<?xml version="1.0"?>
<feed xmlns="http://www.w3.org/2005/Atom" xml:lang="en">
	<id>https://hackepedia.org/api.php?action=feedcontributions&amp;feedformat=atom&amp;user=Mouring</id>
	<title>Hackepedia - User contributions [en]</title>
	<link rel="self" type="application/atom+xml" href="https://hackepedia.org/api.php?action=feedcontributions&amp;feedformat=atom&amp;user=Mouring"/>
	<link rel="alternate" type="text/html" href="https://hackepedia.org/index.php?title=Special:Contributions/Mouring"/>
	<updated>2026-05-08T16:52:51Z</updated>
	<subtitle>User contributions</subtitle>
	<generator>MediaWiki 1.45.3</generator>
	<entry>
		<id>https://hackepedia.org/index.php?title=Main_Page&amp;diff=2612</id>
		<title>Main Page</title>
		<link rel="alternate" type="text/html" href="https://hackepedia.org/index.php?title=Main_Page&amp;diff=2612"/>
		<updated>2006-03-10T22:18:40Z</updated>

		<summary type="html">&lt;p&gt;Mouring: &lt;/p&gt;
&lt;hr /&gt;
&lt;div&gt;__NOTOC__&lt;br /&gt;
&lt;br /&gt;
&amp;lt;table width=&amp;quot;100%&amp;quot; cellspacing=&amp;quot;3&amp;quot; cellpadding=&amp;quot;4&amp;quot;&amp;gt;&lt;br /&gt;
&amp;lt;tr&amp;gt;&amp;lt;td rowspan=&amp;quot;2&amp;quot; width=&amp;quot;56%&amp;quot; valign=&amp;quot;top&amp;quot; bgcolor=&amp;quot;#d7e7fa&amp;quot; style=&amp;quot;border:1px solid #CEDEF4; padding:1em;padding-top:0.2em; color: black;&amp;quot;&amp;gt;&lt;br /&gt;
The rough idea for this site was to create and provide answers to commonly asked questions and those that aren&#039;t currently answered online. It is written by hackers. If you do not understand a term, look it up at [http://www.wikipedia.org Wikipedia].  If you&#039;ve come here to find answers or examples, hopefully you will find them.  If you have an answer or example, we hope that you will leave those as well.&lt;br /&gt;
&lt;br /&gt;
You may have also been sent here because you&#039;re new to the [[internet]], or would like to learn the etiquette.&lt;br /&gt;
&lt;br /&gt;
Some other random pages to get you started:&lt;br /&gt;
&lt;br /&gt;
[[Cider|How to make Cider]]&lt;br /&gt;
&lt;br /&gt;
[[LILO|Fixing a broken LILO]]  &lt;br /&gt;
&lt;br /&gt;
[[Debugging]]&lt;br /&gt;
&lt;br /&gt;
[[$HOME]]&lt;br /&gt;
&lt;br /&gt;
[[Privilege_escalation|Privilege Escalation]]&lt;br /&gt;
&lt;br /&gt;
[[DefenseInDepth|Defense in Depth]]&lt;br /&gt;
&lt;br /&gt;
[[Disk_breakdown|The breakdown of a disk]]&lt;br /&gt;
&lt;br /&gt;
&amp;lt;/td&amp;gt;&amp;lt;td width=&amp;quot;24%&amp;quot; valign=&amp;quot;top&amp;quot; bgcolor=&amp;quot;#e7f7e7&amp;quot; style=&amp;quot;border:1px solid #BAD0EF; padding: 1em; padding-top: 0.5em; color: black;&amp;quot;&amp;gt;&lt;br /&gt;
&#039;&#039;&#039;Major Categories&#039;&#039;&#039;&lt;br /&gt;
{{MajorCategories}}&lt;br /&gt;
[http://www.yashy.com/help/index.php/Special:Wantedpages Pages To Be Written]&lt;br /&gt;
&lt;br /&gt;
&amp;lt;/td&amp;gt;&amp;lt;/tr&amp;gt;&lt;br /&gt;
&amp;lt;/table&amp;gt;&lt;br /&gt;
&lt;br /&gt;
You will need to email yashy at mail.yashy.com. for an account on this site in order to edit pages.&lt;br /&gt;
Please see [http://meta.wikipedia.org/wiki/MediaWiki_i18n documentation on customizing the interface]&lt;br /&gt;
and the [http://meta.wikipedia.org/wiki/MediaWiki_User%27s_Guide User&#039;s Guide] for usage and configuration help.&lt;br /&gt;
