<?xml version='1.0' encoding='UTF-8'?><rss xmlns:atom="http://www.w3.org/2005/Atom" xmlns:openSearch="http://a9.com/-/spec/opensearchrss/1.0/" xmlns:blogger="http://schemas.google.com/blogger/2008" xmlns:georss="http://www.georss.org/georss" xmlns:gd="http://schemas.google.com/g/2005" xmlns:thr="http://purl.org/syndication/thread/1.0" version="2.0"><channel><atom:id>tag:blogger.com,1999:blog-8022626610982444035</atom:id><lastBuildDate>Fri, 01 Nov 2024 11:10:14 +0000</lastBuildDate><category>IT Security</category><category>Utilities</category><category>Windows Softwares</category><category>Hacking Articles</category><category>Network Articles</category><category>Cool Tricks</category><category>Firewall</category><category>E-Book</category><category>Cisco</category><category>Windows Security</category><category>Linux Articles</category><category>Tweaks</category><category>IDS/IPS</category><category>Vulnerability Assessment</category><category>Exploits Articles</category><category>Penetration Testing</category><category>Checkpoint</category><category>Latest Release</category><category>Network Security</category><category>Information Security</category><category>USB</category><category>Ubuntu</category><category>Ubuntu 12.04 TLS</category><category>VPN</category><category>Auditing (ISMS)</category><category>CBT-Nuggets</category><category>Cisco Router</category><category>Cyber Forensic</category><category>Juniper</category><category>Linux Admin</category><category>Linux Security</category><category>Ubuntu Commands</category><category>BlueCoat Proxy</category><category>CISA</category><category>Cisco VLAN</category><category>Dpkg</category><category>EC-Council</category><category>Firewall Types</category><category>Information System Auditing</category><category>Internet Protocol</category><category>OSPF</category><category>Shell Script dpkg</category><category>.htaccess</category><category>.net Framework</category><category>Bash Script</category><category>COBIT</category><category>Checkpoint Backup</category><category>Checkpoint High Availability Module</category><category>Checkpoint Log Commands</category><category>Cisco ASA Firewall</category><category>Cisco PIX</category><category>Coding</category><category>DNS</category><category>Firewall Definition</category><category>Full Setup .Net Framwork</category><category>IPv6</category><category>Inter VLAN Routing</category><category>Intrusion Detection System</category><category>Linux Proxy</category><category>MRTG</category><category>Netscreen</category><category>Network Monitor</category><category>Proxy Server</category><category>Redundancy Module</category><category>Risk Management</category><category>Server Monitor</category><category>Sonic Firewall</category><category>Squid</category><category>Switch</category><category>TCP/IP</category><category>Traffic Grapher</category><category>Traffic Monitor</category><category>dpkg-query</category><title>Knowledge comes with the desire to explore it !!</title><description>Aim: Good Articles in simple Language.&#xa;&#xa;{Source Of Highly Innovative Value Added Mania}</description><link>https://xcessl0gycs.blogspot.com/</link><managingEditor>noreply@blogger.com (Unknown)</managingEditor><generator>Blogger</generator><openSearch:totalResults>194</openSearch:totalResults><openSearch:startIndex>1</openSearch:startIndex><openSearch:itemsPerPage>25</openSearch:itemsPerPage><item><guid isPermaLink="false">tag:blogger.com,1999:blog-8022626610982444035.post-3218647184928152964</guid><pubDate>Sun, 20 Aug 2023 06:09:00 +0000</pubDate><atom:updated>2023-08-20T11:39:54.933+05:30</atom:updated><title>How to download protected/view only files from google drive ?</title><description>&lt;p&gt;&amp;nbsp;Sometimes you may have faced a situation like your friends or teachers has given you pdf, google docs, google sheets or video files with google drive links and when you open it you can preview the content of those files but when you try to download you will not get any download, copy, or print button because google has intentionally created those files with no download or print feature.&lt;/p&gt;&lt;p&gt;&lt;br /&gt;&lt;/p&gt;&lt;p&gt;In general, these types of files are view-only or protected google drive files. Suppose you like download those files and save them locally then without a hack you cannot achieve. Don&#39;t worry guys I will help you. In this article, I will be explaining to you how to download protected view-only files from google drive.&lt;/p&gt;&lt;p&gt;&lt;br /&gt;&lt;/p&gt;&lt;p&gt;&lt;span face=&quot;roboto, sans-serif&quot; style=&quot;background-color: #feebef; font-size: 16px; text-align: justify;&quot;&gt;Warning: For educational purposes only.&lt;/span&gt;&lt;/p&gt;&lt;h3 style=&quot;background-color: white; border-bottom: 3px solid rgb(12, 12, 12); font-family: roboto, sans-serif; padding-bottom: 0.5rem; text-align: justify;&quot;&gt;&lt;span style=&quot;font-size: 14pt;&quot;&gt;Steps to Download protected/view-only pdf files from google drive?&lt;/span&gt;&lt;/h3&gt;&lt;p style=&quot;background-color: white; font-family: roboto, sans-serif; text-align: justify;&quot;&gt;&lt;span style=&quot;font-size: 14pt;&quot;&gt;1. Open or Preview Any view-only or protected files from google drive.&lt;/span&gt;&lt;/p&gt;&lt;p&gt;&lt;span class=&quot;ezoic-autoinsert-video ezoic-under_second_paragraph&quot; face=&quot;roboto, sans-serif&quot; style=&quot;background-color: white;&quot;&gt;&lt;/span&gt;&lt;span class=&quot;ezoic-autoinsert-ad ezoic-mid_content&quot; face=&quot;roboto, sans-serif&quot; style=&quot;background-color: white;&quot;&gt;&lt;/span&gt;&lt;span face=&quot;roboto, sans-serif&quot; id=&quot;ez-clearholder-box-4&quot; style=&quot;background-color: white; clear: both; display: block;&quot;&gt;&lt;/span&gt;&lt;/p&gt;&lt;p style=&quot;background-color: white; font-family: roboto, sans-serif; text-align: justify;&quot;&gt;&lt;span style=&quot;font-size: 14pt;&quot;&gt;2. Open Developer Console.&lt;/span&gt;&lt;/p&gt;&lt;p style=&quot;background-color: white; font-family: roboto, sans-serif; text-align: justify;&quot;&gt;&lt;span style=&quot;font-size: 14pt;&quot;&gt;&amp;nbsp; &amp;nbsp;If you are previewing in&lt;/span&gt;&lt;span style=&quot;font-size: 14pt;&quot;&gt;&amp;nbsp;Google Chrome or Firefox&lt;/span&gt;&lt;/p&gt;&lt;p style=&quot;background-color: white; font-family: roboto, sans-serif; text-align: justify;&quot;&gt;&lt;span style=&quot;font-size: 14pt;&quot;&gt;&amp;nbsp; &amp;nbsp; &amp;nbsp;Press&amp;nbsp;&lt;strong&gt;Shift&amp;nbsp;&lt;/strong&gt;+&amp;nbsp;&lt;strong&gt;Ctrl&amp;nbsp;&lt;/strong&gt;+&amp;nbsp;&lt;strong&gt;J&lt;/strong&gt;&amp;nbsp;( on Windows / Linux) or&amp;nbsp;&lt;strong&gt;Option&amp;nbsp;&lt;/strong&gt;+&amp;nbsp;&lt;strong&gt;⌘&amp;nbsp;&amp;nbsp;&lt;/strong&gt;+&amp;nbsp;&lt;strong&gt;J&amp;nbsp;&lt;/strong&gt;(on Mac)&lt;/span&gt;&lt;/p&gt;&lt;p style=&quot;background-color: white; font-family: roboto, sans-serif; text-align: justify;&quot;&gt;&lt;span style=&quot;font-size: 14pt;&quot;&gt;&amp;nbsp; &amp;nbsp;If you are previewing in Microsoft Edge&amp;nbsp;&lt;/span&gt;&lt;/p&gt;&lt;p style=&quot;background-color: white; font-family: roboto, sans-serif; text-align: justify;&quot;&gt;&lt;span style=&quot;font-size: 14pt;&quot;&gt;&amp;nbsp; &amp;nbsp; &amp;nbsp;Press&amp;nbsp;&lt;strong&gt;Shift&amp;nbsp;&lt;/strong&gt;+&amp;nbsp;&lt;strong&gt;Ctrl&amp;nbsp;&lt;/strong&gt;+&lt;strong&gt;&amp;nbsp;I&lt;/strong&gt;&amp;nbsp;&lt;/span&gt;&lt;/p&gt;&lt;p style=&quot;background-color: white; font-family: roboto, sans-serif; text-align: justify;&quot;&gt;&lt;span style=&quot;font-size: 14pt;&quot;&gt;&amp;nbsp; &amp;nbsp;If you are previewing in Apple Safari&lt;/span&gt;&lt;/p&gt;&lt;p style=&quot;background-color: white; font-family: roboto, sans-serif; text-align: justify;&quot;&gt;&lt;span style=&quot;font-size: 14pt;&quot;&gt;&amp;nbsp; &amp;nbsp; &amp;nbsp;Press&amp;nbsp;&lt;strong&gt;Option&amp;nbsp;&lt;/strong&gt;+&amp;nbsp;&lt;strong&gt;⌘&amp;nbsp;&lt;/strong&gt;+&amp;nbsp;&lt;strong&gt;C&lt;/strong&gt;&lt;/span&gt;&lt;/p&gt;&lt;p&gt;&lt;span class=&quot;ezoic-autoinsert-ad ezoic-long_content&quot; face=&quot;roboto, sans-serif&quot; style=&quot;background-color: white;&quot;&gt;&lt;/span&gt;&lt;span face=&quot;roboto, sans-serif&quot; id=&quot;ez-clearholder-banner-1&quot; style=&quot;background-color: white; clear: both; display: block;&quot;&gt;&lt;/span&gt;&lt;/p&gt;&lt;p style=&quot;background-color: white; font-family: roboto, sans-serif; text-align: justify;&quot;&gt;&lt;span style=&quot;font-size: 14pt;&quot;&gt;Then you will find yourself inside the developer tools.&lt;/span&gt;&lt;/p&gt;&lt;p style=&quot;background-color: white; font-family: roboto, sans-serif; text-align: justify;&quot;&gt;&lt;span style=&quot;font-size: 14pt;&quot;&gt;3&amp;nbsp; Navigate to the &quot;&lt;strong&gt;Console&lt;/strong&gt;&quot; tab.&lt;/span&gt;&lt;/p&gt;&lt;p&gt;&lt;span class=&quot;ezoic-autoinsert-video ezoic-mid_content&quot; face=&quot;roboto, sans-serif&quot; style=&quot;background-color: white;&quot;&gt;&lt;/span&gt;&lt;/p&gt;&lt;p style=&quot;background-color: white; font-family: roboto, sans-serif; text-align: justify;&quot;&gt;&lt;span style=&quot;font-size: 14pt;&quot;&gt;4&amp;nbsp; Paste below code and press Enter&lt;/span&gt;&lt;/p&gt;&lt;p style=&quot;background-color: white; font-family: roboto, sans-serif; text-align: justify;&quot;&gt;&lt;span style=&quot;font-size: 14pt;&quot;&gt;&lt;br /&gt;&lt;/span&gt;&lt;/p&gt;&lt;p style=&quot;text-align: justify;&quot;&gt;&lt;span face=&quot;roboto, sans-serif&quot;&gt;&lt;span style=&quot;background-color: #fcff01; font-size: 18.6667px;&quot;&gt;let jspdf = document.createElement(&quot;script&quot;);&lt;/span&gt;&lt;/span&gt;&lt;/p&gt;&lt;p style=&quot;text-align: justify;&quot;&gt;&lt;span face=&quot;roboto, sans-serif&quot;&gt;&lt;span style=&quot;background-color: #fcff01; font-size: 18.6667px;&quot;&gt;jspdf.onload = function () {&lt;/span&gt;&lt;/span&gt;&lt;/p&gt;&lt;p style=&quot;text-align: justify;&quot;&gt;&lt;span face=&quot;roboto, sans-serif&quot;&gt;&lt;span style=&quot;background-color: #fcff01; font-size: 18.6667px;&quot;&gt;let pdf = new jsPDF();&lt;/span&gt;&lt;/span&gt;&lt;/p&gt;&lt;p style=&quot;text-align: justify;&quot;&gt;&lt;span face=&quot;roboto, sans-serif&quot;&gt;&lt;span style=&quot;background-color: #fcff01; font-size: 18.6667px;&quot;&gt;let elements = document.getElementsByTagName(&quot;img&quot;);&lt;/span&gt;&lt;/span&gt;&lt;/p&gt;&lt;p style=&quot;text-align: justify;&quot;&gt;&lt;span face=&quot;roboto, sans-serif&quot;&gt;&lt;span style=&quot;background-color: #fcff01; font-size: 18.6667px;&quot;&gt;for (let i in elements) {&lt;/span&gt;&lt;/span&gt;&lt;/p&gt;&lt;p style=&quot;text-align: justify;&quot;&gt;&lt;span face=&quot;roboto, sans-serif&quot;&gt;&lt;span style=&quot;background-color: #fcff01; font-size: 18.6667px;&quot;&gt;let img = elements[i];&lt;/span&gt;&lt;/span&gt;&lt;/p&gt;&lt;p style=&quot;text-align: justify;&quot;&gt;&lt;span face=&quot;roboto, sans-serif&quot;&gt;&lt;span style=&quot;background-color: #fcff01; font-size: 18.6667px;&quot;&gt;console.log(&quot;add img &quot;, img);&lt;/span&gt;&lt;/span&gt;&lt;/p&gt;&lt;p style=&quot;text-align: justify;&quot;&gt;&lt;span face=&quot;roboto, sans-serif&quot;&gt;&lt;span style=&quot;background-color: #fcff01; font-size: 18.6667px;&quot;&gt;if (!/^blob:/.test(img.src)) {&lt;/span&gt;&lt;/span&gt;&lt;/p&gt;&lt;p style=&quot;text-align: justify;&quot;&gt;&lt;span face=&quot;roboto, sans-serif&quot;&gt;&lt;span style=&quot;background-color: #fcff01; font-size: 18.6667px;&quot;&gt;console.log(&quot;invalid src&quot;);&lt;/span&gt;&lt;/span&gt;&lt;/p&gt;&lt;p style=&quot;text-align: justify;&quot;&gt;&lt;span face=&quot;roboto, sans-serif&quot;&gt;&lt;span style=&quot;background-color: #fcff01; font-size: 18.6667px;&quot;&gt;continue;&lt;/span&gt;&lt;/span&gt;&lt;/p&gt;&lt;p style=&quot;text-align: justify;&quot;&gt;&lt;span face=&quot;roboto, sans-serif&quot;&gt;&lt;span style=&quot;background-color: #fcff01; font-size: 18.6667px;&quot;&gt;}&lt;/span&gt;&lt;/span&gt;&lt;/p&gt;&lt;p style=&quot;text-align: justify;&quot;&gt;&lt;span face=&quot;roboto, sans-serif&quot;&gt;&lt;span style=&quot;background-color: #fcff01; font-size: 18.6667px;&quot;&gt;let can = document.createElement(&#39;canvas&#39;);&lt;/span&gt;&lt;/span&gt;&lt;/p&gt;&lt;p style=&quot;text-align: justify;&quot;&gt;&lt;span face=&quot;roboto, sans-serif&quot;&gt;&lt;span style=&quot;background-color: #fcff01; font-size: 18.6667px;&quot;&gt;let con = can.getContext(&quot;2d&quot;);&lt;/span&gt;&lt;/span&gt;&lt;/p&gt;&lt;p style=&quot;text-align: justify;&quot;&gt;&lt;span face=&quot;roboto, sans-serif&quot;&gt;&lt;span style=&quot;background-color: #fcff01; font-size: 18.6667px;&quot;&gt;can.width = img.width;&lt;/span&gt;&lt;/span&gt;&lt;/p&gt;&lt;p style=&quot;text-align: justify;&quot;&gt;&lt;span face=&quot;roboto, sans-serif&quot;&gt;&lt;span style=&quot;background-color: #fcff01; font-size: 18.6667px;&quot;&gt;can.height = img.height;&lt;/span&gt;&lt;/span&gt;&lt;/p&gt;&lt;p style=&quot;text-align: justify;&quot;&gt;&lt;span face=&quot;roboto, sans-serif&quot;&gt;&lt;span style=&quot;background-color: #fcff01; font-size: 18.6667px;&quot;&gt;con.drawImage(img, 0, 0, img.width, img.height);&lt;/span&gt;&lt;/span&gt;&lt;/p&gt;&lt;p style=&quot;text-align: justify;&quot;&gt;&lt;span face=&quot;roboto, sans-serif&quot;&gt;&lt;span style=&quot;background-color: #fcff01; font-size: 18.6667px;&quot;&gt;let imgData = can.toDataURL(&quot;image/jpeg&quot;, 1.0);&lt;/span&gt;&lt;/span&gt;&lt;/p&gt;&lt;p style=&quot;text-align: justify;&quot;&gt;&lt;span face=&quot;roboto, sans-serif&quot;&gt;&lt;span style=&quot;background-color: #fcff01; font-size: 18.6667px;&quot;&gt;pdf.addImage(imgData, &#39;JPEG&#39;, 0, 0);&lt;/span&gt;&lt;/span&gt;&lt;/p&gt;&lt;p style=&quot;text-align: justify;&quot;&gt;&lt;span face=&quot;roboto, sans-serif&quot;&gt;&lt;span style=&quot;background-color: #fcff01; font-size: 18.6667px;&quot;&gt;pdf.addPage();&lt;/span&gt;&lt;/span&gt;&lt;/p&gt;&lt;p style=&quot;text-align: justify;&quot;&gt;&lt;span face=&quot;roboto, sans-serif&quot;&gt;&lt;span style=&quot;background-color: #fcff01; font-size: 18.6667px;&quot;&gt;}&lt;/span&gt;&lt;/span&gt;&lt;/p&gt;&lt;p style=&quot;text-align: justify;&quot;&gt;&lt;span face=&quot;roboto, sans-serif&quot;&gt;&lt;span style=&quot;background-color: #fcff01; font-size: 18.6667px;&quot;&gt;pdf.save(&quot;download.pdf&quot;);&lt;/span&gt;&lt;/span&gt;&lt;/p&gt;&lt;p style=&quot;text-align: justify;&quot;&gt;&lt;span face=&quot;roboto, sans-serif&quot;&gt;&lt;span style=&quot;background-color: #fcff01; font-size: 18.6667px;&quot;&gt;};&lt;/span&gt;&lt;/span&gt;&lt;/p&gt;&lt;p style=&quot;text-align: justify;&quot;&gt;&lt;span face=&quot;roboto, sans-serif&quot;&gt;&lt;span style=&quot;background-color: #fcff01; font-size: 18.6667px;&quot;&gt;jspdf.src = &#39;https://cdnjs.cloudflare.com/ajax/libs/jspdf/1.5.3/jspdf.debug.js&#39;;&lt;/span&gt;&lt;/span&gt;&lt;/p&gt;&lt;p style=&quot;text-align: justify;&quot;&gt;&lt;/p&gt;&lt;p style=&quot;text-align: justify;&quot;&gt;&lt;span face=&quot;roboto, sans-serif&quot;&gt;&lt;span style=&quot;background-color: #fcff01; font-size: 18.6667px;&quot;&gt;document.body.appendChild(jspdf);&lt;/span&gt;&lt;/span&gt;&lt;/p&gt;&lt;div style=&quot;text-align: justify;&quot;&gt;&lt;span face=&quot;roboto, sans-serif&quot; style=&quot;background-color: white; font-size: 18.6667px; text-align: start;&quot;&gt;5. Now, the pdf file start to downloads.&lt;/span&gt;&lt;/div&gt;&lt;div style=&quot;text-align: justify;&quot;&gt;&lt;span face=&quot;roboto, sans-serif&quot; style=&quot;background-color: white; font-size: 18.6667px; text-align: start;&quot;&gt;&lt;br /&gt;&lt;/span&gt;&lt;/div&gt;&lt;div style=&quot;text-align: justify;&quot;&gt;&lt;span face=&quot;roboto, sans-serif&quot; style=&quot;background-color: #feebef; text-align: start;&quot;&gt;Note that it may take a long time for downloading if the size of the pdf is large because each page in the pdf is generated in the form of an image. Also, it doesn&#39;t guarantee the content quality of pdf remains the same.&lt;/span&gt;&lt;/div&gt;&lt;div style=&quot;text-align: justify;&quot;&gt;&lt;span face=&quot;roboto, sans-serif&quot; style=&quot;background-color: #feebef; text-align: start;&quot;&gt;&lt;br /&gt;&lt;/span&gt;&lt;/div&gt;&lt;div style=&quot;text-align: justify;&quot;&gt;&lt;p style=&quot;background-color: white; font-family: roboto, sans-serif; text-align: start;&quot;&gt;&lt;span style=&quot;text-decoration-line: underline;&quot;&gt;&lt;strong&gt;&lt;span style=&quot;font-size: 14pt;&quot;&gt;Technical Concept:&lt;/span&gt;&lt;/strong&gt;&lt;/span&gt;&lt;/p&gt;&lt;div style=&quot;background-color: white; font-family: roboto, sans-serif; text-align: start;&quot;&gt;&lt;div style=&quot;text-align: justify;&quot;&gt;&lt;span style=&quot;font-size: 14pt;&quot;&gt;On-page load each Image tag on the page is search, and&amp;nbsp;&lt;/span&gt;&lt;/div&gt;&lt;div style=&quot;text-align: justify;&quot;&gt;&amp;nbsp;&lt;/div&gt;&lt;div style=&quot;text-align: justify;&quot;&gt;&lt;span style=&quot;font-size: 14pt;&quot;&gt;if the image is not found then continue finding the Image tag on the next page of the pdf.&lt;/span&gt;&lt;/div&gt;&lt;div style=&quot;text-align: justify;&quot;&gt;&amp;nbsp;&lt;/div&gt;&lt;div style=&quot;text-align: justify;&quot;&gt;&lt;span style=&quot;font-size: 14pt;&quot;&gt;Else if found: then with the help of Canvas those images are created with the&amp;nbsp;&lt;strong&gt;drawImage&lt;/strong&gt;() function and here we are creating images in&amp;nbsp;&lt;strong&gt;JPEG&lt;/strong&gt;&amp;nbsp;format and later these images are added back to pdf instance by&amp;nbsp;&lt;strong&gt;addImage&lt;/strong&gt;() function. After that, with the help of&amp;nbsp;&lt;strong&gt;addPage&lt;/strong&gt;() new page is created and the same repeats until reaching the end of the page and finally pdf is downloaded.&lt;/span&gt;&lt;/div&gt;&lt;span class=&quot;ezoic-autoinsert-ad ezoic-longer_content&quot;&gt;&lt;/span&gt;&lt;span id=&quot;ez-clearholder-large-leaderboard-2&quot; style=&quot;clear: both; display: block;&quot;&gt;&lt;/span&gt;&lt;div style=&quot;text-align: justify;&quot;&gt;&amp;nbsp;&lt;/div&gt;&lt;div style=&quot;text-align: justify;&quot;&gt;&lt;span style=&quot;font-size: 14pt;&quot;&gt;And this is all possible by the use of the jsPDF library which is provided by Cloudflare. Actually, this jsPDF library is Javascript open-source library for generating PDF files.&lt;/span&gt;&lt;/div&gt;&lt;span class=&quot;ezoic-autoinsert-video ezoic-longer_content&quot;&gt;&lt;/span&gt;&lt;div style=&quot;text-align: justify;&quot;&gt;&amp;nbsp;&lt;/div&gt;&lt;/div&gt;&lt;/div&gt;</description><link>https://xcessl0gycs.blogspot.com/2023/08/how-to-download-protectedview-only.html</link><author>noreply@blogger.com (Unknown)</author><thr:total>0</thr:total></item><item><guid isPermaLink="false">tag:blogger.com,1999:blog-8022626610982444035.post-3682328565915186519</guid><pubDate>Mon, 26 Dec 2022 05:51:00 +0000</pubDate><atom:updated>2022-12-26T11:29:26.152+05:30</atom:updated><title>Clear DNS Cache from Web Browser and Mobile Device</title><description>&lt;div&gt;&lt;div class=&quot;separator&quot; style=&quot;clear: both; text-align: center;&quot;&gt;&lt;img border=&quot;0&quot; data-original-height=&quot;1024&quot; data-original-width=&quot;2048&quot; height=&quot;320&quot; src=&quot;https://blogger.googleusercontent.com/img/b/R29vZ2xl/AVvXsEh8N8AMUPaf_1Zs4mk8Ej905jiw2ofkM40TUte2VN8ipTCXAQY_NYqTC_-jACA4SrjNlyZ11UFUJ5kGzfE7afmMrZVYVm53Fyn4w4EzPFF2EFK10wuoNH9kR08DKkwqBFOlDBHU51fw45k110O8jXyz4mmrUAiuwhBQbeLgC1zv8Ua6KxrKmY2IECKs1w/w640-h320/dns-cache.png&quot; width=&quot;640&quot; /&gt;&lt;/div&gt;&lt;/div&gt;&lt;div&gt;&lt;h2 id=&quot;what-is-chrome://net-internals/#dns?-9592&quot; style=&quot;background-repeat: no-repeat; box-sizing: border-box; color: var(--font-heading-color); font-family: Roboto, Arial; line-height: normal; margin: 40px 0px 20px; padding: 0px; text-align: justify;&quot;&gt;&lt;span style=&quot;color: #cc0000; font-size: large;&quot;&gt;What Is chrome://net-internals/#dns?&lt;/span&gt;&lt;/h2&gt;&lt;p style=&quot;background-repeat: no-repeat; box-sizing: border-box; font-family: Roboto, Arial; margin: 20px 0px; padding: 0px; text-align: justify;&quot;&gt;You can try this link on your browser and you will see the page where you can click&amp;nbsp;&lt;em style=&quot;background-repeat: no-repeat; box-sizing: border-box; margin: 0px; padding: 0px;&quot;&gt;&lt;b&gt;Clear host cache&lt;/b&gt;&lt;/em&gt;&amp;nbsp;to clear the DNS cache on Chrome.&lt;/p&gt;&lt;p style=&quot;background-repeat: no-repeat; box-sizing: border-box; font-family: Roboto, Arial; margin: 20px 0px; padding: 0px; text-align: justify;&quot;&gt;The &lt;b&gt;net-internals/#dns&lt;/b&gt;, also known as &lt;b&gt;Net-Internals&lt;/b&gt;, is a NetLog event stream visualisation tool where you can view real-time logs or load NetLog dumps of later dates that keep the browser’s network-related events and state, helping troubleshoot and debug problems.&lt;/p&gt;&lt;h2 id=&quot;is-it-necessary-to-clear-dns-cache-on-chrome?-9592&quot; style=&quot;background-repeat: no-repeat; box-sizing: border-box; color: var(--font-heading-color); font-family: Roboto, Arial; line-height: normal; margin: 40px 0px 20px; padding: 0px;&quot;&gt;&lt;span style=&quot;color: #cc0000; font-size: large;&quot;&gt;Is It Necessary to Clear DNS Cache on Chrome?&lt;/span&gt;&lt;/h2&gt;&lt;p style=&quot;background-repeat: no-repeat; box-sizing: border-box; font-family: Roboto, Arial; margin: 20px 0px; padding: 0px;&quot;&gt;There are some situations when you need to perform chrome://net-internals/#dns.&lt;/p&gt;&lt;ul style=&quot;background-repeat: no-repeat; box-sizing: border-box; font-family: Roboto, Arial; list-style-image: initial; list-style-position: initial; margin: 20px 0px; padding: 0px 0px 0px 40px;&quot;&gt;&lt;li style=&quot;background-repeat: no-repeat; box-sizing: border-box; margin: 20px 0px; padding: 0px;&quot;&gt;When you are unable to access a website and the DNS entry has been changed.&lt;/li&gt;&lt;li style=&quot;background-repeat: no-repeat; box-sizing: border-box; margin: 20px 0px; padding: 0px;&quot;&gt;When you changed the DNS servers of your network adapter and apply that setting.&lt;/li&gt;&lt;li style=&quot;background-repeat: no-repeat; box-sizing: border-box; margin: 20px 0px; padding: 0px;&quot;&gt;When some errors repeatedly occur to tell you some commonly used websites are un-trusted.&lt;/li&gt;&lt;/ul&gt;&lt;div&gt;&lt;h2 id=&quot;how-to-clear-dns-cache?-9592&quot; style=&quot;background-repeat: no-repeat; box-sizing: border-box; font-family: Roboto, Arial; line-height: normal; margin: 40px 0px 20px; padding: 0px;&quot;&gt;&lt;span style=&quot;color: #cc0000; font-size: medium;&quot;&gt;How to Clear DNS Cache?&lt;/span&gt;&lt;/h2&gt;&lt;h3 style=&quot;background-repeat: no-repeat; box-sizing: border-box; font-family: Roboto, Arial; font-size: 1.5rem; line-height: normal; margin: 30px 0px 20px; padding: 0px; text-align: left;&quot;&gt;&lt;span style=&quot;font-size: 1.5rem;&quot;&gt;1.&lt;span&gt;&amp;nbsp;&amp;nbsp; &amp;nbsp;&lt;/span&gt;Clear DNS Cache on Chrome&lt;/span&gt;&lt;/h3&gt;&lt;p style=&quot;background-repeat: no-repeat; box-sizing: border-box; font-family: Roboto, Arial; margin: 20px 0px; padding: 0px;&quot;&gt;Step 1: Open your Chrome browser and go to this link:&amp;nbsp;&lt;span style=&quot;background-repeat: no-repeat; box-sizing: border-box; font-weight: bolder; margin: 0px; padding: 0px;&quot;&gt;chrome://net-internals/#dns&lt;/span&gt;.&lt;/p&gt;&lt;p style=&quot;background-repeat: no-repeat; box-sizing: border-box; font-family: Roboto, Arial; margin: 20px 0px; padding: 0px;&quot;&gt;Step 2: Once you get to this page, you will see the page with the&amp;nbsp;&lt;span style=&quot;background-repeat: no-repeat; box-sizing: border-box; font-weight: bolder; margin: 0px; padding: 0px;&quot;&gt;Clear host cache&lt;/span&gt;&amp;nbsp;button and click on the button.&lt;/p&gt;&lt;p style=&quot;background-repeat: no-repeat; box-sizing: border-box; font-family: Roboto, Arial; margin: 20px 0px; padding: 0px;&quot;&gt;After this move, no message or prompt will show you the result but you have flushed the DNS cache on Google Chrome.&lt;/p&gt;&lt;p style=&quot;background-repeat: no-repeat; box-sizing: border-box; font-family: Roboto, Arial; margin: 20px 0px; padding: 0px;&quot;&gt;Step 3: Restart your Chrome browser and go to this link:&amp;nbsp;&lt;span style=&quot;background-repeat: no-repeat; box-sizing: border-box; font-weight: bolder; margin: 0px; padding: 0px;&quot;&gt;chrome://net-internals/#sockets&lt;/span&gt;.&lt;/p&gt;&lt;p style=&quot;background-repeat: no-repeat; box-sizing: border-box; font-family: Roboto, Arial; margin: 20px 0px; padding: 0px;&quot;&gt;Step 4: Hit the&amp;nbsp;&lt;span style=&quot;background-repeat: no-repeat; box-sizing: border-box; font-weight: bolder; margin: 0px; padding: 0px;&quot;&gt;Flush socket pools&lt;/span&gt;&amp;nbsp;button and then restart your browser.&lt;/p&gt;&lt;h3 style=&quot;background-repeat: no-repeat; box-sizing: border-box; color: var(--font-heading-color); font-family: Roboto, Arial; font-size: 1.5rem; line-height: normal; margin: 30px 0px 20px; padding: 0px;&quot;&gt;2.&lt;span&gt;&amp;nbsp;&amp;nbsp; &amp;nbsp;&lt;/span&gt;Clear DNS Cache on Firefox&lt;/h3&gt;&lt;p style=&quot;background-repeat: no-repeat; box-sizing: border-box; font-family: Roboto, Arial; margin: 20px 0px; padding: 0px;&quot;&gt;You can clear DNS cache on Firefox by simply restarting the browser for the cache is not maintained on the disk. Or if you don’t want to restart your browser, you can do as follows.&lt;/p&gt;&lt;p style=&quot;background-repeat: no-repeat; box-sizing: border-box; font-family: Roboto, Arial; margin: 20px 0px; padding: 0px;&quot;&gt;Step 1: Open your Firefox browser and enter this link in the address bar:&amp;nbsp;&lt;span style=&quot;background-repeat: no-repeat; box-sizing: border-box; font-weight: bolder; margin: 0px; padding: 0px;&quot;&gt;about:networking#dns&lt;/span&gt;.&lt;/p&gt;&lt;p style=&quot;background-repeat: no-repeat; box-sizing: border-box; font-family: Roboto, Arial; margin: 20px 0px; padding: 0px;&quot;&gt;Step 2: On the next page, you can see some DNS cache details and choose the&amp;nbsp;&lt;span style=&quot;background-repeat: no-repeat; box-sizing: border-box; font-weight: bolder; margin: 0px; padding: 0px;&quot;&gt;Clear DNS Cache&lt;/span&gt;&amp;nbsp;button to clear the browser’s DNS cache.&lt;/p&gt;&lt;h3 style=&quot;background-repeat: no-repeat; box-sizing: border-box; font-family: Roboto, Arial; font-size: 1.5rem; line-height: normal; margin: 30px 0px 20px; padding: 0px;&quot;&gt;3.&lt;span&gt;&amp;nbsp;&amp;nbsp; &amp;nbsp;&lt;/span&gt;Clear DNS Cache on Safari&lt;/h3&gt;&lt;p style=&quot;background-repeat: no-repeat; box-sizing: border-box; font-family: Roboto, Arial; margin: 20px 0px; padding: 0px;&quot;&gt;There is no direct button available for clearing the DNS cache on Safari but you can choose a hidden button to clear caches that include DNS caches.&lt;/p&gt;&lt;p style=&quot;background-repeat: no-repeat; box-sizing: border-box; font-family: Roboto, Arial; margin: 20px 0px; padding: 0px;&quot;&gt;Step 1: Launch Safari on your device and in the menu bar, choose&amp;nbsp;&lt;span style=&quot;background-repeat: no-repeat; box-sizing: border-box; font-weight: bolder; margin: 0px; padding: 0px;&quot;&gt;Safari&lt;/span&gt;&amp;nbsp;and then&amp;nbsp;&lt;span style=&quot;background-repeat: no-repeat; box-sizing: border-box; font-weight: bolder; margin: 0px; padding: 0px;&quot;&gt;Preferences…&lt;/span&gt;.&lt;/p&gt;&lt;p style=&quot;background-repeat: no-repeat; box-sizing: border-box; font-family: Roboto, Arial; margin: 20px 0px; padding: 0px;&quot;&gt;Step 2: In the&amp;nbsp;&lt;span style=&quot;background-repeat: no-repeat; box-sizing: border-box; font-weight: bolder; margin: 0px; padding: 0px;&quot;&gt;Preferences&lt;/span&gt;&amp;nbsp;pane, go to the&amp;nbsp;&lt;span style=&quot;background-repeat: no-repeat; box-sizing: border-box; font-weight: bolder; margin: 0px; padding: 0px;&quot;&gt;Advanced&lt;/span&gt;&amp;nbsp;tab and check the box next to&amp;nbsp;&lt;span style=&quot;background-repeat: no-repeat; box-sizing: border-box; font-weight: bolder; margin: 0px; padding: 0px;&quot;&gt;Show Develop menu in menu bar&lt;/span&gt;.&lt;/p&gt;&lt;p style=&quot;background-repeat: no-repeat; box-sizing: border-box; font-family: Roboto, Arial; margin: 20px 0px; padding: 0px;&quot;&gt;Step 3: Then the&amp;nbsp;&lt;span style=&quot;background-repeat: no-repeat; box-sizing: border-box; font-weight: bolder; margin: 0px; padding: 0px;&quot;&gt;Develop&lt;/span&gt;&amp;nbsp;menu will appear in Safari’s menu bar and you need to click on it to choose the option of&amp;nbsp;&lt;span style=&quot;background-repeat: no-repeat; box-sizing: border-box; font-weight: bolder; margin: 0px; padding: 0px;&quot;&gt;Empty Caches&lt;/span&gt;&amp;nbsp;from the drop-down menu.&lt;/p&gt;&lt;p style=&quot;background-repeat: no-repeat; box-sizing: border-box; font-family: Roboto, Arial; margin: 20px 0px; padding: 0px;&quot;&gt;Then you can re-launch Safari and your cache will be cleared.&lt;/p&gt;&lt;h3 style=&quot;background-repeat: no-repeat; box-sizing: border-box; font-family: Roboto, Arial; font-size: 1.5rem; line-height: normal; margin: 30px 0px 20px; padding: 0px;&quot;&gt;4.&lt;span&gt;&amp;nbsp;&amp;nbsp; &amp;nbsp;&lt;/span&gt;Clear DNS Cache on Opera&lt;/h3&gt;&lt;p style=&quot;background-repeat: no-repeat; box-sizing: border-box; font-family: Roboto, Arial; margin: 20px 0px; padding: 0px;&quot;&gt;To clear the DNS cache on Opera, you can do as follows.&lt;/p&gt;&lt;p style=&quot;background-repeat: no-repeat; box-sizing: border-box; font-family: Roboto, Arial; margin: 20px 0px; padding: 0px;&quot;&gt;Step 1: Launch Opera on your device and go to the link:&amp;nbsp;&lt;span style=&quot;background-repeat: no-repeat; box-sizing: border-box; font-weight: bolder; margin: 0px; padding: 0px;&quot;&gt;opera://net-internals/#dns&lt;/span&gt;.&lt;/p&gt;&lt;p style=&quot;background-repeat: no-repeat; box-sizing: border-box; font-family: Roboto, Arial; margin: 20px 0px; padding: 0px;&quot;&gt;Step 2: On the next page, you can click the button labeled&amp;nbsp;&lt;span style=&quot;background-repeat: no-repeat; box-sizing: border-box; font-weight: bolder; margin: 0px; padding: 0px;&quot;&gt;Clear host cache&lt;/span&gt;&amp;nbsp;to flush the DNS cache.&lt;/p&gt;&lt;p style=&quot;background-repeat: no-repeat; box-sizing: border-box; font-family: Roboto, Arial; margin: 20px 0px; padding: 0px;&quot;&gt;&lt;/p&gt;&lt;p style=&quot;background-repeat: no-repeat; box-sizing: border-box; font-family: Roboto, Arial; margin: 20px 0px; padding: 0px;&quot;&gt;Step 3: After that, go to the link:&amp;nbsp;&lt;span style=&quot;background-repeat: no-repeat; box-sizing: border-box; font-weight: bolder; margin: 0px; padding: 0px;&quot;&gt;opera://net-internals/#sockets&lt;/span&gt;&amp;nbsp;and click on the&amp;nbsp;&lt;span style=&quot;background-repeat: no-repeat; box-sizing: border-box; font-weight: bolder; margin: 0px; padding: 0px;&quot;&gt;Flush socket pools&lt;/span&gt;&amp;nbsp;button.&lt;/p&gt;&lt;h3 style=&quot;background-repeat: no-repeat; box-sizing: border-box; font-family: Roboto, Arial; font-size: 1.5rem; line-height: normal; margin: 30px 0px 20px; padding: 0px;&quot;&gt;5.&lt;span&gt;&amp;nbsp;&amp;nbsp; &amp;nbsp;&lt;/span&gt;Clear DNS Cache on Your Apple iPhone&lt;/h3&gt;&lt;p style=&quot;background-repeat: no-repeat; box-sizing: border-box; font-family: Roboto, Arial; margin: 20px 0px; padding: 0px;&quot;&gt;To clear your iPhone DNS cache, you can directly restart the device, that will help&amp;nbsp;&lt;span style=&quot;background-repeat: no-repeat; box-sizing: border-box; margin: 0px; padding: 0px;&quot;&gt;clear out your DNS, or you can&amp;nbsp;toggle Air-plane mode on and off.&lt;/span&gt;&lt;/p&gt;&lt;p style=&quot;background-repeat: no-repeat; box-sizing: border-box; font-family: Roboto, Arial; margin: 20px 0px; padding: 0px;&quot;&gt;Besides, you can reset network settings to clear DNS, but this method will&amp;nbsp;clear your saved Wi-Fi and Bluetooth settings, which needs to be reconfigured.&lt;/p&gt;&lt;p style=&quot;background-repeat: no-repeat; box-sizing: border-box; font-family: Roboto, Arial; margin: 20px 0px; padding: 0px;&quot;&gt;Step 1: In&amp;nbsp;&lt;span style=&quot;background-repeat: no-repeat; box-sizing: border-box; font-weight: bolder; margin: 0px; padding: 0px;&quot;&gt;Settings&lt;/span&gt;&amp;nbsp;on your device, choose&amp;nbsp;&lt;span style=&quot;background-repeat: no-repeat; box-sizing: border-box; font-weight: bolder; margin: 0px; padding: 0px;&quot;&gt;General&lt;/span&gt;.&lt;/p&gt;&lt;p style=&quot;background-repeat: no-repeat; box-sizing: border-box; font-family: Roboto, Arial; margin: 20px 0px; padding: 0px;&quot;&gt;Step 2: Scroll down to choose&amp;nbsp;&lt;span style=&quot;background-repeat: no-repeat; box-sizing: border-box; font-weight: bolder; margin: 0px; padding: 0px;&quot;&gt;Transfer or Reset iPhone&lt;/span&gt;&amp;nbsp;and then tap on&amp;nbsp;&lt;span style=&quot;background-repeat: no-repeat; box-sizing: border-box; font-weight: bolder; margin: 0px; padding: 0px;&quot;&gt;Reset&lt;/span&gt;.&lt;/p&gt;&lt;p style=&quot;background-repeat: no-repeat; box-sizing: border-box; font-family: Roboto, Arial; margin: 20px 0px; padding: 0px;&quot;&gt;Step 3: Choose&amp;nbsp;&lt;span style=&quot;background-repeat: no-repeat; box-sizing: border-box; font-weight: bolder; margin: 0px; padding: 0px;&quot;&gt;Reset Network Settings&lt;/span&gt;&amp;nbsp;from the list and then confirm your option to save the choice.&lt;/p&gt;&lt;p style=&quot;background-repeat: no-repeat; box-sizing: border-box; font-family: Roboto, Arial; margin: 20px 0px; padding: 0px;&quot;&gt;After that, if you had previously customised your DNS servers, you must&amp;nbsp;manually reset&amp;nbsp;them again.&lt;/p&gt;&lt;h3 style=&quot;background-repeat: no-repeat; box-sizing: border-box; color: var(--font-heading-color); font-family: Roboto, Arial; font-size: 1.5rem; line-height: normal; margin: 30px 0px 20px; padding: 0px;&quot;&gt;6.&lt;span&gt;&amp;nbsp;&amp;nbsp; &amp;nbsp;&lt;/span&gt;Clear DNS Cache for Your Android&lt;/h3&gt;&lt;p style=&quot;background-repeat: no-repeat; box-sizing: border-box; font-family: Roboto, Arial; margin: 20px 0px; padding: 0px;&quot;&gt;Android doesn&#39;t offer a direct way to&amp;nbsp;clear the system&#39;s DNS cache within the UI, but you can&amp;nbsp;flush the DNS cache using a browser as we have introduced above, like Chrome, Firefox, Opera, and Safari.&lt;/p&gt;&lt;p style=&quot;background-repeat: no-repeat; box-sizing: border-box; font-family: Roboto, Arial; margin: 20px 0px; padding: 0px;&quot;&gt;Just open your mobile phone and open the browser your are using to follow the above steps to clear the DNS cache. That will be easy to follow.&lt;/p&gt;&lt;/div&gt;&lt;/div&gt;</description><link>https://xcessl0gycs.blogspot.com/2022/12/clear-dns-cache-from-web-browser-and.html</link><author>noreply@blogger.com (Unknown)</author><media:thumbnail xmlns:media="http://search.yahoo.com/mrss/" url="https://blogger.googleusercontent.com/img/b/R29vZ2xl/AVvXsEh8N8AMUPaf_1Zs4mk8Ej905jiw2ofkM40TUte2VN8ipTCXAQY_NYqTC_-jACA4SrjNlyZ11UFUJ5kGzfE7afmMrZVYVm53Fyn4w4EzPFF2EFK10wuoNH9kR08DKkwqBFOlDBHU51fw45k110O8jXyz4mmrUAiuwhBQbeLgC1zv8Ua6KxrKmY2IECKs1w/s72-w640-h320-c/dns-cache.png" height="72" width="72"/><thr:total>0</thr:total></item><item><guid isPermaLink="false">tag:blogger.com,1999:blog-8022626610982444035.post-1822850277111278488</guid><pubDate>Mon, 12 Dec 2022 06:06:00 +0000</pubDate><atom:updated>2022-12-12T11:36:15.776+05:30</atom:updated><title>What are RUA and RUF in DMARC?</title><description>&lt;div class=&quot;separator&quot; style=&quot;clear: both; text-align: center;&quot;&gt;&lt;a href=&quot;https://blogger.googleusercontent.com/img/b/R29vZ2xl/AVvXsEh6VXR9o_z86df5WGFl1-mYaiqP1FurPZVPlNSsyJM-9eETbuUGVasyRhzcE8_oTg9fA44nWd0h7NayCgbwDIZbl_47P9NSmBUTf3vKzGig7UYbsLJpJa-wA38FkHoIyD52o0JimIvHCUd0m5unvoOkbU3l2GDQYHe22KkXNkJSuQkSYWOdBtmcmWlUTQ/s506/Temp.png&quot; imageanchor=&quot;1&quot; style=&quot;margin-left: 1em; margin-right: 1em;&quot;&gt;&lt;img border=&quot;0&quot; data-original-height=&quot;291&quot; data-original-width=&quot;506&quot; height=&quot;368&quot; src=&quot;https://blogger.googleusercontent.com/img/b/R29vZ2xl/AVvXsEh6VXR9o_z86df5WGFl1-mYaiqP1FurPZVPlNSsyJM-9eETbuUGVasyRhzcE8_oTg9fA44nWd0h7NayCgbwDIZbl_47P9NSmBUTf3vKzGig7UYbsLJpJa-wA38FkHoIyD52o0JimIvHCUd0m5unvoOkbU3l2GDQYHe22KkXNkJSuQkSYWOdBtmcmWlUTQ/w640-h368/Temp.png&quot; width=&quot;640&quot; /&gt;&lt;/a&gt;&lt;/div&gt;&lt;div&gt;&lt;p class=&quot;MsoNormal&quot; style=&quot;background: white; line-height: normal; mso-margin-bottom-alt: auto; text-align: justify;&quot;&gt;&lt;span style=&quot;color: #181717; font-family: &amp;quot;Arial&amp;quot;,sans-serif; font-size: 14.5pt; mso-fareast-font-family: &amp;quot;Times New Roman&amp;quot;;&quot;&gt;DMARC
(Domain-based Message Authentication Reporting &amp;amp; Conformance)&amp;nbsp;is an
email validation and authentication system used to detect fraud, such as&amp;nbsp;&lt;b&gt;phishing&lt;/b&gt;&amp;nbsp;and&amp;nbsp;&lt;b&gt;impersonation&lt;/b&gt;,
and&amp;nbsp;&lt;b&gt;improve email deliverability&lt;/b&gt;.&lt;o:p&gt;&lt;/o:p&gt;&lt;/span&gt;&lt;/p&gt;

