Quantcast
Channel: dimitar.me » Networking
Browsing all 10 articles
Browse latest View live

Image may be NSFW.
Clik here to view.

Basics of Networking

I have to admit that the majority of the IT professionals I have met have a little or no idea of basic networking. And sadly some of those are sys admins, site admins, programmers and in the extreme...

View Article


Image may be NSFW.
Clik here to view.

Dynamic Port Forwarding with SOCKS over SSH

Dynamic Port Forwarding with SOCKS over SSH is probably the easiest and cheapest secure method to connect a client application to a remote host over a preferred port. This method allows an application...

View Article


Image may be NSFW.
Clik here to view.

KARMA on the Fon and Sniffing Wireless Network Traffic with Ubuntu – Step by...

KARMA is an application that transforms the right wireless NIC into the ultimate Access Point. Unlike a regular AP, which advertises its SSID to whoever wants to connect to it, the KARMA enabled AP...

View Article

Find out the subdomains of a given domain name with dig

First,  find out the name server(s) for the domain name in question: dig wikipedia.com Look under the “AUTHORITY SECTION”: ;; AUTHORITY SECTION: wikipedia.com.        163475    IN    NS...

View Article

Alternative ways to transfer files when you do not have ftp or sftp server...

Very often I find myself having to transfer files to remote machines that do not have ftp or sftp server running. Here are a few methods that I use in those cases: Using scp: The secure copy protocol...

View Article


How to Resume Partial File Transfers

I work primarily with UNIX and Linux machines and scp is my main choice to transfer files with. It is both convenient, short and secure. Example: scp localfile user@remotecomputer:/path/to/target/dir...

View Article

Find the Geopgraphical Location of an IP Address

There are a few applications that give the geographical location of an IP address *. My favorite one is VisualRoute. It not only maps the location of the source and destination IP addresses, but also...

View Article

Block a range of IP addresses from reaching your server

When your Linux server gets bombarded with malicious requests the quickest and easiest thing is to block the offending IP address (or the entire range) using iptables: To block just one IP address: $...

View Article


Unable to create new directories or files (write access) in WebDAV with Apache2

It turns out that if you have enabled mod_rewrite on the server and you are actually doing any url re-writing for the site under which WebDAV is running, then you will not be able to create new...

View Article


Find out what DNS requests are made in real time via command line

Since all DNS requests are over port 53, we can use the raw tcpdump utility and just look at the packets on that port: tcpdump -vvv -s 0 -l -n port 53 Someone took the extra step to write a php script...

View Article
Browsing all 10 articles
Browse latest View live


Latest Images