Create a hard disk image: dd if=/dev/hda1 of=/home/hda1.bin
Create a compressed disk image: dd if=/dev/hda1 | gzip > /home/hda1.bin.gz
Back up the MBR: dd if=/dev/hda of=/home/hda.boot.mbr bs=512 count=1
Restore MBR (from a Live CD): dd if=/mnt/hda1/home/hda.boot.mbr of=/dev/hda bs=512 count=1
Backup a drive to another drive: dd if=/dev/hda of=/dev/hdb conv=noerror,sync bs=4k
The command:
dd -if /dev/hda1 > partitionimage.dd
will backup "/dev/hda1" partition. A whole drive (including the MBR) could be backed up using just /dev/hda as the input "file". Restoring is done by: dd -if partitionimage.dd -of /dev/hda1
If you have a complete new harddrive and want to restore the backup (or copy your old system to the new drive). First, the new drive has to be bigger or exactly the same size as the old one. First go superuser and switch to runlevel 1 so that you can fumble around with the harddisk without other services interfering
restore either the whole disk to the new drive or one partition (depending on how you made the backup): dd -if partitionimage.dd -of /dev/hda1
If you restored the whole drive (/dev/hda), the system will not automatically create the devices (/dev/hda1, /dev/hda2) if you just restored the whole drive. If you know how to make the devices show up without reboot, write it here, otherwise this is a good moment to reboot.
If you restored the system to a new drive, and your device names changed (for example from /dev/hda to /dev/sda) then you must adapt the bootloader and the mount points. While still on runlevel 1, edit these files:
/boot/grub/menu.list
/etc/fstab
After your system is able to boot and runs again, you can resize your partitions to fill the rest of the new harddisk (if you want that) as described here
Tuesday, April 28, 2009
Sunday, April 19, 2009
Single application for Traffic Control, Accounting, Bandwidth Shaping & Management
TraffPro is a Linux based Traffic Control, Traffic Accounting, Traffic Shapping, Bandwidth Management and Bandwidth Control System that helps your Company/SOHO run steadie and more efficiently
KEY FEATURES
* Monitors the consumption of bandwidth by LAN users
* Reports on users overall traffic
* Receive reports from users of the total traffic consumed on weekdays
* Receive reports on user traffic based on ports
* Receive reports on user traffic based on ports and days
* Report on user status (by ip + port, and if determined by domain)
* Protect against unauthorized access to the Internet (By IP, MAC address, Login Name and Password Control based authorization)
* Use the system for traffic and badwidth accounting without user authorization and only authorization by IP or IP + MAC
* Use a Web Based Authentication for users through a Web-Interface to access the internet
* Restrict User Access to Resources Outside Specified Ports and Domains
* User can view amount of traffic used through a web-interface
* Protect the server from attacks external intrusions (Using a Built-In Firewall)
* Control Server Bandwidth and Traffic
* Use the system together with a DHCP server
* Use the system together with a proxy server
* Use the distributed computing of traffic (via multiple gateway access to the internet with a database and a single administrative console)
The system provides reports on bandwidth consumption by users, consists of a terminal administrator under two operating systems Windows and Linux, the module also has a Web client, which does not depend on the platform.
KEY FEATURES
* Monitors the consumption of bandwidth by LAN users
* Reports on users overall traffic
* Receive reports from users of the total traffic consumed on weekdays
* Receive reports on user traffic based on ports
* Receive reports on user traffic based on ports and days
* Report on user status (by ip + port, and if determined by domain)
* Protect against unauthorized access to the Internet (By IP, MAC address, Login Name and Password Control based authorization)
* Use the system for traffic and badwidth accounting without user authorization and only authorization by IP or IP + MAC
* Use a Web Based Authentication for users through a Web-Interface to access the internet
* Restrict User Access to Resources Outside Specified Ports and Domains
* User can view amount of traffic used through a web-interface
* Protect the server from attacks external intrusions (Using a Built-In Firewall)
* Control Server Bandwidth and Traffic
* Use the system together with a DHCP server
* Use the system together with a proxy server
* Use the distributed computing of traffic (via multiple gateway access to the internet with a database and a single administrative console)
The system provides reports on bandwidth consumption by users, consists of a terminal administrator under two operating systems Windows and Linux, the module also has a Web client, which does not depend on the platform.
Wednesday, April 15, 2009
FreeBSD:PortAudit
The portaudit utility allows you to check your installed ports against a database of published security vulnerabilities. This database is maintained by the FreeBSD port administrators and the FreeBSD Security Team. If a security advisory exists for an installed port, a web link to the security advisory is provided for more information.
