Rudy's Delphi Corner - Console unit Download I write a lot of console programs to test simple concepts, containing a few test routines and a few Writeln commands. To me, this is much more convenient than having to write a VCL program where the output goes to a ListBox or a Memo. The problem with the console windows in Delphi is, that they close immediately after they are finished. So most of my console programs contain a Readln command as the last instruction in the program. To be able to wait for any key, I wrote a simple unit with a ReadKey command, like in the old Turbo Pascal Crt unit. I tested the unit in Delphi 5 up to Delphi 2006. UPDATE: I removed from the implementation section. Installation Copy the contents of the zip file to a directory of your choice, and open the .dpr file in Delphi. The program itself demonstrates a few of the capabilities of the unit. Constants and variables The unit contains the following constants and variables. Functions and procedures Notes Window Sound, Delay, NoSound now. TextMode Legalese
XCoLinux - coLinux At the moment, you can't directly run an X server (using the display hardware) on a Cooperative Linux machine. The way so far is bringing the screen output to the windows host through the network and let windows display it somehow. So you'll need a running network before being able to continue here. There are currently two ways of working with X-Windows under coLinux : Native Windows X server: run a X server directly under windows and let the graphical applications use the X network protocol== VNC server on coLinux: Run the X VNC server under coLinux and bring the screen output to windows using a Windows VNC client== Which method to choose will depend. Use a X Window server on the Host System Edit We'll be discussing Cygwin/X here. Also, you will be able to use non-US keyboard now since your X Window server is a Windows application. Single-Window Mode Vs Multiple Window Mode To view a complete graphical desktop on windows, you can start an XServer in single window mode. A Screenshot 4): Type: or
Secure Role Based Access Control - AppGate Security Server A new module is available for the AppGate Security Server that provides a fully integrated one-time password (OTP) solution. AppGate has always supported a wide range of authentication methods and two-factor authentication. This new module enables customers to deploy a robust OTP solution without the need for additional hardware or servers. One-time passwords are generated on users’ mobile phones, avoiding the need to distribute and maintain physical tokens, and provisioning and initialisation is handled automatically. The user’s phone does not require any network connectivity in order to generate each one-time password as no SMS is sent. With AppGate one-time password authentication can be combined with other authentication methods to provide added security where required. Clustering The AppGate Security Server supports clustering, which enables the use of multiple servers for redundancy or scalability. Nordic Edge OTP Server Business Continuity License ICE License Device Firewall
Cygwin/X darkjumper ExpandingRoot - coLinux Copy all files into new image This way seems more complicated, but it is faster and safer. A backup is inclusive by doing it this way. You will need the same free disk space as compared to a backup, increase filesize, and resize the new image. Resizing an existing image This method is extremely dangerous and can damage an existing image. Adding new mount point This does not make the root filesystem bigger, but it adds more space at a mount point in the filesystem and gives the root filesystem some free space. The differences between the methods are: some need the complete Cygwin shell, others use only a subset of commands (e.g. fs2resize.exe) and others use only Windows tools and do the rest in Linux. If you made a backup of your current running system you won't need to do it again. 1) From windows, create a blank file 5*1024*1024*1024 bytes long. 1 GB = 1073741824 2 GB = 2147483648 4 GB = 4294967296 5 GB = 5368709120 8 GB = 8589934592 x GB = x*1024^3 open a command prompt and run Edit Using dd
Full Path Disclosure This is an Attack. To view all attacks, please see the Attack Category page. Last revision: 11/8/2012 Description Full Path Disclosure (FPD) vulnerabilities enable the attacker to see the path to the webroot/file. e.g.: /home/omg/htdocs/file/. Risk Factors The risks regarding FPD may produce various outcomes. Warning: session_start() [function.session-start]: The session id contains illegal characters, valid characters are a-z, A-Z, 0-9 and '-,' in /home/example/public_html/includes/functions.php on line 2 In combination with, say, unproteced use of the PHP function file_get_contents, the attacker gets an opportunity to steal configuration files. The sourcecode of index.php: An attacker crafts a URL like so: The leaked sourcecode of config.php: Disregarding the above sample, FPD can also be used to reveal the underlaying operation system by observing the file paths. Microsoft Windows: The FPD may reveal a lot more than people normally might suspect. Examples Empty Array
Cooperative Linux | Download Cooperative Linux software for free CHAOS (operating system) Designed for large-scale ad hoc clusters, once booted, CHAOS runs from memory allowing the CD to be used on the next node (and allowing for automated rebooting into the host operating system). CHAOS aims to be the most compact, secure and straightforward openMosix cluster platform available. A six node CHAOS/openMosix cluster: The mosmon view with no load While this deployment model suits the typical cluster builder, openMosix is a peer-based cluster, consisting of only one type of node. All openMosix nodes are inherently equal and each can be, simultaneously, parent and child. A six node CHAOS/openMosix cluster: The mosmon view with one process' load, launched from node two A six node CHAOS/openMosix cluster: The mosmon view with four process' load, launched from node two A six node CHAOS/openMosix cluster: The mosmon view with nine process' load, launched from node two The tool used to provide the cryptographic tests was John the Ripper (JtR).
Cooperative Linux UBCD for Windows Windows Automated Installation Kit History Windows AIK Version 1.0 was released with Windows Vista. New or redesigned tools and technologies included Windows System Image Manager (Windows SIM), SysPrep, ImageX, and Windows Preinstallation Environment (WinPE) v2.0. Windows AIK Version 1.1 was released with Windows Vista SP1 (and Windows Server 2008). A number of new tools were introduced, including PostReflect and VSP1Cln. The new WinPE 2.1 could be more customized. Supported operating systems include Windows Server 2008, Windows Vista, Windows Vista SP1, Windows Server 2003 SP1, Windows Server 2003 SP2 and Windows XP SP2. Windows AIK Version 2.0 was released with Windows 7 beta. Windows AIK version 3.0 is exactly the same as 2.0. The AIK has been renamed The Windows Assessment and Deployment Kit (ADK) for Windows 8 and now includes the Windows OEM Preinstallation Kit.  The Sysprep tool is not included with WAIK, but is instead included on the Operating System installation media (DVD). Features Concepts