<?xml version='1.0' encoding='UTF-8'?><rss xmlns:atom="http://www.w3.org/2005/Atom" xmlns:openSearch="http://a9.com/-/spec/opensearchrss/1.0/" xmlns:blogger="http://schemas.google.com/blogger/2008" xmlns:georss="http://www.georss.org/georss" xmlns:gd="http://schemas.google.com/g/2005" xmlns:thr="http://purl.org/syndication/thread/1.0" version="2.0"><channel><atom:id>tag:blogger.com,1999:blog-8242660268174464742</atom:id><lastBuildDate>Tue, 03 Mar 2026 08:28:06 +0000</lastBuildDate><category>Tips</category><category>Windows</category><category>Facts</category><category>How-to</category><category>Linux</category><category>Fixes</category><category>Networking</category><category>Apple</category><category>BSoD</category><category>Hacking</category><category>Reverse</category><category>bug</category><category>APIPA</category><category>Arch</category><category>BIOS</category><category>Cisco</category><category>DHCP</category><category>Dell</category><category>Engineering</category><category>GoBack</category><category>HP</category><category>Helpdesk</category><category>IP</category><category>IT</category><category>ITProDevConnections</category><category>Infographic</category><category>Microserver</category><category>Norton</category><category>OllyDbg</category><category>Risk</category><category>Sales</category><category>Server</category><category>Shellshock</category><category>Smartphones</category><category>Users</category><category>entropy</category><category>fix</category><category>generate</category><category>samba</category><category>security</category><category>shares</category><category>ssh</category><category>swat</category><title>VoovodeNET</title><description>_everything about network, security, databases, servers, patching and of course hacking.</description><link>http://voovodenet.blogspot.com/</link><managingEditor>noreply@blogger.com (Alex Gkiouros)</managingEditor><generator>Blogger</generator><openSearch:totalResults>118</openSearch:totalResults><openSearch:startIndex>1</openSearch:startIndex><openSearch:itemsPerPage>25</openSearch:itemsPerPage><item><guid isPermaLink="false">tag:blogger.com,1999:blog-8242660268174464742.post-2736976530483935031</guid><pubDate>Wed, 29 Oct 2014 19:46:00 +0000</pubDate><atom:updated>2014-10-29T21:47:11.873+02:00</atom:updated><category domain="http://www.blogger.com/atom/ns#">BIOS</category><category domain="http://www.blogger.com/atom/ns#">Dell</category><category domain="http://www.blogger.com/atom/ns#">Reverse</category><title>Ressurecting a dead laptop - Dell XPS m1730</title><description>There was a dell xps m1730 sitting besides me. Nobody had ever said something about it.&lt;br /&gt;
I decided to open the lid and check it. Everything ran smooth, i started reformatting, installed drivers and just after driver installating, bang! No video....&lt;br /&gt;
&lt;br /&gt;
&lt;div class=&quot;separator&quot; style=&quot;clear: both; text-align: center;&quot;&gt;
&lt;a href=&quot;https://blogger.googleusercontent.com/img/b/R29vZ2xl/AVvXsEiUpc9-ARYl8dS7wGMcQLGCt33saOmYCebjGmnRkec7MiAC5whBUIKjmHLZ0nNxxOHPEfOaaNCD_3jP-onMXTB3mOLvLvS5gaHEKw4Fkt2K5YAsmm0RCkM4hB0atGTNjev5TKx7q_GbrPA/s1600/Capture.PNG&quot; imageanchor=&quot;1&quot; style=&quot;margin-left: 1em; margin-right: 1em;&quot;&gt;&lt;img border=&quot;0&quot; src=&quot;https://blogger.googleusercontent.com/img/b/R29vZ2xl/AVvXsEiUpc9-ARYl8dS7wGMcQLGCt33saOmYCebjGmnRkec7MiAC5whBUIKjmHLZ0nNxxOHPEfOaaNCD_3jP-onMXTB3mOLvLvS5gaHEKw4Fkt2K5YAsmm0RCkM4hB0atGTNjev5TKx7q_GbrPA/s1600/Capture.PNG&quot; height=&quot;123&quot; width=&quot;320&quot; /&gt;&lt;/a&gt;&lt;/div&gt;
&lt;br /&gt;
I didn`t know that it was a common m1730 problem up to the point i googled around a bit and found so many problems regarding GPU, even a video about reconstructing it on youtube.&lt;br /&gt;
I examined the laptop closely, unscrew everything and took it apart.&lt;br /&gt;
All i was able to notice was that the fans weren`t spinning at all...&lt;br /&gt;
&lt;br /&gt;
Then, my friend google helped me find some posts inside dell&#39;s support area where i was able to find sources and details about the problem, what i found?&lt;br /&gt;
There was a bios update from dell support that looks promising into fixing the blank screen / vga problem. I downloaded into a usb stick, and booted from it to install the update.&lt;br /&gt;
&lt;br /&gt;
Things weren`t so easy though, as soon as i got into (you know the blue area :) the flash rom, dell asked me to recharge the battery to continue! Battery? What battery? It was dead!&lt;br /&gt;
&lt;br /&gt;
Questions... where can i find another battery? any alternative solution? Nope!&lt;br /&gt;
I decided it was time for debugging., then i found the assembly code of the function that checks battery charge.&lt;br /&gt;
&lt;br /&gt;
What I changed in the MXG7A11.exe was the PUSH 3 to PUSH 0.&lt;br /&gt;
&lt;br /&gt;
&lt;blockquote class=&quot;tr_bq&quot;&gt;
004213C0 /$ 55 PUSH EBP&lt;br /&gt;
004213C1 |. 8BEC MOV EBP,ESP&lt;br /&gt;
004213C3 |. 83EC 0C SUB ESP,0C&lt;br /&gt;
004213C6 |. 8D45 F4 LEA EAX,DWORD PTR SS:[EBP-C]&lt;br /&gt;
004213C9 |. 50 PUSH EAX&lt;br /&gt;
004213CA |. E8 FD0E0000 CALL&lt;br /&gt;
004213CF |. 807D F4 00 CMP BYTE PTR SS:[EBP-C],0&lt;br /&gt;
004213D3 |. 75 04 JNZ SHORT MXG7A11.004213D9&lt;br /&gt;
004213D5 |. 6A 01 PUSH 1&lt;br /&gt;
004213D7 |. EB 22 JMP SHORT MXG7A11.004213FB&lt;br /&gt;
004213D9 |&amp;gt; 807D F5 80 CMP BYTE PTR SS:[EBP-B],80&lt;br /&gt;
004213DD |. 74 1A JE SHORT MXG7A11.004213F9&lt;br /&gt;
004213DF |. 807D F5 FF CMP BYTE PTR SS:[EBP-B],0FF&lt;br /&gt;
004213E3 |. 74 14 JE SHORT MXG7A11.004213F9&lt;br /&gt;
004213E5 |. 807D F6 0A CMP BYTE PTR SS:[EBP-A],0A&lt;br /&gt;
004213E9 |. 76 0A JBE SHORT MXG7A11.004213F5&lt;br /&gt;
004213EB |. 807D F6 FF CMP BYTE PTR SS:[EBP-A],0FF&lt;br /&gt;
004213EF |. 74 04 JE SHORT MXG7A11.004213F5&lt;br /&gt;
004213F1 |. 33C0 XOR EAX,EAX&lt;br /&gt;
004213F3 |. C9 LEAVE&lt;br /&gt;
004213F4 |. C3 RETN&lt;br /&gt;
&lt;b&gt;004213F5 &lt;/b&gt;|&amp;gt; 6A 03 PUSH 3&lt;br /&gt;
004213F7 |. EB 02 JMP SHORT MXG7A11.004213FB&lt;br /&gt;
004213F9 |&amp;gt; 6A 02 PUSH 2&lt;br /&gt;
004213FB |&amp;gt; 58 POP EAX&lt;br /&gt;
004213FC |. C9 LEAVE&lt;br /&gt;
004213FD \. C3 RETN&lt;/blockquote&gt;
&lt;br /&gt;
After this thing, the update worked like a charm ;)</description><link>http://voovodenet.blogspot.com/2014/10/ressurecting-dead-laptop-dell-xps-m1730.html</link><author>noreply@blogger.com (Alex Gkiouros)</author><media:thumbnail xmlns:media="http://search.yahoo.com/mrss/" url="https://blogger.googleusercontent.com/img/b/R29vZ2xl/AVvXsEiUpc9-ARYl8dS7wGMcQLGCt33saOmYCebjGmnRkec7MiAC5whBUIKjmHLZ0nNxxOHPEfOaaNCD_3jP-onMXTB3mOLvLvS5gaHEKw4Fkt2K5YAsmm0RCkM4hB0atGTNjev5TKx7q_GbrPA/s72-c/Capture.PNG" height="72" width="72"/><thr:total>0</thr:total></item><item><guid isPermaLink="false">tag:blogger.com,1999:blog-8242660268174464742.post-6236684082138832141</guid><pubDate>Thu, 25 Sep 2014 13:46:00 +0000</pubDate><atom:updated>2014-09-25T16:49:11.535+03:00</atom:updated><category domain="http://www.blogger.com/atom/ns#">bug</category><category domain="http://www.blogger.com/atom/ns#">Linux</category><category domain="http://www.blogger.com/atom/ns#">Risk</category><category domain="http://www.blogger.com/atom/ns#">Shellshock</category><title>CVE-2014-6271 - Shellshock</title><description>&lt;div class=&quot;post-body entry-content&quot; style=&quot;background-color: white; font-size: 15px; line-height: 30px !important; margin: 0px; outline: 0px; padding: 0px 5px; text-align: justify;&quot;&gt;
&lt;div class=&quot;articlebodyonly&quot; id=&quot;articlebodyonly&quot; itemprop=&quot;articleBody&quot; style=&quot;margin: 0px 0px 15px; outline: 0px; padding: 0px;&quot;&gt;
&lt;div id=&quot;aim15479409966254423557&quot; style=&quot;margin: 0px; outline: 0px; padding: 0px;&quot;&gt;
&lt;div dir=&quot;ltr&quot; style=&quot;margin: 0px; outline: 0px; padding: 0px; text-align: left;&quot; trbidi=&quot;on&quot;&gt;
&lt;div style=&quot;margin: 0px; outline: 0px; padding: 0px; text-align: justify;&quot;&gt;
&lt;div class=&quot;separator&quot; style=&quot;clear: both; margin: 0px; outline: 0px; padding: 0px; text-align: center;&quot;&gt;
&lt;a href=&quot;https://blogger.googleusercontent.com/img/b/R29vZ2xl/AVvXsEgrtupWHLBtASQ06aXEp-cKfmWXIuihxEW-VbrZ3K3PBv_Pv5OhXmUqOQxVg7AcwMKOQ7pP3Hs3V_9FV3lwdATgUejK7GojxeQUoePV7-r7M2pdnpWaFK_JSXqNGGNRc0CqI4w15RatQfE/s1600/bash-shellshock.png&quot; imageanchor=&quot;1&quot; style=&quot;clear: left; color: #3d5a99; cursor: default; float: left; font-weight: bold; margin: 0px 1em 1em 0px; outline: none; padding: 0px; pointer-events: none;&quot;&gt;&lt;span style=&quot;font-family: inherit;&quot;&gt;&lt;img alt=&quot;Remotely Exploitable &#39;Bash Shell&#39; Vulnerability Affects Linux, Unix and Apple Mac OS X&quot; border=&quot;0&quot; src=&quot;https://blogger.googleusercontent.com/img/b/R29vZ2xl/AVvXsEgrtupWHLBtASQ06aXEp-cKfmWXIuihxEW-VbrZ3K3PBv_Pv5OhXmUqOQxVg7AcwMKOQ7pP3Hs3V_9FV3lwdATgUejK7GojxeQUoePV7-r7M2pdnpWaFK_JSXqNGGNRc0CqI4w15RatQfE/s728/bash-shellshock.png&quot; style=&quot;border: 0px; clear: both; margin: 0px; max-width: 728px; outline: none; padding: 0px;&quot; title=&quot;Remotely Exploitable &#39;Bash Shell&#39; Vulnerability Affects Linux, Unix and Apple Mac OS X&quot; /&gt;&lt;/span&gt;&lt;/a&gt;&lt;/div&gt;
&lt;span style=&quot;font-family: inherit;&quot;&gt;A Critical remotely exploitable vulnerability has been discovered in the widely used Linux and Unix command-line shell, known as&amp;nbsp;&lt;b style=&quot;margin: 0px; outline: 0px; padding: 0px;&quot;&gt;Bash&lt;/b&gt;, aka the GNU&amp;nbsp;&lt;b style=&quot;margin: 0px; outline: 0px; padding: 0px;&quot;&gt;Bourne Again Shell&lt;/b&gt;, leaving countless websites, servers, PCs, OS X Macs, various home routers, and many more open to the cyber criminals.&lt;/span&gt;&lt;/div&gt;
&lt;div style=&quot;margin: 0px; outline: 0px; padding: 0px; text-align: justify;&quot;&gt;
&lt;br style=&quot;content: &#39; &#39;; display: block; margin: 15px 0px 0px; outline: 0px; padding: 0px;&quot; /&gt;&lt;/div&gt;
&lt;div style=&quot;margin: 0px; outline: 0px; padding: 0px; text-align: justify;&quot;&gt;
&lt;b style=&quot;margin: 0px; outline: 0px; padding: 0px;&quot;&gt;&lt;span style=&quot;font-family: inherit;&quot;&gt;REMOTELY EXPLOITABLE SHELLSHOCK&lt;/span&gt;&lt;/b&gt;&lt;/div&gt;
&lt;div style=&quot;margin: 0px; outline: 0px; padding: 0px; text-align: justify;&quot;&gt;
&lt;span style=&quot;font-family: inherit;&quot;&gt;The vulnerability&amp;nbsp;&lt;b style=&quot;margin: 0px; outline: 0px; padding: 0px;&quot;&gt;(CVE-2014-6271)&lt;/b&gt;&amp;nbsp;affects versions 1.14 through 4.3 of GNU Bash and being named as&amp;nbsp;&lt;b style=&quot;margin: 0px; outline: 0px; padding: 0px;&quot;&gt;Bash Bug&lt;/b&gt;, and&amp;nbsp;&lt;b style=&quot;margin: 0px; outline: 0px; padding: 0px;&quot;&gt;Shellshock&lt;/b&gt;&amp;nbsp;by the Security researchers on the Internet discussions.&lt;/span&gt;&lt;/div&gt;
&lt;div style=&quot;margin: 0px; outline: 0px; padding: 0px; text-align: justify;&quot;&gt;
&lt;br style=&quot;content: &#39; &#39;; display: block; margin: 15px 0px 0px; outline: 0px; padding: 0px;&quot; /&gt;&lt;/div&gt;
&lt;div style=&quot;margin: 0px; outline: 0px; padding: 0px; text-align: justify;&quot;&gt;
&lt;span style=&quot;font-family: inherit;&quot;&gt;According to the technical details, a hacker could exploit this bash bug to execute shell commands remotely on a target machine using specifically crafted variables. “&lt;i style=&quot;margin: 0px; outline: 0px; padding: 0px;&quot;&gt;In many common configurations, this vulnerability is exploitable over the network,&lt;/i&gt;” Stephane said.&lt;/span&gt;&lt;/div&gt;
&lt;div style=&quot;margin: 0px; outline: 0px; padding: 0px; text-align: justify;&quot;&gt;
&lt;br style=&quot;content: &#39; &#39;; display: block; margin: 15px 0px 0px; outline: 0px; padding: 0px;&quot; /&gt;&lt;/div&gt;
&lt;div style=&quot;margin: 0px; outline: 0px; padding: 0px; text-align: justify;&quot;&gt;
&lt;span style=&quot;font-family: inherit;&quot;&gt;This 22-year-old vulnerability stems from the way bash handles specially-formatted environment variables, namely exported shell functions. When assigning a function to a variable, trailing code in the function definition will be executed.&lt;/span&gt;&lt;/div&gt;
&lt;div style=&quot;margin: 0px; outline: 0px; padding: 0px; text-align: justify;&quot;&gt;
&lt;br style=&quot;content: &#39; &#39;; display: block; margin: 15px 0px 0px; outline: 0px; padding: 0px;&quot; /&gt;&lt;/div&gt;
&lt;div style=&quot;margin: 0px; outline: 0px; padding: 0px; text-align: justify;&quot;&gt;
&lt;b style=&quot;margin: 0px; outline: 0px; padding: 0px;&quot;&gt;&lt;span style=&quot;font-family: inherit;&quot;&gt;BASH BUG AFFECTS MILLIONS OF SYSTEMS&lt;/span&gt;&lt;/b&gt;&lt;/div&gt;
&lt;div style=&quot;margin: 0px; outline: 0px; padding: 0px; text-align: justify;&quot;&gt;
&lt;span style=&quot;font-family: inherit;&quot;&gt;While bash is not directly used by remote users, but it is a common shell for evaluating and executing commands from other programs, such as web server or the mail server. So if an application calls the Bash shell command via web HTTP or a&amp;nbsp;&lt;i style=&quot;margin: 0px; outline: 0px; padding: 0px;&quot;&gt;Common-Gateway Interface (CGI)&lt;/i&gt;&amp;nbsp;in a way that allows a user to insert data, the web server could be hacked.&lt;/span&gt;&lt;/div&gt;
&lt;div style=&quot;margin: 0px; outline: 0px; padding: 0px; text-align: justify;&quot;&gt;
&lt;/div&gt;
&lt;/div&gt;
&lt;/div&gt;
&lt;div id=&quot;insidearticlead&quot; style=&quot;border-top-color: rgb(238, 238, 238); border-top-style: solid; border-top-width: 5px; clear: both; margin: 15px 10px -10px 0px; outline: 0px; padding: 10px 0px 0px;&quot;&gt;
&lt;/div&gt;
&lt;div id=&quot;aim25479409966254423557&quot; style=&quot;margin: 0px; outline: 0px; padding: 0px;&quot;&gt;
&lt;br style=&quot;content: &#39; &#39;; display: block; margin: 15px 0px 0px; outline: 0px; padding: 0px;&quot; /&gt;
&lt;div style=&quot;margin: 0px; outline: 0px; padding: 0px;&quot;&gt;
&lt;span style=&quot;font-family: inherit;&quot;&gt;In Simple words, If Bash has been configured as the default system shell, an attacker could launch malicious code on the server just by sending a specially crafted malicious web request by setting headers in a web request, or by setting weird mime types.&amp;nbsp;&lt;a href=&quot;http://pastebin.com/raw.php?i=166f8Rjx&quot; rel=&quot;nofollow&quot; style=&quot;color: #3d5a99; font-weight: bold; margin: 0px; outline: none; padding: 0px;&quot; target=&quot;_blank&quot;&gt;Proof-of-concept code&lt;/a&gt;&amp;nbsp;for cgi-bin reverse shell has been posted on the Internet.&lt;/span&gt;&lt;/div&gt;
&lt;div style=&quot;margin: 0px; outline: 0px; padding: 0px;&quot;&gt;
&lt;br /&gt;
&lt;span style=&quot;font-family: inherit;&quot;&gt;Similar attacks are possible via OpenSSH, &lt;br /&gt;
“&lt;i style=&quot;margin: 0px; outline: 0px; padding: 0px;&quot;&gt;We have also verified that this vulnerability is exposed in ssh—but only to authenticated sessions. Web applications like cgi-scripts may be vulnerable based on a number of factors; including calling other applications through a shell, or evaluating sections of code through a shell&lt;/i&gt;.” &lt;br /&gt;
Stephane warned. But if an attacker does not have an SSH account this exploit would not work.&lt;/span&gt;&lt;/div&gt;
&lt;div style=&quot;margin: 0px; outline: 0px; padding: 0px;&quot;&gt;
&lt;span style=&quot;font-family: inherit;&quot;&gt;This is a serious risk to Internet infrastructure, just like Heartbleed bug, because Linux not only runs the majority of the servers but also large number of embedded devices, including Mac OS X laptops and Android devices are also running the vulnerable version of bash Software. NIST&amp;nbsp;&lt;a href=&quot;http://web.nvd.nist.gov/view/vuln/detail?vulnId=CVE-2014-6271&quot; rel=&quot;nofollow&quot; style=&quot;color: #3d5a99; font-weight: bold; margin: 0px; outline: none; padding: 0px;&quot; target=&quot;_blank&quot;&gt;vulnerability database&lt;/a&gt;&amp;nbsp;has rated this vulnerability “&lt;i style=&quot;margin: 0px; outline: 0px; padding: 0px;&quot;&gt;10 out of 10&lt;/i&gt;” in terms of severity.&lt;/span&gt;&lt;/div&gt;
&lt;div style=&quot;margin: 0px; outline: 0px; padding: 0px;&quot;&gt;
&lt;br style=&quot;content: &#39; &#39;; display: block; margin: 15px 0px 0px; outline: 0px; padding: 0px;&quot; /&gt;&lt;/div&gt;
&lt;div style=&quot;margin: 0px; outline: 0px; padding: 0px;&quot;&gt;
&lt;b style=&quot;margin: 0px; outline: 0px; padding: 0px;&quot;&gt;&lt;span style=&quot;font-family: inherit;&quot;&gt;HOW TO CHECK FOR VULNERABLE SHELL&lt;/span&gt;&lt;/b&gt;&lt;/div&gt;
&lt;div style=&quot;margin: 0px; outline: 0px; padding: 0px;&quot;&gt;
&lt;span style=&quot;font-family: inherit;&quot;&gt;To determine if a Linux or Unix system is vulnerable, run the following command lines in your linux shell:&lt;/span&gt;&lt;/div&gt;
&lt;blockquote class=&quot;tr_bq&quot; style=&quot;background-color: #f9f9f9; border-left-color: rgb(191, 202, 218); border-left-style: solid; border-left-width: 8px; margin: 10px; outline: 0px; padding: 10px;&quot;&gt;
&lt;ul style=&quot;margin: 0px 10px 10px 20px; outline: 0px; padding: 0px 0px 0px 5px;&quot;&gt;
&lt;li style=&quot;margin: 0px; outline: 0px; padding: 0px;&quot;&gt;&lt;span style=&quot;font-family: inherit;&quot;&gt;env X=&quot;() { :;} ; echo shellshock&quot; /bin/sh -c &quot;echo completed&quot;&lt;/span&gt;&lt;/li&gt;
&lt;li style=&quot;margin: 0px; outline: 0px; padding: 0px;&quot;&gt;&lt;span style=&quot;font-family: inherit;&quot;&gt;env X=&quot;() { :;} ; echo shellshock&quot; `which bash` -c &quot;echo completed&quot;&lt;/span&gt;&lt;/li&gt;
&lt;/ul&gt;
&lt;/blockquote&gt;
&lt;div style=&quot;margin: 0px; outline: 0px; padding: 0px;&quot;&gt;
&lt;span style=&quot;font-family: inherit;&quot;&gt;If you see the words &quot;&lt;i style=&quot;margin: 0px; outline: 0px; padding: 0px;&quot;&gt;shellshock&lt;/i&gt;&quot; in the output, errrrr… then you are at risk.&lt;/span&gt;&lt;/div&gt;
&lt;div style=&quot;margin: 0px; outline: 0px; padding: 0px;&quot;&gt;
&lt;br style=&quot;content: &#39; &#39;; display: block; margin: 15px 0px 0px; outline: 0px; padding: 0px;&quot; /&gt;&lt;/div&gt;
&lt;div style=&quot;margin: 0px; outline: 0px; padding: 0px;&quot;&gt;
&lt;b style=&quot;margin: 0px; outline: 0px; padding: 0px;&quot;&gt;&lt;span style=&quot;font-family: inherit;&quot;&gt;BASH BUG PATCH&lt;/span&gt;&lt;/b&gt;&lt;/div&gt;
&lt;div style=&quot;margin: 0px; outline: 0px; padding: 0px;&quot;&gt;
&lt;span style=&quot;font-family: inherit;&quot;&gt;You are recommended to disable any CGI scripts that call on the shell, but it does not fully mitigate the vulnerability. Many of the major operating system and Linux distribution vendors have released the new bash software versions today, including:&lt;/span&gt;&lt;/div&gt;
&lt;div style=&quot;margin: 0px; outline: 0px; padding: 0px;&quot;&gt;
&lt;br style=&quot;content: &#39; &#39;; display: block; margin: 15px 0px 0px; outline: 0px; padding: 0px;&quot; /&gt;
&lt;ul style=&quot;margin: 0px 10px 10px 20px; outline: 0px; padding: 0px 0px 0px 5px;&quot;&gt;
&lt;li style=&quot;margin: 0px; outline: 0px; padding: 0px;&quot;&gt;&lt;span style=&quot;font-family: inherit;&quot;&gt;Red Hat Enterprise Linux (versions 4 through 7) and the Fedora distribution&lt;/span&gt;&lt;/li&gt;
&lt;li style=&quot;margin: 0px; outline: 0px; padding: 0px;&quot;&gt;&lt;span style=&quot;font-family: inherit;&quot;&gt;&lt;a href=&quot;http://lists.centos.org/pipermail/centos/2014-September/146099.html&quot; rel=&quot;nofollow&quot; style=&quot;color: #3d5a99; font-weight: bold; margin: 0px; outline: none; padding: 0px;&quot; target=&quot;_blank&quot;&gt;CentOS&lt;/a&gt;&amp;nbsp;(versions 5 through 7)&lt;/span&gt;&lt;/li&gt;
&lt;li style=&quot;margin: 0px; outline: 0px; padding: 0px;&quot;&gt;&lt;span style=&quot;font-family: inherit;&quot;&gt;&lt;a href=&quot;http://www.ubuntu.com/usn/usn-2362-1/&quot; rel=&quot;nofollow&quot; style=&quot;color: #3d5a99; font-weight: bold; margin: 0px; outline: none; padding: 0px;&quot; target=&quot;_blank&quot;&gt;Ubuntu&lt;/a&gt;&amp;nbsp;10.04 LTS, 12.04 LTS, and 14.04 LTS&lt;/span&gt;&lt;/li&gt;
&lt;li style=&quot;margin: 0px; outline: 0px; padding: 0px;&quot;&gt;&lt;a href=&quot;https://lists.debian.org/debian-security-announce/2014/msg00220.html&quot; rel=&quot;nofollow&quot; style=&quot;color: #3d5a99; font-weight: bold; margin: 0px; outline: none; padding: 0px;&quot; target=&quot;_blank&quot;&gt;&lt;span style=&quot;font-family: inherit;&quot;&gt;Debian&lt;/span&gt;&lt;/a&gt;&lt;/li&gt;
&lt;/ul&gt;
&lt;/div&gt;
&lt;div style=&quot;margin: 0px; outline: 0px; padding: 0px;&quot;&gt;
&lt;span style=&quot;font-family: inherit;&quot;&gt;If your system is vulnerable to bash bug, then you are highly recommended to upgrade your bash software package as soon as possible.&lt;/span&gt;&lt;/div&gt;
&lt;/div&gt;
&lt;/div&gt;
&lt;/div&gt;
&lt;span style=&quot;font-family: inherit;&quot;&gt;&lt;br /&gt;
More &lt;a href=&quot;https://www.invisiblethreat.ca/2014/09/cve-2014-6271/&quot;&gt;here&lt;/a&gt;&lt;/span&gt;</description><link>http://voovodenet.blogspot.com/2014/09/cve-2014-6271-shellshock.html</link><author>noreply@blogger.com (Alex Gkiouros)</author><media:thumbnail xmlns:media="http://search.yahoo.com/mrss/" url="https://blogger.googleusercontent.com/img/b/R29vZ2xl/AVvXsEgrtupWHLBtASQ06aXEp-cKfmWXIuihxEW-VbrZ3K3PBv_Pv5OhXmUqOQxVg7AcwMKOQ7pP3Hs3V_9FV3lwdATgUejK7GojxeQUoePV7-r7M2pdnpWaFK_JSXqNGGNRc0CqI4w15RatQfE/s72-c/bash-shellshock.png" height="72" width="72"/><thr:total>0</thr:total></item><item><guid isPermaLink="false">tag:blogger.com,1999:blog-8242660268174464742.post-8586283064717582255</guid><pubDate>Wed, 23 Jul 2014 12:19:00 +0000</pubDate><atom:updated>2014-07-23T15:19:06.258+03:00</atom:updated><title>Kali Linux - Assuring Security by Penetration Testing</title><description>&lt;blockquote class=&quot;tr_bq&quot;&gt;
&lt;span style=&quot;background-color: white; color: #141823; font-family: Helvetica, Arial, &#39;lucida grande&#39;, tahoma, verdana, arial, sans-serif; font-size: 14px; line-height: 19.31999969482422px;&quot;&gt;Interested about&amp;nbsp;&lt;/span&gt;&lt;a class=&quot;_58cn&quot; data-ft=&quot;{&amp;quot;tn&amp;quot;:&amp;quot;*N&amp;quot;,&amp;quot;type&amp;quot;:104}&quot; href=&quot;https://www.facebook.com/hashtag/security?source=feed_text&amp;amp;story_id=671046466312963&quot; style=&quot;background-color: white; color: #3b5998; cursor: pointer; font-family: Helvetica, Arial, &#39;lucida grande&#39;, tahoma, verdana, arial, sans-serif; font-size: 14px; line-height: 19.31999969482422px; text-decoration: none;&quot;&gt;&lt;span class=&quot;_58cl&quot; style=&quot;color: #6d84b4;&quot;&gt;‪#‎&lt;/span&gt;&lt;span class=&quot;_58cm&quot;&gt;security‬&lt;/span&gt;&lt;/a&gt;&lt;span style=&quot;background-color: white; color: #141823; font-family: Helvetica, Arial, &#39;lucida grande&#39;, tahoma, verdana, arial, sans-serif; font-size: 14px; line-height: 19.31999969482422px;&quot;&gt;? A big fan of&amp;nbsp;&lt;/span&gt;&lt;a class=&quot;_58cn&quot; data-ft=&quot;{&amp;quot;tn&amp;quot;:&amp;quot;*N&amp;quot;,&amp;quot;type&amp;quot;:104}&quot; href=&quot;https://www.facebook.com/hashtag/kali?source=feed_text&amp;amp;story_id=671046466312963&quot; style=&quot;background-color: white; color: #3b5998; cursor: pointer; font-family: Helvetica, Arial, &#39;lucida grande&#39;, tahoma, verdana, arial, sans-serif; font-size: 14px; line-height: 19.31999969482422px; text-decoration: none;&quot;&gt;&lt;span class=&quot;_58cl&quot; style=&quot;color: #6d84b4;&quot;&gt;‪#‎&lt;/span&gt;&lt;span class=&quot;_58cm&quot;&gt;kali‬&lt;/span&gt;&lt;/a&gt;&lt;span style=&quot;background-color: white; color: #141823; font-family: Helvetica, Arial, &#39;lucida grande&#39;, tahoma, verdana, arial, sans-serif; font-size: 14px; line-height: 19.31999969482422px;&quot;&gt;&amp;nbsp;linux?&lt;/span&gt;&lt;span style=&quot;background-color: white; color: #141823; font-family: Helvetica, Arial, &#39;lucida grande&#39;, tahoma, verdana, arial, sans-serif; font-size: 14px; line-height: 19.31999969482422px;&quot;&gt;Stay tuned with this amazing book from PacktPub.&lt;/span&gt;&lt;a href=&quot;http://goo.gl/TQ80h3&quot; rel=&quot;nofollow&quot; style=&quot;background-color: white; color: #3b5998; cursor: pointer; font-family: Helvetica, Arial, &#39;lucida grande&#39;, tahoma, verdana, arial, sans-serif; font-size: 14px; line-height: 19.31999969482422px; text-decoration: none;&quot; target=&quot;_blank&quot;&gt;http://goo.gl/TQ80h3&lt;/a&gt;&lt;/blockquote&gt;
This is what i posted today on my social networks, all about a perfect book.&lt;br /&gt;
&lt;br /&gt;
&lt;div class=&quot;separator&quot; style=&quot;clear: both; text-align: center;&quot;&gt;
&lt;a href=&quot;https://blogger.googleusercontent.com/img/b/R29vZ2xl/AVvXsEhDkdRDAMnhlqCps0e6Zo8U3q5xW0IoUYggXbBqShOjBSeNyUS7FNkYkcXXKkrJpgeKR5wpsGL6Bbz_JwdYETpxzzffch8-vxNmUtPUaDErpptnOprEjmMs2gaezpTiCEYVz2Y7wPGGBv8/s1600/Kali+Linux.JPG&quot; imageanchor=&quot;1&quot; style=&quot;margin-left: 1em; margin-right: 1em; text-align: center;&quot;&gt;&lt;img border=&quot;0&quot; src=&quot;https://blogger.googleusercontent.com/img/b/R29vZ2xl/AVvXsEhDkdRDAMnhlqCps0e6Zo8U3q5xW0IoUYggXbBqShOjBSeNyUS7FNkYkcXXKkrJpgeKR5wpsGL6Bbz_JwdYETpxzzffch8-vxNmUtPUaDErpptnOprEjmMs2gaezpTiCEYVz2Y7wPGGBv8/s1600/Kali+Linux.JPG&quot; height=&quot;320&quot; width=&quot;258&quot; /&gt;&lt;/a&gt;&lt;/div&gt;
&lt;div class=&quot;separator&quot; style=&quot;clear: both; text-align: center;&quot;&gt;
&lt;br /&gt;&lt;/div&gt;
&lt;div class=&quot;separator&quot; style=&quot;clear: both; text-align: left;&quot;&gt;
This is a book where i chose to be a reviewer.&lt;br /&gt;Excellent content inside, have a look on &lt;a href=&quot;http://www.amazon.com/Kali-Linux-Assuring-Security-Penetration/dp/184951948X/ref=sr_1_1?ie=UTF8&amp;amp;qid=1402560333&amp;amp;sr=8-1&amp;amp;keywords=Kali+Linux+%E2%80%93+Assuring+Security+by+Penetration+Testing&quot;&gt;Amazon&lt;/a&gt;&amp;nbsp;or on the publisher&#39;s website, &lt;a href=&quot;http://goo.gl/TQ80h3&quot;&gt;PacktPub&lt;/a&gt;.&lt;/div&gt;
</description><link>http://voovodenet.blogspot.com/2014/07/kali-linux-assuring-security-by.html</link><author>noreply@blogger.com (Alex Gkiouros)</author><media:thumbnail xmlns:media="http://search.yahoo.com/mrss/" url="https://blogger.googleusercontent.com/img/b/R29vZ2xl/AVvXsEhDkdRDAMnhlqCps0e6Zo8U3q5xW0IoUYggXbBqShOjBSeNyUS7FNkYkcXXKkrJpgeKR5wpsGL6Bbz_JwdYETpxzzffch8-vxNmUtPUaDErpptnOprEjmMs2gaezpTiCEYVz2Y7wPGGBv8/s72-c/Kali+Linux.JPG" height="72" width="72"/><thr:total>0</thr:total></item><item><guid isPermaLink="false">tag:blogger.com,1999:blog-8242660268174464742.post-8036907068854246975</guid><pubDate>Wed, 19 Feb 2014 12:27:00 +0000</pubDate><atom:updated>2014-02-26T13:36:45.635+02:00</atom:updated><category domain="http://www.blogger.com/atom/ns#">Engineering</category><category domain="http://www.blogger.com/atom/ns#">GoBack</category><category domain="http://www.blogger.com/atom/ns#">Hacking</category><category domain="http://www.blogger.com/atom/ns#">Norton</category><category domain="http://www.blogger.com/atom/ns#">OllyDbg</category><category domain="http://www.blogger.com/atom/ns#">Reverse</category><title>Reverse Engineering - Hack Norton GoBack</title><description>&lt;div class=&quot;separator&quot; style=&quot;clear: both; text-align: center;&quot;&gt;
&lt;a href=&quot;https://blogger.googleusercontent.com/img/b/R29vZ2xl/AVvXsEgIqsKxCDB7olyamsgnYsBraAZbMLESPkIM2S0ePtWCTP0qbqw3DBWOy5fluqb1Y2IOCuM_9a3mSm12ZDiJ-ILfSx1F6k_VBlXsdnOJWvnDvyME3M-N3v2RCIpjN3YNAU9Og_mjpZc6faM/s1600/Northon-GoBack.jpg&quot; imageanchor=&quot;1&quot; style=&quot;clear: left; float: left; margin-bottom: 1em; margin-right: 1em;&quot;&gt;&lt;img border=&quot;0&quot; src=&quot;https://blogger.googleusercontent.com/img/b/R29vZ2xl/AVvXsEgIqsKxCDB7olyamsgnYsBraAZbMLESPkIM2S0ePtWCTP0qbqw3DBWOy5fluqb1Y2IOCuM_9a3mSm12ZDiJ-ILfSx1F6k_VBlXsdnOJWvnDvyME3M-N3v2RCIpjN3YNAU9Og_mjpZc6faM/s1600/Northon-GoBack.jpg&quot; height=&quot;200&quot; width=&quot;143&quot; /&gt;&lt;/a&gt;&lt;/div&gt;
That was an old trick i used as a PoC to some of my fellas, some years ago in a net station : &amp;gt;&amp;nbsp;This hack will definitely get you out of shit. Especially when you&#39;re in troubles!&lt;br /&gt;
&lt;br /&gt;
&lt;b&gt;1.&lt;/b&gt; Run OllyDbg, open file GBOption.exe in &quot;%Program Files%\Norton GoBack&quot;.&lt;br /&gt;
&lt;br /&gt;
&lt;b&gt;2.&lt;/b&gt; Hit F9 in OllyDbg. The Norton GoBack Options will appear.&lt;br /&gt;
Choose 2nd tab, click &quot;Change Level...&quot;. A window to change level for each action will appear: enable/disable, uninstall, autobackup... There are three levels: ADMIN, USER and NONE. By default, the level for uninstall is ADMIN, mean that you must have administrator password in order to uninstall it.&lt;br /&gt;
