Semantic Gnosis Web
3.5K views | +0 today
Semantic Gnosis Web
Ariadne's invisible wire in the web maze
Curated by Jan Bergmans
Your new post is loading...
Your new post is loading...
Scooped by Jan Bergmans!

Innovation under Austerity - Transcript - Software Freedom Law Center

Innovation under Austerity - Transcript - Software Freedom Law Center | Semantic Gnosis Web |
The Software Freedom Law Center provides legal representation and other law related services to protect and advance Free and Open Source Software.
No comment yet.
Scooped by Jan Bergmans!

Paranoia Made Me a Better Computer User

Paranoia Made Me a Better Computer User | Semantic Gnosis Web |
“You don’t want to end up on the Wall of Sheep.” That’s the last thing my editor told me before I flew to Las Vegas to hang out at the infamous hacker convention DEF CON. A week later, I found myself standing in front of the wall, looking frantically for my name and password. Despite my obsessive caution, I knew I’d been hacked.
Jan Bergmans's insight:

One morning my phone didn’t work the way it used to, and then that afternoon, the TV in my hotel room was acting strange. I heard robotic voices barking into my wireless headphones, at one point. People waved antennas in my face, and I spotted Stingrays lurking under tables. I broke out into a cold sweat at one talk, suddenly and destructively anxious that I’d left my laptop open and connected to the hotel wifi. If I had, there was a good chance that my login credentials would end up on the Wall of Sheep, where DEF CON hackers proudly displayed the personal details of people who’d been pwned at the conference (a.k.a. sheep).

DEF CON is often regarded as the zany younger sibling of the Black Hat Briefings, an annual gathering of information security professionals. If Black Hat is the Super Bowl of hacker meet ups, however, DEF CON would be the scrappy, anything-goes tackle game without pads for the people who don’t want to buy the expensive tickets. Black Hat reminds you that hackers are out there; DEF CON insists that they’re coming to get you.

But by the time it was all over, I realized there was nothing to fear — at least, as long as I configured my machines correctly. The bright, nefarious minds that flock to Las Vegas at the end of summer are our guardians. Scary as they may seem, hackers are hellbent on helping everyone enjoy a safe and open internet. Security isn’t always easy, though.

Hack Number 1: Laptop

Anybody who’s ever been to a hacker conference will tell you never, ever use wifi, no matter what. The reasoning is simple. At a hacker conference, hackers want to hack, and creating fake wifi networks is an easy way to do it. Compromising an existing wifi network is another option, albeit slightly more involved. Inevitably, you’re safest if you simply stay offline at events like DEF CON.

This wasn’t really an option for me. I’m a blogger, and much as it pains me to admit it, I need the internet to do my job. Before going to DEF CON, I’d been using a secure network for journalists at Black Hat. At DEF CON, I was told to trust not a single network. I installed a VPN service on my laptop before going, just to be safe, but I was sure it wouldn’t do much good.

So what did I do? Naturally, I went to a neighboring hotel to find an open wifi network—not that any hacker would ever be there first. I saw some obvious fakes, like “DIY Phone Gadgets Community.” But the official hotel wifi, “MGMGrandWiFi,” looked real ( on

No comment yet.
Scooped by Jan Bergmans!

Consumentenbond waarschuwt voor Windows 10-installatie - Security.NL

Consumentenbond waarschuwt voor Windows 10-installatie - Security.NL | Semantic Gnosis Web |
De Consumentenbond waarschuwt consumenten die hun privacy belangrijk vinden om Windows 10 niet met de aanbevolen standaardinstelling op hun computer te installeren. Bij de standaardinstallatie wordt namelijk ook een reeks internettoepassingen op de pc gezet die toegang tot veel persoonlijke gegevens krijgen, zo laat de bond aan de hand van eigen onderzoek weten.

Bij Windows 10 kunnen persoonlijke documenten niet alleen op de computer worden bewaard, maar ook in een clouddienst op internet. Ook zijn er tal van nieuwe functies die in contact staan met het web. Het meest in het oog springend is volgens de Consumentenbond Cortana. Een 'persoonlijke assistent' die alle getypte en ingesproken tekst doorstuurt naar Microsoft 'om de gebruiker beter te leren kennen'. Cortana zit op dit moment nog niet in de Nederlandstalige editie, maar de instellingen ervoor staan al wel 'aan'.

Ook het uitlezen van unieke reclame-ID's door elk programma, het doorlopend registreren van de gebruiker zijn locatie en het delen hiervan met alle apps en apps die direct zien wie de gebruiker is zijn andere zaken waar consumenten automatisch 'ja' tegen zeggen bij een standaardinstallatie van Windows 10. De Consumentenbond heeft daarom een stappenplan online gezet dat laat zien hoe de privacyinstellingen in het nieuwe besturingssysteem zijn aan te passen.
No comment yet.
Scooped by Jan Bergmans!

Facebook has added one of LinkedIn's most abused features

Facebook has added one of LinkedIn's most abused features | Semantic Gnosis Web |
Facebook friends will be able to suggest profile tags for you — but you need to approve them before they show up.
No comment yet.
Rescooped by Jan Bergmans from digital divide information!

34 Funny Illustrations Proving That The World Has Taken A Turn For The Worse

34 Funny Illustrations Proving That The World Has Taken A Turn For The Worse | Semantic Gnosis Web |
Is humanity really progressing?

Via Bonnie Bracey Sutton
Jan Bergmans's insight:

Superfluous problems

Mike Busarello's Digital Storybooks's curator insight, June 27, 6:00 AM

Good compilation of recent subtle and not so subtle social changes!

Scooped by Jan Bergmans!

Facebook is BREACHING your SEXUAL privacy, warn Belgian data cops

Facebook is BREACHING your SEXUAL privacy, warn Belgian data cops | Semantic Gnosis Web |
Free content ad network could face EC court proceedings
Jan Bergmans's insight:

Belgium’s privacy watchdog has slammed Facebook for its tracking of users and non-users, saying it is in breach of EU law.

The Commission de Protection de la Vie Privée (CPVP) said it was staggered by the fashion in which Facebook tramples users’ rights and tracks them across the web whether they want it or not.

The Belgian data cops claimed:

Facebook violates European and Belgian legislation on privacy. It is in a unique position and can easily connect the browsing habits of its users to their real identity, their interactions on social networks and sensitive data such as medical information, preferences religious, sexual and political ...

The CPVP cannot impose fines directly on the web giant but it has demanded more information about how it monitors users, what information it collects and how it uses cookies.

In the meantime the privacy Commission advised people to use "do not track" services like Ghostery, Blur and Disconnect to protect themselves from Facebook’s data slurping. It said it had forwarded its findings to the national prosecutor’s office and that a criminal case could be in the offing.

One of the biggest concerns raised in a report drawn up for the Commission by the University of Leuven and iMinds is Facebook’s ability to profile non-users simply through their interaction with those who are signed up to the office time-waster.

The Belgian regulator is just one of the first to hit back hard against Facebook’s (relatively) new privacy policy which came into force earlier this year. The Dutch and German data protection agencies are also investigating Facebook as well as the pan-European Article 29 data protection group.

The huge cheap-ads platform denies any wrongdoing and a spokeswoman said on Friday that it was compliant with EU law under the Irish interpretation as it has its headquarters in Dublin. CPVP has refuted this claim.

Europe’s current data protection law is a directive meaning that is was written into national law differently in the different EU countries. A planned data protection regulation, which is currently being negotiated, would be applied the same throughout the EU removing this battle of jurisdictions. ®

No comment yet.
Scooped by Jan Bergmans!

Zak Rogoff's blog | Defective by Design

Zak Rogoff's blog | Defective by Design | Semantic Gnosis Web |
Jan Bergmans's insight:
Zak Rogoff's blogThe worst thing about DRM is that, most of the time, everything seems to work

Submitted by Zak Rogoff on May 6, 2015 - 9:23am

This post is by Kat Walsh, a lawyer with extensive background in the free culture movement, who recently joined the Free Software Foundation's board of directors. The post was written for the 2015 International Day Against DRM.

