We feature technical articles across the entire IT spectrum - Networking, security, operating systems, cloud, and programming.

Linux – Creating a new Logical Volume / Partition

How do I create a new Logical Volume / Partition ? We will be creating a new logical volume named DATA and mounting this on a new directory called DATA. First of we will create the logical volume, then we will create a file system on the Logical Volume. Once complete we will create a … Read more

Logical Volume Manager

What is LVM ? LVM (Logical Volume Manager) for the Linux Kernel is a method of allocating hard drive space into logical volumes, this also allows for the easy creation, resizing, or removal of new or existing partitions. There are 4 main terms with LVM ….. physical volumes – These are your physical disks, or … Read more

Nokia: Install HFA30 to Diskless/Flash-based Check Point Firewall

The following steps will allow HFA30 to install on flash based system if the /opt has less then 400mb. Before we start you should ideally have the following free, /opt = 212184 /prevserve = 480694 mkdir ~/hfa30 cd ~/hfa30 tar xzvf ~/VPN-1_R65_HFA_30.ipso.tgz rm ~/VPN-1_R65_HFA_30.ipso.tgz df -k The output from df -k should now show over … Read more

Netscreen – Snoop

A great debugging tool feature on the Juniper Netscreens is snoop. Snoop is packet capturing tool which allows you to analysis your traffic on a per packet level. Below shows you a example of enabling snoop and viewing its output, 5gt->undebug all5gt->snoop5gt->snoop filter ip 10.1.1.1005gt->snoop info5gt->clear db 5gt->get db str Ok, so what do these … Read more

Check Point – Desktop Policy / Split Tunnelling

Desktop Policy / Split Tunneling In the world of Check Point remote access there are 2 types of clients that are used for remote VPN access. They are, Secure Remote – Basic Free client Secure Client – Non-free licensed client allowing the enforcement of desktop policies. Desktop Policy Within the Desktop Policy Tab of your … Read more

PIX – View the System Health

Below you will find a bunch of commands that can be used to gain a clear picture of a PIX/ASA`s system health, sh resource usage system sh memory sh cpu sh service-policy sh asp drop sh logging | i -1- sh fail | i This  

Bourne – File name Converter

This script will convert any mp3/wav/wma files into neat and tidy naming format, #!/bin/sh ls | /bin/egrep -i “.wma|.mp3|.wav” > /dev/null if [ $? == 0 ] then ls | /bin/egrep -i “.wma|.mp3|.wav”  | while read source do dest=$(echo “$source” | /bin/sed ‘s/^[0-9]*[-,_]//;s/^-//;s/\_/ /g;s/^ *//g;;s/.*/\L&/g;s/-/ – /g;s/  / /g;s/\<./\u&/g;s/…$/\L&/’) /bin/mv -fv “$source” “$dest” done exit … Read more

Ubuntu – Configuring an Interface

In order to configure an interface in Ubuntu you will need to edit the following file /etc/network/interfacesBelow is an example, auto [INTERFACE]iface [INTERFACE] inet staticaddress [IP ADDRESS]netmask [NETMASK]network [NETWORK]gateway [GATEWAY]  Once you have made the change to the interfaces file, run the following command /etc/init.d/networking restart

Windows – Comparing 2 files

From time to time you may need to compare 2 files, i find this is useful for comparing old device configurations such as routers or firewalls to see what has changed. The program is fc (file compare). Which is a small windows program run via the Command Prompt. This is a short guide on how … Read more

Windows – netsh – Change you IP address via the CLI

Netsh.exe is a network administration tool that allows you to configure and monitor Windows-based computers at a command prompt. With the Netsh.exe tool, you can direct the context commands you enter to the appropriate helper, and the helper then carries out the command. Setting you IP address Below is the syntax for setting the IP … Read more