General Info

girls really *do* have cooties… See?? Told ya…

by on Nov.05, 2008, under Amusement

Interesting read from the Discovery Channel.
Girls carry more bacteria…

Asked if guys should worry about holding hands with girls, Knight said: “I guess it depends on which girl.”


Leave a Comment :, more...

RAID 5, we hardly knew ye.

by on Oct.21, 2008, under General Info

We all knew this day would come, when RAID 5 will cease to be. OK, maybe not all, but I had a sneaking suspicion that super-large hard drives would be the end of RAID 5.
Check out this article about it.

Oh, and start hinting around about a budget for a fiber-channel SAN, while you’re at it.

3 Comments : more...


I passed 000-078!!

by on Sep.30, 2008, under General Info

I passed the 000-078 IBM BladeCenter v4 certification exam this afternoon.
This marks the 15th time I’ve pressed “Finish” at a Prometric testing facility.
All in all, this was the most difficult test I’ve taken, with the possible exception of the Microsoft ISA exam for my MCSE :Security & :Messaging.
So now, I have so many certs, they’d look silly all on a business card together at the same time!
So, just for grins, here’s what they look like all together:

Watchguard Certified Security Professional – Fireware
Microsoft Certified Systems Administrator 2003
Microsoft Certified Systems Administrator :Messaging
Microsoft Certified Systems Administrator :Security
Microsoft Certified Systems Engineer 2003
Microsoft Certified Systems Engineer :Messaging
Microsoft Certified Systems Engineer :Security
Microsoft Certified Technology Specialist – Windows Server 2008 (one test from MCITP)
IBM Certified Systems Specialist – IBM System x BladeCenter v4

Still working on EC Council’s CEH, and thinking of taking up CISSP.
Anyone have any input regarding certs you’ve achieved, or ones that have done your career no good whatsoever?

3 Comments :, more...

CryptedNets theme keeps changing…

by on Sep.02, 2008, under Amusement

What do you think? Do you care?
Is everyone just reading the RSS feed anyway?
Does it matter to you in the slightest?
As evidenced by the stats, at least *some* people are reading…
What do you think?

3 Comments :, , more...

Dead CMOS batteries suck.

by on Aug.27, 2008, under General Info

Sorry folks.
The power grid up here in Princel-tucky isn’t *extremely* reliable.
Pressed F1. Continued. Back online.

Leave a Comment : more...

Remedial Source Code Building and apt-get Usage.

by on Aug.05, 2008, under General Info, Linux

If you’re going to be compiling source code on a Ubuntu Linux box, there are certain programs you need that *aren’t* installed by default. The most important part is the compiler. You need at least a C compiler. You can install the C compiler using apt-get. Apt-get is a program built into Ubuntu for fetching and compiling and installing source code from the web. Your Ubuntu machine needs to be online to use it. (try this at a shell prompt: man apt-get )
To install the compiler toolchain, issue this command.

sudo apt-get install build-essential

When you find that you cannot use the program (say, rdesktop-1.5.0) that came with your linux distribution, you should try to build it yourself from source. This seems a pretty easy task for some, but remember the first time you encountered a filename.tar.gz file? Did you gunzip it first, wondering what you should do to extract your prize from this filename.tar file? Anyway, here’s a brief rundown of what you would need to do to build rdesktop-1.6.0 from source on a freshly installed Ubuntu Linux box. After downloading your source file (rdesktop-1.6.0.tar.gz), it should be in your home directory. We’ll assume that your name is Bob, OK?

cd /home/bob (changes to your home directory. You’re Bob, remember?)
tar -zxvf rdesktop-1.6.0.tar.gz (this will decompress and un-tar the source files)
cd rdesktop-1.6.0  (this changes your current directory into the extracted source directory)
./configure (this builds the Makefile)
make (make turns the source into a compiled binary)
sudo make install (this places the program onto your userland filesystem, using root privileges.)

Leave a Comment :, more...

Google shell application is *really cool*

by on Jun.04, 2008, under General Info

There’s a new way to search Google’s massive indexes. It’s called the Google Shell. You can find it at http://goosh.org Try it right now..  It’s basically a very UNIX-like way to search Google. You can use UNIX-ish commands to search. Try it!

Leave a Comment : more...

My list of banned mail servers

by on Sep.16, 2007, under General Info

Just in case anyone cares, here’s the list of servers I refuse to accept mail from. This is a very large list, (over 22,500 hosts and networks) and is fairly restrictive. It covers all IP address space in China, Korea, most of Holland, and many others that have spammed my servers.

If you find yourself listed here, don’t email me. I don’t care. It’s my mailserver, and I’ll accept mail from whomever I please.  :P  

P.S. If you are listed here by individual IP address, you suck. Stop spamming people. Loser.

Anyway, here’s the list:

https://cryptednets.org/bannedmailservers.csv

If you use OpenBSD’s PF, and want to use it in a table, copy the list to “/etc/bannedmail” and then you can add the list like so:

# pfctl -t <bannedmail> -T add `cat /etc/bannedmail`

then, just disallow these IP’s from connecting to your mail server:

First, add the table to the pf.conf:

table <bannedmail> persist file "/etc/bannedmail"

and

block drop in quick on $ext_if from <bannedmail> to any

or

rdr on $ext_if proto tcp from !<bannedmail> to $ext_if port 25 -> $mailserver port 25

Leave a Comment : more...

Just in case you've forgotten…

by on May.31, 2007, under General Info

The 10 Immutable Laws of Computer Security

  1. If a bad guy can persuade you to run his program on your computer, it’s not your computer any more.
  2. If a bad guy can alter the operating system on your computer, it’s not your computer any more.
  3. If a bad guy has unrestricted physical access to your computer, it’s not your computer any more.
  4. A computer is only as secure as the administrator is trustworthy.
  5. Weak passwords trump strong security.
  6. Encrypted data is only as secure as the decryption key.
  7. An out of date virus scanner is only marginally better than no virus scanner at all.
  8. If you allow a bad guy to upload programs to your website, it’s not your website any more.
  9. Absolute anonymity isn’t practical, in real life or on the Web.
  10. Technology is not a panacea.
Leave a Comment : more...


Looking for something?

Use the form below to search the site:

Still not finding what you're looking for? Drop a comment on a post or contact us so we can take care of it!

CryptedNets is proudly powered by

Entries (RSS) and Comments (RSS)
- Login

Visit our friends!

A few highly recommended friends...