This document describes Session Initiation Protocol (SIP), an application-layer control (signaling) protocol for creating, modifying, and terminating sessions with one or more participants. These sessions include Internet telephone calls, multimedia distribution, and multimedia conferences.
Loopholes in Verified by Visa & SecureCode
At issue is a security protocol called “3 Domain Secure,” (3DS), a program designed to reduce card fraud and shift liability for fraud from online merchants to the card issuing banks. Visa introduced the program in 2001, branding it “Verified by Visa,” and MasterCard has a similar program in place called “SecureCode.”
Cardholders who chose to participate in the programs can register their card by entering the card number, filling in their ZIP code and birth date, and picking a passcode. When cardholders go to use that card at a merchant site that uses 3DS, the shopper then enters the code, which verified by the issuing bank and is never shared with the merchant site.
via Loopholes in Verified by Visa & SecureCode — Krebs on Security.
Free Local and Long Distance Calling with netTALK’s DUO
Free Local and Long Distance Calling with netTALK’s DUO.
North America $70/year, International $120/year. This seems like a Skype competitor. It looks like there’s a piece of hardware that comes with this that can be seen here.
Here‘s how it works. You don’t need a computer — just plug the device into the router and phone. I noticed an HTC device trying to connect SIP to this outfit so they must have an Android app as well.
The TCP Datagram
push flag (1 bits)
The push flag tells the receiving end of the tcp connection to “push” all buffered data to the receiving application. It basically says “done for now”.
via The TCP Datagram.
This would be the PSH flag that I needed to look up and found this site which makes for a good reference.
Transparent web proxy – DD-WRT Wiki
Running a transparent proxy server on your network can be used for more advanced content filtering of web pages for environments such as a school or library (where in some locales, filtering is required by law) or as a way to protect children in the household.
This guide will help you enable a transparent proxy server on your network by having your WRT54G router forward all traffic to the proxy server automatically.
Example of a full nat solution with QoS
Here I’m describing a common set up where we have lots of users in a private network connected to the Internet trough a Linux router with a public ip address that is doing network address translation (NAT). I use this QoS setup to give access to the Internet to 198 users in a university dorm, in which I live and I’m netadmin of. The users here do heavy use of peer to peer programs, so proper traffic control is a must. I hope this serves as a practical example for all interested lartc readers.
Linux: The hole trick to bypass firewall restriction
Linux: The hole trick to bypass firewall restriction.
As long as remote is behaving itself, it will send back a “port unreachable” response via ICMP – however this is of no consequence. On the second attempt
remote# echo "hello" | nc -p 53 -u local-fw 14141
The netcat listener on console local/1 then coughs up a “hello” – the UDP packet from outside has passed through the firewall and arrived at the computer behind it.
Daytime Protocol
Daytime Protocol – Wikipedia, the free encyclopedia.
The Daytime Protocol is a service in the Internet Protocol Suite, defined in 1983 in RFC 867. It is intended for testing and measurement purposes in computer networks.
A host may connect to a server that supports the Daytime Protocol on either Transmission Control Protocol (TCP) or User Datagram Protocol (UDP) port 13. The server returns an ASCII character string of the current date and time in an unspecified format.
Apparently some HTC devices use this protocol.
Navicat – MySQL Overview
Navicat for MySQL is available for three platforms – Microsoft Windows, Mac OS X and Linux. It connects users to any local/remote MySQL Server, providing several database utilities such as Data Modeling Tool, Data/Structure Synchronization, Import/Export, Backup and Report, to facilitate the process of maintaining data.
via Navicat – MySQL Overview – The Most Popular SQL Server management,
Red Hat’s Linux changes: Fixes or ISV positioning?
But Rainer Gerhards, the lead developer for the rsyslog tool, has now had a chance to analyze Poettering’s and Sievers’ paper in detail and says that the similarities to the Windows Event Log is actually a good thing, since there are aspects of the Windows Event Log tool that would actually be useful in.
But, Gerhards argues, such a drastic change in the way Linux handles system event logging may not be necessary, given that Gerhards’ rsyslog tool, as well as functionality in the competing syslog-ng tool, already can address many of the problems Sievers and Poettering have addressed.
via Red Hat’s Linux changes: Fixes or ISV positioning? | ITworld.