We feature technical articles across the entire IT spectrum - Networking, security, operating systems, cloud, and programming.

What are horizontal or vertical scans ?

Horizontal Scan A horizontal scan is described as scan against a group of IPs for a single port. Vertical Scan A vertical scan is described as a single IP being scanned for multiple ports. Box Scanning A combination of both vertical and horizontal scans.

How do I set the hostname on CentOS ?

In order to set the hostname on CentOS you will need to change the HOSTNAME section within /etc/sysconfig/network Your hostname will now be updated once you logout and then back in. Its also worth noting that this will survive reboots.

What is an XML Firewall ?

Web services rely on the transfer of XML data. This poses a threat from the point of view that every packet possible could be malicious. Hackers may send SOAP (Simple Object Access Protocol) packets containing executable messages, crafted windows/SQL executables within XML packets or even initiate a XDoS (XML DoS attack). As the name suggested … Read more

Installing Cisco MARS 6.0.7 onto VMware

Below shows you the steps required in install Cisco MARS 6.0.7 onto VMware. !! This is purley a proof of concept and we do not endorse the use of the steps below in any environment (or situation) !! Steps : First of all download the recovery ISO from Cisco for CS MARS 6.0.7. Download the … Read more

How do I run apt-get when Im behind a proxy ?

In order configure your Ubuntu/Debian box to access HTTP, HTTPS and FTP via a Proxy you will need to assign some environment variables. Assign Environmental Variables Below shows you the different variables you need to declare : export HTTP_PROXY=[PROXY IP]:[PORT]export HTTPS_PROXY=[PROXY IP]:[PORT]export FTP_PROXY=[PROXY IP]:[PORT] Survive reboot To survive a reboot you need to add these … Read more

How to enable the telnet client in Windows 7

In both Vista and Windows 7 Microsoft (have by default) disabled the Telnet client in an attempt to approve the security of the operating systems. Below lists the steps that are needed in order to enable it : Goto Start Goto the Control Panel Open Programs And Features Select Turn Windows features on or off … Read more

How to clear an ASA`s configuration

You may find that there is a time in which you haven’t got access via the standard ASAOS CLI to change, amend or edit your current configuration. In this example we will show you the steps required for removing the configuration via ROMMON mode. Here are the steps : 1. Reboot the device2. On boot … Read more

IPTables Template

Below is a basic template for setting up IPTables on a Linux box : Create LOGDROP CHAIN. Add LOG and DROP to chain. iptables -N LOGDROP iptables -A LOGDROP -j LOG –log-level 6 iptables -A LOGDROP -j DROP Create input and output policies iptables –policy INPUT DROP iptables –policy OUTPUT DROP Add inbound rules iptables … Read more

Check Point – A look at SecureID Files

In order to to enable SecureID authentication you will need to generate an ‘sdconf.rec’ file from your ACE SERVER.You will then need to copy this file to the the  ‘/var/ace‘ directory of your Check Point Firewall (if the directory does not exsist create one). At the point that your ACE SERVER and your ACE AGENT … Read more

Windows 7 driver / application incompatibility work around

So you have Windows 7  but you either cant find the Windows driver for your Sound Card or your trusted old Windows XP program fails to work under your new OS. If so there is a way to allow you to run a program using the compatibility mode of your previous (working) Windows version. Steps … Read more