Author: mark_user

  • Tracking Communications with Netstat & TCPView

    Tracking Communications with Netstat & TCPView

    Netstat on the Command Line

    Netstat is a built in utility typically used to troubleshoot remote connection issues. It is also be used to see what external IPs and URLs your computer is actively communicating with and to what ports are passively open waiting for a connection. To run netstat, launch the Command Prompt in administrator mode.

    It is important to remember that running the command is a one and done. It does not auto refresh unless you tell it to using a switch. To get a list of switches, run “netstat /?“. The most important for netstat switches are:

    -a = Display all connections and listening ports
    -b = Display the executable involved.
    -f = Display FQDN.
    -n = Display IP and ports in number format.
    -o = Display process ID associated with the connection.
    -r = Display routing table.

    Let’s go over some commands. First, ‘netstat -ab’ is unusually slow to provide results and the results are not in a easy to read format. For this reason many users do not like it. But it will provide the process name that opened or established the connection.

    Next is ‘netstat -ano’. It provides very fast results, but does not provide the name of the running service. However, you can get the process ID’s and then lookup the running process in task manager to find the service or executable. Finally, you can lookup up the foreign addresses in an online URL lookup to find the ‘whois’ or the IP registration.

    Display the TCP active connections with the FQDN.

    You can pipe the results from netstat to include only specific outputs.

    You can pipe to exclude results by using the /V switch.

    Using TCPView

    Think of TCPView (or the older CURRPorts) as a netstat GUI interface. TCPView is produced by Microsoft System Internals and is actively supported. It is easier to read then the command line, auto refreshed every 2 seconds, and provides both fast results as well as the process name.

    You can quickly track down what service is attempting to make an external connection, what remote IP or URL it is communicating with, and over what port. The results can be combined with some google searches to get a complete picture. I find it easier than trying to interpret the netstat command line results.

    The color scheme is tricky. Red means a connection is about to close, green means a connection was just opened, and yellow means a connection has just refreshed. Notice the green bar in the picture below.

  • Thanksgiving Cranberries

    Thanksgiving Cranberries

    Ingredients

    1 cup sugar
    1 cup water
    4 cups fresh cranberry (12 oz package)
    Optional: pecans, orange zest, raisins, currants, blueberries, cinnamon, nutmeg, allspice

    Place cranberries in colander and rise them. Pick out and discard any damages cranberries. Put the water and sugar in a medium saucepan on high heat and bring to boil. Stir to dissolve the sugar. Add cranberries to the pot and return to boil. Lower the heat and simmer for 10 minutes or until most of the cranberries have burst.

  • Practical Communication Tips for Men

    Effective Speaking for Men in Relationships

    If a woman is speaking in a calm manner, and detailing some minor issue, they are not looking for you to “solve” their problem. They do not want logic based advice or tips on “how to fix” the issue. They just want: reassurance that they are not wrong; confirmation they are not a bad person; and reinforcement that (gosh darn it) people like them. A women craves constant affirmation.

    Your only job is to remain calm, listen, and provide them with positive feedback. Here are some comments I use on a regular basis to provide my wife with assurance.

    • You deserve better …
    • I can not believe they treated you that way …
    • What you are asking is not unreasonable …
    • You are so brave …

    These comments are particularly well suited for conversations that I am not paying attention too. But, they can also be dropped into any conversation.

    If a women is yelling, deflecting responsibility, talking in circles, or explaining in mind numbing details, then it is a more serious matter. Under these terms, what a women wants is for the man to assume full responsibility for the situation and fix the problem. However, she still wants to retain the right to veto any potential actions. She reserves this right in case the solution makes her look bad. In other words, you have to fix the issue, while pretending you are not actually fixing the issue (and also, maybe giving her the credit).

    You can make comments, along the lines of:

    • Don’t worry WE will figure this out together …
    • WE will ask [ third party ], if they have an answer …
    • WE will solve this tomorrow …

    I hope this article provides readers with a keen insight into how to effectively communicate with a woman. By listening, providing positive affirmation, and taking over responsibility when necessary (to bail her out of what ever situation she got herself in). You will have a long and happy relationship.

    Cheers!

  • TCP/IP Stack Using the OSI Model

    TCP/IP Stack Using the OSI Model

    The OSI model of the TCP/IP stack has become the standard model for understanding how a packet flows into or out of a system. Here is my understanding.

    7. Application Layer – User can interact. (GUI).

    6. Presentation Layer – Encryption (SSL, SSH, IMAP, etc).

    5. Sessions Layer – Manages sessions – (API’s, sockets).

    4. Transport Layer – Assemble bits into packets. End to end. (TCP, UDP).

    3. Network Layer – Transfers the data packets. (IP, ICMP).

    2. Data Link Layer – Addressing & Physical Transmission. (Ethernet, switch, Bridge).

    1. Physical Layer – Wires, hubs.

  • Private IP Address Ranges

    Private IP Address Ranges

    Introduction

    Private IP address ranges , sometimes called reserve ranges, are for internal devices only. This is the list along with a few other special ranges that are common and should be known.

    Class A

    10.0.0.0 – 10.255.255.255.255
    8 network bits and 24 hots bits
    subnet mask = 255.0.0.0

    Class B

    172.16.0.0 – 172.31.255.255
    16 network bits and 16 host bits
    subnet mask = 255.255.0.0

    Class C

    192.168.0.0 – 192.168.255.255
    24 network bits and 8 host bits
    subnet mask = 255.255.255.0

    Class D (Multicasting)

    224.0.0.0 – 239.255.255.255 (Reserved for TV networks)

    LoopBack

    127.0.0.1 – 127.255.255.255
    Used for network testing. Specifically, it tests a computer’s TCP/IP network software driver to ensure it is working properly.

    APIPA (Automatic IP Addressing)

    169.254.0.1 – 169.254.255.25

  • Updating the Linux OS & Installed Software

    Updating the Linux OS & Installed Software

    Introduction

    The apt (aptitude) command is just a a shortened version of the apt-get command. They are synonymous terms. Use the ‘apt’ command to update and manage your installed software packages. Use with Ubuntu or Debian Linux servers.

    Update and upgrade your system

    # apt update (date your local repository list)
    # apt upgrade (update all installed packages)
    # apt autoremove (remove packages that were installed as dependencies)
    # apt autoclean (clean the /var/cache/apt/archive folder).

    List all installed packages

    apt list --installed

    Get a list of all packages that can be upgraded

    Remove packages with out uninstalling config files

    Remove packages including config Files

    Repository location

    sudo ls /etc/apt/sources.list.d

    References

    https://askubuntu.com/questions/668582/false-disk-full-error-apt-get-unable-to-install-or-remove