Encryption and blackmailing

Just read something quite interesting here. Apparently, all the research put into mathematical algorithms is a double edged sword. Encryption can be used to deny the rightful owner access to his data. Fortunately, the attacker in this case made a mistake resulting in a 128 bit key that was ...

Singtel's 5012NV-002 vulnerability

Type: Open port Affects: Singtel's firmware on 2wire 5012NV-002 Version: (HW version: 2701-000808-004, SW version: 9.3.1.29) (Unable to ascertain if other versions are affected as I do not have access to the firmware) Severity: High Ease of exploit: Low Impact: Allows an attacker to gain access ...

bitcoin mining

Sometimes I just wonder if all the computing power put into mining bitcoins could instead have been put to better use crunching data for projects such as folding@home or seti@home. Instead, these complex calculations to mine bitcoins serve no practical purpose. While I understand the rationale ...

new server!

Recently, my server has been overloaded quite badly (load avg averages at 1.5) due to the amount of services I am running on it. (unbound, cron, lcd, apache, git, motion, mysql, lighttpd, minidlna, samba, deluge, openvpn, owncloud, squid). The torrent daemon and web interface along with ...

powerbanks as UPS

Just a quick thought. Since most arm dev boards servers are powered by USB, if we want to include power redundancy, it doesn't make sense to use a traditional UPS. Firstly, UPS storage capacity tend to be quite large compared to the meager amounts of power an ARM processor uses. Secondly, I'm ...

Useful mysql cmds they dont teach in class

show create table shows the code used to create the table, especially useful since I cant, for the life of me find a GUI in phpmyadmin to input/check foreign key constraints. The output will look something like this. CREATE TABLE `attendance` ( `id` int(11) NOT NULL AUTO_INCREMENT, `eid` ...