I've been reading up on the STUN protocol, where they mention 4 "types" of nat responses / cones to UDP responses.
I was just wondering if anyone knew what was the default behavior on the iptables masquerade nat ?
Full cone? Restricted cone? port restricted cone? symetric...
I've been reading on the stuff and from my angle, LVM seems to be only useful for clustering ( aka, get several disks and get them all under one logical disk to make things easy). I am most probably wrong. It's also awefully similar to some kind of weirdly complicated RAID setup.
Since i assume...
I'm very curious about this. What do the other unix/linux people do as root, and simply will never touch with a ten foot pole with the root user ? In which circumstances would you not recommend su over root access?
( Ok, i admit it's mostly got to do with SOMEONE ELSE not doing "<" when he...
Ever since i've seen the fortune cookie lists ( like the bofh cookies, the old english cookies, etc etc) i've always been interested in making my own "cookie file".
Problem is, i've looked around but i've never been able to get some kind of "formatter" for the fortune...
( NOTE : This is a small tale of what happens when you get a bored person like me, who happens to run a small personal .org webserver and a pretty much empty CS server , and suddenly have nothing to do and it's late at night, and you just happen to notice that something weird is in the logs...
I'm having some trouble locating regular, plain english info on the new kernel. For example:
- What packet filtering/FW utility is it going to be bundled with / bwcompatible to ... ? ( Iptables again ?)
- What are the main reasons i would switch from a stable 2.4 kernel to a 2.6 kernel ?
I'm...
I'm looking for places that have shell exercices so i can keep on top of my stuff ( I loved doing it in school but i haven't been able to find some since ).
You know, small problems that involve getting something specific from a text file in one line , "make a small bash script to kill...
(I'll start)
Well, i have found that the most important tools is not the shiniest device or the most powerful servers, but simply in using the amazing planning power of the pen and paper.
Pen and paper, especially in the early stages of planning and development of networks, will save headaches...
Trojan hijacks web browsers
By John Leyden
Posted: 03/10/2003 at 07:38 GMT
A Trojan that exploits an Internet Explorer vulnerability is capable of allowing attackers to hijack browser behaviour, anti-virus firms warn.
The QHosts (Delude) Trojan can't spread by itself. Users only become...
Hi.
I am modifying a website for a friend, and he has asked me something which i am not sure how to do, either using HTML or javascript.
Essentially, what he wants is that in the event of someone closing the browser window from his site, for a very small popup to appear and saying goodbye, and...
This site uses cookies to help personalise content, tailor your experience and to keep you logged in if you register.
By continuing to use this site, you are consenting to our use of cookies.