FREE THOUGHT · FREE SOFTWARE · FREE WORLD

The Net is vast and infinite...

Internet Census 2012 – Port scanning using insecure embedded devices – Carna Botnet

Internet Census 2012 - Port scanning using insecure embedded devices - Carna BotnetWhile playing around with the Nmap Scripting Engine (NSE) we discovered an amazing number of open embedded devices on the Internet. Many of them are based on Linux and allow login to standard BusyBox with empty or default credentials. We used these devices to build a distributed port scanner to scan all IPv4 addresses. These scans include service probes for the most common ports, ICMP ping, reverse DNS and SYN scans. We analyzed some of the data to get an estimation of the IP address usage.

Hacking

Finding Global Memory Hogs in WordPress

WordPress

TMUX

TMUXTMUXStop wasting your lives with Mac Terminals.. or Macs. Get a real machine and then get a real shell multiplexer! For many years we all loved GNU Screen, but tmux is by far a better option today. The only time I am in the shell and not using a multiplexer, is when I'm not on one of my machines. My Arch Linux machines all run URxvt and my .bash_profiles all start tmux automataically, whether in X or single-user mode, tmux is where it's at.

Hacking, Linux

Caching WordPress with Batcache and Memcache

Caching WordPress with Batcache and MemcacheUsing memcache for me personally and the client sites I work on, has improved performance by over 1000%, in some cases even higher than that. It is a truly revolutionary way to optimize the performance of MySQL queries, remote requests such as to twitter or other apis, and this article is step 1. Plan is to go all the way to step 10 in future articles, it it grossly underused and misused in the WP world.

Optimization, WordPress

Success comes before work only in the dictionary

In the early days of CS and the net, most of those involved were extremely capable and talented individuals. Nowadays, you would be lucky to find 1 in 5,000 CS professionals with the same passion for computing, excellence, and self-improvement. Sadly, it's become a career perfect for the indifferent and apathetic. However, Excellence 100% still exists.

Hacking

I got hacked

I got hackedWell, not this sites server, which has never been hacked, but a server hosted with hostgator.

Interestingly, the hacker sent me an email and left me an mp3, which I've uploaded for your listening leisure.

Do real hackers exist? Yes. Can we coexist? Preferably!

Hacking

Stopping WordPress Exploits and Spam

Secure WP Super Cache, Anti-exploits, Mitigation techniques. A bunch of current ways to stop wordpress exploits and spam. block the most common wordpress exploits

Hacking, Htaccess, PHP, Security, WordPress

AskApache is an FSF Contributing Member

My Online Tools


Popular Articles


Hacking and Hackers

The use of "hacker" to mean "security breaker" is a confusion on the part of the mass media. We hackers refuse to recognize that meaning, and continue using the word to mean someone who loves to program, someone who enjoys playful cleverness, or the combination of the two. See my article, On Hacking.
-- Richard M. Stallman


Live Free or Die


The power of the Web is in its universality. Access by everyone regardless of disability is an essential aspect. -Tim Berners-Lee





[hide]

It's very simple - you read the protocol and write the code. -Bill Joy

Except where otherwise noted, content on this site is licensed under a Creative Commons Attribution 3.0 License, just credit with a link.
This site is not supported or endorsed by The Apache Software Foundation (ASF). All software and documentation produced by The ASF is licensed. "Apache" is a trademark of The ASF. NCSA HTTPd.
UNIX ® is a registered Trademark of The Open Group. POSIX ® is a registered Trademark of The IEEE.

+Askapache | askapache

Site Map | Contact Webmaster | License and Disclaimer | Terms of Service

↑ TOPMain