Iptables is used to set up, maintain, and inspect the tables of IP packet filter rules in the Linux kernel. Several different tables may be defined. Each table contains a number of built-in chains and may also contain user defined chains.
By default, Iptables log message to a /var/log/messages file. However you can change this location. I will show you how to create a new logfile called /var/log/iptables.log. Changing or using a new file allows you to create better statistics and/or allows you to analyze the attacks
Tag Archives: reference
Protecting the pre-OS environment with UEFI
Quick summary
- UEFI allows firmware to implement a security policy
- Secure boot is a UEFI protocol not a Windows 8 feature
- UEFI secure boot is part of Windows 8 secured boot architecture
- Windows 8 utilizes secure boot to ensure that the pre-OS environment is secure
- Secure boot doesn’t “lock out” operating system loaders, but is a policy that allows firmware to validate authenticity of components
- OEMs have the ability to customize their firmware to meet the needs of their customers by customizing the level of certificate and policy management on their platform
- Microsoft does not mandate or control the settings on PC firmware that control or enable secured boot from any operating system other than Windows
Via Protecting the pre-OS environment with UEFI – Building Windows 8 – Site Home – MSDN Blogs.
Pd-extended and random-data streams
Here’s a little something I wrote to take the checksums from incoming data on a network and turn these into useful data in Pd-extended. We communicate the data via the OSC (OpenSoundControl) protocol.
This uses:
- tcpdump
- Some sort of fifo
- Perl (to build our OSC packets)
- Pd-extended
HVM Compatible Processors
This should be useful to someone looking for HardwareVirtualMachine (HVM) compatibility by specific processors. In other words, CPU’s utilizing AMD SVM (Secure Virtual Machine), or Intel(R) Virtualization Technology (currently VT-x).
Internet Real Time Lab (IRT)
The Internet Real-Time Lab (IRT) in the Computer Science Department at Columbia University conducts research in the areas of Internet and multimedia services: Internet telephony, wireless and mobile networks, streaming, quality of service, resource reservation, dynamic pricing for the Internet, network measurement and reliability, service location, network security, media on demand, content distribution networks, multicast networks and ubiquitous and context-aware computing and communication.
Remote Network Boot via PXE
Let’s say you’re responsible for a network of 100 computers shared by students. What do you do if one of those computers starts acting funny? If you’re like me, you’ll just do a clean install of the operating system. But that’s a lot of work, especially if you have to do it several times a week. Fortunately, most PCs sold since 2001 follow the PC99 guidelines from Intel and Microsoft, which among other things says that new computers with Ethernet interfaces must implement two useful features: wake-on-LAN and network boot.
Becoming a Sole Proprietor in Illinois
Here is an outline of the steps you should follow to get started as a sole proprietor in Illinois. You should also read the general section for information applicable in any state.
Becoming a Sole Proprietor in Illinois | Citizen Media Law Project.
Business Owner’s Toolkit: Starting Sole Proprietorships
Starting Sole Proprietorships
The easiest and least expensive way to begin operating a business is as a sole proprietorship. You simply decide to begin operating the business as a sole proprietor and you’re done.
There are no documents or forms needed, unless the business will operate under a name other than the owner’s name
via Business Owner’s Toolkit: Starting Sole Proprietorships.
Starting a Consulting Company
Starting a consulting business? If you have expertise and skills that others need, starting a consulting firm may be your ticket to the entrepreneurial ball. This article walks you through the process.
A step-by-step plan to starting a consulting business
During my career, I have also worked as a recruiter and a managing director at a consulting company. My varied experiences have given me the opportunity to talk with hundreds of consultants over the years. From both my own experiences and the experiences of others, I’ve developed a start-up plan for those seeking to head into consulting.
Via A step-by-step plan to starting a consulting business | TechRepublic.