WOT probes my web access history

  I loaded a private web address using Chromium with the extension WOT v2.6.0 (by www [dot] mywot [dot] com). Hours later, some unknown ec2-x.compute-x.amazonaws.com IP probed my private address. I repeated the same test with another unique private URL, and hours later, the same ec2 IP loaded that private URL again. Then I disabled […]

How to reset lost root password on Raspberry Pi running Arch Linux

#459312475 / gettyimages.com   Assumption: SD is not encrypted Plug SD onto another working computer, look for the “cmdline.txt” file and edit it by appending “init=/bin/sh” after “rootwait”. Save the file, remove the SD and plug it back to the RPi and boot. You’ll be dropped into a shell. Change your passwd, then hit CTRL-ALT-DEL […]

How to identify package of particular file and verify its integrity

Let’s say we need to: Find out which package contains the file /bin/su in Linux Verify if the file is untainted (from package) or changed in some manner For RPM (Fedora, Red Hat, CentOS): $ rpm -q -f /bin/su coreutils-5.97-34.el5 $ rpm -V coreutils-5.97-34.el5 For DEB (Debian, Ubuntu): $ dpkg -S /bin/su login: /bin/su $ debsums […]

https page that includes other resources which are not secure

Question: How to find out what contents on a HTTPS page is retrieved using HTTP, i.e. unencrypted in transit and thus open to sniffing? Answer: Use Google Chrome web browser’s Developer Tools. Look under “Console” and you’ll see lines that look like this: The page at https://www.example.com displayed insecure content from http://feeds.feedburner.com/notsecure.