Oct 202014


Guest post by Richard Larson

Linux often seems like a breath of fresh air to Windows users. It’s free. It doesn’t have bloatware issues. You don’t have to pay for it. It has less malware and hacking issues because it’s less profitable and productive for the baddies to concentrate on an operating system with less users.

Did I mention it doesn’t cost anything?

Whatever the reason Linux looks good to you, you have to remember that Linux and Windows are two different animals. Windows is far more professionally polished and noob friendly. (It has to be. You paid for it.) While there are a few supported versions of Windows floating around, most users stick with the one that comes with their machines. On the hand, Linux has so many distributions, it’s hard to keep track sometimes. From the way you install programs to the amount of time you spend in a command prompt screen, it’s a different experience. Whether it’s a good experience or not depends on your preference.

Continue reading »

flattr this!

Oct 122014

Article by Mikko Ohtamaa first posted on his blog

Often you want to automatize something using shell scripting. In a perfect world your script robot works for you without getting tired, without hick-ups, and you can just sit at the front of your desk and sip coffee.


Then we enter the real world: Your network is disconnected. DNS goes downs. Your HTTP hooks and downloads stall. Interprocess communication hangs. Effectively this means that even if your script is running correctly from the point of operating system it won’t finish its work before you finish your cup of coffee.

Continue reading »

flattr this!

Oct 092014

Article by Charles McColm first published on FullCircle, issue 88

Physical media is cumbersome.
If you own a lot of DVDs, Blueray discs, VHS, or, gasp!, Discovision (circa 1978), you know how ugly it looks stored in your living room by your entertainment system. Digital media is hot for its portability between devices. Ripping DVDs is a fairly simple process and there are lots of guides around that show how to install and rip movie DVDs using Handbrake. But what about those multi-movie DVDs or DVDs with multiple episodes of a television show? Handbrake can rip those too and the process is fairly simple.

Continue reading »

flattr this!

Sep 302014

Article by Daniel Miessler first posted on his blog

lsof is the sysadmin/security über-tool. I use it most for getting network connection related information from a system, but that’s just the beginning for this powerful and too-little-known application. The tool is aptly called lsof because it “lists openfiles“. And remember, in UNIX just about everything (including a network socket) is a file.

Interestingly, lsof is also the Linux/Unix command with the most switches. It has so many it has to use both minuses andpluses.

usage: [-?abhlnNoOPRstUvV] [+|-c c] [+|-d s] [+D D] [+|-f[cgG]]
 [-F [f]] [-g [s]] [-i [i]] [+|-L [l]] [+|-M] [-o [o]]
 [-p s] [+|-r [t]] [-S [t]] [-T [t]] [-u s] [+|-w] [-x [fl]] [--] [names]

As you can see, lsof has a truly staggering number of options. You can use it to get information about devices on your system, what a given user is touching at any given point, or even what files or network connectivity a process is using.

For me, lsof replaces both netstat and ps entirely. It has everything I get from those tools and much, much more. So let’s look at some of its primary capabilities:

Continue reading »

flattr this!

Sep 292014

The most new and dangerous bug around it’s the one called “shellshock”, this is a security bug in the widely used Unix Bash shell which was disclosed on 24 September 2014. Many Internet daemons, such as web servers, use Bash to process certain commands, allowing an attacker to cause vulnerable versions of Bash to execute arbitrary commands. This can allow an attacker to gain unauthorized access to a computer system.

The bug causes Bash to unintentionally execute commands when they are stored in specially crafted environment variables. Within days, a series of further related vulnerabilities in Bash were found, leading to the need for further patches.

By 25 September, botnets based on computers compromised with this exploit were being used by attackers for distributed denial-of-service attacks and vulnerability scanning, source wikipedia

Let’s see how to check if your computer or server is vulnerable.
Continue reading »

flattr this!