Set Up an IOS Router or Switch as SSH Client
There are four steps required to enable SSH support on an IOS router:
1. Configure the hostname command.
2. Configure the DNS domain.
3. Generate the SSH key to be used.
4. Enable SSH transport support for the virtual type terminal (vtys).
If you want to have one device act as an SSH client to the other, you can add SSH to a second device called Reed. These devices are then in a client-server arrangement, where Carter acts as the server, and Reed acts as the client. The IOS SSH client configuration on Reed is the same as required for the SSH server configuration on Carter.
!--- Step 1: Configure the hostname if you have not previously done so.
hostname carter
!--- The aaa new-model command causes the local username and password on the router
!--- to be used in the absence of other AAA statements.
aaa new-model
username cisco password 0 cisco
!--- Step 2: Configure the DNS domain of the router.
ip domain-name rtp.cisco.com
!--- Step 3: Generate an SSH key to be used with SSH.
cry key generate rsa
ip ssh time-out 60
ip ssh authentication-retries 2
!--- Step 4: By default the vtys' transport is Telnet. In this case,
!--- Telnet is disabled and only SSH is supported.
line vty 0 4
transport input SSH
!--- Instead of aaa new-model, you can use the login local command.
Link: http://www.cisco.com/en/US/tech/tk583/tk617/technologies_tech_note09186a00800949e2.shtml
Thursday, July 24, 2008
Monday, July 21, 2008
Joomla 1.5
Joomla! is used all over the world to power everything from simple, personal homepages to complex corporate web applications. Here are just some of the ways people use our software:
- Corporate websites or portals
- Online commerce
- Small business websites
- Non-profit and organizational websites
- Government applications
- Corporate intranets and extranets
- School and church websites
- Personal or family homepages
- Community-based portals
- Magazines and newspapers
- the possibilities are limitless…
Joomla! can be used to easily manage every aspect of your website, from adding content and images to updating a product catalog or taking online reservations.
Monday, July 14, 2008
Utorrent

µTorrent, the BitTorrent client that is..
Micro-Sized Yet Feature Filled
Most of the features present in other BitTorrent clients are present in µTorrent, including bandwidth prioritization, scheduling, RSS auto-downloading and Mainline DHT (compatible with BitComet). Additionally, µTorrent supports the Protocol Encryption joint specification (compatible with Azureus 2.4.0.0 and above, BitComet 0.63 and above) and peer exchange.
Resource-Friendly
µTorrent was written with efficiency in mind. Unlike many torrent clients, it does not hog valuable system resources - typically using less than 6MB of memory, allowing you to use the computer as if it weren't there at all. Additionally, the program itself is contained within a single executable less than 220 KB in size.
Skinnable and Localized
Various icon, toolbar graphic and status icon replacements are available, and creating your own is very simple. µTorrent also has support for localization, and with a language file present, will automatically switch to your system language. If your language isn't available, you can easily add your own, or edit other existing translations to improve them!
Actively Developed and Improved
The developer puts in a lot of time working on features and making things more user-friendly. Releases only come out when they're ready, with no schedule pressures, so the few bugs that appear are quickly addressed and fixed.
Saturday, July 12, 2008
CCleaner

Firefox 3.0
Top New Features
Password Manager
Remember site passwords without ever seeing a pop-up.
One-Click Bookmarking
Bookmark, search and organize Web sites quickly and easily.
Improved Performance
View Web pages faster, using less of your computer’s memory.
Smart Location Bar
Find the sites you love in seconds—enter a term for instant matches that make sense.
Instant Web Site ID
Avoid online scams, unsafe transactions and forgeries with simple site identity.
Full Zoom
See any part of a Web page, up close and readable, in seconds.
Platform-Native Look & Feel
Browse with a Firefox that’s integrated into your computer’s operating system.
Wednesday, July 9, 2008
Centos

CentOS is developed by a small but growing team of core developers. In turn the core developers are supported by an active user community including system administrators, network administrators, enterprise users, managers, core Linux contributors and Linux enthusiasts from around the world.
CentOS has numerous advantages over some of the other clone projects including: an active and growing user community, quickly rebuilt, tested, and QA'ed errata packages, an extensive mirror network, developers who are contactable and responsive, multiple free support avenues including IRC Chat, Mailing Lists, Forums, a dynamic FAQ. Commercial support is offered via a number of vendors.
Link: www.centos.org
Ubuntu

Ubuntu is a community developed, Linux-based operating system that is perfect for laptops, desktops and servers. It contains all the applications you need - a web browser, presentation, document and spreadsheet software, instant messaging and much more.
The Ubuntu promise
- Ubuntu will always be free of charge, including enterprise releases and security updates.
- Ubuntu comes with full commercial support from Canonical and hundreds of companies around the world.
- Ubuntu includes the very best translations and accessibility infrastructure that the free software community has to offer.
- Ubuntu CDs contain only free software applications; we encourage you to use free and open source software, improve it and pass it on.
Saturday, July 5, 2008
Truecrypt

Free open-source disk encryption software for Windows Vista/XP, Mac OS X, and Linux
Main Features:
- Creates a virtual encrypted disk within a file and mounts it as a real disk.
- Encrypts an entire partition or storage device such as USB flash drive or hard drive.
- Encrypts a partition or drive where Windows is installed (pre-boot authentication).
- Encryption is automatic, real-time (on-the-fly) and transparent.
- Provides two levels of plausible deniability, in case an adversary forces you to reveal the password
1) Hidden volume (steganography – more information may be found here).
2) No TrueCrypt volume can be identified (volumes cannot be distinguished from random data). - Encryption algorithms: AES-256, Serpent, and Twofish. Mode of operation: XTS.
Tuesday, July 1, 2008
Tor: anonymity online

Link: http://www.torproject.org/
Subscribe to:
Posts (Atom)