DNS servers are the “yellow pages” “phone book” of the internet. whoever is running DNS servers get’s to know all queries send (what client is requesting and probably connecting to what address… basically: what websites the user have visited, this […]
Overview Recent 360Netlab unknown threat detection system to capture to a group of unknown malicious families of the sample, which a number of samples supported CPU architectures are x86(32/64), ARM(32/64), MIPS(MIPS32/MIPS-III) as well as PPC, after our analysis, which is […]
“Better Than Nothing” Starlink-Beta started across the US & Canada Starlink: amazing but and also a bit “crazy” “On 15 October 2019, the United States Federal Communications Commission submitted filings to the International Telecommunication Union on SpaceX’s behalf to […]
Connection refused nothing has changed on server or client side so was the server hacked? NO! the solution is way more simple: the guest wifi might block ssh traffic give it a try: if not even telnet can get at […]
JavaScript can compromise the user’s network devices! pretty evil are devices/routers with security problems, that can be exploited from javascript. so basically opening a webpage with a browser that has javascript enabled (which most browsers have) might scan the user’s […]
the idea is: ssh is running on 22 what if user can connect localport 2222<->22 and user can then connect to localport:2222 and it will be forwarded to localport:22? and YES IT IS POSSIBLE 🙂 which the massively complex socat: […]
this age of mass surveillance… … who is observing “the observers”? guess with it-security and internet-security (internet = roads, cars = computers that users use every day) it is like with real-life-security – there is no 100% security. all users […]
it is nice to get an graphical overview what wifi wlan networks access points one is surrounded by. also good to know what direction to point antenna/laptop to have best reception. because this allows to fine-tune what channel best to […]
scroll down and behave! (slaves of digital dictatorships) short version summary of 1984: short version: 1984 needs to be avoided at any cost. because: it is evil. (Google did not drop it’s motto “don’t be evil” for nothing) in essence: […]
hostnamectl; # tested on Icon name: computer-desktop Chassis: desktop Operating System: Debian GNU/Linux 10 (buster) Kernel: Linux 4.19.0-8-amd64 Architecture: x86-64 su – root; # become root apt update apt install rfkill rfkill list all 0: phy0: Wireless LAN Soft blocked: […]
firewall & the GNU-Linux Pinguin: firewalls: where do thy go? and does thee protect from DDoS? as always in software development and as always in GNU Linux, there is not “one” firewall system, no, there are many and it is […]
wishes for next year: free wifi for eels (and other creatures) Why does EVERYONE have to run their own WIFI / pay their OWN internet access? When it would be enough to have one fast internet access plus 2-3x WIFI […]
every once and a while… laptops and notebooks run out of battery… and when one manages to plug them in just 1% before stalling… the wifi on Debian might already be in hibernation and hardware on off does not help […]
about MAC address(es) not every switch has an IP assigned (if it has no web management interface, it does not need to) but it will have a MAC address. MAC address are per vendor and per device unique identifiers that […]
forget about all other wifi adapters, get the Edimax Technology Co., Ltd EW-7612UAn V2 802.11n Wireless Adapter [Realtek RTL8192CU] as long as it’s produced… it just works out of the box on almost any GNU Linux distro including raspberry pi […]
what IT can learn from nature: (src) mostly US users affected. Big Business: Big Companies and Big Money can afford Big Staff to maintain and secure their products, but they also provide Big Infrastructure (AWS, Office) and thus a single […]
bc is a nice calculator that one can use under linux terminal. a good exercise: count from 0 to 255 and convert it to binary # install # debian/ubuntu apt install bc # fedora/redhat/centos yum install bc # run bc […]
Why is quantum computing important: optimization Update: Google claims to have reached quantum supremacy The tech giant unveiled its x-quantum computer chip Bristlecone in March 2018 (src: cnet) original nasa paper: https://drive.google.com/file/d/19lv8p1fB47z1pEZVlfDXhop082Lc-kdD/view book: https://deepai.org/machine-learning/researcher/eleanor-g-rieffel https://www.amazon.com/Quantum-Computing-Introduction-Engineering-Computation/dp/0262015064 Scott’s Supreme Quantum Supremacy FAQ! […]
Warum VoIP? Viele Anbieter von LTE z.B. bieten gar keine Festnetz-Telefonie an, sondern nur Internet. (das zum Teil (nicht günstiger) aber schneller (und schnurloser via Handy-Netz) als die Telekom (4G/LTE/UMTS)). D.h. man braucht dann noch einen weiteren Anbieter der die […]
it might sound strange… and even if it sucks, but if you are concerned about security, call me paranoid but: your company’s critical infrastructure SHALL NOT BE REACHABLE BY WIFI! (especially not if you are running a nuclear power plant, […]
the similarity is startling. They could be clones! (they probably are) except: D-Link is from Taiwan (still not China) and TP-Link is from Shenzen China bought recently 3x of the TP-Link 108 and can confirm they are doing a great […]
also roaming within the “(more or less)United States of Europe” (EU) is pretty scary endavor. If you travel across the EU and wish to use your home mobile phone number – you will NEVER know what this phone call or […]
have seen DELL Notebooks that refused to boot unless F2 is pressed when the CMOS battery (that is not easily replaceable often 🙁 runs out of capacity… #wtf seriously??? nothing should depend on date and time… because if it does, […]
the best about samba: thanks for samba, it provides users with a fast (of course depends also on harddisk speed) rock-solid no-limit-to-maximum-users file-server for maximum file-transfer-and-sharing-and-storage productivity (and they will USE that T: temp drive for EVERYTHING! prepare for TERRABYTES […]
IPv6: Introduction it’s the year 2019, roughly 14% of the web is running ipv6. you can watch real time statistics here: (i have no clue how accurate the data is, how they are generated) https://ipv6.he.net/v4ex/sidebar/? … but it seems there […]
firewall & pinguin: iptables where do thou go? it is said that when using “ip-sets” iptables and nftables achieve almost same performance (amounts of ips possible to block, without server becoming slow/unresponsive) Redhat and nftables on DDoS “so the only […]
sometimes you just want to listen to incoming traffic… not the noise that your machine generates: # checkout what mac your NIC has ip addr show; ifconfig -a; # filter it in wireshark not eth.addr==28:d2:XX:XX:XX:XX it’s not just a tool…. […]
CentOS8: ccze author not willing to maintain ccze. no ccze and not even lnav available. how to monitor all logs… https://dwaves.de/2017/06/15/linux-monitor-all-logs-in-real-time-d-follow-all-show-changes-to-log-files-under-varlog/ as i was wondering what combination of less -R with or without ccze would allow me to view log […]
Linux is pretty hardware independent, so most of the time you can just 1:1 clone/move harddisk to new machine and in 99% of cases it will just boot. make sure – target (new) machine’s harddisk is same or bigger size […]
basically the advanced version of PiHole. WARNING! THIS IS not a complete OPNSense / PFSense tutorial it is rather just to get started. right now, one is (still) using iptables without any gui. there seems to be a lot of […]




























