background preloader

0. Introductions and Expectations

0. Introductions and Expectations

25 Best SSH Commands / Tricks OpenSSH is a FREE version of the SSH connectivity tools that technical users of the Internet rely on. Users of telnet, rlogin, and ftp may not realize that their password is transmitted across the Internet unencrypted, but it is. OpenSSH encrypts all traffic (including passwords) to effectively eliminate eavesdropping, connection hijacking, and other attacks. SSH is an awesome powerful tool, there are unlimited possibility when it comes to SSH, heres the top Voted SSH commands 1) Copy ssh keys to user@host to enable password-less ssh logins. ssh-copy-id user@host To generate the keys use the command ssh-keygen 2) Start a tunnel from some machine’s port 80 to your local post 2001 ssh -N -L2001:localhost:80 somemachine Now you can acces the website by going to 3) Output your microphone to a remote computer’s speaker dd if=/dev/dsp | ssh -c arcfour -C username@host dd of=/dev/dsp This will output the sound from your microphone port to the ssh target computer’s speaker port.

Minecraft Script Pictures Wherein you can see nifty pictures, and read some text too. It's minecraft! Yay! The Code Go to this page if you're interested in the code, so you too can modify your Minecraft save files. Intro So, I realized that there is no combined page for the scripts I've been writing for Minecraft. The Story Beginnings Like many of you, I learned about Minecraft through a link from a blog (I think it was Three Panel Soul). The first script I wrote was a simple interface to edit .mclevel files. Next, I started on a script to convert Dwarf Fortress levels to Minecraft levels. Castles Castles! Over the course of a few weeks, I gradually upgraded the code to allow multiple levels, an offset keep, doors, gatehouses, and towers along the walls. Merging Maps During this whole process, I was becoming familiar with the Minecraft forums and the mapping community. Trees While developing the code for making castles, another thought had been growing in my mind. This is by far my most popular script. City Groundwork

Kernel links Juan-Mariano de Goyeneche < jmseyas@dit.upm.es > /* * The latest version of this document may be found at: * */ The need for a document like this one became apparent in the linux-kernel mailing list as the same questions, asking for pointers to information, appeared again and again. Fortunately, as more and more people get to GNU/Linux, more and more get interested in the Kernel. Unfortunately, not many documents are available for beginners to start. Please, if you know any paper not listed here or write a new document, send me an e-mail , and I'll include a reference to it here. The papers that follow are listed in no particular order. Enjoy! : "Iptables-tutorial" : Oskar Andreasson. : : iptables, netfilter, firewalls. : The aim of the iptables-tutorial is to explain iptables in a complete and simple way. : "Ipsysctl-tutorial" : : "The Linux Kernel" : R.

YouTube Playlists for Learning Programming YouTube has been very good platform for learning any thing. Earlier you have seen 400+ courses on YouTube and 130+ NPTEL courses. There are few more courses especially about computer programming. These are contributed by various individuals. thenewboston: thenewboston is a great youtube channel, has more than 2o playlists covering topics Python, C, Java, iPhone development and web programming like HTML, CSS, PHP. Xoax.net Xoax has more than 200 videos but mainly focuses on C++. PHPacademy As the name suggests, it focuses mainly on PHP and some on MySql. There are more videos on small projects like writing your own search engine for your database, pagination, creating a rating system etc… Related posts: Get more stuff like this

Top 20 OpenSSH Server Best Security Practices OpenSSH is the implementation of the SSH protocol. OpenSSH is recommended for remote login, making backups, remote file transfer via scp or sftp, and much more. SSH is perfect to keep confidentiality and integrity for data exchanged between two networks and systems. However, the main advantage is server authentication, through the use of public key cryptography. Default Config Files and SSH Port /etc/ssh/sshd_config - OpenSSH server configuration file. SSH Session in Action #1: Disable OpenSSH Server Workstations and laptop can work without OpenSSH server. #2: Only Use SSH Protocol 2 SSH protocol version 1 (SSH-1) has man-in-the-middle attacks problems and security vulnerabilities. Protocol 2 #3: Limit Users' SSH Access By default all systems user can login via SSH using their password or public key. Only allow root, vivek and jerry user to use the system via SSH, add the following to sshd_config: AllowUsers root vivek jerry DenyUsers saroj anjali foo #4: Configure Idle Log Out Timeout Interval

Game From Scratch C++ and SFML Edition! Want to create a game using C++ and SFML? This is the perfect place to start! This tutorial series will follow the creation of a simple game in C++ from the very beginning till the end, a micro-version of the overall purpose of this site. C++ is an evolving language standard and a great many tutorials out there are horrifically outdated or just plain bad. Similarly, most tutorials in books or on sites are by their very nature required to be very short and concise. This series is meant to be a living document, so if you have any questions on specific section, let me know and I will update accordingly! Finally, I don’t pretend to be an expert on C++ nor SFML, so if you see a mistake or you disagree with something I have said, let me know. Alright, lets get this started. EDIT: This tutorial was written a couple years ago and targets Visual Studio 2010. The Introduction Part 1 In this section we set up and configure your Visual C++ project and configure Visual C++ to work properly with SFML.

20 Linux Server Hardening Security Tips Securing your Linux server is important to protect your data, intellectual property, and time, from the hands of crackers (hackers). The system administrator is responsible for security Linux box. In this first part of a Linux server security series, I will provide 20 hardening tips for default installation of Linux system. Linux Server Hardening Checklist and Tips The following instructions assume that you are using CentOS/RHEL or Ubuntu/Debian based Linux distribution. #1: Encrypt Data Communication All data transmitted over a network is open to monitoring. Use scp, ssh, rsync, or sftp for file transfer. #1.1: Avoid Using FTP, Telnet, And Rlogin / Rsh Services Under most network configurations, user names, passwords, FTP / telnet / rsh commands and transferred files can be captured by anyone on the same network using a packet sniffer. #2: Minimize Software to Minimize Vulnerability Do you really need all sort of web services installed? #3: One Network Service Per System or VM Instance

BitLet - the BitTorrent Applet In the summer of 2007, shortly after launching Novlet, Daniele and I still had time to spare and were looking for something new to build. Sure enough, within a short period, Daniele came up with the idea that would soon become BitLet: a BitTorrent client that could run in a browser without requiring users to install anything on their computer. Back then, browsers had very limited capabilities: AJAX had been recently introduced (in 2005), web applications were moving from static pages to dynamic client UIs but no browser could do things like opening sockets and writing files locally, central requirements for a peer to peer file sharing application. We found a solution in an unlikely piece of technology: Java applets. One of the main reasons is that Java applets didn’t look that great. What made BitLet possible, however, was the idea that we could have the applet implement the BitTorrent protocol while relying only on the browser for its interface.

Related: