Protected: iptables script

Posted: 22 July, 2009 in Uncategorized

This content is password protected. To view it please enter your password below:



Posted: 18 July, 2009 in Linux
Frequently Used Articles
Beginner Documentation
Index to the Articles
KVM (Kernel-mode Virtual Machine) Shorewall on a Laptop
6to4 Tunnels Limiting per-IPaddress Connection Rate Shorewall Lite
Accounting Logging Shorewall Modularization
Actions Macros Shorewall 4.x — What’s new
Aliased (virtual) Interfaces (e.g., eth0:0) MAC Verification Shorewall Perl
Anatomy of Shorewall (Russian) Man Pages Shorewall Setup Guide
Bandwidth Control (Russian) Manual Chains SMB
Blacklisting (Russian) Masquerading SNAT (Source Network Address Translation)
Bridge: Shorewall-perl Multiple Internet Connections from a Single Firewall (Russian) Split DNS the Easy Way
Bridge: No control of traffic through the bridge Multiple Zones Through One Interface Squid with Shorewall
Commands My Shorewall Configuration Starting/stopping the Firewall
Compiled Firewall Programs Netfilter Overview Static (one-to-one) NAT
Configuration File Basics Network Mapping Support
DHCP One-to-one NAT (Static NAT) Traffic Accounting
DNAT (Destination Network Address Translation) OpenVPN Traffic Shaping/QOS (Russian)
ECN Disabling by host or subnet Operating Shorewall Transparent Proxy
Extension Scripts (User Exits) Packet Marking UPnP
Fallback/Uninstall Packet Processing in a Shorewall-based Firewall Upgrade Issues
FAQs ‘Ping’ Management VPN
Features Port Forwarding VPN Passthrough
Forwarding Traffic on the Same Interface Port Information White List Creation
FTP and Shorewall Port Knocking and Other Uses of the ‘Recent Match’ Xen – Shorewall in a Bridged Xen DomU
Fool’s Firewall PPTP Xen – Shorewall in Routed Xen Dom0
Getting help or answers to questions Proxy ARP
Installation/Upgrade (Fran├žais) QuickStart Guides
IPP2P Release Model
IPSEC using Kernel 2.6 and Shorewall 2.1 or Later Requirements
Ipsets Routing and Shorewall
IPv6 Support Routing on One Interface
Kazaa Filtering Samba
Kernel Configuration Scalability and Performance


Posted: 19 August, 2008 in Windows

Tiny Watcher scans the important folders and Registry locations during initial setup and reports on the changes only when it is started again. This has the advantage that no application is monitoring the system in real time which consumes system resources. The disadvantage is that the user will be notified about changes after they happened.

Tiny Watcher is therefor not a real time system protection application, more of a tool that allows a forensic analysis of system changes. It still offers functions to deal with the changes that have been made to the system.

It provides access to a web search to gather information about a change but also to confirm, disable or remove it. Those actions can be problematic, it is generally not advised to delete items unless it is known that deleting them causes no harm. It is normally not a problem to delete a startup entry but it could be highly problematic to delete a file in a Windows folder.

Tiny Watcher works best when executed during system start or closely after. Each action is written in a log file which is – again – excellent for tracing a file or system change.


Download via Author’s Page

DesktopCoral is an unusual program designed to “reserve” some portion of your desktop which is shielded from maximized applications..

Essentially, it acts like an invisible resizeable docking bar, which can be docked to any side of your desktop. This invisible dock acts as a barrier to maximized applications and essentially shields this area of your desktop from other applications.

Within this shielded area you might put certain application windows that you want to be always visible, or you might put one of the many desktop tools like a calendar or system information component.


Download at Author’sPage