Tag: keys

  1. Quick and easy SSH key installation.

    28 December 2017

    I know I haven't posted much this month.  The holiday season is in full effect and life, as I'm sure you know, has been crazy.  I wanted to take the time to throw a quick tip up that I just found out about which, if nothing else, will make it easier to get up and running on a Raspberry Pi that you've received as a gift.  Here's the situation:

    You have a new account on a machine that you want to SSH into easily.  So, you want to quickly and easily transfer over one or more of your SSH public …

    Read more...

  2. AR contact lenses and 3D printed handcuff keys.

    18 September 2009

    It’s long been a trope of science fiction where one of the characters has the capacity for superhuman access to data in realtime, usually through prosthetic eyes that incorporate heads-up displays that make geospatial coordinates and targeting information available without the distraction of having to look down at a monitor of some kind. In point of fact, this isn’t anything particularly new. Fighter jets like the FA-18 have long had transparent monitors positioned directly in the pilot’s field of vision that incorporate much of the information of the instruments on the panel. Players of first-person shooters like …

    Read more...

  3. Diebold's had more than three strikes against it by now...

    26 January 2007

    Why don't they just give up on Dibold's e-voting machines? They're already been proven insecure and unauditable beyond the shadow of a doubt. They've already compromised the hardware and software in an undetectible manner. The keys to the locks can be freely purchased online... or fabricated by hand because Diebold put an image of the master key on their website. Because the locks used on the Diebold electronic voting machines are the same ones used on many filing cabinets (the locks of which can be purchased in many hardware and office supply stores), it wasn't hard for Kinard of the …

    Read more...

  4. Random knowledge VIII.

    25 January 2007

    You're getting old if you consider sleeping until 0900 'sleeping in'.



    When configuring a firewall with IPTables you have to specify the protocol before the port number(s) in each command. Do this:

    iptables -A INPUT -s 1.2.3.4 -p tcp --dport 22 -j ACCEPT

    and not this

    iptables -A INPUT -s 1.2.3.4 --dport 22 -p tcp -j ACCEPT

    If you don't, you'll see error messages to the effect of "Unknown arg '--dport'"

    When writing Snort rules, there are a few things to keep in mind. First of all, rules come in two parts: the …

    Read more...

  5. Random knowledge II.

    25 January 2007

    If you turn on the Xscreensaver module called Sonar while you're running a packet monitoring application (such as TCPdump), people are less likely to think you're doing anything shady, because "Only hacker tools don't have GUIs." Always hack your shell's personal configuration file (~/.bash_profile, for example) to change your shellprompt if you use GNU screen. That way you can tell what shells you've left open are single-access shells and which shells are multiplexed through a single connection with screen. It can get confusing sometimes. Because a shell run inside a GNU screen metaterminal sets an environment variable called $WINDOW, you …

    Read more...