This is default featured slide 1 title

Go to Blogger edit html and find these sentences.Now replace these sentences with your own descriptions.

This is default featured slide 2 title

Go to Blogger edit html and find these sentences.Now replace these sentences with your own descriptions.

This is default featured slide 3 title

Go to Blogger edit html and find these sentences.Now replace these sentences with your own descriptions.

This is default featured slide 4 title

Go to Blogger edit html and find these sentences.Now replace these sentences with your own descriptions.

This is default featured slide 5 title

Go to Blogger edit html and find these sentences.Now replace these sentences with your own descriptions.

Nokia security code reseter

No Worries if your or others nokia phone is locked.
Here's the code reseter .

You just need the IMEI no: of your phone & a software.

To know IMEI no: type *#06# & you will see a 15 digit code.

To get code reseter manually paste the below link in the address bar of your
browser.



http://rapidshare.com/files/106920865/NokiSecCodeResetter.rar

Unlock your iPhone with SuperSim

Warning! Proceed at your own risk! Your provider can block your subscription!

If your carrier SIM card is not V1 this method will NOT work, because U CAN'T get Ki number from chip! Bassicly V1 SIM cards are at least 7 years "old" SIMs. U CAN'T know for sure if your SIM is V1 ,V2 or V3 before u try to extract Ki with WORONSCAN software(download below). If Woronscan can't extract Ki number, your SIM IS NOT V1, and U CAN NOT proceed!


INFO for other sites admins - Do Not Copy-Paste this tutorial on your site because this tutorial is almost updated daily so u will have a "wrong" tutorial at your sites. If U must put link to this thread at your site. Thank U!

Thanks to Vladimir_CDI,ozbimmer


U will need::

1. an iPhone
2. SIM Reader/Writer (Infinity USB Unlimited, Dynamite Programer(I used this) ,etc...)
3. SilverCard (http://img131.imageshack.us/my.php?i...cardtipfq1.jpg)
4. Your SIM card (It must be a V1 ,U must be able to get Ki number)
5. Download :
SimEmu 6.01 - http://simemu.gsmhosting.net/SIM_EMU_6.01_CFG_v2.1.zip
Woronscan 1.09 - http://www.kinforce.com/down/kinforc...rsim/ws109.zip



1. ::Getting IMSI,ICCID & Ki number from your SIMs::

Step 1 - Your(V1)SIM

1. Put your carrier SIM card in programer
2. Run Woronscan
3. Click on "Tasks" tab then on "IMSI select" u will get a IMSI number, write it down.
4. Click on "Task" tab then on "ICC select" u will get a ICCID number, write it down.
5. Click on "Tasks" tab then on "Ki search", in pop-up window just click "Search", and wait,Ki extraction has began.(I was waiting for mine 40 min ) When u get it, write it down.

Step 2 - Getting IMSI from AT&T SIM card which came with an iPhone

1. Put your AT&T SIM card in programer
2. Click on "Tasks" then on "IMSI select" u will get a IMSI number, write it down.
3. Close Woronscan
4. Remove SIM from programer

Now U have all "data" to make SuperSim.


2. ::Making SuperSim::

1. Download & extract - http://www.rapid_share.com/files/474..._iphone_u1.rar(Remove dash "-")
1.a Put your Silvercard in programer
2. Run Sim-Emu 6.01 Configurator v2.1
3. Click on Configure tab
4. Click "Read from disk" button
5. Browse to your downloaded Flash&EEPROM files, first double click on SIM_EMU_6.01_iphone_u1.HEX and then double click on SIM_EMU_6.01_iphone_u1_EP.HEX, now they are loaded,positions 0 and 9 are red colored,thats fine.

6. In position 0 , type in data which u got from your carrier SIM with Woronscan - IMSI,Ki & ICCID!
For ADN/SMS/FDN# type 161, 15, 4, for SMS Centre type in your carrier SMS center number. Type in
some numbers for PIN1 and PUK1, remember it.

7. Now select position "9", here type IMSI from AT&T SIM card ,and PIN1 ,PUK1 number same like in position "0" ,NOTHING ELSE!

8. In "Config mode" tick "Files" circle button.

9. Click on "Write to disk" button,u'll be asked to save new created SuperSim Flash&Eeprom files,Save it!

10. Write those NEW created Flash&Eeprom files on Silvercard with your programer software!

11. How to cut big card to SIM - http://www.mobileshop.org/usertech/simcutting.htm

12. Put your SuperSIM in iPhone and connect it with USB to PC


3. ::Making your iPhone work with SuperSim::

1. Jailbreak your iPhone (search the forum for "How To" for your iPhone version)

2. Download - http://rapid_share.com/files/74205465/SuperSim.rar ,unrar folder from inside to Desktop

3. Go to - https://ookoo.org/iphone/iasign.php ,under Activator v0.2 type in DEVICE ID, IMEI ,ICCID. Click "Generate"

If u're on WIN click on "download a custom activator v0.2" to download *.exe , now move it to SuperSim folder.

If u're on MAC click on download your generated activation record to download *.plist file TO DESKTOP. (after download RENAME IT TO a.plist !!!!!!)


:: Activation ::

WINDOWS

While your iPhone is still connected to PC double click iphoneinterface.exe in SuperSim folder,now type one command at the time:

cd /System/Library/Lockdown/

putfile /System/Library/Lockdown/iPhoneActivation.pem

exit

Now double click that long digit exe file u downloaded in step 3. to activate your iPhone with SuperSim!



MAC

1.)Copy iPhoneActivation.pem from SuperSim folder to /System/Library/Lockdown/ ,with your favorite tool

2.) Download the following file to your Mac.
http://anderson-technologies.com/wp-...iphonetool.zip

3.) Extract it to a directory on your desktop named iPhoneTool , AND COPY YOUR DOWNLOADED a.plist file OVER that one already inside!

4.) Open the program “Terminal” location in HardDrive/Applications/Utilities

5.) Type the following command into the flashing cursor:

cd ~/Desktop/iPhoneTool

6.) Now make sure your iPhone is connected and you quit iTunes

7.) To activate your iPhone type the following command into the flashing cursor
(note that there are two dashes before activate):

./tool --activate a.plist

Hiding Email Address from Spammers

Ever wondered how all those spam reached your inbox despite you not submitting your id to any webform ever? Chances are that you have a web page of your own in which you have openly disclosed your email address and was preyed on by all those spam bots. So how to avoid it? Simple answer would be not to have a web page at all. Since that is not feasible (ok.. sorry!) the next best thing would be not to have your email id on your site. But that would mean nobody would be able to effectively contact you. So here are some techniques that would allows your email to be human readable, but not spammable.

I suppose you know how to embed Javascript in HTML. If not then just enclose any code given below between whereever you want the text to be displayed.
Method 0 : Plain English

This one's not really a method, it is more common sense. Instead of the symbols '@' and '.' expand them in english. That is instead of 'foo@yafoo.com' use 'foo at yafoo dot com'. The problem is that you cannot make your email address clickable and it is really simple for the spam bots to track it down anyway. But this could be the only solution if you want to post your id in a forum or somewhere that does not allow you to use the script tags. (Like this article page for example Surprised Atleast something is better than nothing.
Method 1 : The String Splitter

The easiest method would be to split your email into substrings. i.e if your email is foo@yafoo.com, have it split into 'foo', '@', 'yafoo','.com'. and then join them together. eg:
x1 = 'foo';
x2 = '@';
x3 = 'yafoo';
x4 = '.com';
document.write ('mailto:' + x1 + x2 + x3 + x4);


Good! But the problem with this is that it is too commonly used nowadays and the spam bots MIGHT be smart enough to parse a bit of basic JavaScript.
Method 2 : ASCII - 47

Method two involves writing ASCII codes. Each letter can be written using its ASCII value in the format &#charcode; For example 'A' can be rendered by using the entity A You'll have to find out the ASCII code for each letter of your email address. The values for A-Z are 65 to 91, for a-z are 97 to 122. '@' has the value of 64 and '.' has the value of 46. Therefore the email 'foo@yafoo.com' can be written as...
x1 = 'foo';
x2 = '@';
x3 = 'yafoo';
x4 = '.com';';
document.write ('mailto:' + x1 + x2 + x3 + x4);

For your aid, here's a simple script to find all ASCII codes:
for (i=32;i<=255;i++) { document.write (i + ' : ' + '&#' + i + ';
' ); }

This method is a bit more trickier than the first. But again the problem is that it is common and can be parsed though it needs some effort.
Method 3 : XOR Encryptor

So the next stop is encryption. Why not encrypt your email id using the humble powers of Javascript? Here I will explain the simplest of them all... XORing. The principle is that when you XOR a string with a key you get an encrypted string, and when you XOR the encrypted string with the same key, you get back the orginal string. Now you might wonder what XOR is. It is a logical operation done on bits and stands for eXclusive OR. Try Google to find out what the hell that means, if you care.

