Search Results

Search found 12768 results on 511 pages for 'little snitch'.

Page 168/511 | < Previous Page | 164 165 166 167 168 169 170 171 172 173 174 175  | Next Page >

  • What are some topics you'd like to see covered in an 'Introduction to Network Security' book?

    - by seth.vargo
    I'm trying to put together a list of topics in Network Security and prioritize them accordingly. A little background on the book - we are trying to gear the text towards college students, as an introduction to security, and toward IT professionals who have recently been tasked with securing a network. The idea is to create a book that covers the most vital and important parts of securing a network with no assumptions. So, if you were a novice student interested in network security OR an IT professional who needed a crash course on network security, what topics do you feel would be of the upmost importance in such a text?

    Read the article

  • Ganglia and how it communicates

    - by MikeKulls
    I'm a little confused about how Ganglia sends information around and have found conflicting information on the web. I would have thought that the gmond process would either send info to gmetad at a regular interval or gmetad would request info from the various instances of gmond. At least one online article states this is how it works but from what I understand this is incorrect. It appears that you configure all gmond processes to send their info to a central gmond process and gmetad will request info from that central gmond. Is that correct? In my case I have 6 servers sending their information to 1 central server. If I set gmetad to get it's information from the central server then I get information from all 6 servers, all good.. Their weird thing is that if I point gmetad to one of the 6 servers then I still get info from all 6 servers. How is it that server 1 in my cluster if getting stats from all the other servers?

    Read the article

  • Multiple External IP Ranges on a Juniper SSG5

    - by Sam
    I have a Juniper SSG 5 firewall in a datacenter. The first interface (eth0/0) has been assigned a static IP address and has three other addresses configured for VIP Nat. I have a static route configured at the lowest priority for 0.0.0.0/0 to my hosting company's gateway. Now I need to configure a second IP block. I have the IPs assigned to the second interface (eth0/1) which is in the same security zone and virtual router as the first. However, with this interface enabled I (a) can't initiate outbound sessions (browse the internet, ping, DNS lookup, etc) even though I can access servers behind the firewall just fine from the outside and (b) can't ping the management IP of the firewall/gateway. I've tried anything I can think of but I guess this is a little above my head. Could anyone point me in the right direction? Interfaces: ethernet0/0 xxx.xxx.242.4/29 Untrust Layer3 ethernet0/1 xxx.xxx.152.0/28 Untrust Layer3 Routes: http://i.stack.imgur.com/60s41.png

    Read the article

  • OSX Reset Home Permissions and ACLs - how long should it take?

    - by andyface
    Having screwwed up my permissions by trying to have two users accessing one home folder I'm now going through the process of reseting my main user home permissions via the OSX install disk utilities, which seems to be taking a while. Does this process take a while to do, though I assume it depends on how many files I have in the folder, which in my case is a good few 100 GBs. At what point should I be concerned that it may have got stuck and thus reset my computer and try again? I assume, though not sure that if the little circle indicator is still moving then it's not completely frozen, but as there's no progress bar or details I'm not sure how true that is.

    Read the article

  • How can I use a batch shortcut to open multiple Windows Explorer folders, and a Notepad file?

    - by ModelHX
    I've recently built a computer with an SSD in it (my first) and am in the process of moving a select few of my Steam games to the SSD and symbolically linking them to where they're supposed to be on the main (mechanical) hard drive so that Steam doesn't throw a fit and I get maximum performance. To this end, I'm finding myself repeatedly navigating to both target folders to move the relevant files and opening a specific Notepad file to enter the relevant paths into a template I've got set up that I paste into the Windows command prompt to create the symlink. This is annoying. I've read up a little bit on batch shortcuts, and have a basic understanding on how to use one to open programs and files. However, I'm finding a lot of confusing suggestions on how to use batch shortcuts to open specific folders in Windows Explorer, and none of them deal with opening multiple folders at once. Any assistance on writing the shortcut would be greatly appreciated. Thank you for your time.