To install portaudit, enter:
# cd /usr/ports/ports-mgmt/portaudit
# make install clean
# rehash
To check installed ports against the current portaudit database, enter:
# portaudit -Fda
To install portaudit, enter:
# cd /usr/ports/ports-mgmt/portaudit
# make install clean
# rehash
To check installed ports against the current portaudit database, enter:
# portaudit -Fda
Thursday, April 9, 2009
E m a i l T i p s f o r H I PA A C o m p l i a n c e
Why should you care about HIPAA?
Among other requirements, the Health Insurance Portability and Accountability Act of 1996 (HIPAA) directs healthcare and insurance providers to protect personally identifiable electronic healthcare information from illicit access, while ensuring the information is continuously available to authorized parties—such as patients and their doctors and insurers.
Why has controlling access to electronic healthcare records suddenly become so
important?
With today’s epidemic of identity theft, it’s much easier for electronic records to fall into the wrong hands. It’s also easier for electronic records to be ccidentally deleted or intentionally falsified.To manage provider risk and ensure patient privacy and safety, enforcement of HIPAA-mandated security requirements has increased.
What enterprises are covered by the HIPAA privacy rule?
Individual and group health plans, HMOs, long-term care insurers, employer-sponsored
and multi-employer-sponsored plans, government- and church-sponsored plans fall under
compliance. This also includes all other organizations who use email in connection with healthcare claims, benefits eligibility inquiries, referral authorization requests, and other HHS-specified transactions.Healthcare clearinghouses and any business that processes personal health information (PHI) also need to comply with HIPAA.
What does HIPAA have to do with email?
Everything! An email with an attached diagnosis or prescription is defined as a HIPAA-protected record.An incoming email from a patient asking for clarification regarding an explanation of benefits can be regarded as a protected record. Even a “thank you” email can be subject to HIPAA if it mentions a specific procedure.
How can providers and insurers identify, secure and archive emails that contain
protected health information?
• Implement policy-based filtering to automatically scan incoming and outgoing emails and attachments for potentially protected information. Sendmail provides software or appliances for powerful policy definition and enforcement. In addition,Sendmail provides a pre-built lexicon for turnkey identification of protected information.
• Encryption. Sendmail automatically encrypts messages that contain protected
information with no user intervention required.
• Implement a quarantine and secure storage to ensure full compliance. Sendmail
provides a framework to scan, capture and quarantine non-compliant and suspect
messages.Once in quarantine, Sendmail enables role-based privledges for review
and action.
Among other requirements, the Health Insurance Portability and Accountability Act of 1996 (HIPAA) directs healthcare and insurance providers to protect personally identifiable electronic healthcare information from illicit access, while ensuring the information is continuously available to authorized parties—such as patients and their doctors and insurers.
Why has controlling access to electronic healthcare records suddenly become so
important?
With today’s epidemic of identity theft, it’s much easier for electronic records to fall into the wrong hands. It’s also easier for electronic records to be ccidentally deleted or intentionally falsified.To manage provider risk and ensure patient privacy and safety, enforcement of HIPAA-mandated security requirements has increased.
What enterprises are covered by the HIPAA privacy rule?
Individual and group health plans, HMOs, long-term care insurers, employer-sponsored
and multi-employer-sponsored plans, government- and church-sponsored plans fall under
compliance. This also includes all other organizations who use email in connection with healthcare claims, benefits eligibility inquiries, referral authorization requests, and other HHS-specified transactions.Healthcare clearinghouses and any business that processes personal health information (PHI) also need to comply with HIPAA.
What does HIPAA have to do with email?
Everything! An email with an attached diagnosis or prescription is defined as a HIPAA-protected record.An incoming email from a patient asking for clarification regarding an explanation of benefits can be regarded as a protected record. Even a “thank you” email can be subject to HIPAA if it mentions a specific procedure.
How can providers and insurers identify, secure and archive emails that contain
protected health information?
• Implement policy-based filtering to automatically scan incoming and outgoing emails and attachments for potentially protected information. Sendmail provides software or appliances for powerful policy definition and enforcement. In addition,Sendmail provides a pre-built lexicon for turnkey identification of protected information.
• Encryption. Sendmail automatically encrypts messages that contain protected
information with no user intervention required.
• Implement a quarantine and secure storage to ensure full compliance. Sendmail
provides a framework to scan, capture and quarantine non-compliant and suspect
messages.Once in quarantine, Sendmail enables role-based privledges for review
and action.
Tuesday, April 7, 2009
Nmap (Network Mapper)
Nmap is an open source utility to explore the network and to audit the security tools. It scans large networks (even those consisting of hundreds of thousands of machines, claims one of the users) quite rapidly, although it works fine against single hosts. The users like the fact that Nmap uses raw IP packets to find out what hosts are available on the network, which application those hosts are offering and what operating systems (and what versions) they are running. It is able, state some of the readers, to indicate what type of packet filters and firewalls are in use. Nmap runs on most types of computers and both console and graphical versions are available.