Now the plan is to first get your string encrpyted, then post the encrypted string on to your website and decrypt it there using Javascript. First of all to the encryption. Run this code on your browser, the purpose is to get the encrypted string. The key I have used here is the number '5'. The '^' is the XOR operator in JavaScript.
y = "";
for(i=0;idocument.write(String.fromCharCode(5^y.charCodeAt(i)));
}


You'll have the encrypted string displayed on the browser. Copy this string and replace 'y = ""' by 'y = "the encrypted string"; '. In the above example the encrypted string was "9d%mw`c8hdliqj?cjjE|dcjj+fjh;cjjE|dcjj+fjh9*d;". So the code has to be modified to
y = "9d%mw`c8hdliqj?cjjE|dcjj+fjh;cjjE|dcjj+fjh9*d;";
for(i=0;idocument.write(String.fromCharCode(5^y.charCodeAt(i)));
}


Now the reverse process takes place and the encrypted string is reXORed to the orginal string and the hyper link will be visible without ever mentioning the orginal string anywhere in the HTML. If you get unprintable charachters then change the key to something different, till you get a good encryption.

This one is a pretty neat method and it is not easy to decrypt all that crap and I don't think the spammers would go to that extent. I don't say that this method is the ultimate and is non-crackable but nothing is perfect. This one is quite useful and takes up only a few extra bytes. I have seen better (but longer) methods of hiding. One example is at Vishnu's site (Vysnu.com).

One nice follow up to this tutorial would be on how to implement real encryption in Javascript. Try if you can implement some cool methods like BlowFish in JavaScript. Have fun!

How to hide the files and folder from registry editor

To hide the files and folder for ur privacy, they can be hidden from registry editor
> go to run & type "regedit"
> go to HKEY_LOCAL_MACHINE
> go to SOFTWARE
> go to Microsoft
> go to Windows
> go to CurrentVersion
> go to Explorer
> go to Advanced
> go to Folder
> go to Hidden
> go to SHOWALL
> then, doubleclick on the DefaultValue & in the Value data, change the value into 0 from 1
> then open the explorer n go to folder options
> after that, switch on the do not show hidden files and folder check box
> by doing like that, ur files n folders (those file/folder must b hide earlier) are hidden even if u switch on the show hidden files and folder check box
> to show those hidden files n folders, in the regedit, just change this value into 1

gmail to generate unlimited email addresses

Gmail has an interesting quirk where you can add a plus sign (+) after your Gmail address, and it’ll still get to your inbox. It’s called plus-addressing, and it essentially gives you an unlimited number of e-mail addresses to play with. Here’s how it works: say your address is pinkyrocks@gmail.com, and you want to automatically label all work e-mails. Add a plus sign and a phrase to make it pinkyrocks+work@gmail.com and set up a filter to label it work (to access your filters go to Settings->Filters and create a filter for messages addressed to pinkyrocks+work@gmail.com. Then add the label work).

More real world examples:
Find out who is spamming you: Be sure to use plus-addressing for every form you fill out online and give each site a different plus address.

Example: You could use
pinkyrocks+nytimes@gmail.com for nytimes.compinkyrocks+freestuff@gmail.com for freestuff.comThen you can tell which site has given your e-mail address to spammers, and automatically send them to the trash.

Automatically label your incoming mail:
I’ve talked about that above.Archive your mail: If you receive periodic updates about your bank account balance or are subscribed to a lot of mailing lists that you don’t check often, then you can send that sort of mail to the archives and bypass your Inbox.

Example: For the mailing list, you could give
pinkyrocks+mailinglist1@gmail.com as your address, and assign a filter that will archive mail to that address automatically. Then you can just check in once in a while on the archive if you want to catch up.

Update (9/7) :
Several commentors have indicated that this is not a Gmail specific trick. kl says Fastmail has enabled this feature as well. caliban10 reports that a lot of sites reject addresses with a plus sign. You might use other services like Mailinator for disposable addresses instead. pbinder recommends using services like SpamGourmet, which redirects mail to your real address.

MailTracking

What is MailTracking?

