LinkedInTwitterFacebook

Create bootable USB drives with UNetbootin.

The UNetbootin software allows you to create bootable Live USB drives for Linux distributions without burning a CD.
You can either let UNetbootin download one of the many distributions – most are old, see example of Fedora.
Using is simple loads distributions either by select an ISO file or a distribution to download
Select a target drive (USB Drive or Hard Disk), then start by select the USB Drive or Hard Disk by your hardware and then press OK button.
Note: Is not working every version of  UNetbootin but I tested in the past. If don’t work then try this tutorial.

Share

Linux: Display or change a pre-login message .

Open file /etc/issue and change the text:

You can use this to add some new infos or ascii image.
The images can be transform into ascii image by using convert image to ascii.
One example to convert a picture into ASCII TEXT,HTML is this website: picascii.com
The main problem can be if you have escape codes consist of a backslash (\) immediately followed by one of the letters explained below:

\b : Insert the baudrate of the current line.
\d : Insert the current date.
\s : Insert the system name, the name of the operating system.
\l : Insert the name of the current tty line.
\m : Insert the architecture identifier of the machine, eg. i486
\n : Insert the nodename of the machine, also known as the hostname.
\o : Insert the domainname of the machine.
\r : Insert the release number of the OS, eg. 1.1.9.
\t : Insert the current time.
\u : Insert the number of current users logged in.
\U : Insert the string “1 user” or “ users” where is the number of current users logged in.
\v : Insert the version of the OS, eg. the build-date etc.

Share

The ASSOC command and scam using (MS-)DOS* Attack

If you want to know which file is associated with which program then we can do this by typing the following command

ASSOC is a command that displays the program and/or functionality ASSOCiated with a specific file type.
The intended victim was influenced by recent reports relating to the recent Internet Explorer bug into believing that it was possible that his machine had been infected as a consequence of that bug, and the scammer used the old ASSOC trick to convince him that one of the lines displayed by ASSOC showed his computer’s ‘unique ID’.
See example:
.ZFSendToTarget=CLSID\{xxx…}
Typical ASSOC output: the string the scammers like to use is flagged in red color.
This log entries as something more serious in order to persuade the intended victim to install remote access software such as AMMYY or TeamViewer / LetMeIn to allow the scammer to access the victim’s machine.

Share

Windows 10 – network monitor.

This program will help you see what connections, processes and packages are running on your workstation as well as the addresses in use.
The address from where you can take this program is this link.
As you can see from the images below, there are some inconsistencies that arise from the operation of the operating system.
I do not want to detail this issue but because they can be normal to a more special configuration.
An example is the UDP protocol – I don’t use torrents software but some software can use this protocol.
Under other conditions, they should not.

Share

Windows 10 – show system information.

This commands will show you information about your Windows operating system and network:

Share