systems_glitch

Moderating Team
  • Content count

    2,020
  • Joined

  • Last visited

  • Days Won

    97

Everything posted by systems_glitch

  1. We're getting ready to move and will probably be renting for a year or so. Since I probably won't be able to build a dedicated server room like we have at the current house, and I don't want a screaming 1U server sitting in my office, I'm looking at moving some of the stuff I host at home off-site. Started looking at dedicated hosting, and wow is it expensive for what you get! I'm looking for 4-8 cores and 8+ GB RAM, disk space doesn't really matter since anything in that range will suit my needs. I'd prefer a dedicated Slackware box since I'll be using it as a VM host (LXC/Docker, VirtualBox) and Slackware is my distro of choice. That in itself really limits available hosting providers! I can pick up a 1U 8-core Xeon box with sufficient RAM and hard drive for around $200. Does anyone have experience in colo'ing something like that, and care to share prices?
  2. I put in a RFQ with a friend who works for a local tier 2 ISP/colo company. Looks like it's going to be $50/month for a 1U *or* 2U box plus $25/mbit/month 95% bandwidth. That's way lower than I thought it was going to be! I just ordered an 8 core Xeon, 24 GB RAM 2U box to colo.
  3. A good idea!
  4. Unless there's some unpatched exploit that you have access to, you'll have to look for a vulnerability yourself. You can search CVE databases if you know the version. Tekio was most likely alluding to the idea that it's going to be easier to find a problem in the human element, rather than the software.
  5. Just a note that a few of us moderators/operators are working on making #binrev a nicer place to hang out. PM if you have specific problems you want us to take care of.
  6. Does spamming through an open relay even accomplish anything nowadays?
  7. I recently switched yet another person from a music library manager to XMMS. I always keep coming back to its Winamp 2-esque interface and music sorted into directories. Anyone else using it for their audio-playing needs?
  8. I use a SIP line, you can get test numbers for free from most providers.
  9. Got the hard drive from AscensionPlus today, I'll try to get it imaged tonight.
  10. Does toilet print its output to the terminal, like figlet? If so, you can redirect the output to a textfile one of several ways: `toilet -your -options here > output.txt` will create a new file called output.txt with all of the CLI output (overwrites output.txt if it exists) `toilet -your -options here >> output.txt` will append output.txt, or create if it doesn't exist `toilet -your -options here | tee output.txt` will append output.txt, but also print to the terminal too Note that shell redirection works on most command line tools that output to the console. You may have to redirect STDERR instead of STDOUT for some things, or combine them (e.g. wget). In general, command line tools in a *NIX environment are meant to talk to each other via text streams, piped ( the | symbol ) or redirected ( >, >>, < ) between commands. There's a boatload of really nifty command line image tools for *NIX. I use imagemagick and its associated tools all the time, either directly or through libraries for other programming languages.
  11. We've got a handful of those LaCie "Rugged" external drives at work -- the USB/FireWire 800 2.5" external drives with the orange rubber around the outside. We bought them because we needed FireWire 800 external drives to use as encrypted boot volumes for some Mac workstations at work. So far, all but one has died, and it started showing symptoms of flaking out this morning. I remember finding a bunch of LaCie FireWire 400 enclosures years ago for a super-cheap price, with no drives. Every single enclosure was dead. It seems these new drives (purchased brand new from a large US retailer in late 2014) are also experiencing controller failure -- the SATA drive inside is fine once you extract it and plug it into a desktop. Do *all* LaCie products fail in a few months?
  12. Nice, we've kept an old version of TrueCrypt around for sending encrypted volumes to clients with a mix of operating systems in use. Linux/BSD full disk encryption is fine, but it's not as portable as something like TrueCrypt. Still no luck in getting clients to use a PGP/GPG solution.
  13. I use Arch on my laptop, but pretty much everything else runs Slackware. For running pre-canned stuff, Kali seems to be a pretty good choice, and doesn't pollute your workstation OS with stuff you might want to run only once. It's my opinion that Slackware makes the most sense for most situations because it's stable. I'm familiar with it, which is an advantage for me. The Slackware team is quick to fix bugs and vulnerabilities, and do an excellent job of keeping their core libraries and applications reasonably up-to-date. Not bleeding edge, of course, but that's why I run Arch on my laptop!
  14. Survey says: "no" $ gzcat /var/www/logs/access*.gz | perl -ne 'if ($_ =~ /^([\da-f:]+) /sg) { print "$1\n"} ' | sort | uniq | wc -l 5And all of those are from my home subnet or one of the subnets at work Anyone else here have full IPv6 connectivity?
  15. There is: any single span of zeros can be represented as "::", and you don't need to type leading zeros. For instance: redshirt.troy.theglitchworks.net -> 2001:470:1f07:b75:f00d::2 == 2001:0470:1f07:0b75:f00d:0000:0000:0002 Additionally, the first four groupings (2001:470:1f07:b75 in the above example) are your subnet number, and the only part you really have to memorize. The rest can be whatever numbering scheme you want -- in the above, host 2 is on the "f00d" subnet. But yes, ultimately the answer is, "give it a DNS mapping!"
  16. Forgot to comment on this cos I got busy actually reading it! Good stuff, and typeset in LaTeX!
  17. Heh, there are probably a lot of "allow any -> any" rules on IPv6 firewalls, out there
  18. From n0 in IRC: http://password.bar/ Looks like length is the real winner! It seems to take into account some sort of word list.
  19. Gotta wonder if that site is being used to seed someone's dictionary file(s)
  20. My connection is IPv4 only as well -- home and office (Time Warner). Both locations run through Hurricane Electric tunnels. IPv6 is, in my opinion, a return to the way things used to be, before everything was NATed (at least once) in IPv4 land. I've got my entire private LAN set up with dual-stack (IPv4 and IPv6 simultaneously) which allows for some nifty things. Probably most useful is the return to globally resolvable DNS: whether you're on the LAN or the Internet in general, the same FQDNs point to the exact same addresses. This definitely makes running your own shell server, Git repos, et c. much nicer. And your hostnames don't change if you're connected through VPN. Plus, since it's running on IPv6, the primary DNS server for the LAN subnet is actually *on* the LAN subnet. Makes management/dynamic DNS easier.
  21. And with the 8085, there's probably close to a 500 nS cycle time.
  22. The Model 100 should be easy enough to add on to, if you want to build a MF generator for it.
  23. Actually, the MAC address is probably not something to worry about on the Internet -- it's only useful on the local link (the network actually connected to your Ethernet or wireless card). Spoofing it as part of a multi-layered approach to privacy is good practice, though. It's much easier to track users via unique features of their browser. The EFF has a site which demonstrates this: https://panopticlick.eff.org/ Your DNS settings are probably getting reset when you make a DHCP request. You can usually configure the DHCP client not to do that, but it will be OS-specific.
  24. I believe GMail can provide your login history, don't know about Facebook. Unless significant monetary/intellectual property/whatever damages have been caused, you're not likely to get law enforcement interested in helping you, even if you can find a suspect source of an attack. Your best bet is probably notifying the service(s) you think were affected, since they have departments for dealing with account compromise. A virus/malware is far more likely, though it's also possible that a virus infection has resulted in compromised accounts. If you think your accounts have been compromised by a virus/malware, use a machine that you're certain is clean (or a live CD/USB distro) and change *all* passwords. Personally, when it comes to machines that I suspect are compromised, I do a full disk erase and OS reinstall -- scorched earth is the only way to be sure.
  25. Hah, very nice! Goofy Internet fun everyone can enjoy.