jeudi 12 novembre 2020

Dragonfly Inspired Holiday Merch

Dragonfly Shirt

Buy Here - Dragonfly Christmas Tree

Did you know that a Dragonfly can fly both inside and out, drift, and make unexpected turns? With its fast dashing developments, the Dragonfly gives off an impression of being a living blaze of light. It is the state bug of Alaska since its flying is suggestive of the dexterous shrubbery pilots' moves. The Dragonfly is likewise an awesome image of progress and self-acknowledgment, bringing a feeling of happiness and daintiness to life.

Christmas Sweatshirt

This extraordinarily hand painted Christmas trinket ball is fastidiously planned with a delightful dragonfly and covered with leaves. This dragonfly knick-knack ball can be a pleasant expansion to your Christmas beautifications particularly on the off chance that you are into the nature topic.

The dragonfly christmas tree shirt represents change, and it has more force in its wings than different creepy crawlies. In the event that you have a companion or relative who has conquered snags, and changed to better themselves, this trimming can be a suggestion to your adored one of how solid you think they are.
There's nothing very like get-together 'round the Christmas tree to design with family. They include handcrafted plans for that valid and arrive in a reusable stockpiling holder for safety's sake. Deck the lobbies with seasonal happiness, and prepare for a Christmas you won't overlook! Bring a fly of shading and shine to your Christmas tree with this basic.

Stunning and loaded with breezy allure, our dimensional dragonflies in our luminous shade makes certain to carry gleam to your vacation tree.

You can utilize this adorable for a vacation or to embellish your place, it's certainly one of a kind and fabulous than others.

lundi 9 novembre 2020

Biden Trolls Trump With We Just Did Merch

Here's the place where to purchase the 'we just did 46' hat that has Joe Biden fans inquisitive on Twitter. This is what it implies. There are shirts to purchase as well.

We Just Did 46 Hat Official - https://teechip.com/we-just-did-46-hat-official

The expectation was through the rooftop however the outcome was at last reached on Saturday, November seventh 2020.

Joe Biden has won the US official political decision and will be initiated as the 46th president on Wednesday, January twentieth 2021.

His allies were celebrating and running to online media to share their contemplations over the weekend and many have just communicated their high expectations.

As featured by CNN Politics, he gave a triumph discourse in his old neighborhood of Wilmington, Delaware, in any event, tending to the individuals who didn't cast a ballot him in: "I comprehend the failure today. I've lost multiple times myself. However, presently, how about we give each other a possibility. This is an ideal opportunity to recuperate in America."

For Shirts:

https://hoplix.com/we-just-did-46-shirt https://www.gearbubble.com/we-just-did-46 https://teespring.com/we-just-did-46-hat-official https://viralstyle.com/c/P9nYP1 https://www.teepublic.com/t-shirt/15935077-we-just-did-46 https://www.pinterest.com/pin/626704104392411647 https://www.pinterest.com/pin/626704104392411769 https://www.pinterest.com/pin/626704104392411803 https://www.pinterest.com/bulawon/we-just-did-46-official-merchandise/ https://trendingshirtsdesign.blogspot.com/2020/11/we-just-did-46-shirt-and-hat-official.html. . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . .

lundi 2 novembre 2020

Importance of Water Softener in the House

Why Have A Water Softener?

A water softener is a whole-house filtration system that removes hardness-causing calcium and magnesium minerals from your water through a process called ion exchange. A water softener addresses one of the most prevalent and devastating water problems: hard water. Hard water wreaks havoc on the modern home. Scale builds up in your pipes, clogging them and decreasing water pressure. Scale dramatically shortens the lifespan of appliances like dishwashers, coffee makers and ice machines.

Water Softener Benefits

Without a water softener, laundry demands extra detergent to prevent it from looking dingy. Dishes will come out of your dishwasher streaked and stained. Filmy scum builds up on your shower curtains and your soap and shampoo will not lather. Bathing in hard water leaves your skin itchy and dry and your hair lifeless and sticky. The sheer amount of time, energy, and money required to clean up the detrimental side effects of hard water is dizzying. A whole house water softener is the solution to the scourge of water hardness.

Whole House Water System

Did you know that your water can be classified as "hard" if it contains at least 60mg of dissolved calcium and magnesium? In some areas, this number can go as high as 180mg. Defeating the hardness of water is not such a tough challenge but the rewards of it are simply great. You will be needing only one cool device and all those problems with ashy skin, stained dishes and spotty laundry will be gone.

