The Shutdown of Phunsites’ Lab

Posted by: admin  :  Category: Bits and Bytes, Hardware

So, this is the end, after all what we went through?

Today I took the time to shutdown the Phunsites’ Lab. During all these years, it served a good purpose. Most of my ideas and PoCs were initially developped on these machines, before they evolved in some detailed design specs.
Read more…

My Favorite Firefox Plugins

Posted by: admin  :  Category: Bits and Bytes

Here’s a list of my favorite Firefox plugins:

No big list after all, but essentially all I need.

Goodbye rampart, welcome ph!

Posted by: admin  :  Category: Bits and Bytes

It’s been almost a year now since phunsites was relaunched after a rather long time of absence.

I remember writing my first post, which expressed my doubts that I would ever find enough time to create a unique web design.

However, after reflecting about phunsites and the achievements made so far, I finally decided to climb the mountain.
Read more…

How To Check DNS Blacklist Entries

Posted by: admin  :  Category: Bits and Bytes

In case you ever happen to be listed on a DNS blacklist you’ll propably find it useful checking for the actual DNS reply.
The point is that many popular blacklists usually provide information and database checks on their websites, however the latter one very often do not reflect current entries withint the blacklist.
Read more…

Master Password for Areca ARC-1210 Controller

Posted by: admin  :  Category: Bits and Bytes

In case you forget the password for an Areca ARC-1210 controller, the master password might be your friend 😉
I’m not sure if I’m actually allowed to publish this here. However, I did never sign a NDA to get it, so I think it’s ok 😉

Here it is (numbers are underlined for better readability):

MNO974315743924

According to one commentor, it might be needed to lower-case the letters:

mno974315743924

Also, it might be necessary to _not_ type the numbers on the numeric keyboard but on the regurlar number keys.

convert openssl key pair to PKCS #12 format

Posted by: admin  :  Category: Bits and Bytes

This command will convert a standard openssl key / cert pair into PKCS #12 format for use with Windows’ certmgr:

# openssl pkcs12 -export -in ssl.crt -inkey ssl.key -out ssl.p12

A password must be supplied during conversion as Windows’ certmgr will ask for a credential. It simply won’t accept an empty credential.

While importing in certmgr choose PKCS #12 format (.pfx or .p12 file extensions).

The best ICQ spammer for sale…

Posted by: admin  :  Category: Bits and Bytes

Oh gosh, grow up, guys!

wipe out directory tree through rsync

Posted by: admin  :  Category: Bits and Bytes, Shells

To wipe out a directory tree on a rsync server (an export) which you don’t have shell access to (but proper write access of course), just use this command:

# rsync -av –delete /tmp/clear.me/ rsync://some.rsync.host/some.export/

/tmp/clear.me is an example for a local but empty directory (empty as in ‘mkdir /tmp/clear.me).

Putting the slashes at the end of both local and remote path will allow you to sync the empty directory onto the server, effectively removing everything on the receiver side.

Fatal Error Or Not?

Posted by: admin  :  Category: Bits and Bytes

When I installed Debian GNU/Linux yesterday I encountered this error message:

It basically says something like “No installabe kernel image found…. You may continue although this very strange error is most likely fatal.”

Hmmm. I didn’t ever encounter an error message like that before. When choosing to continue the Installer stopped with another error message stateing that installation of a package (the kernel….) had failed.

So what exactly was the point in asking me to continue when it aborts anyway?

Spammer Weirdness: Trapping The Trap

Posted by: admin  :  Category: Bits and Bytes

Today I noticed this line in my message log:

Apr 26 08:19:38 gmc-mxd-bsd-001 postfix/smtpd[80576]: NOQUEUE: reject: RCPT from unknown[222.122.52.102]: 554 msgtrap2@gmail.com: Relay access denied; from=testusrrr@dialin-relay.mx.genotec.ch to=msgtrap2@gmail.com proto=SMTP helo=dialin-relay.mx.genotec.ch

It’s not new to me how spammers dig for open SMTP relays. I wonder though that their providers wouldn’t notice such an obvious thing like “msgtrap2@gmail.com” by its name and pay attention to it.

Even though we don’t have millions of mailboxes at my company, regurlar pattern matching is run against our database to find the more obvious ones.

Maybe it won’t do any harm to anyone if IP addresses that try unauthorized relaying in globo were to be blacklisted right away.