background preloader

Grafana - The open platform for analytics and monitoring

https://grafana.com/

Related:  LogicielsLinuxAdmin

SI6 Networks The SI6 Networks' IPv6 toolkit is a set of IPv6 security assessment and trouble-shooting tools. It can be leveraged to perform security assessments of IPv6 networks, assess the resiliency of IPv6 devices by performing real-world attacks against them, and to trouble-shoot IPv6 networking problems. The tools comprising the toolkit range from packet-crafting tools to send arbitrary Neighbor Discovery packets to the most comprehensive IPv6 network scanning tool out there (our scan6 tool). Introduction to FirewallD on CentOS Updated by Linode Contributed by Florent Houbart Use promo code DOCS10 for $10 credit on a new account. FirewallD is frontend controller for iptables used to implement persistent network traffic rules. It provides command line and graphical interfaces and is available in the repositories of most Linux distributions. Working with FirewallD has two main differences compared to directly controlling iptables:

Autopsy Autopsy 4.6 Includes New Communications Viewers, Encryption Detection, and More. The latest release (4.6.0) of Autopsy introduces many new features and fixes and this post will give a high-level overview of the notable ones. We’ll dive into details in the coming weeks with additional posts. Communications: As part of our work with DHS S&T,...

Chapter 14. Monitoring Squid The Cache Manager is an interface to Squid for receiving information about various components. It is accessed via normal HTTP requests with a special protocol name: cache_object. A full cache manager URL looks like Squid provides two easy ways to access the cache manager information: the command-line squidclient program or the cachemgr.cgi CGI program. The squidclient utility is a simple HTTP client, with a few special features for use with Squid. McAfee Free Tools SiteDigger 3.0 searches Google’s cache to look for vulnerabilities, errors, configuration issues, proprietary information, and interesting security nuggets on web sites. What's New in SiteDigger 3.0 Improved user interface, signature update and results page. No longer requires Google API License Key. Support for Proxy and TOR. Provides results in real time.

A Few Handy File Transfer Tools (All Written in Python) The file is on your computer, you want to get it onto your friend’s computer, and you’re in a hurry. Luckily, there are tools to help. All of these tools are single files, written in python, and (probably) work on Windows (although I haven’t checked) Single-File Tools Security Without Borders Hardentools is a collection of simple utilities designed to disable a number of "features" exposed by operating systems (Microsoft Windows, for now), and primary consumer applications. These features, commonly thought for Enterprise customers, are generally useless to regular users and rather pose as dangers as they are very commonly abused by attackers to execute malicious code on a victim's computer. The intent of this tool is to simply reduce the attack surface by disabling the low-hanging fruit.

Installing,configuring DNS,DHCP and Dynamic DNS on CENTOS 7 In this article i will show you how to set-up DNS and DHCP server,and how to configure Dynamic DNS. So,let’s jump in ! We’ll install DNS server in secluded environment. Loading - Simple network activity monitor for OS X Loading requires a Mac – it will not work on iOS, Android, Windows, or Linux! Your iPad and iPhone show you when apps are using your network. So why can't your Mac? Sure, there's always the Network section in Activity Monitor, but that's far from ideal. At best you can group by All Processes, Hierarchically, sort by Rcvd Bytes, and check the list to see if anything changed. Here's what it looks like:

Squid in CENTOS 7 and its integration with Windows Server 2012R2 Active Directory Proxy servers operate as an intermediary between a local network and Internet. Requests from local clients for web services can be handled by the proxy server.Squid is a high-performance HTTP and FTP caching proxy server. In this article we will join Squid server (Centos7) into windows domain and configure AD authentification on proxy server,and when domain user request web access Squid can authenticate that user (based on security group) and if user is member of group which has internet access,he/she can access the internet,otherwise,request will be denied. In one of my previous article i configured DNS and DHCP server and installed AD Domain controller. Our network: Domain controller with IP address 192.168.122.100

Windows 10 Privacy Guide - May 2019 Update - Federico Dossena Important: Maintainer needed! I've been maintaining this guide since 2015 when the first version of Windows 10 came out. To be fair, it was already clear back then that Microsoft had decided to drive power users away from Windows, but I liked the OS so I persevered, and tried my best to make it as usable as possible using this guide.

How To: Load Balancing & Failover With Dual/ Multi WAN / ADSL / Cable Connections on Linux In many location, including but definitely not limited to India, single ADSL / Cable connections can be unreliable and also may not provide sufficient bandwidth for your purposes. One way to increase reliability and bandwidth of your internet connection is to distribute the load (load balancing) using multiple connections. It is also imperative to have transparent fail-over so routes are automatically adjusted depending on the availability of the connections. With load balancing and fail-over you can have reliable connectivity over two or more unreliable broadband connections (like BSNL or Tata Indicom in India). I present you with the simplest solution to a complex problem with live examples. Note: Load balancing doesn’t increase connection speed for a single connection.

ATA Secure Erase - ata Wiki This procedure describes how to use the hdparm command to issue a Secure Erase ATA instruction to a target storage device. When a Secure Erase is issued against a SSD drive all its cells will be marked as empty, restoring it to factory default write performance. DISCLAIMER: This will erase all your data, and will not be recoverable by even data recovery services. DISCLAIMER: If you hit kernel or firmware bugs (which are plenty with not widely-tested features such as ATA Secure Erase) this procedure might render the drive unusable or crash the computer it's running on.

Puppet Tutorial for Beginners - Puppet Free Training Online Learnitguide.net really glad to help the beginners who are interested to learn the Puppet Configuration Management tool from basics to become an Puppet automation administrators. So links are arranged in order to take you in a clear direction to follow. Go through the below links one by one to understand it easily from beginning. Video also available for some topics. Make use of it. This would be very useful to the beginners.

Related: