NOKIA IP40 Upgrade process with FTP Server
For the Upgrade we need a FTP Server available from the IP40 device. In the exemple below the upgrade process was managed from a remote location through ssh session. 192.254.254.254 are the FTP server public IP address.NokiaIP40:1> upgrade image url ftp://192.254.254.254/IP40v2001-FCS06a88.binConnected to 192.254.254.254.
220 Fastream NETFile FTP Server Ready
Name (192.254.254.254:root): anonymous
331 Password required for anonymous.
Password:
230 User Anonymous logged in.
bi
200 Type set to I.
get IP40v2001-FCS06a88.bin /var/tmp/ip40.bin
local: /var/tmp/ip40.bin remote: IP40v2001-FCS06a88.bin
200 Port command successful.
150 Opening data connection for IP40v2001-FCS06a88.bin.
226 File sent ok
12598272 bytes received in 200 secs (62 Kbytes/sec)
bye
221 Goodbye.
Writing to flash.. Please wait..
Done.
Upgrade Successful
Rebooting the device...
Sort IP Address with PERL
@out = sort {
pack('C4' => $a =~
/(\d+)\.(\d+)\.(\d+)\.(\d+)/)
cmp
pack('C4' => $b =~
/(\d+)\.(\d+)\.(\d+)\.(\d+)/)
} @in;http://www.sysarch.com/Perl/sort_paper.html
AM or PM
“AM” stands for the Latin phrase Ante Meridiem —which means “before noon”—and “PM” stands for Post Meridiem : “after noon.” Although digital clocks routinely label noon “12:00 PM” you should avoid this expression not only because it is incorrect, but because many people will imagine you are talking about midnight instead. The same goes for “12:00 AM.” Just say or write “noon” or “midnight” when you mean those precise times.
W32/WMF-exploit
It indicates a possible exploit of a vulnerability in Microsoft Windows, which could be exploited by remote attackers to execute arbitrary commands. This flaw is due to an error in the rendering of Windows Metafile (WMF) image formats, which could be exploited by attackers to remotely take complete control of an affected system by convincing a user to open a malicious WMF file using a vulnerable application. OS concerned Microsoft Windows XP Service Pack 2 and earlier versions. Microsoft Windows Server 2003 Service Pack 1 and earlier versions.Note that even if the file extension is renamed from .WMF to any of the following, the exploit could still execute -
.bmp.dib.rle.jpg.jpeg.jpe.jfif.gif.emf.wmf.tif.tiff.png.icoSee details on Microsoft Security Bulletin MS06-001.
Object Filler 2.2 just released
http://ofiller.chatscope.com/Contains both Object Filler and Object Dumper
Object Filler is a tool designed to for helping administrators of Check Point Software solutions, in the task of managing their SmartCenters. Imports objects from given file formats and from configuration files of other firewall brands
Object Dumper does the opposite of Object Filler. Given information from a current Check Point SmartCenter , it dumps the configuration of objects and rules to a CSV file