&lt;p class=&quot;MsoNormal&quot; style=&quot;background: white; line-height: normal; mso-margin-bottom-alt: auto; text-align: justify;&quot;&gt;&lt;span style=&quot;color: #181717; font-family: &amp;quot;Arial&amp;quot;,sans-serif; font-size: 14.5pt; mso-fareast-font-family: &amp;quot;Times New Roman&amp;quot;;&quot;&gt;DMARC
works by protecting your domain and providing visibility over it through two
reports: aggregated reports (RUA) and forensic reports (RUF).&lt;o:p&gt;&lt;/o:p&gt;&lt;/span&gt;&lt;/p&gt;

&lt;p class=&quot;MsoNormal&quot; style=&quot;background: white; line-height: normal; mso-margin-bottom-alt: auto; text-align: justify;&quot;&gt;&lt;span style=&quot;color: #181717; font-family: &amp;quot;Arial&amp;quot;,sans-serif; font-size: 14.5pt; mso-fareast-font-family: &amp;quot;Times New Roman&amp;quot;;&quot;&gt;To
put it another way,&amp;nbsp;&lt;b&gt;DMARC allows you to have control over the use of
your domain&lt;/b&gt;, preventing cybercriminals from applying scams and attacks
using your domain, brand, and reputation.&lt;o:p&gt;&lt;/o:p&gt;&lt;/span&gt;&lt;/p&gt;

&lt;p class=&quot;MsoNormal&quot; style=&quot;background: white; line-height: normal; mso-margin-bottom-alt: auto; text-align: justify;&quot;&gt;&lt;span style=&quot;color: #181717; font-family: &amp;quot;Arial&amp;quot;,sans-serif; font-size: 14.5pt; mso-fareast-font-family: &amp;quot;Times New Roman&amp;quot;;&quot;&gt;Imagine
that a bad guy is using your domain. This crook has sent emails to your clients
and partners to steal data and money from them. The worst thing is that
the&amp;nbsp;email model is very similar to the one that you usually send. In these
cases, it’s difficult to even convince your customers that it was a fake one.&lt;o:p&gt;&lt;/o:p&gt;&lt;/span&gt;&lt;/p&gt;

&lt;p class=&quot;MsoNormal&quot; style=&quot;background: white; line-height: normal; mso-margin-bottom-alt: auto; text-align: justify;&quot;&gt;&lt;span style=&quot;color: #181717; font-family: &amp;quot;Arial&amp;quot;,sans-serif; font-size: 14.5pt; mso-fareast-font-family: &amp;quot;Times New Roman&amp;quot;;&quot;&gt;The
result of this kind of scam is that your brand and reputation can be damaged, with
possible financial losses for the business.&lt;/span&gt;&lt;/p&gt;

&lt;p class=&quot;MsoNormal&quot; style=&quot;background: white; line-height: 21.6pt; mso-outline-level: 2;&quot;&gt;&lt;b&gt;&lt;span style=&quot;color: #1b1b1b; font-family: &amp;quot;Arial&amp;quot;,sans-serif; font-size: 18.0pt; mso-fareast-font-family: &amp;quot;Times New Roman&amp;quot;;&quot;&gt;&lt;u&gt;How DMARC&#39;s validation
process works&lt;/u&gt;&lt;o:p&gt;&lt;/o:p&gt;&lt;/span&gt;&lt;/b&gt;&lt;/p&gt;

&lt;p class=&quot;MsoNormal&quot; style=&quot;background: white; line-height: 20.4pt; mso-margin-bottom-alt: auto;&quot;&gt;&lt;span style=&quot;color: #181717; font-family: &amp;quot;Arial&amp;quot;,sans-serif; font-size: 14.5pt; mso-fareast-font-family: &amp;quot;Times New Roman&amp;quot;;&quot;&gt;DMARC works by
providing instructions for email servers. How? through a DMARC policy published
in the DNS. &lt;o:p&gt;&lt;/o:p&gt;&lt;/span&gt;&lt;/p&gt;

&lt;p class=&quot;MsoNormal&quot; style=&quot;background: white; line-height: 20.4pt; mso-margin-bottom-alt: auto; text-align: justify;&quot;&gt;&lt;span style=&quot;color: #181717; font-family: &amp;quot;Arial&amp;quot;,sans-serif; font-size: 14.5pt; mso-fareast-font-family: &amp;quot;Times New Roman&amp;quot;;&quot;&gt;Basically,
DMARC uses two email authentication protocols,&amp;nbsp;&lt;b&gt;SPF&lt;/b&gt;&amp;nbsp;and&amp;nbsp;&lt;b&gt;DKIM&lt;/b&gt;,&amp;nbsp;to
help email servers identify whether a message is legitimate or not, and&amp;nbsp;take
action, such as sending the message to quarantine. It all depends,&amp;nbsp;in
fact, on how the policy was configured by the domain owner.&lt;o:p&gt;&lt;/o:p&gt;&lt;/span&gt;&lt;/p&gt;

&lt;p class=&quot;MsoNormal&quot; style=&quot;background: white; line-height: 20.4pt; mso-margin-bottom-alt: auto; text-align: justify;&quot;&gt;&lt;span style=&quot;color: #181717; font-family: &amp;quot;Arial&amp;quot;,sans-serif; font-size: 14.5pt; mso-fareast-font-family: &amp;quot;Times New Roman&amp;quot;;&quot;&gt;In
addition, DMARC allows domain owners to receive reports on emails that&amp;nbsp;have
been delivered and/or rejected.&lt;o:p&gt;&lt;/o:p&gt;&lt;/span&gt;&lt;/p&gt;

&lt;p class=&quot;MsoNormal&quot; style=&quot;background: white; line-height: 21.6pt; mso-outline-level: 2;&quot;&gt;&lt;b&gt;&lt;span style=&quot;color: #1b1b1b; font-family: &amp;quot;Arial&amp;quot;,sans-serif; font-size: 18.0pt; mso-fareast-font-family: &amp;quot;Times New Roman&amp;quot;;&quot;&gt;The difference between
DMARC&#39;s RUA and RUF reports&lt;/span&gt;&lt;/b&gt;&lt;/p&gt;

&lt;p class=&quot;MsoNormal&quot; style=&quot;background: white; line-height: 21.6pt; mso-outline-level: 3;&quot;&gt;&lt;b&gt;&lt;span style=&quot;color: #1b1b1b; font-family: &amp;quot;Arial&amp;quot;,sans-serif; font-size: 15.5pt; mso-fareast-font-family: &amp;quot;Times New Roman&amp;quot;;&quot;&gt;&lt;u&gt;RUA: what is a DMARC
aggregate report?&lt;/u&gt;&lt;o:p&gt;&lt;/o:p&gt;&lt;/span&gt;&lt;/b&gt;&lt;/p&gt;

&lt;p class=&quot;MsoNormal&quot; style=&quot;background: white; line-height: 20.4pt; mso-margin-bottom-alt: auto; text-align: justify;&quot;&gt;&lt;span style=&quot;color: #181717; font-family: &amp;quot;Arial&amp;quot;,sans-serif; font-size: 14.5pt; mso-fareast-font-family: &amp;quot;Times New Roman&amp;quot;;&quot;&gt;RUA
is a more general type of report. It provides an overview of all traffic or
usage for a domain. In practice, aggregate reports (RUA) contain&amp;nbsp;information
about the result of authenticated emails and the source that&amp;nbsp;sent them.
That is, the domain used, the IP and the number of emails&amp;nbsp;sent in a given
period.&lt;o:p&gt;&lt;/o:p&gt;&lt;/span&gt;&lt;/p&gt;

&lt;p class=&quot;MsoNormal&quot; style=&quot;background: white; line-height: 21.6pt; mso-outline-level: 3;&quot;&gt;&lt;b&gt;&lt;span style=&quot;color: #1b1b1b; font-family: &amp;quot;Arial&amp;quot;,sans-serif; font-size: 15.5pt; mso-fareast-font-family: &amp;quot;Times New Roman&amp;quot;;&quot;&gt;Aggregate reports may
contain the following information:&lt;o:p&gt;&lt;/o:p&gt;&lt;/span&gt;&lt;/b&gt;&lt;/p&gt;

&lt;ul style=&quot;margin-top: 0cm;&quot; type=&quot;disc&quot;&gt;
 &lt;li class=&quot;MsoNormal&quot; style=&quot;color: #181717; line-height: 20.4pt; margin-bottom: 0cm; mso-list: l1 level1 lfo1; tab-stops: list 36.0pt; vertical-align: baseline;&quot;&gt;&lt;span style=&quot;font-family: &amp;quot;Arial&amp;quot;,sans-serif; font-size: 14.5pt; mso-fareast-font-family: &amp;quot;Times New Roman&amp;quot;;&quot;&gt;Organization name.&lt;o:p&gt;&lt;/o:p&gt;&lt;/span&gt;&lt;/li&gt;
 &lt;li class=&quot;MsoNormal&quot; style=&quot;color: #181717; line-height: 20.4pt; margin-bottom: 0cm; mso-list: l1 level1 lfo1; tab-stops: list 36.0pt; vertical-align: baseline;&quot;&gt;&lt;span style=&quot;font-family: &amp;quot;Arial&amp;quot;,sans-serif; font-size: 14.5pt; mso-fareast-font-family: &amp;quot;Times New Roman&amp;quot;;&quot;&gt;Organization sending email address.&lt;o:p&gt;&lt;/o:p&gt;&lt;/span&gt;&lt;/li&gt;
 &lt;li class=&quot;MsoNormal&quot; style=&quot;color: #181717; line-height: 20.4pt; margin-bottom: 0cm; mso-list: l1 level1 lfo1; tab-stops: list 36.0pt; vertical-align: baseline;&quot;&gt;&lt;span style=&quot;font-family: &amp;quot;Arial&amp;quot;,sans-serif; font-size: 14.5pt; mso-fareast-font-family: &amp;quot;Times New Roman&amp;quot;;&quot;&gt;Extra contact information.&lt;o:p&gt;&lt;/o:p&gt;&lt;/span&gt;&lt;/li&gt;
 &lt;li class=&quot;MsoNormal&quot; style=&quot;color: #181717; line-height: 20.4pt; margin-bottom: 0cm; mso-list: l1 level1 lfo1; tab-stops: list 36.0pt; vertical-align: baseline;&quot;&gt;&lt;span style=&quot;font-family: &amp;quot;Arial&amp;quot;,sans-serif; font-size: 14.5pt; mso-fareast-font-family: &amp;quot;Times New Roman&amp;quot;;&quot;&gt;Report ID number.&lt;o:p&gt;&lt;/o:p&gt;&lt;/span&gt;&lt;/li&gt;
 &lt;li class=&quot;MsoNormal&quot; style=&quot;color: #181717; line-height: 20.4pt; margin-bottom: 0cm; mso-list: l1 level1 lfo1; tab-stops: list 36.0pt; vertical-align: baseline;&quot;&gt;&lt;span style=&quot;font-family: &amp;quot;Arial&amp;quot;,sans-serif; font-size: 14.5pt; mso-fareast-font-family: &amp;quot;Times New Roman&amp;quot;;&quot;&gt;Date range.&lt;o:p&gt;&lt;/o:p&gt;&lt;/span&gt;&lt;/li&gt;
 &lt;li class=&quot;MsoNormal&quot; style=&quot;color: #181717; line-height: 20.4pt; margin-bottom: 0cm; mso-list: l1 level1 lfo1; tab-stops: list 36.0pt; vertical-align: baseline;&quot;&gt;&lt;span style=&quot;font-family: &amp;quot;Arial&amp;quot;,sans-serif; font-size: 14.5pt; mso-fareast-font-family: &amp;quot;Times New Roman&amp;quot;;&quot;&gt;Header domain/from domain.&lt;o:p&gt;&lt;/o:p&gt;&lt;/span&gt;&lt;/li&gt;
 &lt;li class=&quot;MsoNormal&quot; style=&quot;color: #181717; line-height: 20.4pt; margin-bottom: 0cm; mso-list: l1 level1 lfo1; tab-stops: list 36.0pt; vertical-align: baseline;&quot;&gt;&lt;span style=&quot;font-family: &amp;quot;Arial&amp;quot;,sans-serif; font-size: 14.5pt; mso-fareast-font-family: &amp;quot;Times New Roman&amp;quot;;&quot;&gt;Alignment for DKIM and SPF.&lt;o:p&gt;&lt;/o:p&gt;&lt;/span&gt;&lt;/li&gt;
 &lt;li class=&quot;MsoNormal&quot; style=&quot;color: #181717; line-height: 20.4pt; margin-bottom: 0cm; mso-list: l1 level1 lfo1; tab-stops: list 36.0pt; vertical-align: baseline;&quot;&gt;&lt;span style=&quot;font-family: &amp;quot;Arial&amp;quot;,sans-serif; font-size: 14.5pt; mso-fareast-font-family: &amp;quot;Times New Roman&amp;quot;;&quot;&gt;Domain and subdomain policies (reject).&lt;o:p&gt;&lt;/o:p&gt;&lt;/span&gt;&lt;/li&gt;
 &lt;li class=&quot;MsoNormal&quot; style=&quot;color: #181717; line-height: 20.4pt; margin-bottom: 0cm; mso-list: l1 level1 lfo1; tab-stops: list 36.0pt; vertical-align: baseline;&quot;&gt;&lt;span style=&quot;font-family: &amp;quot;Arial&amp;quot;,sans-serif; font-size: 14.5pt; mso-fareast-font-family: &amp;quot;Times New Roman&amp;quot;;&quot;&gt;Percentage of messages to which the DMARC policy is to
     be applied.&lt;o:p&gt;&lt;/o:p&gt;&lt;/span&gt;&lt;/li&gt;
 &lt;li class=&quot;MsoNormal&quot; style=&quot;color: #181717; line-height: 20.4pt; margin-bottom: 0cm; mso-list: l1 level1 lfo1; tab-stops: list 36.0pt; vertical-align: baseline;&quot;&gt;&lt;span style=&quot;font-family: &amp;quot;Arial&amp;quot;,sans-serif; font-size: 14.5pt; mso-fareast-font-family: &amp;quot;Times New Roman&amp;quot;;&quot;&gt;IP information.&lt;o:p&gt;&lt;/o:p&gt;&lt;/span&gt;&lt;/li&gt;
 &lt;li class=&quot;MsoNormal&quot; style=&quot;color: #181717; line-height: 20.4pt; margin-bottom: 0cm; mso-list: l1 level1 lfo1; tab-stops: list 36.0pt; vertical-align: baseline;&quot;&gt;&lt;span style=&quot;font-family: &amp;quot;Arial&amp;quot;,sans-serif; font-size: 14.5pt; mso-fareast-font-family: &amp;quot;Times New Roman&amp;quot;;&quot;&gt;Total of IPs.&lt;o:p&gt;&lt;/o:p&gt;&lt;/span&gt;&lt;/li&gt;
 &lt;li class=&quot;MsoNormal&quot; style=&quot;color: #181717; line-height: 20.4pt; mso-list: l1 level1 lfo1; tab-stops: list 36.0pt; vertical-align: baseline;&quot;&gt;&lt;span style=&quot;font-family: &amp;quot;Arial&amp;quot;,sans-serif; font-size: 14.5pt; mso-fareast-font-family: &amp;quot;Times New Roman&amp;quot;;&quot;&gt;SPF
     and DKIM authentication result.&lt;/span&gt;&lt;/li&gt;&lt;/ul&gt;

&lt;p class=&quot;MsoNormal&quot; style=&quot;background: white; line-height: 21.6pt; mso-outline-level: 3;&quot;&gt;&lt;b&gt;&lt;span style=&quot;color: #1b1b1b; font-family: &amp;quot;Arial&amp;quot;,sans-serif; font-size: 15.5pt; mso-fareast-font-family: &amp;quot;Times New Roman&amp;quot;;&quot;&gt;RUF: what is a DMARC forensic
report?&lt;o:p&gt;&lt;/o:p&gt;&lt;/span&gt;&lt;/b&gt;&lt;/p&gt;