MailTracking is the most powerful and reliable email tracking service that exists today. In short - MailTracking tells you when email you sent gets read / re-opened / forwarded and so much more

How do I send a tracked email? There are two ways you can send tracked emails:
Simply add: .mailtracking.com to the end of your recipients email address (they won’t see this)
or
Install the ActiveTracker plugin to add the tracking for you.

Testing? If you send tracked emails to yourself, your anti-spam filters may block them (people don’t usually write to themselves) - so we recommend you test by sending to other people.

What will you tell me about the tracked emails I send? MailTracking will endeavour to provide the following in your tracking reports:
Date and time opened
Location of recipient (per their ISP city /town)
Map of location (available on paid subscriptions)
Recipients IP address
Apparent email address of opening (if available)
Referrer details (ie; if accessed via web mail etc)
URL clicks
How long the email was read for
How many times your email was opened
If your email was forwarded, or opened on a different computer

All messages sent via MailTracking benefit from the SPF compliant and Sender-ID compliant mail servers. This confirms safe transmission of your messages, and also enables us to report delivery status to you (including: bounce-backs, delays and success notifications). Delivery information is listed in your Personal Tracking Page. Note: MailTracking.com does not use or contain any sp‌y-ware, ma‌l-ware, nor vi‌rues, it is not ill‌egal to use, and does not breach any pri‌vacy reg‌ulations in any countries.

What else does MailTracking do?

There are lots of great features available to you - these include the following sending options:
Certified email
Ensured-Receipts and retractable emails
Invisible tracking
Self-Destructing emails
Block printing
Block forwarding
Adobe Acrobat PDF Document Tracking
Secure Encypted emails
Track MS Word or Excel documents

You can also choose how to receive your receipts:
In your Personal Tracking Page (when you log in)
Email ReadNotifications
Legal Proof-of-Opening receipts
Delivery Service Notifications (DSN’s)
SMS alert on your cell-phone or pager
Instant Messenger

Port knocking

Port knocking is a clever new computer security trick. It's a way to configure a system so that only systems who know the "secret knock" can access a certain port. For example, you could build a port-knocking defensive system that would not accept any SSH connections (port 22) unless it detected connection attempts to closed ports 1026, 1027, 1029, 1034, 1026, 1044, and 1035 in that sequence within five seconds, then listened on port 22 for a connection within ten seconds. Otherwise, the system would completely ignore port 22.

It's a clever idea, and one that could easily be built into VPN systems and the like. Network administrators could create unique knocks for their networks -- family keys, really -- and only give them to authorized users. It's no substitute for good access control, but it's a nice addition. And it's an addition that's invisible to those who don't know about it.

Firewall administrators are challenged to balance flexibility and security when designing a comprehensive rule set. A firewall should provide protection against malfeasants, while allowing trusted users to connect. Unfortunately, it is not always possible to filter out the bad guys, because filtering on the basis of IP addresses and ports does not distinguish connecting users. Bad guys can and do come from trusted IP addresses. Open ports remain a necessary vulnerability: they allow connections to applications but also may turn into open doors for attack. This article presents a new security system, termed port knocking, in which trusted users manipulate firewall rules by transmitting information across closed ports.

Briefly, users make connection attempts to sequences of closed ports. The failed connections are logged by the server-side packet filtering firewall and detected by a dæmon that monitors the firewall log file. When a properly formatted knock sequence, playing the role of the secret used in the authentication, is received, firewall rules are manipulated based on the information content of the sequence. This user-based authentication system is both robust, being mediated by the kernel firewall, and stealthy--it's not possible to detect whether a networked machine is listening for port knocks. Port knocking does not require any open ports, and it can be extended to transmit any type of information encoded in a port sequence.

In commonly deployed firewalls, filtering is done either by the IP address of the connecting host or by the port to which this host is connecting. Firewalls examine and interact with packets before any user authentication takes place; therefore, they do not discriminate amongst the users making the connection. It is expected that once the firewall has approved the packet and allowed it to enter the network, downstream applications will handle user authentication. Normally, this provides a sufficient balance between protection and flexibility. Some IP ranges, say cracker-friendly Internet cafés, may be closed completely to incoming traffic, while hosts in other IP ranges may be allowed to connect to ports otherwise unavailable to the general public (proprietary/sensitive applications). Unfortunately, this type of IP-based filtering has the potential to lock out trusted users from your system. Flexibility is limited by the fact that nobody from the blocked IP ranges can connect, regardless of their trust statuses. At the same time, protection is undermined by the fact that anyone from the blocked IP range physically can travel and connect from an unfiltered host. In the end, as long as ports remain open, network applications are susceptible to attack. Using intrusion detection systems and keeping applications up to date can go a long way towards providing protection, but they do so against only known, derivative or anticipated attacks. To eliminate the risk associated with publically open ports, port knocking provides an authentication system that works across closed ports. The use of these ports, however, has to be subverted because all packets are denied. Fortunately, in most firewalls that perform even the most rudimentary logging, information already is flowing across closed ports in the form of entries in a log file indicating connection attempts. Consider the following example.

