More from: Technical


Windoz haz OpenSSH!

O’ most awesome of awesomeness!

After years of wishing, in the Fall Creator’s Update, OpenSSH was added to Windows 10! That is right – cross server inter-operability using normal tools and secure keys without needing to mess around with obtuse VPN setups or 3rd party programs!

https://blogs.msdn.microsoft.com/powershell/2017/12/15/using-the-openssh-beta-in-windows-10-fall-creators-update-and-windows-server-1709/

GO START -> Setup -> Apps -> Apps and Features -> Manage optional features -> Add a feature and select SSH. Copy your Linux keys to a folder named .ssh in your home folder (c:\Users\yourlogin\.ssh), just as is the default in Linux.

You must restrict access to your private key(s) just as in Linux. In Microsoft this is done by browsing to the key file, right click, Properties, Security  then remove everyone / objects, add yourself (only), and give yourself Full Control.

Read more at the link above concerning generating keys and protecting them with a key manager program.

I am still exploring the possibility of using File Explorer to browse via ssh, just as the file manager can be used in Linux. More later…



Peltier Cooling fundamentals.

Picture of peltier element

Lateraalne integreeritud Peltier element. By Indrek.synter

From an article on Digikey.com

As an alternative to commonly used passive cooling techniques, thermoelectric cooling can offer numerous advantages. These include accurate temperature control and faster response, the opportunity for fanless operation (subject to heat sink performance), reduced noise, space savings, reduced power consumption and the ability to cool components to sub-ambient temperatures.

To read details, see https://www.digikey.com/en/articles/techzone/2018/feb/choosing-using-advanced-peltier-modules-thermoelectric-cooling


Drupal core bug allows remote code execution

This just arrived in email from wordfence.com. If you use Drupal or know someone who does, the Drupal patches need to be applied immediately to prevent / stop remote code execution attacks.

A more detailed overview of upgrade recommendations from the Drupal security team is available on Drupal.org. They have also published a detailed FAQ. This attack has been nicknamed “Drupalgeddon 2.” The previous Drupalgeddon was as high in severity as this, and had automated attacks against unpatched Drupal sites within a matter of hours after the public announcement of the vulnerability was made.

—<snip>—

This morning we are publishing a public service announcement about a severe Drupal core remote code execution vulnerability announced yesterday. If you use Drupal or know someone who does, I’d encourage you to read this post and spread the word.
The vulnerability allows an attacker, leveraging multiple attack vectors, to take complete control of a website. The Drupal team estimates that at the time of the announcement over 1 million sites are affected, about 9% of Drupal sites.
Our focus is usually WordPress security, but given the severity and wide impact of this vulnerability, we feel it justifies a PSA to help spread the word.
Regards,
Mark Maunder
Defiant Inc CEO
—<snip>—