background preloader

Network Monitoring Tools

Network Monitoring Tools
Les Cottrell, SLAC. Last Update: December 14, 2015 ESnet | ESCC | PinGER Internet monitoring | Tutorial This is a list of tools used for Network (both LAN and WAN) Monitoring tools and where to find out more about them. The audience is mainly network administrators. You are welcome to provide links to this web page. Please do not make a copy of this web page and place it at your web site since it will quickly be out of date. Introduction [Contents] We welcome corrections such as identifying broken links (especially if you can provide an alternate/update), since over the years companies are absorbed by others, disappear, split up, change their web site etc. Suggesting Additions/Corrections etc. This is a volunteer, unfunded effort. Commercial Monitoring Tools, not integrated with an NMP [Contents] Public Domain or Free Network Monitoring Tools [Contents]

wall m0n0wall is a project aimed at creating a complete, embedded firewall software package that, when used together with an embedded PC, provides all the important features of commercial firewall boxes (including ease of use) at a fraction of the price (free software). m0n0wall is based on a bare-bones version of FreeBSD, along with a web server, PHP and a few other utilities. The entire system configuration is stored in one single XML text file to keep things transparent. m0n0wall is probably the first UNIX system that has its boot-time configuration done with PHP, rather than the usual shell scripts, and that has the entire system configuration stored in XML format. In m0n0wall 1.8.1, the base system has been switched to FreeBSD 8.4 for better support of recent hardware, and there have been significant improvements, new features and bug fixes in many areas.

How to Crack a Wi-Fi Network. | Arrow Webzine 1.Back Track Today we’re going to run down, step-by-step, how to crack a Wi-Fi network with WEP security turned on. Dozens of tutorials on how to crack WEP are already all over the internet using this method. Seriously—Google it. This ain’t what you’d call “news.” But what is surprising is that someone like me, with minimal networking experience, can get this done with free software and a cheap Wi-Fi adapter. Unless you’re a computer security and networking ninja, chances are you don’t have all the tools on hand to get this job done. * A compatible wireless adapter—This is the biggest requirement. * A BackTrack 3 Live CD. * A nearby WEP-enabled Wi-Fi network. * Patience with the command line. To crack WEP, you’ll need to launch Konsole, BackTrack’s built-in command line. First run the following to get a list of your network interfaces: The only one I’ve got there is labeled ra0. Now, run the following four commands. {*style:<i>airmon-ng stop (interface) ifconfig (interface) down </i>*} 3.

How to Hide Files in JPEG Pictures If you’re looking to hide files on your PC hard drive, you may have read about ways to encrypt folders or change the attributes on a file so that they cannot be accessed by prying eyes. However, a lot of times hiding files or folders in that way requires that you install some sort of software on your computer, which could then be spotted by someone else. I’ve actually written quite a few articles on how you can hide files and folders in Windows XP and Vista before, but here I’m going to show you a new way to hide files that is very counter-intuitive and therefore pretty safe! Using a simple trick in Windows, you can actually hide a file inside of the JPG picture file! You can actually hide any type of file inside of an image file, including txt, exe, mp3, avi, or whatever else. Hide File in Picture In order to accomplish this task, you will need to have either WinZip or WinRAR installed on your computer. Create a folder on your hard drive, i.e. Now here’s the fun part! And that’s it!

64 Things Every Geek Should Know « Caintech.co.uk If you consider yourself a geek, or aspire to the honor of geekhood, here’s an essential checklist of must-have geek skills. The term ‘geek’, once used to label a circus freak, has morphed in meaning over the years. What was once an unusual profession transferred into a word indicating social awkwardness. As time has gone on, the word has yet again morphed to indicate a new type of individual: someone who is obsessive over one (or more) particular subjects, whether it be science, photography, electronics, computers, media, or any other field. A techie geek is usually one who knows a little about everything, and is thus the person family and friends turn to whenever they have a question. USB – Universal Serial BusGPU – Graphics Processing UnitCPU – Central Processing UnitSATA – Serial ATAHTML – Hyper-text Markup LanguageHTTP – Hypertext Transfer ProtocolFTP – File Transfer ProtocolP2P – Peer-to-peer sharing (See 2. 1. 3. Here’s what one looks like: 4. 5.

EnGarde Secure Linux :: Welcome! Hot Wire Your Car From Wired How-To Wiki Nine times out of ten, the term "hot-wire" summons images of car theft. Of course, anyone who's been stranded in a hostile environment without their car keys knows better. Here's the trick to getting your vehicle moving again. This article is a wiki. What you'll need Proof of ownership of the vehicle Slotted screwdriver Wire stripper Insulated gloves Try the screwdriver It's not pretty, but a screwdriver can save you some trouble. If you're considering hot-wiring your car, chances are you're already in dire straits. No such luck? Remove the ignition cover Be careful not to do permanent damage when removing the cover. Before continuing, be sure to exercise extreme caution. The first step is to gain access to the wiring. Identify the battery and starter wires Consult your vehicle's manual to get the correct wire color code. You'll typically see three pairs of wires running into the back of the cylinder. Here's where it gets tricky. Strip and connect the power wires

Open Source Applications « Arrow Webzine GIMP – The GNU Image Manipulation Program is a Photoshop replacement that doesn’t have “quite” as much functionality but it’s excellent for free. It comes installed by default on many Linux distros and is also available in Windows. Worth a look. Inkscape – Inkscape is an Open Source vector graphics editor, with capabilities similar to Illustrator, Freehand, CorelDraw, or Xara X using the W3C standard Scalable Vector Graphics (SVG) file format. Paint.net – A really good, lightweight alternative to Photoshop. XnView – XnView is software to view and convert graphic files, apparently really simple to use and supports more than 400 graphics formats. ImageMagick – A lesser known application but it offers the ability to “create, edit, and compose bitmap images. Irfanview – OpenOffice –

XSS (Cross Site Scripting) Cheat Sheet Last revision (mm/dd/yy): 07/4/2018 This cheat sheet lists a series of XSS attacks that can be used to bypass certain XSS defensive filters. Please note that input filtering is an incomplete defense for XSS which these tests can be used to illustrate. Basic XSS Test Without Filter Evasion This is a normal XSS JavaScript injection, and most likely to get caught but I suggest trying it first (the quotes are not required in any modern browser so they are omitted here): XSS Locator (Polygot) The following is a "polygot test XSS payload." javascript:/*--></title></style></textarea></script></xmp><svg/onload='+/"/+/onmouseover=1/+/[*/[]/+alert(1)//'> Image XSS using the JavaScript directive Image XSS using the JavaScript directive (IE7.0 doesn't support the JavaScript directive in context of an image, but it does in other contexts, but the following show the principles that would work in other tags as well: No quotes and no semicolon Case insensitive XSS attack vector HTML entities Malformed A tags <! <!

Reverse proxy Un article de Wikipédia, l'encyclopédie libre. Schéma de principe du reverse proxy Principe de fonctionnement[modifier | modifier le code] Le proxy inverse est installé du côté des serveurs Internet. L'utilisateur du Web passe par son intermédiaire pour accéder aux applications de serveurs internes. Le proxy inverse est parfois appelé substitut (surrogate). Applications[modifier | modifier le code] Cette technique permet : Mémoire cache : le proxy inverse peut décharger les serveurs Web de la charge de pages/objets statiques (pages HTML, images) par la gestion d'un cache web local. Voir aussi[modifier | modifier le code] Articles connexes[modifier | modifier le code] Liens externes[modifier | modifier le code] USP Secure Entry Server: un proxy inverse commercial Portail de la sécurité informatique

Related: