Search:

Type: Posts; User: cybermike_dk; Keyword(s):

Search: Search took 0.09 seconds.

  1. Ip adresses as one entire decimale number

    I saw that once, where you could use : 12345678 instead of 0.188.97.78 but i cant remember how to translate from the fully decimale number to the dot-seperated ip adress.

    plz tell me.
  2. I dont think you got the message :=)

    There are 16 ports on the switch

    they are named 1 to 16.

    If i discover a person abusing the network and i know he´s mac adress is 00-54-FC-80-C0-56 then i want to ask the switch, "in which...
  3. Replies
    3
    Views
    11,245

    !

    hehbris>Im talking nice to you, then i except you to do the same

    IchNiSan> i will check out snort


    But i dont need a filter, i need a program that can "sniff" the network. If i use ip-chains i...
  4. Tracking mac adresses on my fujang-switches

    Hi

    i have a couple of these switches(i have attached the data sheet in a zip file)

    I realy need a way to figure out which mac adresses are assigned with what ports.


    Mike
  5. Replies
    3
    Views
    11,245

    Network flood detection/protection

    I need a program that runs on our router(a linux box) that can watch all our four segments and send out an alert(eg. an email or something like that) if someone starts to flood the network with e.g....
  6. Replies
    14
    Views
    13,123

    Easy

    As far as i know it works in Slackware,mandrake,redhat,debian and suse(might now be sure about that one)

    The fix is easy, edit the /etc/lilo.conf remove the line "prompt" and the "bug" will be...
  7. Thread: A newbie?

    by cybermike_dk
    Replies
    0
    Views
    3,641

    A newbie?

    What is a newbie?

    A newbie is someone who have something left to learn, and are willing to learn it, are trying to learn it and a person that realize that he wil never be perfekt!
  8. Thread: Firewall

    by cybermike_dk
    Replies
    15
    Views
    12,162

    :)

    i´ll look into it.

    The reason why i picked ipchains is that when i installed my slack on the firewall box, i could choce between iptabels and ipchains,(which ofcourse was different kernels i...
  9. Thread: Firewall

    by cybermike_dk
    Replies
    15
    Views
    12,162

    duh

    nebivedu: You havent been listening have you?
  10. Replies
    3
    Views
    5,405

    More like this

    I haven´t checked all the links yet, but i was thinking of something like this:

    download a file e.g. rsafs.o

    insmod rsafs.o
    mkefs.rsa /dev/hde1

    and then put the following in fstab
    ...
  11. Thread: Firewall

    by cybermike_dk
    Replies
    15
    Views
    12,162

    Re: firewall

    Thats for sure, but i just dont know if there exists a uptables-howto.

    I haven´t got a internet connection at home so i only have the howtos that goes along with slack 8.0
  12. Thread: Ftp

    by cybermike_dk
    Replies
    1
    Views
    4,704

    oups

    should have been an answer to http://www.antionline.com/showthread.php?s=&threadid=114255
  13. Replies
    6
    Views
    6,788

    Oups

    http://www.antionline.com/showthread.php?s=&threadid=114533

    i gotta get used to use this board :)
  14. Thread: Ftp

    by cybermike_dk
    Replies
    1
    Views
    4,704

    Ftp

    Set up a ftp server on one of the machines, that should work.

    The only other way i can think of(there maybe be specifik software that can de excatly what you´re talking about) is using somekind...
  15. Thread: Firewall

    by cybermike_dk
    Replies
    15
    Views
    12,162

    firewall?

    a software-on-box firewall is no god.

    Go to the local dump and find you´re self a 386´er or something like that. Go out and by two netcard adapters, and kick a linux dist into it, read the...
  16. Replies
    3
    Views
    5,405

    Encrypted filesystem

    Does such a thing exist? and how does it works?
    what about performance? what kind of encryption does it use? how secure is it? how does it store the key?


    Can anybody give me some answers? ...
  17. Replies
    6
    Views
    7,683

    /bin/login trojan!

    if the administrator uses logrotation AND tjek hi´s logfiles, he would proberly check (or used automated software) the size and crc of the most (or all) of the importent system programs.
  18. Replies
    0
    Views
    3,950

    Yo Whatsup? Mike is on the field!

    Hey my name is Mike im from Denmark, i have been working alot with network and different unix os´es lately.

    I know a lot but im sure some of you people know more than me, so i hope to learn...
Results 1 to 18 of 18