I was at SCALE (so cal linux expo) this weekend and there was a Gnome booth. The people working the booth called it "geh-nome." I've always called it "nome", with a silent g, though.
If there was anybody that came across this thread looking for an answer, well... I haven't found one for rsync, though I did find this neat little tool, JFileSync. It is really simple and easy to use and has a GUI.
Ok I've been trying to figure this one out, but I just can't get it right. What I need to do is sync two directories on two different disks on one computer. I'm running Cygwin on my Windows machine so I do have rsync installed.
For example, I have a "Ripped CDs" directory on D:\ and X:\...
basically, what's happening in double decode is an exploitation of URL canonicalization.
from Wikipedia:
Now, onto the question of whether or not you should worry... Well, do you even run IIS web server? and do you have all patches applied to IIS?
taken from Snort docs "README.http_inspect"
* double_decode [yes/no] *
The double_decode option is once again IIS specific and emulates IIS functionality. How this works is that IIS does two passes through the request URI, doing decodes in each one. In the first pass, it seems that all...
Firewall rules.
Chances are, how you "get into" the network, there are rules that allow you only that way... and the firewall is blocking direct external traffic going to your server.
alright, if you're defending against bots, then fine.. I'll give you that. Though, you can easily mitigate SSH bot attacks by PermitRootLogin = no, and iptables rule sets
Here are some I feel cover a wide range of topics in security... it's not everything, but it's a nice start :)
http://chuvakin.blogspot.com/index.html
http://www.f-secure.com/weblog/
http://theinvisiblethings.blogspot.com/
http://www.lightbluetouchpaper.org/...
Information Security
Secure Computing
Hackin9
2600: The Hacker Quarterly
Blacklisted 411
IEEE Security & Privacy
and I subscribe to none. I pick up a HQ or a Blacklisted 411 whenever I get a chance. I REALLY want an IEEE membership to Security & Privacy... that has probably the most...
for a home network? i call bs, unless it's like an apartment complex or hotel.
and that network, is NOT complex. that is super simple. Try managing environments where you have 1000s of servers and even more workstations, faxes, printers, etc..
ethereal, ettercap, tcpdump, snort, snoop, and other specialized network taps....
what I do with the info? analyze what kind of traffic is on my network and try to identify malicious activity and attempt to block it.
ok, I have an odd problem that just started happening this morning. I have a Logitech MX Duo and Windows XP Sp2. The problem I'm experiencing is about every 5 or 6 "single" clicks, the next click is a double click. Like, when just clicking on icons on the desktop. i can select 5 icons no...
http://portal.acm.org/ft_gateway.cfm?id=810177&type=pdf&coll=&dl=acm&CFID=15151515&CFTOKEN=6184618
NSW User System Front End
I've tried searching RFCs for it, but no luck. Could be a military system, I see lots of references to minicomputers and such.