    Read the article

  • Acer Aspire 3680 Wireless Signal Problem

    - by SHiNKiROU
    I am using Acer Aspire 3680. I recently reinstalled Windows Vista, and the wireless did not work by default. I installed the "Atheros Wireless LAN Driver" on this site: http://support.acer-euro.com/drivers/notebook/as_3680.html The result, the wireless APs are successfully scanned. However, when I tried to join a network, even with 5/5 signal, an error message showed up diagnosing signal too little. I restarted as Ubuntu, and wireless worked perfectly, with same computer position. Even more confusing, When I moved to the kitchen (2 meters close to the router), the wireless connected, when I move back to my room, wireless failed on Vista and worked on Ubuntu. It is clearly the driver problem. Acer laptops seems come with pre-installed drivers, but after re-installation, they are all gone. (I can't find the original Acer backup disc) Please do not answer "move closer to the AP" and something related to "interference", as wireless worked with Ubuntu's default driver.

    Read the article

  • Help replacing old Windows 2003 SBS DC with a Win2008 Standard Edition DC

    - by Chris
    Objective: Trying to replace a Windows 2003 SBS domain controller with a windows server 2008 Standard Edition Domain Controller. What I did: used ADPREP. Then all user accounts and OUs are successfully replicated into the 2008 server. I have also managed to transfer all the DC roles (operations master,schema,pdc) into the Server 2008. I have also used NETDOM QUERY FSMO . It displayed that all the roles transferred to the 2008 server. Problem: When I am trying to demote the windows 2003 SBS server using DCPROMO, the message is “No other Active Directory for this domain can be contacted”. I also tried shutting down the 2003 server. Users can login into the domain but they have trouble finding SHARED folders. Can someone help me find out what I did wrong ? Need a little push in the right direction here. Thank you very much ?

    Read the article

  • Hooking up a laptop to an HDTV via VGA

    - by Redandwhite
    I have a 2-3 year old laptop running XBMC, and I have an HDTV that I'd like to connect it to. The only output that the laptop has is VGA (and S-Video - I don't know if the TV supports it) . The TV doesn't support VGA input, but takes HDMI. -- Is it worth buying a VGA-to-HDMI converter? As in this: -- Are there any other, cheaper options available? There's a lot of information around the WWW, but a lot of it's outdated and it's hard to digest everything. I know of at least one other option, and that's a USB to HDMI connection, but I don't even know what to look for or where to get started on that one. I also suspect it might be a little more complicated. If it's cheaper then it could be worth it. EDIT More Details: Intel integrated graphics card (Intel 945 Express Chipset Family) The TV supports up to 1080p resolution

    Read the article

  • White Screen of Death

    - by cust0s
    The other night I updated my iTunes to the latest version (through Software Update) when I came to turn on my computer I was greeted with the dreaded white screen of death. I use an early 2008 iMac 24". I've tried the basic things, unplugging/turning off accessories, trying to boot from the install disk, reseting pram, etc, etc. Still no luck and no change what-so-ever. All I've been able to ascertain that my keyboard still works (by ejecting). I should point out that I did recently replace my Hard drive with a Western Digital Black 500GB (though the computer is well out of warrenty) and I'm a little concerned that the problem could be the screen.

    Read the article

  • best storage option for recording live streaming video

    - by Alchemical
    We're creating a new web site that includes video chat capabilities. Wowza Server is being used for the streaming media. We would like the capability for users to record their video chats in certain circumstances. Is it feasible to record the videos to the same server running Wowza? Or performance-wise, would it make more sense to store them on another server? I understand SANs are popular as well, but I'm a little concerned about cost for those as we are on a fairly tight budget. Currently we have two servers with pretty decent RAID cnofigurations for storage, one has 14TB and the other 6TB. Mostly concerned if doing the recording on the same server as the streaming server (or web server), could significantly adversely affect that server's primary function.