&lt;br /&gt;
All Content on this website is [[Help:Copyrights|protected by copyright]].&lt;/div&gt;</summary>
		<author><name>Mouring</name></author>
	</entry>
	<entry>
		<id>https://hackepedia.org/index.php?title=Hauppauge_350_MythTV&amp;diff=2575</id>
		<title>Hauppauge 350 MythTV</title>
		<link rel="alternate" type="text/html" href="https://hackepedia.org/index.php?title=Hauppauge_350_MythTV&amp;diff=2575"/>
		<updated>2006-02-15T05:28:36Z</updated>

		<summary type="html">&lt;p&gt;Mouring: &lt;/p&gt;
&lt;hr /&gt;
&lt;div&gt;The following is an intial pass as a quick install guide for 350 card with TV out. I&#039;ll be cleaning up this entry once I have time to get back to my PVR box. Until then I hope this helps others from spending two days working on a confguration like I did.&lt;br /&gt;
&lt;br /&gt;
=== Intial Install ===&lt;br /&gt;
&lt;br /&gt;
Grab a copy of KnoppixMyth.&lt;br /&gt;
&lt;br /&gt;
NOTE: You need at LEAST a 10 gig drive and any part of the drive that isn&#039;t used for the initial setup will be shoved into /myth partition.&lt;br /&gt;
&lt;br /&gt;
* Select 2 (Auto Install)&lt;br /&gt;
* Set your Timezone (I use SysV style since I&#039;m use to that style of naming)&lt;br /&gt;
* Set your time&lt;br /&gt;
* Set your user account full name&lt;br /&gt;
* Set your user login name&lt;br /&gt;
* Set your password&lt;br /&gt;
* Verify your password&lt;br /&gt;
* Set Root&#039;s Password&lt;br /&gt;
* Verify Root&#039;s Password&lt;br /&gt;
* Set Machine Name&lt;br /&gt;
* Accept the params if you typed them right.&lt;br /&gt;
* Accept the Warning about using the default partitioning&lt;br /&gt;
&#039;&#039;&#039;Wait while it mucks around with the drives and installs stuff&#039;&#039;&#039;&lt;br /&gt;
&lt;br /&gt;
It will tell you that it is done and you should hit &amp;quot;OK&amp;quot;&lt;br /&gt;
Pull the CD out and hit return&lt;br /&gt;
&lt;br /&gt;
=== First Reboot: ===&lt;br /&gt;
&lt;br /&gt;
* It will boot into X and will prompt you for root&#039;s password. Enter it.&lt;br /&gt;
* Hit Ok&lt;br /&gt;
* Prompts for Time Zone again (stupid program)&lt;br /&gt;
* Prompts for DHCP (I use it, if you don&#039;t.. Can&#039;t help you =-)&lt;br /&gt;
* Select i586 or i686 respectively.. Some respects it doesn&#039;t matter you&#039;ll be redoing it anyways.&lt;br /&gt;
* Asks if you want to clear current configuration, say no (doesn&#039;t matter)&lt;br /&gt;
* Asks if you want to clear TV channel configuration, say no (doesn&#039;t matter)&lt;br /&gt;
* Go to &amp;quot;2. Capture Card&amp;quot;&lt;br /&gt;
* Select &amp;quot;New Capture Card&amp;quot;&lt;br /&gt;
* Arrow up to &amp;quot;Card Type&amp;quot; select &amp;quot;MPEG-2 Encoder card (PVR-250, PVR-350)&lt;br /&gt;
* If you don&#039;t see &amp;quot;Composite 0&amp;quot; show up.. the system didn&#039;t detect your card. Move it to another slot.&lt;br /&gt;
* Leave the rest and go back down to &amp;quot;Finish&amp;quot; and hit enter&lt;br /&gt;
* Hit escape&lt;br /&gt;
* Go to &amp;quot;3. Video Sources&amp;quot;&lt;br /&gt;
* Select &amp;quot;New Video Source&amp;quot;&lt;br /&gt;
* Configure this how you like.. Remember that &amp;quot;Data Direct&amp;quot; is also &amp;quot;Zap2It Labs&amp;quot; (Note: Point to Zap2It registration page)&lt;br /&gt;
