The Wiert Corner – irregular stream of stuff

Jeroen W. Pluimers on .NET, C#, Delphi, databases, and personal interests

  • My work

  • My badges

  • Twitter Updates

  • My Flickr Stream

    20140508-Delphi-2007--Project-Options--Cannot-Edit-Application-Title-HelpFile-Icon-Theming

    20140430-Fiddler-Filter-Actions-Button-Run-Filterset-now

    20140424-Windows-7-free-disk-space

    More Photos
  • Pages

  • All categories

  • Enter your email address to subscribe to this blog and receive notifications of new posts by email.

    Join 1,377 other followers

Archive for the ‘*nix’ Category

(Retina) MacBook tethering: WiFi, Bluetooth and USB. iPhone and Android.

Posted by jpluimers on 2014/12/15

Out of the box, a MacBook can do tethering using:

I’ll point to two things about this below:

  1. WiFi is not always the best wireless tethering method
  2. USB is not restricted to iPhone only Read the rest of this entry »

Posted in *nix, Apple, Google, Mac, MacBook, MacBook Retina, MacBook-Air, MacBook-Pro, Nexus 4, OS X, OS X Lion, OS X Mountain Lion, Power User | Leave a Comment »

Nostalgia: OSvirtual Virtual images of operating systems

Posted by jpluimers on 2014/12/12

OSvirtual is a collection of virtual images of operating systems.

It’s a resource for those who want to recall some operating system/distribution, to try unknown OS or just to play with the virtual toy :)

–jeroen

via: OSvirtual Virtual images of operating systems.

Posted in *nix, Power User, Windows, Windows 95, Windows 98 | Leave a Comment »

running dig DNS under Windows

Posted by jpluimers on 2014/11/21

The dig (domain information groper) command under unix/Linux is a great way to help verify that a DNS host like BIND is working properly.

A few of my servers are Linux, but most of my desktops usually are Windows, so I was happy to find the Using the dig dns tool on Windows 7 article by Dan Esparza explaining there is a Windows version.

So I:

  1. Downloaded the Windows version of BIND (I took the BIND 9.9.2-P1 ZIP file)
  2. Unzipped that into my C:\BIN\BIND directory
  3. Ran this command, just like I would on a Linux box:
    dig @192.168.171.214 pluimers.com
  4. Checked the below output to the zone configuration on the openSUSE box serving the DNS for my domain

; <<>> DiG 9.9.2-P1 <<>> @192.168.171.214 pluimers.com
; (1 server found)
;; global options: +cmd
;; Got answer:
;; ->>HEADER<<- opcode: QUERY, status: NOERROR, id: 12911
;; flags: qr aa rd ra; QUERY: 1, ANSWER: 1, AUTHORITY: 5, ADDITIONAL: 6

;; OPT PSEUDOSECTION:
; EDNS: version: 0, flags:; udp: 4096
;; QUESTION SECTION:
;pluimers.com.                  IN      A

;; ANSWER SECTION:
pluimers.com.           172800  IN      A       82.161.132.169

;; AUTHORITY SECTION:
pluimers.com.           172800  IN      NS      ns7.4delphi.com.
pluimers.com.           172800  IN      NS      ns6.4delphi.com.
pluimers.com.           172800  IN      NS      ns2.4delphi.com.
pluimers.com.           172800  IN      NS      ns1.4delphi.com.
pluimers.com.           172800  IN      NS      ns3.4delphi.com.

;; ADDITIONAL SECTION:
ns1.4delphi.com.        172800  IN      A       82.161.132.169
ns2.4delphi.com.        172800  IN      A       176.9.152.132
ns3.4delphi.com.        172800  IN      A       176.9.152.131
ns6.4delphi.com.        172800  IN      A       109.70.6.22
ns7.4delphi.com.        172800  IN      A       176.9.143.167

;; Query time: 15 msec
;; SERVER: 192.168.171.214#53(192.168.171.214)
;; WHEN: Wed Jan 02 16:07:58 2013
;; MSG SIZE  rcvd: 235

–jeroen

via Dig (command) – Wikipedia, the free encyclopedia.

Posted in *nix, Linux, Power User, SuSE Linux, Windows, Windows 7 | Leave a Comment »

Introducing nogotofail—a network traffic security testing tool for TLS/SSL – via: Google Online Security Blog

Posted by jpluimers on 2014/11/07

Great! And it is open source at https://github.com/google/nogotofail:

The Android Security Team has built a tool, called nogotofail, that provides an easy way to confirm that the devices or applications you are using are safe against known TLS/SSL vulnerabilities and misconfigurations. Nogotofail works for Android, iOS, Linux, Windows, Chrome OS, OSX, in fact any device you use to connect to the Internet.

There’s an easy-to-use client to configure the settings and get notifications on Android and Linux, as well as the attack engine itself which can be deployed as a router, VPN server, or proxy.

–jeroen

via Google Online Security Blog: Introducing nogotofail—a network traffic security testing tool.

Posted in *nix, Android, Chrome, Google, iOS, OpenSSL, OS X, Power User, Security, Windows | Leave a Comment »

Accessing the ESXi Direct Console User Interface DCUI via SSH – Wahl Network

Posted by jpluimers on 2014/11/05

I just learned (thanks Chris Wahl!) about the dcui command: often easier to configure basic parameters than the other UIs.

The DCUI is normally available from the console after you login, for instance to enable SSH.

This was new to me:

DCUI is available over SSH.

Even more embarrassing: duic has been actually there since ESXi 4.1 (:

–jeroen

via: Accessing the ESXi Direct Console User Interface DCUI via SSH – Wahl Network.

Posted in *nix, ESXi4, ESXi5, ESXi5.1, ESXi5.5, Power User, Virtualization, VMware, VMware ESXi | Leave a Comment »

 
Follow

Get every new post delivered to your Inbox.

Join 1,377 other followers

%d bloggers like this: