Thursday, August 28, 2008

Javascript online massive social password cracking ?

What about a javascript online massive social password cracking ?

read more | digg story

Tuesday, August 19, 2008

Creating accessible charts using canvas and jQuery

Data visualization in HTML has long been tricky to achieve. Past solutions have involved non-standard plugins, proprietary behavior, and static images. But this has changed with the recent growth...

read more | digg story

Wednesday, August 13, 2008

Creating accessible charts using canvas and jQuery

Data visualization in HTML has long been tricky to achieve. Past solutions have involved non-standard plugins, proprietary behavior, and static images. But this has changed with the recent growth...

read more | digg story

Monday, August 4, 2008

Creating accessible charts using canvas and jQuery

Data visualization in HTML has long been tricky to achieve. Past solutions have involved non-standard plugins, proprietary behavior, and static images. But this has changed with the recent growth...

read more | digg story

Sunday, August 3, 2008

Ext3, ReiserFS & XFS in Windows thanks to coLinux

If you ever: needed to access your ext3, reiserfs or XFS partitions from Windows, wanted to use one of your favorite file systems via FUSE, or had an idea to mount an image of your hard drive, then this article is for you. This is a how-to, describing what to do, if you want Windows to handle file systems in a similar way as Linux does.

read more | digg story

College Teacher Shows Students How To Be Hackers

In a windowless underground computer lab in California, young men are busy cooking up viruses, spam and other plagues of the computer age. Grant Joy runs a program that surreptitiously records every keystroke on his machine, including user names, passwords, and credit-card numbers.

read more | digg story

Biggest Military Hack of All Time Was Done With a 56k Modem

Gary McKinnon, a British computer expert, claims he's just fascinated with UFOs. Using his home computer and a modem — how WarGames! — he infiltrated military networks and accessed thousands of computers trying to find evidence of alien contact

read more | digg story

Saturday, August 2, 2008

New 3.2Gbps FireWire spec approved, not as fast as USB 3.0

The IEEE 1394 working group has formally approved FireWire's next-generation standard. The new version defines transfer speeds of 1.6Gbps and 3.2Gbps, is backwards compatible with FireWire 800 and 400, and uses the same cable standard as FireWire 800.

read more | digg story

Wednesday, July 30, 2008

Ex-Google engineers debut 'Cuil' way to search

Anna Patterson's last Internet search engine was so impressive that industry leader Google Inc. bought the technology in 2004 to upgrade its own system. She believes her latest invention is even more valuable - only this time it's not for sale.

read more | digg story

Monday, July 28, 2008

Five Best Alternative File Managers

If you're any sort of power user, you've bumped up against the limitations of your operating system's default file manager on countless occasions.

read more | digg story

10 Revolutionary Computers

Despite appearances, today's online world did not spring to life fully formed. Before they were made a major part of our lives, some pioneering computers either had to capture the public's imagination, establish what could be done by computers, or both. Here, we'll look at some computers that played, and sometimes continue to play, a major role.

read more | digg story

Sunday, July 6, 2008

Protect Your Privacy While Downloading

Earlier this week, a Lifehacker reader caught downloading copyrighted material using BitTorrent told us about the scary warning letter she received from her ISP about a big media company who filed a complaint.

read more | digg story

Wednesday, July 2, 2008

Turn Your $60 Router into a Super-Router with Tomato

Since last year there's been a lot of development of open source firmwares, and today we're taking a look at my new favorite, a firmware called Tomato. It does almost everything you expect, from Wi-Fi signal boosting to Quality of Service bandwidth allocation, in addition to offering a simplified interface chock full of fancy charts and graphs

read more | digg story

Friday, June 20, 2008

Display BGP routes originated in the local AS

The easiest way to display BGP routes originating in the local autonomous system is to use the regular expression ^$ (empty AS-path) in the show ip bgp regexp command, for example:

PE-A#show ip bgp regexp ^$
BGP table version is 10, local
router ID is 10.0.1.1
Status codes: s suppressed, d damped, h history,
* valid, > best, i - internal,
r RIB-failure, S
Stale
Origin codes: i - IGP, e - EGP, ? - incomplete

Network
Next Hop Metric LocPrf Weight Path
*> 10.0.1.1/32
0.0.0.0 0 32768 i
r>i10.0.1.2/32
10.0.1.2 0 100 0 i

If you want to apply a show filter to the printout of this command, you have to use the quote-regexp variant; otherwise the rest of the line is interpreted as regular expression. To skip the header explaining the BGP status code (we know them by heart by now, don’t we?), use …

PE-A#show ip bgp
quote-re
gexp "^$" begin Network

Network Next Hop Metric LocPrf Weight Path
*>
10.0.1.1/32 0.0.0.0 0 32768
i
r>i10.0.1.2/32 10.0.1.2 0 100 0
i

… and end with the eye candy – define this command as an alias: alias exec localbgp show ip bgp quote-regexp "^$" begin Network.

Use the explicit "address-family ipv4" in BGP configurations

If you use multiprotocol BGP (MP-BGP) in your network to support MPLS VPN, IPv6 or IP Multicast over BGP, it's best if you go all the way and configure an explicit ipv4 address family; the resulting BGP configuration is significantly easier to read and understand as the session-specific parameters are clearly separated from the routing-specific parameters and the IPv4 settings are nicely grouped in an explicit section.
To change the format of the BGP configuration, configure the IPv4 address family with the address-family ipv4 unicast router configuration command (the neighbor statements and other configuration settings pertinent to IPv4 configuration are automatically moved into the new address family) or manually activate a BGP neighbor for IPv4 route exchange with the neighbor activate router configuration command.To illustrate the differences between the traditional BGP configuration and the per-address-family configuration, consider a simple MPLS VPN+Internet setup. First the traditional approach:

router bgp 65000
template peer-policy Internal

send-community both
exit-peer-policy
!
template peer-session
Internal
remote-as 65000
update-source Loopback0

exit-peer-session
!
no synchronization
bgp
log-neighbor-changes
network 10.0.1.1 mask 255.255.255.255

neighbor 10.0.1.5 inherit peer-session Internal
neighbor 10.0.1.5
description PE-C(RR)
neighbor 10.0.1.5 inherit peer-policy
Internal
no auto-summary
!
address-family vpnv4
neighbor
10.0.1.5 activate
neighbor 10.0.1.5 send-community extended

exit-address-family

... and the changed configuration after the address-family ipv4 command has been entered:

router bgp
65000
template peer-policy Internal
send-community both

exit-peer-policy
!
template peer-policy InternalV6

send-label
inherit peer-policy Internal 1
exit-peer-policy

!
template peer-session Internal
remote-as 65000

update-source Loopback0
exit-peer-session
!
bgp
log-neighbor-changes
neighbor 10.0.1.5 inherit peer-session
Internal
neighbor 10.0.1.5 description PE-C(RR)
!

address-family ipv4
no synchronization
network 10.0.1.1 mask
255.255.255.255
neighbor 10.0.1.5 activate
neighbor 10.0.1.5
inherit peer-policy Internal
no auto-summary

exit-address-family
!
address-family vpnv4
neighbor 10.0.1.5
activate
neighbor 10.0.1.5 send-community extended

exit-address-family

Monday, June 2, 2008

Simple CSS vertical menu Digg-like

This tutorial explains how to implement a simple vertical menu digg-like using CSS and javascript to show/hide sub-menu.

read more digg story

Thursday, May 22, 2008

Javascript Wolfenstein 3D

Yet an excellent demo of what can be done with canvas in javascript.

read more digg story

Saturday, May 17, 2008

PartnerBar: Google's feed aggregating magic javascript widget thingy

I was browsing the Google AJAX Search API blog recently when I discovered they were using an interesting widget at the bottom of the page, it turned out to be PartnerBar. PartnerBar was created as an example for the Google AJAX Feed API. I have been very busy with family stuff recently so I managed to completely miss this when news of it first broke in December (Ajax Feed Partner Bar and The PartnerBar - Contextual Cross Linking). In my defence this is easy to miss, it is called "PartnerBar", which means nothing to anybody on this side of the pond and the launch article talks about "contextual cross linking" (meaningless technobabble!). Essentially, PartnerBar is a feed aggregating magic javascript widget thingy, if it had been launched as such I would have spotted it sooner.

