Testing TweetDecks new SYNC feature :-)
Countin' down 'til Top Gear st...
Countin' down 'til Top Gear starts!
links for 2009-06-16
-
I wish I could tab my way thru this....
show configuration with-keyrings unencrypted
-
Suffering yet more Java Pain!
Suffering yet more Java Pain!
Drowning in access-lists.
Drowning in access-lists.
Java + ASDM + (wpad || proxy.p...
Java + ASDM + (wpad || proxy.pac) = broke!!
links for 2009-06-08
-
Note to self.... for when the ASDM fails me again!
\<code>fw# test aaa-server authentication my-radius\</code> -
ToDo: Investigate how ...
-
Hackers Targeting Windows XP-Based ATM Machines
We're not going to start hiding our millions under our mattress (that's right, all bloggers roll in obscene amounts of money and own private jets), but the next time we withdraw a wad of cash, it might be a good idea to skip the ATM and flirt with ...
Bluecoat reverse proxy and health checks.
---------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------- [](https://www.linickx.com/files/2009/05/bc-rev-porxy-health-diagram.png) Bluecoat Reverse Proxy Health Check Diagram ----------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------Consider the attached diagram, a customer wants a fairly simple reverse HTTP proxy solution ...
Access list syslog correlation
ACL syslog correlation is a Cisco IOS feature which provides the ability to identify which access list entry (ACE) was responsible for a permit or deny action appearing in syslog.
Consider the following access list applied to filter externally-sourced traffic destined for the internal network:
Router# show ip access-lists Extended ...
