ddrescue – Jupiter Broadcasting https://www.jupiterbroadcasting.com Open Source Entertainment, on Demand. Mon, 22 Feb 2016 02:48:02 +0000 en-US hourly 1 https://wordpress.org/?v=5.5.3 https://original.jupiterbroadcasting.net/wp-content/uploads/2019/04/cropped-favicon-32x32.png ddrescue – Jupiter Broadcasting https://www.jupiterbroadcasting.com 32 32 Random Access Fires | TechSNAP 126 https://original.jupiterbroadcasting.net/42497/random-access-fires-techsnap-126/ Thu, 05 Sep 2013 16:24:27 +0000 https://original.jupiterbroadcasting.net/?p=42497 RAM Prices are getting hot, we’ll tell you why. Plus the router flaw you need to know about, and a pfSense disaster.

The post Random Access Fires | TechSNAP 126 first appeared on Jupiter Broadcasting.

]]>

post thumbnail

RAM Prices are getting hot, we’ll tell you why.

Plus the router flaw you need to know about, a pfSense disaster, your questions our answers, and much much more.

On this week’s TechSNAP!

Thanks to:


\"GoDaddy\"


\"Ting\"

Direct Download:

HD Video | Mobile Video | MP3 Audio | Ogg Audio | YouTube | HD Torrent | Mobile Torrent

RSS Feeds:

HD Video Feed | Mobile Video Feed | MP3 Audio Feed | Ogg Audio Feed | iTunes Feeds | Torrent Feed

— Show Notes: —

Hynix factory in China suffers damage in Fire. RAM prices shoot up

  • The factory in Wuxi, China is responsible for 40 – 50% of Hynix’s output and 12 – 15% of all DRAM manufacturing capacity around the globe
  • The fire started at 07:50 GMT and was extinguished at 09:20 GMT
  • The fire apparently started while Hynix was installing some new equipment
  • There was only one minor injury during the file
  • Hynix has suspended operations at the plant while it evaluates the damage and makes repairs
  • “Following news of the shutdown all memory suppliers have apparently stopped quoting prices”
  • Reuters followup article
  • Hynix reports that the damage is not as bad as initially reported, the huge plumes of black smoke were caused by the fact that the fire was in the air purification system
  • Shares in Hynix’s competitors rose sharply, but then slackened off once it was reported that the damage was not severe. Micron shares were up 4 percent to $14.615 at midday Thursday, after surging almost 9 percent at one point. Sandisk was up 2.3 percent at $56.60, after climbing 6 percent at its peak.
  • Samsung had 32.7 percent of the global DRAM market in the second quarter, Hynix 30 percent and Micron owned 12.9 percent
  • Hynix has published a statement: \”Currently, there is no material damage to the fab equipment in the clean room, thus we expect to resume operations in a short time period so that overall production and supply volume would not be materially affected\”
  • DRAM chip prices nearly doubled in the first six months of this year due to tight supply during the summer, prices had been starting to return to normal but this event will undoubtedly keep them inflated for some time to come

Amazon looking to hire 100 IT staff who can get Top Secret security clearance to work on CIA private cloud

  • After IBM won a lawsuit to restart the bidding to decide who would build the CIA’s private cloud, Amazon has started a new recruiting drive
  • The job openings include: software developers, operations managers and cloud support engineers, among others
  • Candidates must meet all requirements to get a Top Secret security clearance, including passing a federally administered polygraph exam
  • “Amazon\’s hiring effort includes an invitation-only recruiting event for systems support engineers at its Herndon, Va., facility on Sept. 24 and 25. “
  • In filings, Amazon is claiming that it is uniquely qualified to deliver ‘cloud computing’, while analysts have responded by saying that Cloud computing \”simply describes one approach to data center asset provisioning, one that has been around and been practiced by vendors including IBM for many years\”
  • The government originally accepted Amazon’s bid at $148 million over the IBM bid at $93 million
  • Part of the problem was the way the government wrote the original RFP
  • “The vendors were required to address hypothetical scenarios. In one instance, it involved the processing of 100 terabytes of data. But the scenario was ambiguous, and the vendors priced it in different ways, making it impossible to compare prices”
  • Analysts also said that the CIA \”too casually brush off Amazon\’s outages\” when considering their bid
  • Amazon\’s effort to get government cloud work includes being certified by the U.S. under its Federal Risk and Authorization Program, or FEDRAMP.

