Recent Updates Toggle Comment Threads | Keyboard Shortcuts

  • John Cartwright 10:46 AM on January 19, 2017 Permalink | Reply
    Tags: , , ,   

    Best free OpenVPN service to use on Linux. 

    The website hosts OpenVPN config bundles and offers a very good VPN service that gives you an IP address in the UK. this would be good if you are wishing to hide your identity online. I have used this and it works a treat on Fedora 25. Just run openvpn as root and point it to the certificate file. Download the certificate bundles here: I was using before, but their cert bundles will not connect anymore, so I had to look for an alternative. But this is very cool. Good way to access the Internet without revealing your home IP address to the world.

    Just extract to a new folder and connect like this.

    [[email protected] VPN]# openvpn --config

    The certificate bundle does use 64bit ciphers instead of 128bit, but it is still fairly secure, good for browsing UK sites that are only available to UK Internet users.

  • John Cartwright 8:53 PM on January 18, 2017 Permalink | Reply
    Tags: , ,   

    Connect to a Debian 8.0 machine over RDP with xrdp. 

    Using xrdp on Debian to allow remote desktop connections from a Windows machine is very easy. I wanted to connect to a Debian 8.0 instance running in VMware from a Windows 7 installation.

    Firstly, I installed xrdp on Debian.

    [email protected]:/home/jason# apt install xrdp

    Then I had to run this command to setup my .xsession file.

    echo "gnome-session-fallback" > ~/.xsession

    And after setting up the networking in bridged mode, I could connect to the Debian instance over RDP.

    Connected to a Debian instance over RDP.

    Connected to a Debian instance over RDP.

    That is how easy it is to connect to a Debian machine over Remote Desktop Protocol.

  • John Cartwright 2:42 PM on January 18, 2017 Permalink | Reply
    Tags: , , , , , ,   

    Very useful Linux tips and tricks for the Linux desktop user. 

    How to make the Xterm font larger.

    To make the Xterm font larger, hold the left Cntrl key down and right-click on the xterm window to bring up a menu that allows the user to select a larger font size.

    Selecting a larger font size in Xterm with the menu.

    Selecting a larger font size in Xterm with the menu.

    Using the .inputrc file to control keybindings in xterm.

    If you wish to control the key bindings for Backspace, Delete, Home & the End keys in Xterm then read on.

    The ~/.inputrc file in your home directory controls this behavior, using the defines in this file you may control the key bindings and make using the BASH shell easier.

    $if term=linux
     "\e[1~": beginning-of-line
     "\e[4~": end-of-line
     "\e[3~": delete-char
     "\e[H": beginning-of-line
     "\e[F": end-of-line
     "\C-?": delete-char

    The TERM environment variable determines whether the Linux console or the Xterm terminal emulator is affected by this definition. If the Xterm does not use the Backspace key as backspace, then you may enter this into your ~/.bashrc file to configure this: stty erase ^H.

    Enabling color ls output.

    Using a simple alias, you may enable color directory listing output with ls. This directory listing also enables a human-readable listing of file-sizes with the -h option.

    alias ls='ls -hula --color=auto'

    The .dircolors file that resides in your home directory controls the colors that are used to represent various files displayed in the directory listing.

    Viewing files with the command-line.

    To view a text file and scroll through the text file easily, then the less command will help.

    cat myfile.txt | less

    Many different ways to switch to the root user in Linux with the command line.

  • John Cartwright 10:59 AM on January 18, 2017 Permalink | Reply
    Tags: , , , spawn, tanks,   

    Easily spawn an enemy jet to patrol an AO in Arma 3 with a script. 

    This simple script will spawn a jet to patrol an AO and attack any enemy vehicle or helicopter it sees.

    // Spawn a CAS jet to patrol the AO.
    _plane = createVehicle ["O_Plane_CAS_02_F", getMarkerPos("plane"), [], 0, "FLY"];
    _pilotguy = [[26761.4,24593.4,0.000909805], EAST, ["O_Pilot_F"],[],[],[],[],[],232] call BIS_fnc_spawnGroup;
    ((units _pilotguy) select 0) moveInDriver _plane;
    _wpcas = _pilotguy addWaypoint [getMarkerPos("mkr1"), 0];
    _wpcas setWaypointBehaviour "SAFE";
    _wpcas setWaypointCombatMode "RED";
    _wpcas setWaypointCompletionRadius 1900;
    curator1 addCuratorEditableObjects [[_plane],true ];

    This spawns the jet in the air at the Molos airfield and it will move to the marker named mkr1 and patrol this area. Very useful indeed. Put this script into the initServer.sqf and this will work in your mission.

    Use the code below to spawn an OPFOR tank platoon to patrol an AO. They will spawn at the salt flats and will then move to the object named man1.

