Jump to content

!_30

Active Members
  • Posts

    606
  • Joined

  • Last visited

Everything posted by !_30

  1. http://www.megaupload.com/?d=49EZHV67
  2. Cacti is web-based NMS Open Source software to monitor your network elements ( routers, swtiches,firewall..linux box, solaris box ..etc ). You require to install Cacti in your Linux box following things are must be installed 1st. - Apache with PHP support - libpng - libzlib - libjpg - net-snmp-devel - mysql Server - mysql client - mysql-devel - openssl-devel - RRDTool must be install on your sytem Graphs   * Unlimited number of graph items can be defined for each graph optionally utilizing CDEFs or data sources from within cacti.   * Automatic grouping of GPRINT graph items to AREA, STACK, and LINE[1-3] to allow for quick re-sequencing of graph items.   * Auto-Padding support to make sure graph legend text lines up.   * Graph data can be manipulated using the CDEF math functions built into RRDTool. These CDEF functions can be defined in cacti and can be used globally on each graph.   * Support for all of RRDTool's graph item types including AREA, STACK, LINE[1-3], GPRINT, COMMENT, VRULE, and HRULE Templates   * Graph templates enable common graphs to be grouped together by templating. Every field for a normal graph can be templated or specified on a per-graph basis.   * Data source templates enable common data source types to be grouped together by templating. Every field for a normal data source can be templated or specified on a per-data source basis.   * Host templates are a group of graph and data source templates that allow you to define common host types. Upon the creation of a host, it will automatically take on the properties of its template. Graph Display   * The tree view allows users to create "graph hierarchies" and place graphs on the tree. This is an easy way to manage/organize a large number of graphs.   * The list view lists the title of each graph in one large list which links the user to the actual graph.   * The preview view displays all of the graphs in one large list format. This is similar to the default view for the 14all cgi script forRRDTool/MRTG. User Management   * User based management allows administrators to create users and assign different levels of permissions to the cacti interface.   * Permissions can be specified per-graph for each user, making cacti suitable for co location situations.   * Each user can keep their own graph settings for varying viewing preferences. Download and updates from cacti http://www.cacti.net DEMO site ::http://www.hswn.dk/hobbit/ The hobbit Hobbit is a tool for monitoring servers, applications and networks. It collects information about the health of your computers, the applications running on them, and the network connectivity between them. All of this information is presented in a set of simple, intuitive webpages that are updated frequently to reflect changes in the status of your systems. Hobbit is capable of monitoring a vast set of network services, e.g. mail-servers, web-servers (both plain HTTP and encrypted HTTPS), local server application logs, ressource utilisation and much more. Much of the information is processed and stored in RRD files, which then form the basis for providing trend graphs showing how e.g. webserver response-times vary over time. What we can do with hobbit ?? Hobbit is capable of monitoring a vast set of network services, e.g. mail-servers, web-servers (both plain HTTP and encrypted HTTPS), local server application logs, ressource utilisation and much more Monitoring network services conn Simple ping test. Enabled by default, you can disable it by putting "noconn" into bb-hosts. http Web-server test. Enter the URL to request from the webserver. ftp FTP server test. ssh SSH (Secure Shell) server test. Supports ssh1 and ssh2. telnet Telnet server test. smtp SMTP (Mail server) test. pop3 POP-3 test. imap IMAP test. IMAP version 2 and 4 are supported, for version 3 use "imap3". nntp NNTP (News) server test. ldap LDAP (Directory server) test. Enter the full LDAP URI if Hobbit is configured with LDAP support. rsync rsync server test bbd Big Brother daemon test. Also works with the Hobbit network daemon. clamd CLAM anti-virus daemon test. spamd SpamAssassin anti-spam daemon test. oratns Oracle TNS listener test. Will attempt to do an oratns "ping". qmtp QMTP server test. For qmail's qmtpd service. qmqp QMQP server test. For qmail's qmqpd service. Hobbit Features   * Hobbit can handle monitoring lots of systems.   * Hobbit has a centralized configuration.   * Hobbit is easy to setup and deploy.   * Hobbit is actively being developed.   * Hobbit is licensed as Open Source - Big Brother is not.
