When you are afraid of something dive straight into it, because the intensity of abstaining from it is greater (worse) than what you are afraid of.
Ali Ibn Abi Talib[A.S]

Learning Python GUI using Tkinter

As I wanted to learn the python GUI, usingpythonI searched on internet and found these very nice tutorials on how to built GUI using Tkinter library of python. There are few more GUI libraries available on the internet as you may be aware such as wxpython, but I found Tkinter suitable for my needs and easy to work with. I started learning from UsingPython , it also has a good basic python tutorials if you want to have a refresher course.


The other one was the Python Course which also has some really nice examples and a bit more than using python but both are good and you can start from either one.

Following are library references which are handy to know what things you can change using arguments.

Etc.. | Tagged , |

It’s like snapchat, but for files!

A service that I fell in love for file transfers!


Simply upload a file, share the link, and after it is downloaded, the file is completely deleted. For added security, set an expiration on the file and it is deleted within a certain amount of time, even if it was never downloaded.


Etc.. |

Configuring VLANs in Linux

Turn off the Network Manager

#chkconfig NetworkManager off

goto directory “/etc/sysconfig/network-scripts/” and edit ifcfg-eth0 or ifcfg-eth1.

#cd /etc/sysconfig/network-scripts/
#vi ifcfg-eth0

For creating VLAN with ID=300

#cp ifcfg-eth0 ifcfg-eth.300          //copy file and rename it to eth.vlanid
#vi ifcfg-eth.300


#service network restart

You can create more VLANs by creating more files ifcfg-eth0.VLANID and replacing it with VLAN ID.

Identify Real CPU Cores in linux

Before I begin software installation I usually need to cross check the hardware specification of the provided hardware with requirements communicated to project owners. During this phase identification of CPU cores is mandatory to avoid performance issues in production environment.

Finding the number of CPU cores on a Linux server can be challenging. The way /proc/cpuinfo displays information makes it hard to distinguish between real CPU cores and logical hyperthreading CPU’s.
For example, consider if I run the following command on linux OS

$ cat /proc/cpuinfo | grep processor
processor : 0
processor : 1
processor : 2
processor : 3

The above output explains I have 4 CPU Cores however in reality there are only 2 CPU Cores , the other 2 Cores are virtual Cores which appears if hyper threading is enabled on your system

Using the following command we can tie all of this together to show the number of cores on a system:

$ cat /proc/cpuinfo | egrep "core id|physical id" | tr -d "\n" | sed s/physical/\\nphysical/g | grep -v ^$ | sort | uniq | wc -l

Linux |

CentOS Command Line Installing Guide from Basic

After Installing CentOS, you will need to login on the screen:
login: user
password: root

For logging into root where you can change the configuration you need to write “su -”
The root password will be the one that is set at the time of the setup.

Setting Ethernet Interface Configuration:


[root@xomolinux network-scripts]# cat /etc/sysconfig/network-scripts/ifcfg-eth0

For Static IP

To re-start the service

service network restart



Enabling Telnet
root@server ~]# yum install telnet telnet-server -y
Now the telnet has been installed in your server. Next open the telnet configuration /etc/xinetd.d/telnetand set disable = no:
[root@server ~]# vi /etc/xinetd.d/telnet
# default: on
# description: The telnet server serves telnet sessions; it uses \
# unencrypted username/password pairs for authentication.
service telnet
flags = REUSE
socket_type = stream
wait = no
user = root
server = /usr/sbin/in.telnetd
log_on_failure += USERID
disable = no

Save and quit the file. Now restart the telnet service using the following command:

[root@server ~]# service xinetd start
Starting xinetd: [ OK ]
Make this service to start automatically on every reboot
[root@server ~]# chkconfig telnet on
[root@server ~]# chkconfig xinetd on

Allow the telnet default port 23 through your firewall and Router. To allow the telnet port through firewall, open the file /etc/sysconfig/iptables and enter the lines as shown in red color:

[root@server ~]# vi /etc/sysconfig/iptables
# Firewall configuration written by system-config-firewall
# Manual customization of this file is not recommended.
-A INPUT -p icmp -j ACCEPT
-A INPUT -i lo -j ACCEPT
-A INPUT -p udp -m state --state NEW --dport 23 -j ACCEPT
-A INPUT -p tcp -m state --state NEW --dport 23 -j ACCEPT
-A INPUT -m state --state NEW -m tcp -p tcp --dport 22 -j ACCEPT
-A INPUT -j REJECT --reject-with icmp-host-prohibited
-A FORWARD -j REJECT --reject-with icmp-host-prohibited

Save and exit the file. Restart iptables service:

[root@server ~]# service iptables restart
iptables: Flushing firewall rules: [ OK ]
iptables: Setting chains to policy ACCEPT: filter [ OK ]
iptables: Unloading modules: [ OK ]
iptables: Applying firewall rules: [ OK ]

Thats it. Now telnet server is ready to use.