* When done hit &amp;quot;Finish&amp;quot; then hit &amp;quot;escape&amp;quot;&lt;br /&gt;
* Select &amp;quot;4. Input Connections&amp;quot;&lt;br /&gt;
* Select &amp;quot;tuner 0&amp;quot;&lt;br /&gt;
* Populate the &amp;quot;Video Source&amp;quot; with the source you just defined.&lt;br /&gt;
* Go to &amp;quot;Finish&amp;quot; then hit escape.&lt;br /&gt;
* It will start downloading your channel information.. Wait.&lt;br /&gt;
* It will bring you to the main mythTV screen. Select &amp;quot;Watch TV&amp;quot; to ensure you are getting signal. If not redo the above steps.&lt;br /&gt;
&lt;br /&gt;
=== Making remote work: ===&lt;br /&gt;
&lt;br /&gt;
* SSH into the box as root&lt;br /&gt;
* Type &amp;quot;install-i686-l&amp;quot; or &amp;quot;install-i586-l&amp;quot; This will setup some of the stuff needed for your remote.&lt;br /&gt;
* Type: update-rc.d lirc defaults (why I need this, who knows they just don&#039;t start it by default)&lt;br /&gt;
* Type reboot and next boot you should have your remote. (If not look at: http://www.knoppmythwiki.org/index.php?page=Hauppauge250Remote)&lt;br /&gt;
&lt;br /&gt;
=== Making work with TV-out ===&lt;br /&gt;
&lt;br /&gt;
Follow the following instructions: http://www.knoppmythwiki.org/index.php?page=HauppaugeThreeFiftyInstallation&lt;br /&gt;
The only change I&#039;d make it when it says &amp;quot;lspci | grep MPEG&amp;quot; save yourself a few brain cells and type &amp;quot;lspci -X&amp;quot; so you don&#039;t have to convert hex.&lt;br /&gt;
Frankly I hate normal diff.. This is a diff -u of the output:&lt;br /&gt;
&lt;br /&gt;
 --- /etc/X11/XF86Config-4.pvr350-tvout.sample   2005-02-20 15:52:48.000000000 -0600 &lt;br /&gt;
 +++ /etc/X11/XF86Config-4.pvr350        2005-10-03 18:05:22.000000000 -0500&lt;br /&gt;
 @@ -107,14 +107,15 @@&lt;br /&gt;
  &lt;br /&gt;
  Section &amp;quot;Device&amp;quot;&lt;br /&gt;
          Identifier  &amp;quot;Hauppauge PVR 350 iTVC15 Framebuffer&amp;quot;&lt;br /&gt;
 -        Driver      &amp;quot;fbdev&amp;quot;&lt;br /&gt;
 +        Driver      &amp;quot;ivtvdev&amp;quot;&lt;br /&gt;
 &lt;br /&gt;
           ### change fb1 to whatever number you got in the previous section&lt;br /&gt;
           Option      &amp;quot;fbdev&amp;quot; &amp;quot;/dev/fb1&amp;quot;&lt;br /&gt;
 +        Option      &amp;quot;ivtvdev&amp;quot; &amp;quot;/dev/fb1&amp;quot;&lt;br /&gt;
 &lt;br /&gt;
          ### change the busid to whatever is reported by lspci. Note that &lt;br /&gt;
          ### output of lspci is hex, so add a preceding &amp;quot;0x&amp;quot; to the BusID&lt;br /&gt;
 -        BusID &amp;quot;0:0x08:0&amp;quot;&lt;br /&gt;
 +        BusID &amp;quot;PCI:0:13:0&amp;quot;&lt;br /&gt;
  EndSection&lt;br /&gt;
 &lt;br /&gt;
* Section &amp;quot;Screen&amp;quot;&lt;br /&gt;
* As well as in the Enable Hardware Playback step use &amp;quot;Bob (2x Framerate)&amp;quot;&lt;br /&gt;
&lt;br /&gt;
=== Other things that can go wrong: ===&lt;br /&gt;
&lt;br /&gt;
If it jerky I suggest looking at what IRQ you have it on and mucking around until you can get it to a better IRQ.&lt;br /&gt;
&lt;br /&gt;
%% Original from http://eviladmin.org/projects/MythTV.html and reposted with permission&lt;/div&gt;</summary>
		<author><name>Mouring</name></author>
	</entry>
	<entry>
		<id>https://hackepedia.org/index.php?title=Timing_attack&amp;diff=2574</id>
		<title>Timing attack</title>
