Hi Team
I am trying to overcome the blocked access in my office somehow as I think the
security restrictions have gone too far to carry on my daily activities. Here
is the scenario. I cannot access any email sites, IM sites, entertainment sites
from my office. The setup as far as I understood i
> I am trying to overcome the blocked access in my office somehow as I think
> the security restrictions have gone too far to carry on my daily activities.
> Here is the scenario. I cannot access any email sites, IM sites,
> entertainment sites from my office. The setup as far as I understood is
> Seriously, if it blocked the sys admins should have a reason to.
It makes sense for them to block it as there are few other secure projects
running from the same location. And I guess it's the same issue with every
corporate office. Having said that, I still want to understand the setup they
h
On 06/09/2010 02:05 PM, Pothuraju, Naga Deepak wrote:
> Hi Team
>
> I am trying to overcome the blocked access in my office somehow as I think
> the security restrictions have gone too far to carry on my daily activities.
>
This is a non-technical dispute and working around it is likely a
con
> This is a non-technical dispute and working around it is likely a
> contract violation and you can terminated for doing so. Regardless of
> the feasibility of such solutions, I would have to ask you and everyone
> to refrain from this path. Posting about this in a public mailing list
> with ar
On Wed, Jun 9, 2010 at 2:05 PM, Pothuraju, Naga Deepak <
naga-deepak.pothur...@capgemini.com> wrote:
OMG.. OP is using his company email id.. :o
Hi Team
>
> I am trying to overcome the blocked access in my office somehow as I think
> the security restrictions have gone too far to carry on my dail
> -Original Message-
> From: ilugc-boun...@ae.iitm.ac.in [mailto:ilugc-boun...@ae.iitm.ac.in] On
> Behalf Of Pothuraju, Naga Deepak
> Sent: Wednesday, June 09, 2010 2:17 PM
> To: ILUG-C
> Subject: RE: [Ilugc] Breaking blocked access in my office
> Seriously, if it blocked the sys admins s
On Wed, Jun 9, 2010 at 2:17 PM, Pothuraju, Naga Deepak
wrote:
>> Seriously, if it blocked the sys admins should have a reason to.
> It makes sense for them to block it as there are few other secure projects
> running from the same location. And I guess it's the same issue with every
> corporate
Pothuraju, Naga Deepak wrote:
Hi Team
I am trying to overcome the blocked access in my office somehow as I think the security restrictions have gone too far to carry on my daily activities.
Alright, I'll try not to sermonize why posting something like this from
a company mail id is a Very Ve
On Wednesday 09 June 2010 15:29:11 Vamsee Kanakala wrote:
> > I am trying to overcome the blocked access in my office somehow as I
> > think the security restrictions have gone too far to carry on my daily
> > activities.
>
> Alright, I'll try not to sermonize why posting something like this from
Pothuraju, Naga Deepak wrote:
Hi Team
I am trying to overcome the blocked access in my office somehow as I think the
security restrictions have gone too far to carry on my daily activities.
Have you tried this ? http://duckduckgo.com/?q=india+it+jobs&v=
__
On Wed, Jun 9, 2010 at 3:49 PM, Vivek Rajagopalan
wrote:
> Pothuraju, Naga Deepak wrote:
>>
>> Hi Team
>>
>> I am trying to overcome the blocked access in my office somehow as I think
>> the security restrictions have gone too far to carry on my daily activities.
>
> Have you tried this ? http://d
On Wednesday 09 June 2010 15:49:21 Vivek Rajagopalan wrote:
> Pothuraju, Naga Deepak wrote:
> > Hi Team
> >
> > I am trying to overcome the blocked access in my office somehow as I
> > think the security restrictions have gone too far to carry on my daily
> > activities.
>
> Have you tried this ?
On Wed, Jun 9, 2010 at 3:24 PM, Raja Subramanian wrote:
> On Wed, Jun 9, 2010 at 2:17 PM, Pothuraju, Naga Deepak
> wrote:
> >> Seriously, if it blocked the sys admins should have a reason to.
> > It makes sense for them to block it as there are few other secure
> projects running from the same lo
hai friends,
I need port forwarding from one host to another host. Please anyone
help me.
Example:
client ip : 192.168.6.82
server1 : 192.168.1.142
server2: 192.168.1.12
When I do ssh from 192.168.6.82 to r...@192.168.1.142, it has to
redirect to 192.168.1.12. Is it possible? R
On Wed, Jun 9, 2010 at 2:05 PM, Pothuraju, Naga Deepak
wrote:
> Hi Team
>
> I am trying to overcome the blocked access in my office somehow as I think
> the security restrictions have gone too far to carry on my daily activities.
> Here is the scenario. I cannot access any email sites, IM sites,
On Wed, Jun 9, 2010 at 4:17 PM, vellingiri wrote:
> hai friends,
> I need port forwarding from one host to another host. Please anyone help
> me.
>
> Example:
> client ip : 192.168.6.82
> server1 : 192.168.1.142
> server2: 192.168.1.12
>
> When I do ssh from 192.168.6.82 to r...@192.168.
Balaji Damodaran wrote:
That is not a email, IM or entertainment site. So he won't be
interested :P and either ways, he'll ask you ways to crack the system
to see the site.
While I don't support his action in any way, let's not get sarcastic be
hard on the chap - maybe just a kid who joined ri
On Wed, Jun 9, 2010 at 4:27 PM, Girish Venkatachalam
wrote:
> On Wed, Jun 9, 2010 at 2:05 PM, Pothuraju, Naga Deepak
> wrote:
>> Hi Team
>>
>> I am trying to overcome the blocked access in my office somehow as I think
>> the security restrictions have gone too far to carry on my daily activities
Dear Girish,
I have seen your posting ,but I need to do this in iptables. Thanks
for your prompt response. How do it do that?
Vellingiri.
Girish Venkatachalam wrote:
On Wed, Jun 9, 2010 at 4:17 PM, vellingiri wrote:
hai friends,
I need port forwarding from one host to another host.
On Wednesday 09 June 2010 16:40:42 Balaji Damodaran wrote:
> > So what if they fire you? Find another job. I got fired from every job
> > for no fault of mine. Anyway lest us focus now. (Most likely they
> > won't even know any of this)
>
> I have a question on morality issue here. My apologies if
Hi,
> Blocking what via ports? Run a security scanner like netcat or nmap or
> nessus or nikto or hping.
and how should you install it? if I know it right, then most
corporates give you windows machines with the least privileges. In
fact, the few things that work best in these installations are M
Hi
On 06/09/2010 04:27 PM, Girish Venkatachalam wrote:
On Wed, Jun 9, 2010 at 2:05 PM, Pothuraju, Naga Deepak
wrote:
Hi Team
I am trying to overcome the blocked access in my office somehow as I think
the security restrictions have gone too far to carry on my daily
activities.
[...snip...]
T
Hi,
Say, a user uploads a video in my website, then how can i generate a
thumbnail version of the video on the go?
-V-
http://twitter.com/venkasub
___
ILUGC Mailing List:
http://www.ae.iitm.ac.in/mailman/listinfo/ilugc
On Wed, Jun 9, 2010 at 4:52 PM, Abishek Goda wrote:
> Hi,
>
> > Blocking what via ports? Run a security scanner like netcat or nmap or
> > nessus or nikto or hping.
>
> and how should you install it? if I know it right, then most
> corporates give you windows machines with the least privileges. I
On Wed, Jun 9, 2010 at 5:14 PM, Venkatraman S wrote:
> Hi,
>
> Say, a user uploads a video in my website, then how can i generate a
> thumbnail version of the video on the go?
>
ImageMagick can do that.
You can easily script it . netpbm tools are another option.
You can take a snapshot of the v
Hey,
Since you top post I will also follow suit. ;)
iptables has nothing to do with ssh port forwarding.
iptables will port forward without ssh.
You can do port forwarding at IP level or with an application at layer 5/7
like ssh...
-Girish
On Wed, Jun 9, 2010 at 4:42 PM, vellingiri wrote:
>
On Wed, Jun 9, 2010 at 5:50 PM, Girish Venkatachalam <
girishvenkatacha...@gmail.com> wrote:
> On Wed, Jun 9, 2010 at 5:14 PM, Venkatraman S wrote:
> > Hi,
> >
> > Say, a user uploads a video in my website, then how can i generate a
> > thumbnail version of the video on the go?
> >
>
> ImageMagic
>
>
> Special thanks to Welkin and others who had pulled me in.
>
> There are many programs waiting for you in the coming year to pull you in.
S. Baskar
CEO/LinuXpert Systems
___
ILUGC Mailing List:
http://www.ae.iitm.ac.in/mailman/listinfo/ilugc
I really hope no one actually tries any of these at work, especially in
companies with a competent IT/Security team.
Blocking what via ports? Run a security scanner like netcat or nmap or
nessus or nikto or hping.
Running a vulnerability scanner against internal or external IP's from a
cor
On Tue, Jun 8, 2010 at 4:04 PM, Shrinivasan T wrote:
> Hi,
>
> It will be nice if the team helps Mepco College, too.