    Read the article

  • Concerns with compressing sensitive data in OSX

    - by Derek Adair
    Hi, I have some really sensitive data that I am trying to compress and back up so I can reformat. It's absolutely imperative that nothing happens to these files. I'm a developer so I have very little room for error... plus I'd really hate it if any of my .mp3's got corrupted! File Formats Include... .mp3 .php .js .ai - .psd - .flv (and many more) Is the mac OSX file compression safe enough? Or should I look elsewhere? Is there a more efficient/secure file-format other than .zip (i'm assuming so...)

    Read the article

  • How dangerous can javascript be?

    - by CrazyJugglerDrummer
    I have recently started using noscript (in addition to ABP). It took a little while to get used to it and can occasionally require some clicking when visiting a new site to investigate why the site's not working and where I need to allow javascript from. Is the extra security worth it? Some of the controversy is discussed here. I suppose it boils down to a matter of whether javascript is a genuine threat to your computer or not. Any thoughts on this?

    Read the article

  • ffserver - streaming problem transcodation for input

    - by zozo
    Good day to all. I have a little problem. I'm trying to stream something from a cam to a server and then forward to... somewhere (it will be a site or something). On the computer that I have the cam connected to I use vlc to stream it to the server and there I try to get the stream as an input for a ffserver. The problem is that ffserver doesn't detect the input (regardless of the protocol I use (udp, rtp, etc.)). I suspect a transcoding problem or something like that but I can't find any documentation about that so... Does any1 know what transcodation I should use? Thank you for help and have a great day.

    Read the article

  • Block spam by using geoip filter?

    - by faultyserver
    We are looking for a way to be able to block spam based on geographic location by filtering using geoip. context: we rarely have any email correspondence outside of the USA, so we would like to block all incoming email outside the US except for maybe one or two countries. After a little Googling I have found a couple of solutions that may work (or not), but I would like to know what other sysadmins are currently doing or what they would recommend as a solution. Here is what I have found so far: Using PowerDNS and its GeoIP backend it is possible to use geoip for filtering. Normally this backend is used to help distribute load as a kind of load balancing but I dont see why it couldnt be used to kill spam as well? Possibly use the Maxmind lite country database and some scripting to do a similar job. Ideally what I am looking for is a solution that would handle decent load and scale well too...aren't we all! ;) Thanks in advance for your help! :-)

    Read the article

  • Security question pertaining web application deployment

    - by orokusaki
    I am about to deploy a web application (in a couple months) with the following set-up (perhaps anyways): Ubuntu Lucid Lynx with: IP Tables firewall (white-list style with only 3 ports open) Custom SSH port (like 31847 or something) No "root" SSH access Long, random username (not just "admin" or something) with a long password (65 chars) PostgreSQL which only listens to localhost 256 bit SSL Cert Reverse proxy from NGINX to my application server (UWSGI) Assume that my colo is secure (Physical access isn't my concern for the time being) Application-level security (SQL injection, XSS, Directory Traversal, CSRF, etc) Perhaps IP masquerading (but I don't really understand this yet) Does this sound like a secure setup? I hear about people's web apps getting hacked all the time, and part of me thinks, "maybe they're just neglecting something", but the other part of me thinks, "maybe there's nothing you can do to protect your server, and those things are just measures to make it a little harder for script kiddies to get in". If I told you all of this, gave you my IP address, and told you what ports were available, would it be possible for you to get in (assuming you have a penetration testing tool), or is this really protected well.

    Read the article

  • How low-power can a home server get?

    - by Halik
    I've got quite simple question actually. How green, low-power and efficient x86 home server can I build using consumer parts with rather constrained budget. After looking through some Google hits I've found out that system based on dual-core atom, some modest mITX board (gigabit lan, integrated audio and gfx etc), one RAM module and one 'green' WD HDD, powered by picoITX PSU uses about 30W at idle up to 40 at load. Can you get lower (or how much lower) then that? Maybe some VIA nano chips, or single core atom? My home server would take care of some back-upping mixed with little ftp/http traffic.