 Sources:

https://thekurandosblog.blogspot.com/2020/11/best-water-treatment-system-brands-for.html
https://teampages.com/teams/1915312-Fleck-5600SXT-Water-Softener--other--team-website


http://jasonwatertestings.mystrikingly.com/blog/fleck-5600sxt-review

samedi 31 octobre 2020

Berkey Water Filter

Berkey Water Filter

The Big Berkey filter is intended for the individuals who need to drink the cleanest filtered water without introducing an under-sink or RO framework in their home.

It comes completely outfitted with an upper and lower top, simple stream nozzle, two preeminent carbon filters each enduring 3,000 gallons. Utilized as suggested, it has a normal lifetime of right around 10 years, making it potentially the longest enduring filter framework there is.

Berkey Filtration System

It likewise permits you to introduce extra filters, for example, those filtering fluoride and arsenic, with the goal that your streams significantly quicker through each filter.








dimanche 25 octobre 2020

What Is Water Softener

A water softener eliminates minerals that make water hardness, one of the most widely recognized water quality issues a mortgage holder experiences. Hard water devastates machines, leaves dingy cleanser filth across washrooms and kitchens, and dries out hair and skin. With over 85% of the United States depending on hard water for their cooking, cleaning, and washing, water softeners fill an essential need. A water softener spares you from supplanting rashly demolished water radiators, textured fixture heads, and a really long time of tidying up foamy buildup. Putting resources into a water softener spares you time, energy, and cash, and secures your home and your property.

Resource:





jeudi 22 octobre 2020

Check Out These Camo Cases for iPhone


Check out this wide list of camo phone cases and camouflage protective cover for iPhones - https://amzn.to/2FQajFM



-------------------------

Press Release by TRPR
1025 Melville Street
Jackson, TN 38301
To unsubscribe, click here.

mardi 22 septembre 2020

For The Glory Of... Austro-Hungary?

I picked up some Austro-Hungarian Aeronef cheap at the start of the year on eBay. My buddy Matt and I intend on playing some games with them. He has, in fact, procured the age old enemies of the Austro-Hungarians, the Japanese. We're likely going to bash a few rule sets together into something that's quick and fun.

Austro-Hungarian Aeronef Lussin class Rocket Patrol Nef

I've got a few more things left to build (battleships, fixed wings and a carrier) but this is the lion's share of them. Just a simple base, wash and drybrush. I've got a few details left to do but I don't think I'm going to go full orange Eldar on these.

lundi 21 septembre 2020

20Mm Big CoC At The WHC Gavrus: Part 1


 I've been badgering Mark Freeth about CoC for about a year now, first of all to do it in 20mm, then of course its turned into 28mm. Meanwhile, The group of lads from Huntingdon who do an annual game to remember their sadly missed old friend Carlo were coming to Basingstoke.
Now I knew they had played CoC, and I also recall Carlo being partial to the game, so I thought it ideal to use them as guinea pigs for trying out Big CoC! They were more than happy to go along with it, so a format was put together. As the 28mm stuff is still being painted (nearly done though!) this weekend would have to be in 20mm
I thought that for 8 players, a Big CoC campaign of 4 games over the weekend from Friday night through to Sunday afternoon would work fine. I allowed for an extra scenario just in case things went a bit quick.
What to do?
An obvious choice was Normandy, I had all the kit required, and of course, Mark has his amazing collection of Mick Sewell buildings which were aching for a run out.
I only needed a reinforced company for both British and Germans, plus various AFV options, all of which we had.
 The scenario was to be the action at Gavrus on 29/30th June 1944, when the 2nd battalion Argyll and Sutherland Highlanders came under ferocious attack by the 10th SS 'Frundsberg' division.
The battle is reasonably well documented, particularly in Iain Dalglish's book "Operation Epsom: Over the Battlefield" which includes some fantastic aerial photographs of the area taken just days after the battle, these would substitute perfectly for maps.
I came up with 4/5 scenarios with games running into each other to replicate the fighting:
The first was a bit of a "what if" with infantry companies from each side recce-ing the village of Bougy about a mile South of Gavrus, the Germans supported by an armoured infantry platoon in half-tracks and the jocks by their carrier platoon. Both sides did recce Bougy, but I doubt they did it in such strength or necessarily at the same time, but I thought it would give a good introduction for the players, and set the tone for the weekend.
This was to be a fairly standard Patrol scenario as per the CoC rules, with each side receiving an additional 8 points of support to be drawn from a fairly limited selection
                                                           Main road at Gavrus


                                                          The British briefing:      
                                                        
                                                   Scenario 1:  BOUGY- BRITISH
This depicts the action between The 2nd Argylls and the 10th SS Frundsberg Division early in the morning of 29thJune 1944, around the village of Bougy. This is a patrol action as per the main CoC rules. National characteristics as per the main rules.
7 Patrol Markers will be placed along the respective baselines, resulting in 6 Jump off Points. Vehicles will enter via the Gavrus road.
The adjutant may either: Act as an off table senior leader for 1 platoon. OR for the entire company, in which case he will just add +1 to their deployment rolls
Casualties from scenario 1 will carry over to scenario 2.
British Infantry: 3 platoons, C Company 2nd Argylls, Regular, 5 command dice
 Each as follows:
HQ:
Lieutenant: Senior Leader armed with a pistol. 
Platoon Sargent: Senior Leader armed with SMG
PIAT Team: 2 men
2" Mortar Team: 2 men.
Sections 1 to 3:
Corporal: Junior Leader armed with SMG 
Bren Team: Bren LMG 3 crew
Rifle Team: 6 riflemen
SUPPORT OPTIONS:
List 1:  Medic, Adjutant(max 1),,
List 2:  PIAT Team: 2 men, 2" Mortar Team: 2 men.
List 3:  Sniper Team, Universal carrier Bren Team with Junior Leader.

List 4:  6 pdr Anti-tank gun with 5 crew and Junior Leader (max 1)

ELEMENTS, CARRIER PLATOON, 2ND ARGYLLS: , Regular, 5 command dice.
1 x Universal Carrier with driver, 2 man Bren team, and Senior Leader with pistol
Section 1:
1 x Universal Carrier with driver, 2 man Bren team, and Junior Leader with SMG
1 x Universal Carrier with driver, 2 man 2" mortar team, and 1 rifleman
Section 2:
1 x Universal Carrier with driver, 2 man Bren team, and Junior Leader with SMG
1 x Universal Carrier with driver, 2 man PIAT team, and 1 rifleman
Section 3:
1 x Universal Carrier with driver, 2 man Bren team, and Junior Leader with SMG
1 x Universal Carrier with driver, 2 man 2" mortar team, and 1 rifleman, OR 2 man PIAT team, and 1 rifleman
No Support may be allocated to the Carrier Platoon
Total support points.8
Each asset picked must be allocated to a specific platoon for the duration of scenario 1
                                                  Recce half-tracks move up( die-cast vehicles, AB crew)

                                                        The German briefing:


                                                   Scenario 1:  BOUGY -GERMAN
This depicts the action between The 2nd Argylls and The 10th SS Frundsberg Division early in the morning of 29thJune 1944, around the village of Bougy.  This is a patrol action as per the main CoC rules. National characteristics as per the main rules.
7 Patrol Markers will be placed along the respective baselines, resulting in 6 Jump off Points.
Vehicles will enter via the western road
The adjutant may either: Act as an off table senior leader for 1 platoon. OR for the entire company, in which case he will just add +1 to their deployment rolls.
Senior Leaders must be allocated to a specific platoon
Casualties from scenario 1 will carry over to scenario 2,
German Infantry: 3 platoons of the 1st Company 22nd Pzrgrenadier Regt, Regular, 5 command dice
 Each as follows:
HQ:
Obersharfurher: Senior Leader armed with a SMG. 
3 Panzerfaust 30.
Sections 1 to 3:
Scarfurher: Junior Leader armed with SMG 
M42 Team: MG42 LMG 3 crew, 1 Rifleman
M42 Team: MG42 LMG 3 crew, 1 Rifleman
SUPPORT OPTIONS:
List 1:  Medic, Adjutant (max 1), Panzerfaust 30
List 2: Senior Leader armed with a SMG.  Panzerschreck team with 2 crew
List 3:  Sniper Team, Panzergrenadier team: Junior Leader armed with SMG, 5 riflemen.
List 4:  Mg 42 MMG team and 5 crew
List 5: Sdkfz 250/8 with junior leader, 250/9 with junior leader


3rd Kompanie, 10thSS Panzer  Aufklarungs-Abteilung:  Superior Regular *, 5 command dice
1 x Sdkfz 251/10 + Obersharfurher: Senior Leader armed with a SMG.
 Panzerschreck team with 2 crew
3 x Infantry sectionseach:
1 x Sdkfz 251/1 Scarfurher: Junior Leader armed with SMG
M42 Team: MG42 LMG 3 crew, 1 Rifleman
M42 Team: MG42 LMG 3 crew, 1 Rifleman
*Superior regulars treat a single 6 on their command dice as a 5. Other rolls are unchanged.
No Support may be allocated to the Recce platoon
Total support points.8
 Each asset picked must be allocated to a specific platoon for the duration of scenario 1




                                             Cautious grenadiers (Elhiem and Adler figures)

samedi 12 septembre 2020

Come Play Suzy Cube At PAX East!