What is very important and what is most frequently prized by the users – Nmap is free!
The scanner can be run to support most operating systems:
Linux, Windows, FreeBSD, OpenBSD, Solaris, IRIX, Mac OS X, HP-UX, NetBSD, Sun OS, Amiga.
Nmap offers many advanced features for power users. You can start out as simply as nmap -v- Atargethost. Both - command line and graphical (GUI) are available to suit user's preference. Those who do not wish to compile Nmap from source can always use the binaries. Although it is not so easy to run, Nmap has good, up-to-date man pages and tutorials in many languages.
The disadvantage noticed by the users is the fact that the scanner comes with no warranty.
The swiss army knife of network surveilance.What can i say,it should be in every networking professionals toolbox.Advantage is the prize,its free open source.Yet a very powerfull tool to gain more knowledge about the target.You have two versions,one for the command prompt and NmapFE as GUI interface.Drawback is the lack of an suitable report generator,although mostly one will use Nessus and Nmap together.
Free tool Nmap: the one I will always use and trust, most reliable for discovering and fingerpritng, the fastest one too. The main purpose of the tool to discover, to identify open ports or fingerprint services.
Nmap has won Information Security Product of the Year award by Linux Journal, Info World and Codetalker Digest.
Ratings show that Nmap is among the top ten (out of 30,000) programs at the Freshmeat.Net repository.
The result of an Nmap run is a list of scanned targets with some more information on each of them (depending on the options used),
which is quite useful according to our testers. In addition to the interesting ports table, Nmap can provide further details on targets, including reverse DNS names, operating system guesses, device types, and MAC addresses.
What is very important and what is most frequently prized by the users – Nmap is free!
The scanner can be run to support most operating systems:
Linux, Windows, FreeBSD, OpenBSD, Solaris, IRIX, Mac OS X, HP-UX, NetBSD, Sun OS, Amiga.
Nmap offers many advanced features for power users. You can start out as simply as nmap -v- Atargethost. Both - command line and graphical (GUI) are available to suit user's preference. Those who do not wish to compile Nmap from source can always use the binaries. Although it is not so easy to run, Nmap has good, up-to-date man pages and tutorials in many languages.
The disadvantage noticed by the users is the fact that the scanner comes with no warranty.
The swiss army knife of network surveilance.What can i say,it should be in every networking professionals toolbox.Advantage is the prize,its free open source.Yet a very powerfull tool to gain more knowledge about the target.You have two versions,one for the command prompt and NmapFE as GUI interface.Drawback is the lack of an suitable report generator,although mostly one will use Nessus and Nmap together.
Free tool Nmap: the one I will always use and trust, most reliable for discovering and fingerpritng, the fastest one too. The main purpose of the tool to discover, to identify open ports or fingerprint services.
Nmap has won Information Security Product of the Year award by Linux Journal, Info World and Codetalker Digest.
Ratings show that Nmap is among the top ten (out of 30,000) programs at the Freshmeat.Net repository.
The result of an Nmap run is a list of scanned targets with some more information on each of them (depending on the options used),
which is quite useful according to our testers. In addition to the interesting ports table, Nmap can provide further details on targets, including reverse DNS names, operating system guesses, device types, and MAC addresses.
Wednesday, April 1, 2009
Web content filtering with DansGuardian
DansGuardian provides web filtering capability, similar to NetNanny. It is useful for limitng objectionable content in publicly accessible workstations, or for filtering objectionable content for younger users. It integrates with ClamAV, and uses several criteria for filtering websites. It can be used with Tinyproxy (best for individual users) or the Squid proxy (best for a network server).
DansGuardian features:
* Built-in content scanner plugin system which includes AV scanning.
* NTLM and persistent connection support.
* Header analysis and manipulation so you can manipulate cookies
* Large file (2GB+) download & scanning support
* Autotools build system
* URL regular expression replacement so you can force safe search in Google
* Deep URL scanning to spot URLs in URLs to for example block images in Google images
* Advanced advert blocking
* Many performance improvements
* Updates to handle all current web technology trends
* Blanket SSL blocking so you can block SSL anonymous proxies and allow access to legitimate SSL sites such as banking by whitelisting
DansGuardian features:
* Built-in content scanner plugin system which includes AV scanning.
* NTLM and persistent connection support.
* Header analysis and manipulation so you can manipulate cookies
* Large file (2GB+) download & scanning support
* Autotools build system
* URL regular expression replacement so you can force safe search in Google
* Deep URL scanning to spot URLs in URLs to for example block images in Google images
* Advanced advert blocking
* Many performance improvements
* Updates to handle all current web technology trends
* Blanket SSL blocking so you can block SSL anonymous proxies and allow access to legitimate SSL sites such as banking by whitelisting
Subscribe to:
Comments (Atom)