Suramya's Blog : Welcome to my crazy life…

April 21, 2005

How to map network

Filed under: Security Tools,Tech Related — Suramya @ 4:02 AM

If you ever had to find all of the IP’s of the routers and computers on a network then these programs are for you. I havn’t tried them myself yet but they look promising. (The descriptions are taken verbatin from their respective websites)

Angry IP Scanner:

Angry IP scanner is a very fast IP scanner for Windows. It can scan IPs in any range. Its binary file size is very small compared to other IP scanners. Angry IP scanner simply pings each IP address to check if it’s alive, then optionally it is resolving hostname, scans ports, etc.

Superscan:

A powerful connect-based TCP port scanner, pinger and hostname resolver. Multithreaded and asynchronous techniques make this program extremely fast and versatile. Perform ping scans and port scans using any IP range or specify a text file to extract addresses from.

Cheops:

Cheops is an Open Source Network User Interface. It is designed to be the network equivalent of a swiss-army knife, unifying your network utilities.

As usual if you know of any others let me know.

– Suramya

April 20, 2005

Program to manage your Movie Collection

Filed under: Computer Software,Tech Related — Suramya @ 4:32 AM

Avi Manager:

This script helps you to manage your (large) movie (DVD,DivX) collection. It ships with an intelligent voting system for many users. aviManager attempts to find the best movie to watch if you give it a list of people who are going to watch it by using their past preferences.

MS Word Clone for Linux

Filed under: Computer Software,Tech Related — Suramya @ 4:30 AM

TextMaker is a word processor that launches lightning-fast, needs little memory, does not require complicated setup and still has the full feature set of a modern high-end word processor. It reads and writes Microsoft Word 6/95/97/2000/XP/2003 files without losing formatting or content.

The biggest advantage in my book is that it doesn’t look ugly. -) Try it out. They have a free trial available which lets you read .doc files but doesn’t let you save in it.

– Suramya

April 19, 2005

How to Personalize your computer

Filed under: Computer Tips — Suramya @ 3:10 AM

This cool site teaches you how to really personalise your computer by changing the system information in the main tab of System Properties, and information about the company. If you follow these steps you can put anything you want in the tab. And the best part is that all you need to do is create a text file. Pretty cool eh?

Check it out Here

– Suramya

Search engine for searching through source code.

Filed under: Interesting Sites — Suramya @ 2:51 AM

Koders.com is a search engine for open source code. It allows you to search for source code examples and samples that can be included in other programs.

Check it out.

– Suramya

Good WebForum for Tech info

Filed under: Interesting Sites — Suramya @ 2:49 AM

Good forum for computer related information. http://www.daniweb.com/techtalkforums/

– Suramya

April 17, 2005

Securing Apache 2: Step-by-Step

Filed under: Security Tutorials,Tech Related — Suramya @ 5:13 AM

Apache is one of the most common Webservers being used today and Apache 2 is the latest release of this great product. Although Apache2 is fairly secure in its default installation it needs to be tweaked a little to make it more secured. The following article is a step by step guide on how to do this. Check it out. Its worth the time…

Article Link: Securing Apache 2

– Suramya

Information Security papers

Filed under: Security Tutorials,Tech Related — Suramya @ 5:08 AM

Links with papers on information security:

Security Focus Library:

Has a great selection of articles with detailed instructions on how to secure various components of a OS.

Security Focus Library:

Has a great selection of articles with detailed instructions on how to secure various components of a OS.

Role-Based Access control

While Mandatory Access Controls (MAC) are appropriate for multilevel secure military applications, Discretionary Access Controls (DAC) are often perceived as meeting the security processing needs of industry and civilian government. This paper argues that reliance on DAC as the principal method of access control is unfounded and inappropriate for many commercial and civilian government organizations. The paper describes a type of non-discretionary access control – role-based access control (RBAC) – that is more central to the secure processing needs of non-military systems then DAC.

(Abstract Copied verbatin from site)

Security Enhanced Linux:

A NSA based project that attempts to create a more secure version on Linux.

Infosecwriters.com:

The Information Security Writers group (Infosec Writers) is designed to serve as a primary Internet-based source of information, relating to various Information Security issues and topics.

(Abstract Copied verbatin from site)

Information Systems Security Mechanisms:

A collection of resources on computer security.

As always if you know of a resource not listed here, let me know and I will add it.

– Suramya

Wireless LAN Security resources

Filed under: Security Tools,Security Tutorials,Tech Related — Suramya @ 4:53 AM

These are links to various sites that have information on Wireless LAN security. If you know of any other sites let me know and I will add them here.

Wireless security papers:
Lists a lot of papers on wireless security

Wardriving.com:
Has a lot of resources on Wardriving and how to protect against it

Wi-Fi Networking News:
Wi-Fi Networking News covers high-speed wireless networking and communications, focusing on Wi-Fi and related specifications.

Wi-Fi Planet:
A good source for Wi-Fi news

Securing Wireless Networks:
A good article on how to secure wireless networks

Wireless Intrusion Detection Systems:
Information on how to setup a Wireless Intrusion Detection system.

Wireless LAN Policies for Security &Management:
An interesting paper on setting up Wireless LAN security policies.

Airsnarf:
Airsnarf is a simple rogue wireless access point setup utility designed to demonstrate how a rogue AP can steal usernames and passwords from public wireless hotspots

WPA2 (Wi-Fi Protected Access 2):
WPA2 is the second generation of WPA security; providing enterprise and consumer Wi-Fi® users with a high level of assurance that only authorized users can access their wireless networks

– Suramya

April 15, 2005

Installing Debian From Scratch (DFS)

Filed under: Knowledgebase,Linux/Unix Related — Suramya @ 5:00 PM

I like Debian a lot, the only problem I have with it is that when I install it, it installs a lot of junk on the system that I don’t need.

Linux from Scratch is a distribution that fixes this problem but setting it up is too much work for me plus I really like debian and would like to stick to it. -) Fortunately for me someone else also felt the same and created DFS which allows you to create a customized install like LFS but with the Debian advantages.

Instructions on how to install Debian From Scratch are available here

I will try to install it on my system over the weekend. Will keep you posted.

– Suramya

« Newer PostsOlder Posts »

Powered by WordPress