>
> LinuXpert Systems has been associating with Mepco Schlenk Engg. college
since 2009 beginning and has helped to migrate most of the computers to
Fedora-11/12 (complete repository
On Wed, Jun 9, 2010 at 2:05 PM, Pothuraju, Naga Deepak <
naga-deepak.pothur...@capgemini.com> wrote:
> Hi Team
>
> I am trying to overcome the blocked access in my office somehow as I think
> the security restrictions have gone too far to carry on my daily
>
Be warned that you might already in t
Hi,
On Wed, Jun 9, 2010 at 6:17 PM, Baskar Selvaraj wrote:
> On Tue, Jun 8, 2010 at 4:04 PM, Shrinivasan T wrote:
>
>> Hi,
>>
>> It will be nice if the team helps Mepco College, too.
>>
>> LinuXpert Systems has been associating with Mepco Schlenk Engg. college
> since 2009 beginning and has helpe
On Wed, Jun 9, 2010 at 14:05, Pothuraju, Naga Deepak
wrote:
> Hi Team
>
> I am trying to overcome the blocked access in my office somehow as I think
> the security restrictions have gone too far to carry on my daily activities.
> Here is the scenario. I cannot access any email sites, IM sites,
On Wed, Jun 9, 2010 at 4:27 PM, Girish Venkatachalam
wrote:
> Rule? What rule? Why should you care about it? You can get around
> every such rule if you are clever and know the big picture. And of
> course you should have access to the right tool and have lot of
> perseverance.
Stop misleading ot
> Stop misleading others. Encouraging someone to break the rules
> is immature and irresponsible.
>
> +1,
Out of curiosity, I started read this thread.
Found in mid way its going to one's life time to complete every one's reply
better marked it for the weekend.
:)
--
Ravi Jaya
Mobile: +91
On Wed, Jun 9, 2010 at 4:17 PM, vellingiri wrote:
> I need port forwarding from one host to another host. Please anyone help
> me.
>
> Example:
> client ip : 192.168.6.82
> server1 : 192.168.1.142
> server2: 192.168.1.12
>
> When I do ssh from 192.168.6.82 to r...@192.168.1.142, it has t
This article covers the Linux Kernel changes from 2.6.30 to 2.6.34.
"Only yesterday it felt like the 2.6.30 kernel came out (June 9, 2009
- almost a year ago) and we are already up to 2.6.34 (May 17, 2010)
with 2.6.35 patches waiting at the gate like an excited thoroughbred
waiting at the post. Fro
> On Wed, Jun 9, 2010 at 4:27 PM, Girish Venkatachalam
> wrote:
>> Rule? What rule? Why should you care about it? You can get around
>> every such rule if you are clever and know the big picture. And of
>> course you should have access to the right tool and have lot of
>> perseverance.
>
> Stop m
Hi
I have installed the astaro software (UTM) in my work place In my work as one
of the VMs.
Iam having 2 on board NIC's and one pci broadcom NIC total 3 NICs.
In my work place we are having 5 different types of network say for example a)
for full browsing (research systems (192.168.1.x)), b)
Sorry i have not mentioned in my subject
Hi
I have installed the astaro software (UTM) in my work place In my work as one
of the VMs.
Iam having 2 on board NIC's and one pci broadcom NIC total 3 NICs.
In my work place we are having 5 different types of network say for example a)
for full brows
On Wed, Jun 9, 2010 at 5:55 PM, Venkatraman S wrote:
>>
>> ImageMagick can do that.
>>
>>
> Someone suggested ffmeg [http://www.ffmpeg.org/ffmpeg-doc.html ]
> Have you done any comparison between the two in terms of performance(speed
> and CRU load) ?
ffmpeg is also a nice tool. It is usually mor
On Thu, Jun 10, 2010 at 9:56 AM, Girish Venkatachalam <
girishvenkatacha...@gmail.com> wrote:
> ffmpeg is also a nice tool. It is usually more buggy when compared to
> mencoder in the sense that it does not handle standards gracefully and
> the quality of audio is usually poor.
>
> I dunno about i
I have a MPLS VPN setup connecting 3 locations, with one of the
locations being the GW to the Internet (for all three locations).
The GW has one public static IP with iptables FireWall (FW).
SNAT handles outgoing connections to the Internet for all three
locations (different private IP nets)
Ther
Well..you guys came really hard on me, but never mind cuz I was kind of
expecting this as it happens frequently on this list. First of all let me make
my intentions clear - It was to learn & not exactly to break/hack something
that the company owns. You people should have answered the question &
I generally stay away from "asking for help" unless I need it.
And do not recommend people doing it.
It is good to get help once in a while from others but if we rely too
much on it instead of using our intellect and our personal
experience, then it hurts our confidence and ability and of course
I hope I was clear.
I meant that going to the Net for help in the form of mailing lists,
forums and so on is useful only after we do our homework and
are really sure that we have run out of options.
