Tag Archives: Linux

Command Line Fu: surveillance with Raspberry Pi

Today we are building the a primitive surveillance system using a Raspberry Pi. This is our goal: Take a picture every hour -> send it as encrypted email These are the basic prerequisites: A Raspberry Pi, no matter which model. … Continue reading

Posted in Encryption, Security/Encryption | Tagged , , , , , , , , | Leave a comment

Joke’s on me I guess

Every once in a while I screw up badly. This month it was that time again. I tried to uninstall a package in openSUSE using the command line tool zypper. What I wanted to do was I typed, I hit … Continue reading

Posted in Fun | Tagged , | Leave a comment

My conky config

In this quick post I will share my configuration for the X system monitor conky. It is only a slight modification of the conkyrc_seamod example. I have added four rings of CPU usage (to support 8 core CPUs). Also I  … Continue reading

Posted in Programming | Tagged , , | Leave a comment

Quick tip: changing the userbase directory in Mathematica (Linux)

Recently, I came across the problem of readdressing the Mathematica user folder for a sort-of-portable version of Mathematica. In Linux this folder resides in the user’s home directory as ~/.Mathematica and contains all user defined settings as well as additional … Continue reading

Posted in Mathematica | Tagged , , | Leave a comment

Creating a password list for WPA/WPA2 dictionary attacks

In this post I will discuss some options of creating your own and most likely unique list of passwords, which can be used for dictionary attacks against certain security setups like WPA. I have to insist that you read and … Continue reading

Posted in Passwords, Security | Tagged , , , , , , , , , , | 1 Comment

Strong passwords from /dev/random

The most secure passwords are, roughly speaking, long and random sequences that cannot be cracked by means of dictionary or brute-force attacks. This assumes of course, that the passwords are stored in a reasonable way, but that is typically not … Continue reading

Posted in Passwords, Security | Tagged , , , , , , , , | 4 Comments