This article details how to easily create a bootable Ubuntu USB drive that be completed in less than 20 mins (May be 10 if you’ve a fast usb drive). Having a faster USB drive would help in the long run too!
Note: this procedure requires that you create an .img file from the .iso file you download. It will also change the filesystem that is on the USB stick to make it bootable, so backup all data before continuing.
Tip: Drag and drop a file from Finder to Terminal to ‘paste’ the full path without risking typing errors.
Sometimes its a bit of a pain to rename a batch of files in a directory to something more meaningful, right? For instance, lets say I have 300 files that are named in two parts (e.g. London_Canon.jpg, Toronto_Canon.jpg, Muscat_Canon.jpg)and I only want to remove the recurring “_Canon” from these files instead of a rename across the board that would remove the unique identifier (In this case, London, Toronto and Muscat).
If you like a challenge and some mental stimuli, use can script something and learn! or,
use this application called NameChanger for Mac. It’s free and very efficient. Got a few options under its sleeve:
Replace First Occurrence
Replace Last Occurrence
Replace All Occurrences
I have been fascinated about IT security and firewalls. I was able to get some hands on exposure to firewall scripting if you like, during my Masters that I just completed. To rekindle my love towards this, I went back on my Ubuntu virtual machine and thought lets ‘try two simple tasks to do with iptables; adding and removing a basic rule’.
So, in Terminal, I type in :
iptables -A INPUT -s 192.168.0.6 -j DROP
This will drop all packets from the IP address after -s (for source IP). The IP here is my iPhone’s IP address. I use the Fing app on the iPhone to ping my machine after the iptables rule is activated and the packets are dropped, this is evident from the app returning the ‘unreachable’ message.
Now, to make the machine accept connections or packets from this IP address, all I have to do is delete this rule in the table. For this, I just change one character in the line as below. I would leave it for you to spot it and ponder the ‘why-hows’.
iptables -D INPUT -s 192.168.0.6 -j DROP
Now, I tried the ping from the same app on the iPhone and the machine was accepting connections.
While this is just a basic task, I would advise anyone interested in this area to explore and experiment more on iptables, its truly interesting!
Apologies for boring you out with all my geek stuff here. These are saved for linking my reports to a permanent location on the web to be accessed by anyone interested in my report (my supervisor or marker :D).
This also helps me in keeping track of my data and related images/ charts organized in a clutter-filled way (I know it contradicts to have ‘clutter-free’ and ‘organised’ in one sentence!)
This is a short clip that demonstrates how to use a script that will run TCPDUMP, save the capture file and then open this file in Wireshark which then can be exported as CSV.
As there is no direct way to save TCPDUMP files in CSV format, I decided to write a shell script that will automate most processes for this task.
I also look forward to adding more commands in order to automate the whole process of exporting as CSV via Wireshark using the Script.
Share your views and tips.