NetBIOS/NBNS

NBNS serves much the same purpose as DNS does: translate human-readable names to IP addresses e.g. www.wireshark.org to 65.208.228.223. As NetBIOS can run on top of several different network protocols e.g. IP, IPX, …, other implementations of the NetBIOS services have their own mechanisms for translating NetBIOS names to addresses. NBNS’s services are more limited, in that NetBIOS names exist in a flat name space, rather than DNS’s hierarchical one multiple flat name spaces can exist, by using NetBIOS scopes, but those are rarely used, and NBNS can only supply IPv4 addresses; NBNS doesn’t support IPv6.

via NetBIOS/NBNS – The Wireshark Wiki.

Education | parallel.illinois.edu

For this reason, education is among the primary missions of the Parallel Computing Institute. With offerings ranging from complete curricula in parallel computing through the departments of Electrical and Computer Engineering and in Computer Science, to just-in-time workshops and seminars, PCI offers a broad selection of options for students and professionals and collaborates with organizations such as the CUDA Center of Excellence, the Universal Parallel Computing Research Center, the Cloud Computing Testbed, and NCSA, among others, to make their offerings widely available.

via Education | parallel.illinois.edu.

Loopholes in Verified by Visa & SecureCode

At issue is a security protocol called “3 Domain Secure,” (3DS), a program designed to reduce card fraud and shift liability for fraud from online merchants to the card issuing banks. Visa introduced the program in 2001, branding it “Verified by Visa,” and MasterCard has a similar program in place called “SecureCode.”

Cardholders who chose to participate in the programs can register their card by entering the card number, filling in their ZIP code and birth date, and picking a passcode. When cardholders go to use that card at a merchant site that uses 3DS, the shopper then enters the code, which verified by the issuing bank and is never shared with the merchant site.

via Loopholes in Verified by Visa & SecureCode — Krebs on Security.

Free Local and Long Distance Calling with netTALK’s DUO

Free Local and Long Distance Calling with netTALK’s DUO.

North America $70/year, International $120/year.  This seems like a Skype competitor.  It looks like there’s a piece of hardware that comes with this that can be seen here.

Here‘s how it works.  You don’t need a computer — just plug the device into the router and phone.  I noticed an HTC device trying to connect SIP to this outfit so they must have an Android app as well.

The TCP Datagram

push flag (1 bits)

The push flag tells the receiving end of the tcp connection to “push” all buffered data to the receiving application. It basically says “done for now”.

via The TCP Datagram.

This would be the PSH flag that I needed to look up and found this site which makes for a good reference.

Transparent web proxy – DD-WRT Wiki

Running a transparent proxy server on your network can be used for more advanced content filtering of web pages for environments such as a school or library (where in some locales, filtering is required by law) or as a way to protect children in the household.

This guide will help you enable a transparent proxy server on your network by having your WRT54G router forward all traffic to the proxy server automatically.

via Transparent web proxy – DD-WRT Wiki.

Example of a full nat solution with QoS

Here I’m describing a common set up where we have lots of users in a private network connected to the Internet trough a Linux router with a public ip address that is doing network address translation (NAT). I use this QoS setup to give access to the Internet to 198 users in a university dorm, in which I live and I’m netadmin of. The users here do heavy use of peer to peer programs, so proper traffic control is a must. I hope this serves as a practical example for all interested lartc readers.

Via Example of a full nat solution with QoS.

Linux: The hole trick to bypass firewall restriction

Linux: The hole trick to bypass firewall restriction.

As long as remote is behaving itself, it will send back a “port unreachable” response via ICMP – however this is of no consequence. On the second attempt
remote# echo "hello" | nc -p 53 -u local-fw 14141
The netcat listener on console local/1 then coughs up a “hello” – the UDP packet from outside has passed through the firewall and arrived at the computer behind it.