Saturday, January 24, 2009
AJAX, XML, XSLT (and some ASP) tricks: Login to Google Data API
AJAX, XML, XSLT (and some ASP) tricks: Login to Google Data API
Google Data API has numerous client-side libraries, but not an ASP/VBScript one. Here’s the first routine you need: it authenticates you with the Google API and returns a handle you can use in subsequent calls.
Google Data API has numerous client-side libraries, but not an ASP/VBScript one. Here’s the first routine you need: it authenticates you with the Google API and returns a handle you can use in subsequent calls.
Dim XRQ ' global XMLHttpRequest object
Function GoogleLogin(UN,Pwd,Svc)
Dim RQData,I,RT
GoogleLogin = Null
RQData = EncodeFormData(Array("Email","Passwd","service","source"), _
Array(UN,Pwd,Svc,"VBScript-BloggerLibrary-0.1"))
If Not IsObject(XRQ) Then Set XRQ = CreateObject("Microsoft.XMLHTTP")
XRQ.open "POST","https://www.google.com/accounts/ClientLogin",false
XRQ.setRequestHeader "Content-Type", "application/x-www-form-urlencoded"
XRQ.send RQData
If HTTPCheck(XRQ,"Google login response", _
"https://www.google.com/accounts/ClientLogin") Then
RT = XRQ.responseText
I = InStr(RT,"Auth=")
If I = 0 Then wr "Google response has no AUTH data" : Exit Function
RT = Mid(RT,I+5,Len(RT))
I = InStr(RT,Chr(10)) : If I > 0 Then RT = Left(RT,I-1)
GoogleLogin = RT
End If
End Function
Wednesday, January 21, 2009
xwrt 3.2 command line options for good compression results
Large Text Compression Benchmark (read more)
xwrt 3.2 (Oct. 29, 2007) is a dictionary preprocessor frontend to LZMA, PPMVC and lpaq6 as well as a standalone preprocessor. Option
-l14 selects lpaq6 option 9 (1542 MB).
-b255 selects 255 MB memory (maximum) for building the dictionary.
-m96 selects 96 MB buffer during compression. (Higher values cause out of memory error).
-s turns of space modeling.
-e40000 limits the dictionary size to 40000 words.
-f200 limits the dictionary to words that occur at least 200 times.
xwrt 3.2 (Oct. 29, 2007) is a dictionary preprocessor frontend to LZMA, PPMVC and lpaq6 as well as a standalone preprocessor. Option
-l14 selects lpaq6 option 9 (1542 MB).
-b255 selects 255 MB memory (maximum) for building the dictionary.
-m96 selects 96 MB buffer during compression. (Higher values cause out of memory error).
-s turns of space modeling.
-e40000 limits the dictionary size to 40000 words.
-f200 limits the dictionary to words that occur at least 200 times.
Compression Compressed size Decompressor Total size Time (ns/byte)Program Options enwik8 enwik9 size (zip) enwik9+prog Comp Decomp Mem Alg Note------- ------- ---------- ----------- ----------- ----------- ----- ----- --- --- ----xwrt 3.2 -l14 -b255 -m96 -s -e40000 -f200 18,679,742 151,171,364 52,569 s 151,223,933 2537 2328 1691 CM
NetFlow Reliable Export With SCTP - Cisco Systems
NetFlow Reliable Export With SCTP - Cisco Systems
Cisco IOS NetFlow Advanced Configuration Guides
NetFlow Reliable Export With SCTP (pdf)
Cisco IOS NetFlow Advanced Configuration Guides
NetFlow Reliable Export With SCTP (pdf)
Configuring a Virtual Tunnel Interface with IP Security - Cisco Systems
Configuring a Virtual Tunnel Interface with IP Security - Cisco Systems
This document provides a sample configuration for a virtual tunnel interface (VTI) with IP Security (IPSec). This configuration uses RIP version 2 routing protocol to propagate routes across the VTI. With a VTI, VPN traffic is forwarded to the IPSec virtual tunnel for encryption and then sent out of the physical interface. This sample configuration also demonstrates the use of Cisco Quality of Service with VTIs.