&lt;br /&gt;
&lt;b&gt;3.&lt;/b&gt; Return to OllyDbg, jump to address &lt;b&gt;0x0043697D &lt;/b&gt;by pressing Ctrl+G, enter address in it and click OK. Then you will notice these addresses below:&lt;br /&gt;
&lt;blockquote class=&quot;tr_bq&quot;&gt;
00436970 &amp;gt; 8B0D A8964700 MOV ECX,DWORD PTR DS:[4796A8]&lt;br /&gt;
00436976 . 50 PUSH EAX&lt;br /&gt;
00436977 . 51 PUSH ECX&lt;br /&gt;
00436978 . E8 93E9FFFF CALL GBOption.00435310&lt;br /&gt;
0043697D . 83C4 08 ADD ESP,8&lt;br /&gt;
00436980 . 85C0 TEST EAX,EAX&lt;br /&gt;
00436982 . 0F954424 0F SETNE BYTE PTR SS:[ESP+F]&lt;/blockquote&gt;
The address which GoBack uses to check administrator password is &lt;b&gt;0x00436978&lt;/b&gt;. This function will always return false because we&#39;re missing the password... So we will set a breakpoint in address &lt;b&gt;0x0043697D &lt;/b&gt;to change its return value by pressing F2. Then the line will change red.&lt;br /&gt;
&lt;br /&gt;
&lt;b&gt;4.&lt;/b&gt; Enter any pass you want and return to Norton GoBack Options, click OK, it will ask for the administrator password, enter anything you want and press OK. Now, the control is changed to OllyDgb, it ran to address where I set breakpoint and paused. Look in the registers window of OllyDbg, you&#39;ll see&amp;nbsp;&lt;b&gt;EAX = 0x00000090&lt;/b&gt;. Double click to it, change &lt;b&gt;EAX &lt;/b&gt;to &lt;b&gt;0x00000000 &lt;/b&gt;and press F9 to continue. Now you&#39;ll see that no warning message was shown.&lt;br /&gt;
&lt;br /&gt;
Voila! Owned....</description><link>http://voovodenet.blogspot.com/2014/02/reverse-engineering-hack-norton-goback.html</link><author>noreply@blogger.com (Alex Gkiouros)</author><media:thumbnail xmlns:media="http://search.yahoo.com/mrss/" url="https://blogger.googleusercontent.com/img/b/R29vZ2xl/AVvXsEgIqsKxCDB7olyamsgnYsBraAZbMLESPkIM2S0ePtWCTP0qbqw3DBWOy5fluqb1Y2IOCuM_9a3mSm12ZDiJ-ILfSx1F6k_VBlXsdnOJWvnDvyME3M-N3v2RCIpjN3YNAU9Og_mjpZc6faM/s72-c/Northon-GoBack.jpg" height="72" width="72"/><thr:total>0</thr:total></item><item><guid isPermaLink="false">tag:blogger.com,1999:blog-8242660268174464742.post-1948399319237288395</guid><pubDate>Wed, 12 Feb 2014 20:42:00 +0000</pubDate><atom:updated>2014-02-12T22:42:09.295+02:00</atom:updated><category domain="http://www.blogger.com/atom/ns#">Helpdesk</category><category domain="http://www.blogger.com/atom/ns#">IT</category><category domain="http://www.blogger.com/atom/ns#">Tips</category><category domain="http://www.blogger.com/atom/ns#">Users</category><title>Keep users happy: Don`t call them users.</title><description>&lt;div style=&quot;background-color: white; font-family: Arial, FreeSans, Helvetica, sans-serif; font-size: 14px; line-height: 21px;&quot;&gt;
&lt;strong class=&quot;trailer&quot; style=&quot;padding-right: 0.25em;&quot;&gt;Sysadmin blog&lt;/strong&gt;&amp;nbsp;A common complaint about IT staff is their lack of social skills. As in any industry that attracts a certain type of person, there&#39;s a high percentage of dark-room-dwelling people who can sometimes struggle to communicate. This is either through what they say or how they interact with others.&lt;/div&gt;
&lt;div style=&quot;background-color: white; font-family: Arial, FreeSans, Helvetica, sans-serif; font-size: 14px; line-height: 21px;&quot;&gt;
Not all IT people are like this of course, just as nurses are not all popping out of their skimpy outfits and pool cleaners don&#39;t universally have a mustache and manage to find themselves in many interesting and awkward situations.&lt;/div&gt;
&lt;div class=&quot;article_side_content&quot; style=&quot;background-color: white; font-family: Arial, FreeSans, Helvetica, sans-serif; font-size: 14px; line-height: 21px;&quot;&gt;
&lt;div id=&quot;article-mpu-container&quot;&gt;
&lt;div class=&quot;adu&quot; id=&quot;ad-mu1-spot&quot; style=&quot;margin: 0px auto 1em; text-align: center;&quot;&gt;
&lt;/div&gt;
&lt;/div&gt;
&lt;/div&gt;
&lt;div class=&quot;separator&quot; style=&quot;clear: both; text-align: center;&quot;&gt;
&lt;a href=&quot;https://blogger.googleusercontent.com/img/b/R29vZ2xl/AVvXsEjHwZAmxq4S_XNxObyym8z2uSANlOBd7c9qOWisn9Z-5Ny2QiJTZNM5uTmmG8v_BGO3N5gz97Eo566fIPfMbbm_Pr7N5G9vmrn38cmj9SQupWFgZKECp9CKid8YT96AbE7oGKhOhVes374/s1600/happy-user%5B1%5D.png&quot; imageanchor=&quot;1&quot; style=&quot;margin-left: 1em; margin-right: 1em;&quot;&gt;&lt;img border=&quot;0&quot; src=&quot;https://blogger.googleusercontent.com/img/b/R29vZ2xl/AVvXsEjHwZAmxq4S_XNxObyym8z2uSANlOBd7c9qOWisn9Z-5Ny2QiJTZNM5uTmmG8v_BGO3N5gz97Eo566fIPfMbbm_Pr7N5G9vmrn38cmj9SQupWFgZKECp9CKid8YT96AbE7oGKhOhVes374/s1600/happy-user%5B1%5D.png&quot; height=&quot;305&quot; width=&quot;320&quot; /&gt;&lt;/a&gt;&lt;/div&gt;
&lt;div style=&quot;background-color: white; font-family: Arial, FreeSans, Helvetica, sans-serif; font-size: 14px; line-height: 21px;&quot;&gt;
&lt;br /&gt;&lt;/div&gt;
&lt;div style=&quot;background-color: white; font-family: Arial, FreeSans, Helvetica, sans-serif; font-size: 14px; line-height: 21px;&quot;&gt;
&lt;br /&gt;&lt;/div&gt;
&lt;div style=&quot;background-color: white; font-family: Arial, FreeSans, Helvetica, sans-serif; font-size: 14px; line-height: 21px;&quot;&gt;
There are some guidelines I can recommend based on many years of personal experience, as well as observing others.&lt;/div&gt;
&lt;div style=&quot;background-color: white; font-family: Arial, FreeSans, Helvetica, sans-serif; font-size: 14px; line-height: 21px;&quot;&gt;
&lt;b&gt;Helpdesk 101:&lt;/b&gt;&amp;nbsp;Never trust the user. When a user tells you something is happening, see it for yourself. Think of this situation as if they just watched a doctor perform brain surgery, then had to summarise what happened. They&#39;re going to make guesses and assumptions on the bits they don&#39;t understand. Once you see the issue for yourself, then start the troubleshooting. There is no point spending hours chasing a dragon to slay if the dragon turns out to be a funny-shaped rock. Ask to see that error message or recreate the issue.&lt;/div&gt;
&lt;div style=&quot;background-color: white; font-family: Arial, FreeSans, Helvetica, sans-serif; font-size: 14px; line-height: 21px;&quot;&gt;
&lt;b&gt;Don&#39;t call them &#39;users&#39;:&lt;/b&gt;&amp;nbsp;IT staff can often forget they&#39;re in a position of service. Nobody likes getting bad service; it doesn&#39;t matter if it&#39;s the 15-year-old at your local fast food restaurant or a rude doctor. This means respecting every person you deal with. &quot;User&quot; is a technical word and should not be used outside of technical circles - people want to feel like people. Generally I would recommend calling them &quot;staff&quot; for internal people, and &quot;clients&quot; for external people – a good guide is to use the same term as other departments with their communications.&lt;/div&gt;
&lt;div style=&quot;background-color: white; font-family: Arial, FreeSans, Helvetica, sans-serif; font-size: 14px; line-height: 21px;&quot;&gt;
&lt;b&gt;Turn a &quot;no&quot; into an alternative solution:&lt;/b&gt;&amp;nbsp;Everyone gets questions that should receive a negative answer, but when someone reaches out for help, that&#39;s the last thing they want to hear. &quot;Can I plug in my personal laptop and use it at work?&quot; usually comes under that category. The answer should be an alternative solution to their problem. Maybe they can do everything over the internet from that laptop, or they just need to get some files off, which could be done via USB storage.&lt;/div&gt;
&lt;div style=&quot;background-color: white; font-family: Arial, FreeSans, Helvetica, sans-serif; font-size: 14px; line-height: 21px;&quot;&gt;
Often people will ask for something they&amp;nbsp;&lt;i&gt;think&lt;/i&gt;&amp;nbsp;is the best solution to their problem, which means more questions need to be asked to find out what they are actually trying to accomplish.&lt;/div&gt;
&lt;div style=&quot;background-color: white; font-family: Arial, FreeSans, Helvetica, sans-serif; font-size: 14px; line-height: 21px;&quot;&gt;
&lt;b&gt;Good communication:&lt;/b&gt;&amp;nbsp;Keep people updated. Let them know someone is working on their issue. Let everyone know of outages and resolutions by whatever notification method works the best. Check if people want more assistance, or to be left alone. Follow-ups should always be done; all users should be notified somehow that their issue or request has been addressed.&lt;/div&gt;
&lt;div style=&quot;background-color: white; font-family: Arial, FreeSans, Helvetica, sans-serif; font-size: 14px; line-height: 21px;&quot;&gt;
&lt;b&gt;Adaptation:&lt;/b&gt;&amp;nbsp;Some users want to know every intricate detail about their brand new laptop and how to use all the fancy new options. Others will want the laptop left on their desk without a word. Part of adaptation is reading people and asking the right questions, and the other half is leading them down the path that actually helps them more.&lt;/div&gt;
&lt;div style=&quot;background-color: white; font-family: Arial, FreeSans, Helvetica, sans-serif; font-size: 14px; line-height: 21px;&quot;&gt;
You can&#39;t hassle that person who wants to be left alone, but if there&#39;s one important nugget of information, you need to get that across somehow. Just wiping your hands clean and walking away won&#39;t help: if they don&#39;t know their password was reset, they&#39;ll just get angry and think you&#39;re useless at your job.&lt;/div&gt;
&lt;div style=&quot;background-color: white; font-family: Arial, FreeSans, Helvetica, sans-serif; font-size: 14px; line-height: 21px;&quot;&gt;
This might all sound like common sense to many, but it takes a lot of time to build up trust with your userbase, while only a few slip-ups can completely destroy it. You&#39;re there to assist the business, and that often doesn&#39;t align with an individual&#39;s particular request, but part of your job should be to keep both sides happy.&lt;/div&gt;
&lt;div style=&quot;background-color: white; font-family: Arial, FreeSans, Helvetica, sans-serif; font-size: 14px; line-height: 21px;&quot;&gt;
&lt;br /&gt;&lt;/div&gt;
&lt;div style=&quot;background-color: white; font-family: Arial, FreeSans, Helvetica, sans-serif; font-size: 14px; line-height: 21px;&quot;&gt;
&lt;a href=&quot;http://www.theregister.co.uk/2013/10/28/feature_sysadmins_are_people_too/&quot;&gt;Source&lt;/a&gt;&lt;/div&gt;
</description><link>http://voovodenet.blogspot.com/2014/02/keep-users-happy-dont-call-them-users.html</link><author>noreply@blogger.com (Alex Gkiouros)</author><media:thumbnail xmlns:media="http://search.yahoo.com/mrss/" url="https://blogger.googleusercontent.com/img/b/R29vZ2xl/AVvXsEjHwZAmxq4S_XNxObyym8z2uSANlOBd7c9qOWisn9Z-5Ny2QiJTZNM5uTmmG8v_BGO3N5gz97Eo566fIPfMbbm_Pr7N5G9vmrn38cmj9SQupWFgZKECp9CKid8YT96AbE7oGKhOhVes374/s72-c/happy-user%5B1%5D.png" height="72" width="72"/><thr:total>0</thr:total></item><item><guid isPermaLink="false">tag:blogger.com,1999:blog-8242660268174464742.post-6222845920988639375</guid><pubDate>Mon, 20 Jan 2014 13:08:00 +0000</pubDate><atom:updated>2014-01-20T15:08:08.716+02:00</atom:updated><category domain="http://www.blogger.com/atom/ns#">bug</category><category domain="http://www.blogger.com/atom/ns#">fix</category><category domain="http://www.blogger.com/atom/ns#">Windows</category><title>Windows XP svchost bug - finally a fix</title><description>&lt;div class=&quot;separator&quot; style=&quot;clear: both; text-align: center;&quot;&gt;
&lt;a href=&quot;https://blogger.googleusercontent.com/img/b/R29vZ2xl/AVvXsEgK0PLKxkOtsMOFOYBOr18vR5HKEEWnSiLbRDfZPw6gfp9AxcC3oQSY0qWxrZ9knNnIrhm8TmUrg5wF7h6P-oQzQdO96QX_kmy1O88_JDVIk0g-f1nLBNhfC72aiMRH_F0uniRAjtQpNvU/s1600/microsoftwindowsxp2gn.png&quot; imageanchor=&quot;1&quot; style=&quot;margin-left: 1em; margin-right: 1em;&quot;&gt;&lt;img border=&quot;0&quot; src=&quot;https://blogger.googleusercontent.com/img/b/R29vZ2xl/AVvXsEgK0PLKxkOtsMOFOYBOr18vR5HKEEWnSiLbRDfZPw6gfp9AxcC3oQSY0qWxrZ9knNnIrhm8TmUrg5wF7h6P-oQzQdO96QX_kmy1O88_JDVIk0g-f1nLBNhfC72aiMRH_F0uniRAjtQpNvU/s1600/microsoftwindowsxp2gn.png&quot; height=&quot;233&quot; width=&quot;320&quot; /&gt;&lt;/a&gt;&lt;/div&gt;
&lt;br /&gt;
For the past several months, we have been checking on a bug in Windows XP that has caused SVCHOST to push the CPU of a PC up to 100 percent usage for some users. Microsoft tried in November to fix the issue but was unsuccessful. However, the company pledged to continue to work on fixing the bug, which it stated was due to &quot;Windows Update Agent processing long lists of superseded updates.&quot;&lt;br /&gt;
&lt;br /&gt;
On Tuesday, Microsoft depreciated legacy security updates for Internet Explorer that had been replaced by more recent ones. We did this to improve customer experience, reducing the time Windows Update requires to check existing updates before installing new ones. This action was purely to improve update performance and does not affect customer security.&lt;br /&gt;
&lt;br /&gt;
The update came less than three months before all software patches for Windows XP from Microsoft will end on April 8th, although the company will continue to provide antivirus signatures for the OS until July 2015.</description><link>http://voovodenet.blogspot.com/2014/01/windows-xp-svchost-bug-finally-fix.html</link><author>noreply@blogger.com (Alex Gkiouros)</author><media:thumbnail xmlns:media="http://search.yahoo.com/mrss/" url="https://blogger.googleusercontent.com/img/b/R29vZ2xl/AVvXsEgK0PLKxkOtsMOFOYBOr18vR5HKEEWnSiLbRDfZPw6gfp9AxcC3oQSY0qWxrZ9knNnIrhm8TmUrg5wF7h6P-oQzQdO96QX_kmy1O88_JDVIk0g-f1nLBNhfC72aiMRH_F0uniRAjtQpNvU/s72-c/microsoftwindowsxp2gn.png" height="72" width="72"/><thr:total>0</thr:total></item><item><guid isPermaLink="false">tag:blogger.com,1999:blog-8242660268174464742.post-6099787182317586811</guid><pubDate>Tue, 24 Dec 2013 11:17:00 +0000</pubDate><atom:updated>2013-12-24T13:17:24.348+02:00</atom:updated><category domain="http://www.blogger.com/atom/ns#">Fixes</category><category domain="http://www.blogger.com/atom/ns#">HP</category><category domain="http://www.blogger.com/atom/ns#">Microserver</category><category domain="http://www.blogger.com/atom/ns#">Networking</category><category domain="http://www.blogger.com/atom/ns#">Server</category><category domain="http://www.blogger.com/atom/ns#">Windows</category><title>Windows Server 2012 R2 &amp; HP Proliant Microserver</title><description>Windows Server 2012 R2 hangs on &#39;&lt;b&gt;Getting devices ready 84%&lt;/b&gt;&#39;&lt;br /&gt;
