Magical Jelly Bean Keyfinder

What is the “Magical Jelly Bean Keyfinder” ?   The Magical Jelly Bean Keyfinder is a freeware open source utility that retrieves your Product Key (cd key) used to install Windows from your registry. It allows you to print or save your keys for safekeeping. It works on Windows 7, 95, 98, ME, 2000, XP, … Read more

Yum Update Error: ‘module object’ has no attribute ‘HTTPSHandler’

Issue When you try and run a yum update you receive the following error : root@localhost:/$ yum update Traceback (most recent call last): File “/usr/bin/yum”, line 4, in ? import yum File “/usr/lib/python2.4/site-packages/yum/__init__.py”, line 42, in ? import config File “/usr/lib/python2.4/site-packages/yum/config.py”, line 27, in ? from parser import ConfigPreProcessor File “/usr/lib/python2.4/site-packages/yum/parser.py”, line 3, in ? … Read more

Check Point is changing SYN packets to ACKs ?

Issue The initial SYN packets from your client to your server are  translated by your Firewall into ACK packets. This in turn  prevents the initial 3 way handshake establishing. Below shows an example, Inbound 15:32:19.546115 I 10.1.1.1.12345 > 192.168.1.1.1111: S 2292544025:2292544025(0) win 49640 <mss 1460,nop,wscale 0,nop,nop,sackOK> (DF) 15:32:22.924625 I 10.1.1.1.12345 > 192.168.1.1.1111: S 2292544025:2292544025(0) win … Read more

Netscreen – Enabling OSPF

The Open Shortest Path First (OSPF) routing protocol is an Interior Gateway rotocol (IGP) intended to operate within a single Autonomous System (AS). A router running OSPF distributes its state information (such as usable interfaces and neighbor reachability) by periodically flooding link-state advertisements (LSAs)throughout the AS. Enabling OSPF on a VR set vrouter trust-vr router-id … Read more

Windows Performance Tweaks

Please make sure you backup your registry prior to making any changes to your registry. To create a system restore point go to “Run” and type ‘%SystemRoot%\system32\restore\rstrui.exe’ Below are 2 performance tweaks you can make on your windows system. In addition to the registry key below I have also include the command syntax so that … Read more

SSH Tunneling

In this article we will be covering SSH port forwarding also known as SSH tunneling. As previously discussed in our previous article Proxing Web Traffic across a SSH Tunnel using SSH Dynamic Port Forwarding, SSH port forwarding (or tunneling) re-routes TCP/IP connections through an established SSH connection. Being encapsulated within SSH provides security benefits along … Read more

Proxy Web Traffic across SSH Tunnel with SSH Dynamic Port Forwarding

SSH port forwarding (or tunneling) re-routes TCP/IP connections through an established SSH connection. Being encapsulated within SSH provides security benefits along with the ability to route traffic through firewalls using just port 22 (SSH). In this example we will proxy our web traffic via our remote server across an established SSH connection. This is achieved … Read more

How do I create a trunk port in ESX ?

In order to create a trunk port in ESX you need to : Within vSphere or ViClient go to the “Configuration” tab. Select “Networking“ Select your “Add Networking“. Choose “Virtual Machine” and click “Next“ Select your Virtual Switch (or create one), then click “Next“ Choose you Network label and then add the VLAN ID as … Read more

Linux: Password Protect & Encrypt File Using OpenSSL

In this article we will encrypt (using AES 256 cbc) and password protect (Salt the AES) a file using the openssl binary. The file we will encrypt will be the file secretfile.txt.As you can see it is just a plain text file. [root@linux tmp]# cat  secretfile.txt This is a secret file that we do not … Read more