About Me
- Name: SWeidner
- Location: Elk Point, South Dakota, United States
My Blogger Code
B5 d+ t k s u- f- i- o- x-- e l- c (decode it!)
My Geek Code
GAT/IT d-(+) s+(): a C+++$ ULC+++>$ P++>++++ L++$>++++ !E W++>$ N+ !o !K w+()@ !O !M- !V PS-(--)@>--- PE+ Y-- PGP>++ t+ !5(-) X+ !R- tv-(+)? b+ DI++++ D++>$ G e+>++ h----(-) r+++ y++++
Links
Blogmap
AdSense
Archives
Steve's random ramblings and technical notes
Tuesday, August 31, 2004
FlightGear Flight Simulator
This is a seriously cool Flight Simulator! There are binaries for various Operating Systems (including Windows) and map data for the entire world. If you order them, the whole set comes on 3 DVD's for $40. I'm thinking a Live-CD with FlightGear module might be kind of cool. Oh, and imagine flying it on the Access Grid...
From the "Introduction" page:
The FlightGear flight simulator project is an open-source, multi-platform, cooperative flight simulator development project. Source code for the entire project is available and licensed under the GNU General Public License.
The goal of the FlightGear project is to create a sophisticated flight simulator framework for use in research or academic environments, for the development and pursuit of other interesting flight simulation ideas, and as an end-user application. We are developing a sophisticated, open simulation framework that can be expanded and improved upon by anyone interested in contributing.
Wireless Attacks and Penetration Testing
SecurityFocus HOME Infocus: Wireless Attacks and Penetration Testing (part 1 of 3)
Three part series on penetration testing for wireless networks. The first installment details many common styles of attacks against wireless networks, introduces WEP key-cracking, and discusses some recent developments in wireless security.
Wireless Attacks and Penetration Testing (part 2 of 3)
In this installment, the author focuses on a cracker attempting to penetrate your network and hack one of the servers held therein.
Wireless Attacks and Penetration Testing (part 3 of 3)
In this final part, the author looks at ways to mitigate the risks outlined in the previous parts of the article and spends a bit of time looking at some proposed solutions currently in front of the IETF.
Three part series on penetration testing for wireless networks. The first installment details many common styles of attacks against wireless networks, introduces WEP key-cracking, and discusses some recent developments in wireless security.
Wireless Attacks and Penetration Testing (part 2 of 3)
In this installment, the author focuses on a cracker attempting to penetrate your network and hack one of the servers held therein.
Wireless Attacks and Penetration Testing (part 3 of 3)
In this final part, the author looks at ways to mitigate the risks outlined in the previous parts of the article and spends a bit of time looking at some proposed solutions currently in front of the IETF.
Pringles Yagi Antenna
Pringles Yagi Antenna
Information and links on building an 802.11 cantenna. Includes links to find the Orinoco-to-N connector.
Information and links on building an 802.11 cantenna. Includes links to find the Orinoco-to-N connector.
Thursday, August 26, 2004
TCP/IP Supplemental Handouts
TCP/IP Supplemental Handouts
This page contains a whole bunch of information on TCP/IP - a great backgrounder.
This page contains a whole bunch of information on TCP/IP - a great backgrounder.
Friday, August 20, 2004
Editing the Registry for "other" Users
From an account with Administrator level access
1) Click Start, Run and enter REGEDIT
2) In Regedit, highlight the HKEY_USERS key and go to File, Load Hive.
3) Use the File Open dialog to go to the Documents and Settings\ folder, where is the account you wish to modify.
4) Highlight the NTUSER.DAT file in this folder (usually a hidden file) and select Open.
5) You'll be prompted to enter a "Key name". You can use whatever you wish, but I use the User's logon name.
6) You can now expand the Hive you just loaded and make any needed changes.
7) When finished, highlight this Hive again and go to File, Unload Hive.
NOTE: You MUST unload the Hive prior to logging on to the users account. Otherwise XP may have trouble loading the user's profile.
This page last updated 08/17/2003 23:14
©Doug Knox
1) Click Start, Run and enter REGEDIT
2) In Regedit, highlight the HKEY_USERS key and go to File, Load Hive.
3) Use the File Open dialog to go to the Documents and Settings\
4) Highlight the NTUSER.DAT file in this folder (usually a hidden file) and select Open.
5) You'll be prompted to enter a "Key name". You can use whatever you wish, but I use the User's logon name.
6) You can now expand the Hive you just loaded and make any needed changes.
7) When finished, highlight this Hive again and go to File, Unload Hive.
NOTE: You MUST unload the Hive prior to logging on to the users account. Otherwise XP may have trouble loading the user's profile.
This page last updated 08/17/2003 23:14
©Doug Knox
NCSA - Mitch Kutzko's page
Mitch Kutzko
Mitch is the author/maintainer of the Multicast Beacon client and server software which is used for monitoring unicast & multicast connections. It is best known in it's role monitoring Access Grid nodes around the world, but it's also useful for things like monitoring WAN links.
