When usingÂ memcached you can use a number of different potential deployment strategies and topologies. The exact strategy you use will depend on your application and environment. When developing a system for deployingmemcached within your system, you should keep in mind the following points: memcached is only a caching mechanism. It shouldn’t be used to store [...]
Apple iPhone 2.0 VPN Connectivity to Cisco Adaptive Security Appliances (ASA) Beginning with the iPhone 2.0 software (available July 2008), Apple offers an advanced VPN connectivity option for communicating with Cisco security appliances, including the ASA 5500 Series and the PIX Firewall. While Apple still supports access using L2TP/IPSec, end users attain superior connectivity by [...]
“MySQL Server Has Gone Away “ A common error for almost all the developers and DB Admins, spend lots of Â time to solve this problem, This is an unusualÂ behavior ofÂ MySQLÂ server and can happen in many circumstances. Â Last few days i was searching on the net as we got this problem when we run Our Cron [...]
The follow are some common Control Panel Applets that are located in the \windows\system32 directory.
If you find yourself using any of these frequently, then you can simply make shortcuts to them on your desktop.
The WebsensePing utility can be used to perform a variety of diagnostics. WebsensePing can mock a request from the firewall to Websense filtering components to help determine how Websense software resolves URLs without proxy or firewall involvement. Because WebsensePing does not rely on data passed from other network applications or services, it can test internal [...]
This is a snippet for the Cisco Pix firewall that create a ‘limited user’ account on the firewall itself. That user will have access to all ‘show’ diagnostic commands, as well as the ability to clear the error/usage counters on interfaces and to ping other devices. This configuration does the following things: Defines two user [...]
This is a snippet for the Cisco ASA firewall that permits active FTP sessions to pass through. This is the equivalent to the ‘fixup ftp’ commands of the previous PIX OS versions. For whatever reason this functionality was no longer enabled by default in my Cisco ASA 5510 [Cisco Adaptive Security Appliance Software Version 7.0(5)]. [...]
Bugzilla is a Web-based general-purpose bugtracker and testing tool originally developed and used by the Mozilla project, and licensed under the Mozilla Public License. Released as open source software by Netscape Communications in 1998, it has been adopted by a variety of organizations for use as a defect tracker for both free software and proprietary [...]
This step-by-step article describes how to install and configure Microsoft Internet Authentication Service (IAS) on a domain controller. IAS can run as a Remote Authentication Dial-In User Service (RADIUS) server. You can use IAS for centralized authentication and accounting of multiple Routing and Remote Access Service (RRAS) servers. Install IAS To install IAS: ClickÂ Start, point [...]
When you integrate Websense Enterprise with Check Point Firewall-1, and include Websense in the FireWall-1 rule base, you may receive an error message similar to the one shown below. The error message is a result of how Check Point FireWall-1 works when integrated with Websense Enterprise. A “resource rule” is a FireWall-1 rule that places [...]
Cisco PIX firewall v6.3 and higher can send HTTPS requests to Websense Enterprise. You need to configure this option at the Cisco PIX firewall. Telnet to your Cisco PIX firewall. After you log in, type the following at the command prompt: configure terminal PressÂ Enter. At the command prompt, enter the following: filter https 443 0 [...]
For Windows Server 2008â€™s Core Edition, the default firewall configuration is one of the things most administrators want to turn off after installation. You can complete this task with one line of code, which youâ€™ll want to add to your script arsenal. The use cases for Windows Server 2008 Core Edition include additional security for [...]
First-time download of the Master Database Websense Manager is the interface used to monitor Internet usage filtering, customize filtering behavior, and schedule or request database downloads. To start Websense Manager, selectÂ Start > Programs > Websense > Websense Manager. The first time you launch Websense Manager, you are asked to create a password. Enter a password [...]
The HTTP Redirector Filter that must be enabled in ISA for these clients to be redirected to the web-proxy service and then redirected to Websense. To enable the HTTP Redirector Filter: Access the ISA Management Console. Navigate to Extensions. Access Application Filters. Ensure that the HTTP Redirector Filter rule is enabled. If the rule is [...]
When enabling Websense in FireWall-1, the firewall takes on a completely different process for analyzing web requests. This is true for any content screening or virus scanning software that employs UFP, CVP, or user authentication. The process is as follows: Internet request hit the firewall and are handed over to a process called the HTTP [...]