4GuysFromRolla.com - WebWeekly: Sorting Arrays
Javascript function for sorting arrays via Quicksort. Also, I found this page, which implemented it with arbitrary comparison functions, which is nice.
Eventually, I'll read this. :)
Unattended, A Windows deployment system
Unattended is a system for fully automating the installation of Windows 2000 and XP workstations
Morpheus Software - Gamer's Internet Tunnel
Pretty neat little thingy. Tunnels broadcast packets over IP.
The History of Source Mage GNU/Linux
Sorcerer linux's successor. Perhaps I will install this on the next machine I put together. I /did/ just get a NIC from Amazon....
At last, I have figured out how to get externally-mapped-in-a-1-to-1-NAT-fashion IP address to work from the inside.
So, let's say that you have 4 external IP addresses (as I do), and you have already done 1-to-1 NAT for 3 of them, enabling you to basically treat 3 of your internal machines as if they were directly on the Internet. But the problem is, from the inside (say, from machine A to machine B), you can't use the external IP addresses, because the packets go to your linuxbox-router and die there.
Well, it'd been on the tip of my tongue for a long time now, but I finally was able to verbalize the iptables rules needed to get the linuxbox to SNAT and DNAT the packets as appropriate. Here's my ruleset for this purpose:
###############################################################################
###############################################################################
# One-to-One Mapping (Inbound from inside)# If it is going out the internal interface, and is coming from an internal IP
# then change it to look like it's coming from the appropriate external IP
##========================================================================##
$IPTABLES -t nat -A POSTROUTING -o $INTERNAL -s $JWIZ -j SNAT --to $EXT_IP_JWIZ
$IPTABLES -t nat -A POSTROUTING -o $INTERNAL -s $SPELLBOUND -j SNAT --to $EXT_IP_SPELLBOUND
$IPTABLES -t nat -A POSTROUTING -o $INTERNAL -s $ZIPPY -j SNAT --to $EXT_IP_BONUS# Do the same thing for non 1-to-1 mapped IPs
# e.g. if they were pinging $EXT_IP_JWIZ from inside, this will make it work
##========================================================================##
$IPTABLES -t nat -A POSTROUTING -o $INTERNAL -s $INTERNAL_NET -j SNAT --to $EXT_IP# If it came in on the internal interface, and is going to an external IP
# then change it to go to an internal IP, just as you do for packets that
# came in on the external interface
##========================================================================##$IPTABLES -t nat -A PREROUTING -i $INTERNAL -d $EXT_IP_JWIZ -j DNAT --to $JWIZ
$IPTABLES -t nat -A PREROUTING -i $INTERNAL -d $EXT_IP_SPELLBOUND -j DNAT --to $SPELLBOUND
$IPTABLES -t nat -A PREROUTING -i $INTERNAL -d $EXT_IP_BONUS -j DNAT --to $ZIPPY
##========================================================================#################################################################################
###############################################################################
This could be neat. I guess I need a NIC that will PXE boot. I might actually have one, and just not realize it, i suppose. Perhaps my EtherExpressPro100....
I love the domain name. Anyway, this "tool" lets you snarf all SSL traffic, undetectably (well, if they are using IE, which they prolly are). I can't believe MS is so complacent about this shit.