Tim's IT-Blog

Just a blog about IT and IT-Problems…

Uninstall Perl CPAN Module

by admin on 13/06/2014

Via pm-uninstall

# Install pm-uninstall at the frist time / if not already exists
perl -MCPAN -e "install App::pm-uninstall"
#Uninstall Module example Net::SSLeay
pm-uninstall -n Net::SSLeay

Or use follwing script
target=”_blank”>https://perltricks.com/article/3/2013/3/27/How-to-cleanly-uninstall-a-Perl-module:

# uninstall_perl_module.pl from PerlTricks.com

use 5.14.2;
use ExtUtils::Installed;
use ExtUtils::Packlist;

# Exit unless a module name was passed
die ("Error: no Module::Name passed as an argument. E.G.\n\t perl $0 Module::Name\n") unless $#ARGV == 0;

my $module = shift @ARGV;

my $installed_modules = ExtUtils::Installed->new;

# iterate through and try to delete every file associated with the module
foreach my $file ($installed_modules->files($module)) {
 print "removing $file\n";
 unlink $file or warn "could not remove $file: $!\n";
}

# delete the module packfile
my $packfile = $installed_modules->packlist($module)->packlist_file;
print "removing $packfile\n";
unlink $packfile or warn "could not remove $packfile: $!\n";

# delete the module directories if they are empty
foreach my $dir (sort($installed_modules->directory_tree($module))) {
 print("removing $dir\n");
 rmdir $dir or warn "could not remove $dir: $!\n";
}

[Found at

A analysis of irregular, random SonicWALL NSA reboots by using TSR/StackTraces

by admin on 19/06/2013

On one your SonicWALL firewall we had irregular reboots and failovers on a HA-Configuration. We got more information on downloading the “technical support report (TSR)” and found some stack traces on this report. (If you found such stack traces on this report normaly all you can do is to open a support case at SonicWALL or update the SonicWALL to the lasted (stable) version)

In your case we analysed the problem with the Level3-Support of sonicwall.

(more →)

Modified Suhosin Patch 0.9.10 for PHP 5.3.6

by admin_import on 06/07/2011

Here you can download the Suhosin Patch 0.9.10 for PHP 5.3.6:

suhosin-patch-5.3.4-0.9.10_for_5.3.6.patch

Please extract the Source of PHP 5.3.6 and patch it with the following command

    ../php-5.3.6# patch -p1 -i ../suhosin-patch-5.3.4-0.9.10_for_5.3.6.patch

To get PHP 5.3.6 please visit https://www.php.net/.

The orignal Suhosin Patch for PHP 5.3.4 https://www.hardened-php.net/suhosin/download.html is copyright © Stefan Esser – SektionEins.

Suhosin is licensed under the PHP License Version 3.01. If you are using Suhosin to guard servers powering commercial services, consider donating a few bucks to us via PayPal.

[Source: https://www.hardened-php.net/suhosin/]

HowTo find chinese or russian Spam encoded in UTF-8 with SpamAssassin (Chinese Russian Spam filter rules)

by admin_import on 03/06/2010

Normally SpamAssassin do not support UTF-8 by performance reasons:

If it contains “utf8”, then that’s probably the problem. Change it so it does not contain “utf8” …, and the performance issues will clear up.

Perl 5.8 uses Unicode character sets internally in this situation, and unfortunately, this greatly hurts performance of all Perl code which operates heavily on strings (like SpamAssassin).

[Source: https://wiki.apache.org/spamassassin/Utf8Performance]

Mostly chinese or russian Spam has special chinese or russian Characters at the Subject encoded in UTF-8 and Base64.

To find chinese or russian Spam encoded in UTF-8 (Unicode) you have to search the Byte-Code of the chinese or russian Character.

(more →)

List the perl modules installed on your box

by admin_import on 18/05/2010

By using ExtUtils::Installed

# if ExtUtils::Installed not installed, please run first: perl -MCPAN -e 'install ExtUtils::Installed'
perl -MExtUtils::Installed -MData::Dumper -e  'my ($inst) = ExtUtils::Installed->new(); print Dumper($inst->modules());'

By using CPAN:

#shows only Packages which needed an update
perl -MCPAN -e 'print CPAN::Shell->r '

Or use following script:

I’m not a hard-core Perl monger, but I recently needed to find out a list of the perl modules (and their version numbers) installed on a box.

I found the following script very useful:

#!/usr/local/bin/perl
use ExtUtils::Installed;
my $instmod = ExtUtils::Installed->new();
foreach my $module ($instmod->modules()) {
my $version = $instmod->version($module) || "???";
print "$module -- $version\\n";
}

[Found at: https://benmetcalfe.com/blog/2005/04/list_the_perl_modules_installed_on_your_/]

Check Point – Unable to open HTTPS-Sites when using SecuRemote/SecureClient

by admin_import on 11/05/2010

If you are unable to connect HTTPS-Sites over a Proxy by using VPN-Tunnel with Check Point SecuRemote / SecureClient, you have to enable “asm_http_allow_connect” on the client.

On Windows:
– open regedit
– Go to HKLMSystemCurrentControlSetServicesFW1parameters
– Add a key called Globals
– Under Globals, create a DWORD called asm_http_allow_connect
– set its value to 1

For more Information see Check Point Solution ID: sk20988.

Get Check Point IKEView (Download)

by admin_import on 11/05/2010

Normally IKEView is available only for CSP partners https://www.checkpoint.com/techsupport/csp/downloads/dl_utilities.html#ike_view.

But you can download and install InfoView package https://supportcenter.checkpoint.com/supportcenter/portal/user/anon/page/default.psml/media-type/html?action=portlets.DCFileAction&eventSubmit_doGetdcdetails=&fileid=8227. After Installation you find IKEView under C:Program FilesCheckPointInfoview1.0.