I came across this method of changing the ownership of files when working on a DataStage startup/shutdown script and changing the permissions on the logfiles the script creates. So I wrote a simple script that takes a username from input and a file name or multiple names from input and changes the owner and group of that directory.Linux, Perl Scripts, Tutorials/Whitepapers, Windows Read More
Ok here is a perl script that is pretty much useless in Linux, becuase linux has the grep command, but I’m a geek so I wrote it anyways. Hey, it could be usefull in windows…lol. So if you haven’t figured it out yet, this script will look thru a file for keywords and only print out the lines that contain the keyword. Of course you could also just output the results to a new file.Linux, Perl Scripts, Tutorials/Whitepapers, Windows Read More
I came across this issue today… thankfully my network environement security uses both eTrust and Tripwire, so this should not be a big problem here, but I think it’s should be watched for. Basically, this is a way to hide spyware or incriminating (hacker) tools by casting or forking the file into another file. The original size will show the same and even the actual running process is hidden from process explorers, the only thing that changes is the modification date. Also, this only runs on NTFS and moving the file to another file system will corrupt the hidden file.Network Security, Tutorials/Whitepapers, Virus Alerts, Windows Read More
Here is a pretty basic Perl script that will take a tab seperated file and format it accoring to the arguments you pass with the command. This script will only work if the file has three fields, but can be edited for more. I am working on a way to unlimit this using arrays, but have not found a working solution yet. Also, this script is protable to windows. Just edit the environment path to reflect where your perl executable is located. Code below:Linux, Microsoft Office, Perl Scripts, Tutorials/Whitepapers, Windows Read More
I was tasked with verify host connectivity after some server patches were pushed out. So instead of manually pinging each one, and I already had a text file with all the affected hostnames, I decided to put together a little script that would read from the text file and print out whether the host was up or down.
I have simplified my original multiple host ping sweep script. All you need for this script to work is a hosts.txt file with a list of host names or IP addresses and of course the script below.Linux, Network Security, Perl Scripts, Tutorials/Whitepapers, Windows Read More
The featured site Networksecuritytech.com is back online… check it out… and hit it hard. There is a lot of good content on there… same theme as my blog, but censored….Expect Scripts, Firewalls, Linux, Microsoft Office, Network Security, Tutorials/Whitepapers, Virus Alerts, Windows, Wireless Read More
Microsoft provides the Inbox Repair Tool for correcting most problems with damaged Personal Folders .pst files. If you do not see the Inbox Repair Tool on the Start menu, under Programs | Accessories | System Tools, use Start | Find or Start | Search (depending on your operating system) to search your system for Scanpst.exe.You will need to know the location of the .pst file that you want to repair. See Outlook & Exchange/Windows Messaging Backup and Dual-Boot for information on file locations and ways to determine the location of a .pst file that you can see in Outlook.Microsoft Office, Windows Read More