this script is intended for long term testing of reliability of network connection/connectivity it should quit after 24hours and thus not spamming the logs the script: #!/bin/bash # $1 = ip to test # $2 = how many hours to […]
“In June of this year, “Ripple20” (not only) shook the Internet of things: 19 vulnerabilities in a TCP/IP Stack for Embedded devices made “hundreds of millions” devices vulnerable, according to their discoverers. Now, Stack analysis by another team of researchers […]
Overview Recent 360Netlab unknown threat detection system to capture to a group of unknown malicious families of the sample, which a number of samples supported CPU architectures are x86(32/64), ARM(32/64), MIPS(MIPS32/MIPS-III) as well as PPC, after our analysis, which is […]
“Better Than Nothing” Starlink-Beta started across the US & Canada Starlink: amazing but and also a bit “crazy” “On 15 October 2019, the United States Federal Communications Commission submitted filings to the International Telecommunication Union on SpaceX’s behalf to […]
Connection refused nothing has changed on server or client side so was the server hacked? NO! the solution is way more simple: the guest wifi might block ssh traffic give it a try: if not even telnet can get at […]
JavaScript can compromise the user’s network devices! pretty evil are devices/routers with security problems, that can be exploited from javascript. so basically opening a webpage with a browser that has javascript enabled (which most browsers have) might scan the user’s […]
the idea is: ssh is running on 22 what if user can connect localport 2222<->22 and user can then connect to localport:2222 and it will be forwarded to localport:22? and YES IT IS POSSIBLE 🙂 which the massively complex socat: […]
guess with it-security and internet-security (internet = roads, cars = computers that users use every day) it is like with real-life-security – there is no 100% security. all users of a system are in constant potential danger of having an […]
it is nice to get an graphical overview what wifi wlan networks access points one is surrounded by. also good to know what direction to point antenna/laptop to have best reception. because this allows to fine-tune what channel best to […]
probably THE most important film, that every school kid (of the age of 16) should have seen (highly recommend to cut out the violent scenes) 1984 mass surveillance: for a better world? as people might have noticed: privacy is survival […]
hostnamectl; # tested on Icon name: computer-desktop Chassis: desktop Operating System: Debian GNU/Linux 10 (buster) Kernel: Linux 4.19.0-8-amd64 Architecture: x86-64 su – root; # become root apt update apt install rfkill rfkill list all 0: phy0: Wireless LAN Soft blocked: […]
firewall & pinguin: iptables where do thou go? it is said that when using “ip-sets” iptables and nftables achieve almost same performance (amounts of ips possible to block, without server becoming slow/unresponsive) Redhat and nftables on DDoS “so the only […]
wishes for next year: free wifi for eels (and other creatures) Why does EVERYONE have to run their own WIFI / pay their OWN internet access? When it would be enough to have one fast internet access plus 2-3x WIFI […]
every once and a while… laptops and notebooks run out of battery… and when one manages to plug them in just 1% before stalling… the wifi on Debian might already be in hibernation and hardware on off does not help […]
about MAC address(es) not every switch has an IP assigned (if it has no web management interface, it does not need to) but it will have a MAC address. MAC address are per vendor and per device unique identifiers that […]
just reinstalled (of course with LVM + encrypted partition) the giada f300 (very fine machine unfortunately “they” stopped building it). screw Realtek, what one wants is should work out of the box with recent Linux kernels on Open Source drivers […]
what IT can learn from nature: (src) mostly US users affected. Big Business: Big Companies and Big Money can afford Big Staff to maintain and secure their products, but they also provide Big Infrastructure (AWS, Office) and thus a single […]
bc is a nice calculator that one can use under linux terminal. a good exercise: count from 0 to 255 and convert it to binary # install # debian/ubuntu apt install bc # fedora/redhat/centos yum install bc # run bc […]
Why is quantum computing important: optimization Update: Google claims to have reached quantum supremacy The tech giant unveiled its x-quantum computer chip Bristlecone in March 2018 (src: cnet) original nasa paper: https://drive.google.com/file/d/19lv8p1fB47z1pEZVlfDXhop082Lc-kdD/view book: https://deepai.org/machine-learning/researcher/eleanor-g-rieffel https://www.amazon.com/Quantum-Computing-Introduction-Engineering-Computation/dp/0262015064 Scott’s Supreme Quantum Supremacy FAQ! […]
Warum VoIP? Viele Anbieter von LTE z.B. bieten gar keine Festnetz-Telefonie an, sondern nur Internet. (das zum Teil (nicht günstiger) aber schneller (und schnurloser via Handy-Netz) als die Telekom (4G/LTE/UMTS)). D.h. man braucht dann noch einen weiteren Anbieter der die […]
it might sound strange… and even if it sucks, but if you are concerned about security, call me paranoid but: your company’s critical infrastructure SHALL NOT BE REACHABLE BY WIFI! (especially not if you are running a nuclear power plant, […]
the similarity is startling. They could be clones! (they probably are) except: D-Link is from Taiwan (still not China) and TP-Link is from Shenzen China bought recently 3x of the TP-Link 108 and can confirm they are doing a great […]
also roaming within the “(more or less)United States of Europe” (EU) is pretty scary endavor. If you travel across the EU and wish to use your home mobile phone number – you will NEVER know what this phone call or […]
servers/clients/computers/programs/services/webservers need accurate time… they usually get it from time servers that have an atomic clock attached to their USB port. (just guessing) ping time.google.com PING time.google.com (216.239.35.4) 56(84) bytes of data. 64 bytes from time2.google.com (216.239.35.4): icmp_seq=1 ttl=46 time=43.5 […]
tested on: CentOS Linux 7 with Kernel: 3.10.0-957 with cifs-utils.x86_64 version: 6.2-10.el7 when you ping the host (in this case a QNAP NAS) you – as the administrator – quickly realize – the host is up. but samba client (cifs […]
IPv6: Introduction it’s the year 2019, roughly 14% of the web is running ipv6. you can watch real time statistics here: (i have no clue how accurate the data is, how they are generated) https://ipv6.he.net/v4ex/sidebar/? … but it seems there […]
firewall & pinguin: iptables where do thou go? it is said that when using “ip-sets” iptables and nftables achieve almost same performance (amounts of ips possible to block, without server becoming slow/unresponsive) Redhat and nftables on DDoS “so the only […]
sometimes you just want to listen to incoming traffic… not the noise that your machine generates: # checkout what mac your NIC has ip addr show; ifconfig -a; # filter it in wireshark not eth.addr==28:d2:XX:XX:XX:XX
CentOS8: ccze author not willing to maintain ccze. no ccze and not even lnav available. how to monitor all logs… https://dwaves.de/2017/06/15/linux-monitor-all-logs-in-real-time-d-follow-all-show-changes-to-log-files-under-varlog/ as i was wondering what combination of less -R with or without ccze would allow me to view log […]
Linux is pretty hardware independent, so most of the time you can just 1:1 clone/move harddisk to new machine and in 99% of cases it will just boot. make sure – target (new) machine’s harddisk is same or bigger size […]