There is a petition to repeal the US Patriot Act (used for wholesale government invasion of privacy):
Certainly getting 100,000 signatures in the next month shouldn’t be THAT hard.
Have you signed it yet?
- Atlanta Linux Enthusiasts – ALE – be certain to sign up for the “ALE Mailing Lists” to stay informed.
- Atlanta Linux Enthusiasts-Northwest – ALE-NW and http://tomshiro.org/twiki/view/ALE/AleNwOrg As a sub-group to ALE, be certain to sign up for the “ALE Mailing Lists” to stay informed. This is my home LUG.
- Northeast Georgia Linux User Group – NEGALUG and their own redirect page
- GA-400 Linux Group
- Georgia Tech LUG
- Classic Hackers UGA Linux User Group – CHUGALUG
- Middle Georgia Linux Users Group
Drop me a comment if you’d like your LUG added.
Do not assume a meeting location based on the LUG name!
- ALE Central tends to meet at Emory Law School.
- ALE-NW tends to meet at SPSU (South Loop 120 exit in Marietta)
- GA-400 LUG has meetings at a few different locations – near the top 285 perimeter (Powers Ferry and Mt Vernon)
- NE-GA LUG meets at different locations and is experimenting with Google Hangouts.
A few of these were new to me – I just googled and looked that they had recent meetings. One even meets nearby, but the name threw me off their true location.
Seems that we can all work together to have an organized installFest Saturday every quarter. Just a thought.
Sometimes the hardware inside our PCs is not immediately discovered by Linux so we need to
- figure out the hardware vendor and chips
- understand the device driver (or a close relative in the same family of drivers)
- locate/install the driver
- load it as a kernel module
- configure it through the kernel module
- maintain the driver going forward – this can be 100% automatic or manual, depending on the driver involved.
After all this, there are some unsupported devices out there, so getting them to work under Linux is too difficult for most users. Even for an expert, the hassle-factor might become too great for seldom used hardware.
Determining the actual hardware and the chips used is the first step to getting it working.
Last fall a patch from Microsoft broke RDP access to Windows7 Media Center here. It has been a small hassle to manage the schedule of shows to be recorded ever since, but I didn’t take the time to research a fix. Until today.
I don’t travel all that much, just 3-4 weeks out of the country every year, usually for pleasure, not work. Below are the Android apps that consistently work well for me.
- without a data plan
- using wifi-only access
The few times that I’ve looked for a data plan overseas to add to a smartphone, the costs were simply 10x more than I was willing to pay. For 10 days in Turkey, would you pay US$100 for a data capable GSM-SIM? Further, after 7 day, my friend’s SIM stopped working. Seems the Turkish government wants to know about all the cell phone users in their country. Moving the SIM to a different device did make it work again.
If you have a data plan, then translation tools work easier, but we’ll assume no data or wifi connection when you are away from the hotel.
I just returned from central and south east Asia, so the apps that worked are fresh in my mind.
If you ever need to analyze a complete machine memory dump … er … for some reason, then learning a little about Volatility would be a good idea.
The purpose of Volatility is computer memory forensics.
If you ever need to analyze the memory from a Microsoft computer OS, it is possible to use Volatility to read normally secured memory locations for all sorts of handy data like Domain credentials, TrueCrypt keys, analyze spyware and viruses that are not caught by the normal file-based scanning tools. Lots of good stuff in there.
We just need to cause a BSOD and dump first, which we all know is not difficult at all. With the dump file, turn Volatility loose.
From a security standpoint, this tells us to never leave a running PC with credentials, do not hibernate, suspend, and do not walk away.
I’m sure there is much more that Volatility can be used for, but Karl didn’t have time to teach everything. The video is here
Today the blog was spammed by an IP that DNS resolves back to a Microsoft Corporate subnet address. It was a Chinese language spam, if that means anything. I expect this to happen from Joe’s Pizza of San Jaquine, but not from Microsoft.
I added another rule to the firewall, which already has a few thousand similar rules.
/sbin/iptables -I INPUT -s 188.8.131.52/16 -j DROP
I hate having to block large subnets, but if they can’t keep their network free from botnets, I don’t want them visiting my little blog.
The actual offending IP is 184.108.40.206 so if someone from MS wants to respond with a little more data, I’d love to hear it. I have no idea what that machine is, since even running an nmap could get me into trouble.. It could be a honeypot run by MS. I don’t know.
Subnet blocked. Sorry Microsoft.
I’m I being too harsh? What would you do?
All computers have network problems from time to time. Usually everything works fine, but sometimes something goes wrong. The first step to determining what to fix is to determine where the issue lies. Below is outlined the first troubleshooting steps to determine where the problem lies.
This isn’t a big problem, until it is. If you use LVM, then the Linux installer will create a small ext2 /boot partition. Something similar probably happens with encrypted installations. Eventuall, that partition will become full.
After a few months, there will be at least 5 kernels and perhaps 20 or more. If the /boot partition runs out of storage, bad things happen. The least of which could prevent a newer kernel being installed, but if the space filled up during a kernel install, the system may not boot.
Because this happened to me a few weeks ago, I decided to add a kernel-cleanup script to my weekly patch management efforts. Because I’m lazy, like all good system administrators, a script was needed. See below.
Well, seems that attacks have been created that come from highly reputable websites – News website included. Every website you visit has potential to infect your system with nasty software. None of them are trustworthy.
Be careful out there folks. We all need to be a little more paranoid because they are out to get everyone, not just you and me.