used. To re-use it, use the cprlic add Or cprlic put command.
cprlic get - retrieves all licenses from a Module into the license repository on the Management Server. Do this to synchronize the repository with the Module, if NG and version 4.1 Local licenses were added (or deleted) locally, and hence do not yet
(or still) exist in the license repository. Retrieving licenses will also delete from the repository Local licenses that do not exist on the Module.
INSTALLATION MANAGEMENT
cppkg add – is used to add an installation package file to the Product Repository. The package file can be located on a CD or a local or network drive. Cppkg does not overwrite existing packages. Only SecureUpdate packages can be added to the
Product Repository.
cppkg delete – is used to delete a product package from the repository.
cppkg search - is used to list the contents of the Product Repository. Use this command to see the product and OS strings required to install a product package using the cprinstall command, or to delete a package using the cppkg delete command.
cppkg setroot - is used to create a new repository root directory location, and to move existing product packages into the new repository. The default Product Repository location is created when the Management Server is installed.
cppkg getroot - is used to find out the location of the Product Repository
cprinstall get - is used to obtain details of the products and the Operating System installed on the specified Module, and to update the Product Repository database.
cprinstall test - is used to test whether the product can be installed on the
remote Module. It verifies that the Operating System and currently installed products are appropriate for the package,and that there is enough disk space to install the product.
cprinstall install – is used to install Check Point products on remote modules
cprinstall uninstall – is used to uninstall products on remote Modules
cprinstall boot – is used to boot the remote computer
cprinstall stop – is used to stop the operation of other cprinstall commands.
In particular, this command stops the remote installation of a product – even during transfer of files, file extraction, and pre-installation testing. The operation can be stopped at any time up to the actual installation.
VPN-1 ACCELERATOR CARD
vpn accel - used for turning on (or off) the accelerator card. When it is installed, it is enabled by default. You can also check its status with the command vpn accel stat
lunadiag - a software diagnostics utility specific to the Luna accelerator card in the Luna package. The utility is documented in the file lunadiag.txt
VPN COMMANDS
vpn ver - displays the VPN-1 major version number, the build number, and a copyright notice. Usage and options are the same as for fw ver
vpn debug - debug the VPN-1 daemon
vpn drv - installs the VPN-1 kernel(vpnk) and connects to the Firewall-1 kernel (fwk)
vpn intelrng - displays the status of the Intel RNG (random number generator). This command is a Windows NT and Windows
2000 only command.
DAEMONS
cpwd_admin - is used to show the status of processes, and to configure cpwd
cpridstop – used to stop cprid
cpridstart - used to start cprid (cprid is independent of cpstart and cpstop)
FLOODGATE-1 COMMANDS
etmstart - loads the FloodGate Module and starts the FloodGate-1 daemon (fgd). Also starts the Management Server, provided it is on the same machine as the FloodGate Module.
etmstop - kills the FloodGate-1 daemon (fgd) and then unloads the FloodGate Module. Also stops the Management Server, Provided it is on the same machine as the FloodGate Module.
fgate load - installs a QoS Policy on the specified FloodGate Modules.
If targets is not specified, the QoS Policy is installed on the local host.
fgate unload - uninstalls a QoS Policy from the specified FloodGate Modules
fgate fetch - fetches the FloodGate QoS Policy that was last installed on the local host. You must specify the machine where the FloodGate QoS Policy is found. Use “localhost” in case there is no Management Server or if the Management Server is down.
fgate stat - displays the status of target hosts in various formats. The default format displays the following information for each host: host name, Rule Base (or FloodGate Module) file name, date and time loaded, and the interface and direction loaded.
fgate ver - displays the FloodGate-1 version number. The version of the GUI is displayed in the opening screen, and can be viewed at any time from the Help menu.
fgate kill - sends a signal to a FloodGate-1 daemon
OPSEC COMMANDS
upgrade_fwopsec - upgrades OPSEC configuration information on the Management Server from pre-NG to NG format, based on the upgraded Module information. If you have not
changed any of the defaults, then there is no need to run the upgrade_fwopsec command. However, if you have changed the defaults, then you should run the
upgrade_fwopsec command.
