General Info

*kick-ass* personal streaming media server

by on Jul.15, 2010, under Amusement, Computer Stuff, Linux

I just installed Ampache on Ubuntu-10.04 LTS. All I can say is WOW. You need this… Right now…
I’ve got an mp3 archive somewhere in the neighborhood of 135GB, making it too large for traditional file sharing.
Ampache is the answer.

Leave a Comment :, more...

Still funny after all this time…

by on Jun.17, 2010, under Amusement

Ever read any Bastard Operator from Hell?

It has made me smile many times. Feel like throwing your orange Swingline at that pathetic, useless, clueless luser that just caused you to work *all weekend* restoring things from tape?

Next time a luser *insists* you drop what you’re doing to help them print a Word document, ask yourself, what would the BOFH do?

Leave a Comment :, more...

Crypted was mentioned in an "Accepted Solution" on Experts Exchange

by on Dec.24, 2009, under Amusement, General Info

Crypted is mentioned here.

That’s pretty tight!

2 Comments more...


Pandora Radio ROCKS!!

by on Jul.14, 2009, under Amusement

My friend Will turned me on to Pandora Radio. It’s direct access to the Music Genome Project, and plays a constantly adjusted stream of music that you like. You can even combine artists to create a custom play list that is constantly updated. I’m starting to wonder why I keep 150gb of MP3’s taking up drive space…
Check it out here:
Pandora Radio

Thanks, Will!

1 Comment : more...

In response to a spammer…

by on Jun.29, 2009, under General Info

broseph4521@ ->

Michael Jackson? No, I don’t care to add to the melee of remembrances for the (man?)
I didn’t care for his music, and I especially don’t care for paedophiles.
I consider his death; while sad for his loved ones, a better allocation of breathable air.

But nice try, anyway. Spammer.

2 Comments more...

Now with mobile browser goodness…

by on Apr.03, 2009, under General Info

Cryptednets.org now supports all major (and some minor) mobile web browsers.
Check it out on your mobile device, and let me know how it’s working.

1 Comment more...

Antivirus on Linux

by on Feb.26, 2009, under Amusement, Linux

antivirus on linux is like lipstick on a pig… sure, you can put it there, but it’s a waste of time, and it annoys the pig…

1 Comment more...

The Russian Federation CIDR blocks are now allowed access to CryptedNets.org

by on Feb.22, 2009, under General Info, Networking

Sorry for the drastic measure, but I’ve only got about 1mb up and 1mb down, and I hate to be used by anyone as a DDoS reflector. My DNS server no longer allows queries for the root nameservers, (thx again, Kiter) and the block list has been cleared. The entire world may now freely access this site, though I’m not sure what for, save for some comic relief, and sparsely located golden nuggets of networking knowledge.
If you *do* happen to be reading this, just drop a comment to say “hey”.
You don’t even need to register…
It won’t hurt a bit…

1 Comment :, more...

DDoS DNS amplification attacks

by on Feb.22, 2009, under General Info

There is a new(? or more frequently used?) method of DDoS attack being currently used against victim networks. This involves UDP queries from spoofed IP addresses, requesting the addresses for the DNS root servers. This turns misconfigured nameservers into a sort of DDoS “Reflector”, allowing attack amplification.

The reason for this is that it’s a really small UDP query (it’s a query for “. NS/IN”), resulting in a large amount of data “returned” to/at the victim’s network.
Here’s how it works:
The attacking server (let’s call them ns.attacker.net) spoofs the IP address of the victim (let’s call them victim.net), sending multiple UDP queries to many recursive, resolving DNS servers, pretending to be the victim host or network.

The attacker assumes the victim network’s IP
ns.victim.net:{high-order port} -> ns.resolvingDNSserver.net:53 . NS/IN

This query, when issued against any recursively resolving nameserver, will return the entire root nameserver list to the victim network, which is rather large in comparison with the query itself.

If your DNS server allows recursive queries to the general public, you may want to disable their ability to access your nameserver via UDP/53, or turn off their ability to make “. NS/IN” queries. (a query for the nameserver list of the “root” domain)
For BIND, you can add this line to the options section of your named.conf, stopping them from getting an answer to this query.

additional-from-cache no;

Alternatively, you can just disable the public’s ability to use UDP to query your nameservers, as a 3-way TCP handshake makes the IP spoofing almost impossible.

For further reading, check out this article by Don Jackson@SecureWorks:
http://www.secureworks.com/research/threats/dns-amplification

Thanks, Don… Great read!

Leave a Comment more...


Looking for something?

Use the form below to search the site:

Still not finding what you're looking for? Drop a comment on a post or contact us so we can take care of it!

CryptedNets is proudly powered by

Entries (RSS) and Comments (RSS)
- Login

Visit our friends!

A few highly recommended friends...