		<link rel="alternate" type="text/html" href="https://hackepedia.org/index.php?title=Timing_attack&amp;diff=2574"/>
		<updated>2006-02-15T04:50:01Z</updated>

		<summary type="html">&lt;p&gt;Mouring: &lt;/p&gt;
&lt;hr /&gt;
&lt;div&gt;Timing attacks are attacks where you attempt to gleam information from a stream of communications (audio, digital, visual, etc) that wouldn&#039;t be normally avaliable.&lt;br /&gt;
&lt;br /&gt;
== Audio ==&lt;br /&gt;
&lt;br /&gt;
Studies have shown that recording the time between hitting keys on the keyboard can shorten the number of letters you need to try in order to less the amount of letters needed to guess the password.  These attacks have also been discussed in terms of ATM machines and other places where single factor password authentication is required.&lt;br /&gt;
&lt;br /&gt;
== Digital ==&lt;br /&gt;
&lt;br /&gt;
These attacks are done on streaming data within a network environment.&lt;br /&gt;
&lt;br /&gt;
=== Not Sending Critical Data ===&lt;br /&gt;
&lt;br /&gt;
Some SSH implementations had an issue when data was not being echoed back to the user that you&#039;d see packets sent from the user to the server, but you&#039;d not see the equal packets pass back to the user.  These normally occurred when using &#039;su&#039; or any program that turned off shell echo.  These type of attack alert the attacker that the data being sent could be critical (password, SSH passphrase, etc).  &lt;br /&gt;
&lt;br /&gt;
=== Timing in Critical Periods ===&lt;br /&gt;
&lt;br /&gt;
These are in theory the same as the audio problem.  The time it takes for a response could leak critical information.  Consider the [[password]] database if you login as any user that doesn&#039;t exist in the system the natural execution of code is to look up that user in the database and then compare the [[password]] crypts of that user, or not if the user doesn&#039;t exist.  OpenSSH protects against someone trying to determine what users are on a system or not by still comparing a user to a dummy hash so that it looks like there is an actual crypt comparison happening.  The code is in function [[fakepw]]() in auth.c of OpenSSH.  Hindnote, this is a good thought but the fakepw() in openssh doesn&#039;t work when BSD_AUTH is defined, which it is by default.&lt;br /&gt;
&lt;br /&gt;
== Visual ==&lt;br /&gt;
&lt;br /&gt;
Systems that show a character for each character could leak the length of passwords or passphrases.  There was a study that flashing modem lights could leak such information.&lt;/div&gt;</summary>
		<author><name>Mouring</name></author>
	</entry>
	<entry>
		<id>https://hackepedia.org/index.php?title=Ssh&amp;diff=2573</id>
		<title>Ssh</title>
		<link rel="alternate" type="text/html" href="https://hackepedia.org/index.php?title=Ssh&amp;diff=2573"/>
		<updated>2006-02-15T04:20:01Z</updated>

		<summary type="html">&lt;p&gt;Mouring: &lt;/p&gt;
&lt;hr /&gt;
&lt;div&gt;SSH stands for &amp;quot;Secure Shell&amp;quot; and was first written by a Finnish computer scientist named Tatu Ylonen.  Mr. Ylonen went on to found [http://www.ssh.com SSH Communications] which continues developing the ssh program.  The program uses both symmetric and assymetric [[cryptography]] in order to keep the [[OSI]] session layer secure from session [[hijacking]] and [[sniffing]].&lt;br /&gt;