#SuzyCube #gamedev #indiedev #madewithunity #PAXEast #IMBPAXEast19 @NoodlecakeGames @IndieMEGABOOTH
Are you attending PAX East 2019? If so, come by the Indie MEGABOOTH and say hi! Suzy will be showcased as part of the MINIBOOTH on Thursday and Friday. 
Read more »

Black Lives Matter (And Me Too) And Tabletop Games 2

Following up on last month's post about diversity in gaming, here are some additional items from the last few weeks:

- Wizard of the Coast: First, they have responded to the issue regarding inherently evil races in Dungeons and Dragons (such as dark elves) by reviewing and changing future products to enable all members of all races to choose their own morality. See their press release. This may not be enough; game design freelancer Orion D. Black just resigned, claiming that the Wizards press release does not address real issues of racism within the company structure; his statement is here. Second, they have cut ties with Magic artist Noah Bradley, who has long and often been accused of severe sexual harassment, after Noah himself posted a lengthy acknowledgement and apology on the topic.

- Cards Against Humanity: Former employees accused the company and one of its co-founders of a toxic work environment and sexual harassment. The co-founder, Max Temkin, has stepped down. Considering the line of games and materials this company produces, this is no surprise to me. Statement from the company. The workers are now unionizing.

- A huge list of accusations about sexual assault, rape, and harassment was made last month regarding various video game personalities, especially streamers. Video game publishers also must address a long history of racism in games and by players.

vendredi 4 septembre 2020

I Am Alive Download For Free

I Am Alive Download For Free


SCREENSHOT





System Requirements Of I Am Alive Download Free

  • Operating System: Window XP/ Vista/ Window 7/ Window 8
  • CPU: Intel Pentium 4 or later
  • RAM: 1 GB
  • Setup size: 1.8GB
  • Hard Disk Space: 2 GB













dimanche 30 août 2020

Change Passwords Regularly - A Myth And A Lie, Don'T Be Fooled, Part 1


TL;DR: different passwords have different protection requirements, and different attackers using various attacks can only be prevented through different prevention methods. Password security is not simple. For real advise, checking the second post (in progress).

Are you sick of password advices like "change your password regularly" or "if your password is password change it to pa$$w0rd"? This post is for you!

The news sites are full of password advises nowadays due to recent breaches. When I read/watch these advise (especially on CNN), I am usually pissed off for a lot of reasons. Some advises are terrible (a good collection is here), some are good but without solutions, and others are better, but they don't explain the reasons. Following is my analysis of the problem. It works for me. It might not work for you. Comments are welcome!

Password history

Passwords have been used since ancient times.


Because it is simple. When I started using the Internet, I believe I had three passwords. Windows login, webmail, and IRC. Now I have ~250 accounts/passwords to different things, like to my smartphone, to my cable company (this password can be used to change the channels on the TV), to my online secure cloud storage, to full disk encryption to start my computer, to my nude pictures, to my WiFi router, to my cloud server hosting provider, etc etc etc. My money is protected with passwords, my communication is protected with passwords/encryption, my work is protected with passwords. It is pretty damn important. But yet people tend to choose lame passwords. Pretty lame ones. Because they don't think it can be significant. But what is not essential today will be relevant tomorrow. The service you used to download music (iTunes) with the lame password will one day protect all your Apple devices, where attackers can download your backup files, erase all your devices, etc. The seven-character and one capital rule is not enough anymore. This advice is like PDF is safe to open, Java is secure. Old, outdated, untrue.

Now, after this lengthy prologue, we will deep dive into the analysis of the problem, by checking what we want to protect, against whom (who is the attacker), and only after that, we can analyze the solutions. Travel with me, I promise it will be fun! ;)

What to protect?

There are different services online, and various services need different ways to protect. You don't use the same lock on your Trabant as you do on your BMW.