    _randTanks90 = [[23762.7,18920.1,3.33786e-006] , 0, 400, 10, 0, 0.3, 0] call BIS_fnc_findSafePos;
    _newtanks29 = [_randTanks90, EAST, (configFile >> "CfgGroups" >> "EAST" >> "OPF_F" >> "Armored" >> "OIA_TankPlatoon")] call BIS_fnc_spawnGroup;
    [_newtanks29, man1 getRelPos [15, 0], 600] call bis_fnc_taskPatrol;

    Finally, this code will spawn an OPFOR Kajman that will fly to the HQ and then the crew will get out and shut down the chopper. The chopper will spawn at the onbject named heli99 and will move to the object named man1, then they will land and exit the vehicle.

    _randPos11 = [getPos heli99 , 0, 1200, 12, 0, 0.3, 0] call BIS_fnc_findSafePos;
    _heli1 = [_randPos11, 0, "O_Heli_Attack_02_F", EAST] call BIS_fnc_spawnVehicle;
    _group_ifrit1 = _heli1 select 2;
    _wp = _group_ifrit1 addWaypoint [getPosATL man1, 0];
    _wp setWaypointBehaviour "SAFE";
    _wp setWaypointCombatMode "GREEN";
    _wp setWaypointCompletionRadius 1300;
    _wp setWaypointSpeed "FULL";
    _wp setwaypointType "GETOUT";
    _group_ifrit1 = _heli1 select 2;
    _wp2 = _group_ifrit1 addWaypoint [getPosATL man1, 0];
    _wp2 setWaypointBehaviour "SAFE";
    _wp2 setWaypointCombatMode "GREEN";
    _wp2 setWaypointCompletionRadius 1300;
    _wp2 setWaypointSpeed "FULL";
    _wp2 setwaypointType "DISMISSED";

    Complete code to spawn a mission with a radio tower and a HQ. You just need a huge marker covering most of Altis named mkr1.

    // Find a random area to spawn the HQ. This is within the area of the marker "mkr1".
    _mrk = "mkr1";
    _area = markerSize _mrk;
    _nul = _area pushBack markerDir _mrk;
    _nul = _area pushBack ( markerShape _mrk isEqualTo "Rectangle" );
    _pos = [ _mrk, _area ] call BIS_fnc_randomPosTrigger;
    _randPos = [_pos , 0, 1200, 12, 0, 0.3, 0] call BIS_fnc_findSafePos;
    _cargo = "Land_Cargo_HQ_V1_F" createVehicle _randPos;
    _randPos14 = _cargo getRelPos [9, 12];
    _mg13 = createVehicle ["O_GMG_01_high_F", _randPos14, [], 0, "CAN_COLLIDE"];
    _mgguy13 = [_randPos14, EAST, ["O_Soldier_F"],[],[],[],[],[],232] call BIS_fnc_spawnGroup;
    ((units _mgguy13) select 0) moveInGunner _mg13;
    // Spawning the radio tower.
    _randPos2 = [_pos , 0, 1200, 10, 0, 0.3, 0] call BIS_fnc_findSafePos;
    _tower = "Land_TTowerBig_1_F" createVehicle _randPos2;
    _tower setVectorUp [0,0,1]; // Make sure the tower is not leaning.
    _towerbox = "Land_spp_Transformer_F" createVehicle _randPos2;
    _towerbox setVectorUp [0,0,1];
    _towerbox2 = "Land_TTowerSmall_1_F" createVehicle _randPos2;
    _towerbox2 setVectorUp [0,0,1];
    _tower setVehicleVarName "tower1"; tower1 = _tower;
    _genny = _tower getRelPos [7, 9];
    // Spawn a random minefield around the radio tower.
    // *********************************************************************
    _initialPos = getPos tower1; // Pos of tower.
    for "_count" from 1 to 50 do {
    	_minePos = [
    		(_initialPos select 0) + ((random 80) - 40),
    		(_initialPos select 1) + ((random 80) - 40)
    	_minen = createMine [
    // End mine code.
    // *********************************************************************
    _minefield = "Land_PowerGenerator_F" createVehicle _genny;
    // Spawning a MG guy near tower.
    _randPos3 = [_randPos2, 1, 60, 3, 0, 20, 0] call BIS_fnc_findSafePos;
    _mg = createVehicle ["O_HMG_01_high_F", _randPos3, [], 0, "CAN_COLLIDE"];
    _mgguy = [_randPos3, EAST, ["O_Soldier_F"],[],[],[],[],[],232] call BIS_fnc_spawnGroup;
    ((units _mgguy) select 0) moveInGunner _mg;
    // Spawning a couple of infantry groups to defend the HQ.
    // *********************************************************************
    _hqdef2 = _cargo getRelPos [-96, 256];
    _group = [_hqdef2, EAST, configfile >> "CfgGroups" >> "East" >> "OPF_F" >> "Infantry" >> "OIA_InfSquad_Weapons"] call BIS_fnc_spawnGroup;
    private _buildingPositions = _cargo buildingPos -1;
    private _buildingPosition = [0,0,0];
    if (!(_buildingPositions isEqualTo [])) then {
            if (_buildingPositions isEqualTo []) exitWith {};
            _buildingPosition = selectRandom _buildingPositions;
            _x setPos _buildingPosition;
    		_x disableAI 'PATH';
            _buildingPositions deleteAt (_buildingPositions find _buildingPosition);
        } forEach (units _group);
    _randPos99 = [_pos , 0, 1200, 12, 0, 0.3, 0] call BIS_fnc_findSafePos;
    _towerhq = "CamoNet_OPFOR_big_Curator_F" createVehicle _randPos99;
    _towerSTUFF = "Box_East_Grenades_F" createVehicle _randPos99;
    _ammo1 = _towerSTUFF getRelPos [2, 2];
    box1 = "O_supplyCrate_F" createVehicle _ammo1;
    _ammo2 = _towerSTUFF getRelPos [-2, 2];
    box2 = "Box_East_WpsLaunch_F" createVehicle _ammo1;
    _ammo3 = _towerSTUFF getRelPos [3, 2];
    box3 = "Box_East_Ammo_F" createVehicle _ammo1;
    _ammo4 = _towerSTUFF getRelPos [3, 4];
    box4 = "Box_East_Wps_F" createVehicle _ammo1;
    _hqdef3 = _towerhq getRelPos [16, 23];
    _group99 = [_hqdef3, EAST, configfile >> "CfgGroups" >> "East" >> "OPF_T_F" >> "Infantry" >> "OIA_InfSquad_Weapons"] call BIS_fnc_spawnGroup;
    [_group99, getPos _towerhq, 300] call bis_fnc_taskPatrol;
    _officer = _group createUnit ["O_officer_F",_randPos3,[],0.6,"Colonel"];
    _officer setVehicleVarName "man1"; man1 = _officer;
    man1 setpos (_cargo buildingpos 1);
    _officer disableAI 'PATH';
    // *********************************************************************
    //Spawn the group
    private "_group2";
    _group2 = [_randPos3, EAST, configfile >> "CfgGroups" >> "East" >> "OPF_T_F" >> "Infantry" >> "OIA_InfSquad_Weapons"] call BIS_fnc_spawnGroup;
    //Make the group defend the area.
    [_group2, _randPos] call bis_fnc_taskDefend;
  • John Cartwright 2:36 PM on January 17, 2017 Permalink | Reply
    Tags: , , , ,   

