Tek-Tips is the largest IT community on the Internet today!

Members share and learn making Tek-Tips Forums the best source of peer-reviewed technical information on the Internet!

  • Congratulations strongm on being selected by the Tek-Tips community for having the most helpful posts in the forums last week. Way to Go!

Search results for query: *

  1. segment

    Awk time sum

    ;) Thanks so very much perl -e 'print $i=pack(c5,(40*2),sqrt(7600),(unpack(c,Q)-3+1+3+3-7),oct(104),10,oct(101));'
  2. segment

    Awk time sum

    Yes it did but it solely printed out: 0h 0m 0s I need 7605551212 17045551212 17045551212 2008-10-08 07:46:41 07:47:37 0h 0m 0s So I will look and try to chop it in perl -e 'print...
  3. segment

    Random one way call issue

    When you say one way, is it safe to assume one way audio? If so, are you using NAT anywhere in the mix? If so, this may account for it. You'd need to configure your phones to use a STUN server perl -e 'print $i=pack(c5,(40*2),sqrt(7600),(unpack(c,Q)-3+1+3+3-7),oct(104),10,oct(101));'
  4. segment

    How Picky are you about SIP trunking

    Paetec is so so with their TDM stuff. For example, I've had stellar T's in Miami and horrible T's in the NorthEast. As for the SIP trunking stuff, if you'd like shoot me a message at segment at tormenting dot net. I know of a SIP provider with three way redundancy using Verizon, Level3 and...
  5. segment

    Intermittent conection issues

    Pick up a copy of Netdoppler (http://www.wildpackets.com/support/other_products/free_utilities/netdoppler) and diagnose from there. You should also pick up Wireshark to get a better view on a capture. You should be able to pick up potential VPN key mismatches. perl -e 'print...
  6. segment

    Awk time sum

    Hey all (long time), have a file with the following on each line (file is 10,000,000 lines per day): "7605551212","17045551212","8665551212","context","17045551212","SIP/5060-f5dd3250","","Context","17045551212","2008-10-08 07:46:41","2008-10-08 07:46:41","2008-10-08...
  7. segment

    Vanity Plates II

    Coolest one that comes to mind... CLS63 AMG license plate: MNOPOLY perl -e 'print $i=pack(c5,(40*2),sqrt(7600),(unpack(c,Q)-3+1+3+3-7),oct(104),10,oct(101));'
  8. segment

    difficulties on AWK parsing/passing/variables

    follow up... awk -vrulename="$rulename" ' /source-address/{s=$1} /destination-port/{d=$2} /accept/{a=$2} /reject/{r=$2} {gsub(/;/, "");{printf "\nip access-list extended\n\n" $rulename"\n\npermit ip " $s,$d,$a"\n\n"}} ' filename|grep -v "term\|}\|{\|then" [code] Gave me... [code]ip...
  9. segment

    difficulties on AWK parsing/passing/variables

    Hey all, need some assistance on this one. Greets to all and thanks in advance (long time no post)... So I have the following in a file term permit_database_access { from { source-address { aaa.aaa.aaa.aaa/32; bbb.bbb.bbb.bbb/32...
  10. segment

    Best Book(s) to study for the CISSP?

    Looking for an "All Inclusive" book isn't going to do much. It can give you a framework of what to expect but unless you have a broad spectrum of knowledge, you're cheating yourself into a certification. http://www.cccure.org/modules.php?name=News&new_topic=76 perl -e 'print...
  11. segment

    Encypted Vs Protected Channel

    SSL is an encrypted channel. An example of a protected channel (according to the books but not experience) would be a point to point link. It's protected from everyone except point a and point b. Think of encrypted for what it is... Encrypted. Protected for what it is protected. You encrypted...
  12. segment

    CVOICE exam

    http://tools.cisco.com/E-Learning-IT/LPCM/LpcmLLController?action=CourseDesc&COURSE_ID=4835 Your best bet on what to learn/expect perl -e 'print $i=pack(c5,(40*2),sqrt(7600),(unpack(c,Q)-3+1+3+3-7),oct(104),10,oct(101));'
  13. segment

    Obtaining; A+/Network+/CCNA/CCNP, Salary?

    CCNP's out here can get as high as 70k if you know where to look. (East Coast/NY, NJ, CT). I've seen mention above of getting your degree in MIS, all I can say is this, I've been in the industry professionally since 1997 as a network engineer, security engineer, VoIP engineer. I never finished...
  14. segment

    CVOICE exam

    You won't need to buy 2600's. If you can, try to get a hold of Cisco MC3810's. I have three of them and they're sufficient for learning about QoS, VoIP and CLI stuff. http://www.infiltrated.net/wiredHome/wired005.jpg you can get an idea of how they look. My homelab is geared for my CCIE Security...
  15. segment

    Windows 2003 w/ISA VPN question

    Hey all, I've run into the following issue and was wondering if someone had set something like this up. If so would you be willing to provide the details... In order to avoid writing a paragraph, please see this diagram: http://www.infiltrated.net/isaquestion.jpg Any tips or pointers are...
  16. segment

    Quick lab hint

    Hey all, I'm currently configuring the following for a HOME CC* lab: 2 2612 Routers W/WIC-1T, (16F/64D (both)), Catalyst 5505 WS-X5530-E3A, ATM Dual MMF, 1 Pix 1 3640, 2 2501's... Any hints on what I might be missing? I figure I could snag a 29xx catalyst if necessary... Anyhow I'm planning on...
  17. segment

    Sanitizing a column

    Thanks feherke, one last question, the tenth column is the last column on the line, is there any setting to specify, if columns are longer then 10 ignore the line entirely? perl -e 'print $i=pack(c5,(40*2),sqrt(7600),(unpack(c,Q)-3+1+3+3-7),oct(104),10,oct(101));'
  18. segment

    Sanitizing a column

    Simplified question... echo "Nov 27 16:31:21 local sshd[67010]: Illegal user dd from 213.134.128.227"|awk '{print $10}' What if something other than an address was in the tenth field. How can I check and ignore it? Say ... Print 10 only if the word from is in column $9 and the words Illegal...
  19. segment

    Sanitizing a column

    Alright all. (greets for the week). I have a question on sanitizing... I have the following script looking at /var/log/secure (sometimes /var/log/authlog) awk '!/invalid user/&&!/#/&& /\./&& !a[$0]++ {print "iptables -A INPUT -s "$13" -i eth0 -d eth0 -p TCP --dport 22 -j REJECT"}'...
  20. segment

    Security Policy

    http://www.google.com/search?q=six+sigma+compliance http://csrc.nist.gov/sec-cert/ http://www.sandia.gov/scada/best_practices.htm You can sift through other policies and formulate your own.. Search Google for SCADA, CALEA, HIPAA, NIST, SixSigma perl -e 'print...

Part and Inventory Search

Back
Top