Fails to Complete the installation on HP MicroServer Gen7 (N36L, N40L &amp;amp; N54L)&lt;br /&gt;
&lt;div class=&quot;separator&quot; style=&quot;clear: both; text-align: center;&quot;&gt;
&lt;a href=&quot;https://blogger.googleusercontent.com/img/b/R29vZ2xl/AVvXsEh2h3qfB3HvCZiCVkRaMmEGrD06PtwcL_EnyqKYLbX0LFo46sueE48CtrMFKc5_50gYoKCOLDvbkXCuygfQvSm9NBco5fLundzQnAuLbx7qykcwuaWe4VVQTeEHPUU-_Amoec8uba_c-1A/s1600/c03690405.png&quot; imageanchor=&quot;1&quot; style=&quot;margin-left: 1em; margin-right: 1em;&quot;&gt;&lt;img border=&quot;0&quot; src=&quot;https://blogger.googleusercontent.com/img/b/R29vZ2xl/AVvXsEh2h3qfB3HvCZiCVkRaMmEGrD06PtwcL_EnyqKYLbX0LFo46sueE48CtrMFKc5_50gYoKCOLDvbkXCuygfQvSm9NBco5fLundzQnAuLbx7qykcwuaWe4VVQTeEHPUU-_Amoec8uba_c-1A/s1600/c03690405.png&quot; height=&quot;240&quot; width=&quot;320&quot; /&gt;&lt;/a&gt;&lt;/div&gt;
The MicroServer N36, N40L and N54L all share the same embedded NC107i PCI Express gigabit NIC. The NC107i uses the Broadcom BCM5723 chip which doesn’t have an updated driver included with the Server 2012 R2 installation media. The lack of drivers will get you stuck at 84%...&lt;br /&gt;
&lt;br /&gt;
The current workaround is to disable the on-board NIC and install another card.&lt;br /&gt;
Flash the custom BIOS to unlock the hidden BIOS screens&lt;br /&gt;
Install a supported NIC in the PCIe slot (Joe used the Intel EXPI9301CTBLK&lt;br /&gt;
Go into the BIOS and change the settings to match&lt;br /&gt;
Boot Settings -&amp;gt; Embedded NIC Port 1 Control – [Disabled]&lt;br /&gt;
Boot Settings -&amp;gt; Wake-On LAN – [Disabled]&lt;br /&gt;
Chipset -&amp;gt; Atheros AR8132M NIC – [Disabled]&lt;br /&gt;
After a reboot, Server 2012 R2 should install fine.&lt;br /&gt;
&lt;br /&gt;
Fall back to R1 or...., here&#39;s a solution for you!&lt;br /&gt;
&lt;br /&gt;
Download &lt;a href=&quot;http://h20565.www2.hp.com/portal/site/hpsc/template.PAGE/public/psi/swdDetails/?javax.portlet.begCacheTok=com.vignette.cachetoken&amp;amp;javax.portlet.endCacheTok=com.vignette.cachetoken&amp;amp;javax.portlet.prp_bd9b6997fbc7fc515f4cf4626f5c8d01=wsrp-navigationalState%3Didx%253D%257CswItem%253DMTX_138a4027261540ee83265cf73e%257CswEnvOID%253D4139%257CitemLocale%253D%257CswLang%253D%257Cmode%253D%257Caction%253DdriverDocument&amp;amp;javax.portlet.tpst=bd9b6997fbc7fc515f4cf4626f5c8d01&amp;amp;sp4ts.oid=4310887&amp;amp;ac.admitted=1387883073224.876444892.492883150&quot;&gt;this&lt;/a&gt;&amp;nbsp;driver and add it to the &lt;b&gt;$WinPEDriver$&lt;/b&gt; folder of your media installation kit.&lt;br /&gt;
Disable Embedded NIC Port 1 Control in BIOS&lt;br /&gt;
Install Windows Server 2012 R2&lt;br /&gt;
Add a Server name&lt;br /&gt;
Reboot into BIOS to Enable the NIC&lt;br /&gt;
This should get you working, have fun!&lt;br /&gt;
&lt;br /&gt;
HP have documented this as a known issue and are currently working with Microsoft to resolve prior to the official release of R2.</description><link>http://voovodenet.blogspot.com/2013/12/windows-server-2012-r2-hp-proliant.html</link><author>noreply@blogger.com (Alex Gkiouros)</author><media:thumbnail xmlns:media="http://search.yahoo.com/mrss/" url="https://blogger.googleusercontent.com/img/b/R29vZ2xl/AVvXsEh2h3qfB3HvCZiCVkRaMmEGrD06PtwcL_EnyqKYLbX0LFo46sueE48CtrMFKc5_50gYoKCOLDvbkXCuygfQvSm9NBco5fLundzQnAuLbx7qykcwuaWe4VVQTeEHPUU-_Amoec8uba_c-1A/s72-c/c03690405.png" height="72" width="72"/><thr:total>0</thr:total></item><item><guid isPermaLink="false">tag:blogger.com,1999:blog-8242660268174464742.post-7166694646484105084</guid><pubDate>Thu, 12 Dec 2013 18:51:00 +0000</pubDate><atom:updated>2013-12-12T20:51:42.532+02:00</atom:updated><category domain="http://www.blogger.com/atom/ns#">Infographic</category><category domain="http://www.blogger.com/atom/ns#">Sales</category><category domain="http://www.blogger.com/atom/ns#">Smartphones</category><title>Global Smartphone Sales</title><description>&lt;div class=&quot;separator&quot; style=&quot;clear: both; text-align: left;&quot;&gt;
&lt;a href=&quot;https://blogger.googleusercontent.com/img/b/R29vZ2xl/AVvXsEg5dH15hWjwtsi-cHUrVgHKVZyZoapIuRIIcZLbbTvtefmof5qb3yL4st5JiMirqHOzufbYFQ3k6GS5vLZMnfV63sGNJ6yNG8xfTgVrv9BtzuTdKhSD7ceb55TR5kM3ufUT7bd50_4YVXE/s1600/Global-Smartphone-Sales7.jpg&quot; imageanchor=&quot;1&quot; style=&quot;clear: left; float: left; margin-bottom: 1em; margin-right: 1em;&quot;&gt;&lt;img border=&quot;0&quot; src=&quot;https://blogger.googleusercontent.com/img/b/R29vZ2xl/AVvXsEg5dH15hWjwtsi-cHUrVgHKVZyZoapIuRIIcZLbbTvtefmof5qb3yL4st5JiMirqHOzufbYFQ3k6GS5vLZMnfV63sGNJ6yNG8xfTgVrv9BtzuTdKhSD7ceb55TR5kM3ufUT7bd50_4YVXE/s1600/Global-Smartphone-Sales7.jpg&quot; height=&quot;148&quot; width=&quot;320&quot; /&gt;&lt;/a&gt;CouponAudit infographic.&lt;/div&gt;
&lt;br /&gt;
&lt;br /&gt;
&lt;img alt=&quot;Global Smartphone Sales&quot; src=&quot;http://www.couponaudit.com/blog/wp-content/uploads/2013/11/Global-Smartphone-Sales7.jpg&quot; style=&quot;max-width: 100%;&quot; /&gt;&lt;br /&gt;
This Infographic is produced by &lt;a href=&quot;http://www.couponaudit.com/coupons/zappos&quot;&gt;Coupon Audit (provides Zappos coupon code) &lt;/a&gt; and &lt;a href=&quot;http://www.voovode.net/&quot;&gt;VoovodeNET&lt;/a&gt;&lt;br /&gt;
&lt;textarea cols=&quot;50&quot; rows=&quot;5&quot; style=&quot;height: 88px; margin: 2px; width: 653px;&quot;&gt;&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;&lt;br /&gt;
&lt;br /&gt;
&lt;img style=&quot;max-width: 100%;&quot; src=&quot;http://www.couponaudit.com/blog/wp-content/uploads/2013/11/Global-Smartphone-Sales7.jpg&quot; alt=&quot;Global Smartphone Sales&quot; /&gt;&lt;/p&gt;
&lt;br /&gt;
&lt;p&gt;
&lt;/a&gt;&lt;/p&gt;
&lt;br /&gt;
&lt;p&gt;
This Infographic is produced by &lt;a href=&quot;http://www.couponaudit.com/coupons/zappos&quot;&gt;Coupon Audit (provides Zappos coupon code) &lt;/a&gt; and &lt;a href=&quot;http://www.voovode.net&quot;&gt;Voovode&lt;/a&gt; &lt;/p&gt;
.&lt;br /&gt;&lt;br /&gt;
&lt;br /&gt;
&lt;/textarea&gt;&lt;br /&gt;
&lt;br /&gt;</description><link>http://voovodenet.blogspot.com/2013/12/global-smartphone-sales.html</link><author>noreply@blogger.com (Alex Gkiouros)</author><media:thumbnail xmlns:media="http://search.yahoo.com/mrss/" url="https://blogger.googleusercontent.com/img/b/R29vZ2xl/AVvXsEg5dH15hWjwtsi-cHUrVgHKVZyZoapIuRIIcZLbbTvtefmof5qb3yL4st5JiMirqHOzufbYFQ3k6GS5vLZMnfV63sGNJ6yNG8xfTgVrv9BtzuTdKhSD7ceb55TR5kM3ufUT7bd50_4YVXE/s72-c/Global-Smartphone-Sales7.jpg" height="72" width="72"/><thr:total>0</thr:total></item><item><guid isPermaLink="false">tag:blogger.com,1999:blog-8242660268174464742.post-8611200894190496802</guid><pubDate>Fri, 06 Dec 2013 09:09:00 +0000</pubDate><atom:updated>2013-12-06T11:21:26.458+02:00</atom:updated><category domain="http://www.blogger.com/atom/ns#">ITProDevConnections</category><category domain="http://www.blogger.com/atom/ns#">Networking</category><category domain="http://www.blogger.com/atom/ns#">security</category><title>ITProDevConnections 2013</title><description>&lt;table align=&quot;center&quot; cellpadding=&quot;0&quot; cellspacing=&quot;0&quot; class=&quot;tr-caption-container&quot; style=&quot;margin-left: auto; margin-right: auto; text-align: center;&quot;&gt;&lt;tbody&gt;
&lt;tr&gt;&lt;td style=&quot;text-align: center;&quot;&gt;&lt;a href=&quot;http://www.itprodevconnections.gr/&quot; imageanchor=&quot;1&quot; style=&quot;margin-left: auto; margin-right: auto;&quot;&gt;&lt;img alt=&quot;&quot; border=&quot;0&quot; src=&quot;https://blogger.googleusercontent.com/img/b/R29vZ2xl/AVvXsEgl_EstcQVvkDKlPota-6zahe50lAj97dvbkolW9gM_sTs1UsuY4fauuRM8Ilrv8Us31ixJmHykB3EQe0vlszP5XL1Mdutix1cstxucWvD2aaWOUCdCohk5Y5S_A8YVSMuiHV-4S2CT7Cc/s1600/1276754_646474065385166_223996349_o%5B1%5D.jpg&quot; height=&quot;146&quot; width=&quot;400&quot; /&gt;&lt;/a&gt;&lt;/td&gt;&lt;/tr&gt;
&lt;tr&gt;&lt;td class=&quot;tr-caption&quot; style=&quot;text-align: center;&quot;&gt;ITProDevConnections&lt;/td&gt;&lt;/tr&gt;
&lt;/tbody&gt;&lt;/table&gt;
&lt;div class=&quot;separator&quot; style=&quot;clear: both; text-align: center;&quot;&gt;
&lt;br /&gt;&lt;/div&gt;
&lt;div style=&quot;text-align: center;&quot;&gt;
It&#39;s time to attend a conference this weekend all about technology with my friend &lt;a href=&quot;http://www.karanik.gr/&quot;&gt;nick&lt;/a&gt;.&lt;/div&gt;
&lt;div style=&quot;text-align: center;&quot;&gt;
I`ll possibly stick to the networking &amp;amp; security area again as every year....&lt;/div&gt;
&lt;div style=&quot;text-align: center;&quot;&gt;
Hope it&#39;s gonna be good! See you on monday!&lt;/div&gt;
</description><link>http://voovodenet.blogspot.com/2013/12/itprodevconnections-2013.html</link><author>noreply@blogger.com (Alex Gkiouros)</author><media:thumbnail xmlns:media="http://search.yahoo.com/mrss/" url="https://blogger.googleusercontent.com/img/b/R29vZ2xl/AVvXsEgl_EstcQVvkDKlPota-6zahe50lAj97dvbkolW9gM_sTs1UsuY4fauuRM8Ilrv8Us31ixJmHykB3EQe0vlszP5XL1Mdutix1cstxucWvD2aaWOUCdCohk5Y5S_A8YVSMuiHV-4S2CT7Cc/s72-c/1276754_646474065385166_223996349_o%5B1%5D.jpg" height="72" width="72"/><thr:total>0</thr:total></item><item><guid isPermaLink="false">tag:blogger.com,1999:blog-8242660268174464742.post-9146067124574619019</guid><pubDate>Thu, 05 Dec 2013 19:39:00 +0000</pubDate><atom:updated>2013-12-05T21:39:29.636+02:00</atom:updated><category domain="http://www.blogger.com/atom/ns#">How-to</category><category domain="http://www.blogger.com/atom/ns#">Linux</category><category domain="http://www.blogger.com/atom/ns#">samba</category><category domain="http://www.blogger.com/atom/ns#">shares</category><category domain="http://www.blogger.com/atom/ns#">swat</category><title>Administer samba shares via SWAT</title><description>&lt;div class=&quot;separator&quot; style=&quot;clear: both; text-align: center;&quot;&gt;
&lt;/div&gt;
&lt;div class=&quot;separator&quot; style=&quot;clear: both; text-align: left;&quot;&gt;
Is it hard for you to play with smb.conf and other stuff? Are you afraid of doing any mistakes?&lt;/div&gt;
&lt;div class=&quot;separator&quot; style=&quot;clear: both; text-align: left;&quot;&gt;
Then you have to think about using swat, the samba web administration tool.&lt;/div&gt;
&lt;div class=&quot;separator&quot; style=&quot;clear: both; text-align: center;&quot;&gt;
&lt;a href=&quot;https://blogger.googleusercontent.com/img/b/R29vZ2xl/AVvXsEirsrpRgAQYB7AGQNEMlUVNWIKdphaFUIGMavQkTDoPDKddZMWEy_8kQ7eUYgISHLhtT6kJRonNcaq79FopF1gIyGuQoq9rbVB5fry9i90fl8ZCVQjhxLeXJUf9yEeKKJwdGmnwuFSl6Qs/s1600/swat.png&quot; imageanchor=&quot;1&quot; style=&quot;margin-left: 1em; margin-right: 1em;&quot;&gt;&lt;img border=&quot;0&quot; src=&quot;https://blogger.googleusercontent.com/img/b/R29vZ2xl/AVvXsEirsrpRgAQYB7AGQNEMlUVNWIKdphaFUIGMavQkTDoPDKddZMWEy_8kQ7eUYgISHLhtT6kJRonNcaq79FopF1gIyGuQoq9rbVB5fry9i90fl8ZCVQjhxLeXJUf9yEeKKJwdGmnwuFSl6Qs/s1600/swat.png&quot; /&gt;&lt;/a&gt;&lt;/div&gt;
We will first install samba, cifs-utils, swat and xinted, all needed for our SWAT installation.&lt;br /&gt;
&lt;blockquote class=&quot;tr_bq&quot;&gt;
sudo apt-get install samba cifs-utils swat xinetd&lt;/blockquote&gt;
Then we will go ahead and enable swat in our internet service deamon,&lt;br /&gt;
&lt;blockquote class=&quot;tr_bq&quot;&gt;
sudo update-inetd --enable &#39;swat&#39;&lt;br /&gt;
sudo dpkg-reconfigure xinetd&lt;/blockquote&gt;
after xinetd, we will create the swat service.&lt;br /&gt;
&lt;blockquote class=&quot;tr_bq&quot;&gt;
sudo cat &amp;gt; /etc/xinetd.d/swat &amp;lt;&amp;lt;-EOF&lt;br /&gt;service swat&lt;br /&gt;{&lt;br /&gt;port = 901&lt;br /&gt;socket_type = stream&lt;br /&gt;wait = no&lt;br /&gt;user = root&lt;br /&gt;server = /usr/sbin/swat&lt;br /&gt;log_on_failure += USERID&lt;br /&gt;disable = no&lt;br /&gt;}&lt;br /&gt;EOF&lt;/blockquote&gt;
SWAT needs to have access to the smb.conf file to edit it automatically. We will now give those permissions and restart the xinetd service:&lt;br /&gt;
&lt;blockquote class=&quot;tr_bq&quot;&gt;
sudo chmod g+w /etc/samba/smb.conf&lt;br /&gt;sudo chgrp adm /etc/samba/smb.conf&lt;br /&gt;sudo service xinetd restart&lt;/blockquote&gt;
By now you should be able to login to the administration tool via http://localhost:901/&lt;br /&gt;
Start sharing!</description><link>http://voovodenet.blogspot.com/2013/12/administer-samba-shares-via-swat.html</link><author>noreply@blogger.com (Alex Gkiouros)</author><media:thumbnail xmlns:media="http://search.yahoo.com/mrss/" url="https://blogger.googleusercontent.com/img/b/R29vZ2xl/AVvXsEirsrpRgAQYB7AGQNEMlUVNWIKdphaFUIGMavQkTDoPDKddZMWEy_8kQ7eUYgISHLhtT6kJRonNcaq79FopF1gIyGuQoq9rbVB5fry9i90fl8ZCVQjhxLeXJUf9yEeKKJwdGmnwuFSl6Qs/s72-c/swat.png" height="72" width="72"/><thr:total>0</thr:total></item><item><guid isPermaLink="false">tag:blogger.com,1999:blog-8242660268174464742.post-5795442730301953367</guid><pubDate>Thu, 05 Dec 2013 19:18:00 +0000</pubDate><atom:updated>2013-12-05T21:18:15.932+02:00</atom:updated><category domain="http://www.blogger.com/atom/ns#">entropy</category><category domain="http://www.blogger.com/atom/ns#">generate</category><category domain="http://www.blogger.com/atom/ns#">How-to</category><category domain="http://www.blogger.com/atom/ns#">Linux</category><category domain="http://www.blogger.com/atom/ns#">ssh</category><category domain="http://www.blogger.com/atom/ns#">Tips</category><title>How to generate entropy in few easy steps</title><description>You will possibly need this for a PGP key.. So how to generate entropy &lt;b&gt;through a secure shell connection&lt;/b&gt; in an easy way?&lt;br /&gt;
&lt;div class=&quot;separator&quot; style=&quot;clear: both; text-align: center;&quot;&gt;
&lt;a href=&quot;https://blogger.googleusercontent.com/img/b/R29vZ2xl/AVvXsEgsHfAzgFYbeosUY8ODzYEr_exyYH5d99AUlfLG-vY0q-DsfLnfhl4CF64vwVEi5IQ0KOU8hzBdO5RBcoG_Pr7QZ5N29X4HUOnvNiQHMoIMIRVQKSuhhXfMLcoSts8YGXQ7RMPCHdiBm0Y/s1600/PGP_logo%5B1%5D.jpg&quot; imageanchor=&quot;1&quot; style=&quot;margin-left: 1em; margin-right: 1em;&quot;&gt;&lt;img border=&quot;0&quot; src=&quot;https://blogger.googleusercontent.com/img/b/R29vZ2xl/AVvXsEgsHfAzgFYbeosUY8ODzYEr_exyYH5d99AUlfLG-vY0q-DsfLnfhl4CF64vwVEi5IQ0KOU8hzBdO5RBcoG_Pr7QZ5N29X4HUOnvNiQHMoIMIRVQKSuhhXfMLcoSts8YGXQ7RMPCHdiBm0Y/s1600/PGP_logo%5B1%5D.jpg&quot; height=&quot;109&quot; width=&quot;320&quot; /&gt;&lt;/a&gt;&lt;/div&gt;
You don`t have to smash the keyboard or move the mouse and stuff...&lt;br /&gt;
&lt;br /&gt;
Install &lt;b&gt;haveged&lt;/b&gt;, a simple entropy deamon.&lt;br /&gt;
