Multifunctional Broadrange Wireless Router (ASUS WL-700gE)

This Multifunctional Broadrange Wireless Router from AUSUS is amazing. It’s a perfect one box solution for your Home Wireless Network, Internet Connection and Digital Media Storage. All this in a small box:

  • Wireless Router.
  • Storage Server with Raid-1 (mirroring) capability.
  • Built in FTP/Web Server.
  • Download master (can directly download to the device using Bit Torrent, FTP and HTTP).
  • Support for iTune interface for music file management.
  • Play Video/Audio directly on TV via DMA.

Firewall Analyzer

Firewalls have become an integral part of all corporate networks. They’re the first line of defense against attacks from outside network (Internet) and also the point of control to make sure internal users (employees) are using the Internet as they’re supposed to. Recently the UTM (United Threat Management) Firewalls have become very popular. They’ve built in gateway anti-virus, anti-spam, web content filtering and IPS (Intrusion Prevention System) on top of traditional firewall functions. These firewalls generate loads and loads of log data and it’s very difficult to analyze the traffic and security event levels by just looking at the log files. So, a firewall logging and analyzing tool becomes necessary to generate easy to understand reports. After trying few softwares, I came across Firewall Analyzer, which was the exact tool I was looking for.
Read more ›

State of the Blogosphere, August 2006

CEO of Technorati, Sifry has published State of the Blogosphere, August 2006. Technorati is currently tracking 50 million blogs and have some very interesting figures with graphs about the state of the blogosphere. This is the summary:

  • Technorati is now tracking over 50 Million Blogs.
  • The Blogosphere is over 100 times bigger than it was just 3 years ago.
  • Today, the blogosphere is doubling in size every 200 days, or about once every 6 and a half months.
  • From January 2004 until July 2006, the number of blogs that Technorati tracks has continued to double every 5-7 months.
  • About 175,000 new weblogs were created each day, which means that on average, there are more than 2 blogs created each second of each day.
  • About 8% of new blogs get past Technorati’s filters, even if it is only for a few hours or days.
  • About 70% of the pings Technorati receives are from known spam sources, but we drop them before we have to send out a spider to go and index the splog.
  • Total posting volume of the blogosphere continues to rise, showing about 1.6 Million postings per day, or about 18.6 posts per second.
  • This is about double the volume of about a year ago.
  • The most prevalent times for English-language posting is between the hours of 10AM and 2PM Pacific time, with an additional spike at around 5PM Pacific time

Understanding Tunneling

Tunneling is a technology used to connect different computers and networks securely across the Internet. There’s a great introduction to Tunneling and it’s uses at Networking 101: Understanding Tunneling

A tunnel is a mechanism used to ship a foreign protocol across a network that normally wouldn’t support it. Tunneling protocols allow you to use, for example, IP to send another protocol in the "data" portion of the IP datagram. Most tunneling protocols operate at layer 4, which means they are implemented as a protocol that replaces something like TCP or UDP.

Sharing a single mouse and keyboard between multiple computers

I’m using Synergy to share a single keyboard and mouse between my Mac, Windows and Linux machines. It’s a very useful software I’ve been using for quite some time. There’s a very detailed HOWTO at Engadget, if you want to set it up for yourself.

This is my desk — powered by Synergy 🙂

How to restore a hacked Linux Server

Marius Ducea has a great article on How to restore a hacked Linux Server. He provides a very practical baseline on how you should develop your own plan of action to restore a hacked Linux Server. These are the steps he recommends:

– Don’t panic. Keep your calm and develop a plan of actions
– Disconnect the system from the network
– Discover the method used to compromise the system
– Stop all the attacker scripts and remove his files
– Restore not affected services
– Fix the problem that caused the compromise
– Restore the affected services
– Monitor the system

I’ve a personal experience of restoring a hacked Linux Server. I agree with all of his recommended steps. Out of them, I think finding the method (security hole) used to compromise the system is most important, because if you don’t know this then the attacker can immediately use the same security hole to attack and compromise the system after you restore.

Bill Gates on Letterman Show and Jon Stewart on Net Neutrality

You have to watch them, both are classic stuff…

Ethereal on Mac OS X

With perfect password manager, I thought I had the complete set of tools in my Mac for getting things done. But today I realized, I’d overlooked ethereal. I use it sometimes and it’s a gem without which it would be very difficult to solve some network problems. Ethereal is a free and open source packet sniffer application, used for network troubleshooting, analysis, software and protocol development, and education. It has all of the standard features of a protocol analyzer.

I was happy to see Ethereal for Mac OS X listed at the top of the download page. But, was confused with the choice I had to make between Fink Project and DarwinPorts. I was not sure what they meant or which one was better. So, after Googling a while and reading the FAQs, I found that the number one goal of both projects were to port open source Linux/Unix softwares to Mac OS X. They just differ in the packaging approach they’ve taken. DarwinPorts was written from scratch to try a different approach to a packaging system, where as Fink Project utilizes robust package management tools dpkg and apt-get from Debian Linux Project . So, I decided to try ethereal with Fink Project and this is how I did it.

Read more ›

Display Video Images Into Thin Air

This is a new technology called Heliodisplay images that requires no screens, monitors or other physical surfaces to be able to project and display its images. Very cool, straight out of Star Wars but it costs $ 20,000 at this moment and is expected to be affordable as technology advances.

 

via: Robin Good

Dual Boot Vista and Ubuntu

After switching to Mac, my Samsung notebook with Windows Xp has been free, so I decided to test dual booting Windows Vista and Ubuntu Linux in this laptop. The downloading, burning cd/dvd and installation was easy and straight forward. Only special thing I had to do was to modify the menu.lst file in Ubuntu. This is how I did it:
Read more ›

Top