&lt;br /&gt;
=== Public Key Differences ===&lt;br /&gt;
&lt;br /&gt;
There are three versions used in SSH.  One for v1 protocol, and two for v2.&lt;br /&gt;
&lt;br /&gt;
* RSA1 is referred to as the original RSA key used for v1 protocols.  These keys were used to encrypt the communications.&lt;br /&gt;
&lt;br /&gt;
* RSA is referred to as the v2 protocol.  This is used for signing the channel only since the underlying protocol is now handled by a different means.&lt;br /&gt;
&lt;br /&gt;
* DSA was added to v2 protocol after [http://www.rsasecurity.com/ RSA Security] assured patent rights, and the IETF included DSA to allow for patent free implementation. &#039;&#039;&#039;Note: Due to how DSA works it requires a lot more good enthropy to be secure compared to RSA.&#039;&#039;&#039;&lt;br /&gt;
&lt;br /&gt;
Which is the right one for you?  Since the RSA patent has expired it is recommended by most of the OpenSSH team to stay with RSA keys since they have been around longer and are more known in terms of their strengths and weakness.  &lt;br /&gt;
&lt;br /&gt;
=== The OpenSSH Fork ===&lt;br /&gt;
&lt;br /&gt;
[http://www.openssh.com OpenSSH] was forked from a free version of SSH 1.2.12 and shipped with the [[OpenBSD]] 2.6 system.  It has gained popularity among many vendors and is shipped with their products as well.  [http://ssh.com/ Tatu Ylonen&#039;s company] took OpenSSH to court but lost.&lt;br /&gt;
&lt;br /&gt;
=== Cool SSH Tricks ===&lt;br /&gt;
&lt;br /&gt;
Modern SSH clients and servers allow you to do some pretty nifty tricks. The most common is [http://en.tldp.org/HOWTO/XDMCP-HOWTO/ssh.html X11 Port Forwarding].  You can also [http://www.coder.com/daniel/kwlug/ssh-tricks/slide010.html forward arbitrary ports], and [http://www.coder.com/daniel/kwlug/ssh-tricks/slide006.html compress] files when transfering them over the network (all in addition to encrypting the data).  One really nifty trick is to [[FlexLMForwarding| forward FlexLM]] connections. Another popular trick is [[ssh-keygen|passphraseless key exchange]].&lt;/div&gt;</summary>
		<author><name>Mouring</name></author>
	</entry>
	<entry>
		<id>https://hackepedia.org/index.php?title=Ssh&amp;diff=2572</id>
		<title>Ssh</title>
		<link rel="alternate" type="text/html" href="https://hackepedia.org/index.php?title=Ssh&amp;diff=2572"/>
		<updated>2006-02-15T04:16:50Z</updated>

		<summary type="html">&lt;p&gt;Mouring: &lt;/p&gt;
&lt;hr /&gt;
&lt;div&gt;SSH stands for &amp;quot;Secure Shell&amp;quot; and was first written by a Finnish computer scientist named Tatu Ylonen.  Mr. Ylonen went on to found [http://www.ssh.com SSH Communications] which continues developing the ssh program.  The program uses both symmetric and assymetric [[cryptography]] in order to keep the [[OSI]] session layer secure from session [[hijacking]] and [[sniffing]].&lt;br /&gt;
&lt;br /&gt;
=== Public Key Differences ===&lt;br /&gt;
&lt;br /&gt;
There are three versions used in SSH.  One for v1 protocol, and two for v2.&lt;br /&gt;
&lt;br /&gt;
* RSA1 is referred to as the original RSA key used for v1 protocols.  These keys were used to encrypt the communications.&lt;br /&gt;
&lt;br /&gt;
* RSA is referred to as the v2 protocol.  This is used for signing the channel only since the underlying protocol is now handled by a different means.&lt;br /&gt;