&lt;blockquote class=&quot;tr_bq&quot;&gt;
apt-get install haveged&lt;/blockquote&gt;
then type in -w with your bits:&lt;br /&gt;
&lt;blockquote class=&quot;tr_bq&quot;&gt;
haveged -w 4096&lt;/blockquote&gt;
Now you can re-start your PGP-key entropy gatherer in order to finish quickly, right after it&#39;s done, you might consider removing haveged as i did.&lt;br /&gt;
&lt;blockquote class=&quot;tr_bq&quot;&gt;
apt-get remove haveged&lt;/blockquote&gt;
Easy eh?</description><link>http://voovodenet.blogspot.com/2013/12/how-to-generate-entropy-in-few-easy.html</link><author>noreply@blogger.com (Alex Gkiouros)</author><media:thumbnail xmlns:media="http://search.yahoo.com/mrss/" url="https://blogger.googleusercontent.com/img/b/R29vZ2xl/AVvXsEgsHfAzgFYbeosUY8ODzYEr_exyYH5d99AUlfLG-vY0q-DsfLnfhl4CF64vwVEi5IQ0KOU8hzBdO5RBcoG_Pr7QZ5N29X4HUOnvNiQHMoIMIRVQKSuhhXfMLcoSts8YGXQ7RMPCHdiBm0Y/s72-c/PGP_logo%5B1%5D.jpg" height="72" width="72"/><thr:total>0</thr:total></item><item><guid isPermaLink="false">tag:blogger.com,1999:blog-8242660268174464742.post-6292398464965936127</guid><pubDate>Fri, 29 Nov 2013 13:34:00 +0000</pubDate><atom:updated>2013-11-29T15:34:08.765+02:00</atom:updated><category domain="http://www.blogger.com/atom/ns#">APIPA</category><category domain="http://www.blogger.com/atom/ns#">DHCP</category><category domain="http://www.blogger.com/atom/ns#">How-to</category><category domain="http://www.blogger.com/atom/ns#">IP</category><category domain="http://www.blogger.com/atom/ns#">Windows</category><title>Disable Automatic Private IP Addressing - APIPA</title><description>&lt;table align=&quot;center&quot; cellpadding=&quot;0&quot; cellspacing=&quot;0&quot; class=&quot;tr-caption-container&quot; style=&quot;margin-left: auto; margin-right: auto; text-align: center;&quot;&gt;&lt;tbody&gt;
&lt;tr&gt;&lt;td style=&quot;text-align: center;&quot;&gt;&lt;a href=&quot;https://blogger.googleusercontent.com/img/b/R29vZ2xl/AVvXsEjllSjE1xNmgdKmp7P8kZzO4ChVBqZiD1CUnPHO5p4n5GbA3-NvcQ5peR9VDc54pFI6FfBaZFfYu2Krok-LfvLjVGwnJdO1Mr4Y_c6yhfCQI4VeUx9nSuwyQcMkNpo2AY0StdG8odI-P98/s1600/Untitled.png&quot; imageanchor=&quot;1&quot; style=&quot;margin-left: auto; margin-right: auto;&quot;&gt;&lt;img border=&quot;0&quot; src=&quot;https://blogger.googleusercontent.com/img/b/R29vZ2xl/AVvXsEjllSjE1xNmgdKmp7P8kZzO4ChVBqZiD1CUnPHO5p4n5GbA3-NvcQ5peR9VDc54pFI6FfBaZFfYu2Krok-LfvLjVGwnJdO1Mr4Y_c6yhfCQI4VeUx9nSuwyQcMkNpo2AY0StdG8odI-P98/s1600/Untitled.png&quot; /&gt;&lt;/a&gt;&lt;/td&gt;&lt;/tr&gt;
&lt;tr&gt;&lt;td class=&quot;tr-caption&quot; style=&quot;text-align: center;&quot;&gt;APIPA is Enabled&lt;/td&gt;&lt;/tr&gt;
&lt;/tbody&gt;&lt;/table&gt;
APIPA sometimes is tricky, giving us IPs in a range of 169.254.0.1 to 169.254.255.254&lt;br /&gt;
When a DHCP server fails, APIPA gives you an IP address. The client then verify that it&#39;s address is unique on the network by using ARP queries. Whenever a DHCP server sends the DHCPOffer packet, the clients requests a dhcp lease, thus leaving the APIPA addressing.&lt;br /&gt;
&lt;br /&gt;
The best way to solve this is by heading to the registry editor and change a DWORD value to zero.&lt;br /&gt;
&lt;blockquote class=&quot;tr_bq&quot;&gt;
HKLM\SYSTEM\CurrentControlSet\Services\Tcpip\Parameteres&lt;br /&gt;IPAutoconfigurationEnabled: 0&lt;/blockquote&gt;
</description><link>http://voovodenet.blogspot.com/2013/11/disable-automatic-private-ip-addressing.html</link><author>noreply@blogger.com (Alex Gkiouros)</author><media:thumbnail xmlns:media="http://search.yahoo.com/mrss/" url="https://blogger.googleusercontent.com/img/b/R29vZ2xl/AVvXsEjllSjE1xNmgdKmp7P8kZzO4ChVBqZiD1CUnPHO5p4n5GbA3-NvcQ5peR9VDc54pFI6FfBaZFfYu2Krok-LfvLjVGwnJdO1Mr4Y_c6yhfCQI4VeUx9nSuwyQcMkNpo2AY0StdG8odI-P98/s72-c/Untitled.png" height="72" width="72"/><thr:total>0</thr:total></item><item><guid isPermaLink="false">tag:blogger.com,1999:blog-8242660268174464742.post-5764499138930357395</guid><pubDate>Fri, 15 Nov 2013 17:02:00 +0000</pubDate><atom:updated>2013-11-15T19:02:37.322+02:00</atom:updated><category domain="http://www.blogger.com/atom/ns#">Fixes</category><category domain="http://www.blogger.com/atom/ns#">How-to</category><category domain="http://www.blogger.com/atom/ns#">Linux</category><title>Transmission deamon - 409: Conflict - Invalid session-id header</title><description>&lt;div class=&quot;separator&quot; style=&quot;clear: both; text-align: center;&quot;&gt;
&lt;/div&gt;
&lt;div class=&quot;separator&quot; style=&quot;clear: both; text-align: center;&quot;&gt;
&lt;a href=&quot;https://blogger.googleusercontent.com/img/b/R29vZ2xl/AVvXsEhtVc-oC0Fz-Ws80fi_q-mzB9JgQ2XwjGRP3F-A7cqrWHfivJeuPVe1Tox8KW4Zw3Y8-4OSiFGsmlfo8LT1ImVIgS-0O6Qdd5tZ-jO3m23wuqSQ6zTaQ12WEpEzVsQBS6yNA6qaMLx0OoE/s1600/Untitled.png&quot; imageanchor=&quot;1&quot; style=&quot;margin-left: 1em; margin-right: 1em;&quot;&gt;&lt;img border=&quot;0&quot; src=&quot;https://blogger.googleusercontent.com/img/b/R29vZ2xl/AVvXsEhtVc-oC0Fz-Ws80fi_q-mzB9JgQ2XwjGRP3F-A7cqrWHfivJeuPVe1Tox8KW4Zw3Y8-4OSiFGsmlfo8LT1ImVIgS-0O6Qdd5tZ-jO3m23wuqSQ6zTaQ12WEpEzVsQBS6yNA6qaMLx0OoE/s1600/Untitled.png&quot; /&gt;&lt;/a&gt;&lt;/div&gt;
&lt;div class=&quot;separator&quot; style=&quot;clear: both; text-align: left;&quot;&gt;
&lt;br /&gt;&lt;/div&gt;
&lt;b&gt;How to solve?&lt;/b&gt;&lt;br /&gt;
Remove the default /web from your URL:&lt;br /&gt;
&lt;blockquote class=&quot;tr_bq&quot;&gt;
http://www.example.com/transmission/web&lt;/blockquote&gt;
&lt;div style=&quot;text-align: center;&quot;&gt;
to&lt;/div&gt;
&lt;blockquote class=&quot;tr_bq&quot;&gt;
http://www.example.com/transmission&lt;/blockquote&gt;
</description><link>http://voovodenet.blogspot.com/2013/11/transmission-deamon-409-conflict.html</link><author>noreply@blogger.com (Alex Gkiouros)</author><media:thumbnail xmlns:media="http://search.yahoo.com/mrss/" url="https://blogger.googleusercontent.com/img/b/R29vZ2xl/AVvXsEhtVc-oC0Fz-Ws80fi_q-mzB9JgQ2XwjGRP3F-A7cqrWHfivJeuPVe1Tox8KW4Zw3Y8-4OSiFGsmlfo8LT1ImVIgS-0O6Qdd5tZ-jO3m23wuqSQ6zTaQ12WEpEzVsQBS6yNA6qaMLx0OoE/s72-c/Untitled.png" height="72" width="72"/><thr:total>0</thr:total></item><item><guid isPermaLink="false">tag:blogger.com,1999:blog-8242660268174464742.post-3035707585620818096</guid><pubDate>Thu, 14 Nov 2013 00:04:00 +0000</pubDate><atom:updated>2013-11-14T02:04:44.397+02:00</atom:updated><category domain="http://www.blogger.com/atom/ns#">Fixes</category><category domain="http://www.blogger.com/atom/ns#">Windows</category><title>HRESULT 0xc8000222 when trying to install any version of .netFramework</title><description>&lt;div style=&quot;-webkit-font-smoothing: antialiased; border: 0px; color: #333333; font-family: &#39;Segoe UI&#39;, Arial, sans-serif; font-size: 13px; padding: 0px; vertical-align: top;&quot;&gt;
This will occur mostly on Windows 7, never happened on Windows 8:&amp;nbsp;&lt;i&gt;&#39;Installation Did Not Succeed&#39; .NET Framework has not been installed because:&amp;nbsp;&lt;/i&gt;&lt;i&gt;HRESULT 0xc8000222&lt;/i&gt;&lt;br /&gt;
&lt;div class=&quot;separator&quot; style=&quot;clear: both; text-align: center;&quot;&gt;
&lt;a href=&quot;https://blogger.googleusercontent.com/img/b/R29vZ2xl/AVvXsEhGlHL-tJxdjES57OW0t7M-SHdeVOthbHfSmee2C5V68InXrcsp9L9fiwdPFaqMmPiQk8c2ZvrWrNfusLB7LcrMmxkVKkVU2bTihjQY4ny8Ayitjnqn_ScFEHXicUMLFuN-UuH2R6fj118/s1600/HRESULT+0xc8000222.jpg&quot; imageanchor=&quot;1&quot; style=&quot;margin-left: 1em; margin-right: 1em;&quot;&gt;&lt;img border=&quot;0&quot; height=&quot;300&quot; src=&quot;https://blogger.googleusercontent.com/img/b/R29vZ2xl/AVvXsEhGlHL-tJxdjES57OW0t7M-SHdeVOthbHfSmee2C5V68InXrcsp9L9fiwdPFaqMmPiQk8c2ZvrWrNfusLB7LcrMmxkVKkVU2bTihjQY4ny8Ayitjnqn_ScFEHXicUMLFuN-UuH2R6fj118/s320/HRESULT+0xc8000222.jpg&quot; width=&quot;320&quot; /&gt;&lt;/a&gt;&lt;/div&gt;
There is a common problem with windows update and the .netframework. We&#39;ll have to clean the SoftwareDistribution folder before we proceed.&lt;br /&gt;&lt;br /&gt;Click Start and Run:&lt;br /&gt;
&lt;blockquote class=&quot;tr_bq&quot;&gt;
cmd&lt;/blockquote&gt;
This will open the well known Command Prompt, then type:&lt;br /&gt;
&lt;blockquote class=&quot;tr_bq&quot;&gt;
net stop WuAuServ&lt;/blockquote&gt;
This will stop the Windows Update service. Make sure you&#39;re the admin.&lt;br /&gt;
Click Start and Run again, this time type &lt;b&gt;%windir%&lt;/b&gt; and press Enter.&lt;br /&gt;
Look for the &lt;b&gt;SoftwareDistribution&lt;/b&gt; folder and rename it to &lt;b&gt;SwDist.old&lt;/b&gt;.&lt;br /&gt;
Now go back to the Command Prompt and start the Windows Update.&lt;br /&gt;
&lt;blockquote class=&quot;tr_bq&quot;&gt;
net start WuAuServ&lt;/blockquote&gt;
That was it. Re-run the netFramework and it should work.&lt;br /&gt;
&lt;/div&gt;
</description><link>http://voovodenet.blogspot.com/2013/11/hresult-0xc8000222-when-trying-to.html</link><author>noreply@blogger.com (Alex Gkiouros)</author><media:thumbnail xmlns:media="http://search.yahoo.com/mrss/" url="https://blogger.googleusercontent.com/img/b/R29vZ2xl/AVvXsEhGlHL-tJxdjES57OW0t7M-SHdeVOthbHfSmee2C5V68InXrcsp9L9fiwdPFaqMmPiQk8c2ZvrWrNfusLB7LcrMmxkVKkVU2bTihjQY4ny8Ayitjnqn_ScFEHXicUMLFuN-UuH2R6fj118/s72-c/HRESULT+0xc8000222.jpg" height="72" width="72"/><thr:total>2</thr:total></item><item><guid isPermaLink="false">tag:blogger.com,1999:blog-8242660268174464742.post-8350550680013119309</guid><pubDate>Fri, 08 Nov 2013 08:48:00 +0000</pubDate><atom:updated>2013-11-08T10:48:35.850+02:00</atom:updated><category domain="http://www.blogger.com/atom/ns#">Tips</category><category domain="http://www.blogger.com/atom/ns#">Windows</category><title>Watch live tasks running on remote pc</title><description>&lt;div class=&quot;tr_bq&quot;&gt;
This will work only if you have &lt;a href=&quot;http://technet.microsoft.com/en-us/sysinternals/bb896649.aspx&quot;&gt;pstools&lt;/a&gt; installed on both of computers.&lt;/div&gt;
&lt;br /&gt;
&lt;div class=&quot;separator&quot; style=&quot;clear: both; text-align: center;&quot;&gt;
&lt;a href=&quot;https://blogger.googleusercontent.com/img/b/R29vZ2xl/AVvXsEj9wJiKNY7zSH4sfrQmBdDNWoIeXFa3FmX0I9V0VUzMOukwhc0KVgQnTIwiwOb9CnADr-ZfJ7EZjPb5QzniC0o2z3xSSw6hisbwKkYhq48xjE8o7rT2dxzn134Dxeya_bNRCCC63Cj5a4Y/s1600/pslist1168356298865.JPG&quot; imageanchor=&quot;1&quot; style=&quot;margin-left: 1em; margin-right: 1em;&quot;&gt;&lt;img border=&quot;0&quot; height=&quot;152&quot; src=&quot;https://blogger.googleusercontent.com/img/b/R29vZ2xl/AVvXsEj9wJiKNY7zSH4sfrQmBdDNWoIeXFa3FmX0I9V0VUzMOukwhc0KVgQnTIwiwOb9CnADr-ZfJ7EZjPb5QzniC0o2z3xSSw6hisbwKkYhq48xjE8o7rT2dxzn134Dxeya_bNRCCC63Cj5a4Y/s200/pslist1168356298865.JPG&quot; width=&quot;200&quot; /&gt;&lt;/a&gt;&lt;/div&gt;
&lt;blockquote&gt;
@echo off&lt;br /&gt;
set /p comp=Type IP or HOSTNAME:&lt;br /&gt;
echo.&lt;br /&gt;
IF &quot;%comp%&quot;==&quot;&quot; GOTO Error&lt;br /&gt;
c:\pstools\pslist \\%comp% -s&lt;br /&gt;
echo.&lt;br /&gt;
pause&lt;br /&gt;
GOTO End&lt;br /&gt;
:Error&lt;br /&gt;
echo No IP inserted.&lt;br /&gt;
echo.&lt;br /&gt;
pause&lt;br /&gt;
:End&lt;/blockquote&gt;
&amp;nbsp;Save it as batch file and run it.</description><link>http://voovodenet.blogspot.com/2013/11/live-watch-tasks-running-on-remote-pc.html</link><author>noreply@blogger.com (Alex Gkiouros)</author><media:thumbnail xmlns:media="http://search.yahoo.com/mrss/" url="https://blogger.googleusercontent.com/img/b/R29vZ2xl/AVvXsEj9wJiKNY7zSH4sfrQmBdDNWoIeXFa3FmX0I9V0VUzMOukwhc0KVgQnTIwiwOb9CnADr-ZfJ7EZjPb5QzniC0o2z3xSSw6hisbwKkYhq48xjE8o7rT2dxzn134Dxeya_bNRCCC63Cj5a4Y/s72-c/pslist1168356298865.JPG" height="72" width="72"/><thr:total>2</thr:total></item><item><guid isPermaLink="false">tag:blogger.com,1999:blog-8242660268174464742.post-6156775310480203611</guid><pubDate>Sat, 02 Nov 2013 20:40:00 +0000</pubDate><atom:updated>2013-11-02T22:40:18.470+02:00</atom:updated><category domain="http://www.blogger.com/atom/ns#">Linux</category><category domain="http://www.blogger.com/atom/ns#">Tips</category><title>Image to disk and vice versa on unix</title><description>&lt;div class=&quot;separator&quot; style=&quot;clear: both; text-align: center;&quot;&gt;
&lt;a href=&quot;https://blogger.googleusercontent.com/img/b/R29vZ2xl/AVvXsEjyr4hfif1Qi3FTWzY-Zfs5mpPS35ig89b2lTEjf4xfhsmisda2FKuoZXOOZFXQtHLnwxWZRWg9rWvWsbk29vKl87cT57yWUCSjYZ76C241UkFnQ2Zg5lIjGoPnddp6UcD_Utd36Fh4xTY/s1600/Untitled.png&quot; imageanchor=&quot;1&quot; style=&quot;margin-left: 1em; margin-right: 1em;&quot;&gt;&lt;img border=&quot;0&quot; height=&quot;243&quot; src=&quot;https://blogger.googleusercontent.com/img/b/R29vZ2xl/AVvXsEjyr4hfif1Qi3FTWzY-Zfs5mpPS35ig89b2lTEjf4xfhsmisda2FKuoZXOOZFXQtHLnwxWZRWg9rWvWsbk29vKl87cT57yWUCSjYZ76C241UkFnQ2Zg5lIjGoPnddp6UcD_Utd36Fh4xTY/s640/Untitled.png&quot; width=&quot;640&quot; /&gt;&lt;/a&gt;&lt;/div&gt;
&lt;br /&gt;
Backup all your usb drivers or your disk drivers, or clone them using dd, the ultimate tool.&lt;br /&gt;
We will first list all our available disks, watching out not making any mistake.&lt;br /&gt;
&lt;blockquote class=&quot;tr_bq&quot;&gt;
fdisk -l&lt;/blockquote&gt;
Then after the output, notice the /dev/sdA or /dev/hdA or /dev/sdB etc, take a note on what device you want to take backup from, then think about the location of it going, like a folder or in another device.&lt;br /&gt;
&lt;b&gt;if&lt;/b&gt; stands for input file.&lt;br /&gt;
&lt;b&gt;of&lt;/b&gt; stands for output file.&lt;br /&gt;
By issueing the following command, we will backup our second drive into ~/.&lt;br /&gt;
&lt;blockquote class=&quot;tr_bq&quot;&gt;
dd if=/dev/sdb of=~/test.img&lt;/blockquote&gt;
To restore it, simply swap /dev/sdb with ~/test.img, so simple!&lt;br /&gt;
You can also change the block size by using the&lt;span style=&quot;color: #111111; font-family: Consolas, Andale Mono, Monaco, Courier, Courier New, Verdana, sans-serif;&quot;&gt;&lt;span style=&quot;font-size: 14px; line-height: 20.5625px;&quot;&gt;&amp;nbsp;bs command, eg:&lt;/span&gt;&lt;/span&gt;&lt;br /&gt;
&lt;blockquote class=&quot;tr_bq&quot;&gt;
dd if=/dev/sdb of=~/test.img bs=512&amp;nbsp;&lt;/blockquote&gt;
