Buying networking equipment off of Ebay can be one of the most rewarding and frustrating challenges you may ever face. Of course, being able to identify and fix issues with newly purchased hardware may mean the difference between having purchased a $500 firewall for $11 and some parts versus buying another piece of crap for $11 that will live out its life in the back of the parts closet. In this article, I’ll cover how to replace the power supply to a Cisco PIX 506E firewall with a standard computer power supply.
We managed to unearth an old IBM RS/6000 server at work and decided that since the machine didn’t work, it was time for it to go away. Right off the bat, one of the things I noticed about this machine was that it had a diagnostic LCD panel in the bezel presumably for showing POST error codes and warnings. Since the machine was going to the scrap heap, I decided to relieve it of the LCD and managed to get it to work on an Arduino with minimal effort. Read on for pictures and a wiring pinout.
Have a giant Arduino powered killbot, but can’t fancy being right next to it when you unleash it on the unsuspecting populace? Want to change the mood-lights in your dorm without having to get up off the couch? Why not use IR remote controls to do the walking for you? In this article, I will be covering how to use the IRremote Library written by Ken Shirriff for the Arduino to control a seven segment display as a proof of concept. Killbot not included.
After reading this post on Hack-a-day, I went to the local MicroCenter to see what all they had to offer in a brick-and-mortar store. I remember when Parallax and RadioShack had joined together and while the new availability had made it easier to get started with microcontrollers, the most common expression recalled is one of sadness at the general disarray of the parts cabinets. Thankfully Microcenter seems to have done Sparkfun right. Read on for my initial impressions of Microcenter’s offerings and a full review of my first Arduino kit, the Sparkfun Inventor’s Kit. (continue reading…)
In this post, I will review a recently acquired WD TV Live Plus purchased from Microcenter for around $100. The quest was to find a media player solution that could read media from network shares and play them with minimal fuss. Since this is going to be attached to the primary TV, it has to be “Girlfriend Approved” and easy to use. I believe that the WD TV Live Plus fits this requirement adequately however the installation of the device could be easier. Once done, the device is wonderful. Read the full review after the break.
Structured wiring in businesses and the enterprise are as expected as the sun shining and a regular paycheck, however in the home a structured wiring solution can be an unexpected gift from the Gods of Ethernet. While structured wiring in an apartment complex is usually done central to a utility closet or shelf, sometimes the central point isn’t always convenient for your router or you find yourself needing to run multiple networks. In this tutorial, I will show you how to turn one structured wiring drop into two drops for carrying two different network segments, something that can be of benefit should you ever need it. (continue reading…)
A few months ago, I posted a hardware teardown of the CVS Sylvania Netbook pictured above. After working with it and performing a lot of research on it, I promised a follow up article, and here it is. To sum it all up, with a bit of modification to the software, a spare SD card and a lot of patience, you can actually turn this thing into a somewhat useful Linux device. There’s also some improvements and suggestions to be had for improving the Windows CE side of things should you decide to continue using it in its default state.
In this final article in the three part Ubuntu IDS series, we will go over installing, compiling and configuring Snort and Nessus on our new IDS device. We will use Snort to analyze traffic as seen by the IDS and we will use Nessus to perform vulnerability testing on the network. The process for installing Snort will also cover installing SnortReport provided by Symmetrix Technologies so we can translate Snort’s cryptic messages into a more readable format that we can take action on. Read on as we wrap up the installation and finish our IDS device.
In an earlier article, I demonstrated how you can build a passive monitoring device for an Ethernet network as the first part to a three part project to build a home IDS device. In this article, the second in the series, I will describe how to set up the networking for an IDS using the passive tap that I built earlier.This setup will involve using a technique called bonding to take two physical interfaces and bond them together, creating a logical interface that we can use for Snort. This article will also explain where is the best location to place the tap and what you can expect to see once the networking is set up using common Linux utilities like tcpdump.
One of the things that the GCIA study has taught me is that being able to monitor the network your computer is on is a critical necessity to maintaining a secure network. Corporate environments can set up IDS devices to monitor traffic however monitoring doesn’t work unless you have proper connectivity to what you want to monitor. Unfortunately, most of us don’t have central wiring in our house and expensive managed switches that can set up span sessions with which to monitor traffic in transit. In this HOWTO, I will cover how to build your own monitoring connection that you can use on your own network to monitor traffic without breaking the bank. This article is first in a three part series on how to build your own home IDS for monitoring your network traffic. Look for the other two sections soon!