    Read the article

  • public key always asking for password and keyphrase

    - by Andrew Atkinson
    I am trying to SSH from a NAS to a webserver using a public key. NAS user is 'root' and webserver user is 'backup' I have all permissions set correctly and when I debug the SSH connection I get: (last little bit of the debug) debug1: SSH2_MSG_SERVICE_REQUEST sent debug1: SSH2_MSG_SERVICE_ACCEPT received debug1: Authentications that can continue: publickey,gssapi-keyex,gssapi-with-mic,password debug1: Next authentication method: publickey debug1: Offering DSA public key: /root/.ssh/id_dsa.pub debug1: Server accepts key: pkalg ssh-dss blen 433 debug1: key_parse_private_pem: PEM_read_PrivateKey failed debug1: read PEM private key done: type <unknown> Enter passphrase for key '/root/.ssh/id_dsa.pub': I am using the command: ssh -v -i /root/.ssh/id_dsa.pub [email protected] The fact that it is asking for a passphrase is a good sign surely, but I do not want it to prompt for this or a password (which comes afterwards if I press 'return' on the passphrase)

    Read the article

  • Linux Programs for pulling measurements from graphics

    - by Zack
    As a front-end developer, I'm often given graphics of web sites and told pretty much, "Make it work." I've recently started working on Linux 100% of the time and was wondering if there's any programs out there that're good for "digesting" graphics. All I do, pretty much, is draw little selection boxes and takes notes on their dimensions; I also slice out a piece of the graphic (i.e. copy out just the part of the graphic I need for to make the same effect in CSS). Before now I've been very happy with Fireworks, but I need something for Linux, any suggestions? As a note, I mainly deal with pixel based graphics, so the program being vector based isn't a necessity.

    Read the article

  • Which Linux book for aspiring sysadmin?

    - by Ramy
    I have a co-worker who insists that he will never buy a book unless it is considered "THE" book. So, in this vein, I thought I'd ask what the ultimate Linux book is. I wouldn't quite call myself a complete beginner since I can get around in Linux in general pretty well. But, beyond that, I'm also looking for a book with an eye towards becoming a Sys Admin someday. I saw a Junior Sys Admin position open up recently but with the requisite 2-3 years experience, I may have to wait a little while longer before I'm ready to apply for such a position. Having said all that, I'll summarize my question: What is the ultimate Linux book for someone who is ok with the basic tasks of getting around in Linux but also wants to aim towards full Sys Admin status someday? A few examples of the books I'm considering: Linux-Administration-Beginners-Guide-Fifth Linux-System-Administration Linux-System-Administration EDIT: Before you close this question as a dup, I'd like to say that I'm looking for something that goes deeper than this: Book for linux newbies I already have "Linux in a nutshell"

    Read the article

  • Tool to monitor file size, file existence, parse xml, etc

    - by Artur Carvalho
    I'm trying to find some tool that helps me monitor several things. What are some requirements: Shows results on a web page. Checks existence of files/folders Checks sizes of files/folders Can parse xml files Can have several status depending if it's for instance, after 9pm Ping workstations/Servers to ensure they are on or off create daily/weekly/monthly reports (pdf, html, csv) show daily/weekly/monthly scheduled tasks check if specific users are logged in a machine check which users are logged in in a machine I've looked into some solutions but could not find what I wanted. Usually tools like nagios are more focused in servers, and spiceworks is not so specific. At this point I'm using a little powershell script that does several of these items, but before losing more time probably reinventing the wheel, what tools are out there? Thank you in advance.

