Before you put your Linux system on ANY network the first thing to look at is what services you need to offer. Services that you do not need to offer should be disabled so that you have one less thing to worry about and attackers have one less place to look for a hole. You(…)
Users configure their web browsers to use the Squid proxy server instead of going to the web directly. The Squid server then checks its web cache for the web information requested by the user. It will return any matching information that finds in its cache, and if not, it will go to the web to(…)
To connect to the server, you will usually need to provide a MySQL user name when you invokeÂ mysqlÂ and, most likely, a password. If the server runs on a machine other than the one where you log in, you will also need to specify a host name. Contact your administrator to find out what connection parameters(…)
The xinetd daemon is a replacement for inetd, the internet services daemon. It monitors the ports for all network services configured in /etc/xinetd.d, and starts the services in response to incoming connections. To check if xinetd is enabled and running, execute: # chkconfig –list xinetd xinetd 0:off 1:off 2:off 3:on 4:on 5:on 6:off # /etc/init.d/xinetd(…)
SIP SIP inspection NATs the SIP text-based messages, recalculates the content length for the SDP portion of the message, and recalculates the packet length and checksum. It dynamically opens media connections for ports specified in the SDP portion of the SIP message as address/ports on which the endpoint should listen. SIP inspection has a database(…)
There are times that we are limited on uploading files and images to certain web-based services that we are managing along our duties. Here’s a quick how to on increasing your PHP file upload directive.
Before Configuration Manager can publish site data to Active Directory Domain Services, the Active Directory schema must be extended to create the necessary classes and attributes, the System Management container must be created, and the primary site serverâ€™s computer account must be granted full control of the System Management container and all of its child objects. Each site publishes its own site-specific information to the System Management container within its domain partition in the Active Directory schema.
Opened host ports are usually the most non-physical direct way of forcing entry remotely. Here you would see several tools and ways how to list out your currently opened ports from your managed linux box. Let’s view our first attempt to list out those opened and used ports. # netstat -panut | grep LISTEN We(…)
This document assumes working knowledge of the Windows Registry. It is possible to render your computer useless by incorrectly modifying the Registry. Caution is advisedâ€¦ Settings pertaining to Windows NT will say Win NT. All others refer to Win9x 1.Â Â Â Remove unwanted items from Control Panel | Add/Remove programs 2.Â Â Â Changing Icons for Desktop Items(…)
Change the default application install path Change the default Win2000 install path A warmer welcome Tell Win2000 where to find the service pack files Remove Unwanted programs from Add/Remove Programs Open My Computer icon in Explorer view Keep the Print Spooler service from displaying dialog boxes Stop Print Job Logging in the Event Log Disable(…)
1. How to know which ports are listening from your IP address? # nmap -sT -O your-ip-address 2. How to grep an exact match? # grep -w textfile.txt 3. How to reverse grep matches? # grep -v textfile.txt # 4. How to know which service name is what port? Assuming port 443 # cat testfile.txt(…)
1. How to you change file ownership and chown files recursively? # chown user:user folder -R 2. How to view queued mail in sendmail or postfix? # mailq 3. How to show which alternative binary program does your machine executes first? # alternatives –display program-name 4. How to create public/private rsa key pair? # ssh-keygen(…)