Wednesday, December 04, 2013

Are your site blacklisted?

Most of the people involve in Internet Marketing or writing blog know how important is it to get listed or indexed by search engine. Search engine traffic can be an important source of traffic. However, sometimes, due to some issue, you found that it hard to get traffic from this kind of resource. First thing you need to check, is whether you site has been blacklisted. Following are some of the FREE tools for you to check if your site has been blacklisted. Check it out, it's again FREE :

Wednesday, November 27, 2013

PKI Related Standards

Involve in some PKI related project recently and found a interesting resources to get all the PKI related Standards. For my own record purpose, and to help out those that needed, following are the link :

http://www.oasis-pki.org/resources/techstandards/#majorrfcs

In case the above site is not accessiable, following are some of the details:

PKI Technical Standards

What follows is a comprehensive set of lists of applicable PKI standards.
Notes: Standards tend to migrate from one body to another, as they mature and become ratified and adopted by steadily bigger groups. Over time this can lead to redundant standards documents. For instance, most of the RSA Laboratories' PKCS series have been adopted by the IETF now; such standards can appear more than once in the lists below. A nearly complete compendium of information security standards was produced by APEC and is available from the Federal PKI Steering Committe website: APEC Standards Handbook.

 Important PKI Standards Organisations
 The Major PKI Related RFCs
 Other PKI Related RFCs
 Other Cryptography Related RFCs
 Other Security and Crypto Standards
 ANSI Financial Industry PKI Standards
 ANSI Financial Industry PKI Standards IN DEVELOPMENT
 ISO PKI Standards
 PKCS Series
 Smartcard Standards & Guidelines
 European Electronic Signature Standards
 PKI Based Protocols
 Alternative, Novel, Developmental and Historical Public Key Management Systems


Important PKI Standards Organisations

Back to Top
PKIX - the public key working group of the IETF
IETF Security Area
RSA PKCS - Standards Series
IEEE Standards for Public Key Cryptography
European Telecommunications Standards Institute
IPSEC - (IETF)
S/MIME Mail Security (IETF) - See also Internet Mail Consortium S/MIME site
Transport Layer Security (TLS) - (IETF)
NIST PKI Program - i.e. the National Institute of Standards and Technology.
NIST Federal PKI Technical Working Group
NIST PKI Program Document registers
ANSI X9 - Financial Industry Standards
Internet Mail Consortium
Open Specification for Pretty Good Privacy


The Major PKI Related RFCs

Back to Top
The chair of the IETF's PKIX Working Group once named these as the most important of their RFCs to do with public key security. All other PKI related RFCs are listed further below.
RFC3820 - Internet X.509 Public Key Infrastructure (PKI) Proxy Certificate Profile
RFC2560 - X.509 Internet Public Key Infrastructure Online Certificate Status Protocol - OCSP
RFC2527 - Internet X.509 Public Key Infrastructure Certificate Policy and Certification Practices Framework. Superseded by RFC 3647.
RFC3647 - Internet X.509 Public Key Infrastructure Certificate Policy and Certification Practices Framework. Supersedes RFC 2527.
RFC2511 - Internet X.509 Certificate Request Message Format
RFC2797 - Certificate Management Messages over CMS
RFC3039 - Internet X.509 Public Key Infrastructure Qualified Certificates Profile
RFC3161 - Internet X.509 Public Key Infrastructure Time-Stamp Protocol (TSP)
RFC3281 - An Internet Attribute Certificate Profile for Authorization


Other PKI related RFCs

Back to Top
RFC2510 - Internet X.509 Public Key Infrastructure Certificate Management Protocols
RFC2585 - Internet X.509 Public Key Infrastructure Operational Protocols: FTP and HTTP
RFC2587 - Internet X.509 Public Key Infrastructure LDAPv2 Schema


