Archive for the ‘ techy ’ Category

Hmm, I did something to prove nothing? :)

Actually a fairly challenging exam in my opinion, it was fun too.

logo_lftcert_sysadmin

On to the System Engineer one? We’ll see…

Patch your shit… – CVE-2016-5195

The threat is real…
https://www.us-cert.gov/ncas/current-activity/2016/10/21/Linux-Kernel-Vulnerability
http://thehackernews.com/2016/10/linux-kernel-exploit.html

That is all.

Oh Oracle… How about getting back to innovating?

Give it up Oracle 

http://www.siliconbeat.com/2016/07/08/googles-9-billion-oracle-battle-takes-new-turn/

Icinga …and probably other monitoring solutions

So… for the past I don’t know many months I’ve been messing around with Icinga2 and admit it looks nice compared to other monitoring solutions I’ve tried. As far as configuration.. well that is part is just as complex as others – though I admit I really need to RTFM before commenting more. For the time being I’ve been using a trial/error approach to just make things shut up when thresholds are hit šŸ˜‰

So, check Icinga out if you haven’tĀ https://www.icinga.org/

If you have any tips please leave a comment.

Pretty Sure Hell has Frozen Over

https://blogs.microsoft.com/blog/2016/03/07/announcing-sql-server-on-linux/

I suppose it couldn’t have been too muchĀ of an effort since it was once on UNIX back in the 80/90s as Sybase.

Is it good for the Internet? Probably – perhaps it will bring the costs of some other RDBMS vendor down?

Will I use it? Probably not as I’ve converted most old work I had in SQL Server to MySQL long ago. Though I certainly will check it out at some point.

Let’s Encrypt!

It’s here and in public beta! There is no longer an excuse!

https://letsencrypt.org

Even though I don’t use this site much, why not eh? šŸ™‚

So Docker…

After breaking my devel box’s ZoL due to having to upgrade the kernel to 3.8 or higher I finally have been able to try it out with Crate.

For sure interesting and something I’ll have to revisit when I have more time to read and explore.

RaspBMC + MPEG2 licence = semi-smart 8 year old TV

So as I realized while experimenting with RaspBMC some of my media plus what is served from PlayOn PC is streaming video as MPEG2. I wasn’t going to succeed with replacing my XBOX (classic) running XBMC with the limitation. Fortunately recently there was a posting about support of MPEG2 on the Raspberry Pi if you purchase the license. So I looked into that further and for the $3.25 it was well worth it to continue on. One thing I hadn’t realized was a firmware upgrade was needed but that was quite easy while using RaspBMC though required a reinstall to RC5 thus lost my prior settings. Anyway it’s all working fine now and quality (picture & sound) exceeds the XBOX hack I had been using for years. Plus no more annoying XBOX sound/grind and no more blinking light as the dead DVD drive tries to read the nothingness in the tray.

Next to experiment with using extra USB media for times I’m away from my network. Also to see if there are better Plex add on as the one I tried initially doesn’t like to always work.

#fallfun

Android #Fail

It appears that going to a test URL with a certain iframe using the stock Android browser can perform a factory reset on the phone.

There was a URL posted in the XDA forums pointing to http://ninpo.qap.la/test/index.html to test whether or not the browser would invoke the dialer and present the IMEI. It worked on my Samsung Infuse 4G running stock Gingerbread so I’m guessing that a real exploit may factory reset my phone. Ugh…

Note: The link above could change at anytime to the real exploit, use at your own risk. Here is the content of the test page.

<!DOCTYPE html>
<html>
<frameset>
<frame src=”tel:*%2306%23″>
</frameset>
</html>

The exploit code uses:
<frame src=”tel:*2767*3855%23″ />

Nice huh?

Reports have said it affects mainly Samsung devices but other reports have indicated an old Android bug affecting multiple devices. Should be interesting to see how this turns out…

Update: Confirmed that my Samsung Infuse 4G running Android 2.3.6 (Gingerbread) is vulnerable.

Link for exploit as well as otherĀ pertinentĀ information:Ā http://gizmodo.com/5946334/samsung-security-bug-can-wipe-out-your-galaxy-phone-updating

Samsung Infuse 4G Vulnerable to ExploitĀ (YouTube)

 

1:12 – Phone Model / Version
3:56 – link clicked, dialer launched, performs format/reset
4:20 – reset
6:35 – files/folders gone

NoTelURL app to install to prompt user on action to take.

Another app ESET USSD –Ā https://play.google.com/store/apps/details?id=com.eset.securedialer will protect you from this exploit.

AWS Glacier

Someone keeps reminding me of this service. Perhaps something to add to the ultimate backup solution?

I’m all about the CLI so this looks interesting as far as clients go. https://github.com/uskudnik/amazon-glacier-cmd-interface