AnywayI have been playing with it recently and have made some minor tweaks to improve it for my own usage, I'm very happy with the results. I can't decide whether to install the resulting widget permanently on my blog because I think people would find it annoying if I were to place it somewhere prominent.

My tweaks and modifications
Feed titles and links.

In the instance of PartnerBar on their blog, Google store an array of their blogs in a JavaScript file: http://www.google.com/uds/solutions/partnerbar/google-blogs.js.

Incidentally, notice how it supports tags so that you can use the same array for multiple widgets with distinct content.

My first modification was to tweak the code so that I did not have to supply the feed name and link, this information is stored in the feed (why store it twice?). To achieve this I overrode the loadPartner method - I think the trick with overriding methods in JavaScript is to make sure the method you override is a small one!

My array of blogs looks like this: blogs.js

Alternating row colours

Secondly, I wanted the feed entries to display in alternating colours. Again, I found a small JavaScript method in PartnerBar (resetClassOnPartnerDom) and overrode it (AFAIK there is no "super" keyword in JavaScript, which is a shame). In order to do this I made use of a getElementsByClassName method that I found on the web.

Final result

You should be able to see the widget in action at the top of this blog entry. However, you can link out to see the final result in standalone glory here.

Hereis my final JavaScript which my customised widget uses: partnerBar.js.

Design

Although I suffer with CSS, I am not a graphic designer and so I tend to steal gather inspiration from elsewhere. I based my widget on the Infected table theme from the CSS table gallery.

Monday, April 28, 2008

Die Pornografinnen - DVD-Forum.at - Das Entertainment Magazin

Die Pornografinnen - DVD-Forum.at - Das Entertainment Magazin

Die Pornografinnen
ARTE, Donnerstag, 27. März 2008 um 23.15 Uhr
VPS : 23.15
Wiederholungen : 30.03.2008 um 01:55 05.04.2008 um 03:50
Die Pornografinnen (Dänemark, 2005, 50mn)
ZDF
Regie: Marita Neher

Pornografie galt lange Zeit als Domäne der Männer. Frauen waren in diesem Genre nur als Objekte männlicher Begierden anzutreffen. Doch heute werden pornografische Filme, Bilder, Texte, Comics und Performances immer häufiger auch von Frauen produziert. Die Dokumentation spürt dem wachsenden Selbstverständnis nach, mit dem Frauen ihre sexuellen Fantasien und Bedürfnisse in erotischen Werken umsetzen.Nach einer weit verbreiteten Meinung werden Pornos vor allem von Männern konsumiert, nicht nur weil sie speziell für die männlichen Fantasien zugeschnitten sind, sondern weil Frauen angeblich keine entsprechenden Bedürfnisse haben. Folglich war der Pornomarkt lange Zeit ein von Männern dominierter Markt und Pornografie für viele ein Synonym für Frauenfeindlichkeit.Heute werden pornografische und erotische Werke - Filme, Texte, Fotografien, Bilder, Comics und Performances - in zunehmendem Maße auch von Frauen produziert. Es scheint, als ob Frauen nicht nur zu einem selbstverständlicheren Umgang mit Pornografie finden, sondern dabei sind, sich dieses Genre anzueignen, um ihre eigenen sexuellen Fantasien darzustellen. Welche Bilder brauchen Frauen, wenn sie sich von Pornografie erregen lassen wollen, und inwieweit unterscheiden sich von Frauen kreierte Bilder und Texte von denen männlicher Produzenten?Pornodarstellerin und -produzentin Ovidie, Fotografin Natascha Merritt, Verlegerin Claudia Gehrke, Pornoregisseurin Petra Joy sowie Elke Kuhlen und Nicole Rüdiger, Herausgeberinnen von "Glück", einem Pornoheft für Mädchen, ließen sich bei ihrer aktuellen Arbeit von der Kamera begleiten. Sie erklären, nach welchen Regeln ihrer Meinung nach Erotik und Pornografie für Frauen funktionieren. Mit Humor und Selbstironie beschreiben sie ihre sexuellen Fantasien, ihre immer noch schwierige Rolle in der Gesellschaft und die kleinen Tricks, mit denen Sexualität auf der Leinwand "echt" aussieht.Senderinfo

