Apologies for Not Posting

Yeah, so, it's been about four weeks since my last post, even though I was trying to post something new about every week or so. This was entirely unintended. A lot of IRL stuff came up and it's been taking all my focus lately, and I haven't had much time for writing. I love doing … Continue reading Apologies for Not Posting

Arch Linux pacman – Just the Most Useful Commands

Wading through man pages can be a tedious process. Often it's not clear which options or commands you will be using 99% of the time and which ones are the more obscure options that are only occasionally useful. I was largely mystified by pacman's man page until I decided to do an exhaustive search through … Continue reading Arch Linux pacman – Just the Most Useful Commands

C Program to Plot the Gamma Function in the Terminal

Plotting the gamma function in the terminal

In this post I want to talk about a C program I wrote just recently that plots a mathematical function - specifically the gamma function. I think it's worth looking at, because this program demonstrates how to handle the various aspects of graphing and plotting using just ASCII characters in the terminal. The program draws … Continue reading C Program to Plot the Gamma Function in the Terminal

Reverse-Engineering a Linux Process with strace

The pill you took is part of a trace program. It's designed to disrupt your input/output carrier signals so we can pinpoint your location. And just like that, we can trace signals as they bounce around the Matrix, whether it's the Matrix that simulates Earth in 1999 or the Matrix that generates pretty pictures on … Continue reading Reverse-Engineering a Linux Process with strace

C Program to Generate a Blank MS-DOS Floppy Image in Linux

How do you do, fellow old-timers? Today's post is going to be a bit of a crossover, because I'm going to get into some programming stuff, some Linux stuff, and some DOS stuff all at the same time. I'm going to show you a program that I wrote a while back that uses POSIX API … Continue reading C Program to Generate a Blank MS-DOS Floppy Image in Linux

NMap Experiment: Using a Banner Grabbing Attack to Bypass a Load Balancer

Disclaimer: This article talks about port scanning and banner grabbing in NMap, which can be used as precursors to an online attack. This information is for educational and entertainment purposes only and is not to be used for illegal hacking purposes. Disclosing vulnerabilities and exploits is protected by free speech laws, but using such information … Continue reading NMap Experiment: Using a Banner Grabbing Attack to Bypass a Load Balancer

My (Revised) Step-by-Step Process for Starting Arch Linux Live

In this post I talked about my process for setting up my Arch Linux live system. I still use a live distro (mostly because I don't want to overwrite any files currently on the hard drive), but in the last few months I've made quite a few revisions to my startup process for Arch Linux … Continue reading My (Revised) Step-by-Step Process for Starting Arch Linux Live

How to Transfer Files Over SSH on a Linux/Windows Network

Transferring files over SSH

In this tutorial I want to show you how to copy files from one computer to another on a network containing both Linux and Windows hosts, using the SSH protocol. Linux-to-Linux, Linux-to-Windows, and Windows-to-Linux file transfer can be accomplished with an SSH daemon running on one or more Linux hosts and/or a copy of Cygwin … Continue reading How to Transfer Files Over SSH on a Linux/Windows Network

Exploring Borland Turbo Pascal for DOS

Picture of Blaise Pascal

I've been having some more adventures in VirtualBox, messing around with DOS software. This time I thought I'd explore Borland Turbo Pascal. I have an affinity for ancient programming languages - Pascal, Fortran, BASIC, Lisp, etc. I like them for basically the same reason I like vintage computers and old operating systems. It's like exploring … Continue reading Exploring Borland Turbo Pascal for DOS

Generalized Password Cracking, Part 2: Starting with Some Stock Password Attacks

Brute-force password cracking attack

Disclaimer: The present series of posts contains information on how to exploit security vulnerabilities in passwords. It is intended for educational and research purposes only. Neither the password cracking tools described in this series nor any of the exploits developed with these tools are to be used for gaining unauthorized access to accounts or other … Continue reading Generalized Password Cracking, Part 2: Starting with Some Stock Password Attacks