Oct
13
2009
Arrows aren’t used in ksh as a default. To enable command history like in Bash, add the following lines in the .profile or .kshrc file: ^P, ^N, etc aren’t one single character. Enter Ctrl-V and Ctrl-P to display them in vi. Auto-completion is only available for files, not commands. Press either twice on the escape key, […]
Tags: AIX, ksh, linux, solaris, unix
Sep
04
2009
WPA encryption is not much hassle to set up and is way more secure than WEP if you use a strong pre-shared key. First off, we’ve got a wifi interface that can be displayed with iwconfig (from the wireless tools): [root@db ~]# iwconfig lo no wireless extensions. eth0 no wireless extensions. ath0 IEEE 802.11g […]
Tags: debian, fedora, linux, redhat, ubuntu, wifi
Aug
09
2009
Cracking a WEP key is extremely easy and is a matter of a few seconds. Truth? Pretty much… We are going to decrypt traffic in real time as well without even needing to connect to the wireless access point. All steps will be run under root super-user as interfaces state needs to be changed. Aircrack Installation […]
Tags: linux, security, wifi
Feb
27
2009
Packard Bell Easynote E6100 Graphic cards aren’t always detected by Linux. This can be a problem as many distributions only support graphic mode installation type, like Ubuntu, Fedora or Debian. This is the case of my Packard Bell Easynote E6100 and its onboard Via Unichrome card freezing on graphic mode startup. One solution is to […]
Tags: linux, ubuntu
Jan
21
2009
This shell script finds duplicate files in a given directory comparing their (md5) checksum. This means the content is checked and is strictly identical, rather than the filename or date of creation. This is usually useful to delete large files. ‘Find’ command option -size can help speeding up and finding the largest duplicate files. […]
Tags: linux, unix