Thursday 30 January 2014

Spam and blacklist IP addresses

More Information About Cbl

http://www.spamhaus.org/
http://mxtoolbox.com/

What is the CBL Blacklist?

CBL or Composite Blocking List is a DNS-based blackhole list of suspected e-mail services sending SPAM email resulting from virus or malware infections.
The CBL only lists IP Addresses exhibiting characteristics of:
  • Various sorts of open proxies. An open proxy is generally a web server that allows email sending to piggyback on a script that sends email.
  • Dedicated Spam BOTs used to send spam.
  • Worms/viruses that do their own direct mail transmission.
  • Trojan-horse or "stealth" spamware.
The CBLs gets its data from large mail server (SMTP) installations, most of which are large spamtraps.

How did I get on this Blacklist?

If you are on the CBL, it’s most likely you contracted a virus or BOTNET, typically via a malware-infected webpage. This is often a result of visiting a webpage that houses an infection which downloads malware on a PC. This malware (or virus) then creates a "mini SMTP" server used to hijack account information and send bulk email to recipients in the Users' email address book. It can affect the actual machine housing the "Email server platform" or on a local PC which is allowed to connect to the Email Server IP Address on SMTP port 25.

What the CBL Blacklist does not do

The CBL does not list open relays. It’s important to know the difference between and open relay and an open proxy, which the CBL DOES detect. An SMTP open relay is a real email server that has been misconfigured to accept email from a third party and send it out over the internet. An open proxy, on the other hand, is a non-mail server that’s been tricked into sending third-party email.
The CBL does not list URLs or URIs. Rather, it lists large quantities of IP addresses. It also does not make connections to other machines to test if one is infected. In other words, the CBL does not do probes.
The CBL also does not associate IPs with people or associations because most people on this list are victims of a virus rather than spammers. The CBL also does not accept external submissions. This makes it impossible for people to use the CBL as an instrument for revenge.

More Information about CBL

The CBL requires a manual de-listing request. The process, however, is fairly simple and straightforward.
IMPORTANT: The CBL expects you to resolve the underlying problem with your IP Address BEFORE you request delisting. If you do not resolve the underlying issue, then you will be relisted in their database if they continue receiving spam. If you continually request delisting without further researching the cause, you do run the risk of potentially being permanently blacklisted.
More information about CBL can be found at their website: http://cbl.abuseat.org/

Reason for listing - No Details Available

Tuesday 28 January 2014

RAID storage

RAID was originally defined as Redundant Array of Inexpensive Drives, but RAID setups were traditionally very expensive so the definition of "I" became Independent. The costs have recently come down significantly because of commoditization and RAID features are now embedded on to most higher-end motherboards. Storage RAIDs were primarily designed to improve fault tolerance, offer better performance, and easier storage management because it presents multiple hard drives as a single storage volume which simplifies storage management. Before we start talking about the different RAID types, I'm going to define some basic concepts first.
Fault tolerance defined: Basic fault tolerance in the world of storage means your data is intact even if one or more hard drives fails. Some of the more expensive RAID types permit multiple hard drive failures without loss of data. There are also more advanced forms of fault tolerance in the enterprise storage world called path redundancy (AKA multi-path) which allows different storage controllers and the connectors that connect hard drives to fail without loss in service. Path redundancy isn't considered a RAID technology but it is a form of storage fault tolerance.
Storage performance defined: There are two basic metrics of performance in the world of storage. They are I/O performance and throughput. In general, read performance is more valued than write performance because storage devices spend the majority of their time reading data. I/O (Input/Output) performance is the measure of how many small random read/write requests can be processed in a single second and it is very important in the server world, especially database type applications. IOPS (I/O per second) is the common unit of measurement for I/O performance.
Throughput is the measurement of how much data can be read or written in a single second and it is important in certain server applications and very desirable for home use. Throughput is typically measured in MB/sec (megabytes transferred per second) though mbps (megabits per second) is sometimes also used to describe storage communication speeds. There is sometimes confusion between megabits versus megabytes since they sound alike. For example, 100 megabit FastEthernet might sound faster than a typical hard drive that gets 70 MB/sec but this would be like thinking that 100 ounces weighs more than 70 pounds. In reality, the hard drive is much faster because 70 MB/sec is equivalent to 560 mbps.
RAID techniques defined: There are three fundamental RAID techniques and the various RAID types can use one or more of these techniques. The three fundamental techniques are:


Mirroring: Data mirroring stores the same data across two hard drives which provides redundancy and read speed. It's redundant because if a single drive fails, the other drive still has the data. It's great on read I/O performance and read throughput because it can independently process two read requests at the same time. In a well implemented RAID controller that uses mirroring, the read IOPS and read throughput (for two tasks) can be twice that of a single drive. Write IOPS and write throughput aren't any faster than a single hard drive because they can't be process independently since data must be written to both hard drives at the same time. The downside to mirroring is that your capacity is only half of the total capacity of all your hard drives so it's expensive.
Striping: Data striping distributes data across multiple hard drives. Striping scales very well on read and write throughput for single tasks but it has less read throughput than data mirroring when processing multiple tasks. A good RAID controller can produce single-task read/write throughput equal to the total throughput of each individual drive. Striping also produces better read and write IOPS though it's not as effective on read IOPS as data mirroring. You also get a large consolidated drive volume equal to the total capacity of all the drives in the RAID array. Striping is rarely used by itself because it provides zero fault tolerance and a single drive failure causes not only the data on that drive to fail, but the entire RAID array. Striping is often used in conjunction with data mirroring or with parity.
Striping with parity: Because striping alone is so unreliable in terms of fault tolerance, striping with parity solves the reliability problem at the expense of some capacity and a big hit on write IOPS and write throughput compared to just data striping. Data is striped across multiple hard drives just like normal data striping but a parity is generated and stored on one or more hard drives. Parity data allows a RAID volume to be reconstructed if one (sometimes two) hard drives fail within the array. Generating parity can be done in the RAID controller hardware or done via software (driver level, OS level, or add-on volume manager) using the general purpose processor. The hardware method of generating parity either results in an expensive RAID controller and/or poor throughput performance. The software method is computationally expensive though that's no longer a problem with fast multi-core processors. Despite the performance and capacity penalty of using parity, parity uses up far less capacity than data mirroring while providing drive fault tolerance making this a very cost-effective form of reliable large-capacity storage.

Basic RAID Levels defined

RAID 0: 1 disk normal
RAID 1: 2 disks mirroring N/2
RAID 2,3,4,5: SINGLE PARITY DISK N-1 
RAID 6: DOUBLE PARITY DISK N-2
The various RAID types used in the storage world are defined by Level numbers. At the basic level, we have RAID Level 0 through 6. We also have various composite RAID types comprised of multiple RAID levels. Note that people often drop the word "Level" when referring to RAID types and this has become an accepted practice. Also note that even though same-sized hard drives are not technically required, RAID normally uses hard drives of similar size. Any implementation that uses different sized hard drives will result in wasted capacity.

1 diskos clustering
RAID Level 0: RAID Level 0 is the cluster-level implementation of data striping and it is the only RAID type that doesn't care about fault tolerance. Clusters can vary in size and are user-definable but they are typically blocks of 64 thousand bytes. The clusters are evenly distributed across multiple hard drives. It's used by people who don't care about data integrity if a single drive fails. This RAID type is sometimes used by video editing professionals who are only using the drive as a temporary work space. It's also used by some PC enthusiasts who want maximum throughput and capacity.

2 diskoi mirroring, wasted space performance boost
RAID Level 1: RAID Level 1 is the pure implementation of data mirroring. In a nutshell RAID Level 1 gives you fault tolerance but it cuts your usable capacity in half and it offers excellent throughput and I/O performance. This RAID level is often used in servers for the system partition for enhanced reliability but PC enthusiasts can also get a nice performance boost from RAID Level 1. Using multiple independent RAID Level 1 volumes can offer the best performance for database storage.

e.g 5 drives and 1 for parity storage N-1 IF N=6 then available capacity is 5
RAID Level 2: RAID Level 2 is a bit-level implementation of data striping with parity. The bits are evenly distributed across multiple hard drives and one of the drives in the RAID is designated to store parity. Out of an array with "N" number of drives, the total capacity is equal to the sum of "N-1" hard drives. For example, an array with 6 equal sized hard drives will have the combined capacity of 5 hard drives. It's interesting to note that this RAID level is almost forgotten and is very rarely used.

SAME AS RAID 2 BUT THIS TIME BYTES ARE STORED FOR DATA STRIPPING
RAID Level 3: RAID Level 3 is a byte-level implementation of data striping with parity. The bytes are evenly distributed across multiple hard drives and one of the drives in the RAID is designated to store parity. Out of an array with "N" number of drives, the total capacity is equal to the sum of "N-1" hard drives. For example, an array with 4 equal sized hard drives will have the combined capacity of 3 hard drives. This RAID level is not so commonly used and is rarely supported.

SAME AS RAID 3 BUT THIS TIME CLUSTERS ARE USED TO STORE DATA FOR  STRIPPING
RAID Level 4: RAID Level 4 is a cluster-level implementation of data striping with parity. Clusters can vary in size and are user-definable but they are typically blocks of 64 thousand bytes. The clusters are evenly distributed across multiple hard drives and one of the drives in the RAID is designated to store parity. Out of an array with "N" number of drives, the total capacity is equal to the sum of "N-1" hard drives. For example, an array with 8 equal sized hard drives will have the combined capacity of 7 hard drives. This RAID level is not so commonly used and is rarely supported.
RAID Level 5: RAID Level 5 is a cluster-level implementation of data striping with DISTRIBUTED parity for enhanced performance. Clusters can vary in size and are user-definable but they are typically blocks of 64 thousand bytes. The clusters and parity are evenly distributed across multiple hard drives and this provides better performance than using a single drive for parity. Out of an array with "N" number of drives, the total capacity is equal to the sum of "N-1" hard drives. For example, an array with 7 equal sized hard drives will have the combined capacity of 6 hard drives. This is the most common implementation of data striping with parity.