    Lovely new OSX GTK3 theme for Linux Mint MATE. 

    There is a lovely GTK3 theme available for the Linux Mint MATE desktop. This looks very nice when coupled with a good Metacity theme.,+Unity+&+Cinnamon%29?content=174139.

    This is what the El Capitan theme looks like on a Debian desktop.

    OSX Capitan theme on a Debian desktop.

    OSX Capitan theme on a Debian desktop.

    Download the El Capitan theme here.

    This is a very nice looking theme and well worth adding to your desktop.

    Mac OSX Sierra theme for Linux Mint MATE. Another nice option to theme your Linux desktop.

    Mac OSX dark theme.

    Fedora Core Bluecurve theme for Linux Mint MATE.

    This theme works perfectly with the MATE desktop. This allows you to have a classic Fedora Core styled desktop with Linux Mint MATE or Debian. This is well worth installing.

    Bluecurve theme on a Debian MATE desktop.

    Bluecurve theme on a Debian MATE desktop.

    I loved using the old Fedora Core desktops with the Bluecurve theme and it is great to install this theme on a modern Linux desktop.

  • John Cartwright 11:48 PM on January 14, 2017 Permalink | Reply
    Tags: , , , ,   

    Quad monitor wallpapers for your Linux or Windows desktop environment. 

    Multiwall 7680×2160 pixels wallpaper.

    Collection of sci-fi quad monitor wallpapers. These are ideal for a Linux desktop with 4 monitors.

    [7760×1440] Sci-fi and Landscape – Larger Collection & More user friendly resolution.

    Collection of high-res, (12764×3590 pixels resolution) panoramic photos. Best quality for multiple monitors.

    [12764×3590] Here's a few high resolution panoramic images I've taken over the years! [OC]

    Over 30 7680×1920 wallpapers.

    [7680×1440] A collection of 30 triple monitor wallpapers. Would love more in comments.

    Apollo moon landing. 7740×2454 pixels.

  • John Cartwright 2:41 PM on January 13, 2017 Permalink | Reply
    Tags: , , sysstatfs   

    The statfs64 function does not seem to work and this is very annoying. 