&lt;p class=&quot;MsoNormal&quot; style=&quot;background: white; line-height: 20.4pt; mso-margin-bottom-alt: auto; text-align: justify;&quot;&gt;&lt;span style=&quot;color: #181717; font-family: &amp;quot;Arial&amp;quot;,sans-serif; font-size: 14.5pt; mso-fareast-font-family: &amp;quot;Times New Roman&amp;quot;;&quot;&gt;We
could say that RUF is a more complete report because it includes additional data
about emails, such as subject, header, and information about attachments&amp;nbsp;and
URLs. A forensic report (RUF) may even be a complete copy of an email.&lt;o:p&gt;&lt;/o:p&gt;&lt;/span&gt;&lt;/p&gt;

&lt;p class=&quot;MsoNormal&quot; style=&quot;background: white; line-height: 20.4pt; mso-margin-bottom-alt: auto; text-align: justify;&quot;&gt;&lt;span style=&quot;color: #181717; font-family: &amp;quot;Arial&amp;quot;,sans-serif; font-size: 14.5pt; mso-fareast-font-family: &amp;quot;Times New Roman&amp;quot;;&quot;&gt;Due
to compliance and privacy issues, many companies and organizations end up
choosing not to request RUF reports. The goal is to prevent&amp;nbsp;&lt;b&gt;data
breaches&lt;/b&gt;&amp;nbsp;and to comply with&amp;nbsp;&lt;b&gt;laws and regulations&lt;/b&gt;&amp;nbsp;that
deal with sensitive and personal data.&lt;o:p&gt;&lt;/o:p&gt;&lt;/span&gt;&lt;/p&gt;

&lt;p class=&quot;MsoNormal&quot; style=&quot;background: white; line-height: 21.6pt; mso-outline-level: 3;&quot;&gt;&lt;b&gt;&lt;span style=&quot;color: #1b1b1b; font-family: &amp;quot;Arial&amp;quot;,sans-serif; font-size: 15.5pt; mso-fareast-font-family: &amp;quot;Times New Roman&amp;quot;;&quot;&gt;Forensic reports may
contain the following information:&lt;o:p&gt;&lt;/o:p&gt;&lt;/span&gt;&lt;/b&gt;&lt;/p&gt;

&lt;ul style=&quot;margin-top: 0cm;&quot; type=&quot;disc&quot;&gt;
 &lt;li class=&quot;MsoNormal&quot; style=&quot;color: #181717; line-height: 20.4pt; margin-bottom: 0cm; mso-list: l0 level1 lfo2; tab-stops: list 36.0pt; vertical-align: baseline;&quot;&gt;&lt;span style=&quot;font-family: &amp;quot;Arial&amp;quot;,sans-serif; font-size: 14.5pt; mso-fareast-font-family: &amp;quot;Times New Roman&amp;quot;;&quot;&gt;IP information.&lt;o:p&gt;&lt;/o:p&gt;&lt;/span&gt;&lt;/li&gt;
 &lt;li class=&quot;MsoNormal&quot; style=&quot;color: #181717; line-height: 20.4pt; margin-bottom: 0cm; mso-list: l0 level1 lfo2; tab-stops: list 36.0pt; vertical-align: baseline;&quot;&gt;&lt;span style=&quot;font-family: &amp;quot;Arial&amp;quot;,sans-serif; font-size: 14.5pt; mso-fareast-font-family: &amp;quot;Times New Roman&amp;quot;;&quot;&gt;Subject line.&lt;o:p&gt;&lt;/o:p&gt;&lt;/span&gt;&lt;/li&gt;
 &lt;li class=&quot;MsoNormal&quot; style=&quot;color: #181717; line-height: 20.4pt; margin-bottom: 0cm; mso-list: l0 level1 lfo2; tab-stops: list 36.0pt; vertical-align: baseline;&quot;&gt;&lt;span style=&quot;font-family: &amp;quot;Arial&amp;quot;,sans-serif; font-size: 14.5pt; mso-fareast-font-family: &amp;quot;Times New Roman&amp;quot;;&quot;&gt;Time.&lt;o:p&gt;&lt;/o:p&gt;&lt;/span&gt;&lt;/li&gt;
 &lt;li class=&quot;MsoNormal&quot; style=&quot;color: #181717; line-height: 20.4pt; margin-bottom: 0cm; mso-list: l0 level1 lfo2; tab-stops: list 36.0pt; vertical-align: baseline;&quot;&gt;&lt;span style=&quot;font-family: &amp;quot;Arial&amp;quot;,sans-serif; font-size: 14.5pt; mso-fareast-font-family: &amp;quot;Times New Roman&amp;quot;;&quot;&gt;SPF, DKIM, and DMARC results.&lt;o:p&gt;&lt;/o:p&gt;&lt;/span&gt;&lt;/li&gt;
 &lt;li class=&quot;MsoNormal&quot; style=&quot;color: #181717; line-height: 20.4pt; margin-bottom: 0cm; mso-list: l0 level1 lfo2; tab-stops: list 36.0pt; vertical-align: baseline;&quot;&gt;&lt;span style=&quot;font-family: &amp;quot;Arial&amp;quot;,sans-serif; font-size: 14.5pt; mso-fareast-font-family: &amp;quot;Times New Roman&amp;quot;;&quot;&gt;ISP information.&lt;o:p&gt;&lt;/o:p&gt;&lt;/span&gt;&lt;/li&gt;
 &lt;li class=&quot;MsoNormal&quot; style=&quot;color: #181717; line-height: 20.4pt; margin-bottom: 0cm; mso-list: l0 level1 lfo2; tab-stops: list 36.0pt; vertical-align: baseline;&quot;&gt;&lt;span style=&quot;font-family: &amp;quot;Arial&amp;quot;,sans-serif; font-size: 14.5pt; mso-fareast-font-family: &amp;quot;Times New Roman&amp;quot;;&quot;&gt;From domain information.&lt;o:p&gt;&lt;/o:p&gt;&lt;/span&gt;&lt;/li&gt;
 &lt;li class=&quot;MsoNormal&quot; style=&quot;color: #181717; line-height: 20.4pt; margin-bottom: 0cm; mso-list: l0 level1 lfo2; tab-stops: list 36.0pt; vertical-align: baseline;&quot;&gt;&lt;span style=&quot;font-family: &amp;quot;Arial&amp;quot;,sans-serif; font-size: 14.5pt; mso-fareast-font-family: &amp;quot;Times New Roman&amp;quot;;&quot;&gt;Message ID.&lt;o:p&gt;&lt;/o:p&gt;&lt;/span&gt;&lt;/li&gt;
 &lt;li class=&quot;MsoNormal&quot; style=&quot;color: #181717; line-height: 20.4pt; margin-bottom: 0cm; mso-list: l0 level1 lfo2; tab-stops: list 36.0pt; vertical-align: baseline;&quot;&gt;&lt;span style=&quot;font-family: &amp;quot;Arial&amp;quot;,sans-serif; font-size: 14.5pt; mso-fareast-font-family: &amp;quot;Times New Roman&amp;quot;;&quot;&gt;URLs.&lt;o:p&gt;&lt;/o:p&gt;&lt;/span&gt;&lt;/li&gt;
 &lt;li class=&quot;MsoNormal&quot; style=&quot;color: #181717; line-height: 20.4pt; mso-list: l0 level1 lfo2; tab-stops: list 36.0pt; vertical-align: baseline;&quot;&gt;&lt;span style=&quot;font-family: &amp;quot;Arial&amp;quot;,sans-serif; font-size: 14.5pt; mso-fareast-font-family: &amp;quot;Times New Roman&amp;quot;;&quot;&gt;Delivery
     result.&lt;o:p&gt;&lt;/o:p&gt;&lt;/span&gt;&lt;/li&gt;
&lt;/ul&gt;

&lt;p class=&quot;MsoNormal&quot; style=&quot;background: white; line-height: 21.6pt; mso-outline-level: 2;&quot;&gt;&lt;b&gt;&lt;u&gt;&lt;span style=&quot;color: #1b1b1b; font-family: &amp;quot;Arial&amp;quot;,sans-serif; font-size: 18.0pt; mso-fareast-font-family: &amp;quot;Times New Roman&amp;quot;;&quot;&gt;Why use DMARC&lt;o:p&gt;&lt;/o:p&gt;&lt;/span&gt;&lt;/u&gt;&lt;/b&gt;&lt;/p&gt;

&lt;p class=&quot;MsoNormal&quot; style=&quot;background: white; line-height: 20.4pt; mso-margin-bottom-alt: auto; text-align: justify;&quot;&gt;&lt;span style=&quot;color: #181717; font-family: &amp;quot;Arial&amp;quot;,sans-serif; font-size: 14.5pt; mso-fareast-font-family: &amp;quot;Times New Roman&amp;quot;;&quot;&gt;Using
DMARC, your company can improve its email delivery capabilities and,&amp;nbsp;at
the same time, protect itself against different types of attacks and
threats,&amp;nbsp;such as&amp;nbsp;&lt;b&gt;spam&lt;/b&gt;,&amp;nbsp;&lt;b&gt;phishing&lt;/b&gt;,
and&amp;nbsp;spoofing&amp;nbsp;campaigns.&lt;o:p&gt;&lt;/o:p&gt;&lt;/span&gt;&lt;/p&gt;

&lt;p class=&quot;MsoNormal&quot; style=&quot;background: white; line-height: 20.4pt; mso-margin-bottom-alt: auto; text-align: justify;&quot;&gt;&lt;span style=&quot;color: #181717; font-family: &amp;quot;Arial&amp;quot;,sans-serif; font-size: 14.5pt; mso-fareast-font-family: &amp;quot;Times New Roman&amp;quot;;&quot;&gt;When
properly configured, DMARC ensures that you have visibility into the use of
your domain. In this way, only authorized senders can send emails.&lt;o:p&gt;&lt;/o:p&gt;&lt;/span&gt;&lt;/p&gt;

