put this into /root/.bashrc:
ROOTALERT=$(echo "ALERT - Root Shell Access On: "$(date) $(hostname -f) $(who)); echo "$ROOTALERT" | mail -s "$ROOTALERT" email.address@domain.tld;
put this into /root/.bashrc:
ROOTALERT=$(echo "ALERT - Root Shell Access On: "$(date) $(hostname -f) $(who)); echo "$ROOTALERT" | mail -s "$ROOTALERT" email.address@domain.tld;
Now a new, free alternative to Spamhaus has arrived: the Barracuda Reputation Block List (BRBL), provided by well-known, open source-based Barracuda Networks. And Barracuda CEO Dean Drako says the company has no plans to charge for the service in the future. He says that BRBL (pronounced “barbell”) “does cost us a little bit of money to run, but we think that the goodwill, the reputation and the understanding that Barracuda is providing the service will do us well in the long run.”
Source: Barracuda offers a new — and free — alternative to Spamhaus
Synergy is available from https://symless.com/synergy.
My Raspberry is running Ubuntu MATE but this should work with Raspbian too. It is working on Kubuntu 16.10.
Sources:
Install the necessary tools, get the source code, build, deploy and configure the Synergy client
apt-get update apt-get install gcc cmake libx11-dev libxtst-dev qt4-dev-tools libcurl4-openssl-dev libssl-dev libavahi-compat-libdnssd-dev git mkdir /root/downloads/ cd /root/downloads/ git clone http://github.com/symless/synergy/ cd ./synergy ./hm.sh conf -g1 ./hm.sh build cp -a ./bin/. /usr/bin
Create a script to start Synergy client
mkdir /home/YOUR_USER/scripts/ vim /home/YOUR_USER/scripts/synergy.sh
#!/bin/bash synergyc --enable-crypto -n NAME XXX.XXX.XXX.XXX setxkbmap de
chown -R YOUR_USER:YOUR_GROUP /home/YOUR_USER/scripts/ chmod u+x /home/YOUR_USER/scripts/synergy.sh
Create the necessary Synergy client config file for encryption
mkdir -p /home/YOUR_USER/.synergy/SSL/Fingerprints vim /home/YOUR_USER/.synergy/SSL/Fingerprints/TrustedServers.txt
EX:AM:PL:E3:E4:F5:06:07:08:09:00:01:02:03:04:05:06:07:08:09
chown -R YOUR_USER:YOUR_GROUP /home/YOUR_USER/.synergy/
To configure lightdm to auto login, add the directive autologin-user,
specifying a user name, to /etc/lightdm/lightdm.conf.d/60-lightdm-gtk-greeter.conf.
vim /etc/lightdm/lightdm.conf.d/60-lightdm-gtk-greeter.conf
[SeatDefaults] greeter-session=lightdm-gtk-greeter autologin-user=YOUR_USER
Weil es hier besser aufgehoben ist…
Please do not attempt to upgrade your raspberry pi to a newer version of the distribution (for instance, from 15.04 to 15.10) as the underlying kernel is not designed to do this. This process will take a very long time to complete while potentially filling up your SD card to a point where there is no more free space.
It is safer to back up all your data you wish to keep and re-flash the card with the new image. Attempting to upgrade may corrupt the SD card, prevent your installation from booting, or cause severe glitches.
You can, however, install regular updates via the Software Updater utility for your installed software.
The same kernel provided by the Raspberry Pi foundation is used in this edition of Ubuntu MATE. As this kernel is delivered like a “firmware” blob, updates are not distributed via the Software Updater or apt-get.
Instead, to update the kernel, open a terminal and run:
rpi-update
Currently, Hardware accelerated applications are not supported unlike Raspbian. Applicationsthat depend on OpenGL ES libraries or require the GPU will fail to start.
For playing videos, the application omxplayer will be able to do this and is pre-installed. If you are looking to play MPEG-2 or VC-1 video files then you will need MPEG-2 and/or VC-1 licenses from the Raspberry Pi Store.
For users who are looking to create their own headless “server” using Ubuntu MATE, there is a utility for toggling the graphical environment.
To disable X11 and login via the console:
graphical disable
To enable X11 to restore the Ubuntu MATE desktop:
graphical enable
Changes take effect after a reboot.
If you use Postgrey (and you should do it) on your mail servers and you want to have some statistics on the amount of greylisted messages and other information, you should find useful the following…
Source: How-To create statistics for Greylisted messages using Postgrey
Is there a way to do this? Or I have to take manually every record from Registry?
It’s 2014 and remote unix shells are as popular as ever. Which is great, except that people don’t seem to be using the more advanced security features nearly enough. So, what are they and how can you use them?