Other Cryptography Related RFCs

Back to Top
RFC3779 - X.509 Extensions for IP Addresses and AS Identifiers
BCP0086 - Determining Strengths For Public Keys Used For Exchanging Symmetric Keys
RFC3739 - Internet X.509 Public Key Infrastructure: Qualified Certificates Profile
RFC3709 - Internet X.509 Public Key Infrastructure: Logotypes in X.509 Certificates
RFC3647 - Internet X.509 Public Key Infrastructure Certificate Policy and Certification Practices Framework
RFC3628 - Policy Requirements for Time-Stamping Authorities (TSAs)
RFC3447 - Public-Key Cryptography Standards (PKCS) #1: RSA Cryptography Specifications Version 2.1
RFC3379 - Delegated Path Validation and Delegated Path Discovery Protocol Requirements
RFC3280 - Internet X.509 Public Key Infrastructure Certificate and Certificate Revocation List (CRL) Profile
RFC3279 - Algorithms and Identifiers for the Internet X.509 Public Key Infrastructure Certificate and Certificate Revocation List (CRL) Profile
RFC3278 - Use of Elliptic Curve Cryptography (ECC) Algorithms in Cryptographic Message Syntax (CMS)
RFC3029 - Internet X.509 Public Key Infrastructure Data Validation and Certification Server Protocols
RFC2986 - PKCS #10: Certification Request Syntax Specification Version 1.7
RFC2985 - PKCS #9: Selected Object Classes and Attribute Types Version 2.0
RFC2898 - PKCS #5: Password-Based Cryptography Specification Version 2.0
RFC2847 - LIPKEY - A Low Infrastructure Public Key Mechanism Using SPKM
RFC2693 - SPKI Certificate Theory
RFC2692 - SPKI Requirements
RFC2559 - Internet X.509 Public Key Infrastructure Operational Protocols - LDAPv2
RFC2528 - Internet X.509 Public Key Infrastructure Representation of Key Exchange Algorithm (KEA) Keys in Internet X.509 Certificates
RFC2510 - Internet X.509 Public Key Infrastructure Certificate Management Protocols
RFC2459 - Internet X.509 Public Key Infrastructure Certificate and CRL Profile
RFC2437 - PKCS #1: RSA Cryptography Specifications Version 2.0
RFC2314 - PKCS #10: Certification Request Syntax Version 1.5
RFC2313 - PKCS #1: RSA Encryption Version 1.5
RFC2025 - The Simple Public-Key GSS-API Mechanism (SPKM)
RFC1824 - The Exponential Security System TESS: An Identity-Based Cryptographic Protocol for Authenticated Key-Exchange (E.I.S.S.-Report 1995/4)


Other Security and Crypto Standards

Back to Top
Federal Information Processing Standards Publications - (FIPS PUBS)
FIPS PUB 140-2 - Security Requirements for Cryptographic Modules. Note that this page includes links to the standard as well as its Annexes, plus testing requirements and lists of current validated products.
Special Publication 800-29 - A Comparison of the Security Requirements in Cryptographic Modules in FIPS 140-1 and FIPS 140-2
FIPS PUB 140-1 - Security Requirements for Cryptographic Modules (now superseded by FIPS 140-2)
ISO/IEC 15408:2000 - Common Criteria; see also Dutch Common Criteria site


ANSI Financial Industry PKI Standards

Back to Top
X9.30 Part 1:1997 - Public Key Cryptography Using Irreversible Algorithm: Digital Signature Algorithm (DSA)
X9.30 Part 2:1997 - Public Key Cryptography Using Irreversible Algorithms for the Financial Services Industry, Part 2: The Secure Hash Algorithm
X9.31:1998 - Digital Signatures Using Reversible Public Key Cryptography for the Financial Services Industry (rDSA)
X9.42:2003 - Public Key Cryptography for Financial Services Industry: Agreement of Symmetric Keys Using Discrete Logarithm Cryptography
X9.55:1997 - Certificate Extensions for Multi-Domain Operations
X9.57:1997 - Public Key Cryptography For the Financial Services Industry: Certificate Management
X9.62:1998 - Public Key Cryptography: The Elliptic Curve Digital Signature Algorithm (ECDSA)
X9.63:2001 - Key Agreement and Key Management Using Elliptic Curve-Based Cryptography
X9.68 Part 2:2001 - Digital Certificates for High Transaction Volume Financial Systems
X9.69:1998 - Framework for Key Management Extensions
X9.73:2003 - Cryptographic Message Syntax
X9.79:2001 - PKI Practices and Policy Framework for the Financial Services Industry. Important standard upon which WebTrust for CAs was developed.


ANSI Financial Industry PKI Standards IN DEVELOPMENT

Back to Top
X9.77:200X - Public Key Infrastructure Protocols Withdrawn
X9.79 Part 2:200X - Protection Profiles for Certificate Issuing and Management Systems. Committee Voting
X9.88:200X - Long Term Non-Repudiation Using Digital SignaturesWithdrawn
X9.89-200X - Management Protocols for Short CertificatesWithdrawn


ISO PKI Standards

Back to Top
ISO/CD 11568 - Financial services -- Key management (retail) Parts 1, 3, 4 and 5
ISO 13491-1:1998 - Banking -- Secure cryptographic devices (retail) -- Part 1: Concepts, requirements and evaluation methods
ISO 15782-1:2003 - Banking -- Certificate management for financial services -- Part 1: Public key certificates
ISO 15782-2:2001 - Banking -- Certificate management -- Part 2: Certificate extensions
ISO/TS 17090-1:2002 - Health informatics -- Public key infrastructure -- Parts 1-3: Framework and overview, Certificate profile, and Policy management of certification authority
ISO/CD 21188 - Public key infrastructure for financial services -- Practices and policy framework


PKCS Series

Back to Top
The PKCS series of cryptographic standards is managed by RSA Security Inc. The PKCS standards have moved beyond being proprietary and have equivalent standing in most of the PKI community as IETF or IEEE standards.
PKCS #1 - RSA Cryptography Standard
PKCS #3 - Diffie-Hellman Key Agreement Standard
PKCS #5 - Password-Based Cryptography Standard
PKCS #6 - Extended-Certificate Syntax Standard
PKCS #7 - Cryptographic Message Syntax Standard
PKCS #8 - Private-Key Information Syntax Standard
PKCS #9 - Selected Attribute Types
PKCS #10 - Certification Request Syntax Standard
PKCS #11 - Cryptographic Token Interface Standard
PKCS #12 - Personal Information Exchange Syntax Standard
PKCS #13 - Elliptic Curve Cryptography Standard
PKCS #15 - Cryptographic Token Information Format Standard


Smartcard Standards & Guidelines

Back to Top
ISO 7810 and ISO 7816 - Peak international physical, mechanical and electronic standards for plastic cards with embedded chips.
PC/SC - Smart card reader architecture specification for PCs. See also specs
NIST Smartcards standards and research - Home page for the National Institute of Standards and Technology smartcard related activities
ISO 14443 - defines RFID proximity smart card standard (two types with different modulation specs)
US Government Smart Card Handbook - by the US General Services Administration


European Electronic Signature Standards

Back to Top
A comprehensive list of relevant standards including certificate profiles is available at ETSI. See also ETSI FAQ.
TS 101 862 v.1.3.1 - Qualified Certificate Profile, based on RFC 3679 X.509 Public Key Infrastructure Qualified Certificates Profile
TS 101 903 v.1.2.2 - XML Advanced Electronic Signatures (XAdES); specifies the XML format for Advanced Electronic Signatures satisfying the requirements defined in the European Directive for Electronic Signatures.


PKI Based Protocols

Back to Top
IPSEC - A comprehensive list of IPSEC related RFCs and Internet Drafts is available at the Working Group Home Page: IPSEC Charter. See also Advanced Engineering Resources above.
SSL - SSL v3.0 Specification. See also Advanced Engineering Resources above.
TLS - RFC 2246 the TLS Protocol Version 1.0. See also Advanced Engineering Resources above.
S/MIME - A comprehensive list of S/MIME related RFCs and Internet Drafts is available at the Working Group Home Page: S/MIME Home. Further links to related e-mail fundamentals (such as MIME, IMAP and POP) are collected at Web docs. See also Advanced Engineering Resources above.


