Page 23 of 24 FirstFirst ... 132021222324 LastLast
Results 551 to 575 of 595

Thread: The Linux Help and Tutorial Thread

  1. #551
    Xtreme Cruncher
    Join Date
    Sep 2008
    Location
    Kansas City, Missouri
    Posts
    2,122
    Quote Originally Posted by OldChap View Post
    Those of you that have or do run Linux from a usb stick..... What did you choose for a stick? Has it been a successful exercise? any thoughts about sneaker netting using this? Target machine(s) are Xeon E3-1220's available during holidays only
    I use this:
    http://www.newegg.com/Product/Produc...67&ignorebbr=1

    and run this on it:
    http://puppylinux.org/main/Overview%...%20Started.htm

    Works great!
    ~ Little Slice of Heaven ~
    Lian Li PC-A05NB w/ Gentle Typhoons
    Core i7 860 @ 3gHz w/ Thor's Hammer
    eVGA P55 SLI
    8GB RAM
    Gigabyte 7970
    Corsair HX850
    OZC Vertex3 SSD 240GB

    ~~~~~~~~~~~~

  2. #552
    Xtreme Cruncher
    Join Date
    Dec 2008
    Location
    Texas
    Posts
    5,152
    Quote Originally Posted by D_A View Post
    You should be able to see it in your system logs if the cron job is working, but the only way to know if the whole thing is right, as far as I can tell, is to wait and see if it does what you want it to do. If you don't seem to be having connection problems any more then I'd take that as a positive sign.
    Sadly, came home from work to a disconnected computer... any ideas on diagnostics? (I have no idea how to tell anything in linux)


    24 hour prime stable? Please, I'm 24/7/365 WCG stable!

    So you can do Furmark, Can you Grid???

  3. #553
    Xtreme crazy bastid
    Join Date
    Apr 2007
    Location
    On mah murder-sickle!
    Posts
    5,878
    I'd start by having a look through the system logs to see if anything shows up. Exactly what to look for I'm not sure.

    The logs are in /var/log and are usually text files. If you open them as your regular user you can only read them, not modify them, so it's quite safe. I'd look in the one called "syslog" as well as "dmesg" which can be brought up directly with a console command. Syslog is more likely to have clues than dmesg I suspect.

    [SIGPIC][/SIGPIC]

  4. #554
    Xtreme Cruncher
    Join Date
    Jan 2009
    Location
    Nashville
    Posts
    4,162
    @Otis

    Code:
    more /var/log/syslog
    Will open syslog for viewing, space bar for next page, b to go back one page

    Code:
    tail -100 /var/log/syslog | more
    Will display last 100 lines of syslog and uses more to page thru one page at a time as above.

    Code:
    dmesg | more
    Will display the dmesg file and display one page at a time.

    Look for lines with wlan0 or wlan1 in them.

  5. #555
    Xtreme Cruncher
    Join Date
    Jan 2009
    Location
    Nashville
    Posts
    4,162
    Bug in Bash shell creates big security hole on anything with *nix in it

    A security vulnerability in the GNU Bourne Again Shell (Bash), the command-line shell used in many Linux and Unix operating systems, could leave systems running those operating systems open to exploitation by specially crafted attacks. ?This issue is especially dangerous as there are many possible ways Bash can be called by an application,? a Red Hat security advisory warned.

    The bug, discovered by Stephane Schazelas, is related to how Bash processes environmental variables passed by the operating system or by a program calling a Bash-based script. If Bash has been configured as the default system shell, it can be used by network?based attackers against servers and other Unix and Linux devices via Web requests, secure shell, telnet sessions, or other programs that use Bash to execute scripts.
    There is an easy test to determine if a Linux or Unix system is vulnerable. To check your system, from a command line, type:

    Code:
    env x='() { :;}; echo vulnerable' bash -c "echo this is a test"
    If the system is vulnerable, the output will be:

    vulnerable
    this is a test
    An unaffected (or patched) system will output:

    bash: warning: x: ignoring function definition attempt
    bash: error importing function definition for `x'
    this is a test
    The fix is an update to a patched version of the Bash shell. To be safe, administrators should do a blanket update of their versions of Bash in any case.
    Testing mine now.

    EDIT:
    Ubuntu server 12.04: Vulnerable
    Mint 17 : Vunerable


    From command line:
    Code:
    sudo apt-get update
    Code:
    sudo apt-get dist-upgrade
    The above commands patched bash in Ubuntu and Mint.
    Last edited by PoppaGeek; 09-24-2014 at 09:26 PM.

  6. #556
    Xtreme Legend
    Join Date
    Mar 2008
    Location
    Plymouth (UK)
    Posts
    5,279
    Many thanks PG


    My Biggest Fear Is When I die, My Wife Sells All My Stuff For What I Told Her I Paid For It.
    79 SB threads and 32 IB Threads across 4 rigs 111 threads Crunching!!

