IT Security & Network Engineering Knowledge Base

Practical documentation and technical guides on network security, firewalls, Linux systems, monitoring, and automation.
We feature technical articles across the entire IT spectrum - Built from real-world experience and continuously updated.

Messaging Security Threats

SPAM Spam continues to be the major threat affecting email systems today. The term Spam is used to define junk email messages that are usually sent out in high volumes to thousands of users at a time. SPAM Invasion Below contains some examples of some HTML-based filter evasion tactics, Tiny or invisible text that is … Read more

Instant Messaging

Instant Messaging is a Global Communications Medium for Business and Consumers. 85% of organizations report that they use IM for business usage and there are a reported 400 million global IM users.IM though does present a number of security issues. Unprotected IM is vulnerable to viruses and spam. In addition to this its ability to … Read more

SMTP (Simple Mail Transfer Protocol)

SMTP is an Application layer protocol (RFC 821,1982). Being a completely ASCII text based communication protocol, any binary or not text based attachments must be encoded before it can be sent using SMTP. To allow users to send rich content is MIME (Multipurpose Internet Mail Extension) was introduced. MIME is an Internet standard that extends … Read more

vSphere/VI Client: User name or password has an invalid format

Issue When trying to add a user you get the following error message, User name or password has an invalid format Solution This can be down to either Your password is not eight characters in length. Your password or username entered contained characters outside of the character types allowed. These are : – Alphanumeric Characters … Read more

vSphere – Creating User and Group Permissions

This tutorial was created using the vSphere client, but the general steps should pretty much the same for the Virtual Infrastructure Client.If you are using vCentre please read the notes relating to this at the bottom of the article. Create Privileges Click “View | Administration | Roles” Right client and cick “Add” Select a name … Read more

Check Point Solaris – Wrapper completed with error code 239

Issue On Solaris 8 or Solaris 9, installing Check Point package fails with either : /var/opt/cp_tmp/CPsuite-R65/install/request: /var/opt/cp_tmp/CPsuite-R65/install/request: cannot openpkgadd: ERROR: request script did not complete successfullyInstallation of <CPsuite-R65> failed. or /opt/CPInstLog/Wrapper_R65.elg contains[25/02 11:52:36]  Installing “Primary SmartCenter”[25/02 11:52:55]  Installing of “Primary SmartCenter” failed ![25/02 11:52:57]  Fail to install: Primary SmartCenter! See application usage format.[25/02 11:52:57]  Wrapper … Read more

vi / vim – Show Line Numbers

Below shows you how to display line numbers within vi. Enable While in VI and not in `Insert Mode`type the following to display the line numbers : :set number Disable To disable line numbers enter the following : :set nonumber

Windows – Environment Variables Windows 2000/XP

Environment variables are a set of dynamic named values that can affect the way running processes will behave on a computer. %ALLUSERSPROFILE% Returns the location of the All Users Profile %APPDATA% Returns the location where applications store data by default. %CD% Returns the current directory string %CMDCMDLINE% Returns the exact command line used to start … Read more

Netscreen – Track IP

IP tracking allows you to track the connectivity of critical IP`s.This allows you to change your routing based on the connectivity of configured IP`s. There are 3 main points to Track IP :  If a Tracked IP becomes unreachable, the weight of the address is added to the overall failed address total. If the total … Read more