Tuesday, December 27, 2005

nixCraft: Execute Commands on Multiple Linux or UNIX Servers

Execute Commands on Multiple Linux or UNIX Servers

"Many times, you want to execute a command not only on one server, but also on several servers."

Tuesday, December 20, 2005

Mplayer Codecs

How To Download And Install Codecs For Mplayer Using Terminal

This is very simple and easy to do... but also easily a forgotten step when setting up a new system!

Monday, December 19, 2005

Mysql Cluster: Two webserver setup

Mysql Cluster: Two webserver setup

"This HOWTO was designed for a classic setup of two servers behind a loadbalancer. The aim is to have true redundancy - either server can be unplugged and yet the site will remain up."

Net Tools

Net Tools

"In 2002 Project Net Tools © 2006 was born. The idea was of the project was to provide one big tool with all the main network tools included. So the work of network users could be done easier and faster. Since the first release the project had a lot of good attention. Since then it had been modified and expanded in many ways. The first version was totally written and compiled in Visual Basic. Because of the great success of the project I decided to make another improved version, the known bugs of the first version were fixed and next to that there were a lot of new tools added. This second version of the project was written with Visual Basic 6 and was mainly designed for Windows 98 and Windows Me users. After that another version came out, Net Tools 3... It was totally rewritten; Net Tools 3 didn't have the core of the previous versions and was superior. Because of its immense flexibility, this tool had a lot of success. The latest version of the project at the moment is Net Tools 4, it is partly rewritten, but the main core of the previous version is present. Its mainly being tested on the Windows XP and Windows 2000 OS. It is actually designed for Windows XP (and NT systems), but it's compatible with all the Microsoft Windows OS. With his 100+ tools its a great variety of useful tools."

Friday, December 09, 2005

Scan a Suspicious File with Multiple AntiVirus Engines.

VirusTotal

"Virustotal offers a free service for scanning suspicious files using several antivirus engines."

Ophcrack 2.0 -- The fastest Windows password cracker

Ophcrack 2.0 -- The fastest Windows password cracker

"A Windows password cracker based on the faster time-memory trade-off using rainbow tables. This is an evolution of the original Ophcrack 1.0 developed at EPFL. Ophrack 2.0 comes with a GTK+ Graphical User Interface and runs on Windows as well as on Linux."

Thursday, December 08, 2005

PhpDig excels at small Web site indexing

PhpDig excels at small Web site indexing

"Webmasters looking to provide search capabilities for their site would do well to try out PhpDig, a Web spider and search engine written in PHP with a MySQL backend. There are other open source search engines, all of which have their own advantages"

Saturday, December 03, 2005

How to Repair a Corrupt MBR and boot into Linux

How to Repair a Corrupt MBR and boot into Linux

"There are times when you inadvertently overwrite your Master Boot Record. The end result being that you are unable to boot into Linux. This is especially true when you are dual booting between windows and Linux OSes. Once when I was working in Windows XP, I accidentally clicked the hibernate button instead of shutdown. And windows somehow overwrote my MBR which housed the GRUB boot loader. At such times, it pays to have this cool tip at hand."

Serial ATA (SATA) Linux software status report

Serial ATA (SATA) Linux software status report

"This status report applies to the latest SATA driver release, found in kernels 2.4.32 and 2.6.15-rcX."

How to build and use a Honeypot

How to build and use a Honeypot


"In the technology driven world we live in, the value guarding of information is crucial. The ability to guard this information has become of the highest importance and an art form. With that said, as a network administrator you have to be prepared to protect your network and the information on your network with extreme and sometimes diverse measures. One of these measures is a honeypot. With a honeypot, hackers are actually allowed in to your network to a certain degree and then the ability to block them out becomes a reality by checking your logs to see who and how they are doing it."