  7. #557
    Xtreme Cruncher
    Join Date
    Jan 2009
    Location
    Nashville
    Posts
    4,162


    There is some debate about how dangerous this is to someone who just uses Linux, or Mac, to browse the web. I just ran update and moved on to more pressing matters. Such as whether to have 1 or 2 Guinness.

  8. #558
    Xtreme Member
    Join Date
    May 2007
    Location
    The Netherlands
    Posts
    935
    Thanks, PG.

  9. #559
    Xtreme Cruncher
    Join Date
    Jan 2009
    Location
    Nashville
    Posts
    4,162
    Quote Originally Posted by Rob_B View Post
    Thanks, PG.
    Saw your 25,000,000 boinc milestone.

    Grats!

  10. #560
    Xtreme crazy bastid
    Join Date
    Apr 2007
    Location
    On mah murder-sickle!
    Posts
    5,878
    It has the potential to be quite dangerous, at least now that it's in the open, but the systems most likely to be attacked are servers (high value targets) not personal computers. If it becomes part of an automated attack suite in conjunction with other attacks to get access to the shell (I'd give it a couple of weeks) then all bets are off and every IP will probably be hit with an attempt, possibly lots of attempts, so getting this fixed should be a high priority. Those running Linux or Mac OS cloud instances should also make sure to keep those updated lest they be compromised and used to launch further automated attacks.

    edit: I just received a second update for this, the first one only being less than 12 hours ago.
    Last edited by D_A; 09-25-2014 at 06:58 PM.

    [SIGPIC][/SIGPIC]

  11. #561
    Xtreme Cruncher
    Join Date
    Jan 2009
    Location
    Nashville
    Posts
    4,162
    Concern over Bash vulnerability grows as exploit reported ?in the wild? [Updated]


    A number of security companies are now reporting attacks based on Shellshock that are ongoing. "We?re seeing attackers target the Shellshock vulnerability almost immediately (within 4.5 hours) of it being publicly announced," said Waylon Grange, senior malware researcher at Blue Coat. "Any organizations or users with unpatched Linux servers are vulnerable to hackers running unauthorized code, so it?s very important that organizations download and apply the patch immediately. Blue Coat is already seeing DDOS botnets trying to utilize this vulnerability in their attacks and we expect that traffic to only continue to increase.?
    There has been a another update to Bash since my first post. Please update again.

    Code:
    sudo apt-get update
    sudo apt-get dist-upgrade
    Last edited by PoppaGeek; 09-25-2014 at 10:52 PM.

  12. #562
    Xtreme Cruncher
    Join Date
    May 2008
    Location
    Atlanta
    Posts
    85
    Thanks PG and D_A, is there a good source for emails/feeds on the bug/update errata for *nix? I get ones for MS products but never thought about *nix.

  13. #563
    Xtreme Cruncher
    Join Date
    Jan 2009
    Location
    Nashville
    Posts
    4,162
    I read Ars Technica daily. They are a good source for things like this and are usually one of the first. They cover a lot of other good topics as well. A very technical, scientific community. They are quoted a lot in the news and media.

  14. #564

  15. #565
    Xtreme Legend
    Join Date
    Mar 2008
    Location
    Plymouth (UK)
    Posts
    5,279


    Thanks again PG


    My Biggest Fear Is When I die, My Wife Sells All My Stuff For What I Told Her I Paid For It.
    79 SB threads and 32 IB Threads across 4 rigs 111 threads Crunching!!

  16. #566
    Linux those diseases
    Join Date
    Mar 2008
    Location
    Planet eta pie
    Posts
    2,930
    Never a dull moment in Unix world it seems

  17. #567
    Xtreme Cruncher
    Join Date
    Jan 2009
    Location
    Nashville
    Posts
    4,162
    A nice example of NASA tech filtering down to other uses. But there is something I do not get. I'll admit a lot gets past me these days but at 1:29 in the video I gotta ask "Why?"

  18. #568
    Xtreme crazy bastid
    Join Date
    Apr 2007
    Location
    On mah murder-sickle!
    Posts
    5,878
    Consider the potential of having a group of autonomous drones protecting your vessel. They detect and respond to other vessels within their designated patrol area according to their set response level. If you include the ability to autonomously acquire and fire on targets, a technology that's been around for a while now both in military and other arenas, and you have your own little Skynet of killer attack boats protecting you 24/7 without needing to stop to rest tired eyes, ringing ears, or empty stomachs.

    ... unless someone hacks their command and control network (or it glitches) and re-designates you from friend to enemy ... then you're screwed.