    There does not seem to be a good way on Linux to get the free disk space of your / partition with a C function. This is very annoying. I tried to update my system information program with a simple function that shows free disk space with C and I could not get the statfs64() function to work properly. I guess there is another function that is available that I need to find. Unless I use boost, that offers a function that I could use. Anyway, this is only a minor setback, I will get this working very soon. I guess I could use execl() and a proper Linux command within that to get the same information. That would work very well. But programming on Linux really is very good. I worked out how to add a remote github repository to my local machine so I can push changes up to the repo with the command line. That is the way to do it properly. That is why the Linux command line is so useful. I am sure this would work with the Windows 10 bash shell as well. Then I could do programming on Windows 10 and push the changes to a repository.

    I have not used Windows 10 for quite a while, but I am sure it has undergone quite a few changes since I last used it. Using the Linux command line on an actual Linux system is the way to go, this gives good access to many manual pages and a fast responsive Fedora 25 system. That is the advantage it has over a Windows system.

  • John Cartwright 1:06 PM on January 10, 2017 Permalink | Reply
    Tags: , , ,   

    How to save an image from a Facebook post when right click save will not work. 

    It is annoying when you wish to save an image from a Facebook post and this will not work. But this is actually very easy using Firefox. Just right click on the image and select Inspect element with Firebug.

    Inspect the image with Firebug.

    Inspect the image with Firebug.

    Then drill down through the code until the URL to the image is found, just select all this code and then CTRL-C it.

    Selecting the image URL.

    Selecting the image URL.

    This is what it should look like. Open this in a new tab and then save the image. This should also work with Chrome if you select Inspect element.

    That is how easy it is to do this.

  • John Cartwright 9:56 AM on January 10, 2017 Permalink | Reply
    Tags: arc, , , ,   

    Install the arc Gnome shell GTK3 theme on Fedora 25. 

    The arc Gnome Shell theme is a very nice theme for the Gnome Shell desktop. This is how to install this theme on Fedora 25.

    Firstly, download the theme this way.

    [[email protected] Desktop]$ git clone
    Cloning into 'arc-theme'...
    remote: Counting objects: 10466, done.
    remote: Compressing objects: 100% (4/4), done.
    remote: Total 10466 (delta 1), reused 0 (delta 0), pack-reused 10462
    Receiving objects: 100% (10466/10466), 9.98 MiB | 525.00 KiB/s, done.
    Resolving deltas: 100% (7301/7301), done.
    Checking connectivity... done.

    Then install the prerequisite packages before compilation.

    [[email protected] Downloads]# dnf install gtk3-devel

    Then we may setup and compile the theme source.

    [[email protected] Downloads]$ cd arc-theme-master/
    [[email protected] Downloads]$ ./
    [[email protected] Downloads]$ make
    [[email protected] arc-theme-master]$ su
    [[email protected] arc-theme-master]# make install

    Now select the theme in the Gnome Tweak tool and we are done.

    Selecting the arc theme in Gnome Tweak tool.

    Selecting the arc theme in Gnome Tweak tool.

    That is how easy it is to install the theme on Fedora. And it looks good too.

  • John Cartwright 8:09 AM on January 10, 2017 Permalink | Reply
    Tags: , exclude, , ,   

    How to backup your home directory easily with the rsync command. 

    How to use rsync to backup your home directory or whole system and skip directories that are not required to be backed up.

    This simple rsync command will backup the contents of your home directory to a folder on a removable drive. This command will exclude various system folders if you wish to backup the / partition instead.

    rsync -avh --progress --exclude {"/dev", "/lost+found", "/media", "/mnt", "/proc", "/run", "/sys", "/tmp"} /home /mnt/mounts/jason/My\ Stuff/backups/

    Another way would be to have the excluded folders in a list in a text file and specify the file name in the command. You do not need to backup everything in every directory anyway.

    rsync -avh --progress --exclude-from "exclude-list.txt" /home /mnt/mounts/jason/My\ Stuff/backups/

    This command did have problems with copying over all file attributes, but this could be due to the fact that I was copying files from EXT4 to NTFS. But all files were backed up and that is what matters.

  • John Cartwright 2:27 PM on January 9, 2017 Permalink | Reply
    Tags: , building, place, ,   

    How to spawn a randomly placed building in Arma 3. 

    This simple code for Arma 3 will spawn a randomly placed HQ building within the area of the mkr1 marker. This is a 4000×4000 marker placed on the map. This gets a random safe area and places the building within the area of this marker.

