background preloader

10 Cool Ways to Use Nmap

10 Cool Ways to Use Nmap
Nmap (“Network Mapper”) is a free and open source (license) utility for network exploration or security auditing. Many systems and network administrators also find it useful for tasks such as network inventory, managing service upgrade schedules, and monitoring host or service uptime. In addition to my list you can also check out this Comprehensive Guide to Nmap here and of course the man pages Here are some really cool scanning techniques using Nmap 1) Get info about remote host ports and OS detection nmap -sS -P0 -sV -O <target> Where < target > may be a single IP, a hostname or a subnet -sS TCP SYN scanning (also known as half-open, or stealth scanning) -P0 option allows you to switch off ICMP pings. -sV option enables version detection -O flag attempt to identify the remote operating system Other option: -A option enables both OS fingerprinting and version detection -v use -v twice for more verbosity. nmap -sS -P0 -A -v < target > 2) Get list of servers with a specific port open

99 ways to make your computer blazingly fast Over the last several years working in IT for various companies as a Systems Administrator, Network Administrator, and Help Desk professional, I’ve written and learned about many ways to increase the performance of not only my PC, but also of the many PCs on my networks ranging from Windows 98 to Windows Vista. In this article, I hope to compile a complete list of all the different methods and tricks that I’ve used to get the last bit of juice out of a slow PC. Whether you are using an old PC or the latest and greatest in hardware, you can still use some of these to make your PC run faster. Note that since I write two blogs, Help Desk Geek and Online Tech Tips, I have previously written about many performance tips already which I will link back to throughout. If I have not written about it, I’ve throw in a link to a relevant article from some of my other favorite sites. 1. 2. 3. 4. 5. 6. 7. 8. 9. 10. 11. 12. 13. 14. 15. 16. 17. 18. 19. 20. 21. 22. 23. 24. 25. 26. 27. 28. 29. 30. 31. 32.

Drupal site building tips - From These tips were written for Drupal6 and have not yet been edited for Drupal7 and therefore may not be accurate; this section is under construction. Introduction Drupal is one of the most widely used website servers in the world. Initial user setup It is not a good idea to give anonymous users access to the site or create accounts until you have the site completely set up and are ready to publish. Drupal -> Administer -> User management -> User settings -> Only site administrators can create new user accounts. Create an administrator user role: Drupal -> Administer -> User management -> Roles -> Add role -> administrator -> edit permissions -> check all Create a new user who will be an administrator Drupal -> Administer -> User management -> Users -> Add user -> Adminuser -> roles -> administrator Use this user as your everyday administrator, saving the user you created at installation as the superuser Create a Welcome page Create a Welcome page: Drupal -> Create content -> Page Change: to

10 Free Server & Network Monitoring Tools that Kick Ass By Ben Dowling When you have a website or a network, it’s helpful to be aware of any issues as soon as they occur. There are open source and freeware server/network monitoring tools that will supervise your infrastructure for any issues that may arise. These tools are meant to aid you in avoiding being taken offline and evaluating if your resource needs has outgrown your infrastructure. In this article, we review our top 10 server/network monitoring tools. You will see a variety of server applications here so that you might find the tool (or tools) for your needs. 1. Monit not only monitors your server, but also attempts to remedy problems by taking predefined actions for certain situations. If you have more than one server that you need to monitor, then you can use M/Monit– an extended version of Monit that provides a simple way to monitor multiple machines. 2. When you have a cluster of machines, it’s difficult to see how the whole cluster is doing all at once. 3. 4. 5. 6. 7. 8. 9. 10.

Getting Out of Debt photo: lemonjenny Last week, we announced a five-week long giveaway of Hot (broke) Messes, a financial how-to book for young adults written by Nancy Trejos, the personal finance columnist at the Washington Post. To enter the giveaway, we asked you — our readers — to share your own “getting out of debt” stories. Deferred Student Loans to Focus on Credit Card Debt Emily Holden of Brighton, Mass., wrote: I’m pretty lucky: I don’t have too much debt for a 25-year old. Recently, I joined Mint.com to help keep my budget in check. I have sworn off buying clothes for the remainder of the month, but when I do, I try to stick to inexpensive, thrift-store clothes. I never let my checking account get below $1,000 and I check my balances every day. The key is: always know where your money is going. Created a “Debt Management” Budget to Keep Spending In Check Pamela A., Atlanta, GA: When I graduated from college just a year and a half ago, I thought I was made–financially that is! Cathi C., Chattanooga, TN

Allen's Weblog: Unicode in Python, and how to prevent it [UPDATE 16 Aug 2011] Armin Ronacher has written a nice module called unicode-nazi that provides the Unicode warnings I discuss at the end of this article. Though I can't use Python 3 for any of my projects, it does have a few nice things. One particular behaviour where it improves on Python 2 is forbidding implicit conversions between byte strings and Unicode strings. For example: Python 3.1.2 (release31-maint, Sep 17 2010, 20:34:23) [GCC 4.4.5] on linux2 Type "help", "copyright", "credits" or "license" for more information. >>> 'foo' + b'baz' Traceback (most recent call last): File "<stdin>", line 1, in <module> TypeError: Can't convert 'bytes' object to str implicitly If you do this in Python 2, it invokes the default encoding to convert between bytes and unicode, leading to manifold unhappinesses. Python 2.6.6 (r266:84292, Sep 15 2010, 15:52:39) [GCC 4.4.5] on linux2 Type "help", "copyright", "credits" or "license" for more information. >>> u'foo' + b'baz' u'foobaz' Hey!

Beginner's Guide to Nmap Ever wondered how attackers know what ports are open on a system? Or how to find out what services a computer is running without just asking the site admin? You can do all this and more with a handy little tool called Nmap. What is Nmap? Short for "network mapper," nmap is a veritable toolshed of functionality to perform network scans. It's famous, too. In this tutorial, I'll cover some of the basics of using Nmap and provide some examples you can use quickly. Getting Nmap and Basic Use You'll find Nmap packaged for most major Linux distros. The basic syntax for Nmap is Nmap Scan Type Options target. nmap -O target.host.com Note that Nmap requires root privileges to run this type of scan. Starting Nmap 5.21 ( ) at 2010-02-27 23:52 EST Nmap scan report for 10.0.0.1 Host is up (0.0015s latency). As you can see, Nmap provides a lot of data. Here's the result of another scan, against a desktop machine running Ubuntu 9.10: Practice Hosts Multiple Hosts Checking Open Ports Zenmap

Future proof » Tim’s laptop service manuals Have you come to this webpage looking for Toshiba laptop service manuals? Please read this. Introduction In the same vein as in my driver guide, I’ve started finding laptop service manuals and hosting them on my site. These are the professional, official documents published by the various laptop makers, either for their own technicians or for the use of the general public. They generally detail the exact list of parts in each model of laptop – often down to individual screws, if you happen to have lost some and need to know the exact size for a replacement – and describe the procedure for disassembling and reassembling the entire machine, including panels, RAM, wireless cards, keyboards and touchpads and LCD screens, all the way down to the motherboard itself. They’re difficult to find – you have to know where to look in their support site, or come up with the right Google search string, or beg and steal from someone you know in the industry. Practical stuff Organisation Feedback Acer Apple

Free Books A lot of people keep asking about a good list of programming books. Hence, we are building this list to save your time and to spread the knowledge. Some of these books will definitely help us to evolve our coding skills and thought processes for developing better solutions. We will do our best to keep updating this list, hope you find this list useful, here we go. Meta-List Graphics Programming Language Agnostic: NerdDinner Walkthrough Assembly Language: Bash Advanced Bash-Scripting Guide See .NET below Django Djangobook.com Emacs The Emacs manual Thanks Emacser (October 17, 2010) Forth Git Haskell Dive Into HTML5 Java JavaScript Linux Advanced Linux Programming Lisp Lua Programming In Lua (for v5 but still largely relevant) Maven Mercurial NoSQL CouchDB: The Definitive Guide Objective-C The Objective-C Programming Language Parrot / Perl 6 Perl 6 (Work in progress) Perl PowerShell Mastering PowerShell Prolog PostgreSQL Practical PostgreSQL Python Learn REBOL Thanks Nick (October 19, 2010) Ruby Scala Scheme Smalltalk Subversion Vim

Visual Cryptography What is Visual Cryptography Visual Cryptography is a special encryption technique to hide information in images in such a way that it can be decrypted by the human vision if the correct key image is used. The technique was proposed by Naor and Shamir in 1994. Visual Cryptography uses two transparent images. When the random image contains truely random pixels it can be seen as a one-time pad system and will offer unbreakable encryption. How Visual Cryptography works Each pixel of the images is divided into smaller blocks. In the table on the right we can see that a pixel, divided into four parts, can have six different states.If a pixel on layer 1 has a given state, the pixel on layer 2 may have one of two states: identical or inverted to the pixel of layer 1. We can now create the two layers. The system of pixel can be applied in different ways. If Visual Cryptography is used for secure communications, the sender will distribute one or more random layers 1 in advance to the receiver.

Human Bagel Web Services New cool list of Linux must-have programs Update: A new, up-to-date collection is available. Please take a look! It's been approximately two years since I've written the first article, A (cool) list of Linux tools. The article proved quite popular with my audience, as it allowed Linux users, new converts in particular, a quick taste of some of the more useful programs available for Linux platforms, across a range of categories. Since, a lot has changed. Changes from the last time Like the last time, the programs will be sorted by categories. Games I will not be listing games here. Users' recommendations Likewise, there's a users' recommendation sub-section, so you can send me your suggestions and ideas. Table of Contents: Backup software File backup software Unison Unison is a simple, lightweight backup program. TimeVault TimeVault is a snapshot software, which, when activated will create copies of all files and folders that change, retained a detailed archive of all revisions. Imaging software CloneZilla Mondo & Mindi PartImage Remastersys

ubercharged.net - Tales of Team Fortress 2 pwnage and other hilarity

Related: