The Wiert Corner – irregular stream of stuff

Jeroen W. Pluimers on .NET, C#, Delphi, databases, and personal interests

  • My badges

  • Twitter Updates

  • My Flickr Stream

  • Pages

  • All categories

  • Enter your email address to subscribe to this blog and receive notifications of new posts by email.

    Join 1,862 other subscribers

Archive for the ‘*nix’ Category

(Retina) MacBook tethering: WiFi, Bluetooth and USB. iPhone and Android.

Posted by jpluimers on 2014/12/15

Out of the box, a MacBook can do tethering using:

I’ll point to two things about this below:

  1. WiFi is not always the best wireless tethering method
  2. USB is not restricted to iPhone only Read the rest of this entry »

Posted in *nix, Apple, Google, Mac, Mac OS X / OS X / MacOS, Mac OS X 10.7 Lion, MacBook, MacBook Retina, MacBook-Air, MacBook-Pro, Nexus 4, OS X 10.8 Mountain Lion, Power User | Leave a Comment »

Nostalgia: OSvirtual Virtual images of operating systems

Posted by jpluimers on 2014/12/12

OSvirtual is a collection of virtual images of operating systems.

It’s a resource for those who want to recall some operating system/distribution, to try unknown OS or just to play with the virtual toy :)

–jeroen

via: OSvirtual Virtual images of operating systems.

Posted in *nix, Power User, Windows, Windows 95, Windows 98 | Leave a Comment »

running dig DNS under Windows

Posted by jpluimers on 2014/11/21

The dig (domain information groper) command under unix/Linux is a great way to help verify that a DNS host like BIND is working properly.

A few of my servers are Linux, but most of my desktops usually are Windows, so I was happy to find the Using the dig dns tool on Windows 7 article by Dan Esparza explaining there is a Windows version.

So I:

  1. Downloaded the Windows version of BIND (I took the BIND 9.9.2-P1 ZIP file)
  2. Unzipped that into my C:\BIN\BIND directory
  3. Ran this command, just like I would on a Linux box:
    dig @192.168.171.214 pluimers.com
  4. Checked the below output to the zone configuration on the openSUSE box serving the DNS for my domain

; <<>> DiG 9.9.2-P1 <<>> @192.168.171.214 pluimers.com
; (1 server found)
;; global options: +cmd
;; Got answer:
;; ->>HEADER<<- opcode: QUERY, status: NOERROR, id: 12911
;; flags: qr aa rd ra; QUERY: 1, ANSWER: 1, AUTHORITY: 5, ADDITIONAL: 6

;; OPT PSEUDOSECTION:
; EDNS: version: 0, flags:; udp: 4096
;; QUESTION SECTION:
;pluimers.com.                  IN      A

;; ANSWER SECTION:
pluimers.com.           172800  IN      A       82.161.132.169

;; AUTHORITY SECTION:
pluimers.com.           172800  IN      NS      ns7.4delphi.com.
pluimers.com.           172800  IN      NS      ns6.4delphi.com.
pluimers.com.           172800  IN      NS      ns2.4delphi.com.
pluimers.com.           172800  IN      NS      ns1.4delphi.com.
pluimers.com.           172800  IN      NS      ns3.4delphi.com.

;; ADDITIONAL SECTION:
ns1.4delphi.com.        172800  IN      A       82.161.132.169
ns2.4delphi.com.        172800  IN      A       176.9.152.132
ns3.4delphi.com.        172800  IN      A       176.9.152.131
ns6.4delphi.com.        172800  IN      A       109.70.6.22
ns7.4delphi.com.        172800  IN      A       176.9.143.167

;; Query time: 15 msec
;; SERVER: 192.168.171.214#53(192.168.171.214)
;; WHEN: Wed Jan 02 16:07:58 2013
;; MSG SIZE  rcvd: 235

–jeroen

via Dig (command) – Wikipedia, the free encyclopedia.

Posted in *nix, Linux, openSuSE, Power User, SuSE Linux, Windows, Windows 7 | Leave a Comment »

Introducing nogotofail—a network traffic security testing tool for TLS/SSL – via: Google Online Security Blog

Posted by jpluimers on 2014/11/07

Great! And it is open source at https://github.com/google/nogotofail:

The Android Security Team has built a tool, called nogotofail, that provides an easy way to confirm that the devices or applications you are using are safe against known TLS/SSL vulnerabilities and misconfigurations. Nogotofail works for Android, iOS, Linux, Windows, Chrome OS, OSX, in fact any device you use to connect to the Internet.

There’s an easy-to-use client to configure the settings and get notifications on Android and Linux, as well as the attack engine itself which can be deployed as a router, VPN server, or proxy.

–jeroen

via Google Online Security Blog: Introducing nogotofail—a network traffic security testing tool.

Posted in *nix, Android Devices, Chrome, Google, iOS, Mac OS X / OS X / MacOS, OpenSSL, Power User, Security, Windows | Leave a Comment »

Accessing the ESXi Direct Console User Interface DCUI via SSH – Wahl Network

Posted by jpluimers on 2014/11/05

I just learned (thanks Chris Wahl!) about the dcui command: often easier to configure basic parameters than the other UIs.

The DCUI is normally available from the console after you login, for instance to enable SSH.

This was new to me:

DCUI is available over SSH.

