Jump to content


Active Members
  • Posts

  • Joined

  • Last visited

About proskater123

  • Birthday 07/27/1990

Contact Methods

  • AIM
  • MSN
  • ICQ
  • Yahoo

Profile Information

  • Gender
  • Location

Recent Profile Visitors

6,591 profile views

proskater123's Achievements


Newbie (1/14)

  1. My main objective was to deploy this in a law firm where the secretaries move around all the time. We watned it so that if a computer went down, they would still haave all their data; we would be able to just throw a new comuter in that spot and vola they are back to work while we work on the faulty computer.
  2. I provided the link for the images in the original post. Here is the link as well http://imgur.com/a/iiFQP. The only two ports on the back of this kvm is the port for the power, and the vga. I opened it up and the cables for the mouse and keyboard go to the same circut board as the vga.
  3. I purchased a rackmount kvm monitor that slides out on ebay. The problem is, is that it has no markings saying who made it or what model it is. The only port it has is a vga port in. But it has a built in mouse and keyboard. I figured there was a special cable that sends the mouse and keyboard over the vga cable some how. Here is the kvm and the only port besides the power port.HERE is the images of the kvm. What kind of cable do I need to hook this up to a kvm switch?
  4. So I know it is possible to setup roaming profiles to setup network shared folders on startup based on which folder that user is allowed to access. Let me try to explain more. Lets say user 1 has acces to the network folders "sales", and "reports" but user2 only has access to network folder "sales" but not reports. When user1 logs into a computer on the domain, it would automatically map the folders Sales and reports. They log out then user 2 logs in and only sees the shares they are allowed access to. I have seen this implemented at a location but I didn't know how they set it up nor what the term of it is called. Does anyone know of an article of how to set it up?
  5. So I have never had a fiber connection ran directly to a server and have some questions before we move forward with it. I have a dell r900 server that is hosting some virtual machines. Right now we have a single gigabit line running to it. At our datacenter we have the option to have fiber ran directly to our server. So we wanted to go forward with that to get a better connection. First off when I install the fiber card in the server will it configure just like a regular network card will or is there a special setup for it. Our server is running Centos 6 for the host OS. The second question I have is the selection of the card. I found a cheap QLogic card on ebay and was wondering if this is the correct card and is there a better alternitive that is under $200. Here is the link for that: http://www.ebay.com/itm/QLOGIC-QLE2460-4GBPS-PCI-E-FIBER-CHANNEL-HBA-SINGLE-PORT-DELL-POWEREDGE-R900-/121141432097?pt=US_Server_Disk_Controllers_RAID_Cards&hash=item1c34978f21
  6. So this is what I have came up with so far.
  7. You can run python on windows you just have to define the paths or run it under the python directory using the python.exe
  8. Hey thanks that kinda helped. Lets see if i understand what it said
  9. Thats my problem as well. I have no idea how to work with python. Thats why I am here :(
  10. I took out the <cut> and </cut> cause I do beileve that they are not needed. Then when I run the script in windows
  11. So I found this script to decrypt a netgear cfg file. But when i try to run the script it comes up with a bunch of errors. Can someone look at the script and possibly fix the issues? I know nothing about python. import pyDes import os, sys # Encryption key is a slightly variation of "NtgrBak" KEY = [0x56-8, 0x74, 0x67, 0x72, 0x42, 0x61, 0x6b, 0x00] def derive_des_key(ascii_key): def extract_by_offset(offset): byte_index = offset >> 3 bit_index = byte_index << 3 v0 = (ascii_key[byte_index] << 8) | ascii_key[byte_index+1] v1 = 8 - (offset - bit_index) v0 >>= v1 return v0 & 0xfe k = "" for i in range(0, 7*8, 7): k += chr(extract_by_offset(i)) return k def decrypt_block(block, key_bytes): k = derive_des_key(key_bytes) des = pyDes.des(k, pyDes.ECB) r = des.decrypt(block) return r def main(): data = sys.stdin.read() assert (len(data) % 8) == 0 current_key = KEY[:] r = "" for i in range(0, len(data), 8): current_key[0] += 8 if current_key[0] > 0xff: current_key[0] = current_key[0] - 0x100 current_key[1] += 1 block = data[i:i+8] d = decrypt_block(block, current_key) r += d sys.stdout.write(r)
  12. Thanks for the reply. It has really helped and also let me know I need to do a little more reading.
  13. So i am thinking of using this setup. For an access point I would use Amped High Power Wireless-N 600mW LINK This antenna LINK with this booster LINK of course with all of the correct cables. Again I need to broadcast about 600 feet. Think this would work? or am I missing something?
  • Create New...