Prewired

Random Thoughts Aligned..

Articles in the Linux category

Rocking it! GNOME3 Shell Extensions..

I don't really give a tinker's damn about your desktop, if you have a picture of a unicorn as your wallpaper or a really old picture of Hitler smiling, that's up to you. Though, sometimes I do care about having my files/folders arranged, in a way I can ...

Queue & Load Average in Linux

Queue is the current runtime queue for processes. Load averages are measurements of this metric over 5-, 10-, and 15- minute intervals. So, the runtime queue is a count of the number of processes ready to run at any given point in time. $ uptime ...

Securing backups to Dropbox with LUKS

Dropbox meets LUKS When it comes to my data, I like it private even though I've nothing to hide (ignore the paradox). I've been using Dropbox and Swift (OpenStack Object Storage project) to backup my data. I tried writing a BASH script to recursively ...

My GnuPG Transition

The old key, which I am transitional away from, is: pub 4096R/D5E28EE0 (0x192BA1E6D5E28EE0) 2014-02-22 John Ombagi (Linux, DB & Infosec) John Ombagi (Linux, DB & Infosec) Fingerprint=ACF5 FAFE 3C3D 4CE5 95D9 ...

Testing for ShellShock in Linux (CentOS/OEL)

Below is a simple bash script I've been using to test for shellshock vulns in my Linux setups. Though, it's not a script to really decide weather you are totally safe of not, due to the nature of shellshock and other different attack vectors that ...

Exploring anti-DOS tools for Apache httpd

Slowloris is among the well known "Denial Of Service" (or DOS) tool used by both experienced attackers and script kiddies. This evening, I've been testing mod_evasion and mod_antiloris on Apache httpd /2.2.15 (Oracle Linux 6.5 using Redhat built ...

The "SCTP" protocol

TCP and UDP protocols have been in around for approximately 20+ years now. Even though they have helped in building nice Internet applications since inception, things are changing in the techie world and they will always change. TCP being a connection ...

Setting up SSH With Two-Factor Authentication

Two-factor authentication adds a second level of authentication to an account log-in. When you have to enter only your username and one password, that's considered as a single-factor authentication. 2FA requires the user to have two out of three types ...