background preloader

OpenNIC

OpenNIC

Open Letter to Amazon.com To Customer Service and Jeff Bezos, I’m disgusted by Amazon’s cowardice and servility in abruptly terminating its hosting of the Wikileaks website, in the face of threats from Senator Joe Lieberman and other Congressional right-wingers. I want no further association with any company that encourages legislative and executive officials to aspire to China’s control of information and deterrence of whistle-blowing. For the last several years, I’ve been spending over $100 a month on new and used books from Amazon. I understand that many other regular customers feel as I do and are responding the same way. So far Amazon has spared itself the further embarrassment of trying to explain its action openly. If you’d like to read further analysis of your cowardice, I suggest you see this excellent article by Glenn Greenwald. Yours (no longer), Daniel Ellsberg

NSD, un autre serveur de noms pour servir ses zones Pour la résilience de l'Internet, sa capacité à survivre aux pannes et aux attaques, il est essentiel qu'il existe un certain pluralisme ; que, pour la plupart des fonctions importantes, il existe plusieurs logiciels. Ainsi, si tous les routeurs de l'Internet étaient des Cisco, une bogue dans le code d'IOS, comme celle de l'attribut BGP 99, pourrait arrêter tout l'Internet. Si tous les serveurs DNS étaient des BIND, une bogue comme celle permettant d'arrêter un serveur par une mise à jour dynamique, et le DNS s'arrête. Il faut donc qu'il y ait des alternatives, non pas qu'elles aient forcément moins de bogues, mais simplement parce qu'elles ne seront pas publiées au même moment. Cela semble du bon sens mais, en pratique, on constate que la plupart des techniciens se simplifient la vie en n'utilisant qu'un seul logiciel, en général le plus répandu. Pourquoi envisager NSD comme alternative ? % sloccount nsd-3.2.5 ... Comment configure t-on NSD ? % sudo nsdc reload

Human Bagel Web Services Changer de serveur résolveur DNS facilement Première rédaction de cet article le 8 janvier 2012Dernière mise à jour le 9 janvier 2012 La sortie, le 30 décembre 2011, du décret n° 2011-2122 relatif aux modalités d'arrêt de l'accès à une activité d'offre de paris ou de jeux d'argent et de hasard en ligne non autorisée, décret qui permet à l'ARJEL de demander le blocage d'un site de paris ou de jeux en ligne, a ramené sur le devant de la scène la question du blocage via le DNS. En effet, le décret dit explicitement « Lorsque l'arrêt de l'accès à une offre de paris ou de jeux d'argent et de hasard en ligne non autorisée a été ordonné, [...] les [FAI] procèdent à cet arrêt en utilisant le protocole de blocage [sic] par nom de domaine (DNS) ». Il existe plusieurs façons de comprendre cette phrase. Et il y a les résolveurs DNS. Si on veut censurer en France l'accès à un site de jeu en ligne, par le protocole DNS, c'est un bon endroit pour attaquer.

Free Books A lot of people keep asking about a good list of programming books. Hence, we are building this list to save your time and to spread the knowledge. Some of these books will definitely help us to evolve our coding skills and thought processes for developing better solutions. We will do our best to keep updating this list, hope you find this list useful, here we go. Meta-List Graphics Programming Language Agnostic: NerdDinner Walkthrough Assembly Language: Bash Advanced Bash-Scripting Guide See .NET below Django Djangobook.com Emacs The Emacs manual Thanks Emacser (October 17, 2010) Forth Git Haskell Dive Into HTML5 Java JavaScript Linux Advanced Linux Programming Lisp Lua Programming In Lua (for v5 but still largely relevant) Maven Mercurial NoSQL CouchDB: The Definitive Guide Objective-C The Objective-C Programming Language Parrot / Perl 6 Perl 6 (Work in progress) Perl PowerShell Mastering PowerShell Prolog PostgreSQL Practical PostgreSQL Python Learn REBOL Thanks Nick (October 19, 2010) Ruby Scala Scheme Smalltalk Subversion Vim

Check to See if Your Computer is Using Rogue DNS UNITED STATES v. VLADIMIR TSASTSIN, ET AL. The FBI is seeking information from individuals, corporate entities, and Internet Services Providers who believe that they have been victimized by malicious software (“malware”) related to the defendants. This malware modifies a computer’s Domain Name Service (DNS) settings and thereby directs the computers to receive potentially improper results from rogue DNS servers hosted by the defendants. If you believe you have been victimized in this case, please type your DNS information into the search box below. Information on how to determine your DNS settings, along with other technical details about DNSChanger, can be found at www.fbi.gov/news/stories/2011/november/malware_110911/dns-changer-malware.pdf. You can also test to see if you are affected by visiting the following DNSChanger Check-Up sites below.

