background preloader

Network

Facebook Twitter

NAS

Huawei. An introduction to SQLite for developers and sysadmins. When they need a relational database, software developers and system administrators often choose MySQL or PostgreSQL.

An introduction to SQLite for developers and sysadmins

For a lighter and simpler solution, however, developers should consider SQLite. It's used in so many open source and commercial products that SQLite is considered the most deployed SQL database engine in the world. This article will help you get started with SQLite and use it in your programs and scripts. Unlike most SQL databases, SQLite has no separate server process; the database management system is contained in a small C library.

A complete database with multiple tables, indices, triggers, and views lives in just a single file. System requirements are minimal too; low-powered devices such as smartphones, video games, and portable media players can store large data libraries in SQLite databases. Step by Step guide to setup Active Directory on Windows Server 2012 - RebelAdmin. This tutorial will explain how to install AD on server 2012 R2.

Step by Step guide to setup Active Directory on Windows Server 2012 - RebelAdmin

Requirement: Minimum: 1.4 Ghz 64-bit processor Minimum: 512 MB RAM Minimum: 32 GB or greater The first step is to get server 2012 install on a server. it is very similar to server 2008 install and in one of my previous posts i have discribe how to do the install in details. Next thing we need to do is get network interfaces configured. it is obvious to use static ip address for the server.

Networking

Network-security. Home ‎(ossim-newbie)‎ SNMP4tPC - Helpful Links. Helpful Links I have to put together a page that contains links to some programs and sites that I think are particularly worthy of a good hard look.

SNMP4tPC - Helpful Links

Most of the software is free, some are shareware and some are commercial (hey! People gotta eat!) , but all will make your life easier. Most of the tools I have tried myself, or at the very least have actually read about what they are or what they do. MRTG and Associated Links MRTG (The Multi Router Traffic Grapher) - is a tool to monitor the traffic load on network-links.

Networktools

Policy Routing with Linux - Online Edition. Section I - Theory, Usage, and Utilities Chapter 1.

Policy Routing with Linux - Online Edition

Basic IPv4 Routing This initial chapter provides brief coverage of standard TCP/IP routing as practiced under IPv4. The uses of the traditional Unix and Cisco IOS commands and syntax for simple setups will be mentioned. We will also touch upon the methodologies behind route costing such as Hop count and Link State. Traditional IPv4 routing Theory Unix Configuration Commands Cisco IOS Configuration Commands IPv4 Dynamic Routing Protocols Unix Routing Daemons & Cisco IOS Configurations Chapter 2. Here we will discuss the types of environments that led to the development of the concept of policy routing and the theory behind why you would want to use policy routing structures.

Prof. Michael P. Harris - Del Mar College. List of TCP and UDP port numbers. Wikipedia list article This is a list of TCP and UDP port numbers used by protocols for operation of network applications.

List of TCP and UDP port numbers

The (IANA) is responsible for maintaining the official assignments of port numbers for specific uses.[1] However, many unofficial uses of both well-known and registered port numbers occur in practice. Similarly, many of the official assignments refer to protocols that were never or are no longer in common use. This article lists port numbers and their associated protocols that have experienced significant uptake. Designing Subnets. How the extended network prefixes work Well, the subnet mask is in charge of this.

Designing Subnets

The subnet mask looks for the network prefix to ensure that a synchronized job is being processed. For example, if you need to specify a subnet mask in a class network, any subnet that you will specify will define your network Fig 8.7 Even though the subnet mask is in charge of the lookup, the router protocol refers to the extended network prefix length rather than the actual subnet mask.

Network Engineering, Designing Subnets Example of Sub-netting: If a company has been assigned a network number 192.168.1.0/24 and it needs to define six subnets; it is required to support at least 28 hosts for one of their departments. First we need to determine the number of bits required for the six subnets. Observe the power notation above, it is impossible to define six, therefore 23= 8 (3-bits are required).

Webmail server guide - qmail, vpopmail, mysql, courier-imap, squirrelmail, qmail-scanner, clam antivirus, spamassassin. REDHAT + QMAIL + OPENSSL + APACHE + PHP + MYSQL + VPOPMAIL (with MySQL accounts) + COURIER-IMAP + SQUIRRELMAIL (with MySQL prefs/addrbook), QMAIL-SCANNER + CLAM ANTIVIRUS + SPAMASSASSIN Original of this document is available at For the last few years I haven't done much vpopmail work, because the ISP where I work uses Postfix rather than qmail.

Webmail server guide - qmail, vpopmail, mysql, courier-imap, squirrelmail, qmail-scanner, clam antivirus, spamassassin

I have recently accepted a job offer from a different ISP and they use Postfix there as well. When I switch to this new company it will cut the remaining ties I had with customers using my original qmail/vpopmail design. Block Network Attacks with SnortSAM - IT Observer. SnortSAM is an open source agent that allows Snort intrusion detection system to block attacking connections by reconfiguration of access control lists on firewalls – stopping an attack in progress.

Block Network Attacks with SnortSAM - IT Observer

SnortSAM can order changes on firewalls such as CheckPoint, Cisco PIX firewalls, Cisco routers, UNIX-based firewalls and more. SnortSAM consists of two components: a patch for the Snort IDS itself and the SnortSAM application, which can be run on a dedicated SnortSAM server or on the Snort sensor. SnortSAM uses Snort´s output plug-in that notifies SnortSAM agent of blocking requests on a rule basis. When an alert is detected, the firewall(s) access control lists are modified to block traffic from the offending network. The first step in installing SnortSAM is to download and unpack the source code.

Cisco