Leap Motion with Windows 8 and Fedora 17 (Linux) – some experiences

As you might already know, the Leap Motion is an input device for Windows, Mac and Linux systems. Once it is connected to a computer, it creates a space in your room in which it will recognize all your fingers and their movements. It is very similar to the Microsoft Kinect; however, the Leap Motion […]... Read More

Cfengine3: Check for running services

In the last post about Cfengine 3 we talked about a simple script which creates a file and writes something into it. Today, we will create a simple example script which checks if two specified services are running. Writing the script Connect to your Linux box and create the following file: /var/lib/cfengine3/inputs/example2.cf body common control […]... Read More

Real-time system monitoring with Dag Wieers’ dstat

Every system admin normally wants to be in full control of his box. One part of the “full control”-thing is to monitor your Linux system. You usually want to know what happens right now and how it affects the system. There are tools like iotop, cbm, htop, top, vmstat and so on, but none of […]... Read More

DRBD with LVM: Quick installation guide

This is a quick installation guide, based on the official manual by Linbit. It contains nothing new and is more a note than a real guide. I need the commands from time to time, so I thought it might be a good idea to collect all the commands being necessary to get a basic DRBD […]... Read More

The Joomla Hacking Compendium

Download The Joomla Hacking Compendium here. With great pleasure I hereby announce the availability of the new “The Joomla Hacking Compendium”. It contains almost 1000 lines of pure knowledge and shows you the way to hack and protect Joomla. It contains the following chapters: Please find an excerpt below:... Read More

Security / Penetration Testing (Debian/Ubuntu) – Why Google Skipfish failes to be a top-class web vulnerability scanner

Some of you might have read my little tutorial about how to use Google Skipfish for web vulnerability scanning. While I was fascinated by the efficiency and speed of this application, I started to use it more often. Although manual testing can’t be replaced by a machine, web vulnerability scanners are still a helping hand. During […]... Read More