&lt;p class=&quot;MsoNormal&quot; style=&quot;background: white; line-height: 20.4pt; mso-margin-bottom-alt: auto; text-align: justify;&quot;&gt;&lt;span style=&quot;color: #181717; font-family: &amp;quot;Arial&amp;quot;,sans-serif; font-size: 14.5pt; mso-fareast-font-family: &amp;quot;Times New Roman&amp;quot;;&quot;&gt;It’s
an extra layer of security that prevents cybercriminals from using your&amp;nbsp;brand
and reputation to commit scams and fraud.&lt;/span&gt;&lt;/p&gt;&lt;/div&gt;</description><link>https://xcessl0gycs.blogspot.com/2022/12/what-are-rua-and-ruf-in-dmarc.html</link><author>noreply@blogger.com (Unknown)</author><media:thumbnail xmlns:media="http://search.yahoo.com/mrss/" url="https://blogger.googleusercontent.com/img/b/R29vZ2xl/AVvXsEh6VXR9o_z86df5WGFl1-mYaiqP1FurPZVPlNSsyJM-9eETbuUGVasyRhzcE8_oTg9fA44nWd0h7NayCgbwDIZbl_47P9NSmBUTf3vKzGig7UYbsLJpJa-wA38FkHoIyD52o0JimIvHCUd0m5unvoOkbU3l2GDQYHe22KkXNkJSuQkSYWOdBtmcmWlUTQ/s72-w640-h368-c/Temp.png" height="72" width="72"/><thr:total>0</thr:total></item><item><guid isPermaLink="false">tag:blogger.com,1999:blog-8022626610982444035.post-8303728407233973920</guid><pubDate>Fri, 09 Dec 2022 06:09:00 +0000</pubDate><atom:updated>2022-12-09T11:39:35.273+05:30</atom:updated><title>DNS Zone Transfer Types</title><description>&lt;p&gt;&lt;span style=&quot;background-color: white; color: #333333; font-family: &amp;quot;Lucida Grande&amp;quot;, Arial, Helvetica, sans-serif; font-size: 18.56px;&quot;&gt;&lt;b&gt;Zone Transfer&lt;/b&gt;&lt;/span&gt;&lt;/p&gt;&lt;p style=&quot;background-color: white; color: #333333; font-family: &amp;quot;Lucida Grande&amp;quot;, Arial, Helvetica, sans-serif; font-size: 12.8px; hyphens: auto; line-height: 1.5em; margin: 0px 0px 1em; overflow-wrap: break-word; padding: 0px;&quot;&gt;Zone transfer is the process by which changes made on the primary server are replicated to all the secondary servers in the zone. There are three types of zone transfer to consider:&lt;/p&gt;&lt;ul style=&quot;background-color: white; color: #333333; font-family: &amp;quot;Lucida Grande&amp;quot;, Arial, Helvetica, sans-serif; font-size: 12.8px; line-height: 1.4; list-style-image: initial; list-style-position: initial; margin-left: 2em; margin-top: 0px; padding-left: 3em;&quot;&gt;&lt;li&gt;&lt;p style=&quot;font-size: 12.8px; hyphens: auto; line-height: 1.5em; margin: 0px 0px 1em; overflow-wrap: break-word; padding: 0px;&quot;&gt;Full zone transfer&lt;/p&gt;&lt;/li&gt;&lt;li&gt;&lt;p style=&quot;font-size: 12.8px; hyphens: auto; line-height: 1.5em; margin: 0px 0px 1em; overflow-wrap: break-word; padding: 0px;&quot;&gt;Incremental zone transfer&lt;/p&gt;&lt;/li&gt;&lt;li&gt;&lt;p style=&quot;font-size: 12.8px; hyphens: auto; line-height: 1.5em; margin: 0px 0px 1em; overflow-wrap: break-word; padding: 0px;&quot;&gt;AD replication&lt;/p&gt;&lt;/li&gt;&lt;/ul&gt;&lt;h3 style=&quot;background-color: white; color: #333333; font-family: &amp;quot;Lucida Grande&amp;quot;, Arial, Helvetica, sans-serif; font-size: 17.28px; line-height: 1.5em; margin: 0px; padding: 0px;&quot;&gt;&lt;u&gt;Full Zone Transfer&lt;/u&gt;&lt;/h3&gt;&lt;p style=&quot;background-color: white; color: #333333; font-family: &amp;quot;Lucida Grande&amp;quot;, Arial, Helvetica, sans-serif; font-size: 12.8px; hyphens: auto; line-height: 1.5em; margin: 0px 0px 1em; overflow-wrap: break-word; padding: 0px; text-align: justify;&quot;&gt;Originally, the only method of replication between primary and secondary servers was the&amp;nbsp;&lt;i&gt;&lt;b&gt;full zone transfer&lt;/b&gt;&lt;/i&gt;. With this method, the entire zone database file is transferred whenever an update is made. The zone transfer is performed through a &quot;pull&quot; mechanism rather than a &quot;push.&quot; This means that the secondary servers initiate the zone transfer. The process is as follows:&lt;/p&gt;&lt;ol style=&quot;background-color: white; color: #333333; font-family: &amp;quot;Lucida Grande&amp;quot;, Arial, Helvetica, sans-serif; font-size: 12.8px; line-height: 1.4; margin-left: 2em; margin-top: 0px; padding-left: 3em;&quot;&gt;&lt;li&gt;&lt;p style=&quot;font-size: 12.8px; hyphens: auto; line-height: 1.5em; margin: 0px 0px 1em; overflow-wrap: break-word; padding: 0px;&quot;&gt;The secondary server waits a predetermined amount of time before contacting the primary server. When it does establish contact, it requests the primary server&#39;s Start of Authority (SOA) record.&lt;/p&gt;&lt;/li&gt;&lt;li&gt;&lt;p style=&quot;font-size: 12.8px; hyphens: auto; line-height: 1.5em; margin: 0px 0px 1em; overflow-wrap: break-word; padding: 0px;&quot;&gt;The primary server responds to the secondary server with its SOA record.&lt;/p&gt;&lt;/li&gt;&lt;li&gt;&lt;p style=&quot;font-size: 12.8px; hyphens: auto; line-height: 1.5em; margin: 0px 0px 1em; overflow-wrap: break-word; padding: 0px; text-align: justify;&quot;&gt;Whenever a change is made to the primary name server, the serial number held in the SOA record is incremented. When the secondary server receives the SOA record from the primary server, it compares the serial number to its own. If the serial number in the SOA record sent by the primary server is higher than the serial number in the SOA record currently on the secondary server, the secondary server knows its zone database is out of date. It then sends a request back to the primary server for a full zone transfer. This full transfer is done through an AXFR request.&lt;/p&gt;&lt;/li&gt;&lt;li&gt;&lt;p style=&quot;font-size: 12.8px; hyphens: auto; line-height: 1.5em; margin: 0px 0px 1em; overflow-wrap: break-word; padding: 0px;&quot;&gt;The primary server then sends its full zone database file back to the secondary server. After the update is complete, the process begins again with the waiting period.&lt;/p&gt;&lt;/li&gt;&lt;/ol&gt;&lt;h3 style=&quot;background-color: white; color: #333333; font-family: &amp;quot;Lucida Grande&amp;quot;, Arial, Helvetica, sans-serif; font-size: 17.28px; line-height: 1.5em; margin: 0px; padding: 0px;&quot;&gt;&lt;u&gt;Incremental Zone Transfer&lt;/u&gt;&lt;/h3&gt;&lt;p style=&quot;background-color: white; color: #333333; font-family: &amp;quot;Lucida Grande&amp;quot;, Arial, Helvetica, sans-serif; font-size: 12.8px; hyphens: auto; line-height: 1.5em; margin: 0px 0px 1em; overflow-wrap: break-word; padding: 0px; text-align: justify;&quot;&gt;As you can probably imagine, performing a full zone transfer every time a single change is made to the primary server is inefficient. It also can generate a lot of network traffic if the primary server receives frequent updates and there are multiple secondary servers. To get around this problem, RFC 1995 allows for&amp;nbsp;&lt;i&gt;&lt;b&gt;incremental zone transfers&lt;/b&gt;&lt;/i&gt;. As the name implies, with an incremental transfer, only the portion of the database that has been changed is replicated.&lt;/p&gt;&lt;p style=&quot;background-color: white; color: #333333; font-family: &amp;quot;Lucida Grande&amp;quot;, Arial, Helvetica, sans-serif; font-size: 12.8px; hyphens: auto; line-height: 1.5em; margin: 0px 0px 1em; overflow-wrap: break-word; padding: 0px; text-align: justify;&quot;&gt;The process with an incremental transfer is the same as a full transfer, except with an incremental transfer, the secondary server sends an IXFR request, signifying an incremental transfer, rather than the AXFR request, which signifies a full zone transfer.&lt;/p&gt;&lt;div class=&quot;note&quot; style=&quot;background-color: white; color: #666666; font-family: &amp;quot;Lucida Grande&amp;quot;, Arial, Helvetica, sans-serif; font-size: 12.8px; margin-left: 1em;&quot;&gt;&lt;p class=&quot;tiptitle&quot; style=&quot;font-size: 12.8px; hyphens: auto; line-height: 1.5em; margin: 0px 0px 1em; overflow-wrap: break-word; padding: 0px;&quot;&gt;&lt;b&gt;&lt;u&gt;TIP&lt;/u&gt;&lt;/b&gt;&lt;/p&gt;&lt;p style=&quot;font-size: 12.8px; hyphens: auto; line-height: 1.5em; margin: 0px 0px 1em; overflow-wrap: break-word; padding: 0px;&quot;&gt;&lt;b&gt;If you think of AXFR as A (all) XFR (transfer), it is easy to remember that AXFR is a full transfer. Likewise, you can think of IXFR as I (incremental) XFR (transfer).&lt;/b&gt;&lt;/p&gt;&lt;/div&gt;&lt;p style=&quot;background-color: white; color: #333333; font-family: &amp;quot;Lucida Grande&amp;quot;, Arial, Helvetica, sans-serif; font-size: 12.8px; hyphens: auto; line-height: 1.5em; margin: 0px 0px 1em; overflow-wrap: break-word; padding: 0px; text-align: justify;&quot;&gt;For an incremental transfer to work, a version history must be kept so that name servers will know what changes have already been applied. The primary server maintains a version history, which keeps tracks of all changes that have been made since the last version update was transferred to a secondary server. When a secondary server requests an IXFR transfer, the primary server starts sending the recent updates, beginning with the oldest updates and progressing to the most recent updates.&lt;/p&gt;&lt;p style=&quot;background-color: white; color: #333333; font-family: &amp;quot;Lucida Grande&amp;quot;, Arial, Helvetica, sans-serif; font-size: 12.8px; hyphens: auto; line-height: 1.5em; margin: 0px 0px 1em; overflow-wrap: break-word; padding: 0px; text-align: justify;&quot;&gt;When the secondary server begins receiving the updates, it creates a new version of the zone and begins applying the updates to that copy. When all the updates are committed to the copy of the zone database, the original database is replaced with the copy.&lt;/p&gt;&lt;p style=&quot;background-color: white; color: #333333; font-family: &amp;quot;Lucida Grande&amp;quot;, Arial, Helvetica, sans-serif; font-size: 12.8px; hyphens: auto; line-height: 1.5em; margin: 0px 0px 1em; overflow-wrap: break-word; padding: 0px; text-align: justify;&quot;&gt;If the primary server does not support incremental transfers, it simply ignores the incremental request of the secondary server and performs a full zone transfer.&lt;/p&gt;&lt;h3 style=&quot;background-color: white; color: #333333; font-family: &amp;quot;Lucida Grande&amp;quot;, Arial, Helvetica, sans-serif; font-size: 17.28px; line-height: 1.5em; margin: 0px; padding: 0px;&quot;&gt;&lt;u&gt;AD Replication&lt;/u&gt;&lt;/h3&gt;&lt;p style=&quot;background-color: white; color: #333333; font-family: &amp;quot;Lucida Grande&amp;quot;, Arial, Helvetica, sans-serif; font-size: 12.8px; hyphens: auto; line-height: 1.5em; margin: 0px 0px 1em; overflow-wrap: break-word; padding: 0px;&quot;&gt;AD integrated zones are able to piggyback off of the standard AD replication scheme already in place on the network. Therefore, you do not have to manage a separate replication scheme for DNS data as you would if you used standard primary and secondary servers.&lt;/p&gt;</description><link>https://xcessl0gycs.blogspot.com/2022/12/dns-zone-transfer-types.html</link><author>noreply@blogger.com (Unknown)</author><thr:total>0</thr:total></item><item><guid isPermaLink="false">tag:blogger.com,1999:blog-8022626610982444035.post-8359161861526303301</guid><pubDate>Fri, 31 May 2013 12:31:00 +0000</pubDate><atom:updated>2013-05-31T18:09:05.784+05:30</atom:updated><category domain="http://www.blogger.com/atom/ns#">Cisco Router</category><category domain="http://www.blogger.com/atom/ns#">Information Security</category><category domain="http://www.blogger.com/atom/ns#">Internet Protocol</category><category domain="http://www.blogger.com/atom/ns#">MRTG</category><category domain="http://www.blogger.com/atom/ns#">Network Articles</category><category domain="http://www.blogger.com/atom/ns#">Network Monitor</category><category domain="http://www.blogger.com/atom/ns#">Network Security</category><category domain="http://www.blogger.com/atom/ns#">Server Monitor</category><category domain="http://www.blogger.com/atom/ns#">Switch</category><category domain="http://www.blogger.com/atom/ns#">Traffic Grapher</category><category domain="http://www.blogger.com/atom/ns#">Traffic Monitor</category><category domain="http://www.blogger.com/atom/ns#">Ubuntu</category><category domain="http://www.blogger.com/atom/ns#">Ubuntu 12.04 TLS</category><title>How to Install and Configure MRTG on Ubuntu Server 12.04</title><description>&lt;div style=&quot;font-family: &amp;#39;Lucida Grande&amp;#39;, Verdana, Arial, sans-serif; line-height: 16.796875px; text-align: justify;&quot;&gt;
&lt;div class=&quot;separator&quot; style=&quot;clear: both; text-align: center;&quot;&gt;
&lt;/div&gt;
&lt;div class=&quot;separator&quot; style=&quot;clear: both; text-align: center;&quot;&gt;
&lt;a href=&quot;https://blogger.googleusercontent.com/img/b/R29vZ2xl/AVvXsEjyuQMFbiOgQLJ2zJFVCNGWx8NvjKCKDifNGO2rJcYgueZDsomVdPIOsgCS-Er_gF36cOQ1fzHkJ3Qfw8xTFAlEjEM4UTq7cxMDPy5sP3AjggqbppHO37mNP9zAdQQs3-O1leCHX4HGsu6W/s1600/mrtg-ti.png&quot; imageanchor=&quot;1&quot; style=&quot;margin-left: 1em; margin-right: 1em;&quot;&gt;&lt;img border=&quot;0&quot; src=&quot;https://blogger.googleusercontent.com/img/b/R29vZ2xl/AVvXsEjyuQMFbiOgQLJ2zJFVCNGWx8NvjKCKDifNGO2rJcYgueZDsomVdPIOsgCS-Er_gF36cOQ1fzHkJ3Qfw8xTFAlEjEM4UTq7cxMDPy5sP3AjggqbppHO37mNP9zAdQQs3-O1leCHX4HGsu6W/s1600/mrtg-ti.png&quot; height=&quot;133&quot; width=&quot;400&quot;&gt;&lt;/a&gt;&lt;/div&gt;
&lt;span style=&quot;background-color: white;&quot;&gt;&lt;span style=&quot;font-size: 12px;&quot;&gt;&lt;br&gt;&lt;/span&gt;&lt;/span&gt;
&lt;span style=&quot;background-color: white;&quot;&gt;&lt;span style=&quot;font-size: 12px;&quot;&gt;This post will describe how to install and configure &lt;/span&gt;&lt;a href=&quot;http://oss.oetiker.ch/mrtg/index.en.html&quot; style=&quot;font-size: 12px; text-decoration: none;&quot; target=&quot;_blank&quot; title=&quot;The MRTG web site&quot;&gt;Tobi Oetiker’s &lt;span style=&quot;color: blue;&quot;&gt;&lt;b&gt;MRTG&lt;/b&gt;&lt;/span&gt;&lt;/a&gt;&lt;span style=&quot;font-size: 12px;&quot;&gt; (&lt;/span&gt;&lt;span style=&quot;color: #b45f06;&quot;&gt;&lt;b&gt;Multi Router Traffic Grapher&lt;/b&gt;&lt;/span&gt;&lt;span style=&quot;font-size: 12px;&quot;&gt;) on your Ubuntu home server. Once configured, you’ll be able to use it to monitor the traffic in and out of your home network using the SNMP capability in your network’s gateway\router. MRTG generates static HTML pages containing PNG images which provide a visual representation of this traffic. MRTG typically produces daily, weekly, monthly, and yearly graphs. MRTG is written in perl and works on Unix/Linux as well as Windows. MRTG is free software licensed under the GNU GPL.&lt;/span&gt;&lt;/span&gt;&lt;/div&gt;
&lt;div style=&quot;font-family: &amp;#39;Lucida Grande&amp;#39;, Verdana, Arial, sans-serif; line-height: 16.796875px; text-align: justify;&quot;&gt;
&lt;div style=&quot;font-size: 12px;&quot;&gt;
&lt;span style=&quot;background-color: white;&quot;&gt;&lt;br&gt;&lt;/span&gt;&lt;/div&gt;
&lt;span style=&quot;background-color: white;&quot;&gt;&lt;b&gt;&lt;u&gt;Software versions used in this post were as follows:&lt;/u&gt;&lt;/b&gt;&lt;/span&gt;&lt;/div&gt;
&lt;li style=&quot;font-family: &amp;#39;Lucida Grande&amp;#39;, Verdana, Arial, sans-serif; font-size: 12px; line-height: 16.796875px; margin: 7px 0px 8px 10px;&quot;&gt;&lt;span style=&quot;background-color: white; color: #38761d;&quot;&gt;&lt;b&gt;Ubuntu Server v12.04 x64 LTS)&lt;/b&gt;&lt;/span&gt;&lt;/li&gt;
&lt;li style=&quot;font-family: &amp;#39;Lucida Grande&amp;#39;, Verdana, Arial, sans-serif; font-size: 12px; line-height: 16.796875px; margin: 7px 0px 8px 10px;&quot;&gt;&lt;span style=&quot;background-color: white;&quot;&gt;&lt;span style=&quot;color: #990000;&quot;&gt;&lt;b&gt;mrtg_2.17.3-2ubuntu1_amd64.deb&lt;/b&gt;&lt;/span&gt;&lt;/span&gt;&lt;/li&gt;
&lt;br&gt;
&lt;div style=&quot;font-family: &amp;#39;Lucida Grande&amp;#39;, Verdana, Arial, sans-serif; line-height: 16.796875px; text-align: justify;&quot;&gt;
&lt;strong style=&quot;background-color: white;&quot;&gt;&lt;span style=&quot;font-size: large;&quot;&gt;&lt;u&gt;Download and Install&lt;/u&gt;&lt;/span&gt;&lt;/strong&gt;&lt;br&gt;
&lt;div style=&quot;font-size: 12px;&quot;&gt;
&lt;strong style=&quot;background-color: white;&quot;&gt;&lt;br&gt;
&lt;/strong&gt;&lt;/div&gt;
&lt;/div&gt;
&lt;div style=&quot;font-family: &amp;#39;Lucida Grande&amp;#39;, Verdana, Arial, sans-serif; font-size: 12px; line-height: 16.796875px; text-align: justify;&quot;&gt;
&lt;span style=&quot;background-color: white;&quot;&gt;First, download and install MRTG:&lt;/span&gt;&lt;/div&gt;
&lt;div class=&quot;syntaxhighlighter nogutter  &quot; id=&quot;highlighter_239134&quot; style=&quot;background-color: rgb(15, 25, 42) !important; background-image: none !important; border: 0px !important; bottom: auto !important; color: #929280; direction: ltr !important; float: none !important; font-family: Consolas, &amp;#39;Bitstream Vera Sans Mono&amp;#39;, &amp;#39;Courier New&amp;#39;, Courier, monospace !important; font-size: 12px; height: auto !important; left: auto !important; line-height: 1.1em !important; margin: 1em 0px !important; outline: 0px !important; padding: 1px !important; position: relative !important; right: auto !important; top: auto !important; vertical-align: baseline !important; width: 584.09375px;&quot;&gt;
&lt;div class=&quot;lines&quot; style=&quot;background-image: none !important; border: 0px !important; bottom: auto !important; direction: ltr !important; float: none !important; font-size: 1em !important; height: auto !important; left: auto !important; line-height: 1.1em !important; margin: 0px !important; outline: 0px !important; padding: 0px !important; position: static !important; right: auto !important; top: auto !important; vertical-align: baseline !important; width: auto !important;&quot;&gt;
&lt;div class=&quot;line alt1&quot; style=&quot;background-image: none !important; border: 0px !important; bottom: auto !important; direction: ltr !important; float: none !important; font-size: 1em !important; height: auto !important; left: auto !important; line-height: 1.1em !important; margin: 0px !important; outline: 0px !important; padding: 0px !important; position: static !important; right: auto !important; top: auto !important; vertical-align: baseline !important; width: auto !important;&quot;&gt;
&lt;table style=&quot;background-image: none !important; border-collapse: collapse !important; border: 0px !important; bottom: auto !important; direction: ltr !important; float: none !important; font-size: 1em !important; height: auto !important; left: auto !important; line-height: 1.1em !important; margin: 0px !important; outline: 0px !important; padding: 0px !important; position: static !important; right: auto !important; top: auto !important; vertical-align: baseline !important; width: auto !important;&quot;&gt;&lt;tbody style=&quot;background-image: none !important; border: 0px !important; bottom: auto !important; direction: ltr !important; float: none !important; font-size: 1em !important; height: auto !important; left: auto !important; line-height: 1.1em !important; margin: 0px !important; outline: 0px !important; padding: 0px !important; position: static !important; right: auto !important; top: auto !important; vertical-align: baseline !important; width: auto !important;&quot;&gt;
&lt;tr style=&quot;background-image: none !important; border: 0px !important; bottom: auto !important; direction: ltr !important; float: none !important; font-size: 1em !important; height: auto !important; left: auto !important; line-height: 1.1em !important; margin: 0px !important; outline: 0px !important; padding: 0px !important; position: static !important; right: auto !important; top: auto !important; vertical-align: baseline !important; width: auto !important;&quot;&gt;&lt;td class=&quot;content&quot; style=&quot;background-image: none !important; border-bottom-width: 0px !important; border-left-style: none !important; border-right-width: 0px !important; border-top-width: 0px !important; bottom: auto !important; color: rgb(185, 189, 182) !important; direction: ltr !important; float: none !important; font-size: 1em !important; height: auto !important; left: auto !important; line-height: 1.1em !important; margin: 0px !important; outline: 0px !important; padding: 0px 0px 0px 0.5em !important; position: static !important; right: auto !important; top: auto !important; vertical-align: top !important; width: auto !important;&quot;&gt;&lt;code class=&quot;functions&quot; style=&quot;background-image: none !important; border: 0px !important; bottom: auto !important; color: rgb(255, 170, 62) !important; direction: ltr !important; display: inline !important; float: none !important; font-family: Consolas, &amp;#39;Bitstream Vera Sans Mono&amp;#39;, &amp;#39;Courier New&amp;#39;, Courier, monospace !important; font-size: 1em !important; height: auto !important; left: auto !important; line-height: 1.1em !important; margin: 0px !important; outline: 0px !important; padding: 0px !important; position: static !important; right: auto !important; top: auto !important; vertical-align: baseline !important; width: auto !important;&quot;&gt;sudo&lt;/code&gt; &lt;code class=&quot;plain&quot; style=&quot;background-image: none !important; border: 0px !important; bottom: auto !important; color: rgb(209, 237, 255) !important; direction: ltr !important; display: inline !important; float: none !important; font-family: Consolas, &amp;#39;Bitstream Vera Sans Mono&amp;#39;, &amp;#39;Courier New&amp;#39;, Courier, monospace !important; font-size: 1em !important; height: auto !important; left: auto !important; line-height: 1.1em !important; margin: 0px !important; outline: 0px !important; padding: 0px !important; position: static !important; right: auto !important; top: auto !important; vertical-align: baseline !important; width: auto !important;&quot;&gt;apt-get &lt;/code&gt;&lt;code class=&quot;functions&quot; style=&quot;background-image: none !important; border: 0px !important; bottom: auto !important; color: rgb(255, 170, 62) !important; direction: ltr !important; display: inline !important; float: none !important; font-family: Consolas, &amp;#39;Bitstream Vera Sans Mono&amp;#39;, &amp;#39;Courier New&amp;#39;, Courier, monospace !important; font-size: 1em !important; height: auto !important; left: auto !important; line-height: 1.1em !important; margin: 0px !important; outline: 0px !important; padding: 0px !important; position: static !important; right: auto !important; top: auto !important; vertical-align: baseline !important; width: auto !important;&quot;&gt;install&lt;/code&gt; &lt;code class=&quot;plain&quot; style=&quot;background-image: none !important; border: 0px !important; bottom: auto !important; color: rgb(209, 237, 255) !important; direction: ltr !important; display: inline !important; float: none !important; font-family: Consolas, &amp;#39;Bitstream Vera Sans Mono&amp;#39;, &amp;#39;Courier New&amp;#39;, Courier, monospace !important; font-size: 1em !important; height: auto !important; left: auto !important; line-height: 1.1em !important; margin: 0px !important; outline: 0px !important; padding: 0px !important; position: static !important; right: auto !important; top: auto !important; vertical-align: baseline !important; width: auto !important;&quot;&gt;mrtg&lt;/code&gt;&lt;/td&gt;&lt;/tr&gt;
&lt;/tbody&gt;&lt;/table&gt;
&lt;/div&gt;
&lt;/div&gt;
&lt;/div&gt;
&lt;div style=&quot;font-family: &amp;#39;Lucida Grande&amp;#39;, Verdana, Arial, sans-serif; font-size: 12px; line-height: 16.796875px; text-align: justify;&quot;&gt;
&lt;span style=&quot;background-color: white;&quot;&gt;If this is the first time installing MRTG on your server you’ll likely be presented with the following message. Answering “Yes” means that the default configuration file will be installed with permissions set at 640. Answering “No” means that the permissions are set at 644. In this example we’re going to accept the default Yes. No worries though, if you select No the steps in this tutorial will still work.&lt;/span&gt;&lt;br&gt;
&lt;/div&gt;&lt;a href=&quot;https://xcessl0gycs.blogspot.com/2013/05/how-to-install-and-configure-mrtg-on.html#more&quot;&gt;Read more »&lt;/a&gt;</description><link>https://xcessl0gycs.blogspot.com/2013/05/how-to-install-and-configure-mrtg-on.html</link><author>noreply@blogger.com (Unknown)</author><media:thumbnail xmlns:media="http://search.yahoo.com/mrss/" url="https://blogger.googleusercontent.com/img/b/R29vZ2xl/AVvXsEjyuQMFbiOgQLJ2zJFVCNGWx8NvjKCKDifNGO2rJcYgueZDsomVdPIOsgCS-Er_gF36cOQ1fzHkJ3Qfw8xTFAlEjEM4UTq7cxMDPy5sP3AjggqbppHO37mNP9zAdQQs3-O1leCHX4HGsu6W/s72-c/mrtg-ti.png" height="72" width="72"/><thr:total>0</thr:total></item><item><guid isPermaLink="false">tag:blogger.com,1999:blog-8022626610982444035.post-5219534535389495293</guid><pubDate>Fri, 31 May 2013 06:38:00 +0000</pubDate><atom:updated>2013-05-31T12:13:21.819+05:30</atom:updated><category domain="http://www.blogger.com/atom/ns#">.net Framework</category><category domain="http://www.blogger.com/atom/ns#">Full Setup .Net Framwork</category><category domain="http://www.blogger.com/atom/ns#">Utilities</category><category domain="http://www.blogger.com/atom/ns#">Windows Security</category><category domain="http://www.blogger.com/atom/ns#">Windows Softwares</category><title>Download Offline Installers: Microsoft .NET Framework 4.0, 3.5 SP1, 3.5, 3.0 &amp; 2.0 From Microsoft Servers</title><description>&lt;div style=&quot;background-color: white; font-family: Georgia, &amp;#39;Times New Roman&amp;#39;, Times, serif; font-size: 13px; line-height: 19px; padding: 0px 0px 10px; text-align: justify;&quot;&gt;
As many of the new Microsoft Windows applications are developed using .NET Framework, it is becoming&lt;span id=&quot;more-1462&quot; style=&quot;margin: 0px; padding: 0px;&quot;&gt;&lt;/span&gt; mandatory to install .NET Framework on our personal computers.&lt;/div&gt;
&lt;div style=&quot;background-color: white; font-family: Georgia, &amp;#39;Times New Roman&amp;#39;, Times, serif; font-size: 13px; line-height: 19px; padding: 0px 0px 10px; text-align: justify;&quot;&gt;
&lt;br&gt;&lt;/div&gt;
&lt;div class=&quot;separator&quot; style=&quot;clear: both; text-align: center;&quot;&gt;
&lt;a href=&quot;https://blogger.googleusercontent.com/img/b/R29vZ2xl/AVvXsEj8W0lHP51xdlZkX33EXcLGLEdWrAPYdLTtwa_GIECCcH2VeSm3xtvzIjF1UlqApP9OElJ-CN4Y7mmnXBKKB2JIQYSAhoyytNAX7qSNlKj6X2M-4NOlPmUeIs9HslksK0lS9l4uAnA9hmY/s1600/netwindow.jpg&quot; imageanchor=&quot;1&quot; style=&quot;clear: left; float: left; margin-bottom: 1em; margin-right: 1em;&quot;&gt;&lt;img border=&quot;0&quot; src=&quot;https://blogger.googleusercontent.com/img/b/R29vZ2xl/AVvXsEj8W0lHP51xdlZkX33EXcLGLEdWrAPYdLTtwa_GIECCcH2VeSm3xtvzIjF1UlqApP9OElJ-CN4Y7mmnXBKKB2JIQYSAhoyytNAX7qSNlKj6X2M-4NOlPmUeIs9HslksK0lS9l4uAnA9hmY/s1600/netwindow.jpg&quot; height=&quot;200&quot; width=&quot;200&quot;&gt;\&lt;/a&gt;&lt;a href=&quot;https://blogger.googleusercontent.com/img/b/R29vZ2xl/AVvXsEg8EowVirdTlr6-774WyCQsYkaFvd0KtpnUNnLErEsEfExuvtUC2T0g8SVA4CXrSnUcY6-k0Gb4gUME7PIJflWX8jD3QgfZYlSye3tAq4MQbvGbdTQIfrwRtF7X77Uxq0bVcAYruS5gXL8/s1600/DotNet.svg.png&quot; imageanchor=&quot;1&quot; style=&quot;clear: left; display: inline !important; margin-bottom: 1em; margin-right: 1em;&quot;&gt;&lt;img border=&quot;0&quot; src=&quot;https://blogger.googleusercontent.com/img/b/R29vZ2xl/AVvXsEg8EowVirdTlr6-774WyCQsYkaFvd0KtpnUNnLErEsEfExuvtUC2T0g8SVA4CXrSnUcY6-k0Gb4gUME7PIJflWX8jD3QgfZYlSye3tAq4MQbvGbdTQIfrwRtF7X77Uxq0bVcAYruS5gXL8/s1600/DotNet.svg.png&quot; height=&quot;320&quot; width=&quot;230&quot;&gt;&lt;/a&gt;&lt;a href=&quot;https://blogger.googleusercontent.com/img/b/R29vZ2xl/AVvXsEj8W0lHP51xdlZkX33EXcLGLEdWrAPYdLTtwa_GIECCcH2VeSm3xtvzIjF1UlqApP9OElJ-CN4Y7mmnXBKKB2JIQYSAhoyytNAX7qSNlKj6X2M-4NOlPmUeIs9HslksK0lS9l4uAnA9hmY/s1600/netwindow.jpg&quot; imageanchor=&quot;1&quot; style=&quot;clear: left; float: left; margin-bottom: 1em; margin-right: 1em;&quot;&gt;&lt;br&gt;&lt;/a&gt;&lt;/div&gt;
&lt;div style=&quot;background-color: white; font-family: Georgia, &amp;#39;Times New Roman&amp;#39;, Times, serif; line-height: 19px; padding: 0px 0px 10px; text-align: justify;&quot;&gt;
Microsoft provides &lt;strong style=&quot;margin: 0px; padding: 0px;&quot;&gt;&lt;span style=&quot;font-size: large;&quot;&gt;.NET&lt;/span&gt; Framework installer&lt;/strong&gt; as a&lt;b&gt;&lt;span style=&quot;color: #990000;&quot;&gt; &lt;/span&gt;&lt;em style=&quot;margin: 0px; padding: 0px;&quot;&gt;&lt;span style=&quot;font-size: large;&quot;&gt;&lt;span style=&quot;color: #990000;&quot;&gt;free download &lt;/span&gt;&lt;span style=&quot;color: #38761d;&quot;&gt;available to&lt;/span&gt;&lt;span style=&quot;color: #990000;&quot;&gt; &lt;/span&gt;&lt;span style=&quot;color: #0b5394;&quot;&gt;everyone&lt;/span&gt;&lt;/span&gt;&lt;/em&gt;&lt;/b&gt;. But it is an online installer. That means, initially we have to download a small piece of installer and upon starting the installation process the installer automatically connects to Microsoft servers and downloads the required components and completes the installation.&lt;/div&gt;
&lt;div style=&quot;background-color: white; font-family: Georgia, &amp;#39;Times New Roman&amp;#39;, Times, serif; font-size: 13px; line-height: 19px; padding: 0px 0px 10px; text-align: justify;&quot;&gt;
The online installers works great as long as we have internet connectivity always. But many of us require offline installer to install the software on computers not connected to internet, to save the bandwidth while installing on many computers, etc.&lt;br&gt;
&lt;/div&gt;&lt;a href=&quot;https://xcessl0gycs.blogspot.com/2013/05/download-offline-installers-microsoft.html#more&quot;&gt;Read more »&lt;/a&gt;</description><link>https://xcessl0gycs.blogspot.com/2013/05/download-offline-installers-microsoft.html</link><author>noreply@blogger.com (Unknown)</author><media:thumbnail xmlns:media="http://search.yahoo.com/mrss/" url="https://blogger.googleusercontent.com/img/b/R29vZ2xl/AVvXsEj8W0lHP51xdlZkX33EXcLGLEdWrAPYdLTtwa_GIECCcH2VeSm3xtvzIjF1UlqApP9OElJ-CN4Y7mmnXBKKB2JIQYSAhoyytNAX7qSNlKj6X2M-4NOlPmUeIs9HslksK0lS9l4uAnA9hmY/s72-c/netwindow.jpg" height="72" width="72"/><thr:total>0</thr:total></item><item><guid isPermaLink="false">tag:blogger.com,1999:blog-8022626610982444035.post-7675199845849026244</guid><pubDate>Sun, 26 May 2013 07:50:00 +0000</pubDate><atom:updated>2013-05-23T16:22:33.447+05:30</atom:updated><category domain="http://www.blogger.com/atom/ns#">IT Security</category><category domain="http://www.blogger.com/atom/ns#">Linux Admin</category><category domain="http://www.blogger.com/atom/ns#">Linux Articles</category><category domain="http://www.blogger.com/atom/ns#">Linux Security</category><category domain="http://www.blogger.com/atom/ns#">Network Articles</category><category domain="http://www.blogger.com/atom/ns#">Network Security</category><category domain="http://www.blogger.com/atom/ns#">Ubuntu</category><category domain="http://www.blogger.com/atom/ns#">Ubuntu Commands</category><title>How to Setup Chroot SFTP in Linux (Allow Only SFTP, not SSH)</title><description>&lt;div class=&quot;separator&quot; style=&quot;clear: both; text-align: center;&quot;&gt;
&lt;a href=&quot;https://blogger.googleusercontent.com/img/b/R29vZ2xl/AVvXsEhdNx9ZFJnf3EGKIs0ea4RYgKmstn8Gf7bYZV8mBy66N4SLp-hobT1PS1esIL_9QmbIXlPeOZntQn2rlsfLPu826L0QgBmUnFmQ0NdLRTw98Z0BHDRRNPaaMTHOQY84k0WOdDmRXB9ReFPq/s1600/sftp.png&quot; imageanchor=&quot;1&quot; style=&quot;margin-left: 1em; margin-right: 1em;&quot;&gt;&lt;img border=&quot;0&quot; src=&quot;https://blogger.googleusercontent.com/img/b/R29vZ2xl/AVvXsEhdNx9ZFJnf3EGKIs0ea4RYgKmstn8Gf7bYZV8mBy66N4SLp-hobT1PS1esIL_9QmbIXlPeOZntQn2rlsfLPu826L0QgBmUnFmQ0NdLRTw98Z0BHDRRNPaaMTHOQY84k0WOdDmRXB9ReFPq/s1600/sftp.png&quot;&gt;&lt;/a&gt;&lt;/div&gt;
&lt;br&gt;
&lt;div class=&quot;separator&quot; style=&quot;clear: both; text-align: center;&quot;&gt;
&lt;a href=&quot;https://blogger.googleusercontent.com/img/b/R29vZ2xl/AVvXsEhnfSY5KVy04Hm2uSroWN2TuzylPBeQIQLpH2cRVe9MCkX8IdkYoFhNdxRTcvbCIwKUZPhp72thAXGAVNd4gtdWEfUI1YNG9KBbOFlKrWMoBhSCWRAjV2zoa818Q6lAlQMtDwA7P94MPFF9/s1600/SFTPBlackbox.gif&quot; imageanchor=&quot;1&quot; style=&quot;margin-left: 1em; margin-right: 1em;&quot;&gt;&lt;img border=&quot;0&quot; src=&quot;https://blogger.googleusercontent.com/img/b/R29vZ2xl/AVvXsEhnfSY5KVy04Hm2uSroWN2TuzylPBeQIQLpH2cRVe9MCkX8IdkYoFhNdxRTcvbCIwKUZPhp72thAXGAVNd4gtdWEfUI1YNG9KBbOFlKrWMoBhSCWRAjV2zoa818Q6lAlQMtDwA7P94MPFF9/s1600/SFTPBlackbox.gif&quot;&gt;&lt;/a&gt;&lt;/div&gt;
&lt;br&gt;
&lt;div style=&quot;background-color: white; color: #111111; font-family: &amp;#39;Helvetica Neue&amp;#39;, Helvetica, Arial, sans-serif; line-height: 21.984375px; margin-bottom: 1.571em; padding: 0px;&quot;&gt;
&lt;span style=&quot;font-size: 14px;&quot;&gt;If you want to setup an account on your system that will be used only to transfer files (and not to ssh to the system), you should setup &lt;/span&gt;&lt;span style=&quot;font-size: large;&quot;&gt;SFTP Chroot&lt;/span&gt;&lt;span style=&quot;font-size: 14px;&quot;&gt; Jail as explained in this article.&lt;/span&gt;&lt;/div&gt;
&lt;div style=&quot;background-color: white; color: #111111; font-family: &amp;#39;Helvetica Neue&amp;#39;, Helvetica, Arial, sans-serif; font-size: 14px; line-height: 21.984375px; margin-bottom: 1.571em; padding: 0px;&quot;&gt;
In a typical sftp scenario (when chroot sftp is not setup), if you use sftp, you can see root’s file as shown below.&lt;/div&gt;
&lt;div style=&quot;background-color: white; color: #111111; font-family: &amp;#39;Helvetica Neue&amp;#39;, Helvetica, Arial, sans-serif; font-size: 14px; line-height: 21.984375px; margin-bottom: 1.571em; padding: 0px;&quot;&gt;
If you want to give sftp access on your system to outside vendors to transfer files, you should not use standard sftp. Instead, you should setup Chroot SFTP Jail as explained below.&lt;/div&gt;
&lt;div style=&quot;background-color: white; color: #111111; font-family: &amp;#39;Helvetica Neue&amp;#39;, Helvetica, Arial, sans-serif; font-size: 14px; line-height: 21.984375px; margin-bottom: 1.571em; padding: 0px;&quot;&gt;
&lt;span style=&quot;font-size: 1.286em; line-height: 1.222em;&quot;&gt;&lt;u&gt;&lt;b&gt;Non-Chroot SFTP Environment&lt;/b&gt;&lt;/u&gt;&lt;/span&gt;&lt;/div&gt;
&lt;div style=&quot;background-color: white; color: #111111; font-family: &amp;#39;Helvetica Neue&amp;#39;, Helvetica, Arial, sans-serif; font-size: 14px; line-height: 21.984375px; margin-bottom: 1.571em; padding: 0px;&quot;&gt;
In the following example (a typical sftp environment), abc can sftp to the system, and view /etc folder and download the files from there.&lt;/div&gt;
&lt;pre style=&quot;background-color: #eeeeee; border: 1px solid rgb(221, 221, 221); clear: both; color: #111111; font-family: Consolas, &amp;#39;Andale Mono&amp;#39;, Monaco, Courier, &amp;#39;Courier New&amp;#39;, Verdana, sans-serif; font-size: 0.857em; line-height: 1.5em; margin-bottom: 1.833em; overflow: auto; padding: 0.667em 0.917em;&quot;&gt;# sftp abc@xcessl0gycs.com
abc@xcessl0gycs&amp;#39;s password:
sftp&amp;gt; pwd
Remote working directory: /home/abc
&lt;/pre&gt;&lt;a href=&quot;https://xcessl0gycs.blogspot.com/2013/05/how-to-setup-chroot-sftp-in-linux-allow.html#more&quot;&gt;Read more »&lt;/a&gt;</description><link>https://xcessl0gycs.blogspot.com/2013/05/how-to-setup-chroot-sftp-in-linux-allow.html</link><author>noreply@blogger.com (Unknown)</author><media:thumbnail xmlns:media="http://search.yahoo.com/mrss/" url="https://blogger.googleusercontent.com/img/b/R29vZ2xl/AVvXsEhdNx9ZFJnf3EGKIs0ea4RYgKmstn8Gf7bYZV8mBy66N4SLp-hobT1PS1esIL_9QmbIXlPeOZntQn2rlsfLPu826L0QgBmUnFmQ0NdLRTw98Z0BHDRRNPaaMTHOQY84k0WOdDmRXB9ReFPq/s72-c/sftp.png" height="72" width="72"/><thr:total>0</thr:total></item><item><guid isPermaLink="false">tag:blogger.com,1999:blog-8022626610982444035.post-4853612569435831037</guid><pubDate>Thu, 23 May 2013 10:48:00 +0000</pubDate><atom:updated>2013-05-23T16:20:38.243+05:30</atom:updated><category domain="http://www.blogger.com/atom/ns#">Information Security</category><category domain="http://www.blogger.com/atom/ns#">Internet Protocol</category><category domain="http://www.blogger.com/atom/ns#">IPv6</category><category domain="http://www.blogger.com/atom/ns#">Linux Admin</category><category domain="http://www.blogger.com/atom/ns#">Linux Articles</category><category domain="http://www.blogger.com/atom/ns#">Network Articles</category><category domain="http://www.blogger.com/atom/ns#">TCP/IP</category><title>What’s the Difference Between 127.0.0.0 and 127.0.0.1?</title><description>&lt;br&gt;
&lt;div class=&quot;separator&quot; style=&quot;clear: both; text-align: center;&quot;&gt;
&lt;a href=&quot;https://blogger.googleusercontent.com/img/b/R29vZ2xl/AVvXsEhVQTGHDHt5JJC7S4Kc1jbS9s4OAOYBHcnVLAxbaY3cS00_IZN3hhthSvRHld_JI-89t6_QSQAMxL7N7UtAr6P_6pE54BGxLJBI-dQenNc5VwQDGm4lrPMIQ_FI9uslsQvYXDE2dPOwaKU/s1600/localhost6.jpg&quot; imageanchor=&quot;1&quot; style=&quot;margin-left: 1em; margin-right: 1em;&quot;&gt;&lt;img border=&quot;0&quot; src=&quot;https://blogger.googleusercontent.com/img/b/R29vZ2xl/AVvXsEhVQTGHDHt5JJC7S4Kc1jbS9s4OAOYBHcnVLAxbaY3cS00_IZN3hhthSvRHld_JI-89t6_QSQAMxL7N7UtAr6P_6pE54BGxLJBI-dQenNc5VwQDGm4lrPMIQ_FI9uslsQvYXDE2dPOwaKU/s1600/localhost6.jpg&quot;&gt;&lt;/a&gt;&lt;/div&gt;
&lt;div style=&quot;background-color: white; color: #333333; font-family: Verdana; font-size: 14px; line-height: 17px; margin-bottom: 20px; padding: 0px;&quot;&gt;
&lt;br&gt;&lt;/div&gt;
&lt;div style=&quot;background-color: white; font-family: Verdana; line-height: 17px; margin-bottom: 20px; padding: 0px;&quot;&gt;
&lt;span style=&quot;font-size: large;&quot;&gt;&lt;span style=&quot;color: #741b47;&quot;&gt;Som&lt;/span&gt;&lt;span style=&quot;color: #351c75;&quot;&gt;e&lt;/span&gt;&lt;/span&gt;&lt;span style=&quot;color: #351c75; font-size: large;&quot;&gt;tim&lt;/span&gt;&lt;span style=&quot;color: #38761d; font-size: large;&quot;&gt;es&lt;/span&gt;&lt;span style=&quot;color: #333333;&quot;&gt; the most elementary of questions yield teachable moments; read on as we delve into how a single digit change &lt;/span&gt;&lt;span style=&quot;color: #274e13; font-size: large;&quot;&gt;between 127.0.0.0 to 127.0.0.1&lt;/span&gt;&lt;span style=&quot;color: #333333;&quot;&gt; offers a chance to look at network topology.&lt;/span&gt;&lt;/div&gt;
&lt;div style=&quot;background-color: white; color: #333333; font-family: Verdana; font-size: 14px; line-height: 17px; margin-bottom: 20px; margin-top: 20px; padding: 0px;&quot;&gt;
&lt;span style=&quot;color: #172232; font-family: arial, helvetica, clean, sans-serif; font-size: 18px;&quot;&gt;&lt;u&gt;The Question&lt;/u&gt;&lt;/span&gt;&lt;/div&gt;
&lt;div style=&quot;background-color: white; color: #333333; font-family: Verdana; font-size: 14px; line-height: 17px; margin-bottom: 20px; margin-top: 20px; padding: 0px;&quot;&gt;
&lt;b&gt;What’s the Difference Between 127.0.0.0 and 127.0.0.1?&lt;/b&gt;&lt;/div&gt;
&lt;blockquote style=&quot;background-color: #f9f9f9; border: 1px dashed rgb(47, 111, 171); clear: both; font-family: monospace; font-size: 15px; line-height: 1.1em; margin: 0px; max-width: 638px; padding: 4px 4px 4px 6px;&quot;&gt;
&lt;div style=&quot;color: #333333; font-family: Verdana; font-size: 14px; line-height: 17px; margin-bottom: 10px; padding: 0px;&quot;&gt;
I know that both are loopback IPs, but they have another ip mask.&lt;/div&gt;
&lt;div style=&quot;color: #333333; font-family: Verdana; font-size: 14px; line-height: 17px; margin-bottom: 10px; margin-top: 10px; padding: 0px;&quot;&gt;
What’s the difference between them? Can they be used interchangeably?&lt;/div&gt;
&lt;pre style=&quot;font-size: 13px; line-height: 12px; padding: 0px;&quot;&gt;&lt;code style=&quot;margin: 0px; padding: 0px;&quot;&gt;===========================================================================