BOOT SECURITY
fwstop-default - kills VPN-1/Firewall-1 processes and loads the Default Filter
fwstop-proc - kills VPN-1/Firewall-1 processes but keeps the current kernel policy. The Security Policy remains loaded in the kernel, though user mode processes (cpd, fwd, fwm, vpnd,fwssd) don’t work. Logs, kernel traps, resources, all security server connections will all stop working. The state of the kernel remains unchanged. Whatever was loaded in the kernel is kept. Therefore, rules with generic allow/
reject/drop rules, based only on service will continue working.
control_bootsec – enables or disables Boot Security. The command turns
both the Default Filter and the initial policy off or on, in the correct sequence.
fwboot bootconf – use to change IP Forwarding or Default Filter settings.
This command is located in $FWDIR/boot
comp_init_policy –u - removes the current initial policy, and ensures that
it won’t be generated in the future when cpconfig is run
comp_init_policy –g - generates the initial policy and ensures that it will
be loaded the next time a policy is fetched (at fwstart, or at next boot, or via the fw fetch localhost command). After running this command, cpconfig will add an initial policy when needed.
defaultfilter.boot - installed by default. It allows:
- all outgoing communications
- incoming communications on ports through which there were previous outgoing communications
- ICMP packets
- broadcast packets
defaultfilter.drop - drops all communications in and out of the gateway during the period of vulnerability. If the boot process requires that the gateway communicate with other hosts, then the drop default Security Policy should not be used.
fw defaultgen - use to compile the default filter
SETUP
cpconfig – reconfigures an existing VPN-1/Firewall-1 installation
cpstart – starts all Check Point applications running on a machine
(invokes fwstart, fgstart, uagstart, etc.)
cpstop – stops all Check Point applications running on a machine
fwstart – loads the VPN-1/Firewall-1 Module and starts:
VPN-1/Firewall-1 daemon (fwd)
The Management Server (fwm)
VPN-1/Firewall-1 SNMP daemon (snmpd)
The authentication daemons
fwstop – kills the following processes:
VPN-1/Firewall-1 daemon (fwd)
The Management Server (fwm)
VPN-1/Firewall-1 SNMP daemon (snmpd)
The authentication daemons
It also unloads the VPN-1/Firewall-1 Module
cp_permission – sets up the permissions for CPMI
CONTROL
fw load – compiles and installs a Security Policy to the target’s VPN-1/Firewall-1 Modules.
This is done in two ways:
1. fw load compiles and installs an Inspection Script (*.pf) file to the designated VPN-1/Firewall-1 Modules.
2. fw load converts a Rule Base (*.W) file created by the GUI into an Inspection Script (*.pf) file, then installs it to the designated VPN-1/Firewall-1 Modules.
fw bload – compiles and installs a Security Policy to the target’s embedded
VPN-1/Firewall-1 Modules. This is done in one of two ways.
1. fw bload compiles and installs an Inspection Script (*.pf) file to the Firewall-1 embedded system specified by
targets.
2. fw bload converts a Rule Base (*.W) file created by the GUI into an Inspection Script (*.pf) file and then compiles and installs it to the Firewall-1 embedded system specified by targets.
fw unload – uninstalls the currently loaded Inspection Code from selected targets
fw fetch – fetches the Inspection Code from the specified host and installs it to the kernel
fw putkey – installs a VPN-1/Firewall-1 authentication password on a host.
This password is used to authenticate internal communications between VPN-1/Firewall-1 Modules and between a Check Point Module and Management Server. That is, the password
is used to authenticate the control channel the first time communication is established.
fw dbload – downloads the user database and network object information (for example, encryption keys) to selected targets
MONITOR
cpstat – displays the status of target hosts in various formats (replaces fwstat, fw fgstat, fgate state, etc.)
cpstat_monitor – a utility that runs on the Check Point Management Station which can trigger pre-defined actions when the system changes its status or when an event has occurred. This is done by defining limits (or thresholds) on status Parameters, and actions to be taken.
fw lichosts – prints a list of hosts protected by the VPN-1/Firewall-1/n products. The list of hosts is in the file $FWDIR/database/fwd.h
fw ver – displays the VPN-1/Firewall-1 major version number, the build number, and a copyright notice
fw sam – inhibits (blocks) connections to and from specific IP addresses without the need to change the Security Policy. The command is logged
UTILITIES
fw ctl – sends control information to the VPN-1/Firewall-1 Kernel Module
pstat – displays VPN-1/Firewall-1 internal statistics
iflist – displays the IP interfaces known to the kernel by name and
internal number
arp – displays ARP proxy table
fw kill – sends a signal to a VPN-1/Firewall-1 daemon
fwm – the VPN-1/Firewall-1 Management Server in the Client/Server implementation of the Management Server, and is used for communicating with the GUI and adding, updating, and removing administrators.
fwell – manages Access Lists for Wellfleet (Bay Networks) routers
fw tab – displays the content of INSPECT tables on the target hosts in
various formats.
snmp_trap – sends an SNMP trap to the specified host. The message may appear in the command line, or as one in the program input (stdin)
dynamic_objects – specifies an IP address to which the dynamic object will be resolved on this machine
dbedit – edits the objects file on the Management Server
queryDB_util – enables searching the object database according to search parameters
Log File Management
fw log – displays the content of Log Files
fw logswitch – creates a new Log File. The current Log File is closed and renamed $FWDIR/log/date.log and a new Log File with the default name ($FWDIR/log/fw.log) is created
fw logexport – exports the Log File to an ASCII file
fw repairlog – rebuilds a Log file’s pointer files. The three files fw.logptr, fw.loginitial_ptr and fw.logaccount_ptr are recreated from data in the specified Log file
HIGH AVAILABILITY
cphastart - enables the High Availability feature on the machine. In NT, this is done when the VPN-1/Firewall-1 Module is started. In Solaris, the cphastart command is part of the fwstart script
cphastop - disables the High Availability feature on the machine
cphaprob - defines critical processes. When a critical process fails, the machine is considered to have failed.
cpha_export (Solaris only) – writes MAC address information to stdout. If the output is redirected to a file, it can be input (stdin) to cpha_import on another machine.
cpha_import (Solaris only) – imports MAC address information from stdin
and updates the machine’s MAC address
accordingly. The normal procedure is to
redirect stdin to read a file created by
cpha_export on the primary machine
fw hastat – displays information about High Availability machines and their states.
USER DATABASE MANAGEMENT
fw dbimport – imports users into the VPN-1/Firewall-1 User Database from an external file. You can create this file yourself, or use a file generated by fw dbexport
fw dbexport - exports the VPN-1/Firewall-1 User Database to a file.
The file may be in one of the following formats:
1. the same Usage as the import file for fw dbimport
2. LDIF Usage, which can be imported into an LDAP
Server using ldapmodify
ldapmodify - imports users to an LDAP server. The input file must be in the LDIF format
fw ldapsearch - queries an LDAP directory and returns the results
fw expdate - changes the expiration date of users (but not templates) in the VPN-1/Firewall-1 User Database to the date specified by the first parameter. This change can be optionally applied only to selected users by specifying the second parameter
Certificates
fw ca putkey – distributes the Certificate Authority Key to a Check Point Module
fw ca genkey - is used to generate the Certificate Authority Key on a Management Server
fw certify ssl – is used to generate a Certificate Authority certificate on a
Check Point Module
fw internalca - enables hybrid authentication mode, which allows the server to perform IKE key exchange with the clients using authentication schemes non-interoperable with IKE.
Instructs the Management Server to initiate an Internal CA, which involves creating an Internal CA database, generating public and private keys, issuing a certificate and saving it.
fw ikecrypt - encrypts the password of a SecuRemote user using IKE. The resulting string must then be stored in the LDAP database.
fw sic_reset - resets Secure Internal Communication (SIC) on the Management Server. The user will be prompted before the operation actually takes place.
This command deletes the internal Certificate Authority,deletes the Management Server certificate, deletes the Certificate Revocation List (CRL), and updates the objects database.