Kingcope finds vulnerabilities in Mikrotik routerOS sshd

  • Mikrotik RouterOS uses ROSSSH rather than OpenSSH
  • Kingcope found that ROSSSH is vulnerable to a remote pre-authentication heap corruption
  • ShodanHQ shows that there are nearly 300,000 devices running ROSSSH
  • There is an undocumented built-in user account, you can login as ‘devel’ using the admin password, if the file /etc/devel-login exists
  • By sending a login name consisting of the letter A 100,000 times, you can crash the ssh daemon
  • Exploitation of this vulnerability will allow full access to the router device

Feedback:

Round up:

The post Random Access Fires | TechSNAP 126 first appeared on Jupiter Broadcasting.

]]>
Linux Drive Recovery | LAS s27e10 https://original.jupiterbroadcasting.net/40577/linux-drive-recovery-las-s27e10/ Sun, 21 Jul 2013 13:38:15 +0000 https://original.jupiterbroadcasting.net/?p=40577 Some of the best tools to save and recover data from a failing drive are free, and built for Linux. We’ll demo some of the best tools to save your data.

The post Linux Drive Recovery | LAS s27e10 first appeared on Jupiter Broadcasting.

]]>

post thumbnail

Some of the best tools to save and recover data from a failing drive are free, and built for Linux. We’ll demo some of the best tools to save your data, and make the best of a bad situation. Plus a few tips to prevent data loss and monitor the health of your drives.

PLUS: Setting up a Honeypot for security and fun, things to keep in mind, and using a Raspberry Pi as the Honeypot.

Then: A big batch of your emails, dev drama of the week, Ubuntu Forums is hacked…

AND SO MUCH MORE!

All this week on, The Linux Action Show!

Thanks to:

Use our code linux249 to score .COM for just $2.49!

Free Private Registration with your .COM just use our code free3 until the end of the month!

 

Visit las.ting.com to save $25 off your device or service credits.

 

Download:

HD Video | Mobile Video | WebM Torrent | MP3 Audio | Ogg Audio | YouTube | HD Torrent

RSS Feeds:

HD Video Feed | Large Video Feed | Mobile Video Feed | MP3 Feed | Ogg Feed | iTunes Feeds | Torrent Feed

Support the Show:

— Show Notes: —

Save Your Data From a Dying Drive with Linux:


System76

Brought to you by: System76

GSmartControl is a graphical user interface for smartctl (from smartmontools package), which is a tool for querying and controlling SMART (Self-Monitoring, Analysis, and Reporting Technology) data on modern hard disk drives. It allows you to inspect the drive’s SMART data to determine its health, as well as run various tests on it.

GNU ddrescue is a data recovery tool. It copies data from one file or block device (hard disc, cdrom, etc) to another, trying hard to rescue data in case of read errors.

Basic Syntax

ddrescue /dev/disk /mnt/tuna/partimg/mydisk.img logfile
Be sure to write the image to a separate disk/storage location.

Mount the Image

mount -t loop -o ro mydisk.img /somewhere

Comparison to GNU dd

The following features are available in dc3dd that are not found in GNU dd:

  • On the fly hashing with multiple algorithms (MD5, SHA–1, SHA–256, and SHA–512) with variable sized piecewise hashing
  • Able to write errors directly to a file
  • Combined error log. Groups errors together (e.g. Had 1,023 ‘Input/ouput errors’ between blocks 17–233’ )
  • Pattern wiping. Wipe output files with a single hex digit or a text pattern
  • Verify mode
  • Progress reports. See the progress of the operation while it’s running
  • Split output. Able to split output files into fixed size chunks

The following changes to GNU dd’s behavior were made:

  • On a partial read, the whole block is wiped with zeros. This allows for repeatable reads/hashes of a drive with errors.

“A Geek’s Guide to Digital Forensics, or How i Learned to Stop Worrying and Love the Hex Editor”
Presented by Andrew Hoog.

Boot a Failing System

Description: SystemRescueCd is a Linux system rescue disk available as a bootable CD-ROM or USB stick for administrating or repairing your system and data after a crash. It aims to provide an easy way to carry out admin tasks on your computer, such as creating and editing the hard disk partitions. It comes with a lot of linux software such as system tools (parted, partimage, fstools, …) and basic tools (editors, midnight commander, network tools). It can be used for both Linux and windows computers, and on desktops as well as servers. This rescue system requires no installation as it can be booted from a CD/DVD drive or USB stick, but it can be installed on the hard disk if you wish. The kernel supports all important file systems (ext2/ext3/ext4, reiserfs, btrfs, xfs, jfs, vfat, ntfs), as well as network filesystems (samba and nfs).

