The Bash Hackers Wiki [link]

Link

The Bash Hackers Wiki

This wiki is intended to hold documentation of any kind about GNU Bash. The main motivation was to provide human-readable documentation and information so users aren’t forced to read every bit of the Bash manpage – which can be difficult to understand. However, the docs here are not meant as a newbie tutorial.

Advertisements

Real-time Collaborative Coding with Github’s Teletype for Atom

Standard

Github announced today the Teletype package for Atom, package for real-time collaborative coding. Below is an animation and video of how it works.

https://camo.githubusercontent.com/6ca046b659fe0960dae68750a17577f97a0f6500/687474703a2f2f626c6f672e61746f6d2e696f2f696d672f706f7374732f74656c65747970652f636f64652d746f6765746865722e676966

via Github blog

 

 

Remove Exif data from Images in Linux, How to

Standard

Images usually contain metadata referred to as exif data. Nowadays this includes your camera or phone name and model. Also the location where the image was taken is also included if the GPS is enabled and you did not turn off geo-tagging.

Here’s how such exif data looks like (excluding location which I have disabled):

exiftool IMG_20171010_223446.jpg

Continue reading

Facebook Introduces Physical Keys (FIDO U2F) as Security

Standard

Today, January 26, Facebook announced that they have introduced ‘physical keys’ (i.e. usb keys) as an option of the two-factor authentication. Google has already introduced this two years earlier.

A few years ago two-factor authentication was introduced by Google and Facebook among many other companies which allowed the user to set an extra security measure to avoid loosing their account in case their password was stolen. This extra layer required the user, if using a new computer or IP, to enter an authentication code generated (regularly) through an app (e.g. Google’s authenticator for Google accounts).

Continue reading

Check if you’ve had a security breach

Aside

Many of the popular websites and services have been or at some point or will be targetted and exploited. As a result, it is most likely that at least one of your online accounts has been pwned at some point. This doesn’t mean your account has been cracked but it could mean that some of your private information has been leaked (e.g. email, password, personal info like date of birth, etc…). Recently Gmail has been exploited by attachement phishing.

There’s no guaranteed way to check if your account has been hacked but one way is to check if you’ve been pwned. Just enter your username or email to check if you’ve been pwned.

Links – Have Fun Typing & Learning Vi/Vim Shortcuts

Link

Vim Adventures – navigate the Vi/Vim land by learning Vi/Vim shortcuts

ZType – Typing (shooting) Game

Your Phone, Tablet, and Computer Screens Aren’t Safe from Hackers

Standard

Pixels on your gadgets’ screens act as accidental antennae that constantly broadcast screens’ contents. A new paper says the industry needs to fix this security risk before hackers can exploit it.

This hack is possible because the internals of every computing device we own give off electromagnetic radiation. It leaks from the cables and circuitry that carry the display signal from the processor to the screen, and it’s even emitted by the screen pixels themselves. These pixels [Correct? Else what?] become accidental antennas that transmit the display signal into our surroundings—one that a would-be hacker could tune into.

via AGU Highlights – Radio Science – Your Phone, Tablet, and Computer Screens Aren’t Safe from Hackers

DOI: 10.1002/2016RS006034