Skip to main content

Home/ Adam's Tech Talk : Web Security Consultant/ Contents contributed and discussions participated by Adam Palmer

Contents contributed and discussions participated by Adam Palmer

Adam Palmer

Easy Reverse Engineering | Adam's Tech Talk - 0 views

  •  
    Compiling a program doesn't protect it or necessarily hide the source. Take the following example C program. It serves no real life purpose and should never print anything to the console
Adam Palmer

Multithreaded TCP Proxy Tunnel | Adam's Tech Talk - 0 views

  •  
    Sometime back I posted a guide in the HOWTO section on load balancing across multiple ISP connections. This is great in certain instances but certainly doesn't replace line bonding.
Adam Palmer

Multithreaded TCP Proxy Tunnel Code | Adam's Tech Talk - 0 views

  •  
    Further to my earlier article, I went ahead and developed this application. Here's a beta!
Adam Palmer

BASH Script - Blank Out CC Details | Adam's Tech Talk - 0 views

  •  
    Here's a quick one liner, can't think why anyone would ever have any use for it, but maybe the principle itself could be of use to someone! This will take a file containing listings of 16 digit numbers, i.e. 1234123412341234 and replace it with XXXXXXXXXXXX1234
Adam Palmer

Extending tc and iproute2, Linux routing, split access, multiple uplinks, multiple isps... - 0 views

  •  
    Extending tc and iproute2, Linux routing, split access, multiple uplinks, multiple isps, iptables, masquerading, tc, iproute2, Routerboard load balancing
Adam Palmer

Move Xen Guest from loopback filesystem to LVM | Adam's Tech Talk - 0 views

  •  
    Moving a Xen Guest into an LVM container from a loopback sparse image is easy enough. You'll need to power down the VM using xm shutdown mymachine
Adam Palmer

Linux device names & mounting | Adam's Tech Talk - 0 views

  •  
    Recently I came across an annoying issue. I have three identical Seagate USB mass storage devices, plugged in to a debian etch 4.0 stable (2.6.18) machine.
Adam Palmer

Some simple filtering and sniffing with tcpdump - 0 views

  •  
    tcpdump is one of the best network debugging tools available. In it's most basic form, it will print network traffic in terms of a source and destination address to the console, more advanced uses include printing out captured ASCII and simple but powerful filtering.
Adam Palmer

Setting up an LVM filesystem | Adam's Tech Talk - 0 views

  •  
    Setting up an LVM filesystem is quite easy assuming you have the right tools installed and a recent kernel. LVM has a lot of advantages, most notably the ability to take snapshots of the current filesystem - this is why LVM is often used in live database environments.
Adam Palmer

New Rapidswitch Server | Adam's Tech Talk - 0 views

  •  
    Further to my UK VPS posts, I took out a nice new server at RapidSwitch. I am fully aware of their recent extended outages, however after some quite extensive research,
Adam Palmer

Installing and Configuring Xen with guests | Adam's Tech Talk - 0 views

  •  
    Installing and Configuring Xen on a Debian Lenny machine is pretty easy. Firstly, install the system: apt-get install xen-tools xen-utils-3.2-1 xen-linux-system-2.6.26-2-xen-686 xen-linux-system-2.6.26-2-xen-686 comes with the Xen kernel that you'll need. It should install a new kernel as the default, and therefore you'll now need to reboot.
Adam Palmer

Quick Linux and Windows OpenVPN HOWTO and tutorial, including VPN routing | Adam's Tech... - 0 views

  •  
    OpenVPN is a popular Windows/Linux VPN Server/Client pair. I think there's a separate GUI available for it if you're so minded. This howto will cover command line usage only.
Adam Palmer

Copy/Export MySQL User Priviledges | Adam's Tech Talk - 0 views

  •  
    I'm often asked how to copy or export MySQL Users from one machine to another. The following SQL query will show your users:
Adam Palmer

Linux Consultant - How to recover a compromised server | Adam's Tech Talk - 0 views

  •  
    As a security consultant I often have to deal with machines that are already compromised. The 'official' standpoint is always to wipe the machine alltogether, reinstall your OS, and restore your data and configurations from the backups that you obviously have.
Adam Palmer

Security Consultant | Adam's Tech Talk, Linux Consultant - 0 views

  •  
    London Based Security Consultant & Penetration Tester specializing in Web Applications. Linux Security Freelancer
Adam Palmer

Tutorial For PHP Developers - 0 views

  •  
    Welcome to the PHP MySQL Developer series. As a London based PHP and MySQL Developer, clean code, commented code and secure code is a must!
1 - 16 of 16
Showing 20 items per page