Tuxboot helps you to create a bootable Live USB drive for Clonezilla live, DRBL live, GParted live and Tux2live. It is modified from UNetbootin and runs on both MS Windows and GNU/Linux. You can choose to download the latest version of Clonezilla live, DRBL live, or GParted live ISO/zip file then create the live USB.

Features:

  • Support Clonezilla live, DRBL live, GParted live and Tux2live. Tuxboot uses the syslinux in the ISO/zip file to make your USB drive bootable, so it is compatible with the same version of syslinux boot menu in the ISO/zip file.
  • Auto find the latest version.
  • Download an ISO file and build bootable USB flash drive on the fly.

OSFClone is a free, self-booting solution which enables you to create or clone exact raw disk images quickly and independent of the installed operating system. In addition to raw disk images, OSFClone also supports imaging drives to the open Advance Forensics Format (AFF).


– Picks –

Runs Linux:

– Linux Foundation Executive Director Jim Zemlin

Android Pick:

Desktop App Pick:

– From viewer David

Search our past picks:

Git yours hands all over our STUFF:


— NEWS —


Untangle

Brought to you by: Untangle

HoneyDrive is a virtual appliance (OVA) with Xubuntu Desktop 12.04 32-bit edition installed. It contains various honeypot software packages such as Kippo SSH honeypot, Dionaea malware honeypot, Honeyd low-interaction honeypot, Glastopf web honeypot along with Wordpot, Thug honeyclient and more. Additionally it includes useful pre-configured scripts and utilities to analyze, visualize and process the data it can capture, such as Kippo-Graph, Honeyd-Viz, and much more. Lastly, many other helpful security, forensics and malware related tools are also present in the distribution.

I installed a Kippo honeypot on a Raspberry Pi to log attacks against a specific service,


Drives for Jupiter

– Feedback: –

BM-GuJRSMgViBNXnafzuRQL3tpHHFSJQ5Wm

— Chris’ Stash —

Hang in our chat room:

irc.geekshed.net #jupiterbroadcasting

— What’s Matt Doin? —

— Find us on Google+ —
— Find us on Twitter —
— Follow the network on Facebook: —
— Catch the show LIVE Sunday 10am Pacific / 1pm Eastern / 6pm UTC: —

The post Linux Drive Recovery | LAS s27e10 first appeared on Jupiter Broadcasting.

]]> Answers for Everyone | TechSNAP 42 https://original.jupiterbroadcasting.net/16331/answers-for-everyone-techsnap-42/ Thu, 26 Jan 2012 20:40:12 +0000 https://original.jupiterbroadcasting.net/?p=16331 We’ve got the answer to life the universe and everything, plus why you need to get upset about ACTA, and patch your Linux Kernel. In this Q&A PACKED edition!

The post Answers for Everyone | TechSNAP 42 first appeared on Jupiter Broadcasting.

]]>

post thumbnail

We’ve got the answer to life the universe and everything, plus why you need to get upset about ACTA, and patch your Linux Kernel!

All that and more, in this Q&A PACKED edition of TechSNAP!

Thanks to:
GoDaddy.com Use our codes TechSNAP10 to save 10% at checkout, or TechSNAP20 to save 20% on hosting!

Pick your code and save:
DOTCO9: .co domain for $17.99
techsnap7: $7.99 .com
techsnap10: 10% off
techsnap20: 20% off 1, 2, 3 year hosting plans
techsnap40: $10 off $40
techsnap25: 25% off new Virtual DataCenter plans

   

Direct Download Links:

   

HD Video | Large Video | Mobile Video | MP3 Audio | OGG Audio | YouTube

 

Subscribe via RSS and iTunes:

Show Notes:

Dreamhost gets hacked, resets all customers’ passwords, has scale issues

  • On January 19th, Dreamhost.com detected unauthorized activity in one of their databases
  • It is unclear which databases were compromised, if they were dreamhost databases of customer data, or customer site databases
  • Dreamhost uses separate passwords for their main web control panel, and individual user SSH and FTP accounts
  • Dreamhost ran in to scale issues, where their centralized web control panel could not handle the volume of users logging in and attempting to change their shell passwords
  • The fast forced password reset by DreamHost appears to have promptly ended the malicious activity
  • Based on the urgency of the reset, there seem to be indications that DreamHost stores users’ passwords in plain text in one or more databases
  • This assertion is further supported by the fact that they print passwords to confirmation screens and in emails
  • Dreamhost also reset the passwords for all of their VPS customers

Linux root exploit – when the fix makes it worse

  • Linux kernel versions newer than 2.6.39 are susceptible to a root exploit that allowed writing to protected memory
  • Prior to version 2.6.39 write access was prevent by an #ifdef, however this was deemed to be to weak, and was replaced by newer code
  • The new security code that was to ensure that writes were only possible with the correct permissions, turned out to be inadequate and easily fooled
  • Ubuntu has confirmed that an update for 11.10 has been released, users are advised to upgrade
  • This issue does not effect Redhat Enterprise Linux 4 or 5, because this change was not backported. A new kernel package for RHEL 6 is now available
  • Analysis
  • Proof of Concept
  • Proof of Concept for Android

Feedback

Q: Tzvi asks how to best Monitor employee Internet usage?

A: There are a number of ways to monitor and restrict Internet access through a connection you control. A common suggestion is the use of a proxy server. The issue with this is that it requires configuration on each client machine and sometimes even each client application. This is a lot of work, and is not 100% successful. However, there is an option know as a ‘transparent proxy’. This is where the router/firewall, or some other machine that all traffic to the internet must pass through analyzes the traffic, and routes connections outbound for port 80 or 443 (HTTP and HTTPS respectively, and optional additional ports) through the proxy server, without any configuration required on the individual clients. Then, you can use the firewall to deny all traffic outbound that is not via the proxy.

This is relatively easy to setup, so much so that as part of the final exam in my Unix Security class, students had 2 hours to setup their machine as follows:

  • Configure TCP/IP stack
  • Download GPG and Class GPG Key
  • Decrypt Exam Instructions
  • Install Lynx w/ SSL support
  • Install a class self-signed SSL certificate and the root certificate bundle to be trusted
  • Install and configure Squid to block facebook with a custom error page
  • Configure Lynx to use Squid
  • Create a default deny firewall that only allows HTTP via squid and FTP to the class FTP server
  • Access the college website and facebook (or rather the custom error page when attempting to access facebook)

While they had a little practice, and didn’t have to configure a transparent proxy, it is still are fairly straight forward procedure.

Instead of rolling your own, you can just drop in pfSense and follow these directions


Q: Brett asks, what do you do after a compromise?

A: The very first thing you do after a compromise, is take a forensic image of the drive. A bit by bit copy, without ever writing or changing the disk in any way. You then pull that disk out and put it away for safe keeping. Do all of your analysis and forensics on copies of that first image (but no not modify it either, you don’t want to have to do another copy from the original). This way as you work on it, and things get modified or trashed, you do not disturb the original copy. You may need the original unmodified copy for legal proceedings, as the evidentiary value is lost if it is modified or tampered with in any way.

So your best bet, is to boot off of a live cd (not just any live cd, many try to be helpful and auto-mount every partition they find, use a forensics live cd that will not take any auction without you requesting it). Then use a tool like dd to image the drive to a file or another drive. You can then work off copies of that. This can also work for damaged disks, using command switches for dd such as conv=noerror,sync . Also using a blocksize of 1mb or so will speed up the process greatly.

You asked about tripwire and the like, the problem with TripWire is that you need to have been running it since before the incident, so it has a fingerprint database of what the files should look like, so it can detect what has changed. If you did not have tripwire setup and running before, while it may be possible to create a fingerprint database from a backup, it is not that useful.
The freebsd-update command includes an ‘IDS’ command, that compares all of the system files against the central fingerprint database used to update the OS, and provides quick and powerful protection against the modification of the system files, but it does not check any files installed my users or packages. The advantage to the freebsd-update IDS over tripwire is that it uses the FreeBSD Security Officers fingerprint database, rather than a locally maintained one that may have been modified as part of the system compromise. In college I wrote a paper on using Bacula as a network IDS, I’ll see if I can find it and post it on my blog at appfail.com.


Q: Jono asks, VirtualBox vs. Bare to the metal VMs?

