background preloader

Ari_dann

Facebook Twitter

How Do I Find The Largest Top 10 Files and Directories On a Linux / UNIX / BSD? White-Hat News. R-Pi Troubleshooting. Back to the Hub. This page lists the most common problems and suggests some solutions. See RPi_Bugs for problems that are bugs. Power / Start-up Note: if you have any kind of booting problems, start off by reading the "Is your Pi not booting? A good power supply that will supply 5 volts and at least 1 amp (5V 1A) is vital. Note that the Pi has no BIOS, so nothing will be displayed on screen unless the Pi successfully boots! Normal LED status There are five LEDS near the USB connector. See the next sections for how to interpret other statuses. Red power LED does not light, nothing on display The power is not properly connected. Red power LED is blinking A blinking red power LED indicates problems with the power supply.

On model B+ (and presumably also the A+), the circuit has been improved to give a much more reliable warning of poor power quality. Red power LED is on, green LED does not flash, nothing on display Start off by reading the "Is your Pi not booting? Coloured splash screen xset -r Webcam . MasteryConnect. Quora. The Rise And Fall Of The Full Stack Developer. Editor’s note: Peter Yared is the founder and CTO of Sapho and was formerly the CTO/CIO of CBS Interactive. It seems as though everyone in tech today is infatuated with the full-stack developer.

Full stack may have been possible in the Web 2.0 era, but a new generation of startups is emerging, pushing the limits of virtually all areas of software. From machine intelligence to predictive push computing to data analytics to mobile/wearable and more, it’s becoming virtually impossible for a single developer to program across the modern full stack. When I first started programming computers as a kid in the pre-mobile, pre-web late 1970s/early 1980s, a single person typically wrote a complete software program from start to finish, and there weren’t many other layers of software between the programmer and the hardware. Using assembly language was the norm for programmers trying to squeeze more performance and space out of machines with 8-bit processors and very limited memory.

Being a Full Stack Developer. The barrier of entering the web development industry as a web developer is still low, but it’s getting increasingly complex. The dynamic nature of the whole industry makes requirements shift often to the most popular and “next best thing” tools and programming languages. Gone are the days when only one programming language or a very specific process was required from a developer. Nowadays programmers must know a range of technologies across multiple platforms in order to do good work. What does a full-stack developer mean? The term full-stack means developers who are comfortable working with both back-end and front-end technologies. To be more specific, it means that the developer can work with databases, PHP, HTML, CSS, JavaScript and everything in between, also, venturing as far as converting Photoshop designs to front-end code.

What full-stack meant in 2000 and what it means now? 2000 was a long time ago, in that year PHP 4.0 was released. System administration: Web development tools: Welcome To The Unicorn Club: Learning From Billion-Dollar Startups. Editor’s note: Aileen Lee is founder of Cowboy Ventures, a seed-stage fund that backs entrepreneurs reinventing work and personal life through software. Previously, she joined Kleiner Perkins Caufield & Byers in 1999 and was also founding CEO of digital media company RMG Networks, backed by KPCB. Follow her on Twitter @aileenlee. Many entrepreneurs, and the venture investors who back them, seek to build billion-dollar companies.

Why do investors seem to care about “billion dollar exits”? Historically, top venture funds have driven returns from their ownership in just a few companies in a given fund of many companies. So, we wondered, as we’re a year into our new fund (which doesn’t need to back billion-dollar companies to succeed, but hey, we like to learn): how likely is it for a startup to achieve a billion-dollar valuation?

To answer these questions, the Cowboy Ventures team built a dataset of U.S. Learnings to date about the “Unicorn Club”: So, what does this all mean? I'm a non-Jew raising a Jewish kid | Elizabeth Raphael. Kveller via JTA — 2015 was a year of change for me, facilitated largely by the birth of my lovely dumpling of a daughter in February. Among the normal challenges of being a first-time parent (learning to cobble together a working brain when it has been addled by lack of sleep, perfecting the art of acting casually when your child decides to poop on you in a public place, and so on), I had the additional challenge of being a non-Jewish woman raising a Jewish daughter.

Get The Times of Israel's Daily Edition by email and never miss our top stories Free Sign up! A bit of background on me: My religious upbringing can best be described as “vaguely Christian.” I went to a Catholic church a handful of times as a child, but I was never baptized, nor did I undergo confirmation (in fact, I had to do a quick Internet search while writing this article to make sure that “confirmation” was even the right term for the process I was thinking of).

