Yesterday a friend contacted me about moving his site for Yahoo Small Business Web Hosting to another location. This typically can be challenging, regardless of web host, because of having to deal with someone else who has set this up and more than likely is not doing what they are supposed to be doing which…Details
Earlier today we had a minor issue on a development server that generated around 175,000 emails dumped into a Postfix queue in a short amount of time. I needed to first analyze the emails and second clear the Postfix queue. Below is information on how to learn more about the emails in the Postfix queue,…Details
When I first got my Dell Studio XPS laptop I would get a popup asking for me to specify what was being inserted into the audio jack. At some point I must have reconfigured this and forgotten exactly how I did so though I did remember that it was something to do with reconfiguration pop-ups.…Details
I had a customer today who brought in a laptop and wanted to switch over to Ubuntu linux. I always try to go the extra mile for people who want to convert to Linux. After installing Ubuntu 10.04 LTS, I rebooted and to my dismay the wired (eth0) interface was not working. I always run…Details
TCtrace is like a brother to itrace and traceroute but it uses TCP SYN packets to trace. This makes it possible for you to trace through firewalls if you know one TCP service that is allowed to pass from the outside. Once again its a very simple tool like the last few I have reviewed…Details
The next tool up for review in the information gathering section is tcptraceroute. tcptraceroute is a traceroute implementation using TCP packets. The more traditional traceroute sends out either UDP or ICMP ECHO packets with a TTL of one, and increments the TTL until the destination has been reached. By printing the gateways that generate ICMP…Details
The next tool I will be reviewing is from the same suite of tools as netenum and netmask. Protos is a IP protocol scanner. It goes through all possible IP protocols and uses a negative scan to sort out unsupported protocols which should be reported by the target using ICMP protocol unreachable messages.
Netmask is another simple tool which does one thing and that is, makes a ICMP netmask request. By determining the netmasks of various computers on a network, you can better map your subnet structure and infer trust relationships.Details