Allen's Weblog: Unicode in Python, and how to prevent it [UPDATE 16 Aug 2011] Armin Ronacher has written a nice module called unicode-nazi that provides the Unicode warnings I discuss at the end of this article. Though I can't use Python 3 for any of my projects, it does have a few nice things. One particular behaviour where it improves on Python 2 is forbidding implicit conversions between byte strings and Unicode strings. For example: Python 3.1.2 (release31-maint, Sep 17 2010, 20:34:23) [GCC 4.4.5] on linux2 Type "help", "copyright", "credits" or "license" for more information. >>> 'foo' + b'baz' Traceback (most recent call last): File "<stdin>", line 1, in <module> TypeError: Can't convert 'bytes' object to str implicitly If you do this in Python 2, it invokes the default encoding to convert between bytes and unicode, leading to manifold unhappinesses. Python 2.6.6 (r266:84292, Sep 15 2010, 15:52:39) [GCC 4.4.5] on linux2 Type "help", "copyright", "credits" or "license" for more information. >>> u'foo' + b'baz' u'foobaz' Hey!

Drupal site building tips - From These tips were written for Drupal6 and have not yet been edited for Drupal7 and therefore may not be accurate; this section is under construction. Introduction Drupal is one of the most widely used website servers in the world. Initial user setup It is not a good idea to give anonymous users access to the site or create accounts until you have the site completely set up and are ready to publish. Drupal -> Administer -> User management -> User settings -> Only site administrators can create new user accounts. Create an administrator user role: Drupal -> Administer -> User management -> Roles -> Add role -> administrator -> edit permissions -> check all Create a new user who will be an administrator Drupal -> Administer -> User management -> Users -> Add user -> Adminuser -> roles -> administrator Use this user as your everyday administrator, saving the user you created at installation as the superuser Create a Welcome page Create a Welcome page: Drupal -> Create content -> Page Change: to

10 Cool Ways to Use Nmap Nmap (“Network Mapper”) is a free and open source (license) utility for network exploration or security auditing. Many systems and network administrators also find it useful for tasks such as network inventory, managing service upgrade schedules, and monitoring host or service uptime. In addition to my list you can also check out this Comprehensive Guide to Nmap here and of course the man pages Here are some really cool scanning techniques using Nmap 1) Get info about remote host ports and OS detection nmap -sS -P0 -sV -O <target> Where < target > may be a single IP, a hostname or a subnet -sS TCP SYN scanning (also known as half-open, or stealth scanning) -P0 option allows you to switch off ICMP pings. -sV option enables version detection -O flag attempt to identify the remote operating system Other option: -A option enables both OS fingerprinting and version detection -v use -v twice for more verbosity. nmap -sS -P0 -A -v < target > 2) Get list of servers with a specific port open

ubercharged.net - Tales of Team Fortress 2 pwnage and other hilarity GPG Quick Start Initial publication: July 7, 2004 Most recent revision: July 20, 2011 A quick gpg HOWTO for getting started with GnuPG. A colleague at work once asked me how to get started using gpg, the GNU Privacy Guard. He had no experience with it at all. Private and public keys are at the heart of gpg’s encryption and decryption processes. Generate a private key. gpg --gen-key You’ll have to answer a bunch of questions: What kind and size of key you want; the defaults are probably good enough. Encrypting a file for personal use Encrypting files for your personal use is quite easy. Encrypt a file called foo.txt. If you have an encrypted file that you think you’ll want to edit on a regular basis, you might consider using the gnupg.vim plugin for transparently editing gpg-encrypted files. A more DIY approach can use make to automate the process of viewing and editing your encrypted file. Encrypting a file for someone else Decrypting a file from someone else gpg --output foo.txt --decrypt foo.txt.gpg

GNUPG Windows Setup - Coresecure, Inc. Original version by Marco Di Folco (marco.difolco AT coresecure DOT com) Latest revision 0.2 on 05/22/2006 Summary: Install the software Create your personal key pair Import a public key Encrypt a message Export your public key Install the software We will be using Windows Privacy Tools (WinPT), included in the gpg4win package. gpg4win is an installer package for Windows (95/98/ME/2000/XP/2003) for email and file encryption. gpg4win and the software included with gpg4win are Free Software. Download the latest stable release from the gpg4win web site: DOWNLOAD The default installation settings are fine, you should not change anything: Accept the "Licence Agreement" by clicking on the "Next" button. Choose the components that you want to install, pay attention to choose WinPT component. Proceed by clicking on the "Next" button: Leave install location and the other options as they are and press the "Next" button. Once the installation is complete, click the "Finish" button. back to top

Related: