Skip to main content

Posts

Grub 2 Password Protection

src=https://help.ubuntu.com/community/Grub2/PasswordsGrub2/Passwords Contents Grub 2 Password ProtectionGRUB 2 Password Protection NotesHow It WorksWarnings & CautionsSetting Up Password ProtectionSuperuser & Password Designation (Required)Other Users (Optional)Protecting MenuentriesAdding Protection to Ubuntu EntriesAdding Protection to Other EntriesProtect the Windows Recovery PartitionPassword EncryptionLinks Grub 2 Password Protection GRUB 2 offers basic password protection for its menu and terminal. The user can set up passwords to protect the entire menu or specific menuentries. Passwords can be required for all users or only for selected users. The passwords can be stored in encrypted or unencrypted format. This page will detail the procedures necessary to establish and use the GRUB 2 password option. In this guide, when the term "GRUB" is used it refers to GRUB 2, version 1.99 or later. Some features such as encrypted passwords may not be available i…
Recent posts
https://docs.python.org/3.6/reference/introduction.html

enable tapping xfce kali

1.apt-get install xinput
2.xinput list

Virtual core pointer                        id=2    [master pointer  (3)]
⎜   ↳ Virtual core XTEST pointer                  id=4    [slave  pointer  (2)]
⎜   ↳ SynPS/2 Synaptics TouchPad                  id=13    [slave  pointer  (2)]
⎣ Virtual core keyboard                       id=3    [master keyboard (2)]
    ↳ Virtual core XTEST keyboard                 id=5    [slave  keyboard (3)]
    ↳ Power Button                                id=6    [slave  keyboard (3)]
    ↳ Video Bus                                   id=7    [slave  keyboard (3)]
    ↳ Video Bus                                   id=8    [slave  keyboard (3)]
    ↳ Power Button                                id=9    [slave  keyboard (3)]
    ↳ HP Truevision HD: HP Truevision             id=11    [slave  keyboard (3)]
    ↳ AT Translated Set 2 keyboard                id=12    [slave  keyboard (3)]
    ↳ HP WMI hotkeys                              id=14    [slave  keyboard (3)]
    ↳ HP Wireless…

what is runlevel in linux

Runlevel Definition src=http://www.linfo.org/runlevel_def.html

A runlevel is a preset operating state on a Unix-likeoperating system.
A system can be booted into (i.e., started up into) any of several runlevels, each of which is represented by a single digit integer. Each runlevel designates a different system configuration and allows access to a different combination of processes (i.e., instances of executing programs).
The are differences in the runlevels according to the operating system. Seven runlevels are supported in the standard Linuxkernel (i.e., core of the operating system). They are:

0 - System halt; no activity, the system can be safely powered down.
1 - Single user; rarely used.
2 - Multiple users, no NFS (network filesystem); also used rarely.
3 - Multiple users, command line (i.e., all-text mode) interface; the standard runlevel for most Linux-based server hardware.
4 - User-definable
5 - Multiple users, GUI (graphical user interface); the standard runlev…

install grub kali

grub-install -v --target=x86_64-efi --recheck /dev/sdaif not try #mount -o remount,rw /dev/sda1 /mnt/boot/efi#mount -t efivarfs efivarfs /sys/firmware/efi/efivars# rm /sys/firmware/efi/efivars/dump-*

Why should you read James Joyce's "Ulysses"? - Sam Slote

MINIX Creator Andrew Tanenbaum Sends Open Letter to Intel Over MINIX Dramaby Chino We recentlyreportedabout MINIX, the hidden Unix-like OS that Intel was secretly shipping in all of their modern processors. This came as a shock to most of us and to MINIX creator Andrew Tanenbaum as well. Although Andrew wasn't completely surprised by the news, since Intel approached him couple years back asking him to make a few changes to the MINIX system. He stated in the open letter that he wasn't looking for economic remuneration, but it would have been nice if Intel had told him about their plans to distribute his operating system in their processors. You can read the complete letter sent to Intel below:

Dear Mr. Krzanich,

Thanks for putting a version of MINIX inside the ME-11 management engine chip used on almost all recent desktop and laptop computers in the world. I guess that makes MINIX the most widely used computer operating system in the world, even more than Windows, Linux, or MacOS. …
A.install Python 3


1. Go to the Projects page in the Google Cloud Platform Console.
2.Click on “Create Project” up top.
3.Name the Project “My Google Assistant” and click “Create.”
4.Wait a few seconds for the Console to create your new Project. You should see a spinning progress icon in the top right. After it is done creating your Project, you will be brought to your Project’s configuration page.
5.Click this link to go straight to the Google Assistant API page. Up top, click “Enable.”
6.Google will warn you that you need to create credentials to use this API. Click “Create credentials” in the top right. This will take you to a setup wizard page where Google helps you figure out what kind of credentials you need to use this API.
7.Under “where will you be calling the API from”, select “Other UI (e.g. Windows, CLI tool)“. For “what data will you be accessing” select the “User data” circle. Now tap “what credentials do I need?”
8.Google should recommend that you create an OAuth 2.0 client ID.…
SGI's Top Tips for Linux® Application Optimization
Memory, like Earth, is not flat
The compiler is one of your best friends for optimization (and you do not need to buy him a beer)
Identify your hotspots
Optimize serial execution
The unavoidable evils - synchronization and communication
Load balancing
Be aware - NUMA is everywhere
How to avoid programming grief
Don't reinvent the wheel - use mathematical libraries
Monitor the system
Measure scalability
SGI® UV™ Tuning
1. Memory, like Earth, is not flat
In ancient times, people believed the Earth was flat, and that if you go to the edge you'll fall into an endless abyss. The Earth is not flat, but many programmers still think memory is "flat," meaning a resource with access that's time-independent of the program data structures and data access flow. This belief may bring abysmal performance.

In a modern system, accessing data in RAM may be >100x slower than accessing data in the local registers in the CPU.

Pulse Wave Techniques Allow Cybercriminals to Quickly Ramp Up DDoS Attacks

By Shane Schick

Bigstock What used to be a gradual buildup of botnet traffic in distributed denial-of-service (DDoS) attacks has morphed into a series of pulses that spray at different targets like a water cannon, security experts have learned.
A blog post from security firm Imperva Incapsula looked at attacks that have taken place so far this year. Whereas cybercriminals traditionally use an army of bots to force a website offline, the researchers discovered pulses of activity that seemingly come out of nowhere with peak impact. In other words, rather than switching on the bots and creating a slow but steady wave, threat actors are now keeping them on at all times but distributing them differently. An Instant Crescendo of Malicious Traffic Companies have tried to mitigate the effects of the attacks by shifting traffic from an on-premises environment to a cloud-based failover area, according to Naked Security. But the near instant crescendo of traffic during these attacks means that t…

Researchers Show Danger of DNA Data Paired With Malware-Infected Strand

By Shane Schick Bigstock Security flaws in bioinformatics software have allowed researchers to demonstrate how DNA data could be injected with malicious code to disrupt police forensic investigations or steal intellectual property. Lab Analysis Tools at Risk A group of academics from the University of Washington used the 2017 USENIX Security Symposium to present their findings, which exposed vulnerabilities in the applications that are often used to analyze DNA data after it has been sequenced. In a paper, titled, “Computer Security, Privacy and DNA Sequencing: Compromising Computers With Synthesized DNA, Privacy Leaks and More,” the researchers discussed how they not only made use of a bug in a processing program, but also injected malware directly into a strand of DNA. As Infosecurity Magazine explained, the executable file was launched as the DNA data was being sequenced by the bioinformatics tool, allowing the researchers complete access to the systems running it. The technique is…