LICENSING
cplic put - is used to install one or more Local licenses. This command installs a license on a local machine – it cannot be performed remotely.
cplic print - prints details of Check Point licenses on the local machine. On a Module, this command will print all licenses that are installed on the local machine – both Local and Central licenses.
cplic del - deletes a single Check Point license on a host. Use it to delete unwanted evaluation, expired and other licenses. On a Module,this command will work only for a Local license.
cplic check – is used to check whether the license on the machine will allow a given feature to be used. This command is used mainly for Technical Support purposes.
cprlic put – can be used only from the Management Server, to attach (install) one or more:
- Central licenses on an NG Module
- Local licenses on the appropriate NG Module
- Version 4.1 licenses on the appropriate version 4.1 Module
cprlic add - is used to add one or more licenses to the license repository on the Management Server.
cprlic print - displays the details of Check Point licenses stored in the license repository on the Management Server
cprlic del – used to detach a Central license from an NG Module. This command deletes the license from the Module. A Central license remains in the repository an an unattached license. The license is available for attachment to another Module.
This command can be executed only on a Management Server.
cprlic rm - removes a license from the license repository on the Management Server. It can be executed ONLY after the license was detached using the cprlic del command.
Once the license has been removed from the repository, it can no longer be used. To re-use it, use the cprlic add Or cprlic put command.
cprlic get - retrieves all licenses from a Module into the license repository on the Management Server. Do this to synchronize the repository with the Module, if NG and version 4.1 Local licenses were added (or deleted) locally, and hence do not yet
(or still) exist in the license repository. Retrieving licenses will also delete from the repository Local licenses that do not exist on the Module.
INSTALLATION MANAGEMENT
cppkg add – is used to add an installation package file to the Product Repository. The package file can be located on a CD or a local or network drive. Cppkg does not overwrite existing packages. Only SecureUpdate packages can be added to the
Product Repository.
cppkg delete – is used to delete a product package from the repository.
cppkg search - is used to list the contents of the Product Repository. Use this command to see the product and OS strings required to install a product package using the cprinstall command, or to delete a package using the cppkg delete command.
cppkg setroot - is used to create a new repository root directory location, and to move existing product packages into the new repository. The default Product Repository location is created when the Management Server is installed.
cppkg getroot - is used to find out the location of the Product Repository
cprinstall get - is used to obtain details of the products and the Operating System installed on the specified Module, and to update the Product Repository database.
cprinstall test - is used to test whether the product can be installed on the
remote Module. It verifies that the Operating System and currently installed products are appropriate for the package,and that there is enough disk space to install the product.
cprinstall install – is used to install Check Point products on remote modules
cprinstall uninstall – is used to uninstall products on remote Modules
cprinstall boot – is used to boot the remote computer
cprinstall stop – is used to stop the operation of other cprinstall commands.
In particular, this command stops the remote installation of a product – even during transfer of files, file extraction, and pre-installation testing. The operation can be stopped at any time up to the actual installation.
VPN-1 ACCELERATOR CARD
vpn accel - used for turning on (or off) the accelerator card. When it is installed, it is enabled by default. You can also check its status with the command vpn accel stat
lunadiag - a software diagnostics utility specific to the Luna accelerator card in the Luna package. The utility is documented in the file lunadiag.txt
VPN COMMANDS
vpn ver - displays the VPN-1 major version number, the build number, and a copyright notice. Usage and options are the same as for fw ver
vpn debug - debug the VPN-1 daemon
vpn drv - installs the VPN-1 kernel(vpnk) and connects to the Firewall-1 kernel (fwk)
vpn intelrng - displays the status of the Intel RNG (random number generator). This command is a Windows NT and Windows
2000 only command.
DAEMONS
cpwd_admin - is used to show the status of processes, and to configure cpwd
cpridstop – used to stop cprid
cpridstart - used to start cprid (cprid is independent of cpstart and cpstop)
FLOODGATE-1 COMMANDS
etmstart - loads the FloodGate Module and starts the FloodGate-1 daemon (fgd). Also starts the Management Server, provided it is on the same machine as the FloodGate Module.
etmstop - kills the FloodGate-1 daemon (fgd) and then unloads the FloodGate Module. Also stops the Management Server, Provided it is on the same machine as the FloodGate Module.
fgate load - installs a QoS Policy on the specified FloodGate Modules.
If targets is not specified, the QoS Policy is installed on the local host.
fgate unload - uninstalls a QoS Policy from the specified FloodGate Modules
fgate fetch - fetches the FloodGate QoS Policy that was last installed on the local host. You must specify the machine where the FloodGate QoS Policy is found. Use “localhost” in case there is no Management Server or if the Management Server is down.
fgate stat - displays the status of target hosts in various formats. The default format displays the following information for each host: host name, Rule Base (or FloodGate Module) file name, date and time loaded, and the interface and direction loaded.
fgate ver - displays the FloodGate-1 version number. The version of the GUI is displayed in the opening screen, and can be viewed at any time from the Help menu.
fgate kill - sends a signal to a FloodGate-1 daemon
OPSEC COMMANDS
upgrade_fwopsec - upgrades OPSEC configuration information on the Management Server from pre-NG to NG format, based on the upgraded Module information. If you have not
changed any of the defaults, then there is no need to run the upgrade_fwopsec command. However, if you have changed the defaults, then you should run the
upgrade_fwopsec command.
BOOT SECURITY
fwstop-default - kills VPN-1/Firewall-1 processes and loads the Default Filter
fwstop-proc - kills VPN-1/Firewall-1 processes but keeps the current kernel policy. The Security Policy remains loaded in the kernel, though user mode processes (cpd, fwd, fwm, vpnd,fwssd) don’t work. Logs, kernel traps, resources, all security server connections will all stop working. The state of the kernel remains unchanged. Whatever was loaded in the kernel is kept. Therefore, rules with generic allow/
reject/drop rules, based only on service will continue working.
control_bootsec – enables or disables Boot Security. The command turns
both the Default Filter and the initial policy off or on, in the correct sequence.
fwboot bootconf – use to change IP Forwarding or Default Filter settings.
This command is located in $FWDIR/boot
comp_init_policy –u - removes the current initial policy, and ensures that
it won’t be generated in the future when cpconfig is run
comp_init_policy –g - generates the initial policy and ensures that it will
be loaded the next time a policy is fetched (at fwstart, or at next boot, or via the fw fetch localhost command). After running this command, cpconfig will add an initial policy when needed.
defaultfilter.boot - installed by default. It allows:
- all outgoing communications
- incoming communications on ports through which there were previous outgoing communications
- ICMP packets
- broadcast packets
defaultfilter.drop - drops all communications in and out of the gateway during the period of vulnerability. If the boot process requires that the gateway communicate with other hosts, then the drop default Security Policy should not be used.
fw defaultgen - use to compile the default filter
Wednesday, July 27, 2005
List of Commands for vi - Unix Editor
Starting an Editing Session
vi filename where filename is the name of the file to be edited.
Undo Command
u undo the last command.
Screen Commands
CTL/l Reprints current screen.
CTL/L Exposes one more line at top of screen.
CTL/E Exposes one more line at bottom of screen.
CTL/F Pages forward one screen.
CTL/B Pages back one screen.
CTL/D Pages down half screen.
CTL/U Pages up half screen.
Cursor Positioning Commands
j Moves cursor down one line, same column.
k Moves cursor up one line, same column.
h Moves cursor back one character.
l Moves cursor forward one character.
RET Moves cursor to beginning of next line.
0 Moves cursor to beginning of current line.
$ Moves cursor to end of current line.
SPACE Moves cursor forward one character.
nG Moves cursor to beginning of line n. Default is last line of file.
0 Moves the cursor to the first character of the line.
:n Moves cursor to beginning of line n.
b Moves the cursor backward to the beginning of the previous word.
e Moves the cursor backward to the end of the previous word.
w Moves the cursor forward to the next word.
/pattern Moves cursor forward to next occurrence of pattern.
?pattern Moves cursor backward to next occurrence of pattern.
n Repeats last / or ? pattern search.
Text Insertion Commands
a Appends text after cursor. Terminated by escape key.
A Appends text at the end of the line. Terminated the escape key.
i Inserts text before cursor. Terminated by the escape key.
I Inserts text at the beginning of the line. Terminated by the escape key.
o Opens new line below the current line for text insertion. Terminated by the escape key.
O Opens new line above the current line for text insertion. Terminated by the escape key.
DEL Overwrites last character during text insertion.