Alternative, Novel, Developmental and Historical Public Key Management Systems

Back to Top
PGP - Pretty Good Privacy
The latest technical developments on PGP standards are at Open PGP. For information about products, see commercial PGP and for PGP shareware, see free PGP.
OpenPGP Message Format - All information needed to develop interoperable applications based on the OpenPGP format. It is not a step-by-step cookbook for writing an application. It describes only the format and methods needed to read, check, generate, and write conforming packets crossing any network. It does not deal with storage and implementation questions. It does, however, discuss implementation issues necessary to avoid security flaws.
RFC 3156 - MIME Security with OpenPGP. This document specifies an Internet standards track protocol for the Internet community, and requests discussion and suggestions for improvements. Please refer to the current edition of the "Internet Official Protocol Standards" (STD 1) for the standardization state and status of this protocol
PEM - Privacy Enhanced Email
RFC 1424 - Privacy Enhancement for Internet Electronic Mail: Part IV: Key Certification and Related Services (Standard). This document describes three types of service in support of Internet Privacy-Enhanced Mail (PEM) [RFC 1421-1424]: key certification, certificate- revocation list (CRL) storage, and CRL retrieval. Such services are among those required of an RFC 1422 certification authority.
RFC 1423 - Privacy Enhancement for Internet Electronic Mail (PEM): Part III: Algorithms, Modes, and Identifiers. This document provides definitions, formats, references, and citations for cryptographic algorithms, usage modes, and associated identifiers and parameters used in support of Privacy Enhanced Mail (PEM) in the Internet community.
RFC 1422 - Privacy Enhancement for Internet Electronic Mail (PEM): Part II: Certificate-Based Key Management. This document defines a supporting key management architecture and infrastructure, based on public-key certificate techniques, to provide keying information to message originators and recipients. RFC 1424 provides additional specifications for services in conjunction with the key management infrastructure described herein.
RFC 1421 - Privacy Enhancement for Internet Electronic Mail (PEM): Part I: Message Encryption and Authentication Procedures. This document defines message encryption and authentication procedures, in order to provide privacy-enhanced mail (PEM) services for electronic mail transfer in the Internet.
Simple PKI
See SPKI Charter. "The IETF Simple Public Key Infrastructure [SPKI] Working Group is tasked with producing a certificate structure and operating procedure to meet the needs of the Internet community for trust management in as easy, simple and extensible a way as possible." Note that the last update to the SPKI Goals and Milestones was in 1997, and the latest RFC dates from 1999.
RFC 2692 - SPKI Requirements. The SPKI Working Group first established a list of things one might want to do with certificates (attached at the end of this document), and then summarized that list of desires into requirements. This document presents that summary of requirements.
RFC 2693 - SPKI Certificate Theory. This memo defines an Experimental Protocol for the Internet community. It does not specify an Internet standard of any kind. Discussion and suggestions for improvement are requested.

Sunday, November 24, 2013

For My Own Record - EJBCA LiveCD Information

Been researching on EJBCA recently. Following are some of the information for my own references :

password for tomcat.jks : serverpwd
password for truststore.jks : changeit
password for superadmin : foo123
password for login jboss : foo123

Tuesday, July 02, 2013

Packet Analysis on 3G usb dongle dial-up

Recently come across a idea which i need to capture and analyst the Network Packet via a 3G usb dongle. After the some finding, the following website provided a workable way that run in Windows XP 32bit :

http://desowin.org/usbpcap/tour.html

For those who want to do similar things, do check it out.

Tuesday, March 05, 2013

Fall in to Mini PC, MK802

Recently bought a MK802 and not long after that, i've fall into this Mini PC. Prior to own this small device, I run a ssh server with my desktop for tunneling purpose. Checking on power consumption on my desktop, wow, 170w++ compare with 3w for MK802. Beside reducing the electricity bill, we contribute to save our mother earth. I decide to port over the SSH to my MK802, and switch off my desktop. However there are some small changes need to be done like booting into Linux, etc. Following are some of the image available for MK802 :

Bodhi Linux
Linaro

Wednesday, February 27, 2013

Usual Keyboard Shortcuts

More than 100 Keyboard Shortcuts I read it from Facebook shared by some of my friend. 

