background preloader

Network Calculators

Network Calculators

http://www.subnetmask.info/

Related:  Tools and UtilitiesRéseau

Splunk For Application Development, DevOps and APM Splunk® software allows you to quickly identify and pinpoint code-level issues at any stage of the development and release process. Only Splunk enables you to: Find and fix bugs quickly so you can ship product fasterGain insights into application usage and user behaviorGet real time, mission-critical visibility into every step, system and process involved in building, testing and shipping new products to your customers Download Splunk for free. You'll get a Splunk license for 60 days and can index up to 500 megabytes of data per day. After that, you can convert to a perpetual free license or purchase a license to continue using the expanded functionality designed for multi-user deployments.

Upside-Down-Ternet My neighbours are stealing my wireless internet access. I could encrypt it or alternately I could have fun. I'm starting here by splitting the network into two parts, the trusted half and the untrusted half. 15 Online Tools That You Will Come To Love As A Tech I have compiled a list of 15 free online tools that will help you greatly as a tech. I’m sure that there are other good ones that I have left out so please feel free to post the ones that you like as well. IPTools offers a wide variety of online networking tools. With this site you can look up IP address information, check spam databases, run pings, run traceroutes, lookup WHOIS information and much more. BugMeNot allows you to find and share logins for sites that require you to register. Home Network Security This section provides a basic introduction to the technologies that underlie the Internet. It was written with the novice end-user in mind and is not intended to be a comprehensive survey of all Internet-based technologies. Subsections provide a short overview of each topic. This section is a basic primer on the relevant technologies. For those who desire a deeper understanding of the concepts covered here, we include links to additional information.

Wireshark Display Filter Examples (Filter by Port, IP, Protocol) While debugging a particular problem, sometimes you may have to analyze the protocol traffic going out and coming into your machine. Wireshark is one of the best tool used for this purpose. In this article we will learn how to use Wireshark network protocol analyzer display filter. Zenmap - Official cross-platform Nmap Security Scanner GUI Zenmap is the official Nmap Security Scanner GUI. It is a multi-platform (Linux, Windows, Mac OS X, BSD, etc.) free and open source application which aims to make Nmap easy for beginners to use while providing advanced features for experienced Nmap users. Frequently used scans can be saved as profiles to make them easy to run repeatedly.

Open Ports Tool Remote Address Port Number Check a port's status by entering an address and port number above. Is your router causing you massive grief? Try picking up a cheap Netgear N600 on Amazon If my tool has been helpful to you, check out my desktop wallpaper site or follow me on Twitter @kirkouimet. :) How To Become A Hacker Copyright © 2001 Eric S. Raymond As editor of the Jargon File and author of a few other well-known documents of similar nature, I often get email requests from enthusiastic network newbies asking (in effect) "how can I learn to be a wizardly hacker?". Back in 1996 I noticed that there didn't seem to be any other FAQs or web documents that addressed this vital question, so I started this one.

NetworkMiner - The NSM and Network Forensics Analysis Tool NetworkMiner is a Network Forensic Analysis Tool (NFAT) for Windows (but also works in Linux / Mac OS X / FreeBSD). NetworkMiner can be used as a passive network sniffer/packet capturing tool in order to detect operating systems, sessions, hostnames, open ports etc. without putting any traffic on the network. NetworkMiner can also parse PCAP files for off-line analysis and to regenerate/reassemble transmitted files and certificates from PCAP files. NetworkMiner collects data (such as forensic evidence) about hosts on the network rather than to collect data regarding the traffic on the network. The main user interface view is host centric (information grouped per host) rather than packet centric (information showed as a list of packets/frames).

Three locks for your SSH door Introduction If you require remote access to your computer and you enable Secure Shell (SSH) connections, you must accept that you will automatically attract hackers who will try to break your defenses and take command of your machine. Although there's no guarantee that your machine won't be "0wn3d" by a "h4x0r," a few simple solutions can help reinforce your SSH door and make life a bit more difficult for anybody trying to break in. This article considers three such techniques: Changing SSH's standard port to an unusual value and reinforcing SSH configuration so that simple-minded attacks just bounce back. Defining a restricted list of users who are allowed to log in.Completely hiding the fact that you even allow SSH access and requiring a special "knock" sequence to be recognized as a possible user.

Browser Toolbars Online Privacy - Toolbar Removal Tool The risk with website monitoring is that it's possible for query strings to be monitored and retransmitted. Query strings are data strings following the '?' delimiter in urls often used by webform submissions and search engines. C Tutorial C Language Tutorial Table of Contents: This section contains a brief introduction to the C language.

PsExec Introduction Utilities like Telnet and remote control programs like Symantec's PC Anywhere let you execute programs on remote systems, but they can be a pain to set up and require that you install client software on the remote systems that you wish to access. PsExec is a light-weight telnet-replacement that lets you execute processes on other systems, complete with full interactivity for console applications, without having to manually install client software. SQL Injection Attacks by Example A customer asked that we check out his intranet site, which was used by the company's employees and customers. This was part of a larger security review, and though we'd not actually used SQL injection to penetrate a network before, we were pretty familiar with the general concepts. We were completely successful in this engagement, and wanted to recount the steps taken as an illustration. "SQL Injection" is subset of the an unverified/unsanitized user input vulnerability ("buffer overflows" are a different subset), and the idea is to convince the application to run SQL code that was not intended.

Related:  SQL / PHP / Network/g/Programs