  3. The Linux boot process can be logically divided into six parts. They are as follows: Kernel loader loading, setup, and execution (bootsect.s) In this step the file bootsect.s is loaded into memory by the BIOS. bootsect.s then sets up a few parameters and loads the rest of the kernel into memory. Parameter setup and switch to 32-bit mode (boot.s) After the kernel has been loaded, boot.s takes over. It sets up a temporary IDT and GDT and handles the switch to 32-bit mode. Detailed information on IDT, GDT and LDT can be found on sandpile.org - The world's leading source for pure technical x86 processor information. Kernel decompression (compressed/head.s) The kernel is stored in a compressed format. This head.s (since there is another head.s) decompresses the kernel. Kernel setup (head.s) After the kernel is decompressed, head.s (the second one) takes over. The real GDT and IDT are created, as is a basic memory-paging table. Kernel and memory initialization (main.c) This step is the most complex. The kernel now has control and sets up all remaining parameters and initializes everything remaining. Virtual memory is setup completely and the first processes are created. Init process creation (main.c) In the final step of booting, the Init process is created.
  4. • Buffer Overflow: A condition that occurs when a user or process attempts to place more data into a program’s storage buffer in memory and then overwrites the actual program data with instructions that typically provide a shell owned by root on the server. Accounted for more than 50 percent of all major security bugs leading to security advisories published by CERT. Typically associated with set-user-ID root binaries. • Cryptography: The mathematical science that deals with transforming data to render its meaning unintelligible, prevent its undetected alteration, or prevent its unauthorized use. • Denial of Service: Occurs when a resource is targeted by an intruder to prevent legitimate users from using that resource. They are a threat to the availability of data to all others trying to use that resource. Range from unplugging the network connection to consuming all the available network bandwidth. • IP Spoofing: An attack in which one host masquerades as another. This can be used to route data destined for one host to antoher, thereby allowing attackers to intercept data not originally intended for them. It is typically a one-way attack. • Port Scanning: The process of determining which ports are active on a machine. By probing as many hosts as possible, means to exploit the ones that respond can be developed. It is typically the precursor to an attack. • Packet Filtering: A method of filtering network traffic as it passes between the firewall’s interfaces at the network level. The network data is then analyzed according to the information available in the data packet, and access is granted or denied based on the firewall security policy. Usually requires an intimate knowledge of how network protocols work. • Proxy Gateway: Also called Application Gateways, act on behalf of another program. A host with a proxy server installed becomes both a server and a client, and acts as a choke between the final destination and the client. Proxy servers are typically small, carefully-written single-purpose programs that only permit specific services to pass through it. Typically combined with packet filters. • Set User-ID (setuid) / Set Group-ID (setgid): Files that everyone can execute as either it's owner or group privileges. Typically, you'll find root-owned setuid files, which means that regardless of who executes them, they obtain root permission for the period of time the program is running (or until that program intentionally relinquishes these privileges). These are the types of files that are most often attacked by intruders,because