A brief tale of two PCs for Holiday Tech-Support. A relative with a Windows
machine v. a relative with an Ubuntu machine. Which one did I have to
This machine had dropped its wireless connection inexplicably. Wired
connections were fine, though. On Windows, there are myriad reasons this can
happen. Sometimes proprietary wireless management software (intended to
“help” users manage their wireless connectivity) can actually break
functions. I’ve seen instances of Dell’s wireless software conflicting
with Windows’ native network stack, rendering the card inactive.
Sometimes, there’s a driver problem. An erroneous update, a missing update,
an incorrect driver version… Perhaps the machine received a Windows update
that interfered with the currently installed drivers.
This wasn’t a rare-form specialty wireless adapter by any stretch, just a
Many of the mid to high-end Check Point appliances feature a built in LCD
display and control panel. When an appliance is booted up, the display will
show the appliance model and the Check Point logo, as pictured.
The LCD and control panel buttons allow a user with physical access to an
appliance to perform basic configuration tasks, such as changing
the management interface IP address and default gateway, or reboot
the appliance. In many cases, this may not be desirable. To restrict
this access on an appliance running Check Point’s GAiA operating system,
run the following comm... (more)
In our office, the need for up-to-date information regarding the operations
and upkeep of live equipment is a source of major importance for our system
administrators. As malfunctions can lead to a wide breadth of issues such as
delayed response times, lack of adequate feedback, or even the risk of
downtime. All of these potentialities can prove troublesome for any well
respecting company much less a security centric firm such as ours, and this
is why technologies like Icinga are so popular in the information technology
That said, one of our head system administrators cam... (more)
If you are a system administrator or penetration tester, you need to be able
to check for common vulnerabilities. When configured incorrectly, SSL/TLS has
many. There are tons of SSL auditing tools out there, some with more
functionality than others, but why add more tools when you can do it
So this is a tutorial on how to install Openssl from source on a Debain
system with a few easy modifications so that you will be able to test for
CRIME, SSL version 2 and TLS plain text injection.
First, you’ll need to make sure you have these programs installed:
$ sudo apt-get up... (more)
Top Ten Mistakes We See Clients Make with their Check Point Firewall
This list was compiled from our ticketing system and anecdotal evidence taken
from our engineering team. This list is by no means exhaustive and not in any
order of severity.
Number 10: Access Rules
We see this one quite a bit. You need to allow access for you LAN to get to
the Internet and in a moment of weakness you create a rule like this:
This rule will allow your LAN to get anywhere on the Internet on any service.
It also allows your LAN to your DMZ on any service and anywhere else it would