</description><link>http://voovodenet.blogspot.com/2013/11/image-to-disk-and-vice-versa-on-unix.html</link><author>noreply@blogger.com (Alex Gkiouros)</author><media:thumbnail xmlns:media="http://search.yahoo.com/mrss/" url="https://blogger.googleusercontent.com/img/b/R29vZ2xl/AVvXsEjyr4hfif1Qi3FTWzY-Zfs5mpPS35ig89b2lTEjf4xfhsmisda2FKuoZXOOZFXQtHLnwxWZRWg9rWvWsbk29vKl87cT57yWUCSjYZ76C241UkFnQ2Zg5lIjGoPnddp6UcD_Utd36Fh4xTY/s72-c/Untitled.png" height="72" width="72"/><thr:total>0</thr:total></item><item><guid isPermaLink="false">tag:blogger.com,1999:blog-8242660268174464742.post-2629551371292901786</guid><pubDate>Sat, 19 Oct 2013 12:18:00 +0000</pubDate><atom:updated>2013-10-19T15:18:37.310+03:00</atom:updated><category domain="http://www.blogger.com/atom/ns#">Fixes</category><category domain="http://www.blogger.com/atom/ns#">How-to</category><category domain="http://www.blogger.com/atom/ns#">Linux</category><category domain="http://www.blogger.com/atom/ns#">Networking</category><category domain="http://www.blogger.com/atom/ns#">Tips</category><title>Vodaphone USB Broadband on Linux</title><description>What you will need:&lt;br /&gt;
&lt;div class=&quot;separator&quot; style=&quot;clear: both; text-align: center;&quot;&gt;
&lt;a href=&quot;https://blogger.googleusercontent.com/img/b/R29vZ2xl/AVvXsEjCN-CmnlN1IkigvJHJcj5TNjcNrz0PhaLowZc7mDPhOSD0l4_yF9GgtxIfrvXa34EbUpe6WsXwySrE0SyCWnpY4-2-rpbLswR7dYuxiX18MuyRfuhybslevK3hoMPwD9w4edwpuL3ct_4/s1600/98_vodafone_070308_si_f%5B1%5D.jpg&quot; imageanchor=&quot;1&quot; style=&quot;margin-left: 1em; margin-right: 1em;&quot;&gt;&lt;img border=&quot;0&quot; height=&quot;189&quot; src=&quot;https://blogger.googleusercontent.com/img/b/R29vZ2xl/AVvXsEjCN-CmnlN1IkigvJHJcj5TNjcNrz0PhaLowZc7mDPhOSD0l4_yF9GgtxIfrvXa34EbUpe6WsXwySrE0SyCWnpY4-2-rpbLswR7dYuxiX18MuyRfuhybslevK3hoMPwD9w4edwpuL3ct_4/s320/98_vodafone_070308_si_f%5B1%5D.jpg&quot; width=&quot;320&quot; /&gt;&lt;/a&gt;&lt;/div&gt;
&lt;br /&gt;
&lt;ol&gt;
&lt;li&gt;&lt;a href=&quot;http://www.draisberghof.de/usb_modeswitch/usb-modeswitch-2.0.1.tar.bz2&quot; target=&quot;_blank&quot;&gt;usb-modeswitch-2.0.1.tar.bz2&lt;/a&gt;&lt;/li&gt;
&lt;li&gt;&lt;a href=&quot;http://www.draisberghof.de/usb_modeswitch/usb-modeswitch-data-20130807.tar.bz2&quot; target=&quot;_blank&quot;&gt;usb_modeswitch-data&lt;/a&gt;&lt;/li&gt;
&lt;li&gt;&lt;a href=&quot;http://www.libusb.org/&quot;&gt;libusb-1.x&lt;/a&gt;&lt;/li&gt;
&lt;/ol&gt;
&lt;div&gt;
Right after you install those files on your linux box, append these three lines in a terminal:&lt;br /&gt;
&lt;blockquote class=&quot;tr_bq&quot;&gt;
usb_modeswitch -WD -v 12d1 -p 1526 -n -M 555342437f0000000002000080000a11062000000000000100000000000000 -I -w 500&lt;/blockquote&gt;
&lt;/div&gt;
&lt;blockquote class=&quot;tr_bq&quot;&gt;
modprobe option&lt;/blockquote&gt;
&lt;blockquote class=&quot;tr_bq&quot;&gt;
echo &quot;12d1 14cf&quot; &amp;gt; /sys/bus/usb-serial/drivers/option1/new_id&lt;/blockquote&gt;
Open your network manager window, select Mobile Broadband, create a new connection and for connection settings leave them as default, just set the password to 1234.&lt;br /&gt;
&lt;br /&gt;
Plug-in your Vodafone USB and that&#39;s it !&lt;br /&gt;
&amp;nbsp; &amp;nbsp; &amp;nbsp; &amp;nbsp; &amp;nbsp; &amp;nbsp; &amp;nbsp; &amp;nbsp; &amp;nbsp; &amp;nbsp; &amp;nbsp; &amp;nbsp; &amp;nbsp; &amp;nbsp; &amp;nbsp; &amp;nbsp; &amp;nbsp; &amp;nbsp; &amp;nbsp; &amp;nbsp; &amp;nbsp; &amp;nbsp; &amp;nbsp; &amp;nbsp; &amp;nbsp; &amp;nbsp; &amp;nbsp; &amp;nbsp; &amp;nbsp; &amp;nbsp; &amp;nbsp; &amp;nbsp; &amp;nbsp; &amp;nbsp; &amp;nbsp; &amp;nbsp; &amp;nbsp; &amp;nbsp; &amp;nbsp; &amp;nbsp; &amp;nbsp; &amp;nbsp; &amp;nbsp; &amp;nbsp; &amp;nbsp; &amp;nbsp; &amp;nbsp; &amp;nbsp; &amp;nbsp; &amp;nbsp; &amp;nbsp; &amp;nbsp; &amp;nbsp; &amp;nbsp; &amp;nbsp; &amp;nbsp; &amp;nbsp; &amp;nbsp; &amp;nbsp; &amp;nbsp; &amp;nbsp; &amp;nbsp; &amp;nbsp; &amp;nbsp; &amp;nbsp; &amp;nbsp; &amp;nbsp; &amp;nbsp; &amp;nbsp; &amp;nbsp;[&lt;a href=&quot;http://blog.softpill.eu/vodafone-usb-broadband-modem-on-linux/&quot;&gt;Source&lt;/a&gt;]&lt;br /&gt;
&lt;br /&gt;</description><link>http://voovodenet.blogspot.com/2013/10/vodaphone-usb-broadband-on-linux.html</link><author>noreply@blogger.com (Alex Gkiouros)</author><media:thumbnail xmlns:media="http://search.yahoo.com/mrss/" url="https://blogger.googleusercontent.com/img/b/R29vZ2xl/AVvXsEjCN-CmnlN1IkigvJHJcj5TNjcNrz0PhaLowZc7mDPhOSD0l4_yF9GgtxIfrvXa34EbUpe6WsXwySrE0SyCWnpY4-2-rpbLswR7dYuxiX18MuyRfuhybslevK3hoMPwD9w4edwpuL3ct_4/s72-c/98_vodafone_070308_si_f%5B1%5D.jpg" height="72" width="72"/><thr:total>0</thr:total></item><item><guid isPermaLink="false">tag:blogger.com,1999:blog-8242660268174464742.post-5768033462124766265</guid><pubDate>Sun, 06 Oct 2013 14:48:00 +0000</pubDate><atom:updated>2013-10-06T17:48:32.853+03:00</atom:updated><category domain="http://www.blogger.com/atom/ns#">How-to</category><category domain="http://www.blogger.com/atom/ns#">Linux</category><category domain="http://www.blogger.com/atom/ns#">Networking</category><category domain="http://www.blogger.com/atom/ns#">Tips</category><title>Disable ICMP ping responces on your linux box</title><description>Depends on the distribution you use you may be able to disable the ping responce in your box to add some complexity for the attackers or the &#39;bad guys&#39;. In the video below i am going to show you how to append such configuration in your linux distro.&lt;br /&gt;
&lt;div class=&quot;separator&quot; style=&quot;clear: both; text-align: center;&quot;&gt;&lt;iframe allowfullscreen=&#39;allowfullscreen&#39; webkitallowfullscreen=&#39;webkitallowfullscreen&#39; mozallowfullscreen=&#39;mozallowfullscreen&#39; width=&#39;580&#39; height=&#39;366&#39; src=&#39;https://www.youtube.com/embed/BwSwofkV51g?feature=player_embedded&#39; frameborder=&#39;0&#39;&gt;&lt;/iframe&gt;&lt;/div&gt;
Disable ping reply
&lt;blockquote class=&quot;tr_bq&quot;&gt;echo 1 &amp;gt; /proc/sys/net/ipv4/icmp_echo_ignore_all&lt;/blockquote&gt;
Enable ping reply
&lt;blockquote class=&quot;tr_bq&quot;&gt;echo 0 &amp;gt; /proc/sys/net/ipv4/icmp_echo_ignore_all&lt;/blockquote&gt;
To make this permanent set the following into /etc/sysctl.conf
&lt;blockquote class=&quot;tr_bq&quot;&gt;net.ipv4.icmp_echo_ignore_all = 1&lt;/blockquote&gt;
&lt;table align=&quot;center&quot; cellpadding=&quot;0&quot; cellspacing=&quot;0&quot; class=&quot;tr-caption-container&quot; style=&quot;margin-left: auto; margin-right: auto; text-align: center;&quot;&gt;&lt;tbody&gt;
&lt;tr&gt;&lt;td style=&quot;text-align: center;&quot;&gt;&lt;a href=&quot;https://blogger.googleusercontent.com/img/b/R29vZ2xl/AVvXsEgLtZyFOcwt7O2DItJ7ocPrt90kP22YoxEdXBh78BAZ0eiLiJ_Y1T_33jUHfeonTeZd1sK7Z2JuabUwbnih9yr4AvOPD_fKMvNkhg2bLinAQAmuFVgELoJI_hbTBsdrLewHYIb6gd6DLWY/s1600/Untitled.png&quot; imageanchor=&quot;1&quot; style=&quot;margin-left: auto; margin-right: auto;&quot;&gt;&lt;img border=&quot;0&quot; src=&quot;https://blogger.googleusercontent.com/img/b/R29vZ2xl/AVvXsEgLtZyFOcwt7O2DItJ7ocPrt90kP22YoxEdXBh78BAZ0eiLiJ_Y1T_33jUHfeonTeZd1sK7Z2JuabUwbnih9yr4AvOPD_fKMvNkhg2bLinAQAmuFVgELoJI_hbTBsdrLewHYIb6gd6DLWY/s1600/Untitled.png&quot; /&gt;&lt;/a&gt;&lt;/td&gt;&lt;/tr&gt;
&lt;tr&gt;&lt;td class=&quot;tr-caption&quot; style=&quot;text-align: center;&quot;&gt;ICMP Message Types&lt;/td&gt;&lt;/tr&gt;
&lt;/tbody&gt;&lt;/table&gt;You can find more about ICMP &lt;a href=&quot;http://www.rfc-editor.org/pdfrfc/rfc792.txt.pdf&quot; target=&quot;_blank&quot;&gt;here&lt;/a&gt;.&lt;br /&gt;
&lt;br /&gt;
</description><link>http://voovodenet.blogspot.com/2013/10/disable-icmp-ping-responces-on-your.html</link><author>noreply@blogger.com (Alex Gkiouros)</author><media:thumbnail xmlns:media="http://search.yahoo.com/mrss/" url="https://blogger.googleusercontent.com/img/b/R29vZ2xl/AVvXsEgLtZyFOcwt7O2DItJ7ocPrt90kP22YoxEdXBh78BAZ0eiLiJ_Y1T_33jUHfeonTeZd1sK7Z2JuabUwbnih9yr4AvOPD_fKMvNkhg2bLinAQAmuFVgELoJI_hbTBsdrLewHYIb6gd6DLWY/s72-c/Untitled.png" height="72" width="72"/><thr:total>2</thr:total></item><item><guid isPermaLink="false">tag:blogger.com,1999:blog-8242660268174464742.post-7607851979410693244</guid><pubDate>Fri, 04 Oct 2013 23:14:00 +0000</pubDate><atom:updated>2013-10-05T02:14:02.709+03:00</atom:updated><category domain="http://www.blogger.com/atom/ns#">Tips</category><title>Tips on hardening an enterprise server system</title><description>Hardening a system is the process of making it more secure from the default configuration; it is a very important for servers. Before some time, security wasn&#39;t a primary concern, but with all the viruses and attacks on servers today, administrators need to consider about everything.&lt;br /&gt;
&lt;div class=&quot;separator&quot; style=&quot;clear: both; text-align: center;&quot;&gt;
&lt;a href=&quot;https://blogger.googleusercontent.com/img/b/R29vZ2xl/AVvXsEi0wJHnOKMSxTve67vKSIDlVQxctwCo-gO0xnKOQbQKYgTC-SPdH0QSg2Jo_i3i80XwnWrqwm-GaK-ZRQZ0zzgm5T4QvzxkSe07ktQvH2Ysbqs6h5ievbJT1h0e23c6uwEIfY9iVmWKiO8/s1600/offshoreprivacy_b.png&quot; imageanchor=&quot;1&quot; style=&quot;margin-left: 1em; margin-right: 1em;&quot;&gt;&lt;img border=&quot;0&quot; height=&quot;200&quot; src=&quot;https://blogger.googleusercontent.com/img/b/R29vZ2xl/AVvXsEi0wJHnOKMSxTve67vKSIDlVQxctwCo-gO0xnKOQbQKYgTC-SPdH0QSg2Jo_i3i80XwnWrqwm-GaK-ZRQZ0zzgm5T4QvzxkSe07ktQvH2Ysbqs6h5ievbJT1h0e23c6uwEIfY9iVmWKiO8/s200/offshoreprivacy_b.png&quot; width=&quot;200&quot; /&gt;&lt;/a&gt;&lt;/div&gt;
&lt;h4&gt;
&lt;span style=&quot;font-family: inherit;&quot;&gt;Keep the system updated&lt;/span&gt;&lt;/h4&gt;
&lt;div&gt;
&lt;span style=&quot;font-family: inherit;&quot;&gt;The risk of not being up to date is huge in the world we live on. Hundreds of vulnerabilities are being discovered day by day by security experts you should be aware of. It doesn&#39;t matter if your anti-virus is special or your firewall is wicked sick, trust me, for a hacker it&#39;s not a big deal to write some bof and win.&lt;/span&gt;&lt;/div&gt;
&lt;div&gt;
&lt;span style=&quot;font-family: inherit;&quot;&gt;Follow the updates regularly and don&#39;t miss a thing, patch every hole. In windows world you may use WSUS feature in your server to serve updates to your network clients, this will save bandwidth in the network and save you before some unwanted patching.&lt;/span&gt;&lt;/div&gt;
&lt;div&gt;
&lt;br /&gt;&lt;/div&gt;
&lt;h4&gt;
Minimize the threat&lt;/h4&gt;
A server should be installed only for the exact needs, if you&#39;re dealing with a server which you obviously don`t know what goes in and out, you&#39;re finished. Only the required services and protocols should work fine, rest should be disabled or removed. If you&#39;re working on windows environment, make sure to use group policy and the security configuration wizard to help you.&lt;br /&gt;
&lt;br /&gt;
&lt;ol&gt;
&lt;li&gt;Use DMZ,.. demilitarization zone is a network added prior to the internal &#39;protected&#39; network for extra security.&lt;/li&gt;
&lt;li&gt;Use Firewalls, play your game and create your own rules in order to win. Policy-based filtering, iptables etc.&lt;/li&gt;
&lt;/ol&gt;
&lt;br /&gt;&lt;ol&gt;
&lt;/ol&gt;
&lt;div&gt;
This &lt;a href=&quot;http://secunia.com/products/consumer/PSI/sys_req/&quot; target=&quot;_blank&quot;&gt;tool&lt;/a&gt; should help your windows computers.&lt;/div&gt;
</description><link>http://voovodenet.blogspot.com/2013/10/tips-on-hardening-enterprise-server.html</link><author>noreply@blogger.com (Alex Gkiouros)</author><media:thumbnail xmlns:media="http://search.yahoo.com/mrss/" url="https://blogger.googleusercontent.com/img/b/R29vZ2xl/AVvXsEi0wJHnOKMSxTve67vKSIDlVQxctwCo-gO0xnKOQbQKYgTC-SPdH0QSg2Jo_i3i80XwnWrqwm-GaK-ZRQZ0zzgm5T4QvzxkSe07ktQvH2Ysbqs6h5ievbJT1h0e23c6uwEIfY9iVmWKiO8/s72-c/offshoreprivacy_b.png" height="72" width="72"/><thr:total>0</thr:total></item><item><guid isPermaLink="false">tag:blogger.com,1999:blog-8242660268174464742.post-1803529519918907917</guid><pubDate>Thu, 03 Oct 2013 16:05:00 +0000</pubDate><atom:updated>2013-10-03T19:07:49.338+03:00</atom:updated><category domain="http://www.blogger.com/atom/ns#">Fixes</category><category domain="http://www.blogger.com/atom/ns#">How-to</category><category domain="http://www.blogger.com/atom/ns#">Linux</category><category domain="http://www.blogger.com/atom/ns#">Networking</category><category domain="http://www.blogger.com/atom/ns#">Tips</category><title>Enable TCP SYN cookie protection on your linux server</title><description>&lt;div style=&quot;background-color: white; font-family: sans-serif; font-size: 13px; line-height: 19.1875px; margin-bottom: 0.5em; margin-top: 0.4em;&quot;&gt;
Normally when a client attempts to start a&amp;nbsp;TCP&amp;nbsp;connection to a server, the&amp;nbsp;client&amp;nbsp;and&amp;nbsp;server&amp;nbsp;exchange a series of messages which normally runs like this:&lt;/div&gt;
&lt;ol style=&quot;background-color: white; font-family: sans-serif; font-size: 13px; line-height: 19.1875px; list-style-image: none; margin: 0.3em 0px 0px 3.2em; padding: 0px;&quot;&gt;
&lt;li style=&quot;margin-bottom: 0.1em;&quot;&gt;The client requests a connection by sending a&amp;nbsp;&lt;code style=&quot;background-color: #f9f9f9; font-family: monospace, Courier;&quot;&gt;SYN&lt;/code&gt;&amp;nbsp;(&lt;i&gt;synchronize&lt;/i&gt;) message to the server.&lt;/li&gt;
&lt;li style=&quot;margin-bottom: 0.1em;&quot;&gt;The server&amp;nbsp;&lt;i&gt;acknowledges&lt;/i&gt;&amp;nbsp;this request by sending&amp;nbsp;&lt;code style=&quot;background-color: #f9f9f9; font-family: monospace, Courier;&quot;&gt;SYN-ACK&lt;/code&gt;&amp;nbsp;back to the client.&lt;/li&gt;
&lt;li style=&quot;margin-bottom: 0.1em;&quot;&gt;The client responds with an&amp;nbsp;&lt;code style=&quot;background-color: #f9f9f9; font-family: monospace, Courier;&quot;&gt;ACK&lt;/code&gt;, and the connection is established.&lt;/li&gt;
&lt;/ol&gt;
&lt;div style=&quot;background-color: white; font-family: sans-serif; font-size: 13px; line-height: 19.1875px; margin-bottom: 0.5em; margin-top: 0.4em;&quot;&gt;
This is called the&amp;nbsp;TCP three-way handshake, and is the foundation for every connection established using the TCP protocol.&lt;/div&gt;
&lt;div class=&quot;separator&quot; style=&quot;clear: both; text-align: center;&quot;&gt;
&lt;iframe allowfullscreen=&#39;allowfullscreen&#39; webkitallowfullscreen=&#39;webkitallowfullscreen&#39; mozallowfullscreen=&#39;mozallowfullscreen&#39; width=&#39;580&#39; height=&#39;366&#39; src=&#39;https://www.youtube.com/embed/0TrDTfSYt8s?feature=player_embedded&#39; frameborder=&#39;0&#39;&gt;&lt;/iframe&gt;&lt;/div&gt;
&lt;div style=&quot;background-color: white; font-family: sans-serif; font-size: 13px; line-height: 19.1875px; margin-bottom: 0.5em; margin-top: 0.4em;&quot;&gt;
&lt;/div&gt;
&lt;div style=&quot;background-color: white; font-family: sans-serif; font-size: 13px; line-height: 19.1875px; margin-bottom: 0.5em; margin-top: 0.4em;&quot;&gt;