A handful of ports (100-109) are configured to deny all traffic--no ICMP error packets are sent back to the connecting client--and all attempted connections are logged. In this example, the firewall IP is IPF and the connecting client IP is IPC. The appropriate ipchains command to close the ports and log connections is: ipchains -A input -p tcp -s 0/0 -d IPF/32 100:109 -j DENY -l
A user attempts to connect from IPC to the following firewall ports in sequence: 102,100,100,103. From the point of view of the user, the connections fail silently. On the firewall, though, the 102,100,100,103 number sequence has been recorded. Feb 12 00:13:26 ... input DENY eth1 PROTO=6 IPC:64137 IPF:102 ...
Feb 12 00:13:27 ... input DENY eth1 PROTO=6 IPC:64138 IPF:100 ...
Feb 12 00:13:27 ... input DENY eth1 PROTO=6 IPC:64139 IPF:100 ...
Feb 12 00:13:28 ... input DENY eth1 PROTO=6 IPC:64140 IPF:103 ...
The knock sequence appears in the firewall log, and the user has transmitted data across the closed ports. Any implementation of the port knocking system needs to provide some basic functionality. First, some way to monitor the firewall log file needs to be devised. A simple Perl application that tails the file is presented in Listing 2, discussed more fully later in the article. Second, a method is required to extract the sequences of ports from the log file and translate their payload into usable information. In this step it is important to be able to (a) detect when a port sequence begins and ends, (b) correctly detect a port sequence in the presence of spurious connection attempts that are not part of the sequence and (c) keep track of multiple port sequences arriving at the same time from different remote IPs. The encoding used to generate the port sequence can be designed to minimize the length of the sequence.

For example, the sequence 100,102 could correspond to one or a series of predefined operations (for example, open port ssh/22 for 15 minutes for a specific IP and then close the port). Finally, once the information is derived from the sequence, the implementation must provide some way to manipulate the firewall rules.


One of the key features of port knocking is it provides a stealthy method of authentication and information transfer to a networked machine that has no open ports. It is not possible to determine successfully whether the machine is listening for knock sequences by using port probes. Thus, although a brute-force attack could be mounted to try to guess the ports and the form of the sequence, such breach attempts could be detected easily. Second, because information is flowing in the form of connection attempts rather than in typical packet data payload, without knowing that this system is in place it would be unlikely that the use of this authentication method would be detected by monitoring traffic. To minimize the risk of a functional sequence being constructed by the intercepting party, the information content containing the remote IP of the sequence can be encrypted. Third, because the authentication is built into the port knock sequence, existing applications need not be changed. Implementing one-time passwords is done easily by adjusting the way particular sequences are interpreted. A sequence could correspond to a request that a port be opened for a specific length of time and then closed and never opened again to the same IP. Furthermore, a one-time pad could be used to encrypt the sequence, making it indecipherable by those without the pad.

Disadvantages of Port Knocking
To use port knocking, a client script that performs the knock is required. The client and any associated data should be considered a secret and kept on removable media, such as a USB key. The use of the client imposes an overhead for each connection. Certain locations, such as libraries or Internet cafés, may not allow execution of arbitrary programs. In order to use port knocking, a number of ports need to be allocated for exclusive use by this system. As the number of such ports increases, the knock sequences becomes shorter for a given amount of information payload, because the number of coding symbols is increased. Practically, 256 free privileged ports (in the 1-1024 range), not necessarily contiguous, usually can be allocated and used to listen for port knocks. Finally, any system that manipulates firewall rules in an automated fashion requires careful implementation. For the scenario in which no ports are initially open, if the listening dæmon fails or is not able to interpret the knocks correctly, it becomes impossible to connect remotely to the host.


