Categories
Debian

sudo vim AFTER you typed

Ever typed something in vi or vim and minutes later, realized you don’t have permission to save what you typed?
I was looking up how to goto a line in VIM, and found a great article that had the method of going to a line (:1322 if you wanted to go to link 1322), and I found a gem:

Categories
Uncategorized

Technorati Claim

How does this work? 5M22V52YG77P
investigating Technorati!

Categories
Check Point

CPX 2010 Las Vegas – Day 1

What is CPX (2010)?
In short, it’s the Check Point Experience. Several vendors sponsor it and describe their latest Check Point related technologies. They give demonstrations about their products and answer questions about product limits and features.

Categories
Check Point

Server Monitoring With vmstat

You will learn the basics of vmstat server monitoring, scripting and redirection in this article.

  1. What is vmstat and why you would want to use it for server monitoring?
  2. How to use vmstat for server monitoring
  3. How to timestamp vmstat output (and other commands besides vmstat too)
  4. How to create a script that is easier to type than complicated commands
  5. How to run a shell script
  6. How to save data into a file
  7. Showing Memory Pages (useless info)
  8. Understanding vmstat
  9. Chart that explains the columns
Categories
Check Point

List of Check Point Ports

List of Check Point Firewall Ports

Common List Ports that you will need to open on a typical Check Point Firewall. Note: don’t open all of these ports in the list, instead – use this list of ports as a reference for your Check Point firewall configuration.

Categories
Spyware Removal

Monitor Ports on Windows

This tutorial will tell you how to test if you are infected with worms, trojans and other types of malware. You’ll also learn how to run dos programs in a for loop ….
Lets say we wanted to loop over and over watching for port 80 connections (perhaps we are looking for a worm and trying to find out where it connects to, or we want to investigate all connections that our computer is making without our permission/knowledge). This is a typical method of investigating for spyware infections…