IPv4 routes
===========================================================================
Active routes:
Destination               Mask          Gateway        Interface Metric
      0.0.0.0          0.0.0.0      192.168.1.1      192.168.1.6     26
[...]
    127.0.0.0        255.0.0.0         On-link         127.0.0.1    306
    127.0.0.1  255.255.255.255         On-link         127.0.0.1    306&lt;/code&gt;&lt;/pre&gt;
&lt;/blockquote&gt;
&lt;div style=&quot;background-color: white; color: #333333; font-family: Verdana; font-size: 14px; line-height: 17px; margin-bottom: 20px; margin-top: 20px; padding: 0px;&quot;&gt;
What kind of information can we tease out from this table?&lt;br&gt;
&lt;/div&gt;&lt;a href=&quot;https://xcessl0gycs.blogspot.com/2013/05/whats-difference-between-127000-and.html#more&quot;&gt;Read more »&lt;/a&gt;</description><link>https://xcessl0gycs.blogspot.com/2013/05/whats-difference-between-127000-and.html</link><author>noreply@blogger.com (Unknown)</author><media:thumbnail xmlns:media="http://search.yahoo.com/mrss/" url="https://blogger.googleusercontent.com/img/b/R29vZ2xl/AVvXsEhVQTGHDHt5JJC7S4Kc1jbS9s4OAOYBHcnVLAxbaY3cS00_IZN3hhthSvRHld_JI-89t6_QSQAMxL7N7UtAr6P_6pE54BGxLJBI-dQenNc5VwQDGm4lrPMIQ_FI9uslsQvYXDE2dPOwaKU/s72-c/localhost6.jpg" height="72" width="72"/><thr:total>0</thr:total></item><item><guid isPermaLink="false">tag:blogger.com,1999:blog-8022626610982444035.post-5978861419598665588</guid><pubDate>Tue, 14 May 2013 07:37:00 +0000</pubDate><atom:updated>2013-05-14T13:12:29.741+05:30</atom:updated><category domain="http://www.blogger.com/atom/ns#">.htaccess</category><category domain="http://www.blogger.com/atom/ns#">Coding</category><category domain="http://www.blogger.com/atom/ns#">Exploits Articles</category><category domain="http://www.blogger.com/atom/ns#">Information Security</category><category domain="http://www.blogger.com/atom/ns#">IT Security</category><category domain="http://www.blogger.com/atom/ns#">Latest Release</category><category domain="http://www.blogger.com/atom/ns#">Linux Articles</category><category domain="http://www.blogger.com/atom/ns#">Linux Security</category><category domain="http://www.blogger.com/atom/ns#">Network Security</category><category domain="http://www.blogger.com/atom/ns#">Shell Script dpkg</category><category domain="http://www.blogger.com/atom/ns#">Ubuntu 12.04 TLS</category><category domain="http://www.blogger.com/atom/ns#">Ubuntu Commands</category><category domain="http://www.blogger.com/atom/ns#">Windows Security</category><title>20+ .htaccess Hacks Every Web Developer Should Know About</title><description>&lt;div class=&quot;separator&quot; style=&quot;clear: both; text-align: center;&quot;&gt;
&lt;a href=&quot;https://blogger.googleusercontent.com/img/b/R29vZ2xl/AVvXsEgDeMI1wd6GyUKL2t3O5mQC6J2RajGP3Jfm83WWn6Xz3MrqmExRkw43aP2vRbT_oCnYcpdaBDhsf1Em1ONIJQ8-HiUmBgNxuI_Qz_cHpwkTVFRWlwjj59DcnSQA1jQxfl-5fF4pW_FaNigC/s1600/htaccess.jpg&quot; imageanchor=&quot;1&quot; style=&quot;margin-left: 1em; margin-right: 1em;&quot;&gt;&lt;img border=&quot;0&quot; src=&quot;https://blogger.googleusercontent.com/img/b/R29vZ2xl/AVvXsEgDeMI1wd6GyUKL2t3O5mQC6J2RajGP3Jfm83WWn6Xz3MrqmExRkw43aP2vRbT_oCnYcpdaBDhsf1Em1ONIJQ8-HiUmBgNxuI_Qz_cHpwkTVFRWlwjj59DcnSQA1jQxfl-5fF4pW_FaNigC/s1600/htaccess.jpg&quot;&gt;&lt;/a&gt;&lt;/div&gt;
&lt;br&gt;
&lt;div style=&quot;border: 0px; color: #444444; font-family: Verdana, Arial, sans-serif; font-size: 14px; line-height: 18px; margin-top: 10px; outline: 0px; padding: 0px; vertical-align: baseline;&quot;&gt;
Apache&amp;#39;s .htaccess(hypertext access) configuration file can be a very powerful tool in a web developer&amp;#39;s toolkit if used properly. It can be found in the webroot of your server and can be easily edited using any text editor. In this article I&amp;#39;m going to show you 20 .htaccess hacks and how to use them.&lt;/div&gt;
&lt;div style=&quot;border: 0px; color: #444444; font-family: Verdana, Arial, sans-serif; font-size: 14px; line-height: 18px; margin-top: 10px; outline: 0px; padding: 0px; vertical-align: baseline;&quot;&gt;
&lt;span id=&quot;more-289&quot; style=&quot;border: 0px; margin: 0px; outline: 0px; padding: 0px; vertical-align: baseline;&quot;&gt;&lt;/span&gt;&lt;/div&gt;
&lt;div style=&quot;border: 0px; color: #444444; font-family: Verdana, Arial, sans-serif; font-size: 14px; line-height: 18px; margin-top: 10px; outline: 0px; padding: 0px; vertical-align: baseline;&quot;&gt;
Before I start with this article I&amp;#39;d like to start by saying that abusing the .htaccess file will hurt the performance of your website. The .htaccess file should only be used if you have no other way to achieve certain things.&lt;/div&gt;
&lt;div style=&quot;border: 0px; color: #444444; font-family: Verdana, Arial, sans-serif; font-size: 14px; line-height: 18px; margin-top: 10px; outline: 0px; padding: 0px; vertical-align: baseline;&quot;&gt;
&lt;strong style=&quot;border: 0px; margin: 0px; outline: 0px; padding: 0px; vertical-align: baseline;&quot;&gt;&lt;em style=&quot;border: 0px; margin: 0px; outline: 0px; padding: 0px; vertical-align: baseline;&quot;&gt;Make sure to back up your current .htaccess file before applying any of the following hacks.&lt;/em&gt;&lt;/strong&gt;&lt;/div&gt;
&lt;h3 style=&quot;border-bottom-color: rgb(240, 135, 101); border-bottom-style: solid; border-width: 0px 0px 3px; color: #333333; font-family: &amp;#39;Myriad Pro&amp;#39;, Arial, sans-serif; font-size: 30px; font-weight: normal; line-height: 18px; margin: 50px 0px 0px; outline: 0px; padding: 0px 0px 8px; vertical-align: baseline;&quot;&gt;
1. Prevent Hotlinking&lt;/h3&gt;
&lt;div style=&quot;border: 0px; color: #444444; font-family: Verdana, Arial, sans-serif; font-size: 14px; line-height: 18px; margin-top: 10px; outline: 0px; padding: 0px; vertical-align: baseline;&quot;&gt;
Tired of people using your bandwidth by putting the images hosted on your server on their website? Add the following code at the bottom of your .htaccess file to prevent hotlinking.&lt;/div&gt;
&lt;div class=&quot;syntaxhighlighter  &quot; id=&quot;highlighter_480397&quot; style=&quot;background-color: rgb(255, 255, 255) !important; background-image: none !important; border: 0px !important; bottom: auto !important; color: #444444; float: none !important; font-family: Consolas, &amp;#39;Bitstream Vera Sans Mono&amp;#39;, &amp;#39;Courier New&amp;#39;, Courier, monospace !important; font-size: 14px; height: auto !important; left: auto !important; line-height: 1.1em !important; margin: 1em 0px !important; min-height: auto !important; outline: 0px !important; padding: 1px !important; position: relative !important; right: auto !important; top: auto !important; vertical-align: baseline !important; width: 613.796875px;&quot;&gt;
&lt;div class=&quot;lines&quot; style=&quot;background-image: none !important; border: 0px !important; bottom: auto !important; float: none !important; font-size: 1em !important; height: auto !important; left: auto !important; line-height: 1.1em !important; margin: 0px !important; min-height: auto !important; outline: 0px !important; padding: 0px !important; position: static !important; right: auto !important; top: auto !important; vertical-align: baseline !important; width: auto !important;&quot;&gt;
&lt;div class=&quot;line alt1&quot; style=&quot;background-image: none !important; border: 0px !important; bottom: auto !important; float: none !important; font-size: 1em !important; height: auto !important; left: auto !important; line-height: 1.1em !important; margin: 0px !important; min-height: auto !important; outline: 0px !important; padding: 0px !important; position: static !important; right: auto !important; top: auto !important; vertical-align: baseline !important; width: auto !important;&quot;&gt;
&lt;table style=&quot;background-image: none !important; border-collapse: collapse !important; border-spacing: 0px; border: 0px !important; bottom: auto !important; float: none !important; font-size: 1em !important; height: auto !important; left: auto !important; line-height: 1.1em !important; margin: 0px !important; min-height: auto !important; outline: 0px !important; padding: 0px !important; position: static !important; right: auto !important; top: auto !important; vertical-align: baseline !important; width: auto !important;&quot;&gt;&lt;tbody style=&quot;background-image: none !important; border: 0px !important; bottom: auto !important; float: none !important; font-size: 1em !important; height: auto !important; left: auto !important; line-height: 1.1em !important; margin: 0px !important; min-height: auto !important; outline: 0px !important; padding: 0px !important; position: static !important; right: auto !important; top: auto !important; vertical-align: baseline !important; width: auto !important;&quot;&gt;
&lt;tr style=&quot;background-image: none !important; border: 0px !important; bottom: auto !important; float: none !important; font-size: 1em !important; height: auto !important; left: auto !important; line-height: 1.1em !important; margin: 0px !important; min-height: auto !important; outline: 0px !important; padding: 0px !important; position: static !important; right: auto !important; top: auto !important; vertical-align: baseline !important; width: auto !important;&quot;&gt;&lt;td class=&quot;number&quot; style=&quot;background-image: none !important; border: 0px !important; bottom: auto !important; color: rgb(175, 175, 175) !important; float: none !important; font-size: 1em !important; height: auto !important; left: auto !important; line-height: 1.1em !important; margin: 0px !important; min-height: auto !important; outline: 0px !important; padding: 0px !important; position: static !important; right: auto !important; top: auto !important; vertical-align: top !important; width: 3em !important;&quot;&gt;&lt;code style=&quot;background-image: none !important; border: 0px !important; bottom: auto !important; display: block !important; float: none !important; font-family: Consolas, &amp;#39;Bitstream Vera Sans Mono&amp;#39;, &amp;#39;Courier New&amp;#39;, Courier, monospace !important; font-size: 1em !important; height: auto !important; left: auto !important; line-height: 1.1em !important; margin: 0px !important; min-height: auto !important; outline: 0px !important; padding: 0px 0.3em 0px 0px !important; position: static !important; right: auto !important; text-align: right !important; top: auto !important; vertical-align: baseline !important; width: 2.7em !important;&quot;&gt;1&lt;/code&gt;&lt;/td&gt;&lt;td class=&quot;content&quot; style=&quot;background-image: none !important; border-left-color: rgb(108, 226, 108) !important; border-left-style: solid !important; border-width: 0px 0px 0px 3px !important; bottom: auto !important; float: none !important; font-size: 1em !important; height: auto !important; left: auto !important; line-height: 1.1em !important; margin: 0px !important; min-height: auto !important; outline: 0px !important; padding: 0px 0px 0px 0.5em !important; position: static !important; right: auto !important; top: auto !important; vertical-align: top !important; width: auto !important;&quot;&gt;&lt;code class=&quot;plain&quot; style=&quot;background-image: none !important; border: 0px !important; bottom: auto !important; float: none !important; font-family: Consolas, &amp;#39;Bitstream Vera Sans Mono&amp;#39;, &amp;#39;Courier New&amp;#39;, Courier, monospace !important; font-size: 1em !important; height: auto !important; left: auto !important; line-height: 1.1em !important; margin: 0px !important; min-height: auto !important; outline: 0px !important; padding: 0px !important; position: static !important; right: auto !important; top: auto !important; vertical-align: baseline !important; width: auto !important;&quot;&gt;Options +FollowSymlinks&lt;/code&gt;&lt;/td&gt;&lt;/tr&gt;
&lt;/tbody&gt;&lt;/table&gt;
&lt;/div&gt;
&lt;div class=&quot;line alt2&quot; style=&quot;background-color: rgb(248, 248, 248) !important; background-image: none !important; border: 0px !important; bottom: auto !important; float: none !important; font-size: 1em !important; height: auto !important; left: auto !important; line-height: 1.1em !important; margin: 0px !important; min-height: auto !important; outline: 0px !important; padding: 0px !important; position: static !important; right: auto !important; top: auto !important; vertical-align: baseline !important; width: auto !important;&quot;&gt;
&lt;table style=&quot;background-image: none !important; border-collapse: collapse !important; border-spacing: 0px; border: 0px !important; bottom: auto !important; float: none !important; font-size: 1em !important; height: auto !important; left: auto !important; line-height: 1.1em !important; margin: 0px !important; min-height: auto !important; outline: 0px !important; padding: 0px !important; position: static !important; right: auto !important; top: auto !important; vertical-align: baseline !important; width: auto !important;&quot;&gt;&lt;tbody style=&quot;background-image: none !important; border: 0px !important; bottom: auto !important; float: none !important; font-size: 1em !important; height: auto !important; left: auto !important; line-height: 1.1em !important; margin: 0px !important; min-height: auto !important; outline: 0px !important; padding: 0px !important; position: static !important; right: auto !important; top: auto !important; vertical-align: baseline !important; width: auto !important;&quot;&gt;
&lt;tr style=&quot;background-image: none !important; border: 0px !important; bottom: auto !important; float: none !important; font-size: 1em !important; height: auto !important; left: auto !important; line-height: 1.1em !important; margin: 0px !important; min-height: auto !important; outline: 0px !important; padding: 0px !important; position: static !important; right: auto !important; top: auto !important; vertical-align: baseline !important; width: auto !important;&quot;&gt;&lt;td class=&quot;number&quot; style=&quot;background-image: none !important; border: 0px !important; bottom: auto !important; color: rgb(175, 175, 175) !important; float: none !important; font-size: 1em !important; height: auto !important; left: auto !important; line-height: 1.1em !important; margin: 0px !important; min-height: auto !important; outline: 0px !important; padding: 0px !important; position: static !important; right: auto !important; top: auto !important; vertical-align: top !important; width: 3em !important;&quot;&gt;&lt;code style=&quot;background-image: none !important; border: 0px !important; bottom: auto !important; display: block !important; float: none !important; font-family: Consolas, &amp;#39;Bitstream Vera Sans Mono&amp;#39;, &amp;#39;Courier New&amp;#39;, Courier, monospace !important; font-size: 1em !important; height: auto !important; left: auto !important; line-height: 1.1em !important; margin: 0px !important; min-height: auto !important; outline: 0px !important; padding: 0px 0.3em 0px 0px !important; position: static !important; right: auto !important; text-align: right !important; top: auto !important; vertical-align: baseline !important; width: 2.7em !important;&quot;&gt;2&lt;/code&gt;&lt;/td&gt;&lt;td class=&quot;content&quot; style=&quot;background-image: none !important; border-left-color: rgb(108, 226, 108) !important; border-left-style: solid !important; border-width: 0px 0px 0px 3px !important; bottom: auto !important; float: none !important; font-size: 1em !important; height: auto !important; left: auto !important; line-height: 1.1em !important; margin: 0px !important; min-height: auto !important; outline: 0px !important; padding: 0px 0px 0px 0.5em !important; position: static !important; right: auto !important; top: auto !important; vertical-align: top !important; width: auto !important;&quot;&gt;&lt;code class=&quot;plain&quot; style=&quot;background-image: none !important; border: 0px !important; bottom: auto !important; float: none !important; font-family: Consolas, &amp;#39;Bitstream Vera Sans Mono&amp;#39;, &amp;#39;Courier New&amp;#39;, Courier, monospace !important; font-size: 1em !important; height: auto !important; left: auto !important; line-height: 1.1em !important; margin: 0px !important; min-height: auto !important; outline: 0px !important; padding: 0px !important; position: static !important; right: auto !important; top: auto !important; vertical-align: baseline !important; width: auto !important;&quot;&gt;#Protect against hotlinking&lt;/code&gt;&lt;/td&gt;&lt;/tr&gt;
&lt;/tbody&gt;&lt;/table&gt;
&lt;/div&gt;
&lt;div class=&quot;line alt1&quot; style=&quot;background-image: none !important; border: 0px !important; bottom: auto !important; float: none !important; font-size: 1em !important; height: auto !important; left: auto !important; line-height: 1.1em !important; margin: 0px !important; min-height: auto !important; outline: 0px !important; padding: 0px !important; position: static !important; right: auto !important; top: auto !important; vertical-align: baseline !important; width: auto !important;&quot;&gt;
&lt;table style=&quot;background-image: none !important; border-collapse: collapse !important; border-spacing: 0px; border: 0px !important; bottom: auto !important; float: none !important; font-size: 1em !important; height: auto !important; left: auto !important; line-height: 1.1em !important; margin: 0px !important; min-height: auto !important; outline: 0px !important; padding: 0px !important; position: static !important; right: auto !important; top: auto !important; vertical-align: baseline !important; width: auto !important;&quot;&gt;&lt;tbody style=&quot;background-image: none !important; border: 0px !important; bottom: auto !important; float: none !important; font-size: 1em !important; height: auto !important; left: auto !important; line-height: 1.1em !important; margin: 0px !important; min-height: auto !important; outline: 0px !important; padding: 0px !important; position: static !important; right: auto !important; top: auto !important; vertical-align: baseline !important; width: auto !important;&quot;&gt;
&lt;tr style=&quot;background-image: none !important; border: 0px !important; bottom: auto !important; float: none !important; font-size: 1em !important; height: auto !important; left: auto !important; line-height: 1.1em !important; margin: 0px !important; min-height: auto !important; outline: 0px !important; padding: 0px !important; position: static !important; right: auto !important; top: auto !important; vertical-align: baseline !important; width: auto !important;&quot;&gt;&lt;td class=&quot;number&quot; style=&quot;background-image: none !important; border: 0px !important; bottom: auto !important; color: rgb(175, 175, 175) !important; float: none !important; font-size: 1em !important; height: auto !important; left: auto !important; line-height: 1.1em !important; margin: 0px !important; min-height: auto !important; outline: 0px !important; padding: 0px !important; position: static !important; right: auto !important; top: auto !important; vertical-align: top !important; width: 3em !important;&quot;&gt;&lt;code style=&quot;background-image: none !important; border: 0px !important; bottom: auto !important; display: block !important; float: none !important; font-family: Consolas, &amp;#39;Bitstream Vera Sans Mono&amp;#39;, &amp;#39;Courier New&amp;#39;, Courier, monospace !important; font-size: 1em !important; height: auto !important; left: auto !important; line-height: 1.1em !important; margin: 0px !important; min-height: auto !important; outline: 0px !important; padding: 0px 0.3em 0px 0px !important; position: static !important; right: auto !important; text-align: right !important; top: auto !important; vertical-align: baseline !important; width: 2.7em !important;&quot;&gt;3&lt;/code&gt;&lt;/td&gt;&lt;td class=&quot;content&quot; style=&quot;background-image: none !important; border-left-color: rgb(108, 226, 108) !important; border-left-style: solid !important; border-width: 0px 0px 0px 3px !important; bottom: auto !important; float: none !important; font-size: 1em !important; height: auto !important; left: auto !important; line-height: 1.1em !important; margin: 0px !important; min-height: auto !important; outline: 0px !important; padding: 0px 0px 0px 0.5em !important; position: static !important; right: auto !important; top: auto !important; vertical-align: top !important; width: auto !important;&quot;&gt;&lt;code class=&quot;plain&quot; style=&quot;background-image: none !important; border: 0px !important; bottom: auto !important; float: none !important; font-family: Consolas, &amp;#39;Bitstream Vera Sans Mono&amp;#39;, &amp;#39;Courier New&amp;#39;, Courier, monospace !important; font-size: 1em !important; height: auto !important; left: auto !important; line-height: 1.1em !important; margin: 0px !important; min-height: auto !important; outline: 0px !important; padding: 0px !important; position: static !important; right: auto !important; top: auto !important; vertical-align: baseline !important; width: auto !important;&quot;&gt;RewriteEngine On&lt;/code&gt;&lt;/td&gt;&lt;/tr&gt;
&lt;/tbody&gt;&lt;/table&gt;
&lt;/div&gt;
&lt;div class=&quot;line alt2&quot; style=&quot;background-color: rgb(248, 248, 248) !important; background-image: none !important; border: 0px !important; bottom: auto !important; float: none !important; font-size: 1em !important; height: auto !important; left: auto !important; line-height: 1.1em !important; margin: 0px !important; min-height: auto !important; outline: 0px !important; padding: 0px !important; position: static !important; right: auto !important; top: auto !important; vertical-align: baseline !important; width: auto !important;&quot;&gt;
&lt;table style=&quot;background-image: none !important; border-collapse: collapse !important; border-spacing: 0px; border: 0px !important; bottom: auto !important; float: none !important; font-size: 1em !important; height: auto !important; left: auto !important; line-height: 1.1em !important; margin: 0px !important; min-height: auto !important; outline: 0px !important; padding: 0px !important; position: static !important; right: auto !important; top: auto !important; vertical-align: baseline !important; width: auto !important;&quot;&gt;&lt;tbody style=&quot;background-image: none !important; border: 0px !important; bottom: auto !important; float: none !important; font-size: 1em !important; height: auto !important; left: auto !important; line-height: 1.1em !important; margin: 0px !important; min-height: auto !important; outline: 0px !important; padding: 0px !important; position: static !important; right: auto !important; top: auto !important; vertical-align: baseline !important; width: auto !important;&quot;&gt;
&lt;tr style=&quot;background-image: none !important; border: 0px !important; bottom: auto !important; float: none !important; font-size: 1em !important; height: auto !important; left: auto !important; line-height: 1.1em !important; margin: 0px !important; min-height: auto !important; outline: 0px !important; padding: 0px !important; position: static !important; right: auto !important; top: auto !important; vertical-align: baseline !important; width: auto !important;&quot;&gt;&lt;td class=&quot;number&quot; style=&quot;background-image: none !important; border: 0px !important; bottom: auto !important; color: rgb(175, 175, 175) !important; float: none !important; font-size: 1em !important; height: auto !important; left: auto !important; line-height: 1.1em !important; margin: 0px !important; min-height: auto !important; outline: 0px !important; padding: 0px !important; position: static !important; right: auto !important; top: auto !important; vertical-align: top !important; width: 3em !important;&quot;&gt;&lt;code style=&quot;background-image: none !important; border: 0px !important; bottom: auto !important; display: block !important; float: none !important; font-family: Consolas, &amp;#39;Bitstream Vera Sans Mono&amp;#39;, &amp;#39;Courier New&amp;#39;, Courier, monospace !important; font-size: 1em !important; height: auto !important; left: auto !important; line-height: 1.1em !important; margin: 0px !important; min-height: auto !important; outline: 0px !important; padding: 0px 0.3em 0px 0px !important; position: static !important; right: auto !important; text-align: right !important; top: auto !important; vertical-align: baseline !important; width: 2.7em !important;&quot;&gt;4&lt;/code&gt;&lt;/td&gt;&lt;td class=&quot;content&quot; style=&quot;background-image: none !important; border-left-color: rgb(108, 226, 108) !important; border-left-style: solid !important; border-width: 0px 0px 0px 3px !important; bottom: auto !important; float: none !important; font-size: 1em !important; height: auto !important; left: auto !important; line-height: 1.1em !important; margin: 0px !important; min-height: auto !important; outline: 0px !important; padding: 0px 0px 0px 0.5em !important; position: static !important; right: auto !important; top: auto !important; vertical-align: top !important; width: auto !important;&quot;&gt;&lt;code class=&quot;plain&quot; style=&quot;background-image: none !important; border: 0px !important; bottom: auto !important; float: none !important; font-family: Consolas, &amp;#39;Bitstream Vera Sans Mono&amp;#39;, &amp;#39;Courier New&amp;#39;, Courier, monospace !important; font-size: 1em !important; height: auto !important; left: auto !important; line-height: 1.1em !important; margin: 0px !important; min-height: auto !important; outline: 0px !important; padding: 0px !important; position: static !important; right: auto !important; top: auto !important; vertical-align: baseline !important; width: auto !important;&quot;&gt;RewriteCond %{HTTP_REFERER} !^$&lt;/code&gt;&lt;/td&gt;&lt;/tr&gt;
&lt;/tbody&gt;&lt;/table&gt;
&lt;/div&gt;
&lt;div class=&quot;line alt1&quot; style=&quot;background-image: none !important; border: 0px !important; bottom: auto !important; float: none !important; font-size: 1em !important; height: auto !important; left: auto !important; line-height: 1.1em !important; margin: 0px !important; min-height: auto !important; outline: 0px !important; padding: 0px !important; position: static !important; right: auto !important; top: auto !important; vertical-align: baseline !important; width: auto !important;&quot;&gt;
&lt;table style=&quot;background-image: none !important; border-collapse: collapse !important; border-spacing: 0px; border: 0px !important; bottom: auto !important; float: none !important; font-size: 1em !important; height: auto !important; left: auto !important; line-height: 1.1em !important; margin: 0px !important; min-height: auto !important; outline: 0px !important; padding: 0px !important; position: static !important; right: auto !important; top: auto !important; vertical-align: baseline !important; width: auto !important;&quot;&gt;&lt;tbody style=&quot;background-image: none !important; border: 0px !important; bottom: auto !important; float: none !important; font-size: 1em !important; height: auto !important; left: auto !important; line-height: 1.1em !important; margin: 0px !important; min-height: auto !important; outline: 0px !important; padding: 0px !important; position: static !important; right: auto !important; top: auto !important; vertical-align: baseline !important; width: auto !important;&quot;&gt;