He and I met through a mutual friend in 2007. Hot Potato – Windows Privilege Escalation. By @breenmachine How it works Hot Potato (aka: Potato) takes advantage of known issues in Windows to gain local privilege escalation in default configurations, namely NTLM relay (specifically HTTP->SMB relay) and NBNS spoofing. If this sounds vaguely familiar, it’s because a similar technique was disclosed by the guys at Google Project Zero – .

In fact, some of our code was shamelessly borrowed from their PoC and expanded upon. Using this technique, we can elevate our privilege on a Windows workstation from the lowest levels to “NT AUTHORITY\SYSTEM” – the highest level of privilege available on a Windows machine. This is important because many organizations unfortunately rely on Windows account privileges to protect their corporate network. The techniques that this exploit uses to gain privilege escalation aren’t new, but the way they are combined is. 1. 2. At the same time, we run an HTTP server locally on 127.0.0.1. How To Patch and Protect OpenSSH Client Vulnerability CVE-2016-0777 and CVE-2016-0778 [ 14/Jan/2016 ]

The OpenSSH project released an ssh client bug info that can leak private keys to malicious servers. A man-in-the-middle kind of attack identified and fixed in OpenSSH are dubbed CVE-2016-0777 and CVE-2016-0778. How do I fix OpenSSH's client vulnerability on a Linux or Unix-like operating system? A serious security problem has been found and patched in the OpenSSH software. Two vulnerabilities have been discovered in OpenSSH on 14/Jan/2016. In this tutorial you will learn how to fix OpenSSH's client and server bugs CVE-2016-0777 and CVE-2016-0778 on a Linux or Unix-like system including bug verification at the end of the tutorial. How to find openssh version on a Linux or Unix-like system?

The syntax is as follows to find openssh version on a CentOS/RHEL/SL: # yum list installed openssh\* The syntax is as follows to find openssh version on a Debian/Ubuntu Linux: $ dpkg --list | grep openssh ### OR ### $ dpkg --list openssh\* Sample outputs: A list of affected Linux distros Fedora Linux No. New way to make a CuPd catalyst for the electrochemical reduction of carbon dioxide to methane. (Phys.org)—A group of researchers from the University of North Carolina in Chapel Hill have devised a generalizable technique for making copper nanoparticles that are of a uniform size and dispersion on a polymeric thin film for the electrocatalytic reduction of carbon dioxide. Their technique involves the electrodeposition of copper and/or palladium metal onto a thin film polymer via coordination of the metal to a cyanide-based ligand complex.

Their work appears in the Proceedings of the National Academy of Sciences. Because carbon dioxide is a greenhouse gas, researchers are interested in ways to decrease the amount of CO2 in our atmosphere. One feasible solution is to capture CO2 and reduce it to energy-rich hydrocarbon compounds. However, this needs to be done using methods that do not involve burning more fossil fuels for energy. One method is to reduce CO2 using electrocatalysis. Sheng Zhang, Peng Kang, Mohammed Bakir, Alexander M.

More information: Sheng Zhang et al. New way to make a CuPd catalyst for the electrochemical reduction of carbon dioxide to methane. A Unikernel Firewall for QubesOS - Thomas Leonard's blog. QubesOS provides a desktop operating system made up of multiple virtual machines, running under Xen. To protect against buggy network drivers, the physical network hardware is accessed only by a dedicated (and untrusted) “NetVM”, which is connected to the rest of the system via a separate (trusted) “FirewallVM”. This firewall VM runs Linux, processing network traffic with code written in C.

In this blog post, I replace the Linux firewall VM with a MirageOS unikernel. The resulting VM uses safe (bounds-checked, type-checked) OCaml code to process network traffic, uses less than a tenth of the memory of the default FirewallVM, boots several times faster, and should be much simpler to audit or extend. Table of Contents ( this post also appeared on Reddit and Hacker News ) Qubes QubesOS is a security-focused desktop operating system that uses virtual machines to isolate applications from each other. NetVM drives the physical network device directly.

The full system looks something like this: Gain Experience as a Volunteer SysAdmin on an Open Source Project. Volunteering on an open source project can help systems administrators develop the skills needed for certification. Image credit: Jeff Wright, Flickr, creative commons. You won’t learn to swim by reading a book on swimming, so when you’re looking to bolster your experience while preparing for a Linux certification, open source projects are a good place to dive right in.

A recently released free exam prep guide for the Linux Foundation’s two new certifications -- Linux Foundation Certified System Administrator (LFCS) and Linux Foundation Certified Engineer (LFCE) – outlines the core competencies required for each of the exams. Try to match those needed skills with the work the project needs. Sign up for the project mailing list and/or join its IRC.

Take the oVirt Project, a KVM management application and open source alternative to VMware vSphere. His advice: Don’t be shy. “Open communities usually allow for a lot of external people to come in and work with them. How to set up 2 step authentication for ssh on your Linux servers. Just because you rely on Linux as your server platforms, doesn't mean it's fail proof. There are still steps you can take to ensure your data is safe from prying eyes. One thing you should do is enable two-step authentication for secure shell. This means anyone attempting to get into your server via ssh will have to have both a password and a verification code. This is actually made fairly easy, thanks to the Google Authenticator. Let me walk you through the steps of setting this up. I will demonstrate this on a Ubuntu-based server. Installing google-authenticator You will be using the Android Google Authenticator to provide you with the necessary codes to log into your machine. Running google-authenticator From the same terminal window, issue the command google-authenticator and walk through the wizard.

After you answer the first question, the tool will echo back your secret key and emergency scratch codes. Configure SSH to use Google Authenticator and the PAM module and change it to: Linux and Unix SysAdmins New Year’s Resolutions (2016) Today is the last day of 2015 and it's that time of year again. Here is my very own 12 resolutions for the New Year. 1. Turn on Two Factor Authentication (2FA) Setting long and complex passwords for root/admin, backup, devops, or operator accounts is not enough.

Naturally, turning on 2FA is useful for cloud-based services. I already have 2FA set for my Linux desktop login including ssh client. 2. Enough said. 3. Without going into specific details about business or its owner, I've decided that I will not work with a cheap IT manager who values money over people and work ethics. 4. First, I'm going to stop using Godaddy for registering domain names. 5. I'm trying to be a better coder, I need to learn Go language. 6. I know OpenStack, AWS, Google cloud but there is a new cloud provider, Microsoft Azure and it is getting lots of adoption.

I'm a long time FreeBSD jails and LXC container technologies user. 7. I've finally accepted systemd. 8. Competition is good For consumers. 9. 10. 11. 12. Linux ip Command Examples. I am a new Linux system admin user. How do I use ip command line utility to display or configure networking, routing, and tunnels on Linux operating systems? How do I configures or displays network interface parameters for a network using TCP/IP on Linux operating systems? The ip command is used to assign an address to a network interface and/or configure network interface parameters on Linux operating systems. This command replaces old good and now deprecated ifconfig command on modern Linux distributions.

It is used for the following purposes: Find out which interfaces are configured on the system.Query the status of a IP interface.Configure the local loop-back, Ethernet and other IP interfaces.Mark the interface as up or down.Configure and modify default and static routing.Configure tunnel over IP.Configure ARP or NDISC cache entry.Assign IP address, routes, subnet and other IP information to IP interfaces. Purpose Syntax ip OBJECT COMMAND ip [options] OBJECT COMMAND ip OBJECT help. Participatório - Participatorio da Juventude. Affero General Public License. Version 3, 19 November 2007 Copyright © 2007 Free Software Foundation, Inc. < Everyone is permitted to copy and distribute verbatim copies of this license document, but changing it is not allowed. Preamble The GNU Affero General Public License is a free, copyleft license for software and other kinds of works, specifically designed to ensure cooperation with the community in the case of network server software.

The licenses for most software and other practical works are designed to take away your freedom to share and change the works. When we speak of free software, we are referring to freedom, not price. Developers that use our General Public Licenses protect your rights with two steps: (1) assert copyright on the software, and (2) offer you this License which gives you legal permission to copy, distribute and/or modify the software. An older license, called the Affero General Public License and published by Affero, was designed to accomplish similar goals. 0. 1. 2. 3. 4. The Father of Online Anonymity Has a Plan to End the Crypto War. Why I moved from Hostgator to DigitalOcean?

Hosting