  • Xen, KVM and VirtualBox are not bare metal, they requires a full linux host
  • XenServer is similar to VMWare ESXi, in that it is bare metal. It uses a very stripped down version of CentOS and therefore far fewer resources than a full host. However XenServer is a commercial product (though there is a free version)
    +The advantage to XenServer over VMWare ESXi (both are commercial but free), is XenServer is supported by more open source management tools, such as OpenStack

Q:Gene asks, IT Control is out of control, what can we users do?


Q: Crshbndct asks, Remote SSH for Mum


Roundup

The post Answers for Everyone | TechSNAP 42 first appeared on Jupiter Broadcasting.

]]> Linux Backup Roundup! | The Linux Action Show! s13e04 https://original.jupiterbroadcasting.net/2649/linux-backup-roundup-the-linux-action-show-s13e04/ Sun, 22 Aug 2010 14:33:20 +0000 https://original.jupiterbroadcasting.net/?p=2649 It’s top 4 ACTION ways to backup data under Linux, then we’ve got some leaked details about Nokia’s up-coming premier MeeGo device, does it blow us away?

The post Linux Backup Roundup! | The Linux Action Show! s13e04 first appeared on Jupiter Broadcasting.

]]>

post thumbnail

This week on The Linux Action Show!

It’s top 4 ACTION ways to backup data under Linux, then we’ve got some leaked details about Nokia’s up-coming premier MeeGo device, does it blow us away? Stay tuned to find out!

PLUS – We take Slashdot to SCHOOL!

All this week on, The Linux Action Show!

Thanks to GoDaddy.com for sponsoring this week’s show! Use our codes LINUX to save 10% at checkout, or LINUX20 to save 20% on hosting!

Direct Download Links

HD Video | Large Video | iPod VideoMP3 | OGG Audio | OGG Video | YouTube

[ad#shownotes]

Our iPhone App:
Grab The Linux Action Show! App for your iPhone or iPod touch here!

iPhone App

This week’s show notes:

The new PocketBooks, Run Linux.

Android Pick:
Evernote

  • Syncs with rich web client (and Win/Mac/iPhone/iPad/Android apps)
  • Will be powering Chris’ & Jeremy’s brain for the next week +
  • Results will be discussed on Jupiter@Nite Monday August 31st

This Week’s News:

Google voice and video chat, now support Linux!

  • First step to Android video chat?
  • Google claims it took quite a bit of changes to work with Pulse Audio

Nokia’s QWERTY-slidin’ N9 shows up running MeeGo!

  • The prototype, built in Finland, is said to have an entirely metallic construction
  • A couple more pictures here.
  • Even more p0r… err.. Pics here.

Critical Security Flaw Silently Patched

  • The attack allows a (unpriviliged) user process that has access to the X server (so, any GUI application) to unconditionally escalate to root.
  • It doesn’t take advantage of any bug in the X server!
  • Been an issue since Kernel 2.6 was released October 8th 2003

Root Privileges Through Linux Kernel Bug (Same story, different angle. Slashdot claims they are not related, despite the fact that they are.)

  • More of a conceptual issue.
  • The problem is in the memory management area of Linux allows local attackers to execute code at root level.
  • SUSE maintainer Andrea Arcangeli provided a fix for the problem in September 2004

https://www.webupd8.org/2010/08/official-statement-steam-not-coming-to.html

Android gets Python Scripting

C# comes to Android via MonoDroid

Linux Backup:

  1. fwbackups
    1. Great UI
    2. Supports multiple OSes
    3. Remote backup support
    4. Image backup support (not  positive on this)
  2. Mondo Rescue
    1. Backs up your GNU/Linux server or workstation to tape, CD-R, CD-RW, DVD-R[W], DVD+R[W], NFS or hard disk partition.
    2. Allows you to restore your computer from bare metal.
    3. It supports adjustments in disk geometry, including migration from non-RAID to RAID.
  3. Back in Time
    1. Inspired from “flyback project” and “TimeVault”.
    2. Keep in mind that Back In Time is just a GUI. The real magic is done by rsync (take snapshots and restore), diff (check if somethind changed) and cp (make hardlinks).
    3. A new snapshot is created only if something changed since the last snapshot (if any).

Chris’ favorite for a network: BackupPC

Data Rescue:
ddrescue – Copies data (best effort) from bad sectors to good sectors
dd_rhelp – A nice tool to make using ddrescue easier.

Not sure what you should be backing up? Read this article.

Download:

The post Linux Backup Roundup! | The Linux Action Show! s13e04 first appeared on Jupiter Broadcasting.

]]>