This document provides a sample configuration for a virtual tunnel interface (VTI) with IP Security (IPSec). This configuration uses RIP version 2 routing protocol to propagate routes across the VTI. With a VTI, VPN traffic is forwarded to the IPSec virtual tunnel for encryption and then sent out of the physical interface. This sample configuration also demonstrates the use of Cisco Quality of Service with VTIs.
Cisco IOS IPsec High Availability - Cisco Systems
Cisco IOS IPsec High Availability - Cisco Systems
The Cisco IOS® IPsec High Availability (IPsec HA) Enhancements feature provides an infrastructure for reliable and secure networks to provide transparent availability of the VPN gateways---that is, Cisco IOS Software-based routers. This feature works well for all IP Security (IPsec)-based networks. In an Enterprise-Class Teleworker (ECT) solution, which encompasses a Dynamic Multipoint VPN (DMVPN) architecture for data gateway infrastructure and plain IPsec for management gateway infrastructure, IPsec HA can be used to provide redundancy---that is, stateful failover and rollback of the gateways to provide uninterrupted management connectivity to the spokes. For more details about ECT deployment, please refer to the link given in the references section.
The Cisco IOS® IPsec High Availability (IPsec HA) Enhancements feature provides an infrastructure for reliable and secure networks to provide transparent availability of the VPN gateways---that is, Cisco IOS Software-based routers. This feature works well for all IP Security (IPsec)-based networks. In an Enterprise-Class Teleworker (ECT) solution, which encompasses a Dynamic Multipoint VPN (DMVPN) architecture for data gateway infrastructure and plain IPsec for management gateway infrastructure, IPsec HA can be used to provide redundancy---that is, stateful failover and rollback of the gateways to provide uninterrupted management connectivity to the spokes. For more details about ECT deployment, please refer to the link given in the references section.
Configuring DMVPN Spoke Router in Full Mesh IPsec VPN Using SDM - Cisco Systems
Configuring DMVPN Spoke Router in Full Mesh IPsec VPN Using SDM - Cisco Systems
This document provides a sample configuration for configuring Dynamic Multipoint spoke router into a full mesh Dynamic Multipoint VPN (DMVPN). DMVPN allows users to scale large and small IPsec VPNs more effectively by combining generic routing encapsulation (GRE) tunnels, IPsec encryption, and Next Hop Resolution Protocol (NHRP). Security Device Manager (SDM) is an embedded security configuration management tool used to configure Cisco IOS Software routers with variety of security features. This sample configuration relies on SDM version 1.2 that supports hub and spoke DMVPN configurations and shows how to configure dynamic Spoke to Spoke tunnels.
This document provides a sample configuration for configuring Dynamic Multipoint spoke router into a full mesh Dynamic Multipoint VPN (DMVPN). DMVPN allows users to scale large and small IPsec VPNs more effectively by combining generic routing encapsulation (GRE) tunnels, IPsec encryption, and Next Hop Resolution Protocol (NHRP). Security Device Manager (SDM) is an embedded security configuration management tool used to configure Cisco IOS Software routers with variety of security features. This sample configuration relies on SDM version 1.2 that supports hub and spoke DMVPN configurations and shows how to configure dynamic Spoke to Spoke tunnels.
Cisco IOS IPsec Accounting with Cisco IOS NetFlow - Cisco Systems
Cisco IOS IPsec Accounting with Cisco IOS NetFlow - Cisco Systems
Cisco IOS NetFlow is the primary denial of service (DoS) identification, accounting, and analysis technology for IP networks at Cisco and in the networking industry. Cisco IOS NetFlow provides valuable information about network users, applications usage, timing, and traffic direction on the network. Cisco is a leader in IP traffic flow technology and invented Cisco IOS NetFlow.