Internet banking, online money

For me, this is the most vital service to protect. Luckily, most of the internet banking services use two-factor authentication (2FA), but unfortunately, not all of them offer transaction authorization/verification with complete transactions. 2FA is not effective against malware, it just complicates the attack. Transaction authorization/verification is better, but not perfect (see Zitmo). If the access is not protected with 2FA, better choose the best password you have (long, real random, sophisticated, but we will get to this later). If it is protected with 2FA, it is still no reason not to use the best password ;) This is what I call the "very high-level password" class.


Credit card data

This system is pretty fucked up bad. Something has to be secret (your credit card number), but in the meantime that is the only thing to identify your credit card. It is like your username is your password. Pretty bad idea, huh? The problem is even worse with a lot of different transaction types, especially when the hotel asks you to fax both sides of your CC to them. Unfortunately, you can't change the password on your credit card, as there is no such thing, but Verified by VISA or 3-D Secure with 2FA might increase the chances your credit card won't get hacked. And on a side note, I have removed the CVV numbers from my credit/debit cards. I only read it once from the card when I received it, I don't need it anymore to be printed there.
And sometimes, you are your own worst enemy. Don't do stupid things like this:


Work related passwords (e.g. Windows domain)

This is very important, but because the attack methods are a bit different, I created this as a different category. Details later.

Email, social sites (Gmail/Facebook/Twitter), cloud storage, online shopping

This is what I call the "high level password" class.
Still, pretty important passwords. Some people don't understand "why would attackers put any energy to get his Facebook account?" It is simple. For money. They can use your account to spread spam all over your Facebook wall. They can write messages to all of your connections and tell them you are in trouble and send money via Western Union or Bitcoin.


They can use your account in Facebook votes. Your e-mail, cloud storage is again very important. 20 years ago you also had letters you didn't want to print and put in front of the nearest store, neither want you to do that with your private photo album. On a side note, it is best to use a cloud storage where even the cloud provider admin can't access your data. But in this case, with no password recovery option, better think about "alternative" password recovery mechanisms.

Other important stuff with personal data (e.g. your name, home address)

The "medium level password" class. This is a personal preference to have this class or not, but in the long run, I believe it is not a waste of energy to protect these accounts. These sites include your favorite pizza delivery service, your local PC store, etc.

Not important stuff

This is the category other. I usually use one-time disposable e-mail to these services. Used for the registration, get what I want, drop the email account. Because I don't want to spread my e-mail address all over the internet, whenever one of these sites get hacked. But still, I prefer to use different, random passwords on these sites, although this is the "low level password" class.

Attackers and attack methods

After categorizing the different passwords to be protected, let's look at the different attackers and attack methods. They can/will/or actively doing it now:

Attacking the clear text password 

This is the most effective way of getting the password. Bad news is that if there is no other factor of protection, the victim is definitely not on the winning side. The different attack methods are:

  • phishing sites/applications,


  • social engineering,
  • malware running on the computer (or in the browser), 
  • shoulder surfing (check out for smartphones, hidden cameras), 
  • sniffing clear-text passwords when the website is not protected with SSL,
  • SSL MiTM,
  • rogue website administrator/hacker logging clear text passwords,
  • password reuse - if the attacker can get your password in any way, and you reuse it somewhere else, that is a problem,
  • you told your password to someone and he/she will misuse it later,
  • hardware keyloggers,
  • etc.

The key thing here is that no matter how long your passwords are, no matter how complex it is, no matter how often do you change it (except when you do this every minute ... ), if it is stolen, you are screwed. 2FA might save you, or might not.

Attacking the encrypted password 

This is the usual "hack the webserver (via SQL injection), dump the passwords (with SQLMap), post hashes on pastebin, everybody starts the GPU farm to crack the hashes" scenario. This is basically the only scenario where the password policies makes sense. In this case the different level of passwords need different protection levels. In some cases, this attack turns out to be the same as the previous attack, when the passwords are not hashed, or are just encoded.

The current hash cracking speeds for hashes without any iterations (this is unfortunately very common) renders passwords like Q@tCB3nx (8 character, upper-lowercase, digit, special characters) useless, as those can be cracked in hours. Don't believe me? Let's do the math.

Let's say your password is truly random, and randomly choosen from the 26 upper, 26 lower, 10 digit, 33 special characters. (Once I tried special passwords with high ANSI characters inside. It is a terrible idea. Believe me.). There are 6 634 204 312 890 620 different, 8 character passwords from these characters. Assuming a 2 years-old password cracking rig, and MD5 hash cracking with 180 G/s speed, it takes a worst case 10 hours (average 5) to crack the password, including upgrading your bash to the latest, but still vulnerable bash version. Had the password been 10 characters long, it would take 10 years to crack with today hardware. But if the password is not truly random, it can be cracked a lot sooner.

A lot of common hashing algorithms don't use protections against offline brute-force attacks. This includes LM (old Windows hashes), NTLM (modern Windows hashes), MD-5, SHA1-2-512. These hashing algorithms were not developed for password hashing. They don't have salting, iterations, etc. out of the box. In the case of LM, the problem is even worse, as it converts the lowercase characters to uppercase ones, thus radically decreasing the key space. Out of the box, these hashes are made for fast calculation, thus support fast brute-force.


Another attack is when the protected thing is not an online service, but rather an encrypted file or crypto-currency wallet.

Attacking the authentication system online

This is what happened in the recent iCloud hack (besides phishing). Attackers were attacking the authentication system, by either brute-forcing the password, or bypassing the password security by answering the security question. Good passwords can not be brute-forced, as it takes ages. Good security answers have nothing to do with the question in first place. A good security answer is as hard to guess as the password itself. If password recovery requires manual phone calls, I know, it is a bit awkward to say that your first dog name was Xjg.2m`4cJw:V2= , but on the other hand, no one will guess that!


Attacking single sign on

This type of attack is a bit different, as I was not able to put the "pass the hash" attacks anywhere. Pass the hash attack is usually found in Windows domain environments, but others might be affected as well. The key thing is single sign on. If you can login to one system (e.g. your workstation), and access many different network resources (file share, printer, web proxy, e-mail, etc.) without providing any password, then something (a secret) has to be in the memory which can be used to to authenticate to the services. If an attacker can access this secret, he will be able to access all these services. The key thing is (again) it does not matter, how complex your passwords are, how long it is, how often do you change, as someone can easily misuse that secret.

 

Attacking 2FA

As already stated, 2 factor authentication raises the efforts from an attacker point of view, but does not provide 100% protection. 
  • one time tokens (SecurID, Yubikey) can be relayed in a man-in-the-middle attack
  • smartcard authentication can be relayed with the help of a malware to the attacker machine - or simply circumvented in the browser malware, 
  • text based (SMS) messages can be stolen by malware on the smartphone or rerouted via SS7, 
  • bio-metric protection is constantly bypassed,
  • SSH keys are constantly stolen,
  • but U2F keys are pretty good actually, even though BGP/DNS hijack or similar MiTM can still circumvent that protection,
  • etc. 


Others

Beware that there are tons of other attack methods to access your online account (like XSS/CSRF), but all of these have to be handled on the webserver side. The best you can do is to choose a website where the Bug Bounty program is running 24/7. Otherwise, the website may be full of low hanging, easy-to-hack bugs.

Now that we have covered what we want to protect against what, in the next blog post, you will see how to do that. Stay tuned. I will also explain the title of this blog post.

More articles


Administración Remota De Servidores Desde Android

Sería muy util poder administrar todos nuestros servidores desde la palma de la mano.

Sin embargo una shell linux, no es viable en el teclado de un teléfono incluso de un tablet, sobretodo porque hay que escribir muchos símbolos, por ejemplo el guión, y estos teclados están pensados más bien para texto.

Pues bien, de esta necesidad surgió la aplicación SSHControl:


SSHControl

Esta problematica la he solucionado a base de utilizar nevegadores y estructurar los outputs para no acumular excesiva información en la pantalla.

- Navegador de ficheros
- Navegador de procesos
- Navegador de conexiones
- Navegador de logs
- Navegador de drivers de kernel

Esto permite administrar múltiples servidores con un solo dedo :)

Controlar la seguridad de sus servidores ahora es bastante sencillo y ágil, por ejemplo con solo hacer un "tap" encima de un usuario, podemos ver sos procesos asociados, con hacer otro tap en un proceso podemos kilearlo, ver mas info etc ..
Con hacer un tap encima de una apliacción, vemos sus conexiónes, con un tap en una conexión podemos agregar una regla de filtrado en el firewall, etc ..


En la siguiente versión habilitaré la opción de "Custom Commnands", la cual es muy util,
cada administrador o usuario linux, tiene una serie de comandos que repite con mucha frecuencia,
bien pues esta opción permite pre-programar estos comandos habituales, de manera que puedes lanzarlos con un simple tap.

En el roadmap tengo pensadas nuevas funcionalidades muy útiles :)

Aqui os dejo algunas capturas de pantalla:







More info