Erfolgsgeschichte Mobiltelefon

Erfolgsgeschichte Mobiltelefon
Schon auf der Weltausstellung 1939 in New York wurde das Konzept des Mobiltelefons im Futurama Pavillon vorgestellt. Im Zweiten Weltkrieg kommunizierten amerikanische Soldaten mobil mit Motorola Walkie Talkies. Doch es dauerte noch über 30 Jahre bis es 1973 zum legendären ersten mobilen Telefongespräch zwischen Managern von Motorola und AT&T kam. Wie sah die Entwicklung des Mobiltelefons zur Marktreife aus? Welche technischen und politischen Hürden mussten genommen werden? Die DISCOVERY CHANNEL-Dokumentation ‘Erfolgsgeschichte Mobiltelefon’ erzählt die Produktgeschichte des Mobiltelefons spannend wie ein Krimi, berichtet von Höhen und Tiefen einer technischen Revolution, die die Welt verändert hat. Bis heute wurden 2 Milliarden Mobiltelefone weltweit verkauft.

Charts And Graphs: Modern Solutions

This article presents an overview of tools, applications and techniques for visualizing data in charts and graphs. Among other things both free and commercial chart tools, services, desktop-applications and web-based solutions (Flash, JavaScript, CSS) — you can use them on your server are presented.

read more digg story

Monday, April 21, 2008

Quick Vista Hack to Get You Browsing at High-Speed Again

Maybe a way to improve vista browsing speeds online.

read more digg story

Friday, April 18, 2008

BGP

BGP

Friday, April 11, 2008

IEEE 802.1X for Wired Networks and IPSec with Microsoft Windows XP / 2003 (Microsoft Whitepaper)

IEEE 802.1X for Wired Networks and Internet Protocol Security with Microsoft Windows (Microsoft Whitepaper)


This white paper examines and compared 802.1X for wired networks and IPsec.


Download:


8021X_IPsec.doc, 2/6/2008, version 1.1




Overview:


Microsoft Windows Server 2003 and Windows XP support both the IEEE 802.1X standard for wired networks and the Internet Protocol security (IPsec) Internet standard. The IEEE 802.1X standard for wired networks provides authentication and authorization protection at the network edge where a host attaches to the network. IPsec provides peer authentication and cryptographic protection of IP traffic from end-to-end. This white paper describes the security and capabilities of 802.1X for wired networks and IPsec based on industry standards and their support in Windows Server 2003 and Windows XP, and provides comparison information when evaluating deployment of these security technologies.




related resources @ Microsoft


IPsec Web site


Network Access Protection Web site


Extensible Authentication Protocol Web site


Deployment of IEEE 802.1X for Wired Networks Using Microsoft Windows




see also:


Step-by-Step Guide: Demonstrate NAP IPsec Enforcement in a Test Lab

Stateful Failover for IPSec (Cisco Systems)

Stateful Failover for IPSec (Cisco Systems)


Stateful failover for IP Security (IPSec) enables a router to continue processing and forwarding IPSec packets after a planned or unplanned outage occurs. Customers employ a backup (secondary) router that automatically takes over the tasks of the active (primary) router if the active router loses connectivity for any reason. This process is transparent to the user and does not require adjustment or reconfiguration of any remote peer.


