Apr 212012
 

Thanks to Edmond, i’ve found a new and interesting online service shelr.tv.
Shelr.tv allows you to record something interesting from your terminal and share it to your followers.

It is almost the same thing as YouTube but for plain text shellcasts. You can copy and paste everything you see.
The nice thing is that you can play the shellcasts back directly on your terminal or in a browser from their website, and when uploading them you can decide to make them public or private. Continue reading »

Flattr this!

Apr 172012
 

In my work I’ve not used “Expect” many times, but to do some jobs I’ve learnt how to use it, and I must say that to complete some tasks this program can help a lot and be a valid alternative to more complex solutions, like a complete program in python, php or your favorite scripting program.

But first a description of expect taken from his man page:

Expect is a program that “talks” to other interactive programs according to a script. Following the script, Expect knows what can be expected from a program and what the correct response should be. An interpreted language provides branching and high-level control structures to direct the dialogue. In addition, the user can take control and interact directly when desired, afterward returning control to the script.

In this article I’ll show you 2 examples on how to use it, to connect to a remote server via ssh and issue a command, to change the password of a user with the command passwd.

Continue reading »

Flattr this!

Apr 052012
 

While reading an interesting Blog I discovered a new treasure: TRESOR, in short TRESOR is a secure implementation of AES which is resistant against cold boot attacks and other attacks on main memory.

If like me you wonder what a cold boot attack is, Princeton University can help us :

Contrary to popular assumption, DRAMs used in most modern computers retain their contents for seconds to minutes after power is lost, even at operating temperatures and even if removed from a motherboard. Although DRAMs become less reliable when they are not refreshed, they are not immediately erased, and their contents persist sufficiently for malicious (or forensic) acquisition of usable full-system memory images. This phenomenon limits the ability of an operating system to protect cryptographic key material from an attacker with physical access. We use cold reboots to mount attacks on popular disk encryption systems — BitLocker, FileVault, dm-crypt, and TrueCrypt — using no special devices or materials. We experimentally characterize the extent and predictability of memory remanence and report that remanence times can be increased dramatically with simple techniques.

Continue reading »

Flattr this!

Apr 042012
 

For a customer i was in need of a quick way to send an email every time his system (centos) stop, reboot or simply boot.
I’ve found an useful article http://www.syntaxtechnology.com and most of this article is based on that.

To get an email at both start up and shut down we need to write an init script. The tips below are specific to a Red Hat based system (Red Hat, Fedora, CentOS, etc) but should be fairly similar to others, depending on the boot system you’ll have to change slightly the script.
Continue reading »

Flattr this!

Mar 312012
 

I just discovered that today it’s the world backup day, and with the slogan on the webpage: “DON’T BE AN APRIL FOOL. BACKUP YOUR FILES. CHECK YOUR RESTORES.” they remember that is always a good habit to have 1 (or more) backup of our important data.

But in the days of social network, cloud computing and emails always left on remote servers, where are all our information and how we can save them securely ?
Continue reading »

Flattr this!