ESC Stops text insertion. The escape key on the DECstations is the F11 key.
Text Deletion Commands
x Deletes current character.
dd Deletes current line.
dw Deletes the current word.
d)Deletes the rest of the current sentence.
D, d$ Deletes from cursor to end of line.
P Puts back text from the previous delete.
Changing Commands
cw Changes characters of current word until stopped with escape key.
c$ Changes text up to the end of the line.
C, cc Changes remaining text on current line until stopped by pressing the escape key.
~ Changes case of current character.
xp Transposes current and following characters.
J Joins current line with next line.
s Deletes the current character and goes into the insertion mode.
rx Replaces current character with x.
R Replaces the following characters until terminated with the escape key.
Cut and Paste Commands
yy Puts the current line in a buffer. Does not delete the line from its current position.
p Places the line in the buffer after the current position of the cursor.
Appending Files into Current File
:R filename Inserts the file filename where the cursor was before the ``:'' was typed.
Exiting vi
ZZ Exits vi and saves changes.
:wq Writes changes to current file and quits edit session.
:q! Quits edit session (no changes made).
vi filename where filename is the name of the file to be edited.
Undo Command
u undo the last command.
Screen Commands
CTL/l Reprints current screen.
CTL/L Exposes one more line at top of screen.
CTL/E Exposes one more line at bottom of screen.
CTL/F Pages forward one screen.
CTL/B Pages back one screen.
CTL/D Pages down half screen.
CTL/U Pages up half screen.
Cursor Positioning Commands
j Moves cursor down one line, same column.
k Moves cursor up one line, same column.
h Moves cursor back one character.
l Moves cursor forward one character.
RET Moves cursor to beginning of next line.
0 Moves cursor to beginning of current line.
$ Moves cursor to end of current line.
SPACE Moves cursor forward one character.
nG Moves cursor to beginning of line n. Default is last line of file.
0 Moves the cursor to the first character of the line.
:n Moves cursor to beginning of line n.
b Moves the cursor backward to the beginning of the previous word.
e Moves the cursor backward to the end of the previous word.
w Moves the cursor forward to the next word.
/pattern Moves cursor forward to next occurrence of pattern.
?pattern Moves cursor backward to next occurrence of pattern.
n Repeats last / or ? pattern search.
Text Insertion Commands
a Appends text after cursor. Terminated by escape key.
A Appends text at the end of the line. Terminated the escape key.
i Inserts text before cursor. Terminated by the escape key.
I Inserts text at the beginning of the line. Terminated by the escape key.
o Opens new line below the current line for text insertion. Terminated by the escape key.
O Opens new line above the current line for text insertion. Terminated by the escape key.
DEL Overwrites last character during text insertion.
ESC Stops text insertion. The escape key on the DECstations is the F11 key.
Text Deletion Commands
x Deletes current character.
dd Deletes current line.
dw Deletes the current word.
d)Deletes the rest of the current sentence.
D, d$ Deletes from cursor to end of line.
P Puts back text from the previous delete.
Changing Commands
cw Changes characters of current word until stopped with escape key.
c$ Changes text up to the end of the line.
C, cc Changes remaining text on current line until stopped by pressing the escape key.
~ Changes case of current character.
xp Transposes current and following characters.
J Joins current line with next line.
s Deletes the current character and goes into the insertion mode.
rx Replaces current character with x.
R Replaces the following characters until terminated with the escape key.
Cut and Paste Commands
yy Puts the current line in a buffer. Does not delete the line from its current position.
p Places the line in the buffer after the current position of the cursor.
Appending Files into Current File
:R filename Inserts the file filename where the cursor was before the ``:'' was typed.
Exiting vi
ZZ Exits vi and saves changes.
:wq Writes changes to current file and quits edit session.
:q! Quits edit session (no changes made).
Mark Lyon's GMail Loader (GML) - Import Your Mail into GMail
Google recently announced the arrival of their 1GB web-based email account, GMail. Many people, including myself tried quite hard to get an invitation to join the public beta, and I eventually was able to get an account thanks to a friend at ArsTechnica.
