Place Holder Products Code
Bash MySQL
Notes Return of the Fed Login
Admin Control Panel Email Control Panel Product Control Panel Debug Info Beacon Create Snippet Tag Control Panel

m7c1

Much by way of discourse, some by way of advice; security from Clausewitz to Fancy Bear.
Linux Environment Setup 0x02
Linux Environment Setup 0x02

Today we'll continue setting up a Linux environment which is reminiscent of OS X, while being very very speedy, and anti-mouse - the way computing should be.  We'll base this on a clean installation of Debian 10 without a GUI (which we covered in part 0x01 of this series), and proceed to setup and the i3 window manager, the Terminator terminal, the application launcher Kupfer, and set zsh to be our default shell.  At the end of the tutorial series, we'll have an speedy interface that looks something like the image below, which is my daily driver.  This flies on an SSD and 10 year old hardware!

Posted by Will - November 17th '19
Linux Environment Setup 0x01
Linux Environment Setup 0x01

Welcome to part 0x01 of our multi-part tutorial on setting up a speedy, usable Linux environment!  A little background first.  Linux is a free and open source operating system originally designed by Linus Torvalds.  Today, it comes in many 'flavors'.  Debian is the flavor that underpins the popular Ubuntu and Mint distributions, and is associated with perhaps the best known package (or software) repository which can be interacted with using the aptitude package manager, or apt.  Other flavors include RedHat, Arch and SUSE.

Posted by Will - November 10th '19
Buffer Overflow 0x01
Buffer Overflow 0x01

A buffer overflow is one of the oldest tricks in the book.  The NSA was performing them in the 70s, and they continue to be a problem today.  As we'll explore here, they result from an interaction between inappropriate assumptions and the way modern operating systems function.  In this tutorial, we'll cover a very simple example of how the execution of a poorly coded program can be subverted to give control over the system it's running on.

Posted by Will - October 24th '19
Forks
Forks

This is a 'fork bomb':

:(){ :|: & };:

In bash (and probably bash-like shells) this declares a function named :, and defines that function as a call to itself, piped into a call to itself, which is then forked.  The result is endless forking of a non-terminating program that calls itself twice per call.  The last : initiates the bomb.

Posted by Will - January 21st '19
(Ab)using Tor to circumvent GDPR
(Ab)using Tor to circumvent GDPR

    Situation: I'm in the EU, living under its Big State ethos and enduring its General Data Protection Regulation (GDPR). Web presences with an EU market have largely complied in some fashion, but many without have simply denied access to requests appearing to originate in the EU. I wanted to read an article on a site in the second category.You'll need tor and a proxy. I use privoxy.

Posted by Will - September 26th '18

Search

Popular Posts