Category: Datacenter


Retrieve Serial Number (S/N) on Juniper EX-series switches

The serial number (S/N) is a unique identifier of Juniper products and is often required for product identification. The information below explains how to retrieve the it on the EX-series switches by reading it from a label on the chassis, by using the Command Line… Continue reading

Display email delivery count for domains

We recently cleaned a WordPress site from malware for a Client after their server ended up on a blacklist due to the amount of spam it was sending out. This effects email delivery to end users as mail is usually rejected. Here’s a really useful… Continue reading

New fully managed hosting client – Striker Productions

Fully managed hosting client Striker Productions

We’d like to welcome Striker Productions to our family of fully managed hosting Clients. We rebuilt the website on our testing server, ridding it of the malware that was causing issues, before promoting it over to our production servers.

Some of the DNS attacks in force today

DNS attacks – A simple way to gauge the extent of the danger posed by DNS vulnerability is to look at the sheer number of attack types currently being launched. This is not all of them and new ones are emerging. Direct DNS amplication attacks… Continue reading

Ghost vunerability – Ubuntu and CentOS

Ghost vunerability

A new vulnerability, GHOST: glibc vulnerability (CVE-2015-0235), has been discovered that affects certain Linux systems. This exploit affects the gethostbyname functions in the GNU C Library (glibc), which is a key component of all Linux systems. Because many software programs rely on these functions, Linux… Continue reading

AIX 4.3: Creating LVFs

AIX

Here’s some useful aix commands fro creating logical volumes and file systems. mklv -t (type) -y (name) VG ## Type = jfs, jfslog, or other some such name = volume_group_name.lv## where ## is a one up number for each logical volume ## is the number… Continue reading

Using IKEView to review IKE & IPSEC logs.

IKE View

This is predominately aimed at Checkpoint users. Download a copy of IKE View here – this is a stand alone program so it doesn’t need installing. Open your ike.elg log file and analyse accordingly…  

IKE Debuging

Nokia IP Platform

This guide assumes you have Chekcpoint running on an IPSO nokia platform and are familiar with debugging the platforms. Logon to the firewall (using your PuTTY client & SSH v2) as admin and enter expert mode. Run the following commands: cd /$FWDIR/log vpn debug ikeon The… Continue reading

Dark site – Network Design for 3rd party web application

Visio architecture

Dark site – We’ve just completed the final network design for a Client who require access to a new 3rd party web based application. This would normally be an easy task, however they are on a site that has no access to the Internet or… Continue reading

Datacenter Services

Datacentre Services

Datacenter Services – structured cabling, network patching and connecting the Internet of Things! Keeping your structured cabling structured! It’s all too easy to let things become a mess in your racks and underfloor. A datacentre showing off masses of tangled cables is unattractive to the… Continue reading