Gate One

I came across a program called Gate One by LiftOff Software that just amazed me. This is an open-source, web-based ssh terminal. It is capable of multiple users, sessions, and bookmarks. I’ve tried a number of AJAX terminals or Java applet based ones in the past. The javascript ones usually did not have very good terminal emulation, while the Java apps worked, but worked just like a local desktop app (making it’s own connection to port 22). Gate One uses WebSockets, allowing for full duplex communication through your web browser over the same port 80 or 443 used to serve up the web page. Read the rest of this entry »

WebDAV CGI

… is a Perl CGI script that enables the WebDAV protocol (class 1,2,3) for web server. If you need correct permissions for files and folders you can install this WebDAV CGI script and a UID/GID wrapper. The Apache module mod_dav does not support UID/GID wrapping, so this implementation fills up this gap as a (most complete) replacement.

Read the rest of this entry »

NX client shortcuts

Which key combinations does NX adopt?
If you want to switch back from a fullscreen session to your native OS desktop, you can click on the ‘magic pixel’ on the upper right edge of your screen.

Read the rest of this entry »

WEP and WPA cracking

How To Crack WEP and WPA Wireless Networks
Cracking WEP, WPA-PSK and WPA2-PSK wireless security using aircrack-ng
2008.11.21 10:53 EST by Philip

Introduction


With the popularity of wireless networks and mobile computing, an overall understanding of common security issues has become not only relevant, but very necessary for both home/SOHO users and IT professionals alike. This article is aimed at illustrating current security flaws in WEP/WPA/WPA2.

Successfully cracking a wireless network assumes some basic familiarity with networking principles and terminology, as well as working with command-line tools. A basic familiarity with Linux can be helpful as well.

Read the rest of this entry »

Iptables port knocking – single port used

There are many things to make your computer more secure and sometimes something as simple as port knocking can do the trick.

Port knocking as technique is used for a long time now and many implementations are already out there although for my specific use none of them seemed to be appropriate.

For complete listing of these implementations please visit portknocking.org website. There you can also find a complete explanation of the methods as well as recommendations of use.

Read the rest of this entry »

 

Switch to our mobile site