    _mrk = "mkr1";
    _area = markerSize _mrk;
    _nul = _area pushBack markerDir _mrk;
    _nul = _area pushBack ( markerShape _mrk isEqualTo "Rectangle" );
    _pos = [ _mrk, _area ] call BIS_fnc_randomPosTrigger;
    _randPos = [_pos , 0, 1200, 12, 0, 0.3, 0] call BIS_fnc_findSafePos;
    _cargo = "Land_Cargo_HQ_V1_F" createVehicle _randPos;
    _randPos14 = _cargo getRelPos [9, 12];
    _mg13 = createVehicle ["O_GMG_01_high_F", _randPos14, [], 0, "CAN_COLLIDE"];
    _mgguy13 = [_randPos14, EAST, ["O_Soldier_F"],[],[],[],[],[],232] call BIS_fnc_spawnGroup;
    ((units _mgguy13) select 0) moveInGunner _mg13;

    This code will add a marker that will show the actual location of the HQ building.

    _marker = createMarkerLocal ["opfor_hq.", position player ];
    _marker setMarkerPos _randPos;
    _marker setMarkerShape "ICON";
    _marker setMarkerColor "Default";
    _marker setMarkerType "loc_Bunker";
    _marker setMarkerText "HQ.";

    Use this cool code to spawn a radio tower with a machine gunner guarding it.

    // Spawning the radio tower.
    _randPos2 = [_pos , 0, 1200, 10, 0, 0.3, 0] call BIS_fnc_findSafePos;
    _tower = "Land_TTowerBig_1_F" createVehicle _randPos2;
    _tower setVectorUp [0,0,1]; // Make sure the tower is not leaning.
    _towerbox = "Land_spp_Transformer_F" createVehicle _randPos2;
    _towerbox setVectorUp [0,0,1];
    _towerbox2 = "Land_TTowerSmall_1_F" createVehicle _randPos2;
    _towerbox2 setVectorUp [0,0,1];
    _tower setVehicleVarName "tower1"; tower1 = _tower;
    _genny = _tower getRelPos [7, 9];
    // Spawn a random minefield around the radio tower.
    // *********************************************************************
    _initialPos = getPos tower1; // Pos of tower.
    for "_count" from 1 to 50 do {
    	_minePos = [
    		(_initialPos select 0) + ((random 80) - 40),
    		(_initialPos select 1) + ((random 80) - 40)
    	_minen = createMine [
    // End mine code.
    // *********************************************************************
    _minefield = "Land_PowerGenerator_F" createVehicle _genny;
    // Spawning a MG guy near tower.
    _randPos3 = [_randPos2, 1, 60, 3, 0, 20, 0] call BIS_fnc_findSafePos;
    _mg = createVehicle ["O_HMG_01_high_F", _randPos3, [], 0, "CAN_COLLIDE"];
    _mgguy = [_randPos3, EAST, ["O_Soldier_F"],[],[],[],[],[],232] call BIS_fnc_spawnGroup;
    ((units _mgguy) select 0) moveInGunner _mg;

    I hope this code is useful to someone who is building a scripted mission and wants randomly placed assets for the players to capture.

    One more piece of code. This will spawn enemy supply crates in random positions in random buildings around the Cargo HQ.

    _houseList = getPos _cargo nearObjects ["House",600];
     _c = 0;
     while { format ["%1", _x buildingPos _c] != "[0,0,0]" } do {_c = _c + 1};
     if (_c > 0) then
           _ranNum = floor(random _c);
           _crate = "Box_East_Support_F" createVehicle [0,0,0];
           _crate setPos (_x buildingPos _ranNum);
     sleep 0.123;
    } forEach _houseList;
    Czech beer billboard in fallujah.

    Czech beer billboard in fallujah.

  • John Cartwright 1:44 PM on January 3, 2017 Permalink | Reply
    Tags: castle, , ,   

    The Most Accurate Hacking Scene Ever. 

    From “Castle” Season 8 Episode 8.

  • John Cartwright 10:21 AM on January 3, 2017 Permalink | Reply
    Tags: , cnn, fallout, gucifer, ,   

    CNN uses Fallout 4 hacking screenshots in news article. 

    Fallout 4 hacking screenshots in CNN video.

    Fallout 4 hacking screenshots in CNN video.

    CNN have used Fallout 4 hacking screenshots in a news article about the Russian hacking scandal. This is very funny, they would think that people would not recognize it and just think it is real “hacking”. There is not guarantee that Russia even did this, IP addresses can be spoofed and this means that the attack could have come from anywhere. But they have a video up on the website that shows the anatomy of the attack. Gucifer 2.0 was mentioned in it. He is a famous Romanian hacker and computer expert. But Trump might reveal some more information about the Russian hacking after his inauguration soon. Hopefully he will not use video game footage as proof. The Fancy Bear cyber-espionage group was mentioned in the video as well, they are a Russian threat actor that has carried out cyber-attacks worldwide. They created the XAgent malware payload that is used with phishing attacks to get into target machines. The XAgent app runs on IOS7 iPhones and runs in the background with no icon. This steals data from the phone while the user is unaware. A good argument for not installing unknown and strange apps on your phone.

    Actual Fallout 4 hacking screenshot.

    Actual Fallout 4 hacking screenshot.

    But I prefer Android. That is relatively secure and does not allow the installation of pirated or unknown apps unless you allow it in the settings. Still, a good idea not to pirate apps, they could have malware in them. This is just like the news networks using Matrix code pictures to demonstrate computer stuff as it looks scary and high-tech to viewers. Here is the actual CNN news article. 1:00 into the video is where the Fallout 4 footage is. This is very funny to see, like the time they used Arma 2 footage in a news video that was purported to be real war video. That was an ITV piece, This does sort of look real in 160p quality. But not in HD. And Chernarus is not Northern Ireland.

  • John Cartwright 10:32 AM on January 1, 2017 Permalink | Reply
    Tags: creepy, , scary,   

    Creepy wallpapers for your Linux desktop. Good new look for 2017. 

    There are quite a few creepy and scary wallpaper options for your Linux desktop. I am going to present a few here that are good for fans of urban exploration.

    Prypyat town center abandoned after the accident.

    A bird's eye view of the abandoned city of Pripyat, Ukraine

    Very creepy fog picture.

    The fog

    Creepy looking sewer photos. These are taken by using a long exposure and then using a flashgun to light up the area.

    Macro drain, Bradford, UK

    Old abandoned church in Ireland.

    Part Two: Ruined Church in Ireland (Interior)

    The Upside Down

    Very old sewer tunnel photograph. One of the oldest sewer systems in the world.

    Cloaca Maxima – one of the world's earliest sewage systems, constructed c. 600 BC in Rome [1800×1200]

    Old mental asylum.

  • John Cartwright 12:51 PM on December 30, 2016 Permalink | Reply
    Tags: , , ,   

    Linux Mint website compromised once again. This website is really insecure. 

    The Linux Mint website has been compromised once again. This means that if you download a Linux Mint ISO, it would not be safe to use until this is fixed. The information is here: This is not a good look for this Linux distribution. That is why I am using Fedora Core 25 instead as the Fedora community run a more professional establishment and the distribution is higher quality. NSA Selinux provides a lot of security as well as up to date kernels.

    Had a good password on the database though, but that does not matter if it is easily accessible by a simple attacker who can access the website`s files and get the db-config.php file. Website is still going though, so I guess they have not bothered to announce this. I am sure it has been fixed by now, but the fact that this can happen at all is concerning. Hopefully Clem will fix his security eventually. He is using Securi proxy, but a lot of directories on his website are still accessible when they should not be at all. Hiring a penetration tester to check his website would be a good idea.

  • John Cartwright 1:15 PM on December 29, 2016 Permalink | Reply
    Tags: , , , , ,   

    Useful TOR hidden links for studying computer security. 

    Cryptoparty handbook.

    http://crypty22ijtotell.onion/handbook/index.html. A book about keeping safe online and maintaining anonymity if required.

    Soylent news. Slashdot styled news website.


    NetSec WIKI page.


    Very old CRT terminal.

    Very old CRT terminal.

    My Secret World Tech blog.


    Debconf Annual Debian conference website.


    CyberGuerrilla Anonymous Nexus.

    http://lu4qfnnkbnduxurt.onion/. Anynymous and secure communication options for the TOR network.

    The Debian GNU/Linux FAQ. Frequently Asked Questions and answers pertaining to the Debian distribution.


    Flashlight. Good TOR news website.


    Shadowlife news blog.


    Tin hat news and tips blog.


    Not Evil TOR search engine. This is the best TOR search and very good for finding information on TOR.


    Your only chance to access the Marianas web Is this real?


  • John Cartwright 10:05 AM on December 28, 2016 Permalink | Reply
    Tags: , , , manual,   

    Getting started with Linux. The first steps. 

    The Linux virtual terminal in action.

    The Linux virtual terminal in action.

    Getting started with Linux for the first time is intimidating if you want to use the Linux command-line and you do not know the commands to use the prompt to its full potential. The best way to get aquainted with the Linux system after installation is to open the Gnome terminal or the Konsole and type man intro. An excerpt from this manual page is shown below. This manual page will give you a quick introduction to the BASH shell or Bourne Again Shell, this is the default shell prompt for Linux, there are others such as the sh shell, as well as Ksh, Zsh and Csh, but the Bash shell is the easiest and most common shell used by Linux distributions. If you wish to type a command such as cat myfile.txt you do not need to type the whole command. You may type: cat my[TAB], i.e type cat my then press the TAB key to auto-complete the command. Once you get used to using the TAB key to auto-complete the commands you are typing on the Linux command line the process will become very fast indeed. Using TAB will show a list of possible completions of a command making it clear what you need to type. You may also use wildcards, i.e typing ls DS* in a folder full of files will show a listing of all of the digital camera pictures that are in the folder. or ls -l *.jpg to list all of the jpg files in that folder.

    INTRO(1)                                                    Linux User's Manual                                                    INTRO(1)
           intro - Introduction to user commands
           Section  1  of  the manual describes user commands and tools, for example, file manipulation tools, shells, compilers, web browsers,
           file and image viewers and editors, and so on.
           All commands yield a status value on termination.  This value can be tested (e.g., in most shells the variable $?  contains the status  of  the last executed command) to see whether the command completed successfully.  A zero exit status is conventionally used to
           indicate success, and a nonzero status means that the command was unsuccessful.  (Details  of  the  exit  status  can  be  found  in
           wait(2).)  A nonzero exit status can be in the range 1 to 255, and some commands use different nonzero status values to indicate the
           reason why the command failed.
           Linux is a flavor of UNIX, and as a first approximation all user commands under UNIX work precisely the same under Linux (and  FreeBSD and lots of other UNIX-like systems).
           Under  Linux there are GUIs (graphical user interfaces), where you can point and click and drag, and hopefully get work done without
           first reading lots of documentation.  The traditional UNIX environment is a CLI (command line interface), where you type commands to
           tell the computer what to do.  That is faster and more powerful, but requires finding out what the commands are.  Below a bare minimum,
           to get started.
           In order to start working, you probably first have to login, that is, give your username and password.  See also login(1).  The program login now starts a shell (command interpreter) for you.  In case of a graphical login, you get a screen with menus or icons and
           a mouse click will start a shell in a window.  See also xterm(1).
       The shell
           One types commands to the shell, the command interpreter.  It is not built-in, but is just a program and you can change your  shell.
           Everybody has her own favorite one.  The standard one is called sh.  See also ash(1), bash(1), csh(1), zsh(1), chsh(1).
           A session might go like
                  knuth login: aeb
                  Password: ********
                  % date
                  Tue Aug  6 23:50:44 CEST 2002
                  % cal
                       August 2002
                  Su Mo Tu We Th Fr Sa
                               1  2  3
                   4  5  6  7  8  9 10
                  11 12 13 14 15 16 17
                  18 19 20 21 22 23 24
                  25 26 27 28 29 30 31
                  % ls
                  bin  tel
                  % ls -l
                  total 2
                  drwxrwxr-x   2 aeb       1024 Aug  6 23:51 bin
                  -rw-rw-r--   1 aeb         37 Aug  6 23:52 tel
     Manual page intro(1) line 1 (press h for help or q to quit)

    There is a hypertext copy of this manual page here:

    This is a very good way to learn the basic commands to navigate around your UNIX/Linux system with the command line. And my Linux PDFs here: You can even type man man to learn about the man command and how it works. A manual page that has 1 at the end, for example ls(1) is a command manual page. A manual page such as printf(3) is a manual page for a programming function. Sometimes a command and a function like printf() share the same name, in this case type man 3 printf to access the desired manual page.

    To list a folder like in DOS, type ls -la to list the files vertically. If you type ls -hula, then the file listing will use kilobytes and megabytes instead of bytes in the filesize column.

    Creating a zip file containing a file with the Linux command line is very easy. Just use the zip command that should be included with your Linux distribution. The -8 parameter is to increase the level of compression applied to the file. You can use -9 for even more compression.

    [email protected]:~/Documents$ zip -8 phobos3.wad
    updating: phobos3.wad (deflated 64%)

  • John Cartwright 10:13 AM on December 27, 2016 Permalink | Reply

    Updated with new theme. I hope this looks better than the old one.

  • John Cartwright 4:10 PM on December 26, 2016 Permalink | Reply
    Tags: , , ,   

    Crack a Fedora 25 password with john the ripper easily. This is fun. 

    To crack a Fedora Core password hash easily, the john the ripper utility will come in handy. This allows cracking of Linux passwords without much fuss as long as the password is in the wordlist.

    Install the utility.

    [[email protected] Documents]# dnf install john

    Then it is necessary to make a copy of the /etc/shadow file in a directory like ~/Documents, this will make it easily accessible. Just make sure your user has permissions to read it.

    [email protected] Documents]# cp /etc/shadow /home/jason/Documents/passwords
    [email protected] Documents]# chown jason passwords 
    [[email protected] Documents]# chgrp jason passwords

    Now the password cracking can begin.