Cisco IOS IPsec provides security for transmission of sensitive information over unprotected networks (ie: Internet). IPsec acts as the network layer by protecting and authenticating IP packets between participating IPsec devices ("peers"), such as Cisco routers.
This document will discuss how Cisco IOS NetFlow can be leveraged to provide accounting information in an IPsec tunneling network topology.
Cisco IOS NetFlow is the primary denial of service (DoS) identification, accounting, and analysis technology for IP networks at Cisco and in the networking industry. Cisco IOS NetFlow provides valuable information about network users, applications usage, timing, and traffic direction on the network. Cisco is a leader in IP traffic flow technology and invented Cisco IOS NetFlow.
Cisco IOS IPsec provides security for transmission of sensitive information over unprotected networks (ie: Internet). IPsec acts as the network layer by protecting and authenticating IP packets between participating IPsec devices ("peers"), such as Cisco routers.
This document will discuss how Cisco IOS NetFlow can be leveraged to provide accounting information in an IPsec tunneling network topology.
Stateful Failover for IPSec - Cisco Systems
Stateful Failover for IPSec - Cisco Systems
Stateful failover for IP Security (IPSec) enables a router to continue processing and forwarding IPSec packets after a planned or unplanned outage occurs. Customers employ a backup (secondary) router that automatically takes over the tasks of the active (primary) router if the active router loses connectivity for any reason. This process is transparent to the user and does not require adjustment or reconfiguration of any remote peer.
Stateful failover for IPSec is designed to work in conjunction with stateful switchover (SSO) and Hot Standby Routing Protocol (HSRP). HSRP provides network redundancy for IP networks, ensuring that user traffic immediately and transparently recovers from failures in network edge devices or access circuits. That is, HSRP monitors both the inside and outside interfaces so that if either interface goes down, the whole router is deemed to be down and ownership of Internet Key Exchange (IKE) and IPSec security associations (SAs) is passed to the standby router (which transitions to the HSRP active state). SSO allows the active and standby routers to share IKE and IPSec state information so that each router has enough information to become the active router at any time. To configure stateful failover for IPSec, a network administrator should enable HSRP, assign a virtual IP address, and enable the SSO protocol.
Stateful failover for IP Security (IPSec) enables a router to continue processing and forwarding IPSec packets after a planned or unplanned outage occurs. Customers employ a backup (secondary) router that automatically takes over the tasks of the active (primary) router if the active router loses connectivity for any reason. This process is transparent to the user and does not require adjustment or reconfiguration of any remote peer.
Stateful failover for IPSec is designed to work in conjunction with stateful switchover (SSO) and Hot Standby Routing Protocol (HSRP). HSRP provides network redundancy for IP networks, ensuring that user traffic immediately and transparently recovers from failures in network edge devices or access circuits. That is, HSRP monitors both the inside and outside interfaces so that if either interface goes down, the whole router is deemed to be down and ownership of Internet Key Exchange (IKE) and IPSec security associations (SAs) is passed to the standby router (which transitions to the HSRP active state). SSO allows the active and standby routers to share IKE and IPSec state information so that each router has enough information to become the active router at any time. To configure stateful failover for IPSec, a network administrator should enable HSRP, assign a virtual IP address, and enable the SSO protocol.
Tuesday, January 20, 2009
Saturday, January 3, 2009
Adler-32 - VB6
Adler-32 Digest in VB6
Function Adler32(sBuffer$) As Long
Dim Seed As Long
Dim S1 As Long
Dim S2 As Long
Dim N As Long
Dim CrcBase As Long
CrcBase = 65521
Seed = 1
S1 = Seed And &HFFFF
S2 = (Seed / 65536) And &HFFFF
For N = 1 To Len(sBuffer$)
S1 = (S1 + Asc(Mid$(sBuffer$, N, 1))) Mod CrcBase
S2 = (S2 + S1) Mod CrcBase
Next
Adler32 = (S2 * 65536) + S1
End Function
Subscribe to:
Posts (Atom)