Monday, January 15, 2018

how to mount drives on Windows 10 Ubuntu shell


From link below, can get to drives or other servers

https://superuser.com/questions/1114341/windows-10-ubuntu-bash-shell-how-do-i-mount-other-windows-drives

Good news, it is now possible to mount USB media (including formatted as FAT) and network shares with drvfs on Windows 10:
Mount removable media: (e.g. D:)
$ sudo mkdir /mnt/d
$ sudo mount -t drvfs D: /mnt/d
To safely unmount
$ sudo umount /mnt/d
You can also mount network shares without smbfs:
$ sudo mount -t drvfs '\\server\share' /mnt/share

wicd-curses curses wifi manager


A few locations discuss headless setup of the raspberry pi for bringing up such as the rpi zero W which can be made to boot up completely disconnected, due to the presence of wifi on the board.

However it would be nice to be able to add an additional Wifi net to connect to for such as when one wants to run the board on additional networks.

My use case is to have a pocket board which runs Linux and can tether if needed to a cell phone wifi for network access.

https://raspberrypi.stackexchange.com/questions/11631/how-to-setup-multiple-wifi-networks

sudo apt-get install wicd-curses

will install a curses utility to manipulate the wifi connections.

Shell in a box on the raspberry pi

Raspian's Debian distribution repositories contain the shell in a box distribution.

sudo apt-get -y install shellinabox

will install the package.

access it via

https://<ip or name>:4200/

unless the port is configured to other port.  Since this is intended for remote management, the access to the demon is via encrypted https connection.  There are topics about  configuring this for non encrypted access, but one might as well do telnet if that is turned off.

Tagged with ssh as it is a similar access method if configured with encrypted shell access.

Here is a discussion:

http://sysmatt.blogspot.com/2014/11/manage-your-raspberry-pi-with-shell.html

Thursday, January 4, 2018

raspberry pi display 7" official info



https://forums.pimoroni.com/t/official-7-raspberry-pi-touch-screen-faq/959

Note: An update has been pushed to Raspbian to flip the screen ( rotate it by 180 degrees ) for a better desktop viewing angle. This makes it upside-down in our stand and the official Pi stand, so you’ll need to change a setting to flip it back.
To do this, open /boot/config.txt in your favourite editor and add the line:
lcd_rotate=2
This will rotate both the LCD and the touch coordinates back to the right rotation for our display stand.
Don’t use the documented display_rotate, it performs a performance expensive rotation of the screen and does not rotate the touch input.

Friday, December 29, 2017

set readynas nfs rootsquash off


rootsquash is a feature in NFS that allows one to add a bit of security to nas systems.  Unfortunately if the user id's aren't managed closely across your systems that give a crap, the systems will have inadvertent portions that aren't available.

The readynas backup is a victim of this.  It faithfully copies across things from one system to another and adjusts times and all, and sets the user id.  Then it can no longer get to it after that.

Sad solution is to turn off rootsquash, so that the actual rsyncs from other systems can get to the files and do the job.

Will have to work on the mess sometime.  However there are not any conventions on user id's across all the distributions to make anything simple.

https://kb.netgear.com/000045496/ReadyNAS-OS-6-8-NFS-User-ID-Mapping

ReadyNAS OS 6.8 allows configuring NFS User ID mapping per NFS share. This functionality ensures NFS connections use a predefined UID/GID when necessary, which prevents permission based issues on certain applications.

Configuring User ID Mapping

  1. From the Admin Page, click Shares > Shares
  2. Click the share you would like to edit, then click Settings.
  3. Click Network Access > NFS > Advanced.
There are three UID/GID squashing settings:
  • No Root Squash: Allows NFS connection using root access to connect as root. (Anonymous UID/GID text boxes are disabled)
  • Root Squashing: Forces all NFS root users to use UID/GID configured in the Anonymous UID/GID text boxes.
  • All Squash: Forces all NFS users to use UID/GID configured in the Anonymous UID/GID text boxes.
  •  

Friday, December 15, 2017

Firefox studies, disabling along with reporting bug dumps.


Firefox has two options that should be off for full privacy.

One is to allow Firefox to send dumps to Mozilla.  I've no idea if anyone looks at this, but a dump may sweep up enough information to discern your browser history and other items, such as deciphered items which have used your private key to authenticate a site, etc.

The other one which blew up today, is to "allow Firefox to perform studies".  This was abused 12/15/2017 (though not sure what version) to load a useless extension during an update.  This is possibly harmless today (and useless crap to load if you don't use it), and potentially useful if your browser is being compromised to add something to spy on you or otherwise mess with your system.

The extension was able to be installed if you had the "Firefox Studies" checkbox selected. To prevent Firefox Studies from installing extensions on your behalf:
  • Navigate to: "about:preferences#privacy"
  • Scroll down to the "Firefox Data Collection and Use" section
  • Uncheck the "Allow Firefox to install and run studies" checkbox (and the others, if you wish)
 
This gets rid of the studies problem.  Also uncheck the other options there while you are at it.