Some of the benefits of GMail are the large storage space, easy labeling of messages (instead of sorting into folders), and quick Google-powered searching. As an email packrat, I jumped at the opportunity to have all my email easily searchable. I decided I would import all my old email from Netscape Communicator 4.7 (which had messages in it dating back to 1994). There was no upload feature included with GMail, however.
Some of the benefits of GMail are the large storage space, easy labeling of messages (instead of sorting into folders), and quick Google-powered searching. As an email packrat, I jumped at the opportunity to have all my email easily searchable. I decided I would import all my old email from Netscape Communicator 4.7 (which had messages in it dating back to 1994). There was no upload feature included with GMail, however.
Raj Blogs: Common UNIX Commands
cd - Change Directory. (Just like in dos)
mkdir - Make Directory.
rmdir - Removes a Directory that is empty!
ls - List directory. (Like dir in Windows)
cat – Short for concatenate. It was used to concatenate two filestogether via cat file1 file2 >file3 Didn‘t know that did you. Theechoing out to standard out gave cat a whole new meaning to the users.
more - Just like less. It pages output to the screen.
mv - Move. For moving files and directories around
rm Remove a file. Also rm rf for removing a folder and it‘scontent.
grep - Used to search for text within a stream or files. (man regex)
vi – A text based editor. You‘ll find that it‘s really a symboliclink to vim now a days.
rlogin - Remote login. I hope your admins disabled this!
passwd - Used to change your password.
ps - Used to processes.
nice - Run a program with lower priority so you don't hog CPU.
kill – Terminates a program. You can select what signal you want tokill a program with also. -9
gzip - Compresses files.
gunzip - Uncompresses files.
tee – Pipe your output to standard out and to a file. Nice forwatching a process and logging.
sort - A sort program
sed – Stream Editor. Excellent program to modify files or streams!(man regex)
uniq - Unique program.
awk – An excellent program to parse up streams or files into tokens.It supports a hellva lot of cool things and you can complete writeprograms with it. (man nawk also)
chgrp - Change Group
chown - Change owner
pwd - Current working directory.
find – Used to find programs and you can also execute commands oneach match found.
wc - Word, line, letter count program. For you line counting whores.
which - Finds a location of a program that's in your path.
last - See who last logged in.
du - Disk usage.
df - Disk Free
top – Running processes with CPU and other information thatrefreshes.
watch – Repeats a command and updates the screen with only thechanges
login - Logging in
telnet - Connect to another machine
logout - Logging out
emacs - Using the emacs text editor
cp - Making a copy of a file
chmod - Controlling access to your files
cmp - Comparing two files
compress - Compress a file
pine Using Pine to send and receive email
mush - The mush electronic mail system
talk - Talk to another user
write - Write messages to another user
ftp - Transferring files with ftp
man - Manual pages
quota v Finding out your available disk space quota
ical - Using the Ical personal organizer
finger - Getting information about a user
who - Finding out who's logged on
lpr - Printing
lprm - Removing a print job
lpq - Checking the print queues
ps - Finding your processes
kill - Killing a process
nohup - Continuing a job after logout
nice - Changing the priority of a job
& - What is a background process?
Cntrl-z - Suspending a process
fg - Resuming a suspended process
mkdir - Make Directory.
rmdir - Removes a Directory that is empty!
ls - List directory. (Like dir in Windows)
cat – Short for concatenate. It was used to concatenate two filestogether via cat file1 file2 >file3 Didn‘t know that did you. Theechoing out to standard out gave cat a whole new meaning to the users.
more - Just like less. It pages output to the screen.
mv - Move. For moving files and directories around
rm Remove a file. Also rm rf for removing a folder and it‘scontent.
grep - Used to search for text within a stream or files. (man regex)
vi – A text based editor. You‘ll find that it‘s really a symboliclink to vim now a days.
rlogin - Remote login. I hope your admins disabled this!
passwd - Used to change your password.
ps - Used to processes.
nice - Run a program with lower priority so you don't hog CPU.
kill – Terminates a program. You can select what signal you want tokill a program with also. -9
gzip - Compresses files.
gunzip - Uncompresses files.
tee – Pipe your output to standard out and to a file. Nice forwatching a process and logging.
