How to set up an SPF record for your domain?

What are the SPF records? A Sender Policy Framework (SPF) record is a type of Domain Name Service (DNS) TXT record that identifies which mail servers are permitted to send an email on behalf of your domain. The purpose of an SPF record is to detect and prevent spammers from sending messages with forged From addresses on your domain. Overview Sender Policy Framework (SPF) is a method of fighting spam. As more time passes, this protocol will be used as one of the standard methods of fighting spam on the Internet. An SPF record is a TXT record that is part of a domain’s DNS zone file. The TXT record specifies a list of authorized hostnames/IP addresses that mail can originate from for a given domain name. Once this entry is placed within the DNS zone, no further configuration is necessary to take advantage of servers that incorporate SPF checking into their anti-spam systems. This SPF record is added the same way as a regular A, MX, or CNAME record. ...

August 31, 2019 · 2 min · 283 words · Akhil Jalagam

Shell context menu’s for Windows 10

Open Command Prompt here, Open PowerShell here, Open Bash Shell here – (with Elevated privileges) save these in a .reg file and open to apply. 1. Open Command Prompt and PowerShell here – registry file ; Command Prompt [HKEY_CLASSES_ROOT\Directory\shell\01MenuCmd] “MUIVerb”=“Command Prompts” “Icon”=“cmd.exe” “ExtendedSubCommandsKey”=“Directory\ContextMenus\MenuCmd” [HKEY_CLASSES_ROOT\Directory\background\shell\01MenuCmd] “MUIVerb”=“Command Prompts” “Icon”=“cmd.exe” “ExtendedSubCommandsKey”=“Directory\ContextMenus\MenuCmd” [HKEY_CLASSES_ROOT\Directory\ContextMenus\MenuCmd\shell\open] “MUIVerb”=“Command Prompt” “Icon”=“cmd.exe” [HKEY_CLASSES_ROOT\Directory\ContextMenus\MenuCmd\shell\open\command] @=“cmd.exe /s /k pushd "%V"” [HKEY_CLASSES_ROOT\Directory\ContextMenus\MenuCmd\shell\runas] “MUIVerb”=“Command Prompt Elevated” “Icon”=“cmd.exe” “HasLUAShield”="" [HKEY_CLASSES_ROOT\Directory\ContextMenus\MenuCmd\shell\runas\command] @=“cmd.exe /s /k pushd "%V"” ...

August 25, 2019 · 1 min · 161 words · Akhil Jalagam

Testing IPSEC VPN Systems with ike-scan

ike-scan is a command-line tool for discovering, fingerprinting and testing IPsec VPN systems. It constructs and sends IKE Phase-1 packets to the specified hosts, and displays any responses that are received. ike-scan does two things: Discovery: Determine which hosts are running IKE. This is done by displaying those hosts which respond to the IKE requests sent by ike-scan. Fingerprinting: Determine which IKE implementation the hosts are using. There are several ways to do this: (a) Backoff fingerprinting – recording the times of the IKE response packets from the target hosts and comparing the observed retransmission backoff pattern against known patterns; (b) vendor id fingerprinting – matching the vendor-specific vendor IDs against known vendor ID patterns; and (c) proprietary notify message codes. Ending ike-scan 1.9: 1 hosts scanned in 0.512 seconds (1.95 hosts/sec). 1 returned handshake; 0 returned notify ...

August 23, 2019 · 1 min · 155 words · Akhil Jalagam

iptables explained

Iptables is used to set up, maintain, and inspect the tables of IP packet filter rules in the Linux kernel. Several different tables may be defined. Each table contains a number of built-in chains and may also contain user-defined chains. Each chain is a list of rules which can match a set of packets. Each rule specifies what to do with a packet that matches. This is called a ‘target’, which may be a jump to a user-defined chain in the same table. ...

August 21, 2019 · 3 min · 581 words · Akhil Jalagam