&lt;tr style=&quot;background-image: none !important; border: 0px !important; bottom: auto !important; float: none !important; font-size: 1em !important; height: auto !important; left: auto !important; line-height: 1.1em !important; margin: 0px !important; min-height: auto !important; outline: 0px !important; padding: 0px !important; position: static !important; right: auto !important; top: auto !important; vertical-align: baseline !important; width: auto !important;&quot;&gt;&lt;td class=&quot;number&quot; style=&quot;background-image: none !important; border: 0px !important; bottom: auto !important; color: rgb(175, 175, 175) !important; float: none !important; font-size: 1em !important; height: auto !important; left: auto !important; line-height: 1.1em !important; margin: 0px !important; min-height: auto !important; outline: 0px !important; padding: 0px !important; position: static !important; right: auto !important; top: auto !important; vertical-align: top !important; width: 3em !important;&quot;&gt;&lt;code style=&quot;background-image: none !important; border: 0px !important; bottom: auto !important; display: block !important; float: none !important; font-family: Consolas, &amp;#39;Bitstream Vera Sans Mono&amp;#39;, &amp;#39;Courier New&amp;#39;, Courier, monospace !important; font-size: 1em !important; height: auto !important; left: auto !important; line-height: 1.1em !important; margin: 0px !important; min-height: auto !important; outline: 0px !important; padding: 0px 0.3em 0px 0px !important; position: static !important; right: auto !important; text-align: right !important; top: auto !important; vertical-align: baseline !important; width: 2.7em !important;&quot;&gt;5&lt;/code&gt;&lt;/td&gt;&lt;td class=&quot;content&quot; style=&quot;background-image: none !important; border-left-color: rgb(108, 226, 108) !important; border-left-style: solid !important; border-width: 0px 0px 0px 3px !important; bottom: auto !important; float: none !important; font-size: 1em !important; height: auto !important; left: auto !important; line-height: 1.1em !important; margin: 0px !important; min-height: auto !important; outline: 0px !important; padding: 0px 0px 0px 0.5em !important; position: static !important; right: auto !important; top: auto !important; vertical-align: top !important; width: auto !important;&quot;&gt;&lt;code class=&quot;plain&quot; style=&quot;background-image: none !important; border: 0px !important; bottom: auto !important; float: none !important; font-family: Consolas, &amp;#39;Bitstream Vera Sans Mono&amp;#39;, &amp;#39;Courier New&amp;#39;, Courier, monospace !important; font-size: 1em !important; height: auto !important; left: auto !important; line-height: 1.1em !important; margin: 0px !important; min-height: auto !important; outline: 0px !important; padding: 0px !important; position: static !important; right: auto !important; top: auto !important; vertical-align: baseline !important; width: auto !important;&quot;&gt;RewriteCond %{HTTP_REFERER} !^http://(www.)?domainname.com/ [nc]&lt;/code&gt;&lt;/td&gt;&lt;/tr&gt;
&lt;/tbody&gt;&lt;/table&gt;
&lt;/div&gt;
&lt;div class=&quot;line alt2&quot; style=&quot;background-color: rgb(248, 248, 248) !important; background-image: none !important; border: 0px !important; bottom: auto !important; float: none !important; font-size: 1em !important; height: auto !important; left: auto !important; line-height: 1.1em !important; margin: 0px !important; min-height: auto !important; outline: 0px !important; padding: 0px !important; position: static !important; right: auto !important; top: auto !important; vertical-align: baseline !important; width: auto !important;&quot;&gt;
&lt;table style=&quot;background-image: none !important; border-collapse: collapse !important; border-spacing: 0px; border: 0px !important; bottom: auto !important; float: none !important; font-size: 1em !important; height: auto !important; left: auto !important; line-height: 1.1em !important; margin: 0px !important; min-height: auto !important; outline: 0px !important; padding: 0px !important; position: static !important; right: auto !important; top: auto !important; vertical-align: baseline !important; width: auto !important;&quot;&gt;&lt;tbody style=&quot;background-image: none !important; border: 0px !important; bottom: auto !important; float: none !important; font-size: 1em !important; height: auto !important; left: auto !important; line-height: 1.1em !important; margin: 0px !important; min-height: auto !important; outline: 0px !important; padding: 0px !important; position: static !important; right: auto !important; top: auto !important; vertical-align: baseline !important; width: auto !important;&quot;&gt;
&lt;tr style=&quot;background-image: none !important; border: 0px !important; bottom: auto !important; float: none !important; font-size: 1em !important; height: auto !important; left: auto !important; line-height: 1.1em !important; margin: 0px !important; min-height: auto !important; outline: 0px !important; padding: 0px !important; position: static !important; right: auto !important; top: auto !important; vertical-align: baseline !important; width: auto !important;&quot;&gt;&lt;td class=&quot;number&quot; style=&quot;background-image: none !important; border: 0px !important; bottom: auto !important; color: rgb(175, 175, 175) !important; float: none !important; font-size: 1em !important; height: auto !important; left: auto !important; line-height: 1.1em !important; margin: 0px !important; min-height: auto !important; outline: 0px !important; padding: 0px !important; position: static !important; right: auto !important; top: auto !important; vertical-align: top !important; width: 3em !important;&quot;&gt;&lt;code style=&quot;background-image: none !important; border: 0px !important; bottom: auto !important; display: block !important; float: none !important; font-family: Consolas, &amp;#39;Bitstream Vera Sans Mono&amp;#39;, &amp;#39;Courier New&amp;#39;, Courier, monospace !important; font-size: 1em !important; height: auto !important; left: auto !important; line-height: 1.1em !important; margin: 0px !important; min-height: auto !important; outline: 0px !important; padding: 0px 0.3em 0px 0px !important; position: static !important; right: auto !important; text-align: right !important; top: auto !important; vertical-align: baseline !important; width: 2.7em !important;&quot;&gt;6&lt;/code&gt;&lt;/td&gt;&lt;td class=&quot;content&quot; style=&quot;background-image: none !important; border-left-color: rgb(108, 226, 108) !important; border-left-style: solid !important; border-width: 0px 0px 0px 3px !important; bottom: auto !important; float: none !important; font-size: 1em !important; height: auto !important; left: auto !important; line-height: 1.1em !important; margin: 0px !important; min-height: auto !important; outline: 0px !important; padding: 0px 0px 0px 0.5em !important; position: static !important; right: auto !important; top: auto !important; vertical-align: top !important; width: auto !important;&quot;&gt;&lt;code class=&quot;plain&quot; style=&quot;background-image: none !important; border: 0px !important; bottom: auto !important; float: none !important; font-family: Consolas, &amp;#39;Bitstream Vera Sans Mono&amp;#39;, &amp;#39;Courier New&amp;#39;, Courier, monospace !important; font-size: 1em !important; height: auto !important; left: auto !important; line-height: 1.1em !important; margin: 0px !important; min-height: auto !important; outline: 0px !important; padding: 0px !important; position: static !important; right: auto !important; top: auto !important; vertical-align: baseline !important; width: auto !important;&quot;&gt;RewriteRule .*.(gif|jpg|png)$&lt;a href=&quot;http://domainname.com/img/stop_stealing_bandwidth.gif&quot; style=&quot;background-color: transparent; border: 0px; color: rgb(0, 0, 0) !important; margin: 0px; outline: 0px; padding: 0px; text-decoration: none; vertical-align: baseline;&quot;&gt;http://domainname.com/img/stop_stealing_bandwidth.gif&lt;/a&gt;[nc]&lt;/code&gt;&lt;/td&gt;&lt;/tr&gt;
&lt;/tbody&gt;&lt;/table&gt;
&lt;/div&gt;
&lt;/div&gt;
&lt;/div&gt;
&lt;div style=&quot;border: 0px; color: #444444; font-family: Verdana, Arial, sans-serif; font-size: 14px; line-height: 18px; margin-top: 10px; outline: 0px; padding: 0px; vertical-align: baseline;&quot;&gt;
&lt;strong style=&quot;border: 0px; margin: 0px; outline: 0px; padding: 0px; vertical-align: baseline;&quot;&gt;NOTE:&lt;/strong&gt; The following article explains better methods to &amp;quot;prevent&amp;quot; hotlinking:&lt;br&gt;
&lt;a href=&quot;http://www.polepositionmarketing.com/seo-sem/link-building-secrets/maurizio-petrone.php&quot; style=&quot;border: 0px; color: #4e7e92; margin: 0px; outline: 0px; padding: 0px; text-decoration: none; vertical-align: baseline;&quot;&gt;Link building secrets by Maurizio Petrone&lt;/a&gt;&lt;br&gt;
&lt;/div&gt;&lt;a href=&quot;https://xcessl0gycs.blogspot.com/2013/05/20-htaccess-hacks-every-web-developer.html#more&quot;&gt;Read more »&lt;/a&gt;</description><link>https://xcessl0gycs.blogspot.com/2013/05/20-htaccess-hacks-every-web-developer.html</link><author>noreply@blogger.com (Unknown)</author><media:thumbnail xmlns:media="http://search.yahoo.com/mrss/" url="https://blogger.googleusercontent.com/img/b/R29vZ2xl/AVvXsEgDeMI1wd6GyUKL2t3O5mQC6J2RajGP3Jfm83WWn6Xz3MrqmExRkw43aP2vRbT_oCnYcpdaBDhsf1Em1ONIJQ8-HiUmBgNxuI_Qz_cHpwkTVFRWlwjj59DcnSQA1jQxfl-5fF4pW_FaNigC/s72-c/htaccess.jpg" height="72" width="72"/><thr:total>0</thr:total></item><item><guid isPermaLink="false">tag:blogger.com,1999:blog-8022626610982444035.post-2877204739756799908</guid><pubDate>Mon, 06 May 2013 07:58:00 +0000</pubDate><atom:updated>2022-10-22T00:12:43.698+05:30</atom:updated><category domain="http://www.blogger.com/atom/ns#">Dpkg</category><category domain="http://www.blogger.com/atom/ns#">dpkg-query</category><category domain="http://www.blogger.com/atom/ns#">IT Security</category><category domain="http://www.blogger.com/atom/ns#">Linux Admin</category><category domain="http://www.blogger.com/atom/ns#">Linux Articles</category><category domain="http://www.blogger.com/atom/ns#">Ubuntu</category><category domain="http://www.blogger.com/atom/ns#">Ubuntu 12.04 TLS</category><category domain="http://www.blogger.com/atom/ns#">Ubuntu Commands</category><title>How to check what we have Installed in Debuian/Ubuntu OS</title><description>&lt;br&gt;
&lt;div style=&quot;background-color: white; font-family: Arial, Helvetica, sans-serif; font-size: 13px; line-height: 16px; padding: 10px 15px;&quot;&gt;
To check what have install by listing all using dpkg is easy.&lt;/div&gt;
&lt;pre style=&quot;background-color: black; border: 1px dashed rgb(170, 170, 170); color: white; font-family: &amp;#39;courier new&amp;#39;, courier, monospace; font-size: 13px; overflow: auto; padding: 1em; width: 600px;&quot;&gt;&lt;code style=&quot;font-family: &amp;#39;courier new&amp;#39;, courier, monospace; margin: 0px; padding: 0px;&quot;&gt;dpkg -l&lt;/code&gt;&lt;/pre&gt;
&lt;div style=&quot;background-color: white; font-family: Arial, Helvetica, sans-serif; font-size: 13px; line-height: 16px; padding: 10px 15px;&quot;&gt;
To check whether a package is install also easy.&lt;/div&gt;
&lt;pre style=&quot;background-color: black; border: 1px dashed rgb(170, 170, 170); color: white; font-family: &amp;#39;courier new&amp;#39;, courier, monospace; font-size: 13px; overflow: auto; padding: 1em; width: 600px;&quot;&gt;&lt;code style=&quot;font-family: &amp;#39;courier new&amp;#39;, courier, monospace; margin: 0px; padding: 0px;&quot;&gt;dpkg -l | grep apache&lt;/code&gt;&lt;/pre&gt;
&lt;div style=&quot;background-color: white; font-family: Arial, Helvetica, sans-serif; font-size: 13px; line-height: 16px; padding: 10px 15px;&quot;&gt;
The command above is some how redundant, because dpkg support wild characters, doing this instead&lt;/div&gt;
&lt;pre style=&quot;background-color: black; border: 1px dashed rgb(170, 170, 170); color: white; font-family: &amp;#39;courier new&amp;#39;, courier, monospace; font-size: 13px; overflow: auto; padding: 1em; width: 600px;&quot;&gt;&lt;code style=&quot;font-family: &amp;#39;courier new&amp;#39;, courier, monospace; margin: 0px; padding: 0px;&quot;&gt;dpkg -l &amp;quot;apache*&amp;quot;&lt;/code&gt;&lt;/pre&gt;
&lt;div style=&quot;background-color: white; font-family: Arial, Helvetica, sans-serif; font-size: 13px; line-height: 16px; padding: 10px 15px;&quot;&gt;
By doing this, it will also list the package that not install but available in &lt;b&gt;dpkg cache&lt;/b&gt;, to install them you can simply &lt;b&gt;apt-get&lt;/b&gt;. To indicate the packages installed it shows “&lt;b&gt;ii&lt;/b&gt;” and not install shows “&lt;b&gt;un&lt;/b&gt;”.&lt;br&gt;
&lt;/div&gt;&lt;a href=&quot;https://xcessl0gycs.blogspot.com/2013/05/how-to-check-what-have-installed-in.html#more&quot;&gt;Read more »&lt;/a&gt;</description><link>https://xcessl0gycs.blogspot.com/2013/05/how-to-check-what-have-installed-in.html</link><author>noreply@blogger.com (Unknown)</author><thr:total>0</thr:total></item><item><guid isPermaLink="false">tag:blogger.com,1999:blog-8022626610982444035.post-3944147027477331967</guid><pubDate>Mon, 06 May 2013 07:46:00 +0000</pubDate><atom:updated>2013-05-06T13:17:37.773+05:30</atom:updated><category domain="http://www.blogger.com/atom/ns#">Bash Script</category><category domain="http://www.blogger.com/atom/ns#">Cool Tricks</category><category domain="http://www.blogger.com/atom/ns#">Dpkg</category><category domain="http://www.blogger.com/atom/ns#">Linux Articles</category><category domain="http://www.blogger.com/atom/ns#">Shell Script dpkg</category><category domain="http://www.blogger.com/atom/ns#">Ubuntu</category><category domain="http://www.blogger.com/atom/ns#">Ubuntu 12.04 TLS</category><title>Shell Script File for Checking Package Installed or not Or If not then Install Package  - For Ubuntu OS</title><description>&lt;b&gt;&lt;span style=&quot;font-family: Trebuchet MS, sans-serif; font-size: large;&quot;&gt;&lt;u&gt;Dpkg: check that unix package is installed. Bash script: install package if not present&lt;/u&gt;&lt;/span&gt;&lt;/b&gt;&lt;br /&gt;
&lt;br /&gt;
&lt;div class=&quot;content line&quot; id=&quot;wiki&quot; style=&quot;background-color: white; border-bottom-color: rgb(225, 243, 245); border-bottom-style: solid; border-bottom-width: 2px; border-top-color: rgb(225, 243, 245); border-top-style: solid; border-top-width: 2px; font-family: &#39;Trebuchet MS&#39;, Verdana, Helvetica, Arial, sans-serif; font-size: 14px; margin: 10px 0px 10px 10px; padding: 10px;&quot;&gt;
&lt;div style=&quot;line-height: 1.5em; margin-bottom: 1em; padding: 0px 0px 5px;&quot;&gt;
&lt;span class=&quot;codeblock&quot; style=&quot;color: #2a00e1; font-family: Courier, monospace; margin: 0px; padding: 0px;&quot;&gt;dpkg -s&lt;/span&gt;&amp;nbsp;can be used.&lt;/div&gt;
&lt;div style=&quot;line-height: 1.5em; margin-bottom: 1em; padding: 0px 0px 5px;&quot;&gt;
Example: is&amp;nbsp;&lt;span class=&quot;codeblock&quot; style=&quot;color: #2a00e1; font-family: Courier, monospace; margin: 0px; padding: 0px;&quot;&gt;vlc&lt;/span&gt;&amp;nbsp;installed?&lt;/div&gt;
&lt;div class=&quot;wp_syntax&quot; style=&quot;background-color: #f9f9f9; border: 1px solid silver; color: #110000; margin: 10px; overflow-x: auto; overflow-y: hidden; padding: 0px; width: 600px;&quot;&gt;
&lt;div class=&quot;code&quot; style=&quot;border-color: rgb(122, 112, 101) rgb(46, 39, 31) rgb(46, 39, 31) rgb(122, 112, 101); border-style: solid; border-width: 1px; margin: 10px; padding: 0px; vertical-align: top;&quot;&gt;
&lt;pre class=&quot;bash&quot; style=&quot;background-color: black; border-color: rgb(233, 228, 223) rgb(0, 123, 127) rgb(0, 123, 127); border-style: solid dotted dotted; border-width: 16px 1px 1px; clear: none; color: grey; float: none; font-size: 12px; line-height: 1.333; overflow: visible; padding: 3px; white-space: pre-wrap !important; width: auto !important; word-wrap: break-word;&quot;&gt;&lt;span style=&quot;color: #aaaaaa; font-weight: bold; margin: 0px; padding: 0px;&quot;&gt;&amp;gt;&lt;/span&gt; &lt;span style=&quot;color: #c20cb9; font-weight: bold; margin: 0px; padding: 0px;&quot;&gt;dpkg&lt;/span&gt; &lt;span style=&quot;color: #660033; margin: 0px; padding: 0px;&quot;&gt;-s&lt;/span&gt; vlc&lt;span style=&quot;color: #aaaaaa; font-weight: bold; margin: 0px; padding: 0px;&quot;&gt;|&lt;/span&gt;&lt;span style=&quot;color: #c20cb9; font-weight: bold; margin: 0px; padding: 0px;&quot;&gt;grep&lt;/span&gt; installed&lt;/pre&gt;
&lt;/div&gt;
&lt;/div&gt;
&lt;div style=&quot;line-height: 1.5em; margin-bottom: 1em; padding: 0px 0px 5px;&quot;&gt;
&lt;span style=&quot;line-height: 1.5em;&quot;&gt;Here is some logic in bash script, like installing package if it is not there:&lt;/span&gt;&lt;/div&gt;
&lt;div class=&quot;wp_syntax&quot; style=&quot;background-color: #f9f9f9; border: 1px solid silver; color: #110000; margin: 10px; overflow-x: auto; overflow-y: hidden; padding: 0px; width: 600px;&quot;&gt;
&lt;table style=&quot;border-collapse: collapse; font-size: 14px; margin: 0px; padding: 0px; width: auto;&quot;&gt;&lt;tbody style=&quot;margin: 0px; padding: 0px;&quot;&gt;
&lt;tr style=&quot;margin: 0px; padding: 0px;&quot;&gt;&lt;td class=&quot;line_numbers&quot; style=&quot;background-color: #ddeeff; color: grey; margin: 0px; overflow: visible; padding: 2px 5px; text-align: right; vertical-align: top;&quot;&gt;&lt;pre style=&quot;border-color: rgb(233, 228, 223) rgb(0, 123, 127) rgb(0, 123, 127); border-style: solid dotted dotted; border-width: 16px 1px 1px; clear: none; float: none; font-size: 12px; line-height: 1.333; overflow: visible; padding: 3px; white-space: pre-wrap !important; width: auto !important; word-wrap: break-word;&quot;&gt;1
2
3
4
5
6
&lt;/pre&gt;
&lt;/td&gt;&lt;td class=&quot;code&quot; style=&quot;margin: 0px; padding: 2px 5px; vertical-align: top; width: 745px;&quot;&gt;&lt;pre class=&quot;bash&quot; style=&quot;background-color: black; border-color: rgb(233, 228, 223) rgb(0, 123, 127) rgb(0, 123, 127); border-style: solid dotted dotted; border-width: 16px 1px 1px; clear: none; color: grey; float: none; font-size: 12px; line-height: 1.333; overflow: visible; padding: 3px; white-space: pre-wrap !important; width: auto !important; word-wrap: break-word;&quot;&gt;&lt;span style=&quot;color: #007800; margin: 0px; padding: 0px;&quot;&gt;problem&lt;/span&gt;=$&lt;span style=&quot;color: #7a0874; font-weight: bold; margin: 0px; padding: 0px;&quot;&gt;(&lt;/span&gt;&lt;span style=&quot;color: #c20cb9; font-weight: bold; margin: 0px; padding: 0px;&quot;&gt;dpkg&lt;/span&gt; &lt;span style=&quot;color: #660033; margin: 0px; padding: 0px;&quot;&gt;-s&lt;/span&gt; vlc&lt;span style=&quot;color: #aaaaaa; font-weight: bold; margin: 0px; padding: 0px;&quot;&gt;|&lt;/span&gt;&lt;span style=&quot;color: #c20cb9; font-weight: bold; margin: 0px; padding: 0px;&quot;&gt;grep&lt;/span&gt; installed&lt;span style=&quot;color: #7a0874; font-weight: bold; margin: 0px; padding: 0px;&quot;&gt;)&lt;/span&gt;
 &lt;span style=&quot;color: #7a0874; font-weight: bold; margin: 0px; padding: 0px;&quot;&gt;echo&lt;/span&gt; Checking &lt;span style=&quot;color: #aaaaaa; font-weight: bold; margin: 0px; padding: 0px;&quot;&gt;for&lt;/span&gt; libxul: &lt;span style=&quot;color: #007800; margin: 0px; padding: 0px;&quot;&gt;$problem&lt;/span&gt;
 &lt;span style=&quot;color: #aaaaaa; font-weight: bold; margin: 0px; padding: 0px;&quot;&gt;if&lt;/span&gt; &lt;span style=&quot;color: #7a0874; font-weight: bold; margin: 0px; padding: 0px;&quot;&gt;[&lt;/span&gt; &lt;span style=&quot;color: red; margin: 0px; padding: 0px;&quot;&gt;&quot;&quot;&lt;/span&gt; == &lt;span style=&quot;color: red; margin: 0px; padding: 0px;&quot;&gt;&quot;&lt;span style=&quot;color: #007800; margin: 0px; padding: 0px;&quot;&gt;$problem&lt;/span&gt;&quot;&lt;/span&gt; &lt;span style=&quot;color: #7a0874; font-weight: bold; margin: 0px; padding: 0px;&quot;&gt;]&lt;/span&gt;; &lt;span style=&quot;color: #aaaaaa; font-weight: bold; margin: 0px; padding: 0px;&quot;&gt;then&lt;/span&gt;
      &lt;span style=&quot;color: #7a0874; font-weight: bold; margin: 0px; padding: 0px;&quot;&gt;echo&lt;/span&gt; &lt;span style=&quot;color: red; margin: 0px; padding: 0px;&quot;&gt;&quot;No libxul. Setting up libxul&quot;&lt;/span&gt;
      &lt;span style=&quot;color: #c20cb9; font-weight: bold; margin: 0px; padding: 0px;&quot;&gt;sudo&lt;/span&gt; &lt;span style=&quot;color: #c20cb9; font-weight: bold; margin: 0px; padding: 0px;&quot;&gt;apt-get&lt;/span&gt; &lt;span style=&quot;color: #660033; margin: 0px; padding: 0px;&quot;&gt;--force-yes&lt;/span&gt; &lt;span style=&quot;color: #660033; margin: 0px; padding: 0px;&quot;&gt;--yes&lt;/span&gt; &lt;span style=&quot;color: #c20cb9; font-weight: bold; margin: 0px; padding: 0px;&quot;&gt;install&lt;/span&gt; vlc
 &lt;span style=&quot;color: #aaaaaa; font-weight: bold; margin: 0px; padding: 0px;&quot;&gt;fi&lt;/span&gt;&lt;/pre&gt;
&lt;/td&gt;&lt;/tr&gt;
&lt;/tbody&gt;&lt;/table&gt;
&lt;/div&gt;
&lt;/div&gt;
&lt;div class=&quot;clearboth&quot; style=&quot;background-color: white; clear: none; font-family: &#39;Trebuchet MS&#39;, Verdana, Helvetica, Arial, sans-serif; font-size: 14px; margin: 10px; padding: 0px;&quot;&gt;
&lt;/div&gt;
</description><link>https://xcessl0gycs.blogspot.com/2013/05/shell-script-file-for-checking-package.html</link><author>noreply@blogger.com (Unknown)</author><thr:total>0</thr:total></item><item><guid isPermaLink="false">tag:blogger.com,1999:blog-8022626610982444035.post-828289787065829453</guid><pubDate>Thu, 11 Apr 2013 08:21:00 +0000</pubDate><atom:updated>2013-04-26T10:55:40.585+05:30</atom:updated><category domain="http://www.blogger.com/atom/ns#">Cool Tricks</category><category domain="http://www.blogger.com/atom/ns#">Information Security</category><category domain="http://www.blogger.com/atom/ns#">IT Security</category><category domain="http://www.blogger.com/atom/ns#">Linux Articles</category><category domain="http://www.blogger.com/atom/ns#">Linux Security</category><category domain="http://www.blogger.com/atom/ns#">Network Security</category><category domain="http://www.blogger.com/atom/ns#">Ubuntu</category><category domain="http://www.blogger.com/atom/ns#">Ubuntu 12.04 TLS</category><title>How to Enable and Disable Root Login in Ubuntu 12.04 TLS</title><description>&lt;div style=&quot;text-align: justify;&quot;&gt;
&lt;span style=&quot;font-family: Georgia, Times New Roman, serif;&quot;&gt;We have recently installed Ubuntu 12.10 Desktop and Ubuntu 12.10 Server, we have nowhere asked to supply root password during installation. Generally in Linux, root user does exist and we need to supply root password during installation. By default root account is disabled in Ubuntu Linux because of security reason and you cannot login as root user directly or su - (Switch User) to become a root. You need to add sudo (superuser do) before actual command if you want to run all administrative commands and you need to supply your password when prompts for password.&lt;/span&gt;&lt;/div&gt;
&lt;div style=&quot;text-align: justify;&quot;&gt;
&lt;br&gt;&lt;/div&gt;
&lt;div class=&quot;separator&quot; style=&quot;clear: both; text-align: center;&quot;&gt;
&lt;a href=&quot;https://blogger.googleusercontent.com/img/b/R29vZ2xl/AVvXsEhr7g4pHTEL9BY1OinV-FkvmzCgH21kjZeqrR6QpQG3tv40Qi8w0h4kVIMlmKPGP1BqLbWWqz7GFxH9gWfYYiOEBnUbRt0o99rDuNRZp9iqBgl_J2qQkoqdjzLDC4dViQwihLWHl8-sNfuB/s1600/Enable-Root-Login-in-Ubuntu-300x181.jpg&quot; imageanchor=&quot;1&quot; style=&quot;margin-left: 1em; margin-right: 1em;&quot;&gt;&lt;img border=&quot;0&quot; src=&quot;https://blogger.googleusercontent.com/img/b/R29vZ2xl/AVvXsEhr7g4pHTEL9BY1OinV-FkvmzCgH21kjZeqrR6QpQG3tv40Qi8w0h4kVIMlmKPGP1BqLbWWqz7GFxH9gWfYYiOEBnUbRt0o99rDuNRZp9iqBgl_J2qQkoqdjzLDC4dViQwihLWHl8-sNfuB/s320/Enable-Root-Login-in-Ubuntu-300x181.jpg&quot; height=&quot;193&quot; width=&quot;320&quot;&gt;&lt;/a&gt;&lt;/div&gt;
&lt;br&gt;
&lt;b&gt;&lt;u&gt;&lt;span style=&quot;font-size: x-large;&quot;&gt;&lt;span style=&quot;background-color: white; color: #333333; font-family: Lora, georgia, serif; line-height: 19px; text-align: justify;&quot;&gt;Sud&lt;/span&gt;&lt;span style=&quot;color: #741b47;&quot;&gt;&lt;span style=&quot;background-color: white; font-family: Lora, georgia, serif; line-height: 19px; text-align: justify;&quot;&gt;o &lt;/span&gt;&lt;span style=&quot;background-color: white; font-family: inherit; line-height: 19px; text-align: justify;&quot;&gt;is allowed user t&lt;/span&gt;&lt;/span&gt;&lt;span style=&quot;background-color: white; color: #333333; font-family: inherit; line-height: 19px; text-align: justify;&quot;&gt;o be&lt;/span&gt;&lt;span style=&quot;background-color: white; color: #333333; font-family: Lora, georgia, serif; line-height: 19px; text-align: justify;&quot;&gt;c&lt;/span&gt;&lt;/span&gt;&lt;span style=&quot;background-color: white; color: #0b5394; font-family: Lora, georgia, serif; line-height: 19px; text-align: justify;&quot;&gt;&lt;span style=&quot;font-size: x-large;&quot;&gt;om&lt;/span&gt;&lt;span style=&quot;font-size: large;&quot;&gt;e superus&lt;/span&gt;&lt;/span&gt;&lt;span style=&quot;background-color: white; color: #333333; font-family: Lora, georgia, serif; font-size: large; line-height: 19px; text-align: justify;&quot;&gt;er f&lt;/span&gt;&lt;span style=&quot;background-color: white; color: #38761d; font-family: Lora, georgia, serif; font-size: large; line-height: 19px; text-align: justify;&quot;&gt;or t&lt;/span&gt;&lt;span style=&quot;font-size: x-large;&quot;&gt;&lt;span style=&quot;background-color: white; color: #38761d; font-family: Lora, georgia, serif; line-height: 19px; text-align: justify;&quot;&gt;emporary to&lt;/span&gt;&lt;span style=&quot;background-color: white; color: #b45f06; font-family: Lora, georgia, serif; line-height: 19px; text-align: justify;&quot;&gt; run superuser&lt;/span&gt;&lt;span style=&quot;background-color: white; color: #333333; font-family: Lora, georgia, serif; line-height: 19px; text-align: justify;&quot;&gt; &lt;/span&gt;&lt;/span&gt;&lt;span style=&quot;background-color: white; color: #0b5394; font-family: Lora, georgia, serif; font-size: large; line-height: 19px; text-align: justify;&quot;&gt;administrative tasks.&lt;/span&gt;&lt;/u&gt;&lt;/b&gt;&lt;br&gt;
&lt;div style=&quot;background-color: white; border: 0px; color: #333333; font-family: Lora, georgia, serif; line-height: 19px; outline: 0px; padding: 10px 0px; text-align: justify; vertical-align: baseline;&quot;&gt;
During installation only allow to create new user which has no &lt;strong style=&quot;background-color: transparent; border: 0px; margin: 0px; outline: 0px; padding: 0px; vertical-align: baseline;&quot;&gt;root&lt;/strong&gt; ( &lt;strong style=&quot;background-color: transparent; border: 0px; margin: 0px; outline: 0px; padding: 0px; vertical-align: baseline;&quot;&gt;aka super user&lt;/strong&gt;) privileges. But same user is allowed to execute &lt;strong style=&quot;background-color: transparent; border: 0px; margin: 0px; outline: 0px; padding: 0px; vertical-align: baseline;&quot;&gt;sudo&lt;/strong&gt; commands. Configuring &lt;strong style=&quot;background-color: transparent; border: 0px; margin: 0px; outline: 0px; padding: 0px; vertical-align: baseline;&quot;&gt;sudo&lt;/strong&gt; access for users, need to configure &lt;strong style=&quot;background-color: transparent; border: 0px; margin: 0px; outline: 0px; padding: 0px; vertical-align: baseline;&quot;&gt;/etc/sudoers&lt;/strong&gt;.&lt;/div&gt;
&lt;div style=&quot;background-color: white; border: 0px; color: #333333; font-family: Lora, georgia, serif; line-height: 19px; outline: 0px; padding: 10px 0px; text-align: justify; vertical-align: baseline;&quot;&gt;
We’ll be covering the usage of &lt;strong style=&quot;background-color: transparent; border: 0px; margin: 0px; outline: 0px; padding: 0px; vertical-align: baseline;&quot;&gt;SUDO&lt;/strong&gt; and also we are going to show you tips &amp;amp; tricks to become root user&lt;span style=&quot;font-size: 14px;&quot;&gt;.&lt;/span&gt;&lt;br&gt;
&lt;/div&gt;&lt;a href=&quot;https://xcessl0gycs.blogspot.com/2013/04/how-to-enable-and-disable-root-login-in.html#more&quot;&gt;Read more »&lt;/a&gt;</description><link>https://xcessl0gycs.blogspot.com/2013/04/how-to-enable-and-disable-root-login-in.html</link><author>noreply@blogger.com (Unknown)</author><media:thumbnail xmlns:media="http://search.yahoo.com/mrss/" url="https://blogger.googleusercontent.com/img/b/R29vZ2xl/AVvXsEhr7g4pHTEL9BY1OinV-FkvmzCgH21kjZeqrR6QpQG3tv40Qi8w0h4kVIMlmKPGP1BqLbWWqz7GFxH9gWfYYiOEBnUbRt0o99rDuNRZp9iqBgl_J2qQkoqdjzLDC4dViQwihLWHl8-sNfuB/s72-c/Enable-Root-Login-in-Ubuntu-300x181.jpg" height="72" width="72"/><thr:total>0</thr:total></item><item><guid isPermaLink="false">tag:blogger.com,1999:blog-8022626610982444035.post-5209956795559991703</guid><pubDate>Thu, 24 Jan 2013 11:13:00 +0000</pubDate><atom:updated>2013-01-25T14:10:22.932+05:30</atom:updated><category domain="http://www.blogger.com/atom/ns#">Firewall Types</category><category domain="http://www.blogger.com/atom/ns#">Network Articles</category><category domain="http://www.blogger.com/atom/ns#">Windows Security</category><category domain="http://www.blogger.com/atom/ns#">Windows Softwares</category><title>ADOBE ACROBAT X PRO 10.1.3 MULTILANGUAGE + KEYGEN</title><description>&lt;div class=&quot;separator&quot; style=&quot;clear: both; text-align: center;&quot;&gt;
