The Wiert Corner – irregular stream of stuff

Jeroen W. Pluimers on .NET, C#, Delphi, databases, and personal interests

  • My work

  • My badges

  • Twitter Updates

  • My Flickr Stream




    More Photos
  • Pages

  • All categories

  • Enter your email address to subscribe to this blog and receive notifications of new posts by email.

    Join 1,358 other followers

Archive for the ‘*nix’ Category

running dig DNS under Windows

Posted by jpluimers on 2014/11/21

The dig (domain information groper) command under unix/Linux is a great way to help verify that a DNS host like BIND is working properly.

A few of my servers are Linux, but most of my desktops usually are Windows, so I was happy to find the Using the dig dns tool on Windows 7 article by Dan Esparza explaining there is a Windows version.

So I:

  1. Downloaded the Windows version of BIND (I took the BIND 9.9.2-P1 ZIP file)
  2. Unzipped that into my C:\BIN\BIND directory
  3. Ran this command, just like I would on a Linux box:
    dig @
  4. Checked the below output to the zone configuration on the openSUSE box serving the DNS for my domain

; <<>> DiG 9.9.2-P1 <<>> @
; (1 server found)
;; global options: +cmd
;; Got answer:
;; ->>HEADER<<- opcode: QUERY, status: NOERROR, id: 12911
;; flags: qr aa rd ra; QUERY: 1, ANSWER: 1, AUTHORITY: 5, ADDITIONAL: 6

; EDNS: version: 0, flags:; udp: 4096
;                  IN      A

;; ANSWER SECTION:           172800  IN      A

;; AUTHORITY SECTION:           172800  IN      NS           172800  IN      NS           172800  IN      NS           172800  IN      NS           172800  IN      NS

;; ADDITIONAL SECTION:        172800  IN      A        172800  IN      A        172800  IN      A        172800  IN      A        172800  IN      A

;; Query time: 15 msec
;; WHEN: Wed Jan 02 16:07:58 2013
;; MSG SIZE  rcvd: 235


via Dig (command) – Wikipedia, the free encyclopedia.

Posted in *nix, Linux, Power User, SuSE Linux, Windows, Windows 7 | Leave a Comment »

Introducing nogotofail—a network traffic security testing tool for TLS/SSL – via: Google Online Security Blog

Posted by jpluimers on 2014/11/07

Great! And it is open source at

The Android Security Team has built a tool, called nogotofail, that provides an easy way to confirm that the devices or applications you are using are safe against known TLS/SSL vulnerabilities and misconfigurations. Nogotofail works for Android, iOS, Linux, Windows, Chrome OS, OSX, in fact any device you use to connect to the Internet.

There’s an easy-to-use client to configure the settings and get notifications on Android and Linux, as well as the attack engine itself which can be deployed as a router, VPN server, or proxy.


via Google Online Security Blog: Introducing nogotofail—a network traffic security testing tool.

Posted in *nix, Android, Chrome, Google, iOS, OpenSSL, OS X, Power User, Security, Windows | Leave a Comment »

Accessing the ESXi Direct Console User Interface DCUI via SSH – Wahl Network

Posted by jpluimers on 2014/11/05

I just learned (thanks Chris Wahl!) about the dcui command: often easier to configure basic parameters than the other UIs.

The DCUI is normally available from the console after you login, for instance to enable SSH.

This was new to me:

DCUI is available over SSH.

Even more embarrassing: duic has been actually there since ESXi 4.1 (:


via: Accessing the ESXi Direct Console User Interface DCUI via SSH – Wahl Network.

Posted in *nix, ESXi4, ESXi5, ESXi5.1, ESXi5.5, Power User, Virtualization, VMware, VMware ESXi | Leave a Comment »

Interesting thread about various file systems: BTRFS, ReiserFS, ext4

Posted by jpluimers on 2014/10/30

Be sure to read the comments at Chris Mason deklariert BTRFS als Stable, und Suse setzt es als Default für / in der neuen SLES ein….

Some of the comments provide great insight in the practical use of:

  • ReiserFS
  • ext3
  • ext4
  • LVM
  • Recoverry

(via: Kristian KöhntoppBtrfs-Erfinder stuft sein Linux-Dateisystem als stabil ein | heise online. )


Posted in *nix, Linux, Power User, SuSE Linux | Tagged: | Leave a Comment »

Windows: authenticated command-line download from IIS server wget: no, cURL: yes.

Posted by jpluimers on 2014/10/03

Had to download a bunch of stuff over the command-line from an IIS server that was using authentication. Not basic authentication, but NTLM authentication.

wget kept failing, even wget 1.10 that usually does NTLM quite OK (but up to 1.10.2 has a security vulnerability so you should not use wget 1.10 any more).

So I installed a Windows x86 cURL binary, and downloaded+copied the root certificates, then did some reading on the command-line switches.

Without any, cURL does http basic authentication. But a Windows server usually expects NTLM authentication (hardly documented, but it uses the Negotiate protocol).

When not using NTLM, both would show (wget -d, or curl -v) this in the output, indicating you should use NTLM authentication: Read the rest of this entry »

Posted in *nix, *nix-tools, cURL, Linux, Power User, SuSE Linux, wget, Windows, Windows Server 2000, Windows Server 2003, Windows Server 2003 R2, Windows Server 2008, Windows Server 2008 R2 | Leave a Comment »


Get every new post delivered to your Inbox.

Join 1,358 other followers

%d bloggers like this: