Linux SSD partition alignment tips
Yes, this is another post on the internet about properly aligning your SSD partitions on Linux. It’s mostly my notes that I have gathered from other posts around the net. Please read the whole post...
View ArticleMusic Player Daemon on OS X
I use a Mac Mini with OS X 10.5.8 as a media center connected to my TV and I wanted to install Music Player Daemon on it so I could control the music remotely from my laptop or phone. I mostly followed...
View Articleopen magnet URLs with xdg-open
Browsers on Linux should use xdg-open to open URLs. From xdg-open’s description: xdg-open opens a file or URL in the user’s preferred application. If a URL is provided the URL will be opened in the...
View Articleitop – Interrupts ‘top-like’ utility for Linux
On a 24-core Linux machine I wanted to monitor interrupts/sec. The reason is quite complicated, let’s say that there are more than 100.000 interrupts/sec and I want to monitor who needs what. First I...
View ArticleBind9 statistics-channels munin plugin
Bind9, since version 9.5, offers an experimental embedded web server which can provide statistics abound Bind through HTTP. Upon enabling, one can access this web server and get an XML response full...
View Articlesetting up tor + obfsproxy + brdgrd to fight censhorship
*WARNING* 14/01/2014 This post is quite deprecated. For example obfsproxy has been completely rewritten in python and there is a newer and more secure replacement of obfs2, named obfs3. Please read...
View ArticleBypassing censorship devices by obfuscating your traffic using obfsproxy
*WARNING* 14/01/2014 This post is quite deprecated. For example obfsproxy has been completely rewritten in python and there is a newer and more secure replacement of obfs2, named obfs3. Please read...
View ArticleWhen in doubt, always blame the application
When you have a misbehaving system and you are not sure what the problem is, always bet on a poorly written application. Here’s a small example of how another poorly written web application caused...
View ArticleScaling a small streaming system from 50 to 4000+ users
This post was originally written on 09/11/2012 but for various reasons it couldn’t be published earlier. It won’t be very technical, it’s mostly a behind the scenes view of how some of us at NOC GRNET...
View ArticleWorld city map of Tor nodes
Some months ago I started playing with the idea of creating a world map that would have every Tor node on it. Obviously I wan’t the first one…I soon discovered Moritz Bartl’s post on the same topic....
View ArticleAnother day another hacked website
Yesterday morning, phone rings to notify my of a new sms. Someone could not access his website on some server that I am root/administer. I tried to ping the server and got 1 reply every 10-15 packets...
View ArticleAnonymize headers in postfix
E-mail headers usually leak some information about the person sending the email. Most servers reveal the sender’s originating IP, but sometimes we might not want this behavior. Here’s a simple way to...
View ArticleCreating a new GPG key with subkeys
A few weeks ago I created my new GPG/PGP key with subkeys and a few people asked me why and how. The rationale for creating separate subkeys for signing and encryption is written very nicely in the...
View Articlekeys.void.gr – A GPG Keyserver in Greece
After some months of entertaining the idea of setting up a public gpg keyserver I finally managed to find some time and do it this weekend. Habemus keys.void.gr Keyserver! Some history The first time I...
View ArticleFirejail with Tor HOWTO
A few years ago I created a set of scripts to start applications inside a linux namespace and automatically “Tor-ify” their network traffic. The main reason behind this effort was to provide some...
View Article