Quick and easy SSH key installation.

  crypto howto keys ssh sysadmin

I know I haven't posted much this month.  The holiday season is in full effect and life, as I'm sure you know, has been crazy.  I wanted to take the time to throw a quick tip up that I just found out about which, if nothing else, will make it easier to get up and running on a Raspberry Pi that you've received as a gift.  Here's the situation:

You have a new account on a machine that you want to SSH into easily.  So, you want to quickly and easily transfer over one or more of your SSH public …

Read more...

AR contact lenses and 3D printed handcuff keys.

  augmented_reality clatter contact_lenses designs displays fabrication graphics handcuffs keys optics reprap

It’s long been a trope of science fiction where one of the characters has the capacity for superhuman access to data in realtime, usually through prosthetic eyes that incorporate heads-up displays that make geospatial coordinates and targeting information available without the distraction of having to look down at a monitor of some kind. In point of fact, this isn’t anything particularly new. Fighter jets like the FA-18 have long had transparent monitors positioned directly in the pilot’s field of vision that incorporate much of the information of the instruments on the panel. Players of first-person shooters like …

Read more...

Diebold's had more than three strikes against it by now...

  computers diebold keys lockpicking politics pwned

Why don't they just give up on Dibold's e-voting machines? They're already been proven insecure and unauditable beyond the shadow of a doubt. They've already compromised the hardware and software in an undetectible manner. The keys to the locks can be freely purchased online... or fabricated by hand because Diebold put an image of the master key on their website. Because the locks used on the Diebold electronic voting machines are the same ones used on many filing cabinets (the locks of which can be purchased in many hardware and office supply stores), it wasn't hard for Kinard of the …

Read more...

Random knowledge VIII.

  aging alerts authentication certificates colleagues dating debian firewalls friends ibm iptables keys linux logging openssh pencams pkgconfig protocols redhat rpm signatures snort software ssh stv0680 titles women work xft

You're getting old if you consider sleeping until 0900 'sleeping in'.



When configuring a firewall with IPTables you have to specify the protocol before the port number(s) in each command. Do this:

iptables -A INPUT -s 1.2.3.4 -p tcp --dport 22 -j ACCEPT

and not this

iptables -A INPUT -s 1.2.3.4 --dport 22 -p tcp -j ACCEPT

If you don't, you'll see error messages to the effect of "Unknown arg '--dport'"

When writing Snort rules, there are a few things to keep in mind. First of all, rules come in two parts: the …

Read more...

Random knowledge II.

  bootdisks busted cars configuration crypto dell directions drinking drives erasing hacking kernels keys linux manuals navigation partitions ports problems screensavers serial shells sun tools wi_fi wireless

If you turn on the Xscreensaver module called Sonar while you're running a packet monitoring application (such as TCPdump), people are less likely to think you're doing anything shady, because "Only hacker tools don't have GUIs." Always hack your shell's personal configuration file (~/.bash_profile, for example) to change your shellprompt if you use GNU screen. That way you can tell what shells you've left open are single-access shells and which shells are multiplexed through a single connection with screen. It can get confusing sometimes. Because a shell run inside a GNU screen metaterminal sets an environment variable called $WINDOW, you …

Read more...