I blogged this because he's got an interesting collection of links that I'd like to go spelunking through sometime in the future.
Mitch is the author/maintainer of the Multicast Beacon client and server software which is used for monitoring unicast & multicast connections. It is best known in it's role monitoring Access Grid nodes around the world, but it's also useful for things like monitoring WAN links.
I blogged this because he's got an interesting collection of links that I'd like to go spelunking through sometime in the future.
Thursday, August 19, 2004
Network Security Toolkit - BootCD
NST is a bootable ISO CD is based on Red Hat Linux 9. The toolkit was designed to provide easy access to best-of-breed Open Source Network Security Applications and should run on most x86 platforms.
The main intent of developing this toolkit was to provide the network security administrator with a comprehensive set of Open Source Network Security Tools. The majority of tools published in the article: Top 75 Security Tools by insecure.org are available in the toolkit.
NST can transform most x86 systems (Pentium II and above) into a system designed for network traffic analysis, intrusion detection, network packet generation, wireless network monitoring, a virtual system service server, or a sophisticated network/host scanner. This can all be done without disturbing or modifying any underlying sub-system disk. NST can be up and running on a typical x86 notebook in less than a minute by just rebooting with the NST ISO CD. The notebook's hard disk will not be altered in any way.
Download it here
The main intent of developing this toolkit was to provide the network security administrator with a comprehensive set of Open Source Network Security Tools. The majority of tools published in the article: Top 75 Security Tools by insecure.org are available in the toolkit.
NST can transform most x86 systems (Pentium II and above) into a system designed for network traffic analysis, intrusion detection, network packet generation, wireless network monitoring, a virtual system service server, or a sophisticated network/host scanner. This can all be done without disturbing or modifying any underlying sub-system disk. NST can be up and running on a typical x86 notebook in less than a minute by just rebooting with the NST ISO CD. The notebook's hard disk will not be altered in any way.
Download it here
Wednesday, August 18, 2004
Free Computer and IT e-Books
WORDCOUNT / Tracking the Way We Use Language
WORDCOUNT / Tracking the Way We Use Language /
WordCount™ is an artistic experiment in the way we use language. It presents the 86,800 most frequently used English words, ranked in order of commonality. Each word is scaled to reflect its frequency relative to the words that precede and follow it, giving a visual barometer of relevance. The larger the word, the more we use it. The smaller the word, the more uncommon it is.
- beef = 5265
- steak = 11,620
- chicken = 4162
- fish = 928
Looks like the Beef Industry Council needs to do some marketing...
WordCount™ is an artistic experiment in the way we use language. It presents the 86,800 most frequently used English words, ranked in order of commonality. Each word is scaled to reflect its frequency relative to the words that precede and follow it, giving a visual barometer of relevance. The larger the word, the more we use it. The smaller the word, the more uncommon it is.
- beef = 5265
- steak = 11,620
- chicken = 4162
- fish = 928
Looks like the Beef Industry Council needs to do some marketing...
Tuesday, August 17, 2004
Creating ISOs from CDs
Creating ISOs from CDs - TreehouseTechnologies
How do we get an ISO file when we only have the burned CD?
# mount /dev/cdrom /mnt/cdrom
# df
(By mounting the CD, we can get the true block count of the ISO image. Make a note of the "1K-blocks" number for the CD.)
# umount
# dd if=/dev/cdrom of=/tmp/aniso.iso bs=1k count=[insert 1k block count here]
By specifying the exact size of the image, we prevent trying to read the overburned sectors and end up with an exact ISO image, that is the same size and has the same MD5 sum as the original.
How do we get an ISO file when we only have the burned CD?
# mount /dev/cdrom /mnt/cdrom
# df
(By mounting the CD, we can get the true block count of the ISO image. Make a note of the "1K-blocks" number for the CD.)
# umount
# dd if=/dev/cdrom of=/tmp/aniso.iso bs=1k count=[insert 1k block count here]
By specifying the exact size of the image, we prevent trying to read the overburned sectors and end up with an exact ISO image, that is the same size and has the same MD5 sum as the original.
Monday, August 16, 2004
QuakeCon 2004 - Ultimate Collection of Case Mods
Wednesday, August 11, 2004
raXnet.net - cacti
raXnet.net - cacti
When it comes to network monitoring/graphing, Tobi Oetiker's RRDTool does it best. It gives you the ability to put data into a database, then represent that data on a graph as you see fit.
One drawback to RRDTool, is that by itself it is not a complete package for users wanting to graph their own networks. This is where cacti's job comes in. Cacti brings the power of RRDTool to a friendly web interface making it easy to graph anything using RRDTool.
Other frontends have been created in the past that simply emulate MRTG using RRDTool as a backend. Cacti, on the other hand exploits RRDTool's full potential; utilizing Round Robin Archives, CDEF's, Data Sources, and Graphs.
