Monday , 29 April 2024
Home 4 John Black (page 28)

John Black

A professional fast learner, with experience in the IT management, capable of technical troubleshooting to identify and solve problems.

The killer app for Mac is now even better than ever

Parallels Desktop for Mac enables you to run Windows, Linux, and more side-by-side with Mac OS X on any Intel-powered Mac, without rebooting. With Parallels’ award-winning virtualization technology, you can run Mac OS X and your favorite Windows applications at the same time. You can even drag-and-drop files between desktops! Leading the way with our trademark innovation, the latest release of Parallels Desktop for Mac comes packed with 50+ new features and enhancements, including Snapshots, 3D graphics, and the new Parallels-only SmartSelect. Parallels Desktop 3.0 Feature Just when it seemed like Parallels Desktop couldn’t get any better, we release yet another feature-packed update! FREE to existing Parallels Desktop 3.0 customers, this new Feature Update includes exciting new integration capabilities that make it easier than ever to run Windows on a Mac! Highlights include: New Coherence features, including support for Exposé, transparent windows, and overlapping Windows and Mac windows on the …

Read More »

Iptables to specify a range of IP addresses or ports

Someone recently asked me a question: How can I save time and script size by specifying a range of IP addresses or ports using iptables? In old version of iptables IP address ranges are only valid in the nat table (see below for example). However newer version does support option that allows you to specify a range of IP addresses or ports for regular tables such as input. You need to use following options with match extensions (-m Ext). iprange : This matches on a given arbitrary range of IPv4 addresses. [!]–src-range ip-ip: Match source IP in the specified range. [!]–dst-range ip-ip: Match destination IP in the specified range. Syntax: -m iprange –src-range IP-IP -j ACTION -m iprange –dst-range IP-IP -j ACTION For example, allow incoming request on a port 22 for source IP in the 192.168.1.100-192.168.1.200 range only. You need to add something as follows to your iptables script: …

Read More »

Setup a transparent proxy with Squid in three easy steps

I got a chance to play with Squid and iptables. My job was simple : Setup Squid proxy as a transparent server. Main benefit of setting transparent proxy is you do not have to setup up individual browsers to work with proxies. System: HP dual Xeon CPU system with 8 GB RAM (good for squid). Eth0: IP:192.168.1.1 Eth1: IP: 192.168.2.1 (192.168.2.0/24 network (around 150 windows XP systems)) OS: Red Hat Enterprise Linux 4.0 (Following instruction should work with Debian and all other Linux distros) Eth0 connected to internet and eth1 connected to local lan i.e. system act as router. Server Configuration Step #1 : Squid configuration so that it will act as a transparent proxy Step #2 : Iptables configuration Configure system as router Forward all http requests to 3128 (DNAT) Step #3: Run scripts and start squid service First, Squid server installed (use up2date squid) and configured by adding …

Read More »

The Long-Term Impact of User Account Control

The problem with running as an administrator is obvious: any malware that attacks users, or the applications they run, will have full control over 90 percent of the computers it infects. The User Account Control (UAC) feature in Windows Vista is the Microsoft solution to a pervasive security challenge—the fact that over 90 percent of users currently on the Windows platform run with administrative privileges. While it is possible to run as a standard user on Windows® XP—and I have—it can be extremely painful. For instance, if you travel frequently while using Windows XP, you’ll find that as a standard user, you’re unable to modify the time zone on your system. UAC is the feature that is supposed to change all that. Actually, that’s the first misconception. UAC is not just a feature; it is a collection of features, most of which are not particularly obvious. I won’t give you …

Read More »

The “De-perimeterization” of Networks

The architecture of the network perimeter is changing. The wisdom of the past was to harden the perimeter as much as possible by layering multiple technologies to detect and protect against threat. The concept was to secure organizational borders and then, after that, the network. There were various business drivers that put this “perimeterization” in sync with the needs of the business. These drivers include: • The explosion of IP addresses, with one on nearly every electronic device, and with some of these devices, such as mobile phones, having significant associated business functionality • Increased connectivity from outside the enterprise environment by customers, employees, and business partners and • Increased business relationships of various forms including relationships in a “coopetition”—a situation where a competitor in one field is also a business partner in another. One difficulty with the hardened perimeter model is that as more and more technologies are added …

Read More »

Fundamental Computer Investigation Guide For Windows

Internet connectivity and technological advances expose computers and computer networks to criminal activities such as unauthorized intrusion, financial fraud, and identity and intellectual property theft. Computers can be used to launch attacks against computer networks and destroy data. E-mail can be used to harass people, transmit sexually explicit images, and conduct other malicious activities. Such activities expose organizations to ethical, legal, and financial risks and often require them to conduct internal computer investigations. This guide discusses processes and tools for use in internal computer investigations. It introduces a multi-phase model that is based on well-accepted procedures in the computer investigation community. It also presents an applied scenario example of an internal investigation in an environment that includes Microsoft® Windows®–based computers. The investigation uses Windows Sysinternals tools (advanced utilities that can be used to examine Windows–based computers) as well commonly available Windows commands and tools. Some of the policies and procedures …

Read More »

Step-by-Step Guide to Getting Started with Microsoft Windows Server Update Services 3.0

Microsoft Windows Server Update Services (WSUS) 3.0 provides a comprehensive solution for managing updates within your network. This document provides instructions for basic tasks for deploying WSUS 3.0 on your network. Use this guide to perform the following tasks: Install WSUS 3.0. Configure WSUS 3.0 to obtain updates from Microsoft. Configure client computers to install updates from WSUS 3.0. Approve, manage, and distribute updates. Although WSUS 3.0 is a feature-rich update-management solution, this guide offers only a single way to accomplish any of these tasks. When there are options to perform a task in different ways, the alternative approaches are noted. Review WSUS 3.0 Installation Requirements This guide explains how to install WSUS 3.0. For software requirements and supported platforms for WSUS 3.0, see the Release Notes (http://go.microsoft.com/fwlink/?LinkId=71220). on Windows Server 2003 Service Pack 1 and Windows Server® Code Name “Longhorn” operating systems.

Read More »