Page 30 of 31

Firefox extensions

Here is the list of the firefox plugins that I use.

Online books storages

Using google

  • intitle:”index of” “head first” -free -examp -preview

Javascripts

Good prototype controls

http://livepipe.net/#hoverbox

Directly print pdf files from a browser

function Printobject(){
document.all.PDF.print();
setTimeout(“self.close();”,4000); }

Rails code-snipplets

auto_scope

source: http://blog.teksol.info/archives/2007/3

class Contact < ActiveRecord::Base
auto_scope \
:old => {:find => {:conditions => [born_on < ?, 30.years.ago]}},
:young => {:find => {:conditions => [born_on > ?, 1.year.ago]}}
end

class Testimonial < ActiveRecord::Base
auto_scope \
:approved => {
:find => {:conditions => [approved_at < ?, proc {Time.now}]},
:create => {:approved_at => proc {Time.now}}},
:unapproved => {
:find => {:conditions => approved_at IS NULL},
:create => {:approved_at => nil}}
end

Rails internals!?

http://localhost:3000/rails/info/properties

Threads

Programs for Linux

Ubunto repositories

Home

winetricks

wget www.kegel.com/wine/winetricks
example: ./winetricks winver=winxp
example: ./winetricks vcrun2005

http://www.virtualbox.org/

Disk managment
KDirStat and Baobab

Security

http://pakiti.sourceforge.net/ – monitor and install patches on multiple servers, supports ubunto, and rh

games

LiveCD

Clipart – links

Image repositories

http://photl.com/en/93728.html – abs free

http://www.stockxpert.com/browse.phtml?f=view&id=211606
http://www.shutterstock.com/
http://www.stumbleupon.com/

How to choose colors for the websites:

http://kuler.adobe.com/

http://www.colorcombos.com/

Html templates/css

http://www.tristarwebdesign.co.uk/templates.php

http://www.cssdrive.com/

http://drupal.org/project/Themes

http://boygj.com/TemplateMonster

favico generators + icons

http://www.html-kit.com/favicon/
http://www.smashingmagazine.com/2007/06/20/ajax-javascript-solutions-for-professional-coding/

Icons

http://www.iconarchive.com/category/application/buuf-icons-by-mattahan.html

Javascript image galleries

  • Catalog of galleries: http://tutorialblog.org/12-javascript-image-galleries/
  • http://www.zenphoto.org/2008/08/installation-and-upgrading/
  • http://www.artviper.de/ImageMenu/

Масапан

Незнам защо но успях да открия в интернет само тази рецепта за тези вкусни бонбони и се изуших да я запазя за ентусястите, в момента бадемите са в хладилника и побеляват активно.

200 гр. сурови бадеми
90 гр. захар
130 гр. вода
1 ч. л. лимонов сок

Бадемите се накисват във вряла вода, която да ги покрие два пръста. Престояват така около 20-30 минути и се обелват, като се натискат леко в края на ядката.
Слагат се върху домакинска хартия и така престояват една нощ в хладилника, за да се изтегли водата от тях и за да побелеят.
На другият ден бадемите се смилат фино в машинка за кафе или в кухненски комбайн, до консистенция почти на брашно. За по-добър резултат се слагат по малко бадеми, защото при по-големи количества долния пласт става на паста, а горният е едро смлян. Прави се захарен сироп от захарта и водата по следния начин-слагат се двете съставки в дълбок съд и се оставя да заври сместа. После се намаля котлона на средна степен и се оставя сиропа да ври докато не стане със следната консистенция-като се капне капка от него в чаша със студена вода, то капката трябва да падне цяла на дъното,
Когато този момент (Punto di masapan) е достигнат, смлените бадеми се прибавят и вече на съвсем слаб котлон се превъртат заедно със сиропа, докато не стане хомогенна тестообразна смес. Тенджерата се отсранява от котлона, хубаво се смесва с лимовият сок и се приготвят бонбони с помощта на метална формичка и найлоново опаковъчно домакинско фолио-фолиото се слага във формичката, отгоре се натъпква плътно сместта и се обръщат така получените бонбони върху пекарска домакинска хартия.
След като се стегнат се нареждат в празна картонена кутия от бонбони и преседяват още една нощ в хладилника.
На другият ден можете да опитате този невероятно вкусен еврейски сладкиш, който се приготвя за сватби, раждане на деца, Брит мила или Бар или Бат мицва.
Той има особен статут в еврейската култура, защото приготвянето му отнема много време и е относително скъп за направа.

