Author: <span class="vcard">marc</span>

So You’re About to Get Hacked

Recently, a friend of my wife had something on Facebook go viral and she became the target of some, shall we say, unpleasant people.  Here was my advice to her on how to attempt to secure her digital life.  This is by no means complete, since there’s much more to security than I can fit…


Target’s creepy personal tracking [Updated]

  In 2013, Target was the victim of the biggest retail hacks in U.S. history.  While I’m sure they’ve improved their security since then, I still don’t trust them with my information. Data breaches are inevitable, and the easiest way to contain the damage is to limit the amount of information you allow to be…


“Natively” Run Windows Applications on Linux with SeamlessRDP and Rdesktop

I started a new job recently, and their network security is no joke. If your PC isn’t a member of the domain, any traffic to domain-joined resources is dropped. That would be fine if I was using my Windows PC to do my work, but I can’t.  It’s so locked down I can’t do anything…


Bash trick: Use a command where a file is expected

Using the results of a command of as a variable is pretty easy. Just use the venerable $(some command), as in this simple example: for i in $(ls | grep -v badpattern); do   mv $i $i.bak done But what if you want to use the results of multiple commands as file inputs to another command?…


Connecting to CenturyLink Fiber Using Your Own Equipment

I got CenturyLink Fiber not too long ago.  The speed is great, but the router that comes along, the C2000T, is an absolute piece of garbage. A large, fast download via wifi from a single client reduced every other device on the network to dial-up speeds.  It took a fair amount of screwing around, but…


Root Access to the CenturyLink C2000T Router

The CenturyLink C2000T router is a pretty capable little device that’s been saddled with some truly awful software.  It’s currently unsupported by DD-WRT, which is unfortunate, because the hardware itself is pretty solid. Getting root was so easy I’m not even sure if it qualifies as a hack, or if this was intended behavior. First,…