Applications
In this section, three examples are outlined that illustrate how the port knocking system can be used. 1. Single Port, Fixed Mapping Connection to only one port (ssh/22) is required. The ssh dæmon is running; all privileged ports are closed, including ssh/22; and packets addressed to ports 30,31,32 are being logged. The following port sequences are recognized: 31,32,30 open ssh/22 to connecting IP
32,30,31 close ssh/22 to connecting IP
31,30,32 close ssh/22 to connecting IP and disregard further knocks from this IP
The justifiably paranoid administrator can open the ssh/22 port on his system by initiating TCP connections to ports 31,32,30. At the end of the ssh session, the port would be closed by using the second sequence shown above. If the host from which the administrator is connecting is not trusted (if, say, keystrokes may be snooped), the use of the third sequence would deny all further traffic from the IP, preventing anyone from duplicating the session. This assumes the port sequence and system login credentials are not captured by a third party and used before the legitimate session ends. In this example, only three sequences are understood by the system, as the requirements call for only a handful of well-defined firewall manipulations. The sequences were chosen not to be monotonically increasing (30, 31, 32), so they would not be triggered by remote port scans. If multiple ports are to be protected by this system, a mapping needs to be derived between the port sequence and a flexible firewall rule. This is covered in the next example. 2. Multiple Port, Dynamic Mapping In this example, a network may be running any number of applications. Ports 100-109 are used to listen to knocks. The port sequence is expected to be of the form: 102,100,110 10a,10b,10c,10d 10(a+b+c+d mod 10) 110,100,102
header payload checksum footer


The first and last three ports let the port knocking dæmon know that a sequence is starting and ending. The next four ports encode the port (abcd) to be opened. For example, if a connection to port 143 is required, the sequence would be 100,101,104,103. The final element in the sequence is a checksum that validates the sequence payload. In this example, the checksum is 8 (1+4+3 mod 10). The sequence element therefore is 108, and the full sequence would be 102,100,103 100,101,104,103 108 103,100,102
When this sequence is detected, port 143 would be made available to the incoming IP address. If the port is open already, the knock would rendered it closed. The knock can be extended to include additional information, such as an anticipated session length, that can be used to close the port after a set amount of time. 3. Mapping with Encryption The information contained in the knock sequence can be encrypted to provide an additional measure of security. In this example, 256 ports are allocated and logged. A knock map of the form remote IP port time checksum
is used where the remote IP, port, time and checksum (sum of other fields mod 255) are encrypted. The encrypted string can be mapped onto eight unsigned chars using Perl's pack("C*",STRING) command, see Listing 1. Listing 1. Mapping the Encrypted String
Implementation
A minimal prototype Perl implementation of port knocking is presented. The implementation is comprised of a knockclient, responsible for originating the knock sequence, and a knockdæmon, responsible for monitoring the firewall log and manipulating the rules.


Knockclient
The complete client is shown in Listing 1. Lincoln Stein's Crypt::CBC module is used as proxy to Crypt::Blowfish to carry out encryption. The unencrypted knock sequence is comprised of seven values: four IP bytes, a port (limited to the range 0-255 in this implementation), a time flag and a checksum (mod 255). The time flag determines how the dæmon reacts: 0 to open the port, 255 to close the port and any other value in the 1-254 range to open the port and then close it after that many minutes. The knock on the firewall (IP=IPF) to open port ssh/22 on IP=IPC and then have the port close after 15 minutes would be executed by calling the client as follows: knockclient -i IPC -r IPF -p 22 -t 15
The client packs the list of seven integers, performs the encryption and unpacks the string into unsigned chars (0-255). These values are then mapped onto a sequence of ports in the 745-1000 range.
Knockdæmon
The knockdæmon is shown in Listing 2. This application uses File::Tail to look for new lines in the firewall log file. Lines corresponding to connection attempts to ports 745-1000 are parsed for the remote IP and port number. An 8-element queue storing the ports is maintained for each incoming IP. When the queue size reaches 8, its contents are decrypted. If the decryption is successful and the checksum is correct, appropriate action is taken and the queue is cleared. If the decryption fails, the oldest queue port element is removed and the dæmon continues monitoring. Listing 2. knockdæmon The firewall rules are manipulated by a system call to the ipchains binary, although the IPChains Perl module by Jonathan Schatz also may be used. If the port is to be closed, as indicated by the time flag, Jose Rodrigues' Schedule::At module is used to schedule the deletion of the rule using the at queue system.


Conclusion
Port knocking is a stealthy authentication system that employs closed ports to carry out identification of trusted users. This novel method provides the means of establishing a connection to an application running on a completely isolated system on which no ports initially are open.