of the potential for obtaining root privileges. Commonly associated with buffer overflows. • Trojan Horse: A program that masquerades itself as a benign program, when in fact it is not. A program can be modified by a malicious programmer that purports to do something useful, but in fact contains a malicious program containing hidden functions, exploiting the privileges of the user executing it. A modified version of /bin/ps, for example, may be used to hide the presence of other programs running on the system. • Vulnerability: A condition that has the potential for allowing security to be compromised. Many different types of network and local vulnerabilities exist and are widely known, and frequently occur on computers regardless of their level of network connectivity, processing speed, or profile.
  5. Da ai dreptate , dar eu zic o chestie , sa fi atent unde si cum il faci public ca Wingozu are si el legile lui de moficare si chestii .. cel putin asa stiu si daca ajunge in mainile cuiva , drq stie .. Merge si un Linux , dar la ala e mult de munca , dar de modificat e usor ( daca stii ) , st poti sa-0l faci public linistit tinand cont ca e open-source.Ar mere mai bine un Unix like decat .. Cum stiti !
  6. http://www.cs.cf.ac.uk/Dave/C/node28.html#...000000000000000 asta e super , tot ce trebuie desrep socketi , IPC , RPC-uri , share memory .. dar tebuie sa ai baza calumea , cu pointeri , etc.. va descurcati voi .
  7. Ce program folosesti pentru editare Windows ? Nu mi se pare o chestie prea cine stie ce , cu mot .. Wallpaperuri , tutoriale de AdobePhotoshop , Gaim , sunt cu caru , boot-screenrui la fel , programe incluse gasim sa-ti dam ce vrea matale , facem pe DVD , can nu cred ca incape , dar ce e asa mare tam tam ?.. Nu mi se pare un proiect prea mare. Daca vroiai ceva adevarat , ne uneam programatori , designeri , etc si scriam de la 0 un Unix like ceva , sau stiu eu ce , macar o varianta Pico cu niste mici spoofere , posenere , bogusri , etc incluse.. Dar sa modifici cu porograme contrafacute , ceva ce a fost facut cu greu , doar ca sa ai tu un wallpaper , sau sa imiti style xp ?Vrei sa faci o tema nu ? Pai nu e asa mare proiect. Btw eu ma pricep cat de cat bine  la Windows XP , Windows 2003 server , Windows 2000 server,Windows 98 ,Microsoft Virtual  PC 2004  ( nu e Windows ) , si ti le intorc pe toate partile. Hai bafta !
  8. Asa zic si eu ca fratele meu eddye47 ! No comment ! Inchideti dracu subiectu ca prea s-a iesit din off-topic
  9. @eddie47 Fratele meu , moartea e o chestie naturala , vine ne ia si ne duce la dracu ( pe el l-a luat mai devreme ca il iubea Domnu si avea un corcodil in Rai si vroia sa-l prinda ).Satisfacut? Cu ce te freaca pe tine ca a murit ala ? Hai sa-ti spun , cand a murit Einstein , drq stia , nu stia nici 0,0001 % din populatia globului atunci.Nici azi nu stie lumea ca a trait si da a facut multe lucruri pentru acest glob , dar foarte multe , nu-ti inchipui.Pe cand atunci cand moarre un magnat din asta , smecheru smecherilor , plin de bani plange tot globu , parca cine stie cu ce te-a ajutat pe tine.Fratele meu , omul acesta nu te-a ajutat cu nimic , si te face sa plangi.Daca iti maore sotia sau copilu ce faci mah , mori ? Da-o in spanac , prea mare tragedie , de vad peste tot moartea lu amaratu asta.Si-a cautat-o si stia ca daca moare o sa moara ca un eroru , mare smecher. Eu zic ca subiectul sa fie inchis , deja s-a facut mult tam-tam peste tot de prinzatoru asta de crocodili.Asta e a fost fraier , cica ce l-a muscat pe el nu musca , decat daca deranjezi , l-o mancat in cur , l-o scarpinat pisica aia de mare bine de tot. Peace , nu astept raspuns , mi se pare prea banal subiectul.In fiecare secunda moare un om sau mai multi , de cate secunde a murit el ? Te-ai gandit la asta ? Hai pa.. ÂÂÂÂ
  10. SI totul se reduce la vorba mea : "In ziua de ani sunt numai o adunatura de cretini care configureaza si mentin infrastructura acelor servere".NU e de mirare , poate erau tipi in vacanta.Evolva sau ce o fi suck's rau .Am si o poza pentru ei : mai jos ÂÂÂÂ
  11. Nu era subsmenatu in joc , chiar eu i-am zis nemtoaicei ca-mi place a pierde timpul :
  12. E off-topic , dupa cum se zice.Cum zicea o nemtoaica , pana si secunda aia care o savurezi tastand e pretioasa.  :
  13. !_30

