Skip to main content

Blocklist-Update.sh

Blocklist-Update.sh is a script that I wrote to manage blocklists from bluetack etc to be used in conjunction with Transmission torrent downloader in Linux/MacOS. The script can be taylored to work with Qbittorrent as well, but the placement of the blocklists means you'd have to redirect the blocklist to go somewhere locally manageable as Transmission uses its own blocklist directory in .config. I believe there are about 10 lists there now. It works well for my needs. It can be ran weekly using crontab in standard user profile.  To download:  blocklist-update.sh To download the others:  Github

SMART HOMES, SMART SPEAKERS AND SMART PEOPLE

Smart devices have become the norm, for those who can afford to purchase them, smart speakers and home automation devices can, in fact, reall be very helpful. Smart speaking devices can often take input from the user and act on this input across home-wide wireless networking. They can invoke other devices to perform their daily tasks as requested by the user. They can turn on the lights, take inventory of what’s in the fridge, run the microwave, dishwasher, etc. But where does a smart home become smarter than the people living inside of it? Where does a smart device become smarter than the creator?

FIRMWARE TRASHES SMART LOCKS

According to a post on dslreports, originally quoting an article on The Register, back in August, over-the-air upgrades in firmware which got the locks via its link to the user’s router, delivered a botched firmware update which left the locks potentially useless for the next week. No getting in or out through the front door at least. The working part of the lock, the keypad, which allowed users and their guests to enter the premises via their own personal passcodes, was left nonresponsive as the firmware locked many working people out of their homes.

SMART THERMOSTATS TOTALED BY BUGS

Another horror story under Google’s belt, according to a New York Times article from Jan 2016, a smart themometer acquired by Google only two years before was taken offline by a buggy software update that left the users in the cold that winter. The bug supposedly drained the battery and shut the whole thermostat down in the middle of the night. The Vice-President of the company behind the faulty devices said that it was a bug introduced back in a December update and that it had not shown up for two weeks. He also gave users instructions for a nine-step process with which they could regain usability in their frozen thermostats again. But as stated later by the New York Time’s post, this was indeed a glitch that we allow into our lives by inviting newer smart devices into our homes without fully knowing what to expect and by human thinking that “It’ll never happen to me.” We as people often get something new and don’t read documentation, we don’t use proper judgement with a lot of our gadgets, so this holiday season, try taking heed to things from the past and be cautious of what you buy. Be safe this season and bundle up. Don’t rely on technology to be completely faultless. Be smart.

MIRAI MALWARE/BOTNET

All that aside, security researchers have all had a busy year this year. From Microsoft neglecting certain patches until it “wants to send them out” to several root kits and botnets. Mirai for instance, Mirai was in the news countless times for its use “zombifying” countless IOT devices in smart homes. A few of its original creators were thought to have been imprisoned but It’s still an ever waging war with the wave of hackers using it even now. The malware is still alive and well, it was just recently reported on thehackernews.com again the 13th of December 2017, apparently a few more people have been arrested for the continued distribution of the malware who had a part to play in the massive DDOS use of this malware last year which took down large amounts of websites across the US. Mirai is deployed on IOT(Internet of things) devices and once there, it scans the devices for the default password, if a device is using the default which was likely the case, the malware then adds these devices to a botnet network, a network of zombie devices which then are given the command to send out a continuous stream of tcp flood packets to unwitting servers across the US. Thus rendering the pages those servers maintain to be inaccessible or increasingly sluggish.

TIPS TO STAY SAFE THIS SEASON

  1. When shopping for new devices, take the extra time to read the documentation, and also change the default passwords and credentials. Passwords should normally consist of Uppercase, lowercase, num3r1c characters and special characters $@!. Also it is prefered to use non-dictionary words. Also, try to purchase something that works independendant of cloud services.
  2. When connecting these devices to the router, perhaps it is best to change the router’s default password and the wireless passphrase as well while in the router’s configuration page.
  3. Don’t let the devices stay freely connected to the internet all day, while you will eventually have to update the firmware, doing it manually is better than letting the device do it itself, just be sure to manually update the device within a few days after a firmware update is released. Also, might be wise to turn on the traffic monitor in your router to guage network traffic.
  4. Most routers have firmware updates and while I said that firmware updates were sometimes best delayed, you will want to get these updates. Router firmware updates offer security enhancements and close holes that were wide open in your network router before.
  5. Finally, keep phone numbers and forum credentials in a database as well as a hard copy, I know in our technological world, it’s nice to be able to save passwords to the cloud, but this won’t help you if your device starts to act insane and you can’t get to the forums on your own computer and thus have to drive to gma’s house to get ahold of the manufacturers.



SOME INTRIGUING READS:



Comments

Popular posts from this blog

NOSCRIPT CONFIGURATION FOR PALE MOON SPECIFICALLY

I wrote an article before about making Pale Moon more private. I covered a few of the settings and back end changes I make each time I install it. I mentioned Noscript, but I didn’t give any details about how I set it up. First though, you have to get the version already marked for your version of “Firefox” or in this case, Pale Moon. If you went to https://addons.palemoon.org/addon/noscript/ you would probably find the Pale Moon addons page devoted to the newest possible Noscript being marked specifically for Pale Moon. Other versions may work, but these are hybrid addons and the closer we get to Noscript 10, the less I trust it to work with Pale Moon specifically. I just opt to stick with 5.0.6. There have been people asking about what happens when Maone, the developer stops supporting the hybrid versions of Noscript, “Will it work with Pale Moon?” Why yes it will. Noscript blocks scripts, that’s its main function and it will do that as long as Java script exists on a page.

SSD PARTITION ALIGNMENT

I was searching for more information regarding SSDs last night as that is what I now use, I found an interesting little tip that most users will never have to worry about, but people using Arch Linux, Manjaro or Windows that was cloned from another drive may want to consider checking this. The Partition manager within Linux normally takes good care to ensure that you have some free space to be used by the SSD in the event that a cell becomes worn out or corrupted. Also, Linux generally ensures that a proper amount of unallocated drive space is set aside preceeding the partition. However, on my own image of Manjaro, I discovered that this was not the case. The partition was “out of alignment”. To fix this situation, I found an article on  Lifehacker that went into instructional detail about how to solve this from a live environment or an image of Gparted . Gparted is a separate live environment of Linux that is based on Debian and uses Gparted as the main tool to manage par

PALE MOON PRIVACY SETUP

I did a review of Pale Moon back when 27.6.2 came out in linux. I had mostly great things to say about the browser then and my feelings towards it have not changed. Pale Moon is a very useful tool for scowering the net. It has privacy at its core with a few implementations made by Moonchild, the lead developer, built in. I also mentioned the point that Pale Moon has a canvas poisoning feature in the backend, however, I wasn’t very clear about how to turn it on. I thought in this tutorial, I’d show with a series of screen shots, some of the useful settings and preferences that I change to make Pale Moon a bit more private. I also thought I’d take this time to rant a little more about some of the not so savory issues with Firefox which have recently come under scrutiny by various people in the the Linux world. First order of business, if you haven’t heard, Mozilla recently added an extension into their browser which gave people ads. That’s right, they were ads for a specific t