Keyboard Shorcuts (Microsoft Windows)
1. CTRL+C (Copy)
2. CTRL+X (Cut)
...... 3. CTRL+V (Paste)
4. CTRL+Z (Undo)
5. DELETE (Delete)
6. SHIFT+DELETE (Delete the selected item permanently without placing the item in the Recycle Bin)
7. CTRL while dragging an item (Copy the selected item)
8. CTRL+SHIFT while dragging an item (Create a shortcut to the selected item)
9. F2 key (Rename the selected item)
10. CTRL+RIGHT ARROW (Move the insertion point to the beginning of the next word)
11. CTRL+LEFT ARROW (Move the insertion point to the beginning of the previous word)
12. CTRL+DOWN ARROW (Move the insertion point to the beginning of the next paragraph)
13. CTRL+UP ARROW (Move the insertion point to the beginning of the previous paragraph)
14. CTRL+SHIFT with any of the arrow keys (Highlight a block of text)
SHIFT with any of the arrow keys (Select more than one item in a window or on the desktop, or select text in a document)
15. CTRL+A (Select all)
16. F3 key (Search for a file or a folder)
17. ALT+ENTER (View the properties for the selected item)
18. ALT+F4 (Close the active item, or quit the active program)
19. ALT+ENTER (Display the properties of the selected object)
20. ALT+SPACEBAR (Open the shortcut menu for the active window)
21. CTRL+F4 (Close the active document in programs that enable you to have multiple documents opensimultaneou sly)
22. ALT+TAB (Switch between the open items)
23. ALT+ESC (Cycle through items in the order that they had been opened)
24. F6 key (Cycle through the screen elements in a window or on the desktop)
25. F4 key (Display the Address bar list in My Computer or Windows Explorer)
26. SHIFT+F10 (Display the shortcut menu for the selected item)
27. ALT+SPACEBAR (Display the System menu for the active window)
28. CTRL+ESC (Display the Start menu)
29. ALT+Underlined letter in a menu name (Display the corresponding menu) Underlined letter in a command name on an open menu (Perform the corresponding command)
30. F10 key (Activate the menu bar in the active program)
31. RIGHT ARROW (Open the next menu to the right, or open a submenu)
32. LEFT ARROW (Open the next menu to the left, or close a submenu)
33. F5 key (Update the active window)
34. BACKSPACE (View the folder onelevel up in My Computer or Windows Explorer)
35. ESC (Cancel the current task)
36. SHIFT when you insert a CD-ROMinto the CD-ROM drive (Prevent the CD-ROM from automatically playing)
Dialog Box - Keyboard Shortcuts
1. CTRL+TAB (Move forward through the tabs)
2. CTRL+SHIFT+TAB (Move backward through the tabs)
3. TAB (Move forward through the options)
4. SHIFT+TAB (Move backward through the options)
5. ALT+Underlined letter (Perform the corresponding command or select the corresponding option)
6. ENTER (Perform the command for the active option or button)
7. SPACEBAR (Select or clear the check box if the active option is a check box)
8. Arrow keys (Select a button if the active option is a group of option buttons)
9. F1 key (Display Help)
10. F4 key (Display the items in the active list)
11. BACKSPACE (Open a folder one level up if a folder is selected in the Save As or Open dialog box)