A SYN flood attack works by not responding to the server with the expected&amp;nbsp;&lt;code style=&quot;background-color: #f9f9f9; font-family: monospace, Courier;&quot;&gt;ACK&lt;/code&gt;&amp;nbsp;code. The malicious client can either simply not send the expected&amp;nbsp;&lt;code style=&quot;background-color: #f9f9f9; font-family: monospace, Courier;&quot;&gt;ACK&lt;/code&gt;, or by&amp;nbsp;spoofing&amp;nbsp;the source&amp;nbsp;IP address&amp;nbsp;in the&amp;nbsp;&lt;code style=&quot;background-color: #f9f9f9; font-family: monospace, Courier;&quot;&gt;SYN&lt;/code&gt;, causing the server to send the&amp;nbsp;&lt;code style=&quot;background-color: #f9f9f9; font-family: monospace, Courier;&quot;&gt;SYN-ACK&lt;/code&gt;&amp;nbsp;to a falsified IP address - which will not send an&amp;nbsp;&lt;code style=&quot;background-color: #f9f9f9; font-family: monospace, Courier;&quot;&gt;ACK&lt;/code&gt;&amp;nbsp;because it &quot;knows&quot; that it never sent a&amp;nbsp;&lt;code style=&quot;background-color: #f9f9f9; font-family: monospace, Courier;&quot;&gt;SYN&lt;/code&gt;.&lt;br /&gt;
&lt;br /&gt;&lt;/div&gt;
&lt;div style=&quot;background-color: white; font-family: sans-serif; font-size: 13px; line-height: 19.1875px; margin-bottom: 0.5em; margin-top: 0.4em;&quot;&gt;
&lt;a href=&quot;https://blogger.googleusercontent.com/img/b/R29vZ2xl/AVvXsEilflOLVmwquOz9Yun2Mil8bP_-3pqxzeUCjpgLSv26LxqbuR7J15AZXrzbrDFicdYgimwdzp1YXglmRONuQhmSEWlkpqC0BHC39pgc8gucUaXyYVwryOWnepuHSAiV5HTlv-k221m-kqs/s1600/Lock-icon%5B1%5D.png&quot; imageanchor=&quot;1&quot; style=&quot;clear: left; float: left; margin-bottom: 1em; margin-right: 1em;&quot;&gt;&lt;img border=&quot;0&quot; height=&quot;200&quot; src=&quot;https://blogger.googleusercontent.com/img/b/R29vZ2xl/AVvXsEilflOLVmwquOz9Yun2Mil8bP_-3pqxzeUCjpgLSv26LxqbuR7J15AZXrzbrDFicdYgimwdzp1YXglmRONuQhmSEWlkpqC0BHC39pgc8gucUaXyYVwryOWnepuHSAiV5HTlv-k221m-kqs/s200/Lock-icon%5B1%5D.png&quot; style=&quot;cursor: move;&quot; width=&quot;200&quot; /&gt;&lt;/a&gt;The server will wait for the acknowledgement for some time, as simple network congestion could also be the cause of the missing&amp;nbsp;&lt;code style=&quot;background-color: #f9f9f9; font-family: monospace, Courier;&quot;&gt;ACK&lt;/code&gt;, but in an attack increasingly large numbers of&amp;nbsp;&lt;i&gt;half-open connections&lt;/i&gt;will bind resources on the server until no new connections can be made, resulting in a denial of service to legitimate traffic. Some systems may also malfunction badly or even crash if other operating system functions are starved of resources in this way.&lt;br /&gt;
&lt;br /&gt;
The protection should be enabled by default in many distros.&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;&lt;/div&gt;
&lt;div style=&quot;background-color: white; margin-bottom: 0.5em; margin-top: 0.4em;&quot;&gt;
&lt;div style=&quot;font-family: sans-serif; font-size: 13px; line-height: 19.1875px;&quot;&gt;
Commands used:&lt;/div&gt;
&lt;blockquote class=&quot;tr_bq&quot;&gt;
&lt;span style=&quot;font-family: sans-serif; font-size: x-small;&quot;&gt;&lt;span style=&quot;line-height: 19.1875px;&quot;&gt;sysctl -n net.ipv4.tcp_syncookies&lt;/span&gt;&lt;/span&gt;&lt;span style=&quot;font-family: sans-serif; font-size: x-small;&quot;&gt;&lt;span style=&quot;line-height: 19.1875px;&quot;&gt;&lt;br /&gt;&lt;/span&gt;&lt;/span&gt;&lt;span style=&quot;font-family: sans-serif; font-size: x-small;&quot;&gt;&lt;span style=&quot;line-height: 19.1875px;&quot;&gt;nano /etc/sysctl.conf&lt;/span&gt;&lt;/span&gt;&lt;span style=&quot;font-family: sans-serif; font-size: x-small;&quot;&gt;&lt;span style=&quot;line-height: 19.1875px;&quot;&gt;&lt;br /&gt;&lt;/span&gt;&lt;/span&gt;&lt;span style=&quot;font-family: sans-serif; font-size: x-small;&quot;&gt;&lt;span style=&quot;line-height: 19.1875px;&quot;&gt;sysctl -p&lt;/span&gt;&lt;/span&gt;&lt;/blockquote&gt;
&lt;div style=&quot;font-family: sans-serif; font-size: 13px; line-height: 19.1875px;&quot;&gt;
&lt;br /&gt;&lt;/div&gt;
&lt;/div&gt;
</description><link>http://voovodenet.blogspot.com/2013/10/enable-tcp-syn-cookie-protection-on.html</link><author>noreply@blogger.com (Alex Gkiouros)</author><media:thumbnail xmlns:media="http://search.yahoo.com/mrss/" url="https://blogger.googleusercontent.com/img/b/R29vZ2xl/AVvXsEilflOLVmwquOz9Yun2Mil8bP_-3pqxzeUCjpgLSv26LxqbuR7J15AZXrzbrDFicdYgimwdzp1YXglmRONuQhmSEWlkpqC0BHC39pgc8gucUaXyYVwryOWnepuHSAiV5HTlv-k221m-kqs/s72-c/Lock-icon%5B1%5D.png" height="72" width="72"/><thr:total>0</thr:total></item><item><guid isPermaLink="false">tag:blogger.com,1999:blog-8242660268174464742.post-8299315124741632802</guid><pubDate>Fri, 27 Sep 2013 11:41:00 +0000</pubDate><atom:updated>2013-09-27T14:41:49.420+03:00</atom:updated><category domain="http://www.blogger.com/atom/ns#">Networking</category><title>VLANs vs Subnetting</title><description>&lt;b&gt;Subnet&lt;/b&gt;&lt;br /&gt;
is a range of IP addresses determined by part of an address (often called the network address) and a subnet mask (netmask). For example, if the netmask is 255.255.255.0 (or /24 for short), and the network address is 192.168.10.0, then that defines a range of IP addresses 192.168.10.0 through 192.168.10.255. Shorthand for writing that is 192.168.10.0/24, 255 is for the broadcast and 0 is for the network address.&lt;br /&gt;
&lt;br /&gt;
&lt;b&gt;VLAN&lt;/b&gt;&lt;br /&gt;
A good way to think of this is &quot;switch partitioning.&quot; Let&#39;s say you have an 8 port switch that is VLAN-able. You can assign 4 ports to one VLAN (say VLAN 1) and 4 ports to another VLAN (say VLAN 2). VLAN 1 won&#39;t see any of VLAN 2&#39;s traffic and vice versa, logically, you now have two separate switches. Normally on a switch, if the switch hasn&#39;t seen a MAC address it will &quot;flood&quot; the traffic to all other ports. VLANs prevent this.&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
&lt;div class=&quot;separator&quot; style=&quot;clear: both; text-align: center;&quot;&gt;
&lt;a href=&quot;https://blogger.googleusercontent.com/img/b/R29vZ2xl/AVvXsEh5L5qbfZwCxiVB2wNfzk6KXe3WQZWSMlbrFXM409RZk3BUR8vDNezwVJg44SheQMB7DFmmfVAhpNbws83UZU_-bqNU6IOYR6zu3StmUewlTJXJfwL95BValevZNyYaD8oBOOXOdNFghRo/s1600/private-vlans1.jpg&quot; imageanchor=&quot;1&quot; style=&quot;margin-left: 1em; margin-right: 1em;&quot;&gt;&lt;img border=&quot;0&quot; height=&quot;304&quot; src=&quot;https://blogger.googleusercontent.com/img/b/R29vZ2xl/AVvXsEh5L5qbfZwCxiVB2wNfzk6KXe3WQZWSMlbrFXM409RZk3BUR8vDNezwVJg44SheQMB7DFmmfVAhpNbws83UZU_-bqNU6IOYR6zu3StmUewlTJXJfwL95BValevZNyYaD8oBOOXOdNFghRo/s320/private-vlans1.jpg&quot; width=&quot;320&quot; /&gt;&lt;/a&gt;&lt;/div&gt;
&lt;div class=&quot;separator&quot; style=&quot;clear: both; text-align: center;&quot;&gt;
&lt;br /&gt;&lt;/div&gt;
&lt;br /&gt;
If two computers are going to talk using TCP/IP, then one of two conditions must be met:&lt;br /&gt;
&lt;br /&gt;
They must belong to the same subnet. This means the network address must be the same and the netmask must be equal or smaller. So, a computer with an interface with an IP address of 192.168.10.4/24 can talk to a computer with an interface with an IP address of 192.168.10.8/24 with no issues, provided they are both connected to the same physical switch or VLAN. If the second computer&#39;s interface connected to that same physical switch or VLAN was 192.168.11.8/24, it would ignore the traffic (unless the interface was in promiscuous mode).&lt;br /&gt;
&lt;br /&gt;
A router needs to exist between both computers that can forward traffic between subnets. Computer A and computer B need a route (or default gateway) to this router. Let&#39;s say a computer with an interface with an IP address of 192.168.10.4/24 wants to talk to a computer with an interface with an IP address of 192.168.20.4/24. Different subnets, so we must go through a router. Let&#39;s say there&#39;s a router with two interfaces (routers by definition have two interfaces), one on 192.168.10.254/24 and 192.168.20.254/24. If the route table or DHCP is setup correctly and both computer A and B can reach the router&#39;s interfaces on their respective subnets, then they can talk to each other indirectly via the router.&lt;br /&gt;
&lt;br /&gt;
Forcing traffic to go through a router, even though it&#39;s not needed such as on our 8-port switch above, has security and performance benefits - it gives you an opportunity to filter traffic, an opportunity to optimally route traffic based on type, and routers do not forward broadcast traffic (unless unusually configured). VLANs are sometimes used as a &quot;hack&quot; to manage flows/visibility of IPv4 broadcast traffic.&lt;br /&gt;
&lt;br /&gt;
VLANs are equivalent to switches. What comes in 1 port of a VLAN is replicated(&quot;flooded&quot;) to all other ports unless the VLAN has seen/learned the MAC address before, then it is directed to that port. There is no gateway to the VLAN proper. A &quot;gateway&quot; always means the IP address of a router.&lt;br /&gt;
&lt;br /&gt;
For VLAN 1 to talk to VLAN 2, an interface in VLAN 1 must be connected to a router, an interface in VLAN 2 must be connected to a router, and that router must be configured to forward traffic between those subnets. In our 8 port example above, if we wanted to route traffic between those VLANs, we&#39;d have to spend 1 port on each VLAN connecting to a router. Same with a switch.&lt;br /&gt;
&lt;br /&gt;
When a computer gets its IP via DHCP, it also usually gets the &quot;default gateway&quot; from that same DHCP server. Someone has to configure the DHCP server correctly. Routing protocols such as RIP, IS-IS, OSPF, and BGP can also add routes. Of course you have the option of adding static routes.&lt;br /&gt;
&lt;br /&gt;
I&#39;m sure many high-end switches/hardware have a &quot;VLAN router&quot; &quot;built-in&quot; to them where spending an extra port within each VLAN connecting it to a physical router really isn&#39;t necessary if you want to route between VLANs in the same switch. This might be where the VLAN IP or &quot;gateway&quot; comes into play.</description><link>http://voovodenet.blogspot.com/2013/09/vlans-vs-subnetting.html</link><author>noreply@blogger.com (Alex Gkiouros)</author><media:thumbnail xmlns:media="http://search.yahoo.com/mrss/" url="https://blogger.googleusercontent.com/img/b/R29vZ2xl/AVvXsEh5L5qbfZwCxiVB2wNfzk6KXe3WQZWSMlbrFXM409RZk3BUR8vDNezwVJg44SheQMB7DFmmfVAhpNbws83UZU_-bqNU6IOYR6zu3StmUewlTJXJfwL95BValevZNyYaD8oBOOXOdNFghRo/s72-c/private-vlans1.jpg" height="72" width="72"/><thr:total>0</thr:total></item><item><guid isPermaLink="false">tag:blogger.com,1999:blog-8242660268174464742.post-5284253452596995579</guid><pubDate>Fri, 02 Aug 2013 13:55:00 +0000</pubDate><atom:updated>2013-08-02T16:58:39.951+03:00</atom:updated><category domain="http://www.blogger.com/atom/ns#">Arch</category><category domain="http://www.blogger.com/atom/ns#">Fixes</category><title>mesa-libgl and nvidia-libgl are in conflict error</title><description>&lt;a href=&quot;https://blogger.googleusercontent.com/img/b/R29vZ2xl/AVvXsEg587VSuYx_MwT5tYOD-BQCSrb00qW9QIkjZmcsUN9tV0FG4I7YAB4ku1c4YFqpCpF5uXmcUJrtjKWG04LORQOS5s1o8YbWuUpWQtIAfHLx2b6_YgHakrbAuGUE2depuzUwaCEUjEi6kuk/s1600/arch-linux-logo.png&quot; imageanchor=&quot;1&quot; style=&quot;clear: left; float: left; margin-bottom: 1em; margin-right: 1em;&quot;&gt;&lt;img border=&quot;0&quot; height=&quot;167&quot; src=&quot;https://blogger.googleusercontent.com/img/b/R29vZ2xl/AVvXsEg587VSuYx_MwT5tYOD-BQCSrb00qW9QIkjZmcsUN9tV0FG4I7YAB4ku1c4YFqpCpF5uXmcUJrtjKWG04LORQOS5s1o8YbWuUpWQtIAfHLx2b6_YgHakrbAuGUE2depuzUwaCEUjEi6kuk/s200/arch-linux-logo.png&quot; width=&quot;200&quot; /&gt;&lt;/a&gt;&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
&lt;b&gt;pacman -Syu&lt;/b&gt;&lt;br /&gt;
&lt;br /&gt;
and..&lt;br /&gt;
&lt;br /&gt;
&lt;i&gt;mesa-libgl and nvidia-libgl are in conflict, Remove nvidia-libgl? [y/N]&lt;/i&gt;&lt;br /&gt;
&lt;br /&gt;
The following commands will fix it quickly:&lt;br /&gt;
&lt;blockquote class=&quot;tr_bq&quot;&gt;
pacman -Syu --ignore mesa-libgl&lt;br /&gt;
pacman -Sc&lt;br /&gt;
pacman -Rs xf86-video-ati&lt;br /&gt;
pacman -Rs ati-dri&lt;br /&gt;
pacman -S nvidia&lt;br /&gt;
pacman -Syu&lt;/blockquote&gt;
Basically you update ignoring the &lt;b&gt;mesa-libgl&lt;/b&gt;, then purge the pkg cache, remove &lt;b&gt;xf86-video-ati&lt;/b&gt;&amp;nbsp;which is 32bit ( maybe vmware would need that at the first place ), also &lt;b&gt;ati-dri&lt;/b&gt;, then synchronize the nvidia drivers and do a full update.</description><link>http://voovodenet.blogspot.com/2013/08/mesa-libgl-and-nvidia-libgl-are-in.html</link><author>noreply@blogger.com (Alex Gkiouros)</author><media:thumbnail xmlns:media="http://search.yahoo.com/mrss/" url="https://blogger.googleusercontent.com/img/b/R29vZ2xl/AVvXsEg587VSuYx_MwT5tYOD-BQCSrb00qW9QIkjZmcsUN9tV0FG4I7YAB4ku1c4YFqpCpF5uXmcUJrtjKWG04LORQOS5s1o8YbWuUpWQtIAfHLx2b6_YgHakrbAuGUE2depuzUwaCEUjEi6kuk/s72-c/arch-linux-logo.png" height="72" width="72"/><thr:total>0</thr:total></item><item><guid isPermaLink="false">tag:blogger.com,1999:blog-8242660268174464742.post-1183728801145062475</guid><pubDate>Mon, 29 Jul 2013 00:19:00 +0000</pubDate><atom:updated>2013-07-29T03:22:30.246+03:00</atom:updated><category domain="http://www.blogger.com/atom/ns#">Cisco</category><category domain="http://www.blogger.com/atom/ns#">How-to</category><category domain="http://www.blogger.com/atom/ns#">Networking</category><title>Cisco router - Reset config</title><description>&lt;div dir=&quot;ltr&quot; style=&quot;text-align: left;&quot; trbidi=&quot;on&quot;&gt;
Start putty &amp;amp; connect to the communication&#39;s port with the default rates etc....&lt;br /&gt;
&lt;div class=&quot;separator&quot; style=&quot;clear: both; text-align: center;&quot;&gt;
&lt;a href=&quot;https://blogger.googleusercontent.com/img/b/R29vZ2xl/AVvXsEik_2OpbEBFo_-H-oWcxbq__HmFq_DZVapYosP2tLYXzl7W9dYM4EJUbtJyeABgoMPv26x4WikCrGWSuAnNWWhSxSfimpOxYplVUaOhaNWeU3dlridCwr0Ms5zMjNehE3SBIjRBEAH6VOg/s1600/Untitled1.png&quot; imageanchor=&quot;1&quot; style=&quot;margin-left: 1em; margin-right: 1em; text-align: center;&quot;&gt;&lt;img border=&quot;0&quot; height=&quot;307&quot; src=&quot;https://blogger.googleusercontent.com/img/b/R29vZ2xl/AVvXsEik_2OpbEBFo_-H-oWcxbq__HmFq_DZVapYosP2tLYXzl7W9dYM4EJUbtJyeABgoMPv26x4WikCrGWSuAnNWWhSxSfimpOxYplVUaOhaNWeU3dlridCwr0Ms5zMjNehE3SBIjRBEAH6VOg/s320/Untitled1.png&quot; width=&quot;320&quot; /&gt;&lt;/a&gt;&lt;/div&gt;