-Girish
On Thu, Jun 10, 2010 at 11:03 AM, Girish Venkatachalam
wrote:
> I generally stay away fr
On 06/10/2010 10:52 AM, Pothuraju, Naga Deepak wrote:
> Well..you guys came really hard on me, but never mind cuz I was kind of
> expecting this as it happens frequently on this list. First of all let me
> make my intentions clear - It was to learn & not exactly to break/hack
> something that th
On Thursday 10 June 2010 11:05:03 Girish Venkatachalam wrote:
> I meant that going to the Net for help in the form of mailing lists,
> forums and so on is useful only after we do our homework and
> are really sure that we have run out of options.
>
different people have different learning process
I have been working on a project to develop a test bed. I am creating a GUI
using Gtk programming. Here now I am required to read inputs from multiple Gtk
Entries and process them on a click of a Gtk Button. But I am unable to find
how to send multiple gpointers through g_signal_connect. Please
On Thu, Jun 10, 2010 at 10:51 AM, Arun Khan wrote:
> I have a MPLS VPN setup connecting 3 locations, with one of the
> locations being the GW to the Internet (for all three locations).
> The GW has one public static IP with iptables FireWall (FW).
>
> SNAT handles outgoing connections to the Inter
On Thursday 10 June 2010 10:52:47 Pothuraju, Naga Deepak wrote:
> 'Ethical Hacking'!
>
there is no such thing as ethical hacking - which is a term invented by one of
the biggest conmen in the Indian software scene for the sole purpose of
promoting himself. There is hacking - which we do. And cr
On Thu, Jun 10, 2010 at 10:52, Pothuraju, Naga Deepak
wrote:
> Well..you guys came really hard on me, but never mind cuz I was kind of
> expecting this as it happens frequently on this list. First of all let me
> make my intentions clear - It was to learn & not exactly to break/hack
> something
Friends,
The OP wants a "how-to document" on cracking the corporate security systems.
we are not going to provide any assistance on this.
He is not willing to hear advices and suggestions.
:-)
Shall we stop here?
Thanks.
--
Regards,
T.Shrinivasan
My experiences with Linux are here
http://
On Thu, Jun 10, 2010 at 10:51 AM, Arun Khan wrote:
> I have a MPLS VPN setup connecting 3 locations, with one of the
> locations being the GW to the Internet (for all three locations).
> The GW has one public static IP with iptables FireWall (FW).
>
> SNAT handles outgoing connections to the Inter
On Thu, Jun 10, 2010 at 11:20, Kenneth Gonsalves wrote:
>
> there is no such thing as ethical hacking - which is a term invented by one of
> the biggest conmen in the Indian software scene for the sole purpose of
> promoting himself. There is hacking - which we do. And cracking which we frown
> up
> Organizations don't arbitrarily create rules. They are made because
> of 1) govt compliance regulations, 2) IT security policies enforced
> by their customers, and 3) industry best practices.
>
Not necessarily so. In India they are created out of ignorance or arrogance
on the part of network ad
Arun Khan wrote:
I have a MPLS VPN setup connecting 3 locations, with one of the
locations being the GW to the Internet (for all three locations).
The GW has one public static IP with iptables FireWall (FW).
400 Bad Request
Your client has issued a malformed or illegal request.
You indi
On Thu, Jun 10, 2010 at 11:17 AM, Kenneth Gonsalves
wrote:
> On Thursday 10 June 2010 11:05:03 Girish Venkatachalam wrote:
> > I meant that going to the Net for help in the form of mailing lists,
> > forums and so on is useful only after we do our homework and
> > are really sure that we have run
On Thu, Jun 10, 2010 at 11:57 AM, Vivek Rajagopalan
wrote:
>>
>> 400 Bad Request
>> Your client has issued a malformed or illegal request.
>>
>>
>>
>
> You indicate everything works fine if the page has no popup windows.
> So your network seems to be okay. The error seems to indicate a client s
On 06/10/2010 12:12 PM, Venkatraman S wrote:
> finally HTML5 which
> has a cool fileupload drag-drop interface and many more. Hope you get the
> point.
>
Don't understand what you are referring to? HTML5 doesn't define any
such interface. It might have tags but I don't understand the referenc
On Thu, Jun 10, 2010 at 10:51 AM, Arun Khan wrote:
> The above strategy is working for services that are on Linux (Apache)
> without pop up windows but not on services with pop up.
The popup may be redirecting you to a different tcp port.
Eg. http://IP:80 would redirect the popup page to http://
On Thu, Jun 10, 2010 at 12:20 PM, Rahul Sundaram wrote:
> On 06/10/2010 12:12 PM, Venkatraman S wrote:
> > finally HTML5 which
> > has a cool fileupload drag-drop interface and many more. Hope you get the
> > point.
> >
>
> Don't understand what you are referring to? HTML5 doesn't define any
> s
63 matches
Mail list logo