Microsoft Natural Keyboard Shortcuts
1. Windows Logo (Display or hide the Start menu)
2. Windows Logo+BREAK (Display the System Properties dialog box)
3. Windows Logo+D (Display the desktop)
4. Windows Logo+M (Minimize all of the windows)
5. Windows Logo+SHIFT+M (Restorethe minimized windows)
6. Windows Logo+E (Open My Computer)
7. Windows Logo+F (Search for a file or a folder)
8. CTRL+Windows Logo+F (Search for computers)
9. Windows Logo+F1 (Display Windows Help)
10. Windows Logo+ L (Lock the keyboard)
11. Windows Logo+R (Open the Run dialog box)
12. Windows Logo+U (Open Utility Manager)
13. Accessibility Keyboard Shortcuts
14. Right SHIFT for eight seconds (Switch FilterKeys either on or off)
15. Left ALT+left SHIFT+PRINT SCREEN (Switch High Contrast either on or off)
16. Left ALT+left SHIFT+NUM LOCK (Switch the MouseKeys either on or off)
17. SHIFT five times (Switch the StickyKeys either on or off)
18. NUM LOCK for five seconds (Switch the ToggleKeys either on or off)
19. Windows Logo +U (Open Utility Manager)
20. Windows Explorer Keyboard Shortcuts
21. END (Display the bottom of the active window)
22. HOME (Display the top of the active window)
23. NUM LOCK+Asterisk sign (*) (Display all of the subfolders that are under the selected folder)
24. NUM LOCK+Plus sign (+) (Display the contents of the selected folder)
25. NUM LOCK+Minus sign (-) (Collapse the selected folder)
26. LEFT ARROW (Collapse the current selection if it is expanded, or select the parent folder)
27. RIGHT ARROW (Display the current selection if it is collapsed, or select the first subfolder)
Shortcut Keys for Character Map
After you double-click a character on the grid of characters, you can move through the grid by using the keyboard shortcuts:
1. RIGHT ARROW (Move to the rightor to the beginning of the next line)
2. LEFT ARROW (Move to the left orto the end of the previous line)
3. UP ARROW (Move up one row)
4. DOWN ARROW (Move down one row)
5. PAGE UP (Move up one screen at a time)
6. PAGE DOWN (Move down one screen at a time)
7. HOME (Move to the beginning of the line)
8. END (Move to the end of the line)
9. CTRL+HOME (Move to the first character)
10. CTRL+END (Move to the last character)
11. SPACEBAR (Switch between Enlarged and Normal mode when a character is selected)
Microsoft Management Console (MMC)
Main Window Keyboard Shortcuts
1. CTRL+O (Open a saved console)
2. CTRL+N (Open a new console)
3. CTRL+S (Save the open console)
4. CTRL+M (Add or remove a console item)
5. CTRL+W (Open a new window)
6. F5 key (Update the content of all console windows)
7. ALT+SPACEBAR (Display the MMC window menu)
8. ALT+F4 (Close the console)
9. ALT+A (Display the Action menu)
10. ALT+V (Display the View menu)
11. ALT+F (Display the File menu)
12. ALT+O (Display the Favorites menu)

MMC Console Window Keyboard Shortcuts
1. CTRL+P (Print the current page or active pane)
2. ALT+Minus sign (-) (Display the window menu for the active console window)
3. SHIFT+F10 (Display the Action shortcut menu for the selected item)
4. F1 key (Open the Help topic, if any, for the selected item)
5. F5 key (Update the content of all console windows)
6. CTRL+F10 (Maximize the active console window)
7. CTRL+F5 (Restore the active console window)
8. ALT+ENTER (Display the Properties dialog box, if any, for theselected item)
9. F2 key (Rename the selected item)
10. CTRL+F4 (Close the active console window. When a console has only one console window, this shortcut closes the console)
Remote Desktop Connection Navigation
1. CTRL+ALT+END (Open the Microsoft Windows NT Security dialog box)
2. ALT+PAGE UP (Switch between programs from left to right)
3. ALT+PAGE DOWN (Switch between programs from right to left)
4. ALT+INSERT (Cycle through the programs in most recently used order)
5. ALT+HOME (Display the Start menu)
6. CTRL+ALT+BREAK (Switch the client computer between a window and a full screen)
7. ALT+DELETE (Display the Windows menu)
8. CTRL+ALT+Minus sign (-) (Place a snapshot of the active window in the client on the Terminal server clipboard and provide the same functionality as pressing PRINT SCREEN on a local computer.)
9. CTRL+ALT+Plus sign (+) (Place asnapshot of the entire client window area on the Terminal server clipboardand provide the same functionality aspressing ALT+PRINT SCREEN on a local computer.)

