Authoring effective Linux shell scripts

| 0 comments

The act of authoring shell scripts can provide a great deal of effectiveness when working within the Linux operating system no matter what the task may be. If you have experience with Linux, you know that there what seems to be an number of scripts available out of the box. This can clearly cause confusion in the area of name collisions in the event you were not aware a script with a name exists with the name of the custom script that you are creating. one thing you can do is run the which command and this will return a list of those scripts. Just like everything  else when it comes to technology, there are best practices and shell scripts are no stranger to best practices. The idea is to follow widely accepted standards because there is nothing worse than to have a team member who thinks that they now better and produce a work product that no else can follow, enhance, or possibly even use the the intended purpose for which the script was created. Be sure to comment the script. There is nothing worse than a script that provides not indication as to what it does. Utilize the …

Continue reading

They Live at DEFCON22

| 0 comments

Every year in August thousands upon thousands of people flock to Las Vegas, NV for the anual DEFCON conference. This is my second year attending and I knew once I attended DEFCON21 that I was forever hooked. I cannot begin to describe what the experience is like, because the experience is what you make of it. Last year, I had fun, but I did sit back and try to determine what I should and should not do. At the end of DEFCON21, I knew that I was going to jump head first into DEFCON22 and that is exactly what I have done thus far. I took advantage of the vast skill and knowledge that is at this event. There are some very smart people here! Where else can you gather thousands of hackers, security professionals, and hobbyist into a single location where opportunity is everywhere around you? Personally, I have spent very little time in the speaking events with the exception being the WiFi Village where I sat in on the latest news about the Pineapple Mark V firmware that dropped today. Rather, I took a clean laptop, an external USB hard drive, a Pineapple Mark IV, and a burner …

Continue reading

Rip DEFCON videos from YouTube

| 0 comments

Have you never attended DEFCON and want to watch hours upon hours of conference talks? You could always go the the DEFCON YouTube playlist and click your way around the hundreds of videos or you could download the videos. You could go search for a addon or extension for your favorite browser or search the myriad of software options. Downloading videos from YouTube can be simple, complex, free, or costly depending upon your experience, time, and resources. Years ago, I purchased a MacBook Pro and I also started learning more about Linux distributions such as Kali and Ubuntu. Moving away from Microsoft Windows as my personal daily operating system has made all the difference in the world, at least in my case it has. Of course, if you are happy to shell out your cash for software that performs basic tasks then Linux may not be for you. On the other hand, if you want more control and capability to address a particular circumstance then I am positive you will not regret the move to Linux. The one thing that I would recommend once you make the decision to move to Linux is to learn Python. I recall years ago …

Continue reading

Homebrew and not the beer kind

| 0 comments

Recently I had a need to install wget and Python on OS X Mavericks and anyone running a Mac can understand the pain point with installers outside of the Apple App Store. Before anyone starts asking the question why not use curl? That is like asking why not use Microsoft Windows? Now I am not bashing Windows because I use this  operating system depending upon my needs and task at hand. As a side note, it is possible to use Xcode and curl to compile and install wget, but why work harder rather than smarter? If you wish to take the journey down the technical rabbit hole then check out Install and Configure wget on OS X Mavericks 10.9 and fix SSL GNUTLS error. I personally prefer to sit back, kick up my heels, and grab a brew – Homebrew that is. What if I told you with one line of code, a terminal, and 5-10 seconds you too could have this package manager! Don’t think so? Well it is just as simple as executing the following at your terminal. ruby -e “$(curl -fsSL https://raw.github.com/Homebrew/homebrew/go/install)” In my opinion using Homebrew could not be an easier. Essentially there are four commands …

Continue reading

What can we learn from the 2013 Adobe database breach

| 0 comments

Early October 2013, Adobe announced that they fell victim to a cyberattack and their database was breached to the degree that 2.9 million customers are impacted in one way or another. From my point of view it is great that Adobe regrets the incident and apologizes for the inconvenience, but I believe that we as consumers should and must demand so much more than a simple “we are sorry”. In the event this breach is new to you, then I urge you to visit Troy Hunt’s new site ‘;–have i been pwned? Troy has done an exceptional job at bringing vendors in a single location where in one way or other were compromised. At the time of this article, Troy offers eight vendors that you can search by email address to determine if you may be at risk. How easy is that? Preparing the Database I set out to find the database myself and give it a look firsthand.  I am not going to point you to users.tar.gz (3.8GB compressed) and just under 9GB uncompressed. If you set out to find the database it is useful to know that the format is: <some uid> -|–|- <email address> -|- <encrypted password>-|- …

Continue reading