    [[email protected] Documents]$ john passwords -wordlist=rockyou.txt
    Loaded 2 password hashes with 2 different salts (crypt, generic crypt(3) [?/64])
    Press 'q' or Ctrl-C to abort, almost any other key for status
    mypasswordissecure        (jason)
    1g 0:00:00:11 0% 0.08857g/s 323.1p/s 331.6c/s 331.6C/s 7895123..bloody
    Use the "--show" option to display all of the cracked passwords reliably
    Session aborted
    [[email protected] Documents]$ mc
    [[email protected] Documents]$ john passwords -wordlist=rockyou.txt
    Loaded 2 password hashes with 2 different salts (crypt, generic crypt(3) [?/64])
    Press 'q' or Ctrl-C to abort, almost any other key for status
    302c64&*(        (jason)

    The password was cracked, this password is not very secure after all. This is a very easy way to get Linux passwords, instead of using oclhashcat. Although that is good too. Cracking a Debian password with oclHashcat is doable and fun too. This is easy as well, but requires more setup and preparation.

  • John Cartwright 3:15 PM on December 21, 2016 Permalink | Reply
    Tags: , business, privatised   

    Privatization in the public sector, why is it necessary? 

    The global phenomenon of privatization was embraced around the world during the 1990s by all forms of government with disparate political aims, with Australia “setting the pace for privatization around the world” (Mead and Withers, 2002, p. 7). Privatization can defined as the “full or partial transfer of ownership of public assets to the private sector” (Reserve Bank of Australia Bulletin, 1997, p. 1). As shown in Figure 1, Australia has had one of the most extensive periods of privatization among OECD countries from 1990-1997. The two fundamental justifications for privatization over the last two decades have been: the generation of revenue, crucial to government investment and the containment of public debt, and the improvement of the performance of the firm or business, crucial to a prosperity of the firm and the satisfaction of consumers.

    One major beneficial outcome that drives privatization is the belief that a private enterprise will operate more efficiently, at the benefit of consumers. Private enterprises have more incentive to operate efficiently, as firms strive to achieve the major goals of a business of profit maximization, meeting shareholder expectations, increasing market share, maximizing growth, participating in satisfying behavior and minimizing costs. The privatization of Victoria’s public transport system, first implemented in 1999 under the Kennett-Liberal government, corroborates with this theory of self-interested private enterprise efficiency. After the incumbent system was found to be “deficient”, private ownership was seen as a “better way to provide the service” (Kennett, 2007). This particular policy of privatization precipitated many economic and social benefits, such as a strong increase in patronage, with train patronage rising by 37.6 percent and tram patronage rising 25.5 percent respectively according to a 2007 report titled Victoria’s Public Transport: Assessing the results of privatization. Other economic and social benefits include improvements in reliability and punctuality of the public transport service, increase in the amount of services provided, and an increase in the amount of vehicles in the system.

    Privatization is also seen as a major source of government revenue. Government revenue from privatization, such as the generation of approximately $55 billion worth of government revenue received during the period of 1988-2007, has proved to be vital to the reduction of forever-accumulating public debt and the investment in infrastructure. The main reason for privatizing Telstra, other than for the deregulation of the Australian telecommunications industry to provide more competition in the market, was to raise funds to pay for the abundance of public debt in Victoria. The privatization of Telstra raised $14.3 billion. The ability to readily pay off public debt will lead to an increase in economic activity as governments are able to inject more money into the economy, as governments will have more money to allocate to expenditure and investment.

    Major issues involving privatization include privatizing a natural monopoly, reduction of scope for public input, and the potential for corruption. The privatization of a government owned monopoly can only result in a privately owned, ungovernable monopoly – this is detrimental to the overall rationale of privatization as competition is the main contributing factor to an efficient service. Furthermore, the privatization of a government owned business equates to the minimization of scope for public influence, as the public can’t influence the actions of a business through parliamentary election or through government representatives- which was formerly possible in the case of a government owned business. The epitome of the issues associated with privatization was the privatization of the government owned Australian Wheat Board (AWB) in 1999, which saw the creation of the privately owned Australia Wheat Board (International) Limited (AWBI). The AWBI secured a “statutory monopoly”, additionally becoming “corrupt and incompetent” through the payment of kickbacks to the oppressive regime of Iraqi dictator Saddam Hussein (Kohler, 2007). These issues inevitably raise damaging consequences on the economy, such as the obvious abuse of market power, leading to an insufficient allocation of resources across the economy.

    Australia’s extensive period of privatization over the past two decades is primarily accredited to two main economic schools of thought. Firstly, the fact that privatization will create extensive amounts revenue, which will be typically be allocated to the containment of public debt. Secondly, the belief that a private enterprise will operate more efficiently than a government owned enterprise.

Compose new post
Next post/Next comment
Previous post/Previous comment
Show/Hide comments
Go to top
Go to login
Show/Hide help
shift + esc