computers are no way perfect: the rise of the machines: who is scared of killer robots? who is scared of doctors, judges and police blindly trusting in AI and computer output? “we are driving in (heavy) rain right now with […]
… because one also cares about beauty… a default avatar picture is not an option… but phpBB has a very strict 6KBytes max file size limit for Profile Avatar Pictures… which is almost impossible to reach with format.jpg or format.png […]
some gui programs like gparted (very nice harddisk partitioning program) won’t start as root. hostnamectl; # tested on Operating System: Debian GNU/Linux 10 (buster) Kernel: Linux 4.19.0-13-amd64 Architecture: x86-64 su – root; # become root gvim; # fails with E233: […]
to recover the data: how to mount luks2 encrypted volume possibility: remove harddisk, attach to sata2usb adapter, then mount on different machine like this: # unlock encrypted harddisk udisksctl unlock -b /dev/sdb5 udisksctl mount -b /dev/mapper/ubuntu–vg-root Mounted /dev/dm-1 at /media/dpm/e8cf82c0-f0a3-41b3-ab28-1f9d23fcfa72 […]
in short: STAY AWAY FROM IT! all in all this mp3 player is a waste of resources and the user’s time (unless someone comes along and fixes the firmware X-D (but the playback problem could also be “in hardware”)) what […]
first some praise: the maintainers of grub did their best they could to bring about a great piece of software, no doubt about that. the question is: could less be more? when Greg Kroah-Hartman suggested to get rid of the […]
this age of mass surveillance… … who is observing “the observers”? guess with it-security and internet-security (internet = roads, cars = computers that users use every day) it is like with real-life-security – there is no 100% security. all users […]
Warning! This is probably not THE best solution and rather a dirty hack. Updates only should come via yum package manager and official repositories. After update, Telegram stops working. first thing one does is open up a terminal, and try […]
Adding new fonts for all users To install fonts for all users for example the boring company font: https://www.futurafree.com/wp-content/uploads/2017/04/futura-bold.zip one need to login as root and create a directory under /usr/share/fonts/ # tested on hostnamectl Static hostname: centos.localdomain Chassis: laptop […]
Another reason to NOT trust EVERY human task to machines… unless one wants to get killed by a robot dressed up as dinosaur. “great” X-D “Japanese travel agent H. I. S. Group ignored warnings about a vulnerability in its Tapia […]
what IT can learn from nature: (src) mostly US users affected. Big Business: Big Companies and Big Money can afford Big Staff to maintain and secure their products, but they also provide Big Infrastructure (AWS, Office) and thus a single […]
Warum VoIP? Viele Anbieter von LTE z.B. bieten gar keine Festnetz-Telefonie an, sondern nur Internet. (das zum Teil (nicht günstiger) aber schneller (und schnurloser via Handy-Netz) als die Telekom (4G/LTE/UMTS)). D.h. man braucht dann noch einen weiteren Anbieter der die […]
Pwn2Own 2020: opening a pdf can be enough to compromise system! https://youtu.be/u1udr7j9MQA?t=359 thank you ccc you are doing a lovely work – make this planet more interesting by creativity and more informed about security 🙂 keep it up 🙂 https://cdn.media.ccc.de/events/gpn/gpn19/h264-hd/gpn19-45-eng-BADPDF_-_Stealing_Windows_Credentials_via_PDF_Files_hd.mp4 […]
scroll down for ENGLISH: ) OMG! Da die IT von Baltimore sich einen Ransome-Virus eingefangen hat, können die Bürger ihre Steuern und ihre Blitzer-Tickets nicht zahlen! Wunderbar! 🙂 Mit welchem Aufwand man rechnen muss, wenn man sich von der Digitalisierung […]
tested on: CentOS Linux 7 with Kernel: 3.10.0-957 with cifs-utils.x86_64 version: 6.2-10.el7 when you ping the host (in this case a QNAP NAS) you – as the administrator – quickly realize – the host is up. but samba client (cifs […]
google’s security lab “project zero“ has made itself a name. (you can subscribe to their rss feed with thunderbird.) Posted by Ben Hawkes, Project Zero (team lead) (2019-05-15) Project Zero’s team mission is to “make zero-day hard”, i.e. to make […]
“The cost to companies from malware and “malicious insider”-related cyberattacks jumped +12 percent in 2018 and accounted for one-third of all cyberattack costs, according to new research published today by Accenture and the Ponemon Institute.” src: helpnetsecurity.com logical consequence: stop […]
as always… you should tweak your /etc/ssh/sshd_config for security only allow password auth temporarily and only use public-key auth. it is easy to setup and no brute-force attack in this world can hack your server. when you start to edit: […]
Update: 2020.03 “The newly developed Rowhammer- attack TRRespass can crack the RAM-a security mechanism by many DDR4-DRAM-modules as well as LPDDR4 Chips. Until now, these were considered to be almost immune to Rowhammer attacks.” https://www.com-magazin.de/news/sicherheit/software-hammer-ram-schutz-attackiert-2515621.html Update: 2019.10 Zombieload is back. […]
warning: this only works if you have a gui/gnome installed. thanks goes to this superb tutorial with screenshots: http://xmodulo.com/debug-program-nemiver-debugger.html For Debian based distributions, it should be pretty straightforward: apt-get install nemiver; # Debian and Ubuntu pacman -S nemiver; # For […]
while test running debian linux journald uses almost 100% cpu… “The daemon will implicitly collect numerous metadata fields for each log messages in a secure and unfakeable way. See systemd.journal-fields(7) for more information about the collected metadata.” https://www.freedesktop.org/software/systemd/man/systemd-journald.service.html systemd: Using […]
src: https://homepage.cs.uri.edu/~thenry/resources/unix_art/ch01s07.html The Unix philosophy emphasizes building simple, short, clear, modular, and extensible code that can be easily maintained and repurposed by developers other than its creators. The Unix philosophy favors composability as opposed to monolithic design. Later summarized by […]
It is actually a scandal that the world depends on chips and operating systems – that are designed to do mass-surveillance – it seems – in order to build up a world-wide-dictatorship that no-one can escape… by information and money. […]
you now should be able to login: https://192.168.1.1 Benutzername: admin Passwort: mGuard
less is more (security) run as little software as you absolutely need – uninstall/disable all services you don’t need. less software = less lines of mistaken code = less security flaws. if you need a software or service run it […]
update: 2020-09: problems getting bigger without regular updates because a SmartPhone (no matter Android/Samsung or IOS/Apple based) are essentially complete “notebook computers” with a very very small form factor directly or NAT (NAT better to avoid direct attacks, but no […]
… eigentlich müsste man echt die ganze Gesellschafts-Software überdenken… inklusive ihrer Kommunikationswege. Und an einem grossen Ganzen arbeiten… welches die Rechte des kleinen Schützt… und Monopole verhindert. Hier die Spam mail: Betreff: “500% Rendite in einem Tag??! Hier ein exklusiver […]
http://livecdlist.com/ offers a long set of isos or links to isos for download. a nice service. thank you! Home :: About Name Min Size Max Size Purpose Last Release Arch Linux 742 742 [OS Installation] [Rescue] 2016-08 Tails 1098 […]
unfortunately things got changed in debian – but should also be valid throughout Debian 8.X. udev rules, persistent… whatever. why do people have to change stuff that actually works? it seems i am not the only one having this problem: […]