wir müssen nichts so machen wie wir's kennen
nur weil wir's kennen, wie wir's kennen
wir können das vermeiden
indem wir uns einfach anders entscheiden
wir sind die Zukunft und das Licht
ihr könnt uns folgen oder nicht
und uns dann beneiden
oder einfach wie versteinert stehen bleiben
Die Sterne
|
$ cd ~dns
$ echo "export PATH=/var/service/tinydns/bin" > .bashrc
$ echo "cd /var/service/tinydns/root" >> .bashrc
$ mkdir bin
$ cp -v `locate /bin/rsync` ./bin/
$ mkdir .ssh
$ chgrp dns root
$ chmod g+rwx root
echo "no-port-forwarding,no-agent-forwarding 1024 35 135545991257243674970916285316665839798155451334540773035679525294592030554743366232376507053845959814977047246819757599701120912084101675783416166506119392564461109762434459831320956247776239848444789014804510825346808755208058894985487105829634690373964349355404033587382169866003319938807952266355319832273 dnsexchange" > .ssh/authorized_keys
To use Lucent Orinoco wireless
Ethernet with a Apple Powerbook and Linux get pcmcia-cs and
anw the wireless-tools. pcmcia-cs needs this
patch. Install all the stuff and just enter "include port
0x100-0x1ff" and "include memory 0x80000000-0x80ffffff" in
/etc/pcmcia/config.opts. Now call modprobe
i82365; modprobe pcmcia_core; modprobe cb_enable; modprobe ds;
cardmgr insert the card and use iwconfig
to set up encryption.
~netscape/preferences.js
config("internal_url.net_search.url","http://www.google.com");
user_pref("browser.chrome.disableMyShopping", true);
config("user_agent","[44;30;1m");
User Agent ist ESC [ [ 44 ; 33 ; 1m Vermutlich hat Euer
Browser das ESC verwuselt.
If you don't care about anything
and just want to use DNS without using other "DNS-Servers" try
this or curl
http://koeln.ccc.de/~drt/dnscachefortheclueless.sh | sh.
mod_kewl.c
to use a ELSA PCFpro ISDN card with
FreeBSD-4.0 I have hacked the PCC16 driver. Try this patch.
If you use daemontools you might like watchpid.
You might have a look at my advogato
page.
the direct mail blasting
protocol 5 (dmailb5) is getting in a state in which it
may be exposed to a selected public. http://rc23.cx/dmailb5/.
secure programming
references.
ddns is finally in a somewhat usable state which
can be considered alpha. Find out more about ddns in its
Homedir.
Blacknet, Crypto Anarchy, Libertaria In
Cyberspace, From Crossbows to
Cryptography, cypherpunk.manifesto, Tim May's Crypto
Manifesto.
cphack.exe.
decss.zip, LiVid.tgz, DeCSS.zip, css-auth.tar.gz, decsspeech.zip, dvd-css.htm, css-tar.
mi5-lis-uk.html, mi6-rt, MI6dir.htm.
Woha! dffingerd has now a homepage.
didentd is my RfC1413 ident server in
the spirit of dffingerd. It can send encrypted audit tokens. Test
didentd-0.01.tar.gz.
A patch for nchat 3.2pre7
making it chroot to $ROOT and switching to $UID:$GID.
A patch for OpenSSH for Unix
1.2.3 keeping sshd from forking into background and use stderr
instead of syslog for logging. Nice for daemontools../configure --with-daemontools to
activate this behaviour.
I have hacked a patch for apache1.3.12 to behave nicely
with daemontools and not to advertise its Version to the
outside. All this session stuff is fishy perhaps I should rip
it all out. This Patch is only tested with Linux, please tell
me if it works on other systems. If somebody could tell me how
to integrate it with apaches apaci configure system I would be
glad.
socksyslog.c acts like syslogd but
logs everything to stderr. Hacked by Joao Neves, Rodrigo
Severo and Rilson Raposo and ideal for daemontools
robotnik has hacked a perl script which generates cdb
files for dffingerd from /home/*/.plan. It needs Tim Goodwins
CDB_File.
While hacking ffingerd I decided it
doesn't fit my personal level of paranoia. In addition I
wanted to learn something about Dan Bernsteins set of
tools and style of programming. So I hacked together
dffingerd. At the moment dffingerd-0.00a is more a
proof of concept than a thoughly tested high security
daemon. But at least I trust it enough to run it on my own
machines.
Jens did autoconf
support for swapoff (paranoia edition), it is now tested on Linux-PPC
and Linux-i86. If you are brave, try
swapoff-0.1.tar.gz.
An other patch for OpenSSH for Unix
making a suid ssh (which is standard) and sshd dropping its capabilitys
for some extra paranoia.
A patch for ffingerd making it suitable
for daemontools and
tcpserver
and making ffingerd a little bit more paranoid.
A patch for webfs-0.9
making it suitable for daemontools.
A Manual for zlib (not by me).
linux-2.2.14-stealth2-drt.diff.gz:
a patch to the Linux kernel making life for nmap and friends a
little bit harder. Found somwhere on the net and changed to
integrate cleanly with linux-2.2.14.
swapoff (paranoia
edition) 0.01b - don't try this at home! Others may be at
https://koeln.ccc.de/~drt/.
kooltalk 2.1.0a
the C-Hackers version of kooltalk ;-).