Even more embarrassing: duic has been actually there since ESXi 4.1 (:

–jeroen

via: Accessing the ESXi Direct Console User Interface DCUI via SSH – Wahl Network.

Posted in *nix, ESXi4, ESXi5, ESXi5.1, ESXi5.5, Power User, Virtualization, VMware, VMware ESXi | Leave a Comment »

Interesting thread about various file systems: BTRFS, ReiserFS, ext4

Posted by jpluimers on 2014/10/30

Be sure to read the comments at Chris Mason deklariert BTRFS als Stable, und Suse setzt es als Default für / in der neuen SLES ein….

Some of the comments provide great insight in the practical use of:

  • BTRFS
  • ReiserFS
  • ext3
  • ext4
  • LVM
  • Recoverry

(via: Kristian KöhntoppBtrfs-Erfinder stuft sein Linux-Dateisystem als stabil ein | heise online. )

–jeroen

Posted in *nix, Linux, Power User, SuSE Linux | Tagged: | Leave a Comment »

Windows: authenticated command-line download from IIS server wget: no, cURL: yes.

Posted by jpluimers on 2014/10/03

Had to download a bunch of stuff over the command-line from an IIS server that was using authentication. Not basic authentication, but NTLM authentication.

wget kept failing, even wget 1.10 that usually does NTLM quite OK (but up to 1.10.2 has a security vulnerability so you should not use wget 1.10 any more).

So I installed a Windows x86 cURL binary, and downloaded+copied the root certificates, then did some reading on the command-line switches.

Without any, cURL does http basic authentication. But a Windows server usually expects NTLM authentication (hardly documented, but it uses the Negotiate protocol).

When not using NTLM, both would show (wget -d, or curl -v) this in the output, indicating you should use NTLM authentication: Read the rest of this entry »

Posted in *nix, *nix-tools, cURL, Linux, Power User, SuSE Linux, wget, Windows, Windows Server 2000, Windows Server 2003, Windows Server 2003 R2, Windows Server 2008, Windows Server 2008 R2 | Leave a Comment »

Solution for opensuse 12.2: yast “System Services (Runlevel): Services” very slow

Posted by jpluimers on 2014/09/26

Thanks to the wonderful people at the opensuse forums (especially Knurpht and wolfi323) for helping me out with opensuse 12.2: yast “System Services (Runlevel): Services” very slow: how to investigate.

The solution is to install openldap2, then reboot.

The easiest way is to perform this under sudo:

zypper install openldap2

Somehow in opensuse 12.2 yast, sendmail and apache depend on it (though the yast/zypper software installer don’t recognize the dependency).

Without the reboot, yast was still slow. Not sure why yet.

I will need to check this out in the most current opensuse release.

–jeroen

via:  opensuse 12.2: yast “System Services (Runlevel): Services” very slow: how to investigate.

Posted in *nix, Linux, openSuSE, Power User, SuSE Linux | Leave a Comment »

bash vulnerability; patch your *n*x boxes A.S.A.P. (via: CERT/NIST reveal level 10 bash alert today, 24 September 2014)

Posted by jpluimers on 2014/09/25

Unpatched bash allows for remote code execution.

Patch as soon as you can and be aware that the current patches might not be complete.

Many vendors (including Debian, Red Hat, SuSE, Ubuntu) already have patches available: CERT/NIST reveal level 10 bash alert today, 24 September 2014.

This is a long article which explains the why/how/… and has an easy check to see if you are vulnerable: What is the CVE-2014-6271 bash vulnerability and, how do I fix it.

It looks like the current patches aren’t complete yet, but do plug big parts of the hole.

Watch bash CVEs in Ubuntu and CVE-2014-7169 in Ubuntu (and maybe for other nx varieties as well).

Update:

Quote from the article:

Read the rest of this entry »

Posted in *nix, *nix-tools, bash, Development, Power User, Scripting, Software Development | Leave a Comment »

MINIX 3.3.0 is now available – Google Groups

Posted by jpluimers on 2014/09/20

Earlier this week: MINIX 3.3.0 is now available – Google Groups:

Hi all,

We are pleased to present the MINIX 3.3.0 stable release. The major new features & improvements of this release include:

New features

  • The first release with ARM support, three Beagle targets are supported
  • Experimental USB support for the Beaglebones (hubs & mass storage)
  • Cross-compiling for both ARM and x86 – the buildsystem is very portable

Improvements

  • Big source code cleanup – cleaner C types in messages, improved NetBSD compatibility, all minix-specific code moved to a top-level minix/ folder
  • Updated packages overall – a big set is built now; and they are dynamically linked now
  • Improved driver modularity

The full release notes can be found at http://wiki.minix3.org/Releases/3.3.0

To find out more about this and older releases, please see http://wiki.minix3.org/Releases.

You can grab the ISO image from the download page http://www.minix3.org/download

For instructions on the ARM build, see http://wiki.minix3.org/DevelopersGuide/MinixOnARM

Join us! See http://www.minix3.org/community/

We’re conducting a survey to find out about our audience. Please take our survey linked to the green box at the top of the minix3.org page.  Thanks!
On  behalf of the MINIX team

Andy Tanenbaum

–jeroen

via: http://bit.ly/minix330

Posted in *nix, Linux, MINIX, openSuSE, Power User, SuSE Linux | Leave a Comment »