General Info
*kick-ass* personal streaming media server
by Brian on Jul.15, 2010, under Amusement, Computer Stuff, Linux
I just installed Ampache on Ubuntu-10.04 LTS. All I can say is WOW. You need this… Right now…
I’ve got an mp3 archive somewhere in the neighborhood of 135GB, making it too large for traditional file sharing.
Ampache is the answer.
Still funny after all this time…
by Brian on Jun.17, 2010, under Amusement
Ever read any Bastard Operator from Hell?
It has made me smile many times. Feel like throwing your orange Swingline at that pathetic, useless, clueless luser that just caused you to work *all weekend* restoring things from tape?
Next time a luser *insists* you drop what you’re doing to help them print a Word document, ask yourself, what would the BOFH do?
Crypted was mentioned in an "Accepted Solution" on Experts Exchange
by Brian on Dec.24, 2009, under Amusement, General Info
2 Comments more...File Destructor 2.0: Creates corrupt file, not the lame excuse
by Brian on Nov.17, 2009, under General Info
Leave a Comment more...Pandora Radio ROCKS!!
by Brian on Jul.14, 2009, under Amusement
My friend Will turned me on to Pandora Radio. It’s direct access to the Music Genome Project, and plays a constantly adjusted stream of music that you like. You can even combine artists to create a custom play list that is constantly updated. I’m starting to wonder why I keep 150gb of MP3’s taking up drive space…
Check it out here:
Pandora Radio
Thanks, Will!
In response to a spammer…
by Brian on Jun.29, 2009, under General Info
broseph4521@ ->
Michael Jackson? No, I don’t care to add to the melee of remembrances for the (man?)
I didn’t care for his music, and I especially don’t care for paedophiles.
I consider his death; while sad for his loved ones, a better allocation of breathable air.
But nice try, anyway. Spammer.
Now with mobile browser goodness…
by Brian on Apr.03, 2009, under General Info
Cryptednets.org now supports all major (and some minor) mobile web browsers.
Check it out on your mobile device, and let me know how it’s working.
Antivirus on Linux
by Brian on Feb.26, 2009, under Amusement, Linux
antivirus on linux is like lipstick on a pig… sure, you can put it there, but it’s a waste of time, and it annoys the pig…
The Russian Federation CIDR blocks are now allowed access to CryptedNets.org
by Brian on Feb.22, 2009, under General Info, Networking
Sorry for the drastic measure, but I’ve only got about 1mb up and 1mb down, and I hate to be used by anyone as a DDoS reflector. My DNS server no longer allows queries for the root nameservers, (thx again, Kiter) and the block list has been cleared. The entire world may now freely access this site, though I’m not sure what for, save for some comic relief, and sparsely located golden nuggets of networking knowledge.
If you *do* happen to be reading this, just drop a comment to say “hey”.
You don’t even need to register…
It won’t hurt a bit…
DDoS DNS amplification attacks
by Brian on Feb.22, 2009, under General Info
There is a new(? or more frequently used?) method of DDoS attack being currently used against victim networks. This involves UDP queries from spoofed IP addresses, requesting the addresses for the DNS root servers. This turns misconfigured nameservers into a sort of DDoS “Reflector”, allowing attack amplification.
The reason for this is that it’s a really small UDP query (it’s a query for “. NS/IN”), resulting in a large amount of data “returned” to/at the victim’s network.
Here’s how it works:
The attacking server (let’s call them ns.attacker.net) spoofs the IP address of the victim (let’s call them victim.net), sending multiple UDP queries to many recursive, resolving DNS servers, pretending to be the victim host or network.
The attacker assumes the victim network’s IP
ns.victim.net:{high-order port} -> ns.resolvingDNSserver.net:53 . NS/IN
This query, when issued against any recursively resolving nameserver, will return the entire root nameserver list to the victim network, which is rather large in comparison with the query itself.
If your DNS server allows recursive queries to the general public, you may want to disable their ability to access your nameserver via UDP/53, or turn off their ability to make “. NS/IN” queries. (a query for the nameserver list of the “root” domain)
For BIND, you can add this line to the options section of your named.conf, stopping them from getting an answer to this query.
additional-from-cache no;
Alternatively, you can just disable the public’s ability to use UDP to query your nameservers, as a 3-way TCP handshake makes the IP spoofing almost impossible.
For further reading, check out this article by Don Jackson@SecureWorks:
http://www.secureworks.com/research/threats/dns-amplification
Thanks, Don… Great read!