The Linux Page

verify

Ever wondered how to verify the remote host fingerprint on SSH connect?

WARNING: This is actually wrong. The -F is a SEARCH feature. Not a way to recalculate the value on your own system. So you can verify that the value is the same in your database, but SSH already does that and shows you that terrible warning... so in effect it is the exact same command.

Whenever you connect to a computer with SSH, it gives you a fingerprint of the host.

Ever wondered how to check whether that fingerprint is a match? Yeah... I figured, 99% of us don't even know how to make sure that it is indeed a match.

There is the command line to generate that fingerprint:

    ...

Checking integrity of a Debian installation

You can check that all the packages currently installed on a Debian system (i.e. Debian, Ubuntu, etc.) with many different tools.

Root Kits

I run rkhunter to verify for root kits.

Some hackers replace a well known command such as ls or cat with a version that takes over your computer by becoming root without your consent and then hacking your system in all sorts of ways. In most cases, just the feat of installing such a tool requires the hacker to already have root access, so it generally doesn't happen, but better safe than sorry!

File Changes

I use tripwire to verify that ...

Norton Anti-Programmers

Today I discovered why I was having a few hurdles last week.

The IT department pushed the installation of Norton Anti-virus with some Internet controls, whatever the exact name is...

The utility installs itself intrinsically in the operating system. This means it actually transforms a certain number of low level functions to manipulate your data files and check them as soon as they are created.

The potential results are that as your compile files:

  1. The file may be found to be locked (Norton locks it to verify it even if the compiler isn't finished.)
  2. The file may be removed ...

Verifying the md5sum of Installed Debian or Ubuntu packages

I always wondered why we couldn't just use dpkg to verify that the installed packages have not be tempered with. I know that the feature is hardly safe if the md5's are saved on the same computer, even the same hard drive...

Still, once in a while it's just a manual error that requires me to check that I did do something wrong on my computer.

Under Red Hat the rpm packager offers the -V option: Verify.

Under Debian and thus Ubuntu and other derivatives, the debsums tool has to be installed and used for that purpose.

  sudo apt-get install debsums
  debsums -s <package ...

SSH authorized_keys features

Pretty much every day I learn something... Today it will be the fact that you can enter variables in front of a key that will request the SSH deamon to verify a certain number of facts in regard to the connection being made.

For instance, it can automatically test that the IP address of the person connecting is a specific IP (if you have a static IP address, very practical!)

Twitter and emails

Today, I finally registered with Twitter. I'll be looking into a way to connect that to my blogs so each time I blog, I get a tweat eliminating the need for me to actually tweat for real.

Okay, that's fine, but guess what... they want me to verify my email address and it does not work.

[toc hide:1]
Syndicate content Syndicate content

SMS From Me Logo

SMS From Me

To automatically start one on one conversations with your online leads.

     

Terms of Site Index

Find the page/content you are looking for with our index.

  • Ctrl-C
  • RAM
    Random Access Memory. Everyone with a computer uses a lot of RAM to run their processes. This is true of any electronic device with some dynamic capabilities (like your cell phone, pocket calculator, watch with calculator, etc.)
  • default
  • delete
  • qemu