&lt;a href=&quot;https://blogger.googleusercontent.com/img/b/R29vZ2xl/AVvXsEgK1cwUpOTqFBEn3KnuhdJxnNkY7t1WDHREbhhzNL-cJj9v08a4xhNFl24LTM4btwT-C3wpwAvUJ9tB6jscgo0zNZiGX8_pifhqAQQT37jmYJk4Da8nloZW2YX9riWG1Gfo2Dk3uSVrBfCQ/s1600/acro01.jpg&quot; imageanchor=&quot;1&quot; style=&quot;margin-left: 1em; margin-right: 1em;&quot;&gt;&lt;img border=&quot;0&quot; src=&quot;https://blogger.googleusercontent.com/img/b/R29vZ2xl/AVvXsEgK1cwUpOTqFBEn3KnuhdJxnNkY7t1WDHREbhhzNL-cJj9v08a4xhNFl24LTM4btwT-C3wpwAvUJ9tB6jscgo0zNZiGX8_pifhqAQQT37jmYJk4Da8nloZW2YX9riWG1Gfo2Dk3uSVrBfCQ/s1600/acro01.jpg&quot; height=&quot;505&quot; width=&quot;640&quot;&gt;&lt;/a&gt;&lt;/div&gt;
&lt;br&gt;
&lt;span style=&quot;background-color: white; font-family: &amp;#39;lucida grande&amp;#39;, tahoma, verdana, arial, sans-serif; font-weight: bold; line-height: 19.1875px; text-align: justify;&quot;&gt;Adobe® Acrobat® X Pro software lets you deliver highly professional PDF communications. Create and edit PDF files with rich media included, share information more securely, and gather team feedback more efficiently.&lt;/span&gt;&lt;br&gt;
&lt;div style=&quot;text-align: justify;&quot;&gt;
&lt;span style=&quot;background-color: white; font-family: &amp;#39;lucida grande&amp;#39;, tahoma, verdana, arial, sans-serif; font-weight: bold; line-height: 19.1875px;&quot;&gt;&lt;br&gt;&lt;/span&gt;&lt;/div&gt;
&lt;u style=&quot;background-color: white; font-family: &amp;#39;lucida grande&amp;#39;, tahoma, verdana, arial, sans-serif; font-size: x-large; font-weight: bold; line-height: 19.1875px; text-align: justify;&quot;&gt;Benefits of Acrobat X Pro&lt;/u&gt;&lt;span style=&quot;background-color: white; font-family: &amp;#39;lucida grande&amp;#39;, tahoma, verdana, arial, sans-serif; font-weight: bold; line-height: 19.1875px;&quot;&gt;&lt;/span&gt;&lt;br&gt;
&lt;span style=&quot;background-color: white; font-family: &amp;#39;lucida grande&amp;#39;, tahoma, verdana, arial, sans-serif; font-weight: bold; line-height: 19.1875px;&quot;&gt;
&lt;/span&gt;
&lt;div style=&quot;text-align: justify;&quot;&gt;
&lt;br&gt;&lt;/div&gt;
&lt;div style=&quot;text-align: justify;&quot;&gt;
&lt;span style=&quot;background-color: white; line-height: 19.1875px;&quot;&gt;&lt;span style=&quot;font-family: Arial, Helvetica, sans-serif;&quot;&gt;&lt;span style=&quot;color: #274e13;&quot;&gt;&lt;b&gt;Increase your productivity&lt;/b&gt; &lt;/span&gt;: Get more work done — faster. From streamlining routine PDF tasks to quickly comparing two files, Acrobat X Pro software makes your job easier.&lt;/span&gt;&lt;/span&gt;&lt;/div&gt;
&lt;span style=&quot;background-color: white; line-height: 19.1875px;&quot;&gt;
&lt;/span&gt;
&lt;div style=&quot;text-align: justify;&quot;&gt;
&lt;br&gt;&lt;/div&gt;
&lt;div style=&quot;text-align: justify;&quot;&gt;
&lt;span style=&quot;background-color: white; line-height: 19.1875px;&quot;&gt;&lt;span style=&quot;font-family: Arial, Helvetica, sans-serif;&quot;&gt;&lt;span style=&quot;color: #cc0000;&quot;&gt;&lt;b&gt;Protect sensitive information&lt;/b&gt;&lt;/span&gt; : Share files with confidence by easily adding PDF passwords or digital signatures. Remove sensitive information with redaction tools.&lt;/span&gt;&lt;/span&gt;&lt;/div&gt;
&lt;span style=&quot;background-color: white; line-height: 19.1875px;&quot;&gt;
&lt;/span&gt;
&lt;div style=&quot;text-align: justify;&quot;&gt;
&lt;br&gt;&lt;/div&gt;
&lt;div style=&quot;text-align: justify;&quot;&gt;
&lt;span style=&quot;background-color: white; line-height: 19.1875px;&quot;&gt;&lt;span style=&quot;font-family: Arial, Helvetica, sans-serif;&quot;&gt;&lt;span style=&quot;color: #0b5394;&quot;&gt;&lt;b&gt;Easily create fillable forms&lt;/b&gt;&lt;/span&gt; : Turn your paper forms into fillable PDF forms in just a few steps. Distribute and collect forms electronically, track status, and analyze results.&lt;/span&gt;&lt;/span&gt;&lt;br&gt;
&lt;/div&gt;&lt;a href=&quot;https://xcessl0gycs.blogspot.com/2013/01/adobe-acrobat-x-pro-1013-multilanguage.html#more&quot;&gt;Read more »&lt;/a&gt;</description><link>https://xcessl0gycs.blogspot.com/2013/01/adobe-acrobat-x-pro-1013-multilanguage.html</link><author>noreply@blogger.com (Unknown)</author><media:thumbnail xmlns:media="http://search.yahoo.com/mrss/" url="https://blogger.googleusercontent.com/img/b/R29vZ2xl/AVvXsEgK1cwUpOTqFBEn3KnuhdJxnNkY7t1WDHREbhhzNL-cJj9v08a4xhNFl24LTM4btwT-C3wpwAvUJ9tB6jscgo0zNZiGX8_pifhqAQQT37jmYJk4Da8nloZW2YX9riWG1Gfo2Dk3uSVrBfCQ/s72-c/acro01.jpg" height="72" width="72"/><thr:total>0</thr:total></item><item><guid isPermaLink="false">tag:blogger.com,1999:blog-8022626610982444035.post-2896749350603683612</guid><pubDate>Sun, 13 Jan 2013 13:19:00 +0000</pubDate><atom:updated>2013-01-13T18:50:11.356+05:30</atom:updated><category domain="http://www.blogger.com/atom/ns#">Cisco</category><category domain="http://www.blogger.com/atom/ns#">Cisco Router</category><category domain="http://www.blogger.com/atom/ns#">Information Security</category><category domain="http://www.blogger.com/atom/ns#">IT Security</category><category domain="http://www.blogger.com/atom/ns#">Network Articles</category><category domain="http://www.blogger.com/atom/ns#">Network Security</category><category domain="http://www.blogger.com/atom/ns#">OSPF</category><title>Passive-interface command behavior in RIP, EIGRP &amp; OSPF</title><description>&lt;br&gt;
&lt;div style=&quot;background-color: white; line-height: 16px; text-align: justify;&quot;&gt;
&lt;span style=&quot;font-family: Georgia, Times New Roman, serif;&quot;&gt;&lt;span style=&quot;font-size: large;&quot;&gt;Passive-interface&lt;/span&gt;&lt;span style=&quot;color: #373737;&quot;&gt; command is used in all routing protocols to disable sending updates out from a specific interface. However the command behavior varies from one protocol to another.&lt;/span&gt;&lt;/span&gt;&lt;/div&gt;
&lt;div style=&quot;background-color: white; color: #373737; line-height: 16px; text-align: justify;&quot;&gt;
&lt;span style=&quot;font-family: Georgia, Times New Roman, serif;&quot;&gt;&lt;br&gt;&lt;/span&gt;&lt;/div&gt;
&lt;div style=&quot;background-color: white; line-height: 16px; text-align: justify;&quot;&gt;
&lt;span style=&quot;font-family: Georgia, Times New Roman, serif;&quot;&gt;&lt;span style=&quot;color: #990000; font-size: large;&quot;&gt;In RIP&lt;/span&gt;&lt;span style=&quot;color: #373737;&quot;&gt; this command will disable sending multicast updates via a specific interface but will allow listening to incoming updates from other RIP speaking neighbors.&lt;/span&gt;&lt;/span&gt;&lt;/div&gt;
&lt;div style=&quot;background-color: white; color: #373737; line-height: 16px; text-align: justify;&quot;&gt;
&lt;span style=&quot;font-family: Georgia, Times New Roman, serif;&quot;&gt;&lt;br&gt;&lt;/span&gt;&lt;/div&gt;
&lt;div style=&quot;background-color: white; color: #373737; line-height: 16px; text-align: justify;&quot;&gt;
&lt;span style=&quot;font-family: Georgia, Times New Roman, serif;&quot;&gt;This simply means that the router will still be able to receive updates on that passive interface and use them in the routing table.&lt;/span&gt;&lt;/div&gt;
&lt;div style=&quot;background-color: white; color: #373737; line-height: 16px; text-align: justify;&quot;&gt;
&lt;span style=&quot;font-family: Georgia, Times New Roman, serif;&quot;&gt;&lt;br&gt;&lt;/span&gt;&lt;/div&gt;
&lt;div style=&quot;background-color: white; line-height: 16px; text-align: justify;&quot;&gt;
&lt;span style=&quot;font-family: Georgia, Times New Roman, serif;&quot;&gt;&lt;span style=&quot;color: #274e13; font-size: large;&quot;&gt;In EIGRP&lt;/span&gt;&lt;span style=&quot;color: #373737;&quot;&gt; the passive-interface command stops sending outgoing hello packets, hence the router can not form any neighbor relationship via the passive interface. This behavior stops both outgoing and incoming routing updates.&lt;/span&gt;&lt;/span&gt;&lt;/div&gt;
&lt;div style=&quot;background-color: white; color: #373737; line-height: 16px; text-align: justify;&quot;&gt;
&lt;span style=&quot;font-family: Georgia, Times New Roman, serif;&quot;&gt;&lt;br&gt;&lt;/span&gt;&lt;/div&gt;
&lt;div style=&quot;background-color: white; line-height: 16px; text-align: justify;&quot;&gt;
&lt;span style=&quot;font-family: Georgia, Times New Roman, serif;&quot;&gt;&lt;span style=&quot;color: #073763; font-size: large;&quot;&gt;In OSPF&lt;/span&gt;&lt;span style=&quot;color: #373737;&quot;&gt; the passive-interface has a similar behavior to EIGRP. The command suppresses hello packets and hence neighbor relationships.&lt;/span&gt;&lt;/span&gt;&lt;/div&gt;
&lt;a href=&quot;https://xcessl0gycs.blogspot.com/2013/01/passive-interface-command-behavior-in.html#more&quot;&gt;Read more »&lt;/a&gt;</description><link>https://xcessl0gycs.blogspot.com/2013/01/passive-interface-command-behavior-in.html</link><author>noreply@blogger.com (Unknown)</author><thr:total>0</thr:total></item><item><guid isPermaLink="false">tag:blogger.com,1999:blog-8022626610982444035.post-2154879961750128090</guid><pubDate>Wed, 07 Nov 2012 08:40:00 +0000</pubDate><atom:updated>2012-11-07T14:10:40.371+05:30</atom:updated><category domain="http://www.blogger.com/atom/ns#">IDS/IPS</category><category domain="http://www.blogger.com/atom/ns#">Information Security</category><category domain="http://www.blogger.com/atom/ns#">Intrusion Detection System</category><category domain="http://www.blogger.com/atom/ns#">IT Security</category><category domain="http://www.blogger.com/atom/ns#">Network Articles</category><category domain="http://www.blogger.com/atom/ns#">Network Security</category><category domain="http://www.blogger.com/atom/ns#">Penetration Testing</category><category domain="http://www.blogger.com/atom/ns#">Vulnerability Assessment</category><title>Explain Intrusion detection system (IDS)?? Types OF IDS...</title><description>&lt;div class=&quot;separator&quot; style=&quot;clear: both; text-align: center;&quot;&gt;
&lt;a href=&quot;https://blogger.googleusercontent.com/img/b/R29vZ2xl/AVvXsEjR67T4B7vH8WZNWsWXAxepEwDvgWHkjZI9kKLxEWQzem7skWebSY0LeDAt-0GhNdmG69f2lH0sv0q6Fjcr9eHFynULggrR0POzQn3accg5eT5OXQZz31TC4S1wwc6m0l3NltgbocV4yHnP/s1600/NIDS.png&quot; imageanchor=&quot;1&quot; style=&quot;margin-left: 1em; margin-right: 1em;&quot;&gt;&lt;img border=&quot;0&quot; height=&quot;339&quot; src=&quot;https://blogger.googleusercontent.com/img/b/R29vZ2xl/AVvXsEjR67T4B7vH8WZNWsWXAxepEwDvgWHkjZI9kKLxEWQzem7skWebSY0LeDAt-0GhNdmG69f2lH0sv0q6Fjcr9eHFynULggrR0POzQn3accg5eT5OXQZz31TC4S1wwc6m0l3NltgbocV4yHnP/s640/NIDS.png&quot; width=&quot;640&quot;&gt;&lt;/a&gt;&lt;/div&gt;
&lt;br&gt;
&lt;div style=&quot;background-color: white; line-height: 19.200000762939453px; margin-bottom: 0.5em; margin-top: 0.4em; text-align: justify;&quot;&gt;
&lt;span style=&quot;font-family: Arial, Helvetica, sans-serif;&quot;&gt;An &lt;b&gt;intrusion detection system&lt;/b&gt; (&lt;b&gt;IDS&lt;/b&gt;) is a device or software application that monitors network or system activities for malicious activities or policy violations and produces reports to a Management Station. Some systems may attempt to stop an intrusion attempt but this is neither required nor expected of a monitoring system. &lt;span style=&quot;color: #b45f06; font-size: large;&quot;&gt;&lt;b&gt;Intrusion detection and prevention systems (IDPS)&lt;/b&gt;&lt;/span&gt; are primarily focused on identifying possible incidents, logging information about them, and reporting attempts. In addition, organizations use IDPSes for other purposes, such as identifying problems with security policies, documenting existing threats and deterring individuals from violating security policies. IDPSes have become a necessary addition to the security infrastructure of nearly every organization.&lt;/span&gt;&lt;/div&gt;
&lt;div style=&quot;background-color: white; line-height: 19.200000762939453px; margin-bottom: 0.5em; margin-top: 0.4em; text-align: justify;&quot;&gt;
&lt;span style=&quot;font-family: Arial, Helvetica, sans-serif;&quot;&gt;IDPSes typically record information related to observed events, notify security administrators of important observed events, and produce reports. Many &lt;span style=&quot;color: #38761d; font-size: large;&quot;&gt;IDPSes can also respond to a detected threat by attempting to prevent it from succeeding&lt;/span&gt;. They use several response techniques, which involve the&lt;span style=&quot;color: #990000; font-size: large;&quot;&gt; IDPS stopping the attack itself, &lt;/span&gt;changing the security environment (e.g. reconfiguring a firewall), or changing the attack&amp;#39;s content.&lt;/span&gt;&lt;br&gt;
&lt;/div&gt;&lt;a href=&quot;https://xcessl0gycs.blogspot.com/2012/11/explain-intrusion-detection-system-ids.html#more&quot;&gt;Read more »&lt;/a&gt;</description><link>https://xcessl0gycs.blogspot.com/2012/11/explain-intrusion-detection-system-ids.html</link><author>noreply@blogger.com (Unknown)</author><media:thumbnail xmlns:media="http://search.yahoo.com/mrss/" url="https://blogger.googleusercontent.com/img/b/R29vZ2xl/AVvXsEjR67T4B7vH8WZNWsWXAxepEwDvgWHkjZI9kKLxEWQzem7skWebSY0LeDAt-0GhNdmG69f2lH0sv0q6Fjcr9eHFynULggrR0POzQn3accg5eT5OXQZz31TC4S1wwc6m0l3NltgbocV4yHnP/s72-c/NIDS.png" height="72" width="72"/><thr:total>0</thr:total></item><item><guid isPermaLink="false">tag:blogger.com,1999:blog-8022626610982444035.post-2963006520226537932</guid><pubDate>Thu, 04 Oct 2012 15:04:00 +0000</pubDate><atom:updated>2012-10-04T20:34:34.924+05:30</atom:updated><category domain="http://www.blogger.com/atom/ns#">CBT-Nuggets</category><category domain="http://www.blogger.com/atom/ns#">E-Book</category><category domain="http://www.blogger.com/atom/ns#">Firewall</category><category domain="http://www.blogger.com/atom/ns#">Network Articles</category><category domain="http://www.blogger.com/atom/ns#">Network Security</category><title>EBOOK - Installation And Configuration of R.S.A enVision</title><description>&lt;table cellpadding=&quot;0&quot; cellspacing=&quot;0&quot; class=&quot;tr-caption-container&quot; style=&quot;float: left; margin-right: 1em; text-align: left;&quot;&gt;&lt;tbody&gt;
&lt;tr&gt;&lt;td style=&quot;text-align: center;&quot;&gt;                                &lt;img border=&quot;0&quot; height=&quot;138&quot; src=&quot;https://blogger.googleusercontent.com/img/b/R29vZ2xl/AVvXsEhsgUpdbr_cMC8zPWWFEZRde29hgj4ewg-3NZJDz8tMcx1m0O-VohyphenhyphenJbzcFupXmcvvN5lDv-FwZgeoAPZ0oGuYHxGpoMJjO4SbH2M8PWCmaywiWk7cuocNaelBUhnUUalG9YOO9c_9g6zxv/s200/rsa.gif&quot; style=&quot;margin-left: auto; margin-right: auto;&quot; width=&quot;200&quot;&gt;&lt;/td&gt;&lt;/tr&gt;
&lt;tr&gt;&lt;td class=&quot;tr-caption&quot; style=&quot;text-align: center;&quot;&gt;&lt;br&gt;&lt;/td&gt;&lt;/tr&gt;
&lt;/tbody&gt;&lt;/table&gt;
&lt;a href=&quot;https://blogger.googleusercontent.com/img/b/R29vZ2xl/AVvXsEhiWVpfMZMrbW0o1aUFCMatI7ECrR8GAb038rai1hNG8ROPM_k9VEZwWTPXiwPZFjbIvfTQPx-zkd1kRz3r8saw6TQTK2G5-HTExjK5RwXP4M4CU47VO0gWNY1tfAD-kvkEv0yZfL0zaIjN/s1600/img_18948.jpg&quot; imageanchor=&quot;1&quot; style=&quot;margin-left: 1em; margin-right: 1em; text-align: center;&quot;&gt;&lt;img border=&quot;0&quot; height=&quot;200&quot; src=&quot;https://blogger.googleusercontent.com/img/b/R29vZ2xl/AVvXsEhiWVpfMZMrbW0o1aUFCMatI7ECrR8GAb038rai1hNG8ROPM_k9VEZwWTPXiwPZFjbIvfTQPx-zkd1kRz3r8saw6TQTK2G5-HTExjK5RwXP4M4CU47VO0gWNY1tfAD-kvkEv0yZfL0zaIjN/s200/img_18948.jpg&quot; width=&quot;185&quot;&gt;&lt;/a&gt;&lt;span style=&quot;background-color: white;&quot;&gt;&lt;span style=&quot;font-family: Arial, Verdana, sans-serif; font-size: x-small; text-align: left;&quot;&gt;&lt;br&gt;&lt;/span&gt;&lt;/span&gt;
&lt;span style=&quot;background-color: white;&quot;&gt;&lt;span style=&quot;font-family: Arial, Verdana, sans-serif; font-size: x-small; text-align: left;&quot;&gt;&lt;br&gt;&lt;/span&gt;&lt;/span&gt;
&lt;div style=&quot;text-align: justify;&quot;&gt;
&lt;span style=&quot;background-color: white;&quot;&gt;&lt;span style=&quot;font-family: &amp;#39;Trebuchet MS&amp;#39;, sans-serif; text-align: left;&quot;&gt;&lt;span style=&quot;background-color: white;&quot;&gt;&amp;quot;The Right Choice for Compliance and Security Success!&amp;quot;. The RSA enVision platform provides collection, alerting and analysis of log data that enables organizations to simplify compliance and quickly respond to high-risk security events. The &lt;b&gt;&lt;span style=&quot;font-size: large;&quot;&gt;&lt;span style=&quot;color: #351c75;&quot;&gt;R&lt;/span&gt;&lt;span style=&quot;color: #b45f06;&quot;&gt;S&lt;/span&gt;&lt;span style=&quot;color: #741b47;&quot;&gt;A&lt;/span&gt; &lt;span style=&quot;color: #7f6000;&quot;&gt;enVision&lt;/span&gt; 3-in-1&lt;/span&gt;&lt;/b&gt; platform offers an effective &lt;span style=&quot;color: #38761d; font-size: large;&quot;&gt;&lt;b&gt;Security and Information&lt;/b&gt;&lt;/span&gt;&lt;/span&gt;&lt;span style=&quot;background-color: transparent; font-size: large;&quot;&gt;&lt;b&gt;&lt;span style=&quot;color: #38761d;&quot;&gt; Event Management&lt;/span&gt; &lt;/b&gt;&lt;/span&gt;&lt;span style=&quot;background-color: transparent;&quot;&gt;&lt;span style=&quot;color: #990000;&quot;&gt;&lt;span style=&quot;font-size: large;&quot;&gt;&lt;b&gt;(SIEM)&lt;/b&gt;&lt;/span&gt; &lt;/span&gt;and log management solution, capable of&lt;/span&gt;&lt;span style=&quot;background-color: transparent;&quot;&gt; collecting &lt;/span&gt;&lt;span style=&quot;background-color: transparent;&quot;&gt;and analyzing large amounts of data in real-time, from any event source and in computing environments of any size. RSA enVision is easily scalable - eliminating the need for filtering and to deploy agents.&lt;/span&gt;&lt;/span&gt;&lt;/span&gt;&lt;/div&gt;&lt;a href=&quot;https://xcessl0gycs.blogspot.com/2012/10/ebook-installation-and-configuration-of.html#more&quot;&gt;Read more »&lt;/a&gt;</description><link>https://xcessl0gycs.blogspot.com/2012/10/ebook-installation-and-configuration-of.html</link><author>noreply@blogger.com (Unknown)</author><media:thumbnail xmlns:media="http://search.yahoo.com/mrss/" url="https://blogger.googleusercontent.com/img/b/R29vZ2xl/AVvXsEhsgUpdbr_cMC8zPWWFEZRde29hgj4ewg-3NZJDz8tMcx1m0O-VohyphenhyphenJbzcFupXmcvvN5lDv-FwZgeoAPZ0oGuYHxGpoMJjO4SbH2M8PWCmaywiWk7cuocNaelBUhnUUalG9YOO9c_9g6zxv/s72-c/rsa.gif" height="72" width="72"/><thr:total>0</thr:total></item><item><guid isPermaLink="false">tag:blogger.com,1999:blog-8022626610982444035.post-917935355098901059</guid><pubDate>Tue, 02 Oct 2012 15:53:00 +0000</pubDate><atom:updated>2012-10-02T21:23:13.837+05:30</atom:updated><category domain="http://www.blogger.com/atom/ns#">Auditing (ISMS)</category><category domain="http://www.blogger.com/atom/ns#">CISA</category><category domain="http://www.blogger.com/atom/ns#">Information System Auditing</category><category domain="http://www.blogger.com/atom/ns#">Network Articles</category><title>Information System Auditing</title><description>&lt;div class=&quot;separator&quot; style=&quot;clear: both; text-align: center;&quot;&gt;
&lt;a href=&quot;https://blogger.googleusercontent.com/img/b/R29vZ2xl/AVvXsEjOo8zYv99tyubn6uCxsUsbOkJaks86yFZx5-r4UYGnBXMgsY7DLWKrTbALPStiwzCeZvuUxDu1EUSOQUX2ewf5x80Wp8FOcERXtEZ_IEzVf7QKFVFJCyWWiyit9dIbHQM9kFp2OdjDPTEX/s1600/header.jpg&quot; imageanchor=&quot;1&quot; style=&quot;margin-left: 1em; margin-right: 1em;&quot;&gt;&lt;span style=&quot;font-family: &amp;#39;Trebuchet MS&amp;#39;, sans-serif;&quot;&gt;&lt;img border=&quot;0&quot; height=&quot;246&quot; src=&quot;https://blogger.googleusercontent.com/img/b/R29vZ2xl/AVvXsEjOo8zYv99tyubn6uCxsUsbOkJaks86yFZx5-r4UYGnBXMgsY7DLWKrTbALPStiwzCeZvuUxDu1EUSOQUX2ewf5x80Wp8FOcERXtEZ_IEzVf7QKFVFJCyWWiyit9dIbHQM9kFp2OdjDPTEX/s400/header.jpg&quot; width=&quot;400&quot;&gt;&lt;/span&gt;&lt;/a&gt;&lt;/div&gt;
&lt;div style=&quot;text-align: justify;&quot;&gt;
&lt;b style=&quot;line-height: 22px;&quot;&gt;&lt;span style=&quot;background-color: white; color: #0b5394; font-family: &amp;#39;Trebuchet MS&amp;#39;, sans-serif; font-size: large;&quot;&gt;&lt;u&gt;&lt;br&gt;&lt;/u&gt;&lt;/span&gt;&lt;/b&gt;&lt;/div&gt;
&lt;div style=&quot;text-align: justify;&quot;&gt;
&lt;b style=&quot;line-height: 22px;&quot;&gt;&lt;span style=&quot;background-color: white; color: #0b5394; font-family: &amp;#39;Trebuchet MS&amp;#39;, sans-serif; font-size: large;&quot;&gt;&lt;u&gt;1. What is informaton system?&lt;/u&gt;&lt;/span&gt;&lt;/b&gt;&lt;/div&gt;
&lt;div class=&quot;post-body entry-content&quot; id=&quot;&quot; itemprop=&quot;description articleBody&quot; style=&quot;position: relative; width: 658px;&quot;&gt;
&lt;div class=&quot;MsoNormal&quot; style=&quot;line-height: 22px; text-align: justify;&quot;&gt;
&lt;div class=&quot;MsoNormal&quot; style=&quot;font-size: 15px;&quot;&gt;
&lt;span style=&quot;background-color: white; font-family: &amp;#39;Trebuchet MS&amp;#39;, sans-serif; font-size: 12pt; line-height: 24px;&quot;&gt;Information system is any combination of information technology and human operation managemen and dececion making.&lt;/span&gt;&lt;/div&gt;
&lt;div style=&quot;font-size: 15px;&quot;&gt;
&lt;span style=&quot;font-family: &amp;#39;Trebuchet MS&amp;#39;, sans-serif;&quot;&gt;&lt;br&gt;&lt;/span&gt;&lt;/div&gt;
&lt;span style=&quot;background-color: white; color: #274e13; font-family: &amp;#39;Trebuchet MS&amp;#39;, sans-serif; font-size: large;&quot;&gt;&lt;u&gt;&lt;b&gt;2&lt;/b&gt;&lt;b&gt;&lt;span style=&quot;line-height: 24px;&quot;&gt;. What is information system auditing?&lt;/span&gt;&lt;/b&gt;&lt;/u&gt;&lt;/span&gt;&lt;/div&gt;
&lt;div class=&quot;MsoNormal&quot; style=&quot;font-size: 15px; line-height: 22px; text-align: justify;&quot;&gt;
&lt;span style=&quot;font-family: &amp;#39;Trebuchet MS&amp;#39;, sans-serif;&quot;&gt;&lt;span style=&quot;background-color: white; font-size: 12pt; line-height: 24px;&quot;&gt;Ron Weber opinion (1999,p.10), “EDP auditing is the process of collecting and evaluating evidence to determine whether a computer systems safeguard assets, and consumes resources effiently ”.&lt;/span&gt;&lt;span style=&quot;background-color: white; font-size: 12pt; line-height: 24px;&quot;&gt;Understanding in general is the process of collecting and evaluating evidence to determine whether a computerized application system has been set and implement the system, adequate internal controls, all assets are protected well / not abused, and ensuring data integrity, reliability and the effectiveness and efficiency of the system computer-based information.&lt;/span&gt;&lt;/span&gt;&lt;/div&gt;
&lt;div class=&quot;MsoNormal&quot; style=&quot;font-size: 15px; line-height: 22px; text-align: justify;&quot;&gt;
&lt;span style=&quot;background-color: white;&quot;&gt;&lt;span style=&quot;font-family: &amp;#39;Trebuchet MS&amp;#39;, sans-serif;&quot;&gt;&lt;/span&gt;&lt;/span&gt;&lt;br&gt;
&lt;/div&gt;&lt;/div&gt;&lt;a href=&quot;https://xcessl0gycs.blogspot.com/2012/10/information-system-auditing.html#more&quot;&gt;Read more »&lt;/a&gt;</description><link>https://xcessl0gycs.blogspot.com/2012/10/information-system-auditing.html</link><author>noreply@blogger.com (Unknown)</author><media:thumbnail xmlns:media="http://search.yahoo.com/mrss/" url="https://blogger.googleusercontent.com/img/b/R29vZ2xl/AVvXsEjOo8zYv99tyubn6uCxsUsbOkJaks86yFZx5-r4UYGnBXMgsY7DLWKrTbALPStiwzCeZvuUxDu1EUSOQUX2ewf5x80Wp8FOcERXtEZ_IEzVf7QKFVFJCyWWiyit9dIbHQM9kFp2OdjDPTEX/s72-c/header.jpg" height="72" width="72"/><thr:total>1</thr:total></item><item><guid isPermaLink="false">tag:blogger.com,1999:blog-8022626610982444035.post-4929197847527564188</guid><pubDate>Sat, 29 Sep 2012 15:25:00 +0000</pubDate><atom:updated>2012-11-09T17:52:03.749+05:30</atom:updated><category domain="http://www.blogger.com/atom/ns#">Auditing (ISMS)</category><category domain="http://www.blogger.com/atom/ns#">CISA</category><category domain="http://www.blogger.com/atom/ns#">COBIT</category><category domain="http://www.blogger.com/atom/ns#">Information System Auditing</category><title>CISA Review Manual 2012 - Powered By ISACA</title><description>&lt;br&gt;
&lt;div style=&quot;text-align: justify;&quot;&gt;
&lt;b&gt;The &lt;span style=&quot;color: #cc0000; font-size: large;&quot;&gt;CISA Review Manual 2012&lt;/span&gt; is a comprehensive reference guide designed to help individuals prepare for the CISA exam and understand the roles and responsibilities of an information systems (IS) auditor. The manual has been enhanced over the past editions and represents the most current, comprehensive, peer-reviewed IS audit, assurance, security and control resource available worldwide.&lt;/b&gt;&lt;/div&gt;
&lt;div style=&quot;text-align: justify;&quot;&gt;
&lt;br&gt;&lt;/div&gt;
&lt;div style=&quot;text-align: justify;&quot;&gt;
&lt;b&gt;The 2012 manual is organized to assist candidates in understanding essential concepts and studying the following updated job practice areas:&lt;/b&gt;&lt;/div&gt;
&lt;ol&gt;
&lt;li style=&quot;text-align: justify;&quot;&gt;&lt;b&gt;&lt;span style=&quot;color: #741b47;&quot;&gt;The Process of Auditing Information Systems.&lt;/span&gt;&lt;/b&gt;&lt;/li&gt;
&lt;li style=&quot;text-align: justify;&quot;&gt;&lt;b&gt;&lt;span style=&quot;color: #073763;&quot;&gt;Governance and Management of IT.&lt;/span&gt;&lt;/b&gt;&lt;/li&gt;
&lt;li style=&quot;text-align: justify;&quot;&gt;&lt;b&gt;&lt;span style=&quot;color: #38761d;&quot;&gt;Information Systems Acquisition, Development and Implementation.&lt;/span&gt;&lt;/b&gt;&lt;/li&gt;
&lt;li style=&quot;text-align: justify;&quot;&gt;&lt;b&gt;&lt;span style=&quot;color: #b45f06;&quot;&gt;Information Systems Operations, Maintenance and Support.&lt;/span&gt;&lt;/b&gt;&lt;/li&gt;
&lt;li style=&quot;text-align: justify;&quot;&gt;&lt;b&gt;&lt;span style=&quot;color: #990000;&quot;&gt;Protection of Information Assets.&lt;/span&gt;&lt;/b&gt;&lt;/li&gt;
&lt;/ol&gt;
&lt;a href=&quot;https://xcessl0gycs.blogspot.com/2012/09/cisa-review-manual-2012-powered-by-isaca.html#more&quot;&gt;Read more »&lt;/a&gt;</description><link>https://xcessl0gycs.blogspot.com/2012/09/cisa-review-manual-2012-powered-by-isaca.html</link><author>noreply@blogger.com (Unknown)</author><media:thumbnail xmlns:media="http://search.yahoo.com/mrss/" url="https://blogger.googleusercontent.com/img/b/R29vZ2xl/AVvXsEiPy6_cXlQBmNYAIP-2L4N8l1N5rOwN2UvycLRL-8ZPcoHJj4is2jFR-ZfGHu_I9l1gBvdYxRDokDtSvtyGtj1tNbc_XoBT3iquRN9-7exNeunjznUo5j0QwhSAwoE9QsBs6aGleKiuPHzn/s72-c/2.png" height="72" width="72"/><thr:total>0</thr:total></item><item><guid isPermaLink="false">tag:blogger.com,1999:blog-8022626610982444035.post-9114409011196595055</guid><pubDate>Sun, 02 Sep 2012 06:05:00 +0000</pubDate><atom:updated>2012-09-29T20:59:41.500+05:30</atom:updated><category domain="http://www.blogger.com/atom/ns#">Auditing (ISMS)</category><category domain="http://www.blogger.com/atom/ns#">E-Book</category><category domain="http://www.blogger.com/atom/ns#">Hacking Articles</category><category domain="http://www.blogger.com/atom/ns#">IT Security</category><category domain="http://www.blogger.com/atom/ns#">Network Articles</category><category domain="http://www.blogger.com/atom/ns#">Utilities</category><category domain="http://www.blogger.com/atom/ns#">Vulnerability Assessment</category><category domain="http://www.blogger.com/atom/ns#">Windows Security</category><title>Syness-The IT Regulatory and Standards Compliance Handbook: How to Survive Information Systems Audit and Assessments | For ISO 27001(BS7979), PCI-DSS, HIPPA, FISCAM, COBIT</title><description>&lt;br&gt;
&lt;div id=&quot;rap&quot;&gt;
&lt;div id=&quot;content&quot;&gt;
&lt;div class=&quot;post&quot;&gt;
&lt;div class=&quot;separator&quot; style=&quot;clear: both; text-align: center;&quot;&gt;
&lt;a href=&quot;https://blogger.googleusercontent.com/img/b/R29vZ2xl/AVvXsEjCIKITpSNGGD_wKDDfmGovQI2drwInkbIHxhi0qWFI021cx9ZCvqruQ5o0m6e0alzlVJL5gwMJFxJODRutlm4zyeHqN58jo7uDP41foFwrsjK_6yT0G2ZjzitmF7pRl8JYmWvF-IZJ2zka/s1600/ithz.jpg&quot; imageanchor=&quot;1&quot; style=&quot;margin-left: 1em; margin-right: 1em;&quot;&gt;&lt;img border=&quot;0&quot; height=&quot;640&quot; src=&quot;https://blogger.googleusercontent.com/img/b/R29vZ2xl/AVvXsEjCIKITpSNGGD_wKDDfmGovQI2drwInkbIHxhi0qWFI021cx9ZCvqruQ5o0m6e0alzlVJL5gwMJFxJODRutlm4zyeHqN58jo7uDP41foFwrsjK_6yT0G2ZjzitmF7pRl8JYmWvF-IZJ2zka/s640/ithz.jpg&quot; width=&quot;510&quot;&gt;&lt;/a&gt;&lt;/div&gt;
&lt;div style=&quot;text-align: center;&quot;&gt;
&lt;span style=&quot;font-family: Verdana, sans-serif; font-size: small;&quot;&gt;&lt;u&gt;&lt;b&gt;The IT Regulatory and Standards Compliance Handbook: How to &lt;span3045441&gt;Survive&lt;/span3045441&gt; Information Systems Audit and Assessments&lt;/b&gt;&lt;/u&gt;&lt;/span&gt;&lt;/div&gt;
&lt;h2 id=&quot;post-52566&quot;&gt;