Create a test user called “sk” with password “centos“:

[root@server ~]# useradd sk
[root@server ~]# passwd sk

Changing password for user sk.

New password:
BAD PASSWORD: it is based on a dictionary word
BAD PASSWORD: is too simple
Retype new password:
passwd: all authentication tokens updated successfully.

Check the Service Configuration
chkconfig --list

Linux |

Historical Data Records Push Failure

The historical data records are the Comma separated files generated by Oracle Session border controller to maintain traffic statistics.This also include performance statistics like CPU utilization , Memory Consumption etc.


These historical data records (commonly known as HDRs) are pushed out of the hardware for performance reporting. In order to get nicely presentable graphical reports you should have Net-Net Central in your network.


The Net-Net Central (commonly known as NNC) is a elemantery managment system for Oracle Session border controllers.
It includes Device Manager, Configuration Manager , Report Manager , Security Manager and Fault Manager.


The HDRs are push to NNC every 15minutes(this is a default value can be changed to accommodate your needs) however the records are collected and written to a CSV every 5mins (default values).


In order to configure session border control a.k.a SBC to generate HDRs , collection group need to configured i.e




Following details are mandatory to configure push-receiver from SBC CLI.

* address
* user-name
* password
* data-store
* protocol


Sample Configuration

sample-interval 5
push-interval 15
boot-state enabled
start-time now
end-time never
red-collect-state enabled
red-max-trans 1000
red-sync-start-time 5000
red-sync-comp-time 1000
address x.x.x.x
user-name nncentral
password ********
data-store /opt/collect
protocol sftp
push-success-trap-state disabled

In case if configuration has been done using NNC ,you will require additional password i.e acmepacket

It is also recommended to restart collection service , you can use following command

request collect restart

At this stage you have configured HDRs correctly however I am sure it will not work until you configure server public key in SBC.
Please note SBC use SSH2 however most of the linux servers use OpenSSH, this will cause incompatiabilty as both have different key format.


The best way is to convert your server public key to SSh2 using following , excute command where OpenSSH is installed otherwise it will fail.

ssh-keygen -e -f /etc/ssh/id_rsa.pub

Now copy the output of this command and import this key in using following command

ssh-public-key import known-hosts <any-name-to-identify>

Oracle recommends to import both RSA and DSA keys in SBC.

To verify if HDRs are pushed correctly execute following command

show logfile log.collect

To verify NNC has received CSV files , look for the files at data-store location (mention above while configuring collection service)

Quick Fix for NTP DDoS Attack (Reflection Attack)

All you need to do is add few lines in linux ntp configuration file i.e ntp.conf

Here’s how your ntp.conf will look like- this is just one way of blocking the NTP reflection attacks.

restrict default ignore // Config to Restrict all by default

restrict NTP Server IP Address mask nomodify notrap noquery
 // Deny any queries or modification requests from the NTP Server

restrict Client Subnet mask //Needed only if the Linux Machine 
is acting as server to other clients.

server NTP Server IP Address


fudge stratum 10 

Again this is just one way of doing it quick.

For more information read the security bulletin from the ntp.org.

Linux |

Detect Packet Errors In LAN Connection Status

Many of us are already using fast broadband connections these days and it’s important to know whether the information you are sending or receiving is correct and error free. When there is an error in sending or receiving data you might have problems downloading or uploading files and they could fail MD5 checksums or appear corrupt and the downloaded Zip or Rar archive won’t open etc. For example, if you keep getting errors sending packets but not receiving, then that could actually point to a faulty network adapter.


Error information can be an important first step in troubleshooting a connection. It’s very easy to view the basic network connection information, and you can see a network connection’s current status, connection duration, speed and packets or bytes sent and received for the connection. This is usually found by double-clicking the status icon in the system tray or going through Network and Sharing Center > Change adapter settings in Vista and above. The Status dialog box by default shows nearly everything but weirdly chooses not to display errors for the connection.

local area connection status

Before using sophisticated or tough to use packet sniffing software to detect packet loss and errors, you can just enable a hidden setting in Windows to show you any possible errors with your connection. Here’s how to do it with a quick registry change and the information will be added to the status dialog window.

[Read More: Full article by Raymond.cc]

TamoSoft Throughput Test

TamoSoft Throughput Test is a utility for testing the performance of a wireless or wired network. This utility continuously sends TCP and UDP data streams….

Click for more screen shots

[Read More]

Word Hippo ..Dictionary!

Word Hippo can do lots of other stuff which other dictionary can’t example includes:

Sentences with:

Words Containing:

Rhymes with:

Adjective For:

Adverb For:

And lot more.

Etc.. |