Restart the cisco router in order to break the boot sequence of the router by tapping the &lt;b&gt;Break&lt;/b&gt; key.&lt;br /&gt;
&lt;table align=&quot;center&quot; cellpadding=&quot;0&quot; cellspacing=&quot;0&quot; class=&quot;tr-caption-container&quot; style=&quot;margin-left: auto; margin-right: auto; text-align: center;&quot;&gt;&lt;tbody&gt;
&lt;tr&gt;&lt;td style=&quot;text-align: center;&quot;&gt;&lt;a href=&quot;https://blogger.googleusercontent.com/img/b/R29vZ2xl/AVvXsEi4xoKh0vMThprRou_ILeYD5A6a63F8rOLbS579YSKumQ8Z3iW7sLo3gtKhwf9QQE5WYcLHAq2-9822T6L9mq4wZDz25rXHLRZ2WK2Orxsd_UUdlESRNYwgXxPPsZ6kD1wXSedc377pEwo/s1600/Untitled2.png&quot; imageanchor=&quot;1&quot; style=&quot;margin-left: auto; margin-right: auto;&quot;&gt;&lt;img border=&quot;0&quot; height=&quot;201&quot; src=&quot;https://blogger.googleusercontent.com/img/b/R29vZ2xl/AVvXsEi4xoKh0vMThprRou_ILeYD5A6a63F8rOLbS579YSKumQ8Z3iW7sLo3gtKhwf9QQE5WYcLHAq2-9822T6L9mq4wZDz25rXHLRZ2WK2Orxsd_UUdlESRNYwgXxPPsZ6kD1wXSedc377pEwo/s320/Untitled2.png&quot; width=&quot;320&quot; /&gt;&lt;/a&gt;&lt;/td&gt;&lt;/tr&gt;
&lt;tr&gt;&lt;td class=&quot;tr-caption&quot; style=&quot;text-align: center;&quot;&gt;breaking the boot sequence...&lt;/td&gt;&lt;/tr&gt;
&lt;/tbody&gt;&lt;/table&gt;
After you broke the boot sequence, issue the following command:&lt;br /&gt;
&lt;blockquote class=&quot;tr_bq&quot;&gt;
confreg 0x2142&lt;/blockquote&gt;
&quot;&lt;i&gt;You must reset or power cycle for new config to take effect&lt;/i&gt;&quot; is what you will face after the proper usage of the above command, reset by giving this:&lt;br /&gt;
&lt;blockquote class=&quot;tr_bq&quot;&gt;
reset&lt;/blockquote&gt;
&lt;table align=&quot;center&quot; cellpadding=&quot;0&quot; cellspacing=&quot;0&quot; class=&quot;tr-caption-container&quot; style=&quot;margin-left: auto; margin-right: auto; text-align: center;&quot;&gt;&lt;tbody&gt;
&lt;tr&gt;&lt;td style=&quot;text-align: center;&quot;&gt;&lt;a href=&quot;https://blogger.googleusercontent.com/img/b/R29vZ2xl/AVvXsEh3dbZ9Iyy9Y5MIRibcAu7-4CPGrF671ze05UWRLjI_O1tFKQIHJ78S5p3cDqhGDz94S0OhwbqQPONe6SDs1ZHGwu8K65ZlPBbUP7Wvmr2jz9tSglgnO7XuoUK2PE6JyQtuaWAfumK8Fi8/s1600/Untitled4.png&quot; imageanchor=&quot;1&quot; style=&quot;margin-left: auto; margin-right: auto;&quot;&gt;&lt;img border=&quot;0&quot; src=&quot;https://blogger.googleusercontent.com/img/b/R29vZ2xl/AVvXsEh3dbZ9Iyy9Y5MIRibcAu7-4CPGrF671ze05UWRLjI_O1tFKQIHJ78S5p3cDqhGDz94S0OhwbqQPONe6SDs1ZHGwu8K65ZlPBbUP7Wvmr2jz9tSglgnO7XuoUK2PE6JyQtuaWAfumK8Fi8/s1600/Untitled4.png&quot; /&gt;&lt;/a&gt;&lt;/td&gt;&lt;/tr&gt;
&lt;tr&gt;&lt;td class=&quot;tr-caption&quot; style=&quot;text-align: center;&quot;&gt;issuing the reset command...&lt;/td&gt;&lt;/tr&gt;
&lt;/tbody&gt;&lt;/table&gt;
Now, after some time it should start booting.. It will ask you if you`d like to start from scratch.. say yes/no depending what you actually want to config.&lt;br /&gt;
&lt;br /&gt;
[...] &lt;i&gt;~config taking place&lt;/i&gt;&lt;br /&gt;
&lt;br /&gt;
After the configuration, you have to exit the &lt;a href=&quot;http://www.cisco.com/en/US/products/hw/routers/ps133/products_tech_note09186a008022493f.shtml&quot; target=&quot;_blank&quot;&gt;NVRAM ignorance mode&lt;/a&gt; by issuing the commands below:&lt;br /&gt;
&lt;blockquote class=&quot;tr_bq&quot;&gt;
config-reg 0x2102&lt;/blockquote&gt;
Exit config# using Ctrl+C and then:&lt;br /&gt;
&lt;blockquote class=&quot;tr_bq&quot;&gt;
wr mem&lt;br /&gt;
reload&lt;/blockquote&gt;
&lt;div class=&quot;separator&quot; style=&quot;clear: both; text-align: center;&quot;&gt;
&lt;img border=&quot;0&quot; height=&quot;126&quot; src=&quot;https://blogger.googleusercontent.com/img/b/R29vZ2xl/AVvXsEjCq6cq5yXa58Ue0bhGVM7MI5t9vthFhhKrIMs9BuuLCwsGsx2fR-CXVphaGYHFHVNZVyP6zhRTniZfS4YT5esE93ulaUa-O6Qaq5t4sJvwPW9PicXvh7N5NRen2g-ymPqqE3qZiGc2vTQ/s200/CiscoSystems.gif&quot; width=&quot;200&quot; /&gt;&lt;/div&gt;
&lt;span style=&quot;font-size: xx-small;&quot;&gt;&lt;span style=&quot;text-align: left;&quot;&gt;Hint: If you would like not to reset the router&#39;s configuration - altering the password only is done through the same way but answering no to the &#39;start from scratch&#39; dialogue, then by saving the running configuration giving the&amp;nbsp;&lt;/span&gt;&lt;b style=&quot;text-align: left;&quot;&gt;copy start run&lt;/b&gt;&lt;span style=&quot;text-align: left;&quot;&gt;&amp;nbsp;command at that time. For more info reply below.&lt;/span&gt;&lt;/span&gt;&lt;/div&gt;
</description><link>http://voovodenet.blogspot.com/2013/07/resetting-cisco-router.html</link><author>noreply@blogger.com (Alex Gkiouros)</author><media:thumbnail xmlns:media="http://search.yahoo.com/mrss/" url="https://blogger.googleusercontent.com/img/b/R29vZ2xl/AVvXsEik_2OpbEBFo_-H-oWcxbq__HmFq_DZVapYosP2tLYXzl7W9dYM4EJUbtJyeABgoMPv26x4WikCrGWSuAnNWWhSxSfimpOxYplVUaOhaNWeU3dlridCwr0Ms5zMjNehE3SBIjRBEAH6VOg/s72-c/Untitled1.png" height="72" width="72"/><thr:total>0</thr:total></item><item><guid isPermaLink="false">tag:blogger.com,1999:blog-8242660268174464742.post-4264151058622886254</guid><pubDate>Sun, 28 Jul 2013 22:19:00 +0000</pubDate><atom:updated>2013-07-29T01:19:28.361+03:00</atom:updated><category domain="http://www.blogger.com/atom/ns#">How-to</category><category domain="http://www.blogger.com/atom/ns#">Linux</category><title>Installing a LAMP server</title><description>&lt;div dir=&quot;ltr&quot; style=&quot;text-align: left;&quot; trbidi=&quot;on&quot;&gt;
&lt;a href=&quot;http://en.wikipedia.org/wiki/LAMP_(software_bundle)&quot; target=&quot;_blank&quot;&gt;LAMP&lt;/a&gt; is a combination of free, open source software. The acronym LAMP refers to the first letters of Linux (operating system), Apache HTTP Server, MySQL (database software), and PHP, Perl or Python, principal components to build a viable general purpose web server.&lt;br /&gt;
&lt;div class=&quot;separator&quot; style=&quot;clear: both; text-align: center;&quot;&gt;
&lt;a href=&quot;https://blogger.googleusercontent.com/img/b/R29vZ2xl/AVvXsEgc0xQBuipnut24FX08qYZx7dkmJQeBnD-BlEQa30fhQJ12a242IS1IhD1lfAg4RCfFtaKx9cS5rY5JAp0YRl-ePoTOKnSP-W3dfp_9FVKuiEMuvZeNn2N1KNNSJxEi4fCzAIZFcSi6VnQ/s1600/lamp1.gif&quot; imageanchor=&quot;1&quot; style=&quot;margin-left: 1em; margin-right: 1em;&quot;&gt;&lt;img border=&quot;0&quot; height=&quot;161&quot; src=&quot;https://blogger.googleusercontent.com/img/b/R29vZ2xl/AVvXsEgc0xQBuipnut24FX08qYZx7dkmJQeBnD-BlEQa30fhQJ12a242IS1IhD1lfAg4RCfFtaKx9cS5rY5JAp0YRl-ePoTOKnSP-W3dfp_9FVKuiEMuvZeNn2N1KNNSJxEi4fCzAIZFcSi6VnQ/s320/lamp1.gif&quot; width=&quot;320&quot; /&gt;&lt;/a&gt;&lt;/div&gt;
&lt;br /&gt;
&lt;b&gt;Install Linux:&lt;/b&gt;&lt;br /&gt;
just kidding...&lt;br /&gt;
&lt;ol style=&quot;text-align: left;&quot;&gt;
&lt;li&gt;&lt;b&gt;Install Apache:&lt;/b&gt;&lt;/li&gt;
&lt;blockquote class=&quot;tr_bq&quot;&gt;
sudo apt-get install apache2&lt;/blockquote&gt;
After everything is finished, fire up a browser and type: &lt;blockquote class=&quot;tr_bq&quot;&gt;
http://localhost/&lt;/blockquote&gt;
you should see already a folder, if nothing is found then you have to re-install it. If you still can`t find a solution, drop a line below.
&lt;li&gt;&lt;b&gt;Install PHP:&lt;/b&gt;&lt;/li&gt;
&lt;blockquote class=&quot;tr_bq&quot;&gt;
sudo apt-get install php5 libapache2-mod-php5 &lt;/blockquote&gt;
After everything is finished, we have to restart apache to get notified about php: &lt;blockquote class=&quot;tr_bq&quot;&gt;
sudo /etc/init.d/apache2 restart&lt;/blockquote&gt;
&lt;li&gt;&lt;b&gt;Install MySQL:&lt;/b&gt;&lt;/li&gt;
&lt;blockquote class=&quot;tr_bq&quot;&gt;
sudo apt-get install mysql-server &lt;/blockquote&gt;
Then get access to console by typing: &lt;blockquote class=&quot;tr_bq&quot;&gt;
mysql -u root &lt;/blockquote&gt;
And change your password: &lt;blockquote class=&quot;tr_bq&quot;&gt;
mysql SET PASSWORD FOR &#39;root&#39;@&#39;localhost&#39; = PASSWORD(&#39;P@$sw0rd&#39;);&lt;/blockquote&gt;
After that, install PHPMyAdmin: &lt;blockquote class=&quot;tr_bq&quot;&gt;
sudo apt-get install libapache2-mod-auth-mysql php5-mysql phpmyadmin &lt;/blockquote&gt;
Edit php.ini to work with phpmyadmin... &lt;blockquote class=&quot;tr_bq&quot;&gt;
gksudo gedit /etc/php5/apache2/php.ini &lt;/blockquote&gt;
And change this line:  &lt;blockquote class=&quot;tr_bq&quot;&gt;
;extension=mysql.so to extension=mysql.so &lt;/blockquote&gt;
Last thing is to restart apache to take care of MySQL too: &lt;blockquote class=&quot;tr_bq&quot;&gt;
sudo /etc/init.d/apache2 restart&lt;/blockquote&gt;
Go again at http://localhost and check what you&#39;ve done!&lt;/ol&gt;
&lt;/div&gt;
</description><link>http://voovodenet.blogspot.com/2013/07/installing-lamp-server.html</link><author>noreply@blogger.com (Alex Gkiouros)</author><media:thumbnail xmlns:media="http://search.yahoo.com/mrss/" url="https://blogger.googleusercontent.com/img/b/R29vZ2xl/AVvXsEgc0xQBuipnut24FX08qYZx7dkmJQeBnD-BlEQa30fhQJ12a242IS1IhD1lfAg4RCfFtaKx9cS5rY5JAp0YRl-ePoTOKnSP-W3dfp_9FVKuiEMuvZeNn2N1KNNSJxEi4fCzAIZFcSi6VnQ/s72-c/lamp1.gif" height="72" width="72"/><thr:total>0</thr:total></item><item><guid isPermaLink="false">tag:blogger.com,1999:blog-8242660268174464742.post-8014240838196714325</guid><pubDate>Fri, 19 Jul 2013 12:11:00 +0000</pubDate><atom:updated>2013-07-19T15:11:14.833+03:00</atom:updated><category domain="http://www.blogger.com/atom/ns#">Tips</category><category domain="http://www.blogger.com/atom/ns#">Windows</category><title>RDC authentication bypass</title><description>&lt;div dir=&quot;ltr&quot; style=&quot;text-align: left;&quot; trbidi=&quot;on&quot;&gt;
This is not a hack.&lt;br /&gt;
&lt;ol style=&quot;text-align: left;&quot;&gt;
&lt;li&gt;Open up a command prompt and type &lt;b&gt;mstsc.exe&lt;/b&gt;.&lt;br /&gt;&lt;a href=&quot;https://blogger.googleusercontent.com/img/b/R29vZ2xl/AVvXsEhVlfe91fX2G9tLGFvMnmcNH_LoiCMeygXdFzr4PfS5V_zKDr1xlbnYqL1bA5xbrg9yC5r7__BGU8KMHF9WdGHzbzK1zyYwgo34in9DWDHS_h4mydAkWekftAiqT0YTC9J_IenKB-rmiuY/s1600/Untitled1.png&quot; imageanchor=&quot;1&quot; style=&quot;margin-left: 1em; margin-right: 1em; text-align: center;&quot;&gt;&lt;img border=&quot;0&quot; height=&quot;223&quot; src=&quot;https://blogger.googleusercontent.com/img/b/R29vZ2xl/AVvXsEhVlfe91fX2G9tLGFvMnmcNH_LoiCMeygXdFzr4PfS5V_zKDr1xlbnYqL1bA5xbrg9yC5r7__BGU8KMHF9WdGHzbzK1zyYwgo34in9DWDHS_h4mydAkWekftAiqT0YTC9J_IenKB-rmiuY/s400/Untitled1.png&quot; width=&quot;400&quot; /&gt;&lt;/a&gt;
&lt;/li&gt;
&lt;li&gt;Click on Options drop down menu to access advanced options about the connection.&lt;br /&gt;&lt;a href=&quot;https://blogger.googleusercontent.com/img/b/R29vZ2xl/AVvXsEj43BRKxbC5h8z4VS-nhlbdjH3UXYaFhrhR7JrLA_NyHczMmeK-1nWrCgTF8h9q_HWCxI7nXoRisSHL0-Z-UyPcBn-kyUTg6G55IWVZcevxWe2TYuU1FO8X1jSIrcK7vwo_HVAJSXaPZnk/s1600/Untitled2.png&quot; imageanchor=&quot;1&quot; style=&quot;margin-left: 1em; margin-right: 1em; text-align: center;&quot;&gt;&lt;img border=&quot;0&quot; height=&quot;244&quot; src=&quot;https://blogger.googleusercontent.com/img/b/R29vZ2xl/AVvXsEj43BRKxbC5h8z4VS-nhlbdjH3UXYaFhrhR7JrLA_NyHczMmeK-1nWrCgTF8h9q_HWCxI7nXoRisSHL0-Z-UyPcBn-kyUTg6G55IWVZcevxWe2TYuU1FO8X1jSIrcK7vwo_HVAJSXaPZnk/s400/Untitled2.png&quot; width=&quot;400&quot; /&gt;&lt;/a&gt;&lt;/li&gt;
&lt;li&gt;Save the connection settings by clicking &lt;b&gt;Save As...&lt;/b&gt;, somewhere in your desktop.&lt;br /&gt;&lt;a href=&quot;https://blogger.googleusercontent.com/img/b/R29vZ2xl/AVvXsEjrAizQLtSFIEseHNsMFfAbUp2T2b06BlNiT-PIIxIORYpZZMMl_TA_uJygesYMeOFURMDaBXzdClzJGdlx1HouQyQ-9UUxDU62EGxLNSl7j6e99lz220n5AhXDFZgxiVVh9gErJRofFa4/s1600/Untitled3.png&quot; imageanchor=&quot;1&quot; style=&quot;margin-left: 1em; margin-right: 1em; text-align: center;&quot;&gt;&lt;img border=&quot;0&quot; height=&quot;166&quot; src=&quot;https://blogger.googleusercontent.com/img/b/R29vZ2xl/AVvXsEjrAizQLtSFIEseHNsMFfAbUp2T2b06BlNiT-PIIxIORYpZZMMl_TA_uJygesYMeOFURMDaBXzdClzJGdlx1HouQyQ-9UUxDU62EGxLNSl7j6e99lz220n5AhXDFZgxiVVh9gErJRofFa4/s400/Untitled3.png&quot; width=&quot;400&quot; /&gt;&lt;/a&gt;&lt;/li&gt;
&lt;li&gt;Right click this &lt;b&gt;.rdp&lt;/b&gt; file now and open it using notepad&lt;/li&gt;
&lt;li&gt;Find &lt;b&gt;authentication level:i:2&lt;/b&gt; and turn it into&amp;nbsp;&lt;b&gt;authentication level:i:0&lt;/b&gt;.&lt;br /&gt;&lt;a href=&quot;https://blogger.googleusercontent.com/img/b/R29vZ2xl/AVvXsEh52w68sWEXtpoY8PUyk_gG1s2Wyy5chMd-EOFHnqs-OANxwR0u2vEwUzo3Ow2kOcVa1SwMsD_CA5x7Mahsgh_cZIJNiEI_rpdBr-LzUOyE_x_HU121rhe_ahQtcqFcQnoCt3r9kVuQ9l4/s1600/Untitled4.png&quot; imageanchor=&quot;1&quot; style=&quot;margin-left: 1em; margin-right: 1em; text-align: center;&quot;&gt;&lt;img border=&quot;0&quot; height=&quot;237&quot; src=&quot;https://blogger.googleusercontent.com/img/b/R29vZ2xl/AVvXsEh52w68sWEXtpoY8PUyk_gG1s2Wyy5chMd-EOFHnqs-OANxwR0u2vEwUzo3Ow2kOcVa1SwMsD_CA5x7Mahsgh_cZIJNiEI_rpdBr-LzUOyE_x_HU121rhe_ahQtcqFcQnoCt3r9kVuQ9l4/s400/Untitled4.png&quot; width=&quot;400&quot; /&gt;&lt;/a&gt;&lt;/li&gt;
&lt;li&gt;Add &lt;b&gt;enablecredsspsupport:i:0&lt;/b&gt; at the end of the text file.&lt;br /&gt;&lt;a href=&quot;https://blogger.googleusercontent.com/img/b/R29vZ2xl/AVvXsEg42nvUkPp-YLXyEABnPweT1Q4zVUWlraTA6TeNwOIWCE11pEkbQadX0MJdv-7YAXaOUmUIg0kNOtd-4PK30kHeKEpzgZVAVadaNSLIKO9sLykUmztTk0b9agxD22kjbRJ4gpddspe3w9c/s1600/Untitled5.png&quot; imageanchor=&quot;1&quot; style=&quot;margin-left: 1em; margin-right: 1em; text-align: center;&quot;&gt;&lt;img border=&quot;0&quot; height=&quot;236&quot; src=&quot;https://blogger.googleusercontent.com/img/b/R29vZ2xl/AVvXsEg42nvUkPp-YLXyEABnPweT1Q4zVUWlraTA6TeNwOIWCE11pEkbQadX0MJdv-7YAXaOUmUIg0kNOtd-4PK30kHeKEpzgZVAVadaNSLIKO9sLykUmztTk0b9agxD22kjbRJ4gpddspe3w9c/s400/Untitled5.png&quot; width=&quot;400&quot; /&gt;&lt;/a&gt;&lt;/li&gt;
&lt;li&gt;Then, open the rdp file which we&#39;ve just edited and connect to the remote computer.&lt;/li&gt;
&lt;li&gt;If it asks you for a password, enter the password of your local user account.&lt;/li&gt;
&lt;/ol&gt;
done!&lt;br /&gt;&lt;ol style=&quot;text-align: left;&quot;&gt;
&lt;/ol&gt;
&lt;div&gt;
&lt;br /&gt;&lt;/div&gt;
&lt;/div&gt;
</description><link>http://voovodenet.blogspot.com/2013/07/rdc-authentication-bypass.html</link><author>noreply@blogger.com (Alex Gkiouros)</author><media:thumbnail xmlns:media="http://search.yahoo.com/mrss/" url="https://blogger.googleusercontent.com/img/b/R29vZ2xl/AVvXsEhVlfe91fX2G9tLGFvMnmcNH_LoiCMeygXdFzr4PfS5V_zKDr1xlbnYqL1bA5xbrg9yC5r7__BGU8KMHF9WdGHzbzK1zyYwgo34in9DWDHS_h4mydAkWekftAiqT0YTC9J_IenKB-rmiuY/s72-c/Untitled1.png" height="72" width="72"/><thr:total>0</thr:total></item></channel></rss>