Stateful failover for IPSec is designed to work in conjunction with stateful switchover (SSO) and Hot Standby Routing Protocol (HSRP). HSRP provides network redundancy for IP networks, ensuring that user traffic immediately and transparently recovers from failures in network edge devices or access circuits. That is, HSRP monitors both the inside and outside interfaces so that if either interface goes down, the whole router is deemed to be down and ownership of Internet Key Exchange (IKE) and IPSec security associations (SAs) is passed to the standby router (which transitions to the HSRP active state). SSO allows the active and standby routers to share IKE and IPSec state information so that each router has enough information to become the active router at any time. To configure stateful failover for IPSec, a network administrator should enable HSRP, assign a virtual IP address, and enable the SSO protocol.




Downloads:


Stateful Failover for IPSec (pdf)

Thursday, April 10, 2008

Super Mario in 14kb Javascript

FTA "Here's an experiment in keepings things small and confined to one Javascript file."gotta love it.

read more digg story

Tuesday, April 8, 2008

Anyterm - A Terminal Emulator in your browser

Anyterm is a AJAX implementation of a terminal emulator, using the ROTE terminal emulator library. It works through an Apache module and a javascript display library, and is configurable by way of an htaccess file.

read more digg story

Wednesday, April 2, 2008

Cisco Press - ebooks

Cisco Press
11.Cisco.Press.Securing.Your.Business.with.Cisco.ASA.and.PIX.Firewalls.May.2005.eBook-DDU
18.Cisco.Press.Business.Case.for.Network.Security.Dec.2004.eBook-LiB
24.Cisco.Press.End.to.End.QoS.Network.Design.Quality.of.Service.in.LANs.WANs.and.VPNs.Nov.2004.eBook
Charles.River.Media,.Cisco.IP.Routing.Protocols.Troubleshooting.Techniques.(2004).LiB
Cisco.Press,.CCNA.Portable.Command.Guide.(2005).BBL.LotB
Cisco.Press,.CCNP.Self-Study.CCNP.Practical.Studies.Switching.(2003).(INTERNAL).BBL.LotB
Cisco.Press,.Cisco.Field.Manual.Catalyst.Switch.Configuration.(2002).(INTERNAL).BBL.LotB
Cisco.Press,.Cisco.Router.Firewall.Security.(2004).DDU
Cisco.Press,.Cisco.Wireless.LAN.Security.(2004).DDU
Cisco.Press,.Computer.Networking.First.Step.(2004).(INTERNAL).BBL.LotB
Cisco.Press,.Deploying.IPv6.Networks.(2006).BBL
Cisco.Press,.Designing.Network.Security.(2003),.2Ed.BBL.(INTERNAL)
Cisco.Press,.Home.Network.Security.Simplified.(2006)
Cisco.Press,.Home.Networking.A.Visual.Do.It.Yourself.Guide.(2004).DDU
Cisco.Press,.Integrated.Cisco.and.UNIX.Network.Architectures.(2004).DDU
Cisco.Press,.Network.Administrators.Survival.Guide.(2005).DDU.LotB
Cisco.Press,.Next-Generation.Network.Services.(2005).BBL.LotB
Cisco.Press,.Optical.Network.Design.and.Implementation.(2004).DDU
Cisco.Press,.Routing.First-Step.(2004).DDU
Cisco.Press.802.11.Wireless.LAN.Fundamentals.eBook-LiB
Cisco.Press.Authorized.Self.Study.Guide.Cisco.Voice.over.IP.CVoice.2nd.Edition.Sep.2006
