3 liens privés
I had problems with getting an old amd64 system boot from USB using miniroot58.fs as biosboot(8) aborted with ERR M. My only remaining option was to get PXE working.
I've been using OpenBSD since way back at release 2.3 in 1998, so I've gone through upgrades that took a fair amount of work due to incompatible changes, like the switch from ipf to pf for host firewalling or the change to ELF binaries.
Predictable SSH host keys
This report summarizes the results of that security analysis. As well as uncovering possible vulnerabilities, the aim was also to point out possible areas for improvement during any future developments of the program.
How do I install rsnapshot a filesystem snapshot utility based on rsync on my FreeBSD server to backup my local/remote Linux and Unix-based desktop, server and laptop system?
GnuPG is the de-facto way to use OpenPGP compliant smart cards. However in order to use the card for anything other than GPG (and SSH), e.g. TLS Client authentication, PKCS#11 is the industry standard used by all other non-GPG software.
pledge(), a new mitigation mechanism
As discussed in part 1 of this series, Docker can rightly be classified as a type of mini-host. Just like a regular host, it runs work on behalf of resident software, and that work uses CPU, memory, I/O, and network resources. However, Docker containers run inside cgroups which don't report the exact same metrics you might expect from a host. This article will discuss the resource metrics that are available. The next article in this series covers three different ways to collect Docker metrics.
Sudo (su "do") allows a system administrator to delegate authority to give certain users (or groups of users) the ability to run some (or all) commands as root or another user while providing an audit trail of the commands and their arguments.
Il y a quelques temps j'ai fait un screencast sur Youtube, où je présentais comment cracker un mot de passe windows avec Offline Empty Password Registry Editor.
Valable pour la série, windows XP/Vista et 7.
Dans cet article, je clamais mon ras le bol sur les controverses qui gangrénaient de plus en plus la philosophie du hacking -- au sens originel -- que l'on trouvait au sein des communautés linuxiennes. J'avais décidé de ne plus utiliser, volontairement, un de ces systèmes et de confier mes machines au vénérable système d'exploitation qui pique, à savoir OpenBSD.
Parfois, certains serveurs sont là depuis tellement longtemps qu’on n’y prête même plus attention. Et pourtant, il arrive qu’ils fassent tourner des applications assez sensible, parfois même critique.
BEURK is an userland preload rootkit for GNU/Linux, heavily focused around anti-debugging and anti-detection.
Http2: why the web is upgrading? - bdx.io 2015
Disponibles directement sur internet, utilisant de plus en plus du code partagé et traitant bien souvent des données sensibles (données bancaires, données clients…), les applications web sont devenues une cible privilégiée d’attaques pour les cybercriminels. Explications.
Email perfectly embodies the spirit of the internet: independent mail hosts exchanging messages, no host more or less important than any other. Joining the network is as easy as installing Sendmail and slapping on an MX record.
A list of XMPP servers available as hidden services for use with the Prosody server and mod_onions
Switching to systemd-networkd for managing your networking interfaces makes things quite a bit simpler over standard networking scripts or NetworkManager. Aside from being easier to configure, it uses fewer resources on your system, which can be handy for smaller virtual machines or containers.
Si vous êtes sous Linux et que vous voulez être absolument certain que l'intégralité de votre trafic passe par le réseau Tor, voici Nipe, un script Perl imaginé par Heitor Gouvea.
There have been rumors for years that the NSA can decrypt a significant fraction of encrypted Internet traffic. In 2012, James Bamford published an article quoting anonymous former NSA officials stating that the agency had achieved a “computing breakthrough” that gave them “the ability to crack current public encryption.”