Goldflipper is back in the news. The green lit panel was in a vision. I seem to recall that I still see floaters in my eyes.0 comments
The low hanging fruits were already gone 20 years ago. Sophistication can likely only be aquired with larger teams. This is not to say that this should be done. However, to learn that a backdoor exists for example, proof of concepts could be done in teams. Likely at the NSA or someone. I have a book here that covers amplification denial of service tools in an entire chapter or so. Likely wasted space these days. These books are very thick and several volumes. Likely they can be cut down.
When reading source code, which is a very memory and mental intensive work, you should likely approach this systemically by working down a list. I've in the past taken stabs at source code reading but it wasn't systemically. Also set your goals low, an entire OS for reading is not likely going to work. Seek help as in human resources. I've made my own programs so that I can practice reading on that over other programs. I think I'll pick this up once my headache clears.0 comments
This is an idiom, to describe that you can't quickly look at something and make a determined diagnosis of it. Take a picture album. These are just slices of your life perhaps but don't tell the entire story. They are snapshots in time. You don't see progress in these slices. In fact the photos only tell a story, in the photographers eyes, who may or may not be trustworthy. When I look into a photo album I see that I have no eyes. There is no eyes. Since birth.0 comments
The last few days I reinstalled all my servers. I had a rootkit installed on both of them. A third server which was a scaleway linux host I turned off because I could not deal with them right now. I'll leave that server in an off state for a month in order to decide if I want to keep it or not. I have updated my DNS servers for all my zones. I'll likely have to also rotate the DNSSEC keys. You can't trust what's coming from centroid.eu as much as google.com (which is unsigned). Treat it as unsigned DNS info even though it has a signature, until I have changed all KSK and ZSK's.
I believe the breach occured through BIND or opensmtpd. There was a window of opportunity with opensmtpd for someone to gain root access. Sure it's been a while but I didn't see evidence for a breach for some time. In regards to BIND, I'm just assuming becuase it displayed weird behaviour. Make sure if you have a similar setup as mine (if you know), that your nameservers are in order and both resolve to forward AND reverse dns to the same name.0 comments
We all have our favourites. A whistle, a tune, a way of saying things. It makes people remember you. I also think carrying your choice of music is part of your identity. It may have been planted on you, or it was taken by choice. Here in Schweinfurt, I listen to the birds (unwillingly) as they tweet through the area in syllables. To me those syllables mean something or they remind me of someone. It's almost torment, but these birds only express their identity. Their parents identity too perhaps. They learned these noises in the nest. Yeah I'd like to shoot that bird sometimes but it has a right to exist. Can you think of mimickers in nature? Does a cat's meow sound like a crying little baby on purpose to win our hearts and succumb to its manipulative efforts of being liked? Whatever you think is true I know one thing. What I carry is part of my identity. Whether it is first thought of by someone else or not. Strip that music from me, you'll strip part of my identity. It would be torment.0 comments
A gift for you! I don't have the original anymore.
I have maintenanced my web server. It is running a new version of the OS. I'm not done yet, but I may be tomorrow. Good night. For the time being comments are off.0 comments
There is potential for steganography in all source code. I chose to use Copyright notices on .c and .h files and came up with a binary file that is 6K in size. Fortunately there is no such practice in OpenBSD. The concept is simple. Every time there is a (C) in the copyright that's a binary 1 and every time there is a (c) thats a binary 0. Thus with a simple program (two actually) I was able to sift through all copyright notices.
beta$ ls -l output -rw-r--r-- 1 pjp wheel 49917 May 23 10:28 output beta$ ls -l binary -rw-r--r-- 1 pjp wheel 6239 May 23 10:39 binaryThere was no hidden messages. On another matter, the OpenBSD kernel does not compile on octeon in 6.7 and is stalled on a compact.c file. On my equipment I did a workaround, but compiling these may be hard for someone not experienced. 0 comments
I've been reading a lot of online newspapers and magazines. I can't believe some of these ads they show. It seems to me that the ads are tarnishing the good names of the media. But suit yourself, if you really want to ruin your brand.0 comments
I've become aware that the drug I took from May until September of 2002 has side-effects in 0.1% to 1% of takers that describe the symptoms for my schizophrenia.
On this day in
By clicking on the header of an article you will be served a cookie. If you do not agree to this do not click on the header. Thanks!
Using a text-based webbrowser?
... such as lynx? Welcome back it's working again for the time being.
Older Blog Entries