Get more details about cacti.
When it comes to network monitoring/graphing, Tobi Oetiker's RRDTool does it best. It gives you the ability to put data into a database, then represent that data on a graph as you see fit.
One drawback to RRDTool, is that by itself it is not a complete package for users wanting to graph their own networks. This is where cacti's job comes in. Cacti brings the power of RRDTool to a friendly web interface making it easy to graph anything using RRDTool.
Other frontends have been created in the past that simply emulate MRTG using RRDTool as a backend. Cacti, on the other hand exploits RRDTool's full potential; utilizing Round Robin Archives, CDEF's, Data Sources, and Graphs.
Get more details about cacti.
The OSSwin project: Open Source for Windows!
The OSSwin project: Open Source for Windows!
Extensive categorized listing of Open Source software for Windows.
GNUWin II
Listing and downloadable CDs (iso's) of Open Source software for Windows.
Extensive categorized listing of Open Source software for Windows.
GNUWin II
Listing and downloadable CDs (iso's) of Open Source software for Windows.
Tuesday, August 10, 2004
Gunnersden.com - Rifle Cartridges and Ballistics
Rifle Cartridges and Ballistics
Table showing bullet weight measured in Grains (B.W.), velocity measured in Feet Per Second (M.V.) and energy measured in Foot Pounds (M.E.) of the more popular and newly introduced rifle cartridges and their factory ammunition loadings.
This table is to give a reliable comparison of rifle cartridge ballistics and give their true caliber of bullet and rifle bore.
Table showing bullet weight measured in Grains (B.W.), velocity measured in Feet Per Second (M.V.) and energy measured in Foot Pounds (M.E.) of the more popular and newly introduced rifle cartridges and their factory ammunition loadings.
This table is to give a reliable comparison of rifle cartridge ballistics and give their true caliber of bullet and rifle bore.
Monday, August 09, 2004
Exploded Firearms' Drawings and Schematics
GuNuts - The World's First Interactive Exploded Firearms' Drawings and Schematics. 188 models and counting.
Alternative Medicine
A woman went to the Doctor's office, where she was seen by one of the new doctors, but after about 4 minutes in the examination room, she burst out, screaming as she ran down the hall.
An older doctor stopped her and asked what the problem was, and she told him her story.
After listening, he had her sit down and told her to go relax in another room.
The older doctor marched down hallway to the back where the first doctor was and demanded, 'What's the matter with you? Mrs. Bloggs is 63 years old, she has four grown children and seven grandchildren, and you told her she was pregnant?'
The new doctor continued to write on his clipboard and without looking up said, 'Does she still have the hiccups?'
An older doctor stopped her and asked what the problem was, and she told him her story.
After listening, he had her sit down and told her to go relax in another room.
The older doctor marched down hallway to the back where the first doctor was and demanded, 'What's the matter with you? Mrs. Bloggs is 63 years old, she has four grown children and seven grandchildren, and you told her she was pregnant?'
The new doctor continued to write on his clipboard and without looking up said, 'Does she still have the hiccups?'
Thursday, August 05, 2004
Audacity - Open Source Audio Editing package
What is Audacity?
Audacity is a free audio editor. You can record sounds, play sounds, import and export WAV, AIFF, Ogg Vorbis, and MP3 files, and more. Use it to edit your sounds using Cut, Copy and Paste (with unlimited Undo), mix tracks together, or apply effects to your recordings. It also has a built-in amplitude envelope editor, a customizable spectrogram mode and a frequency analysis window for audio analysis applications. Built-in effects include Echo, Change Tempo, and Noise Removal, and it also supports VST and LADSPA plug-in effects.
Windows Downloads
From the FAQ, they recommend CDex for a CD-Audio Ripper
Audacity is a free audio editor. You can record sounds, play sounds, import and export WAV, AIFF, Ogg Vorbis, and MP3 files, and more. Use it to edit your sounds using Cut, Copy and Paste (with unlimited Undo), mix tracks together, or apply effects to your recordings. It also has a built-in amplitude envelope editor, a customizable spectrogram mode and a frequency analysis window for audio analysis applications. Built-in effects include Echo, Change Tempo, and Noise Removal, and it also supports VST and LADSPA plug-in effects.
Windows Downloads
From the FAQ, they recommend CDex for a CD-Audio Ripper
How to install OpenSSH sshd server and sftp server on a Windows 2000 or Windows XP or Windows Server 2003
How to install OpenSSH sshd server and sftp server on a Windows 2000 or Windows XP or Windows Server 2003
All the instructions and links to make your Windows box an SSH server.
All the instructions and links to make your Windows box an SSH server.
Monday, August 02, 2004
CompleteWhois
CompleteWhois is a handy resource for Whois information, but also hosts an up-to-date listing of all unallocated (Bogon) IPv4 addresses and Unallocated-but-BGP-advertised addresses.