Isnin, 11 Oktober 2010

Null Route

In computer networking, a null route (blackhole route) is a network route (routing table entry) that goes nowhere. Matching packets are dropped (ignored) rather than forwarded, acting as a kind of very limited firewall. The act of using null routes is often called blackhole filtering. The rest of this article deals with null routing in the Internet Protocol (IP).

Null routes are typically configured with a special route flag, but can also be implemented by forwarding packets to an illegal IP address such as 0.0.0.0, or the loopback address.

Null routing has an advantage over classical firewalls since it is available on every potential network router (including all modern operating systems), and adds virtually no performance impact. Due to the nature of high-bandwidth routers, null routing can often sustain higher throughput than conventional firewalls. For this reason, null routes are often used on high-performance core routers to mitigate large-scale denial-of-service attacks before the packets reach a bottleneck, thus avoiding collateral damage from DDoS attacks — although the target of the attack will be inaccessible to anyone. Blackhole filtering can also be abused by malicious attackers on compromised routers to filter out traffic destined to a certain address.

However, routing typically only works on the Internet Protocol layer and is very limited in packet classification. It is bound to be stateless due to the nature of IP routers. Typically, classification is limited to the destination IP address prefix, source IP address and incoming network interface.

Nullrouting with iproute2 on Linux:

$ ip route add blackhole 192.168.32.128/32[1]

Nullrouting with 'route' on Solaris and BSD:

$ route add -host 10.10.0.1 127.0.0.1 -blackhole
$ route add -net 10.10.64.0/18 127.0.0.1 -blackhole


Routing to the Null0 interface on Cisco IOS:

ip route 192.168.0.0 255.255.0.0 Null0[2]

Windows XP/Vista does not support reject or blackhole arguments via route, thus an unused IP address (e.g. 192.168.32.254) must be used as the target gateway:

route -p ADD 192.168.32.128 MASK 255.255.255.255 192.168.32.254

source: wiki

Jumaat, 1 Oktober 2010

USB flash drive write protect error ?




Harini aku kene error write protect kat USB flash drive aku. bila nak delete file takleh. nak copy file takleh. bila masa plak flash drive aku ni write protected ? Maybe security policy sebelum ni menyebabkan semua removable drive takde write permission kot. ntah la aku pun tak ingat. aku disable write protect check kat registry :-

WARNING: Backup dulu registry

STEP 1 - Backup the registry
1. Unplug the USB flash drive.
2. Click Start > Run, type in regedit then click OK.
3. From the registry menu, click File, select Export.
4. Under Export range select All.
5. Name the file SNDK.reg and save it to the desktop.

STEP 2 - Disable the "Write Protect" permission in the Registry
1. On the left pane, click the "+" beside HKEY_LOCAL_MACHINE
2. Navigate to SYSTEM > CurrentControlSet > Control > StorageDevicePolicies.
3. On the right pane, right-click on WriteProtect and select Modify.
4. In the Value data field, type the number 0 (decimal value yer tuan2 & puan2)
5. Click OK.

settle.