Quantcast
Channel: GNU/Linux – Binarymist
Browsing all 23 articles
Browse latest View live

Image may be NSFW.
Clik here to view.

Centerim, Irssi, Alpine on Screen

I’ve recently acquired access to my own shell from anapnea.net This allows me to carry out development, testing, and any on-line activity anonymously. All via SSH. One of the tasks I needed to do, was...

View Article



Image may be NSFW.
Clik here to view.

DVCS vs CVCS

Some differences between Distributed Version Control Systems (DVCS) and Centralised Version Control Systems (CVCS) The central server dilemma I hear a number of people being fearful about what they...

View Article

Image may be NSFW.
Clik here to view.

OpenSSH from Linux to Windows 7 via tunneled RDP

I recently acquired a new second hand Asus laptop from my work, that will be performing a handful of responsibilities on one of my networks. This is the process I took to set up OpenSSH on Cygwin...

View Article

Image may be NSFW.
Clik here to view.

Bare-metal Hypervisor Setup Evaluation

The views expressed in this post are my own and don’t reflect the views of my employer. Recently I had the opportunity for work, to carry out some research on what’s in the market in regards to...

View Article

Image may be NSFW.
Clik here to view.

copying with scp

I was having some trouble today copying a file (1.5GB .iso) from a notebook to a file server. The notebook I was using was running Linux Ubuntu. The server FreeBSD. I was trying to copy this file using...

View Article


Image may be NSFW.
Clik here to view.

A Decent Console for Windows

On *nix we’re kind of spoilt when it comes to the CLI experience. The console I use most in a GUI environment is the great terminator. No, not that one. This one… Multi tab, split screen, transparency,...

View Article

Image may be NSFW.
Clik here to view.

Painless git diff

I’ve been using Node.js quite a bit lately and decided it was time to start using Git for my projects. I’m used to using Mercurial (Hg) for DVCS, but have only used it on Windows and a little on Linux...

View Article

Image may be NSFW.
Clik here to view.

Establishing your SSH Server’s Key Fingerprint

When you connect to a remote host via SSH that you haven’t established a trust relationship with before, you’re going to be told that the authenticity of the host your attempting to connect to can’t be...

View Article


Image may be NSFW.
Clik here to view.

How to Increase Software Developer Productivity

Is your organisation: Wanting to get more out of your Software Developers? Wanting to increase RoI? Spending too much money fixing bugs? Development team not releasing business value fast enough? Maybe...

View Article


Image may be NSFW.
Clik here to view.

Erasing data from your drives

Disclaimer I take no responsibility for any damage caused by following any of the directions in this post. These tools and methods are destructive and likely to destroy your data or worse. Deleting...

View Article

Image may be NSFW.
Clik here to view.

Setup of Chromium, Burp Suite, Node.js to view HTTP on the wire

As part of my Node.js development I really wanted to see what was going over the wire from chromium-browser to my Node.js web apps. I have node.js installed globaly, express installed locally, a very...

View Article

Image may be NSFW.
Clik here to view.

Running Wireshark as non-root user

As part of my journey with Node.js I decided I wanted to see exactly what was happening on the wire. I decided to use Burp Suite as the Http proxy interceptor and Wireshark as the network sniffer (not...

View Article

Image may be NSFW.
Clik here to view.

Up and Running with Express on Node.js … and friends

This is a result of a lot of trial and error, reading, notes taken, advice from more knowledgeable people than myself over a period of a few months in my spare time. This is the basis of a web site I’m...

View Article


Image may be NSFW.
Clik here to view.

Up and Running with Kali Linux and Friends

When it comes to measuring the security posture of an application or network, the best defence against an attacker is offence. What does that mean? It means your best defence is to have someone with...

View Article

Image may be NSFW.
Clik here to view.

Installation and Hardening of Debian Web Server

These are the steps I took to set-up and harden a Debian web server before being placed into a DMZ and undergoing additional hardening before opening the port from the WWW to it. Most of the steps...

View Article


Image may be NSFW.
Clik here to view.

GnuPG Key-Pair with Sub-Keys

There are quite a few other posts on this topic, but my set-up hasn’t been exactly the same as any I found, so I found myself using quite a few resources to achieve exactly what I wanted. Synopsis For...

View Article

Image may be NSFW.
Clik here to view.

Keeping Your Linux Server/s In Time With Your Router

Your NTP Server With this set-up, we’ve got one-to-many Linux servers in a network that all want to be synced with the same up-stream Network Time Protocol (NTP) server/s that your router (or what ever...

View Article


Image may be NSFW.
Clik here to view.

Web Server Log Management

As part of the ongoing work around preparing a Debian web server to host applications accessible from the WWW I performed some research, analysis, made decisions along the way and implemented a first...

View Article

Image may be NSFW.
Clik here to view.

Evaluation of Host Intrusion Detection Systems (HIDS)

Followed up with a test deployment and drive. The best time to install a HIDS is on a fresh install before you open the host up to the internet or even your LAN if it’s corporate. Of course if you...

View Article

Image may be NSFW.
Clik here to view.

Keeping Your NodeJS Web App Running on Production Linux

All the following offerings that I’ve evaluated target different scenarios. I’ve listed the pros and cons for each of them and where I think they fit into a potential solution to monitor your web...

View Article
Browsing all 23 articles
Browse latest View live




Latest Images