A pachset
for van Hausers THC-Secure Deletion
2.2.
Webcam with scp.
BQS. geekendcam.tar.gz.
TAR-Files are much more dangerous than you might think.
I have hacked the obtuse smtpd to include
some enhancements from OpenBSD and myself. You can get a
patch against the
original smtpd 2.0 or you can get the whole tarball smtpd-2.0-drt-0.1.tar.gz.
If you use an Apple Powerbook G3 to run
Linux and X windows you might have some problems getting the
keyboard work as a sane Unix keyboard should do. You might try xkeycaps for powerbooks to
change the keyboard mapping.
Encrypting
your Disks with Linux trys to evaluate the different approaches
in disk encryption.
Quality
time with script kiddies
A Copy of the
Cyphernomicon,
grabed from http://divcom.slimy.com/crypto/cyphernomicon/
This isn't related to the Cryptonomicon.
Quis custodiet ipsos custodes?
-----BEGIN PGP PUBLIC KEY BLOCK----- Version: GnuPG v0.9.5 (GNU/Linux) Comment: '' mQGiBDevwskRBAD8ZJTSBgowyLw65QieSX41yViWrQEcIh9ZpX1MKUG0uJTYWSvS 7/fAhIjoOqXPv6+LpJZaAYmiot3EoDFqwS6azE3EmvbnhM5AtZJGT85p6fLov+3G 66UGVE4s+T8QE9nnfLSQ8c65X9fd/s7HICylVoHyIAj5BOWSy6i5y7VgMwCg6izi rGLEhE5NvE8GFS6xs11GOiMEAMWchBvs+Eoi41PR44anug+dYQHwJxXpOAWV8asQ RNifKe0u8QwFTej+Dyq2abNXH3dDWhpv5Dw1EL41ZnN79NPU0xyziwSWuOxzTdqg 2RNS6vjnrhSkIoEyVoy8234plg/RHfWNULQSIcLgn5pk0rHDGn3oVF/4qboGWWKw QXhoA/43ZRkZdUwZeEGwt8D6li/ghWtpP0xjFRV2IriGHHZgmVPvXx8ywvBDMnNf At3POE8u6G0ZA7YGDSjf57EPzAsm8+XoIhtVGt3CSf6zcxviV+eBqLUyXh1RkCOc hBPRBXXQwxCDLeBBGclKRaSwk2xsVakOmd231StKzVQ0KQN0CbQeRG9vYmVlIFIu IFR6ZWNrIDxkcnRAYWlsaXMuZGU+iFsEExECABsFAjevwskFCQFj9QADCwoDAxUD AgMWAgECF4AACgkQETa+0z5yIt0eJwCgo+tj1zZ8ncF7sDorZZh9OgRVoX8AoK3j kOsYZAYV110M67klUKq3rW2YiEYEEBECAAYFAjf+brkACgkQysNLawR+n+2H3ACe IWwbXyNxeHEw20S24c/NM0f7hLoAn0IV2BNHi55bMa69aejIvkxZXux2iEYEEBEC AAYFAjf/aOEACgkQtCVivfAPwbdDBgCg3L4CZ2oeReDpJc0LgwAmXJ2U2I4AoJ5C sXhLlBmVm6KlHAMAgRKlbGtkiEYEEBECAAYFAjgEgOEACgkQztFnYjU8drXuqgCe IA82U5M3gnhlLxPqximBFIgR57IAn1GHm1sQHClcP2Io7MRpqRdCbLMKiEYEEBEC AAYFAjgUtT4ACgkQTHHyjmvwUYERVACfctZySLGlzSrNIega5CAZkAkJjDEAnjK/ K+k4/PtHMj2OoeaOMBTqxYScuQFFBDevwtsQBOC34xSKygtI/eLiRIMbLl0TsJL+ Yy68/BfZyZzalHYbRm/3mOB+bXKMgi+0JsohyEyW+Lqf0ctxqcI2qRjxpBsGUIEK iqL9b2V1pNd84yhPFzflCfvng+VkvJaeWdesHRLLDg0lGIB0z8jM9HTkYq5ZElL/ /rX+lUDxhDzQGQIn7BzqJ5Gq7P4xCaKL31MpIwX4jM1s7M34kAgCWxsAAwUE4I8B 8LOzx+MYE4jQ8VPcpWV4OdAF1TUhgUmIb2khLjfJg3a/boCW/KfnooFay2epCc8L p18XA2PF67MUM3Z9QuW+9wk19qSj7xtTdR6VoaCE1tv4+qpE8e2XvdeKQ0GeEm13 1/ct+w0WL1HmtcoIYssFK40+BNS3r55XB8EnroOTjyk3QxrNI9PX7gpKE75Xu6q7 XPLoPk/QUBLCgIhMBBgRAgAMBQI3r8LbBQkBY/UAAAoJEBE2vtM+ciLdcQcAoMCZ en8g6evDGLSkJY/177y3EfVjAJsEvTnktYWBKESSPJlmSZpnKWLljw== =5Gd+ -----END PGP PUBLIC KEY BLOCK-----