    Read the article

  • Bootstrapping in CloudFormation with Autoscale

    - by PapelPincel
    My CloudFormation template creates an autoscale group and bootstrap it with utility script /opt/aws/bin/cfn-init. When I remove the bootstrap part out of my template the, autoscale get created without any problem, but I add it the CloudFormation Stack fails and add line in /var/log/cloud-init.log : Error: AutoScalingGroupName does not specify any metadata The line above appens right after the following command : /opt/aws/bin/cfn-init --verbose --configsets orderedConfig --region us-east-1 --stack AS15 --resource AutoScalingGroupName --access-key XXXXXXXXXXXXX --secret-key XXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXX Digging a little bit deeper, in cfn-init I added the following lines the point where it exit: from pprint import pprint pprint(vars(detail)) and I get the following trace when running the previous cfn-init command : {'_description': None, '_lastUpdated': datetime.datetime(2012, 7, 12, 14, 52, 42), '_logicalResourceId': u'AutoScalingGroupName', '_metadata': None, '_physicalResourceId': u'AS15-AutoScalingGroupName-HNPOXXXXXXXX', '_resourceStatus': u'CREATE_COMPLETE', '_resourceStatusReason': None, '_resourceType': u'AWS::AutoScaling::AutoScalingGroup', '_stackId': u'arn:aws:cloudformation:us-east-1:XXXXXXXXXXXXX:stack/AS15/XXXXXXXX-cc30-11e1-XXXXXX-XXXXXXXXXX', '_stackName': u'AS15'} As you can see, the metadata field is empty and that's the reason why it fails to create the stack. Is there any known side effects for cfn-init when used with autoscale ?

    Read the article

  • How to convert PowerPoint presentations into a Kindle/E-reader friendly form?

    - by Shiki
    I have a lot of documents in .ppt and .pptx (blame the co-workers). I would like to read them on way home or elsewhere... when I have a little time to catch up with things. One thing I could do with the documents is cutting them together into one file. But saving that one even if a smaller version of PDF (according to Office 2010) results in a huge file. And PDF is hardly readable on a Kindle. I would need something .epub free, easy-on-the-device way. Is there such a thing? (Manually I could copy all the images down into native text and whatnot and create new presentations, save those, convert them. But that would just take a lot of time.)

    Read the article

  • Why would my router have different MAC addresses for IP and IPv6 transactions?

    - by user329161
    Today I was using tcpdump and I noticed my computer was having IPv6 traffic with a particular MAC address that I could not match with an IP using nmap or arping. After looking at the tcpdump logs a little more closely, I figured out it was another MAC address my router was using but exclusively for IPv6 traffic. 22:49:01.936830 90:0d:cb:ff:31:91 (oui Unknown) > 33:33:00:00:00:01 (oui Unknown), ethertype IPv6 (0x86dd), length 158: fe80::920d:cbff:feff:3191 > ip6-allnodes: ICMP6, router advertisement, length 104 Why would a router offer a different MAC address for IPv6?

    Read the article

  • What could cause my LAN Pings be greater than 100ms?

    - by James Holland
    I have 2 servers (Both: Windows Server 2008, Dual Xeon 2.8Ghz, 32GB RAM, 8 x 15k SAS Drives). One of them is a DC / Web server / Exchange Server, the other is a SQL Server (2008). I have a 48 port Netgear GS748T Gigabit switch. When I ping from server to server, I get ping times <1ms, great, but when I ping from a PC, I get varying pings from the occasional <1ms to 500ms!! If I log into either server and look at Task Manager, CPU usage peaks at 20%, memory usage is 100%, but I am led to believe this is normal as Exchange will just use as much as you have, and release it when requested. Network usage peaks at 1%. I really don't understand how the ping can vary that much. I know I am giving very little info, but this is all I know, I apologise, but can anyone help? In response to question, I have pinged by both IP address and hostname, no difference in ping times.

    Read the article

  • How does the caller ID works on voip?

    - by Cawas
    Maybe this depends on the protocol, if so, I'm wondering mostly about SIP. That's all, just focus on the title please, but for a little background... I am using voipraider and I was just trying to set it up to have a caller id as my phone number, since I can't have this voip of mine on all the time (thus using DID or being able to receive calls through voip wouldn't be a solution here). I could actually make it work, but only using voipraider software. From other places, the caller ID doesn't show properly. So, I am wondering how it actually works to be able to go and look for a fix for this. I want details about the protocol, if that's relevant.

    Read the article

< Previous Page | 164 165 166 167 168 169 170 171 172 173 174 175  | Next Page >