&lt;br /&gt;
* DSA was added to v2 protocol after [http://www.rsasecurity.com/ RSA Security] assured patent rights, and the IETF included DSA to allow for patent free implementation. &#039;&#039;&#039;Note: Due to how DSA works it requires a lot more good enthropy to be secure compared to RSA.&#039;&#039;&#039;&lt;br /&gt;
&lt;br /&gt;
Which is the right one for you?  Since the RSA patent has expired it is recommended by most of the OpenSSH team to stay with RSA keys since they have been around longer and are more known in terms of their strengths and weakness.  &lt;br /&gt;
&lt;br /&gt;
=== The OpenSSH Fork ===&lt;br /&gt;
&lt;br /&gt;
[http://www.openssh.com OpenSSH] was forked from a free version of SSH 1.2.12 and shipped with the [[OpenBSD]] 2.6 system.  It has gained popularity among many vendors and is shipped with their products as well.  [http://ssh.com/ Tatu Ylonen&#039;s company] took OpenSSH to court but lost.&lt;br /&gt;
&lt;br /&gt;
=== Using Public Key and Problems Assocated with it ===&lt;br /&gt;
&lt;br /&gt;
... discuss ...&lt;br /&gt;
&lt;br /&gt;
=== Cool SSH Tricks ===&lt;br /&gt;
&lt;br /&gt;
Modern SSH clients and servers allow you to do some pretty nifty tricks. The most common is [http://en.tldp.org/HOWTO/XDMCP-HOWTO/ssh.html X11 Port Forwarding].  You can also [http://www.coder.com/daniel/kwlug/ssh-tricks/slide010.html forward arbitrary ports], and [http://www.coder.com/daniel/kwlug/ssh-tricks/slide006.html compress] files when transfering them over the network (all in addition to encrypting the data).  One really nifty trick is to [[FlexLMForwarding| forward FlexLM]] connections. Another popular trick is [[ssh-keygen|passphraseless key exchange]].&lt;/div&gt;</summary>
		<author><name>Mouring</name></author>
	</entry>
	<entry>
		<id>https://hackepedia.org/index.php?title=SSH&amp;diff=2571</id>
		<title>SSH</title>
		<link rel="alternate" type="text/html" href="https://hackepedia.org/index.php?title=SSH&amp;diff=2571"/>
		<updated>2006-02-15T03:57:54Z</updated>

		<summary type="html">&lt;p&gt;Mouring: &lt;/p&gt;
&lt;hr /&gt;
&lt;div&gt;== Quick SSH History ==&lt;br /&gt;
SSH simply is a point to point encrypted connection that acts much like rsh or telnet.  It was originally written by Tatu Ylönen (who later started &amp;quot;SSH Communication Security&amp;quot;).  This version is referred to as SSH v1 protocol.  A later modification to the protocol to improve security is referred to as v1.5.   Later Tatu turned over the next version of the protocol to the IETF which is referred to as v2 protocol.  A more complete history can be found at [http://en.wikipedia.org/wiki/SSH Wikipedia SSH Page].  Here we will discuss more of the pratical aspects of SSH.&lt;br /&gt;
&lt;br /&gt;
== SSH Key Differences ==&lt;br /&gt;
There are three versions of SSH keys.  Two of which are SSH v2 only.&lt;br /&gt;
+ RSA1 -&lt;br /&gt;
+ RSA -&lt;br /&gt;
+ DSA -&lt;br /&gt;
&lt;br /&gt;
[.. Discuss v1, v1.5 and v2 differences in how SSH keys are used ..]&lt;br /&gt;
&lt;br /&gt;
[.. Discuss the difference between RSA1, RSA and DSA keys ..]&lt;br /&gt;
&lt;br /&gt;
[.. Discuss how to use user public keys for v1.x and v2.x ..]&lt;br /&gt;
&lt;br /&gt;
[.. List different SSH versions ..]&lt;/div&gt;</summary>
		<author><name>Mouring</name></author>
	</entry>
</feed>