    Citi ani aveti?

    Da oricum , nici NASA nu-i facea felul hasului ala ;D ( peste 150 de caractere , bine multe se repetau periodic , si am impresia .. ) .. Oricum ati aflat acum :
  14. ;D Merita asta : http://thatvideosite.com/view/1316.html )
  15. Un sfat , in loc sa va "racaiti" care pe care , mai bine ati pune mana in timpul asta si ati face ceva de folos voua macar , daca nu forumului ! Care mai de care subiectele de la off-topic ! ;D
  16. Da pe mine ma tine treaz 24/24 ( aproximativ ) , stiu ca era o poza , nu mai stiu pe unde , cu un PC si "o gramada de Pet-uri de Cola langa".
  17. !_30

    IPs/IP-Ranges

    So ? Nu prind faza ..erau puse mai demult toate segmentele folosite de astia mari , NASA , DoD ..de ce mai era nevoie inca odata sa fie luata o sublcasa din segmentele respective ?Era un post gen :"Dangereos IP". ;D
  18. L-am facut sa tranforme un numar in format zecimal intr-un binar pe 16 biti ( 2 byte's = 1 WORD ).Practic tranforma un numar zecimal (0-65535 , aproximativ ) , intr-un WORD ( binar ). EXEMPLU : 40500 = 1001111000110100 Va astept pe voi sa-mi faceti un program care tranforma zecimal intr 0-128 intr-un NIBBLE , e simplu
  19. !_30

    Citi ani aveti?

    Este un numar , tranformat in hexa apoi in MD5 , si restu vedeti voi.
  20. !_30

    Citi ani aveti?

    Nu , trebuie sa fi inteligent , sa-ti dai seama din ce trebuie sa mai transformi ( de cateva ori ) , dupa ce decryptezi acel MD5. P.S. : lumea zice ca nu e de gasit
  21. Aveti codul sursa aici , al unui program care transforma un numar din aria 0-255 , intr-un octet ( binar pe 8 biti ) : Ex : 1 = 00000001 ÂÂÂÂ
  22. Zieam doar ca e prea multa panarama ( off -topic prea abundent ) , doar pentru o schimbare de nick.
  23. !_30

    Citi ani aveti?

    Daca esti inteligent si decryptezi afli : HInt : MD5
  24. Pot sa vin si eu cu o idee marunta ? Can am aflat ca tipu a murit , am avut o clipa de "doliu" sa zicem.MI-a parut rau pentru o clipa.De ce pentru ca ma uitam la emisiunile lui.Atat. Dar hai sa gandim altfel.Spre stupoarea mea , moartea lui a ajuns peste tot , pe toate forumurile gigant de informatica , hacking , etc .. cat si pe portalul yahoo si peste tot.E mare baros , din RAi sau unde o fi se uita , ce ma iubesc pe mine oameni. Dar hai sa ne gandim asa.O fata de 17 ani are leucemie.Parinti nu au bani ( sau nu fac rost de bani pentru opeatie ) , ea moare in chinuri pe un pat amarat de spital , pierzand intreaaga viata.Ea spre deosebire de tipul ala nu a trait viata intens ca el , a murit si ghici .. mai multe de cateva zeci de persoane nu vor stii de moartea ei si de existenta ei , pe cand el , miliarde de oameni stiu ca a murit. Sa fim seriosi ;D
  25. !_30

    Fun stuff

    Faza este , chiar si eu cand am vazut prima data un PC imi dadeam seama ca este "monitor" ala din fata , chiar daca nu stiam cum se numeste , pana si fratemiu ala mic. Cat de prost sa fie ? ( americanii , fenomen ).
×
×
  • Create New...