&lt;div style=&quot;text-align: center;&quot;&gt;
&lt;span style=&quot;font-family: Verdana, sans-serif; font-size: small;&quot;&gt;&lt;span style=&quot;color: #990000;&quot;&gt;Publisher: &lt;/span&gt;&lt;span style=&quot;color: #3d85c6;&quot;&gt;Syngress 2008 &lt;/span&gt;| &lt;span style=&quot;color: purple;&quot;&gt;750 Pages | ISBN: &lt;/span&gt;&lt;span style=&quot;color: #38761d;&quot;&gt;1597492663 | PDF | 11 MB&lt;/span&gt;&lt;/span&gt;&lt;br&gt;
&lt;div style=&quot;text-align: left;&quot;&gt;
&lt;span style=&quot;font-family: Verdana, sans-serif; font-size: small;&quot;&gt;&lt;span style=&quot;color: #38761d;&quot;&gt;&lt;br&gt;&lt;/span&gt;&lt;/span&gt;&lt;/div&gt;
&lt;div style=&quot;text-align: justify;&quot;&gt;
&lt;span style=&quot;font-family: Verdana, sans-serif; font-size: small;&quot;&gt;&lt;span style=&quot;font-weight: normal;&quot;&gt;This book provides comprehensive methodology, enabling the staff charged with an IT security audit to create a sound framework, allowing them to meet the challenges of compliance in a way that aligns with both business and technical needs. This “roadmap” provides a way of interpreting complex, often confusing, compliance requirements within the larger scope of an organization’s overall needs.&lt;/span&gt;&lt;/span&gt;&lt;/div&gt;
&lt;/div&gt;&lt;/h2&gt;&lt;/div&gt;&lt;/div&gt;&lt;/div&gt;&lt;a href=&quot;https://xcessl0gycs.blogspot.com/2012/05/ebooksyness-it-regulatory-and-standards.html#more&quot;&gt;Read more »&lt;/a&gt;</description><link>https://xcessl0gycs.blogspot.com/2012/05/ebooksyness-it-regulatory-and-standards.html</link><author>noreply@blogger.com (Unknown)</author><media:thumbnail xmlns:media="http://search.yahoo.com/mrss/" url="https://blogger.googleusercontent.com/img/b/R29vZ2xl/AVvXsEjCIKITpSNGGD_wKDDfmGovQI2drwInkbIHxhi0qWFI021cx9ZCvqruQ5o0m6e0alzlVJL5gwMJFxJODRutlm4zyeHqN58jo7uDP41foFwrsjK_6yT0G2ZjzitmF7pRl8JYmWvF-IZJ2zka/s72-c/ithz.jpg" height="72" width="72"/><thr:total>0</thr:total></item><item><guid isPermaLink="false">tag:blogger.com,1999:blog-8022626610982444035.post-1615989762517408527</guid><pubDate>Thu, 19 Jul 2012 10:03:00 +0000</pubDate><atom:updated>2012-09-29T20:59:23.693+05:30</atom:updated><category domain="http://www.blogger.com/atom/ns#">Cisco</category><category domain="http://www.blogger.com/atom/ns#">IT Security</category><title>Cisco Router - How to configure SSH</title><description>&lt;span style=&quot;font-family: Helvetica, sans-serif; line-height: 15px;&quot;&gt;Below shows you how to enable SSH on your router using a username of &quot;&lt;b&gt;cisco&lt;/b&gt;&quot; and a password of &quot;&lt;b&gt;network&lt;/b&gt;&quot;, allowing access from the fa0/0 interface.&lt;/span&gt;&lt;br /&gt;
&lt;div style=&quot;border: solid windowtext 1.0pt; mso-border-alt: solid windowtext .5pt; mso-element: para-border-div; padding: 1.0pt 4.0pt 1.0pt 1.5pt;&quot;&gt;
&lt;div class=&quot;MsoNormal&quot; style=&quot;border: none; mso-border-alt: solid windowtext .5pt; mso-padding-alt: 1.0pt 4.0pt 1.0pt 4.0pt; padding: 0in;&quot;&gt;
&lt;span style=&quot;font-family: &#39;Courier New&#39;;&quot;&gt;&lt;b&gt;Router(config)#&lt;span style=&quot;color: #38761d;&quot;&gt;ip ssh
source-interface fastEthernet 0/0&lt;/span&gt;&lt;br /&gt;
Router(config)#&lt;span style=&quot;color: #38761d;&quot;&gt;ip ssh authentication-retries 3&lt;/span&gt;&lt;br /&gt;
Router(config)#&lt;span style=&quot;color: #38761d;&quot;&gt;ip ssh version 2&lt;/span&gt;&lt;br /&gt;
&lt;br /&gt;
Router(config)#&lt;span style=&quot;color: purple;&quot;&gt;ip domain-name local.net&lt;/span&gt;&lt;br /&gt;
Router(config)#&lt;span style=&quot;color: purple;&quot;&gt;crypto key generate rsa modulus 768&lt;/span&gt;&lt;br /&gt;
Router(config)#&lt;span style=&quot;color: purple;&quot;&gt;username cisco password 7 network&lt;/span&gt;&lt;br /&gt;
&lt;br /&gt;
Router(config)#&lt;span style=&quot;color: #3d85c6;&quot;&gt;line vty 0 15&lt;/span&gt;&lt;br /&gt;
Router(config-line)# &lt;span style=&quot;color: #3d85c6;&quot;&gt;transport input ssh&lt;/span&gt;&lt;br /&gt;
Router(config-line)# &lt;span style=&quot;color: #3d85c6;&quot;&gt;local login&lt;/span&gt;&lt;/b&gt;&lt;/span&gt;&lt;o:p&gt;&lt;/o:p&gt;&lt;/div&gt;
&lt;div class=&quot;MsoNormal&quot; style=&quot;border: none; mso-border-alt: solid windowtext .5pt; mso-padding-alt: 1.0pt 4.0pt 1.0pt 4.0pt; padding: 0in;&quot;&gt;
&lt;span style=&quot;font-family: &#39;Courier New&#39;;&quot;&gt;&lt;span style=&quot;font-size: 14px;&quot;&gt;&lt;br /&gt;&lt;/span&gt;&lt;/span&gt;&lt;/div&gt;
&lt;/div&gt;
</description><link>https://xcessl0gycs.blogspot.com/2012/05/cisco-router-how-to-configure-ssh.html</link><author>noreply@blogger.com (Unknown)</author><thr:total>0</thr:total></item><item><guid isPermaLink="false">tag:blogger.com,1999:blog-8022626610982444035.post-3580070265511138104</guid><pubDate>Tue, 17 Jul 2012 07:44:00 +0000</pubDate><atom:updated>2013-07-17T13:17:14.079+05:30</atom:updated><category domain="http://www.blogger.com/atom/ns#">Linux Admin</category><category domain="http://www.blogger.com/atom/ns#">Linux Articles</category><category domain="http://www.blogger.com/atom/ns#">Linux Proxy</category><category domain="http://www.blogger.com/atom/ns#">Proxy Server</category><category domain="http://www.blogger.com/atom/ns#">Squid</category><title>Some Websites not open in SQUID Proxy</title><description>&lt;h3 class=&quot;post-title entry-title&quot; itemprop=&quot;name&quot; style=&quot;color: #222222; font-family: Georgia, Utopia, &#39;Palatino Linotype&#39;, Palatino, serif; font-size: 24px; font-weight: normal; margin: 0.75em 0px 0px; position: relative;&quot;&gt;
&lt;span style=&quot;background-color: white;&quot;&gt;Websites not accessible via Squid&lt;/span&gt;&lt;/h3&gt;
&lt;div class=&quot;post-header&quot; style=&quot;color: #222222; font-family: Georgia, Utopia, &#39;Palatino Linotype&#39;, Palatino, serif; font-size: 13px; line-height: 1.6; margin: 0px 0px 1.5em;&quot;&gt;
&lt;div class=&quot;post-header-line-1&quot;&gt;
&lt;/div&gt;
&lt;/div&gt;
&lt;div class=&quot;post-body entry-content&quot; id=&quot;post-body-2530885225372977241&quot; itemprop=&quot;description articleBody&quot; style=&quot;font-family: Georgia, Utopia, &#39;Palatino Linotype&#39;, Palatino, serif; line-height: 1.4; position: relative; width: 570px;&quot;&gt;
&lt;div dir=&quot;ltr&quot; trbidi=&quot;on&quot;&gt;
&lt;h4 style=&quot;color: #222222; font-size: 15px; margin: 0px; position: relative;&quot;&gt;
&lt;b style=&quot;background-color: white;&quot;&gt;&lt;u&gt;Problem&lt;/u&gt;&lt;/b&gt;&lt;/h4&gt;
&lt;span style=&quot;background-color: white; color: #222222; font-size: 15px;&quot;&gt;&lt;br /&gt;Some websites not accessible through Squid.&lt;br /&gt;&lt;br /&gt;Following message is noticed in the browser&lt;br /&gt;&lt;br /&gt;&lt;b&gt;The following error was encountered:&amp;nbsp;&lt;/b&gt;&lt;/span&gt;&lt;ul style=&quot;color: #222222; font-size: 15px; line-height: 1.4; margin: 0.5em 0px; padding: 0px 2.5em;&quot;&gt;
&lt;li style=&quot;margin: 0px 0px 0.25em; padding: 0px;&quot;&gt;&lt;b style=&quot;background-color: white;&quot;&gt;Read Error&lt;/b&gt;&lt;/li&gt;
&lt;/ul&gt;
&lt;span style=&quot;background-color: white; color: #222222; font-size: 15px;&quot;&gt;&lt;b&gt;&lt;/b&gt;&lt;b&gt;The system returned:&amp;nbsp;&lt;/b&gt;&lt;/span&gt;&lt;pre style=&quot;color: #222222; font-size: 15px;&quot;&gt;&lt;b&gt;&lt;i style=&quot;background-color: white;&quot;&gt;    (104) Connection reset by peer&lt;/i&gt;&lt;/b&gt;&lt;/pre&gt;
&lt;span style=&quot;background-color: white;&quot;&gt;&lt;br /&gt;&lt;b style=&quot;color: #222222; font-size: 15px;&quot;&gt;&lt;u&gt;Environment&lt;/u&gt;&lt;/b&gt;&lt;br /&gt;&lt;br /&gt;&lt;span style=&quot;color: #222222; font-size: 15px;&quot;&gt;Squid 2.6.STABLE21-6&amp;nbsp;&lt;/span&gt;&lt;br /&gt;&lt;span style=&quot;color: #222222; font-size: 15px;&quot;&gt;Squid 3.1.10-1&amp;nbsp;&lt;/span&gt;&lt;br /&gt;&lt;br /&gt;&lt;b style=&quot;color: #222222; font-size: 15px;&quot;&gt;&lt;u&gt;Resolution&lt;/u&gt;&lt;/b&gt;&lt;br /&gt;&lt;br /&gt;&lt;span style=&quot;color: #222222; font-size: 15px;&quot;&gt;Add the following to squid.conf&amp;nbsp; and restart squid service&lt;/span&gt;&lt;br /&gt;&lt;br /&gt;&lt;span style=&quot;color: #274e13; font-size: 15px;&quot;&gt;&lt;b&gt;via off&lt;br /&gt;forwarded_for delete&lt;/b&gt;&lt;/span&gt;&lt;br /&gt;&lt;br /&gt;&lt;b style=&quot;color: #222222; font-size: 15px;&quot;&gt;&lt;u&gt;Root Cause/Diagnostics&lt;/u&gt;&lt;/b&gt;&lt;br /&gt;&lt;br /&gt;&lt;span style=&quot;color: #222222; font-size: 15px;&quot;&gt;Site was accessible directly. Via squid, connection would reset abruptly&lt;/span&gt;&lt;br /&gt;&lt;br /&gt;&lt;span style=&quot;color: #222222; font-size: 15px;&quot;&gt;Only difference when accessed via squid and directly was the addition of&lt;/span&gt;&lt;br /&gt;&lt;br /&gt;&lt;i style=&quot;color: #222222; font-size: 15px;&quot;&gt;&lt;b&gt;X-Forwarded-For&lt;/b&gt;&lt;/i&gt;&lt;span style=&quot;color: #222222; font-size: 15px;&quot;&gt;&amp;nbsp;and&amp;nbsp;&lt;/span&gt;&lt;i style=&quot;color: #222222; font-size: 15px;&quot;&gt;&lt;b&gt;via&lt;/b&gt;&amp;nbsp;&lt;/i&gt;&lt;span style=&quot;color: #222222; font-size: 15px;&quot;&gt;headers in the HTTP request&lt;/span&gt;&lt;br /&gt;&lt;br /&gt;&lt;span style=&quot;color: #222222; font-size: 15px;&quot;&gt;X-Forwarded-for usually contains the IP address of the host that requested the website&lt;/span&gt;&lt;br /&gt;&lt;br /&gt;&lt;span style=&quot;color: #222222; font-size: large;&quot;&gt;&lt;b&gt;Example:&amp;nbsp;&amp;nbsp;&lt;/b&gt;&lt;/span&gt;&lt;br /&gt;&lt;/span&gt;&lt;pre style=&quot;color: #222222; font-size: 15px;&quot;&gt;&lt;span style=&quot;background-color: white;&quot;&gt;X-Forwarded-For: 192.168.0.1&lt;/span&gt;&lt;/pre&gt;
&lt;pre style=&quot;color: #222222; font-size: 15px;&quot;&gt;&lt;span style=&quot;background-color: white;&quot;&gt;VIA usually has information about the proxy server&lt;/span&gt;&lt;/pre&gt;
&lt;pre style=&quot;color: #222222; font-size: 15px;&quot;&gt;&lt;span style=&quot;background-color: white;&quot;&gt;&amp;nbsp;&lt;/span&gt;&lt;/pre&gt;
&lt;pre style=&quot;color: #222222;&quot;&gt;&lt;span style=&quot;background-color: white;&quot;&gt;&lt;b&gt;&lt;span style=&quot;font-size: x-large;&quot;&gt;Example:&lt;/span&gt;&lt;/b&gt;&lt;/span&gt;&lt;/pre&gt;
&lt;pre style=&quot;color: #222222; font-size: 15px;&quot;&gt;&lt;span style=&quot;background-color: white;&quot;&gt;via: example.com &lt;/span&gt;&lt;/pre&gt;
&lt;span style=&quot;background-color: white; font-size: 15px;&quot;&gt;&lt;br /&gt;&lt;b&gt;&lt;span style=&quot;color: #351c75;&quot;&gt;Documentation:&amp;nbsp;&amp;nbsp;&lt;a href=&quot;http://www.squid-cache.org/Doc/config/forwarded_for/&quot; target=&quot;_blank&quot;&gt;forwarded_for&lt;/a&gt;&amp;nbsp;and&amp;nbsp;&lt;a href=&quot;http://www.squid-cache.org/Doc/config/via/&quot; style=&quot;text-decoration: none;&quot; target=&quot;_blank&quot;&gt;via&lt;/a&gt;&lt;/span&gt;&lt;/b&gt;&lt;br /&gt;&lt;br /&gt;&lt;span style=&quot;color: #222222;&quot;&gt;By disabling via off and setting forwarded_for delete, we disabling these headers in the HTTP request.&lt;/span&gt;&lt;br /&gt;&lt;/span&gt;&lt;span style=&quot;background-color: white; color: #222222; font-size: 15px; line-height: 1.4;&quot;&gt;Disabling this header should not have any negative impact.&lt;/span&gt;&lt;/div&gt;
&lt;div dir=&quot;ltr&quot; style=&quot;color: #222222; font-size: 15px;&quot; trbidi=&quot;on&quot;&gt;
&lt;span style=&quot;background-color: white;&quot;&gt;&lt;br /&gt;-----------------------------------------------------------------------------------------------&lt;br /&gt;&lt;br /&gt;&lt;br /&gt;&lt;br /&gt;&lt;br /&gt;&lt;/span&gt;&lt;/div&gt;
&lt;/div&gt;
&lt;br /&gt;</description><link>https://xcessl0gycs.blogspot.com/2012/07/some-websites-not-open-in-squid-proxy.html</link><author>noreply@blogger.com (Unknown)</author><thr:total>0</thr:total></item><item><guid isPermaLink="false">tag:blogger.com,1999:blog-8022626610982444035.post-1869279814711223117</guid><pubDate>Sat, 14 Jul 2012 10:15:00 +0000</pubDate><atom:updated>2012-07-18T21:01:26.462+05:30</atom:updated><category domain="http://www.blogger.com/atom/ns#">Cisco</category><category domain="http://www.blogger.com/atom/ns#">Cisco Router</category><category domain="http://www.blogger.com/atom/ns#">Cisco VLAN</category><category domain="http://www.blogger.com/atom/ns#">IT Security</category><category domain="http://www.blogger.com/atom/ns#">Network Articles</category><title>Configuring the Cisco IDS Router / Switch Modules for Cisco 6500 Switch / 7200 Router</title><description>&lt;div style=&quot;background-attachment: initial; background-clip: initial; background-image: initial; background-origin: initial; background-position: initial initial; background-repeat: initial initial; line-height: 11.25pt; margin-bottom: 11.25pt; margin-left: 0in; margin-right: 0in; margin-top: 7.5pt;&quot;&gt;
&lt;span style=&quot;background-color: white;&quot;&gt;&lt;strong&gt;&lt;span style=&quot;font-family: Helvetica; font-size: large;&quot;&gt;&lt;u&gt;IDSM-2&lt;/u&gt;&lt;/span&gt;&lt;/strong&gt;&lt;span style=&quot;font-family: Helvetica; font-size: 9pt;&quot;&gt;&lt;o:p&gt;&lt;/o:p&gt;&lt;/span&gt;&lt;/span&gt;&lt;/div&gt;
&lt;div style=&quot;background-attachment: initial; background-clip: initial; background-image: initial; background-origin: initial; line-height: 11.25pt; margin-bottom: 11.25pt; margin-left: 0in; margin-right: 0in; margin-top: 7.5pt;&quot;&gt;
&lt;span style=&quot;background-color: white; font-family: Helvetica; font-size: 9pt;&quot;&gt;The IDSM-2 Module is a Cisco IDS blade for the Cisco 6500 switch.&lt;br&gt;
Once you install the module into the switch the module uses following logical
ports :&lt;o:p&gt;&lt;/o:p&gt;&lt;/span&gt;&lt;/div&gt;
&lt;table border=&quot;1&quot; cellpadding=&quot;1&quot; cellspacing=&quot;1&quot; style=&quot;font-family: Helvetica, Arial, FreeSans, sans-serif; height: 80px; width: 478px;&quot;&gt;&lt;tbody&gt;
&lt;tr&gt;&lt;td&gt;&lt;span style=&quot;background-color: white;&quot;&gt;Port 1&lt;/span&gt;&lt;/td&gt;&lt;td&gt;&lt;span style=&quot;background-color: white;&quot;&gt;Used for TCP Resets (In Promiscuous Mode)&lt;/span&gt;&lt;/td&gt;&lt;/tr&gt;
&lt;tr&gt;&lt;td&gt;&lt;span style=&quot;background-color: white;&quot;&gt;Port 2&lt;/span&gt;&lt;/td&gt;&lt;td&gt;&lt;span style=&quot;background-color: white;&quot;&gt;Command and Control&lt;/span&gt;&lt;/td&gt;&lt;/tr&gt;
&lt;tr&gt;&lt;td&gt;&lt;span style=&quot;background-color: white;&quot;&gt;Port 7&lt;/span&gt;&lt;/td&gt;&lt;td&gt;&lt;span style=&quot;background-color: white;&quot;&gt;Sensing Port&lt;/span&gt;&lt;/td&gt;&lt;/tr&gt;
&lt;tr&gt;&lt;td&gt;&lt;span style=&quot;background-color: white;&quot;&gt;Port 8&lt;/span&gt;&lt;/td&gt;&lt;td&gt;&lt;span style=&quot;background-color: white;&quot;&gt;Sensing Port&lt;/span&gt;&lt;/td&gt;&lt;/tr&gt;
&lt;/tbody&gt;&lt;/table&gt;
&lt;div&gt;
&lt;div style=&quot;background-attachment: initial; background-clip: initial; background-image: initial; background-origin: initial; line-height: 11.25pt; margin-bottom: 11.25pt; margin-left: 0in; margin-right: 0in; margin-top: 7.5pt; text-align: justify;&quot;&gt;
&lt;span style=&quot;background-color: white; font-family: Helvetica;&quot;&gt;Below details the steps required for
configuring your switch / module for an inline setup. This includes obtaining
the module number for the cisco ids running the setup wizard and then assigning
the required ports for on the switch for ids sensing within an inline
configuration. The clear trunk commands are required as by default the switch
assigns the ports as trunk ports to every vlan.&lt;/span&gt;&lt;br&gt;
&lt;/div&gt;&lt;/div&gt;&lt;a href=&quot;https://xcessl0gycs.blogspot.com/2012/07/configuring-cisco-ids-router-switch.html#more&quot;&gt;Read more »&lt;/a&gt;</description><link>https://xcessl0gycs.blogspot.com/2012/07/configuring-cisco-ids-router-switch.html</link><author>noreply@blogger.com (Unknown)</author><thr:total>0</thr:total></item><item><guid isPermaLink="false">tag:blogger.com,1999:blog-8022626610982444035.post-518443432112672405</guid><pubDate>Sat, 30 Jun 2012 11:27:00 +0000</pubDate><atom:updated>2012-09-29T20:57:07.225+05:30</atom:updated><category domain="http://www.blogger.com/atom/ns#">Firewall</category><category domain="http://www.blogger.com/atom/ns#">Firewall Definition</category><category domain="http://www.blogger.com/atom/ns#">Firewall Types</category><category domain="http://www.blogger.com/atom/ns#">IT Security</category><title>Types of Firewalls</title><description>&lt;div class=&quot;separator&quot; style=&quot;clear: both; text-align: center;&quot;&gt;
&lt;a href=&quot;https://blogger.googleusercontent.com/img/b/R29vZ2xl/AVvXsEimf1KRk0NDUmOORXFAwAbpX6qf4TWt8eweVabWLuT5Om-gisrcdX0W42VHzpE1aA33TqVQGudDLvjpDnUdWm1LIAZOooKUwb3t1eHqb-w9SjuifbQ_AIvhLBYpy4dOXt2L52GvBkB_KN35/s1600/ReaFirewall_logo_final.png&quot; imageanchor=&quot;1&quot; style=&quot;margin-left: 1em; margin-right: 1em;&quot;&gt;&lt;img border=&quot;0&quot; height=&quot;388&quot; src=&quot;https://blogger.googleusercontent.com/img/b/R29vZ2xl/AVvXsEimf1KRk0NDUmOORXFAwAbpX6qf4TWt8eweVabWLuT5Om-gisrcdX0W42VHzpE1aA33TqVQGudDLvjpDnUdWm1LIAZOooKUwb3t1eHqb-w9SjuifbQ_AIvhLBYpy4dOXt2L52GvBkB_KN35/s400/ReaFirewall_logo_final.png&quot; width=&quot;400&quot;&gt;&lt;/a&gt;&lt;/div&gt;
&lt;div style=&quot;text-align: justify;&quot;&gt;
&lt;span style=&quot;background-color: white; font-family: georgia, serif; line-height: 23px;&quot;&gt;&lt;br&gt;&lt;/span&gt;&lt;/div&gt;
&lt;div style=&quot;text-align: justify;&quot;&gt;
&lt;span style=&quot;background-color: white; font-family: georgia, serif; line-height: 23px;&quot;&gt;Firewalls are everywhere today even many home network have firewalls today. But there are several different types of firewalls. &lt;b&gt;You have &lt;span style=&quot;color: #7f6000;&quot;&gt;hardware&lt;/span&gt;, &lt;span style=&quot;color: blue;&quot;&gt;software firewalls&lt;/span&gt;, &lt;span style=&quot;color: #b45f06;&quot;&gt;stateful&lt;/span&gt;, &lt;span style=&quot;color: #741b47;&quot;&gt;stateless firewalls&lt;/span&gt;, &lt;span style=&quot;color: #3d85c6;&quot;&gt;proxy&lt;/span&gt;, &lt;span style=&quot;color: #38761d;&quot;&gt;application&lt;/span&gt;, &lt;span style=&quot;color: #990000;&quot;&gt;desktop&lt;/span&gt;, &lt;span style=&quot;color: #b45f06;&quot;&gt;dual-homed&lt;/span&gt;, &lt;span style=&quot;color: purple;&quot;&gt;reverse&lt;/span&gt;, etc&lt;/b&gt;; &lt;/span&gt;&lt;/div&gt;
&lt;div style=&quot;text-align: justify;&quot;&gt;
&lt;span style=&quot;background-color: white; font-family: georgia, serif; line-height: 23px;&quot;&gt;&lt;b&gt;&lt;u&gt;&lt;span style=&quot;font-size: large;&quot;&gt;&lt;br&gt;&lt;/span&gt;&lt;/u&gt;&lt;/b&gt;&lt;/span&gt;&lt;/div&gt;
&lt;div style=&quot;text-align: justify;&quot;&gt;
&lt;span style=&quot;background-color: white; font-family: georgia, serif; line-height: 23px;&quot;&gt;&lt;b&gt;&lt;u&gt;&lt;span style=&quot;font-size: large;&quot;&gt;Some of which are explained below:&lt;/span&gt;&lt;/u&gt;&lt;/b&gt;&lt;/span&gt;&lt;/div&gt;
&lt;a href=&quot;https://xcessl0gycs.blogspot.com/2012/06/types-of-firewalls.html#more&quot;&gt;Read more »&lt;/a&gt;</description><link>https://xcessl0gycs.blogspot.com/2012/06/types-of-firewalls.html</link><author>noreply@blogger.com (Unknown)</author><media:thumbnail xmlns:media="http://search.yahoo.com/mrss/" url="https://blogger.googleusercontent.com/img/b/R29vZ2xl/AVvXsEimf1KRk0NDUmOORXFAwAbpX6qf4TWt8eweVabWLuT5Om-gisrcdX0W42VHzpE1aA33TqVQGudDLvjpDnUdWm1LIAZOooKUwb3t1eHqb-w9SjuifbQ_AIvhLBYpy4dOXt2L52GvBkB_KN35/s72-c/ReaFirewall_logo_final.png" height="72" width="72"/><thr:total>0</thr:total></item><item><guid isPermaLink="false">tag:blogger.com,1999:blog-8022626610982444035.post-3507358524940918205</guid><pubDate>Tue, 26 Jun 2012 13:36:00 +0000</pubDate><atom:updated>2012-06-26T19:06:00.729+05:30</atom:updated><category domain="http://www.blogger.com/atom/ns#">Cisco</category><category domain="http://www.blogger.com/atom/ns#">Cisco Router</category><category domain="http://www.blogger.com/atom/ns#">Cisco VLAN</category><category domain="http://www.blogger.com/atom/ns#">Inter VLAN Routing</category><category domain="http://www.blogger.com/atom/ns#">IT Security</category><category domain="http://www.blogger.com/atom/ns#">Network Articles</category><title>How to configure a Cisco Layer 3 switch-InterVLAN Routing</title><description>&lt;div class=&quot;separator&quot; style=&quot;clear: both; text-align: center;&quot;&gt;
&lt;a href=&quot;https://blogger.googleusercontent.com/img/b/R29vZ2xl/AVvXsEhA7U9CNG8QnPP7vzeVKjg9LGxxrDr-VHVoj50Og_LZ3IwFl2eyfrtxP9KkWuaMUtLxBENIQRFOtbBo5TltRw5FF5oS3RD4DutX1uZfxCmZvoDAT1EWKXurHhu1YX80LP9yIIYbZKx07D-X/s1600/56c.gif&quot; imageanchor=&quot;1&quot; style=&quot;margin-left: 1em; margin-right: 1em;&quot;&gt;&lt;img border=&quot;0&quot; src=&quot;https://blogger.googleusercontent.com/img/b/R29vZ2xl/AVvXsEhA7U9CNG8QnPP7vzeVKjg9LGxxrDr-VHVoj50Og_LZ3IwFl2eyfrtxP9KkWuaMUtLxBENIQRFOtbBo5TltRw5FF5oS3RD4DutX1uZfxCmZvoDAT1EWKXurHhu1YX80LP9yIIYbZKx07D-X/s1600/56c.gif&quot;&gt;&lt;/a&gt;&lt;/div&gt;
&lt;span style=&quot;background-color: white; font-family: Verdana, Tahoma, Georgia, Geneva, Arial; line-height: 15px; text-align: justify;&quot;&gt;&lt;br&gt;&lt;/span&gt;&lt;br&gt;
&lt;span style=&quot;background-color: white; font-family: Verdana, Tahoma, Georgia, Geneva, Arial; line-height: 15px; text-align: justify;&quot;&gt;Cisco Catalysts switches equipped with the Enhanced Multilayer Image (EMI) can work as Layer 3 devices with full routing capabilities. Example switch models that support layer 3 routing are the &lt;b&gt;&lt;span style=&quot;color: #0b5394; font-size: large;&quot;&gt;3550, 3750, 3560 etc&lt;/span&gt;&lt;/b&gt;.&lt;/span&gt;&lt;br&gt;
&lt;div class=&quot;article&quot; style=&quot;background-color: white; font-family: Verdana, Tahoma, Georgia, Geneva, Arial; line-height: 15px; text-align: left;&quot;&gt;
&lt;div style=&quot;text-align: justify;&quot;&gt;
&lt;br&gt;&lt;/div&gt;
&lt;div style=&quot;text-align: justify;&quot;&gt;
On a Layer3-capable switch, the port interfaces work as Layer 2 access ports by default, but you can also configure them as &lt;span style=&quot;color: #660000;&quot;&gt;“&lt;strong&gt;&lt;span style=&quot;font-size: large;&quot;&gt;Routed Ports&lt;/span&gt;&lt;/strong&gt;”&lt;/span&gt; which act as normal router interfaces. That is, you can assign an IP address directly on the routed port. Moreover, you can configure also a &lt;span style=&quot;color: purple;&quot;&gt;&lt;span style=&quot;font-size: large;&quot;&gt;&lt;strong&gt;Switch Vlan Interface&lt;/strong&gt; (&lt;strong&gt;SVI&lt;/strong&gt;)&lt;/span&gt; &lt;/span&gt;with the &lt;span style=&quot;color: #38761d; font-size: large;&quot;&gt;&lt;b&gt;“interface vlan” &lt;/b&gt;&lt;/span&gt;command which acts as a virtual layer 3 interface on the Layer3 switch.&lt;/div&gt;
&lt;div style=&quot;text-align: justify;&quot;&gt;
&lt;br&gt;&lt;/div&gt;
&lt;div style=&quot;text-align: justify;&quot;&gt;
On this post I will describe a scenario with a Layer3 switch acting as “&lt;span style=&quot;font-size: large;&quot;&gt;&lt;b&gt;&lt;u&gt;Inter Vlan Routing&lt;/u&gt;&lt;/b&gt;&lt;/span&gt;” device together with two Layer2 switches acting as closet access switches.&lt;br&gt;
&lt;/div&gt;&lt;/div&gt;&lt;a href=&quot;https://xcessl0gycs.blogspot.com/2012/06/how-to-configure-cisco-layer-3-switch.html#more&quot;&gt;Read more »&lt;/a&gt;</description><link>https://xcessl0gycs.blogspot.com/2012/06/how-to-configure-cisco-layer-3-switch.html</link><author>noreply@blogger.com (Unknown)</author><media:thumbnail xmlns:media="http://search.yahoo.com/mrss/" url="https://blogger.googleusercontent.com/img/b/R29vZ2xl/AVvXsEhA7U9CNG8QnPP7vzeVKjg9LGxxrDr-VHVoj50Og_LZ3IwFl2eyfrtxP9KkWuaMUtLxBENIQRFOtbBo5TltRw5FF5oS3RD4DutX1uZfxCmZvoDAT1EWKXurHhu1YX80LP9yIIYbZKx07D-X/s72-c/56c.gif" height="72" width="72"/><thr:total>0</thr:total></item><item><guid isPermaLink="false">tag:blogger.com,1999:blog-8022626610982444035.post-561708713582818551</guid><pubDate>Sun, 24 Jun 2012 13:08:00 +0000</pubDate><atom:updated>2012-06-24T18:38:00.085+05:30</atom:updated><category domain="http://www.blogger.com/atom/ns#">Checkpoint</category><category domain="http://www.blogger.com/atom/ns#">Checkpoint High Availability Module</category><category domain="http://www.blogger.com/atom/ns#">Firewall</category><category domain="http://www.blogger.com/atom/ns#">IDS/IPS</category><category domain="http://www.blogger.com/atom/ns#">Redundancy Module</category><title>CheckPoint Having  Acceleration and Clustering Software Blade</title><description>&lt;div class=&quot;separator&quot; style=&quot;clear: both; text-align: center;&quot;&gt;
&lt;a href=&quot;https://blogger.googleusercontent.com/img/b/R29vZ2xl/AVvXsEgGAnR5lhghmuj9FiSKvIUnCSN-sa6oWwJVpHvIWRiNAN4zYXUiZ9_IMFBq02EYqb1Jc9H10JZdC9Ll9yGGbFy6LO7SVkocnO3s0FNN7ogTIafVEQSK6YtqYREWnwUKN2K8A1ayjlv0Up2L/s1600/picture_17.jpeg&quot; imageanchor=&quot;1&quot; style=&quot;margin-left: 1em; margin-right: 1em;&quot;&gt;&lt;img border=&quot;0&quot; src=&quot;https://blogger.googleusercontent.com/img/b/R29vZ2xl/AVvXsEgGAnR5lhghmuj9FiSKvIUnCSN-sa6oWwJVpHvIWRiNAN4zYXUiZ9_IMFBq02EYqb1Jc9H10JZdC9Ll9yGGbFy6LO7SVkocnO3s0FNN7ogTIafVEQSK6YtqYREWnwUKN2K8A1ayjlv0Up2L/s1600/picture_17.jpeg&quot;&gt;&lt;/a&gt;&lt;/div&gt;
&lt;div class=&quot;separator&quot; style=&quot;clear: both; text-align: center;&quot;&gt;
&lt;br&gt;&lt;/div&gt;
&lt;div style=&quot;text-align: justify;&quot;&gt;
&lt;span style=&quot;background-color: white; color: #222222; font-family: Georgia, Utopia, &amp;#39;Palatino Linotype&amp;#39;, Palatino, serif; font-size: 15px; line-height: 1.4;&quot;&gt;The Check Point Acceleration and Clustering Software Blade delivers a set of advanced technologies, &lt;/span&gt;&lt;span style=&quot;background-color: white; color: #222222; font-family: Georgia, Utopia, &amp;#39;Palatino Linotype&amp;#39;, Palatino, serif; line-height: 1.4;&quot;&gt;&lt;span style=&quot;font-size: large;&quot;&gt;SecureXL and ClusterXL&lt;/span&gt;&lt;/span&gt;&lt;span style=&quot;background-color: white; color: #222222; font-family: Georgia, Utopia, &amp;#39;Palatino Linotype&amp;#39;, Palatino, serif; font-size: 15px; line-height: 1.4;&quot;&gt;, that work together to maximize performance and security in high-performance environments. These work with &lt;/span&gt;&lt;span style=&quot;background-color: white; color: #222222; font-family: Georgia, Utopia, &amp;#39;Palatino Linotype&amp;#39;, Palatino, serif; line-height: 1.4;&quot;&gt;&lt;span style=&quot;font-size: large;&quot;&gt;CoreXL&lt;/span&gt;&lt;/span&gt;&lt;span style=&quot;background-color: white; color: #222222; font-family: Georgia, Utopia, &amp;#39;Palatino Linotype&amp;#39;, Palatino, serif; font-size: 15px; line-height: 1.4;&quot;&gt;, which is included with the blade containers, to form the foundation of the Open Performance Architecture, which delivers throughput designed for data center applications and the high levels of security needed to protect against today’s application-level threats.&lt;/span&gt;&lt;/div&gt;&lt;a href=&quot;https://xcessl0gycs.blogspot.com/2012/06/checkpoint-having-acceleration-and.html#more&quot;&gt;Read more »&lt;/a&gt;</description><link>https://xcessl0gycs.blogspot.com/2012/06/checkpoint-having-acceleration-and.html</link><author>noreply@blogger.com (Unknown)</author><media:thumbnail xmlns:media="http://search.yahoo.com/mrss/" url="https://blogger.googleusercontent.com/img/b/R29vZ2xl/AVvXsEgGAnR5lhghmuj9FiSKvIUnCSN-sa6oWwJVpHvIWRiNAN4zYXUiZ9_IMFBq02EYqb1Jc9H10JZdC9Ll9yGGbFy6LO7SVkocnO3s0FNN7ogTIafVEQSK6YtqYREWnwUKN2K8A1ayjlv0Up2L/s72-c/picture_17.jpeg" height="72" width="72"/><thr:total>0</thr:total></item></channel></rss>