Microsoft Internet Explorer Keyboard Shortcuts
1. CTRL+B (Open the Organize Favorites dialog box)
2. CTRL+E (Open the Search bar)
3. CTRL+F (Start the Find utility)
4. CTRL+H (Open the History bar)
5. CTRL+I (Open the Favorites bar)
6. CTRL+L (Open the Open dialog box)
7. CTRL+N (Start another instance of the browser with the same Web address)
8. CTRL+O (Open the Open dialog box,the same as CTRL+L)
9. CTRL+P (Open the Print dialog box)
10. CTRL+R (Update the current Web )

Tuesday, February 26, 2013

Attention to All Malaysian

General Election is near already, do check out your status of registration as a voter.

http://daftarj.spr.gov.my/NEWDAFTARJ/DaftarjBM.aspx

Essential Linux Command used

As job require, I've been involve in setting LDAP server in Linux environment. As a newbie in Linux, I think it's a good idea for me to keep some of the essential command somewhere i can access anytime anywhere.

Mounting USB Drive
1. Checking what device id been assigned to newly plugin usb drive
    -"dmesg"
    -cat \proc\partitions
2.  create folder for mounting the USB drive
    - mkdir \mnt\usb
3. mounting the USB drive
    - mount -t vfat /dev/[device id] /mnt/usb
4. unmount the USB drive
    - umount /mnt/usb

Mounting an encrypted Volume
1. cryptsetup --key-file /root/key/backup luksOpen /dev/sdb1 backup
2. mount /dev/mapper/backup /mnt
3. umount /mnt
4. cryptsetup luksClose backup

Configure network
 1. check for interface
    - ifconfig -a
2. configure hw mac address accordingly
    - vi /etc/udev/rules.d/70-persistent-net.rules.
    - vi /etc/sysconfig/network-scripts/ifcfg-eth0
 3. restart network service to acquire ip
    - service network restart

View Cert
- openssl asn1parse -inform PEM -in [cert.pem]
Generate a cert with private key
- openssl req -new -x509 -nodes -out /etc/openldap/ssl/slapdcert.pem -keyout /etc/openldap/ssl/slapdkey.pem -days 365
 
Services
- Restart Services : service [service name] restart
- check service status : service [service name] status 

Configure MAVEN to use SOCKS proxy

Recently involved in JAVA development which require me to setup the development environment. There are much more things to learn. Therefore want to make some note here along my learning path which i hope it will be useful for others as well. Here it is, on how to configure your maven to use socks proxy :

1. set the environment variable (Windows 7)
Right-click "My Computer" and  click "Properties"
Click "Advances system settings"
Click "Environment variables"
Under "System variables",  click "New..."
For "Variable Name", put the following without quote "MAVEN_OPTS"
For "Variable Value",  put the following without quote "-DsocksProxyHost=xxx -DsocksProxyPort=yyy" by replacing xxx with your Sock Proxy Address, and yyy with your Socks Proxy port.
2. Then you might be able to test it out using the example shown in : http://maven.apache.org/guides/getting-started/maven-in-five-minutes.html to create a sample Project.





Sunday, January 20, 2013

通血管古方

最近,身边的好一些朋友都得了高胆固醇,血管阻塞的问题,上网看到了一则古方,希望可以助人助己:

材料:同份量的檸檬汁、薑汁、蒜頭汁、蘋果醋各一杯(250cc),蜜糖適量。
做法:1. 蒜頭去皮,薑去皮切小片,放入榨汁機榨汁,或者放入攪拌器打成漿,用網布隔渣,手絞出汁。
2. 將蒜頭、薑汁放入瓦煲,加入檸檬汁與蘋果醋,大火滾,小火慢煮,不要蓋鍋蓋,讓水份蒸發,大約需要半小時,剩下大約一半汁液。
3. 溫度降下後,加入蜜糖,仔細攪勻,蜜糖可能需要很多,主要是令汁液容易入口。
4. 將成品儲在有蓋的玻璃瓶中,放入雪櫃。每天早飯前空肚服用一湯匙。
此古方来自 :
http://www.yimho.com/1579.html
http://www.yimho.com/1625.html