Archive for September, 2015

Bosch eBike Systems – uphill flow

Samstag, September 26th, 2015

Prof. Dr. Gunter Dueck – Einsatz von Robotern und Computern im Gesundheitssystem der Zukunft

Freitag, September 25th, 2015

Papst Franziskus hat die Staatengemeinschaft eindringlich gewarnt – dass sich die Menschheit aus materieller Gier und mangelndem Gerechtigkeitssinn selbst auslöschen könnte

Freitag, September 25th, 2015

Ferrari 488 Spider – with blistering acceleration 0 to 100 km/h in 3s and 0 to 200 km/h in 8.7s

Freitag, September 25th, 2015

Gaviapass (Passo di Gavia) – online webcam

Freitag, September 25th, 2015

Sparkassen Geldautomaten – sind in vielen Bundesländern ausgefallen wegen IT Problemen

Freitag, September 25th, 2015

SparkassenGeldautomat_01

VMware vSphere – configuring „Promiscuous Mode“ on a virtual switch or portgroup

Freitag, September 25th, 2015

vmware_logo.jpg    VMware vSphere – by default a guest operating system’s virtual network adapter only receives frames that are meant for it. Placing the guest’s network adapter in promiscuous mode causes it to receive all frames passed on the virtual switch that are allowed under the VLAN policy for the associated portgroup. This can be useful for intrusion detection monitoring or if a sniffer needs to analyze all traffic on the network Segment

VMware_vSphere_01

Freitag, September 25th, 2015

Picture_01

DevOps (a clipped compound of „development“ and „operations“) – is a software development method that stresses communication, collaboration, integration, automation, and measurement of cooperation between software developers and other information-technology (IT) professionals

Freitag, September 25th, 2015

DevOps aids in software application release management for an organization by standardizing development environments. Events can be more easily tracked as well as resolving documented process control and granular reporting issues. Companies with release/deployment automation problems usually have existing automation but want to more flexibly manage and drive this Automation – without needing to enter everything manually at the command-line. Ideally, this automation can be invoked by non-operations employees in specific non-production environments. The DevOps approach grants developers more control of the environment, giving infrastructure more application-centric understanding

Devops_01

Wireshark – Packet Sniffing Usernames, Passwords and Web Pages

Donnerstag, September 24th, 2015

VMware_vSphere_02

Apple iOS 9.0.1 – jetzt verfügbar

Donnerstag, September 24th, 2015

Noke Padlock – you unlock with your smartphone, eliminating the hassle and frustration of lost keys and forgotten combinations

Donnerstag, September 24th, 2015

noke_logo   Noke Padlock – is the world’s first Bluetooth padlock you can easily share

NokePadlock_01

Wireshark Network Analysis (Second Edition) – The Official Wireshark Certified Network Analyst Study Guide

Donnerstag, September 24th, 2015

Wireshark_01

Volkswagen Passat TDI Fuel Efficient – Clean Diesel

Mittwoch, September 23rd, 2015

Linux tcpdump command – capturing for viewing with Wireshark

Mittwoch, September 23rd, 2015

Linux tcpdump command – allows you to save the packets that are captured so that you can use it for future analysis the saved file can be viewed by the same tcpdump command and you can also use open source software like Wireshark to read the tcpdump pcap files

See the list of interfaces on which tcpdump can listen:
# tcpdump -D

Listen on interface eth0:
# tcpdump -i eth0

Print a timestamp, as hours, minutes, seconds, and fractions of a second since midnight, preceded by the date, on each dump line:
# tcpdump -tttt

Record the packet capture to a file called „capture.cap“:
# tcpdump -w capture.cap

Display IP addresses and port numbers instead of domain and service names when capturing packets:
# tcpdump -nn

Capture any packets where the source host is 192.168.221.29.:
# tcpdump src host 192.168.221.29

Capture any packets where the destination host is 192.168.221.29.:
# tcpdump dst host 192.168.221.29

Capture any packets where the source network is 192.168.221.0/24. Display IP addresses and port numbers:
# tcpdump -nn src net 192.168.221.0/24

Capture any packets where the source port is is between 5000 and 5999 inclusive. Display IP addresses and port numbers:
# tcpdump -nn src portrange 5000-5999

Capture any packets with source IP 192.168.221.29 and destination port 5102. Display IP addresses and port numbers
# tcpdump -nn „src host 192.168.221.29 and src port 5102“

Capture all bytes of data within the packet:
# tcpdump -s 0

Capture network traffic every 60 seconds and write it to trace file which has time format directives:
# tcpdump -nn -G 60 -w ‚capture_%Y%m%d-%H%M%S.cap‘

Capture network traffic every 60 seconds and write it to rotating file which has time format for every minutes directives:

# tcpdump -i eth0 -G 3600 -w tcpdump-%H.pcap

Implement max file size limits and “log Rotation”:
# tcpdump -nn -C 100 -W 50 -w capture.cap

Kill process by name:
# killall tcpdump

tcpdump_01