Verify My Riverbed RCSP-W Status

August 4th, 2011 No comments
RCSP-W-certificate-thumbnail

Click to view Certificate in new window

RCSP-W

Click to verify this using: VBCBEVSKCEF4QEQW

Categories: Uncategorized Tags:

Server Message Block (SMB) Dialects and Oplocks

July 2nd, 2011 No comments

This post describes typical message exchange sequence for a client connecting to a user level server, opening a file, reading its data, closing the file, and disconnecting from the server. Opportunistic Locking (Oplocks) are also explained.

You can also refer tothis capture: Download smbtorture from Wireshark Wiki to further understand the SMB dialogues. The capture was made using the Samba4 smbtorture suite, against a Windows Vista beta2 server. Read more…

Categories: Protocol Analysis Tags: ,

Installing Dynamips on Linux

May 30th, 2011 No comments

Instructional video courtesy of blindhog.net:

http://www.blindhog.net/tutorials/dynagen-linux-install.htm

Categories: CISCO, linux Tags:

Network Monitoring for Dummies

April 28th, 2011 No comments

A  nice little introduction to network monitoring (provided by my employer – registration required for obtaining the free download). This book does lean slightly towards using Cascade products to provide monitoring, troubleshooting and analytics – BUT I’m happy to say that it does remain a nice little read for anyone who has an interest in network monitoring. Read more…

bashrc and bash_profile

April 27th, 2011 No comments

Both the ~/.bashrc and ~/.bash_profile are scripts that might be executed when bash is invoked. The ~/.bashrc file gets executed when you run bash using an interactive shell that is not a login shell. The ~/.bash_profile only gets executed during a login shell. What does this all mean? Read more…

Categories: linux Tags:

RFC 2597 Assured Forwarding Per-Hop Behaviour Group

April 19th, 2011 No comments

RFC 2597 defines four Assured Forwarding groups, denoted by the letters “AF” followed by two digits: Read more…

Categories: Network Design, QoS Tags:

Kerberos (RFC1510) Failure Codes

April 18th, 2011 No comments

These failure codes are the original error codes from the Kerberos RFC 1510 Read more…

Categories: Network Management Tags:

Using Wireshark to examine SMB Signing Requirements

April 13th, 2011 No comments

When a client connects to a server using SMB it sends a “Negotiate Protocol Request”.  In response to this, the server replies with a “Negotiate Protocol Response”.  This response reveals whether SMB signing is enabled and whether it is required at the client, the server, or both. Read more…

Categories: Protocol Analysis Tags: ,

Creating Virtual Machines using Xen Hypervisor

March 28th, 2011 No comments

These YouTube Videos show how simple it is to create Virtualized and Para-Virtualised Guest Operating Systems using Xen Hypervisor Read more…

Categories: linux Tags:

Using TCP Flags to filter 3-Way Handshake using TCPDUMP / Wireshark

March 18th, 2011 No comments

Matching TCP traffic with particular flag combinations can be a useful way of examining TCP conversations.  Refer to the TCP State Machine to understand the context of these flags: Read more…

Categories: linux Tags: ,