RAID 0: 1 disk normal
RAID 1: 2 disks mirroring N/2
RAID 2,3,4,5: SINGLE PARITY DISK N-1
RAID 6: DOUBLE PARITY DISK N-2
RAID Level 6: RAID Level 6 is a cluster-level implementation of data striping with DUAL distributed parity for enhanced fault tolerance. It's very similar to RAID Level 5 but it uses the equivalent capacity of two hard drives to store parity. RAID Level 6 is used in high-end RAID systems but it's slowly becoming more common as technology becomes more commoditized. Dual parity allows ANY two hard drives in the array to fail without data loss which is unique in all the basic RAID types. If a drive fails in a RAID Level 5 array, you better hope there is a hot spare that will quickly restore the array to a healthy state in a few hours and you don't get a second failure during that recovery time. RAID Level 6 allows that second drive failure during recovery and is considered the ultimate RAID Level for fault tolerance. Out of an array with "N" number of drives, the total capacity is equal to the sum of "N-2" hard drives. For example, an array with 8 equal sized hard drives will have the combined capacity of 6 hard drives.
RAID Level 10 (composite of 1 and 0): RAID Level 10 (sometimes called 1+0) is probably the most common composite RAID type used on the market both in the server and home/enthusiast market. For example, there are plenty of cheap consumer-grade RAID controllers that might support RAID Level 0, 1, and 10 that don't support Level 5. The most common and recommended implementation of mirroring and striping is that mirroring is done before striping. This provides better fault tolerance because it can statistically survive more often with multiple drive failures and performance isn't degraded as much when a single drive has failed in the array. RAID Level 0+1 which does striping before mirroring is considered an inferior form of RAID and is not recommended. RAID Level 10 is very commonly used in database applications because it provides good I/O performance when the application can't distribute its own data across multiple storage volumes. But when the application knows how to evenly distribute data across multiple volumes,independent pairs of RAID Level 1 provides superior performance.

Introduction to VMware Vsphere

VMware vSphere leverages the power of virtualization to transform datacenters into simplified cloud computing infrastructures and enables IT organizations to deliver flexible and reliable IT services. VMware vSphere virtualizes and aggregates the underlying physical hardware resources across multiple systems and provides pools of virtual resources to the datacenter.

As a cloud operating system, VMware vSphere manages large collections of infrastructure (such as CPUs, storage, and networking) as a seamless and dynamic operating environment, and also manages the complexity of a datacenter. The following component layers make up VMware vSphere:

Infrastructure Services Infrastructure Services are the set of services provided to abstract, aggregate, and allocate hardware or infrastructure resources. Infrastructure Services can be categorized into:
  •  VMware vCompute—the VMware capabilities that abstract away from underlying disparate server resources. vCompute services aggregate these resources across many discrete servers and assign them to applications.
  •  VMware vStorage—the set of technologies that enables the most efficient use and management of storage in virtual environments.
  •  VMware vNetwork—the set of technologies that simplify and enhance networking in virtual environments.
Application Services Application Services are the set of services provided to ensure availability, security, and scalability for applications. Examples include HA and Fault Tolerance.

VMware vCenter Server VMware vCenter Server provides a single point of control of the datacenter. It provides essential datacenter services such as access control, performance monitoring, and configuration.

Clients Users can access the VMware vSphere datacenter through clients such as the vSphere Client or Web Access through a Web browser.

You can read more here.

Thursday 16 January 2014

Pointing an IP address in DNS Manager


>nslookup for finding the IP address to point to


Adding a new A record ( New A Host) and pointing it to 209.238.2.222




Network Address Translation (NAT) and Gateway

Network Address Translation (NAT) is a network protocol used in IPv4 networks that allows multiple devices to connect to a public network using the same public IPv4 address

NAT and Private IP Addressing:

Today, almost every local LAN network is using Private IP addressing (based on RFC1918) and then translating those private IPs to public IPs with NAT (network address translation). The private IP addresses always start with 192.168.x.x or 172.16-31.x.x or 10.x.x.x (those are the blocks of private IPs defined in RFC1918).


Private IPs example: 10.110.0.100
                     192.168.0.1

Public IPs:81.4.181.154


In computer networking, a gateway is a node (a router) on a TCP/IP network that serves as an access point to another network. A default gateway is the node on the computer network that the network software uses when an IP address does not match any other routes in the routing table. It is usually the IP address of the router to which your PC network is connected.
In home computing configurations, an ISP often provides a physical device which both connects local hardware to the Internet and serves as a gateway. Such devices include DSL routers and cable routers.
In organizational systems a gateway is a node that routes the traffic from a workstation to another network segment. The default gateway commonly connects the internal networks and the outside network (Internet). In such a situation, the gateway node could also act as a proxy server and a firewall. The gateway is also associated with both a router, which uses headers and forwarding tables to determine where packets are sent, and a switch, which provides the actual path for the packet in and out of the gateway.
In other words, a default gateway provides an entry point and an exit point in a network.