Showing posts from August, 2019

Use the blkid command to find the UUID of the device

$ sudo blkid /dev/nvme0n1p1: LABEL="/" UUID="55da5202-8008-43e8-8ade-2572319d9185" TYPE="xfs" PARTLABEL="Linux" PARTUUID="591e81f0-99a2-498d-93ec-c9ec776ecf42" /dev/nvme1n1: UUID="7c4d5e8c-5f26-475f-b985-5a1411359058" TYPE="ext2" /dev/nvme0n1: PTUUID="83181c97-6d5e-43c9-9ede-e2f50ead5338" PTTYPE="gpt" /dev/nvme0n1p128: PARTLABEL="BIOS Boot Partition" PARTUUID="4908ae49-9d5b-423e-a23c-a507a47bacf5" /dev/nvme2n1: PTUUID="5a72544b-a4e2-4bbe-aed0-04f727374581" PTTYPE="gpt" /dev/nvme2n1p1: LABEL="/" UUID="577849ee-6d06-4473-9eec-074495a45d70" TYPE="xfs" PARTLABEL="Linux" PARTUUID="7ba2672d-1d11-4f12-9358-2edd6b813413" /dev/nvme2n1p128: PARTLABEL="BIOS Boot Partition" PARTUUID="5a9fc16d-ac21-49f8-8880-28c8f8d2e8bf"

Misconduct by traders at two top Canadian banks

Traders at RBC and TD are alleged to have shared confidential customer information in electronic chatrooms in effort to gain market advantage. Banks have agreed to settlements with the Ontario Securities Commission.

VMware bought Pivotal Software Inc in a $2.7 billion deal.

VMware to pay $5 billion for firms offering cloud security, developers platform

strace is a diagnostic, debugging and instructional userspace utility for Linux.

strace is a powerful command line tool for debugging and trouble shooting programs in Unix-like operating systems such as Linux. It captures and records all system calls made by a process and the signals received by the process.
strace is used to monitor and tamper with interactions between processes and the Linux kernel, which include system calls, signal deliveries, and changes of process state. The operation of strace is made possible by the kernel feature known as ptrace. Some Unix-like systems provide other diagnostic tools similar to strace, such as truss.

How do I hide my IP address?

The most common method to hide your IP address is to use a proxy or a VPN

What is an IP Address?

The Internet Protocol Address (or IP Address) is a unique address that
computing devices such as personal computers, tablets, and smartphones
use to identify itself and communicate with other devices in the IP
network. Any device connected to the IP network must have a unique IP
address within the network. An IP address is analogous to a street
address or telephone number in that it is used to uniquely identify an

Azure Automation

Azure Automation delivers a cloud-based automation and configuration
service that provides consistent management across your Azure and
non-Azure environments. It consists of process automation, update
management, and configuration features. Azure Automation provides
complete control during deployment, operations, and decommissioning of
workloads and resources.

Follow Redirects with cURL

curl -L

The -L flag instructs cURL to follow any redirect so that you reach
the eventual endpoint.

The Easiest Way to Get a U.S. Green Card

FamilyEmploymentDiversity VisaRefugee

LG’s G8X will be its first phone with an in-display fingerprint sensor

G8X is set to be revealed next month at the annual IFA show in Germany.

FIDO2 is a set of such standards that enable logins backed by strong cryptographic security.

The FIDO Alliance, which stands for Fast Identity Online, is an
industry body on a mission to solve the problem of passwords through
the use of open standards to drive technologies that can securely
replace them.

Windows Proxy settings by Powershell

To check the proxy settings like ProxyOveride or if it is enabled or not:

Get-ItemProperty -Path
To disable proxy from PowerShell:

Set-ItemProperty -Path
Settings" ProxyEnable -value 0
To enable proxy from PowerShell:

Set-ItemProperty -Path
Settings" ProxyEnable -value 1

PrivX uses short-term credentials to provide just-in-time access to servers.

Access is granted based on the user's role. Provisioned credentials
are created on demand, only valid for a short time, and never stored
to disk.

Improve security
Access to endpoints is provisioned using on-demand short-lived
certificates that are valid for only a few minutes and never written
to disk nor exposed to end-users. This completely eliminates the risk
of credential theft, removing the greatest security risk in privileged
access management.

Reduce costs
PrivX works using existing SSH clients and servers, so there is no
need to add or replace components of the SSH infrastructure. The lack
of dependence on external components translates to minimal disruptions
to network infrastructure, and reduced maintenance costs.

Using short-lifetime access certificates provided by PrivX eliminates
the need for certificate revocation or key rotation.