Cisco.Press.Build.the.Best.Data.Center.Facility.for.Your.Business.Jun.2005.eBook-DDU
Cisco.Press.CCIE.Practical.Studies.Volume.I
Cisco.Press.CCIE.Professional.Development.Cisco.LAN.Switching
Cisco.Press.CCIE.Security.Exam.Certification.Guide.CCIE.Self.Study.2nd.Edition.May.2005.eBook-LiB(1)
Cisco.Press.CCIE.Security.Exam.Certification.Guide.CCIE.Self.Study.2nd.Edition.May.2005.eBook-LiB
Cisco.Press.CCNP.BSCI.Exam.Certification.Guide.Third.Edition.Nov.2003.eBook-DDU
Cisco.Press.Cisco.802.11.Wireless.Networking.Quick.Reference.Oct.2005
Cisco.Press.Cisco.CallManager.Fundamentals.A.Cisco.AVVID.Solution.2nd.Edition.Sep.2005.eBook-DDU
Cisco.Press.Cisco.Field.Manual.Router.Configuration
Cisco.Press.Cisco.Frame.Relay.Solutions.Guide.spy(1)
Cisco.Press.Cisco.Frame.Relay.Solutions.Guide.spy
Cisco.Press.Cisco.LAN.Switching.Fundamentals.Jul.2004.eBook-DDU
Cisco.Press.Cisco.Voice.Gateways.and.Gatekeepers.Aug.2006
Cisco.Press.Comparing.Designing.and.Deploying.VPNs.Apr.2006
Cisco.Press.Configuring.CallManager.and.Unity.A.Step.by.Step.Guide.Jun.2005.eBook-BBL
Cisco.Press.Content.Networking.Fundamentals.Mar.2006
Cisco.Press.End.to.End.QoS.Network.Design.Quality.of.Service.in.LANs.WANs.and.VPNs.Nov.2004.eBook
Cisco.Press.Firewall.Fundamentals.Jun.2006
Cisco.Press.IPSec.VPN.Design.Apr.2005.ISBN1587051117
Cisco.Press.Intrusion.Prevention.Fundamentals.Jan.2006
Cisco.Press.LAN.Switching.First-Step.Jul.2004.eBook-DDU
Cisco.Press.MPLS.and.Next.Generation.Networks.Nov.2006
Cisco.Press.Optimal.Routing.Design.Jun.2005.eBook-DDU
Cisco.Press.QoS.for.IP.MPLS.Networks.Jun.2006
Cisco.Press.Routing.TCP.IP.Volume.1.2nd.Edition.Oct.2005(1)
Cisco.Press.Routing.TCP.IP.Volume.1.2nd.Edition.Oct.2005
Cisco.Press.Securing.Your.Business.with.Cisco.ASA.and.PIX.Firewalls.May.2005.eBook
Cisco.Press.Self.Defending.Networks.The.Next.Generation.of.Network.Security.Aug.2006
Cisco.Press.Storage.Networking.Fundamentals
Cisco.Press.TCP.IP.First.Step.Dec.2004.eBook-LiB
Cisco.Press.Taking.Charge.of.Your.VoIP.Project
Cisco.Press.The.Business.Case.for.Storage.Networks.Oct.2004.eBook-LiB
Cisco.Press.Troubleshooting.Remote.Access.Networks.Nov.2002.INTERNAL
Cisco.Press.Voice.over.IP.First.Step.Dec.2005
MH,.Cisco.A.Beginners.Guide.(2006),.4Ed.BBL.[0072263830]
Mobile IP Technology and Applications (2005) Cisco
O'Reilly,.Cisco.Cookbook.(2003)
OReilly,.Cisco.IOS.in.a.Nutshell.(2005),.2Ed.BBL.LotB
ReallyUsefulEbooks.com_0596527225_OReilly.Cisco.IOS.Cookbook.2nd.Edition.Dec.2006.eBook-BBL
Securing Your Business With Cisco Asa And Pix Firewalls (2005) Cisco
Syngress.Cisco.Security.Professionals.Guide.To.Secure.Intrusion.Detection.Systems.eBook-LiB
cisco.press.cisco.callmanager.best.practices.a.cisco.avvid.solution.jun.2004.ebook-ddu

Tuesday, April 1, 2008

Cisco Press eBooks list

Cisco Press eBooks

CCIE Routing and Switching

Certifies expert-level knowledge of networking across various LAN and WAN interfaces, and a variety of routers and switches.

CCIE Security

Certifies expertise with specific security protocols and components, as well as IP and IP routing.