I have an application that I need help creating. I believe its use would be valuable in the IT field but am having a hard time figuring out the details of how it should be made. Anyone want to help?
4/23/2010 3:16:02 PM
this wont end well!
4/23/2010 3:17:26 PM
4/23/2010 3:21:13 PM
You'll get a lot better response if you just post the details in this thread.
4/23/2010 3:21:26 PM
move to trash bin
4/23/2010 3:37:57 PM
4/23/2010 3:47:50 PM
so basically, part of my job is processing firewall requests which come in as a pdf doc. Source and destination addresses are not subnetted and may or may not be in our firewall routes. I would like to create an app that will: Subnet the addresses Check the routing table to find out which access group the subnets are inSort the subnets and hosts into object-groups if requiredgenerate access-lists execute the commands on firewallit seems pretty logical and probably would be a no brainer for someone who programs a lot
4/23/2010 8:45:18 PM
is the text selectable in the pdf or is it an image?
4/24/2010 12:13:05 AM
^^why not just write a script to do it?chances are you already execute those commands regularly
4/24/2010 10:49:34 AM
...exactly who creates firewall requests in a PDF? ^and that.[Edited on April 24, 2010 at 12:38 PM. Reason : .]
4/24/2010 12:38:45 PM
change the pdf to a webform that submits params to a script. done.
4/24/2010 12:45:16 PM
The text is selectable in the pdf. It is a form that is filled out by customers, then passed through for approval, finally showing up in a work queue for me. The addresses are in no particular order and must be sorted. Then if there is a range it must be subnetted. I can not change the method by which the requests are submitted. I can only work with the pdf to do this.
4/24/2010 1:13:54 PM
so what exactly do you need help with?pdftotext pdf.pdfparse pdf.txtwhatever commands you normally runthis should be easy
4/24/2010 1:25:06 PM
right.. i have no idea how to do that. The ip addresses are just one section of the PDF (Table A actually). The source addresses are in column 1 of the table, destination column 2, ports column 3, and protocol is column 4. I really am interested in finding someone to sit down with to go over it.
4/24/2010 1:29:32 PM
are you going to pay someone to do your work for you?ask specific questions, like "how do I convert a pdf to text?", not "here's what I need you to do, do it for me."
4/24/2010 1:34:24 PM
parse pdf.txt | awk '{print $1}' | sort -bn
4/24/2010 1:46:19 PM
yes, i'd pay 5/hr for it.
4/24/2010 1:48:05 PM
I accept bits of string.
4/24/2010 4:15:00 PM
ITT
4/24/2010 4:18:09 PM
$5/hour probably won't get you anything, so you might be better trying to get free help here. Solinari and I have done half of it, I gave you the code to convert the PDF to something easier to parse, solinari gave you the code to parse and sort it, those two lines combined with a loop to iterate through and whatever commands you do to open ur firewall.
4/24/2010 6:45:43 PM
4/24/2010 10:20:39 PM
sounds like a very useful tool for hackers
4/24/2010 10:31:06 PM
This bears repeating:
4/25/2010 8:56:33 AM