    [SIGPIC][/SIGPIC]

  19. #569
    Xtreme Cruncher
    Join Date
    Jan 2009
    Location
    Nashville
    Posts
    4,162
    I get that. It was the laptop in the frame at 1:29. Why run Ubuntu in a VM on a Windows laptop? Why would they not just run it installed? Why a VM on something that seems to me kinda mission critical? I feel I am missing something. These boats outfitted and all are a lot of money. So I do not think it is a money consideration. So is there a reason technically? Or is it the same old crap of "because someone makes more money this way"?

  20. #570
    Linux those diseases
    Join Date
    Mar 2008
    Location
    Planet eta pie
    Posts
    2,930
    Maybe they just like to play war games while they're waiting for the real thing

  21. #571
    Xtreme Cruncher
    Join Date
    Jan 2009
    Location
    Nashville
    Posts
    4,162
    Quote Originally Posted by stoneageman View Post
    Maybe they just like to play war games while they're waiting for the real thing
    Oh I get it. Play CoD on the Windows while harassing local fisherman with a swarm of boats in Linux. Cool!

  22. #572
    Xtreme crazy bastid
    Join Date
    Apr 2007
    Location
    On mah murder-sickle!
    Posts
    5,878
    Quote Originally Posted by PoppaGeek View Post
    I get that. It was the laptop in the frame at 1:29. Why run Ubuntu in a VM on a Windows laptop? Why would they not just run it installed? Why a VM on something that seems to me kinda mission critical? I feel I am missing something. These boats outfitted and all are a lot of money. So I do not think it is a money consideration. So is there a reason technically? Or is it the same old crap of "because someone makes more money this way"?
    Ahh. I missed that. It's probably a special purpose VM, configured to do exactly one thing rather than act like a general purpose OS. Running it as a VM also lets them export it as an image so that that exact configuration can be copied to multiple host machines very easily. There's also the potential security bonus of running wildly different host and client OSs. If an attacker somehow escapes the VM containment it puts them in an OS that will not respond to the same tools. Linux is much friendlier in this context than Windows thanks to the lack of overbearing licence restrictions and authenticity checks which can mess up a Windows VM in a single update and demand a new licence key.

    [SIGPIC][/SIGPIC]

  23. #573
    Xtreme Cruncher
    Join Date
    Jan 2009
    Location
    Nashville
    Posts
    4,162
    Excellent. Thanks.

    Makes sense that an enemy would try to hack the attackers.

  24. #574
    Xtreme crazy bastid
    Join Date
    Apr 2007
    Location
    On mah murder-sickle!
    Posts
    5,878
    It's practically a requirement these days. There's been a constant stream of cyber attacks flashing back and forth between China, Iran, the US and Russia for some years. With the rise of combat drones such as the Reaper there has also been development of technology to compromise those drones, even to the point of a counter-drone drone that physically attaches to the combat drone which blocks and overpowers it's command and control signals with a local transmitter. It's the same principle as one radio station being drowned out by a closer one on the same frequency, just a bit fancier. There have already been instances of ground deployed drones going rogue in Iraq and targeting friendly troops, only to be stopped by the requirement for human authorisation to fire. Had the drone been completely autonomous it could have wiped out it's own squad in seconds. Those drones were promptly withdrawn from service and appropriately vanished from the news feeds so we'll never know if it had been compromised by an attacker or if it was just a glitch.
    One of the scariest cases I read about was the autonomous weapons platforms used on the South Korean border that can differentiate between a human and an animal from less than 10% discernible body mass. It can pick a person hiding behind a tree all hunched up to look like a dog from the real thing from over a mile away and then determine both where the head is and target it and fire, all in a couple of seconds. Head shots, at a mile, in the dark, explicitly targeting humans, with no interaction from a human controller. If there was ever a more delicious target for military hacking I can't think of it. When these things were first demonstrated one went rogue, spun back towards it's controllers past all the safety limits they'd installed and opened fire. It was only stopped when a wounded officer managed to pull the plug. Most of the people involved died. No civilian news carrier has even found out if it was a software glitch or if North Korean agents compromised the system. Either way, people are dead and the machine does not give a single frack.

    The potential for military hardware such as this is huge, but the security challenges are the highest of high stakes. They could save the lives of thousands of military personnel, or could be turned against their military controllers or even the civilian population by cyber terrorists if they are compromised.

    We live in both exciting and terrifying days indeed!

    [SIGPIC][/SIGPIC]

  25. #575
    Xtreme Member
    Join Date
    May 2007
    Location
    The Netherlands
    Posts
    935
    Quote Originally Posted by PoppaGeek View Post
    Saw your 25,000,000 boinc milestone.

    Grats!
    Thanks. I missed that one myself.

    I really need more time to keep track of the stats and monitor my crunchers. I had a lot of errors lately and didn't notice them in time.

Page 23 of 24 FirstFirst ... 132021222324 LastLast

Bookmarks

Bookmarks

Posting Permissions

  • You may not post new threads
  • You may not post replies
  • You may not post attachments
  • You may not edit your posts
  •