These programs will generate a per protocol/port bandwidth usage information on a given server:
– Suramya
These programs will generate a per protocol/port bandwidth usage information on a given server:
– Suramya
Use a program called script, it makes a typescript of terminal session, meaning it logs everything printed on your terminal. Use `man script` to get more information about it.
– Suramya
These tools will help you identify which programs are opening what ports on the system.
1. lsof | grep ‘IPv.’
lsof shows the list of open files, piping it through grep and searching for IPv will give you a list of ports used by a program
lsof -i TCP:<PORT>
where PORT is the one you need to know about the program behind it.
2. netstat -anp
Should display open ports, machines connected to the ports as well as which application has that port open.
If you know of any other ways let me know.
– Suramya
Newsforge has a good article that explains how to remove the background from an image using GIMP.
Article: Remove Background from images
Linux Magazine has a really good article on The Coroner Tool kit which allows a sysadmin to perform forensics analysis on a compromized system.
Article: Linux Magazine
The Coroner Toolkit: Download Page
– Suramya
Often referred to as the ‘Swiss Army Knife of networking,’ netcat is a tool that administrators can use to read and write TCP or UDP data across the network. In addition, it’s extremely useful for network debugging and testing. This article by Vincent Danen at techrepublic.com covers some of the uses of netcat.
– Suramya
Cool forum that touches on every aspect of computer security:
These are light weight tools that alert you to suspicious network activity by analyzing iptables log files. This article contains information on how to install and configure psad.
– Suramya
LDAP GUI Client: http://luma.sourceforge.net/download.html
Using OpenLDAP: http://www.metaconsultancy.com/whitepapers/ldap.htm
– Suramya
Some applications like autocad require the current user to be logged in as an administrator in order to use them and as you can imagine thats not a good idea. Esp if this makes you give admin access to users who are likely to install random software and otherwise mess up a perfectly good system.
To avoid this situation follow the following instructions by Anomic Anomaly posted on the Security Basics mailing list:
1. Grab ‘FileMon’ and ‘RegMon’ (both free) from SysInternals
2. Run AutoCad and monitor the changes made to the filesystem and registry.
3. Modify permissions only on those specific areas and give the user access to them
4. Watch your users happily run AutoCad as a User.
– Suramya
Powered by WordPress