sort - A sort program
sed – Stream Editor. Excellent program to modify files or streams!(man regex)
uniq - Unique program.
awk – An excellent program to parse up streams or files into tokens.It supports a hellva lot of cool things and you can complete writeprograms with it. (man nawk also)
chgrp - Change Group
chown - Change owner
pwd - Current working directory.
find – Used to find programs and you can also execute commands oneach match found.
wc - Word, line, letter count program. For you line counting whores.
which - Finds a location of a program that's in your path.
last - See who last logged in.
du - Disk usage.
df - Disk Free
top – Running processes with CPU and other information thatrefreshes.
watch – Repeats a command and updates the screen with only thechanges
login - Logging in
telnet - Connect to another machine
logout - Logging out
emacs - Using the emacs text editor
cp - Making a copy of a file
chmod - Controlling access to your files
cmp - Comparing two files
compress - Compress a file
pine Using Pine to send and receive email
mush - The mush electronic mail system
talk - Talk to another user
write - Write messages to another user
ftp - Transferring files with ftp
man - Manual pages
quota v Finding out your available disk space quota
ical - Using the Ical personal organizer
finger - Getting information about a user
who - Finding out who's logged on
lpr - Printing
lprm - Removing a print job
lpq - Checking the print queues
ps - Finding your processes
kill - Killing a process
nohup - Continuing a job after logout
nice - Changing the priority of a job
& - What is a background process?
Cntrl-z - Suspending a process
fg - Resuming a suspended process
Lenovo - Products - United KingdomThinkPad T43p, UC3H1UK / 2668H1G
I want this as my new laptop
Lenovo - Products - United KingdomThinkPad T43p, UC3H1UK / 2668H1G: " ATI Mobility FireGL V3200"
Lenovo - Products - United KingdomThinkPad T43p, UC3H1UK / 2668H1G: " ATI Mobility FireGL V3200"
Subscribe to:
Posts (Atom)
Blog Archive
-
►
2008
(4)
- ► 06/22 - 06/29 (1)
- ► 06/01 - 06/08 (1)
- ► 03/02 - 03/09 (1)
- ► 02/10 - 02/17 (1)
-
►
2007
(5)
- ► 10/21 - 10/28 (1)
- ► 09/23 - 09/30 (3)
- ► 07/08 - 07/15 (1)
-
►
2006
(6)
- ► 10/08 - 10/15 (2)
- ► 08/06 - 08/13 (1)
- ► 06/04 - 06/11 (1)
- ► 05/14 - 05/21 (1)
- ► 01/08 - 01/15 (1)
-
▼
2005
(51)
- ► 09/11 - 09/18 (4)
- ► 09/04 - 09/11 (6)
-
►
08/14 - 08/21
(17)
- Digital Camera Resource Page: About
- eWEEK.com Security Blog
- F-Secure : News from the Lab
- Windows Spyware Survival Tools
- Photography Shops
- Bob Atkins - Digital Photography - Camera Reviews ...
- CNN.com - Worm strikes down Windows 2000 systems
- Windows Port of Nessus
- GotoAssist
- Nokia IP330 reload
- My Dog Holly
- Checkpoint R55 and Cisco PIX Site to Site VPN
- ITtoolbox Blogs
- Configuring an IPSec Tunnel Between a Cisco Router...
- Configuring an IPSec Tunnel Between a Cisco Secure...
- little box » IIS: Setting up a self-signed SSL cer...
- How to use makecert.exe to create a self-signed te...
- ► 08/07 - 08/14 (3)
-
►
07/24 - 07/31
(13)
- Free Space Optics :: Technology
- VoIPong - Voice over IP ( VoIP ) sniffer and call ...
- Windows XP DoS Bug Worse Than Thought
- Celtic League - The Borders first up for Munster
- NetContinuum Launches the NC-2000 Application Secu...
- Cisco, ISS file suit against rogue researcher | Th...
- NG Command Line - Topic Powered by Groupee Community
- List of Commands for vi - Unix Editor
- Mark Lyon's GMail Loader (GML) - Import Your Mail ...
- Raj Blogs: Common UNIX Commands
- as400blog
- Lenovo - Products - United KingdomThinkPad T43p, U...
- Ballingarry