Източник
masapan

Software and Tutorial Links

IPTables
Linux firewall with packet string-matching support
http://www.securityfocus.com/infocus/1531
Firewall scripts
http://linuxfirewall.start.bg/
http://www.puschitz.com/FirewallAndRouters.shtml
Debian Kernel how-to
http://myfreesoft.net/phpBB2/viewtopic.php?t=52 * in Bulgarian *
Source: http://www.howtoforge.com/forums/showthread.php?t=21
http://www.howtoforge.com/kernel_compilation_debian
Active Ports (Windows)
http://www.microsoft.com/technet/sysinternals/Networking/TcpView.mspx
Security and Audits Checks & updates
http://sourceforge.net/projects/advchk
RedHat – http://www.redhat.com/spacewalk/

Avoid common mistake in web programming

WebGoat

WebGoat is a deliberately insecure J2EE web application designed to teach web application security concepts

WebGoat is java web application which can show you a lot of the web attacks that can be performed on your website. It is a must have for all web developers.

You can download it from sourceforge or from google

The package contains a tomcat server and you can run it from the distribution. But in my case there was only windows configuration files so I have to take the war file and put in the standalone tomcat installation. Also move the permissions for the roles/users to my tomcat installation.

After manage to run it you will need some sniffer/proxy to monitor the requests. I have tried it with WebScarab but there is another one here and this one here

  • Run WebGoat in tomcat
  • Run you proxy/sniffer/pluging or what ever monitoring tool.
  • Start your browser
  • Setup your browser to use the proxy in case you choose to use proxy
  • Redirect your browser to WebGoat application (http://127.0.0.1:8080/WebGoat/attack )

You are ready to pass all the tests. Here are the options extracted from the lates WebGoat version:

  • Admin Functions
  • General
  • Code Quality
  • Concurrency
  • Unvalidated Parameters
  • Access Control Flaws
  • Authentication Flaws
  • Session Management Flaws
  • Cross-Site Scripting (XSS)
    • Phishing with XSS
    • LAB: Cross Site Scripting
    • Stage 1: Stored XSS
    • Stage 2: Block Stored XSS using Input Validation
    • Stage 3: Stored XSS Revisited
    • Stage 4: Block Stored XSS using Output Encoding
    • Stage 5: Reflected XSS
    • Stage 6: Block Reflected XSS
    • Stored XSS Attacks
    • Cross Site Request Forgery (CSRF)
    • Reflected XSS Attacks
    • HTTPOnly Test
    • Cross Site Tracing (XST) Attacks
  • Buffer Overflows
  • Injection Flaws
    • Command Injection
    • Blind SQL Injection
    • Numeric SQL Injection
    • Log Spoofing
    • XPATH Injection
    • LAB: SQL Injection
    • Stage 1: String SQL Injection
    • Stage 2: Parameterized Query #1
    • Stage 3: Numeric SQL Injection
    • Stage 4: Parameterized Query #2
    • String SQL Injection
    • Database Backdoors
  • Improper Error Handling
  • Insecure Storage
  • Denial of Service
  • Insecure Configuration
  • Web Services
  • AJAX Security
  • Challenge

Prevent DOS attacks with apache2

The apache module that will do the job is called mod_dosevasive. The installation is easy.

Configure the apache2

Edit your httpd.conf (usually located in /usr/local/apache/conf/httpd.conf):
Add:

<IfModule mod_dosevasive20.c>
  DOSHashTableSize 3097
  DOSPageCount 2
  DOSSiteCount 50
  DOSPageInterval 1
  DOSSiteInterval 1
  DOSBlockingPeriod 10
  DOSEmailNotify someuser@somedomain.com
  DOSSystemCommand "/dir/command  %s"
</IfModule>


Then you can restart

  • /etc/init.d/apache2 restart

Be carefull because the options are extremly important. For example if your web application use one file as a controller all the requests will go to this file you will got very often such errors:

client denied by server configuration

Here is a short help on the configuration options

- DOSHashTableSize: is the size of the table of URL and IP combined
- DOSPageCount: is the number of same page requests from the same IP during an interval that will cause that IP to be added to the block list.
- DOSSiteCount: is the number of pages requested of a site by the same IP during an interval which will cause the IP to be added to the block list.
- DOSPageInterval: is the interval that the hash table for IPs and URLs is erased (in seconds)
- DOSSiteInterval: is the intervale that the hash table of IPs is erased (in seconds)
- DOSBlockingPeriod: is the time the IP is blacked (in seconds)
- DOSEmailNotify: can be used to notify by sending an email everytime an IP is blocked
- DOSSystemCommand: is the command used to execute a command when an IP is blocked. It can be used to add a block the user from a firewall or router.
- DOSWhiteList: can be used to whitelist IPs such as 127.0.0.1

© 2026 Ivo Bardarov

Theme by Anders NorénUp ↑