Everyone knows how to recognize cartoon villains. They twirl their mustaches as they kick puppies, delivering speeches about world domination for personal gain, and often let their arrogance lead to their undoing. People recognize this kind of evil immediately and rise up in protest, banding together to resist. In the real world, most evils are much harder to see coming: they look reasonable at first, perhaps taking just a little bit from many people to get to some unexpected end. Once the effect is widespread enough that most people notice, you have a systemic problem that's hard to get rid of. The evil that's easy to identify is easy to fight. The one that initially looks like something good can betray you, and that's why when we recognize it, we need to speak out against it.

Read more about The worst thing about DRM is that, most of the time, everything seems to work
No comment yet.
Scooped by Jan Bergmans!

Jailbreaking Is Not A Crime

Jailbreaking Is Not A Crime | Semantic Gnosis Web |
Millions of people jailbreak the phones and tablets they own, in order to run the software they want on their own terms. Whether it's to cut out annoying bloatware, install the latest security fixes, change the home screen, or just to use it in a way the manufacturer hasn't considered, jailbreaking is an important part of how we interact with our devices. But the Copyright Office and Librarian of Congress could cast its future into jeopardy in just a few short months.
Jan Bergmans's insight:

Companies that want to lock down our devices argue that, because the firmware running on your phone or tablet is copyrighted, jailbreaking your device to run a modified version runs afoul of laws meant to prop up DRM. But there's a safety valve: the Librarian of Congress can make exemptions to those laws through a complicated rulemaking process. So every three years, groups like EFF have to make the case for specific carve-outs, like jailbreaking phones and tablets.

We've gotten jailbreaking exemptions in the past, but there's no guarantee of success this year. That's where you come in: lend your voice to our submission, and we can tell the Librarian of Congress that thousands of regular users want to preserve their rights as device owners. Join us in making it clear: jailbreaking is not a crime.

April 16, 2015
No comment yet.
Rescooped by Jan Bergmans from Public Relations & Social Media Insight!

7 Hacks to Get More Shares on Social Media - AudienceBloom

7 Hacks to Get More Shares on Social Media - AudienceBloom | Semantic Gnosis Web |

Getting your content and posts shared accomplishes many goals simultaneously. First, getting shared is an indication that you’re producing compelling content, giving you a positive feedback loop.


Second, when your content is shared, more, newer people are able to see your content, which leads to greater following numbers and greater traffic.


Finally, getting shared often is a social signal that tells Google you are an authoritative brand, which helps your site rank higher in search results.


Obviously, getting lots of shares is the key to establishing a great social media presence, but it’s not always easy. Try using these seven hacks to get more shares from your social posts....

Via Jeff Domansky
Dean Ryan G. Martin's curator insight, April 2, 7:12 AM

Excellent white-hat techniques Bravo! 

John Norman's curator insight, April 3, 12:05 AM

Like the mouse on the treadmill you have to learning to survive and getting your brand awareness means learning the tools of the trade. Social Media is where its at. Enjoy these 7 hacks.

Winners Education's curator insight, April 3, 5:58 AM

Making your social media strategy even more successful.

Rescooped by Jan Bergmans from ☊ ☊ Harmony60 Music ☊ ☊!

Alex Adair - Make Me Feel Better (Don Diablo & CID Remix) [Official Music Video]

Alex Adair - Make Me Feel Better (Don Diablo & CID Remix) is OUT NOW! Grab your copy on Beatport HERE: Subscribe to Spinnin' TV now : As the...

Via Mary E. Berens-Oney
No comment yet.
Scooped by Jan Bergmans!

It’s Time To Rethink Our Smart Things

It’s Time To Rethink Our Smart Things | Semantic Gnosis Web |
There was a section so common in big name CES tech presentations that it was almost comical. After announcing some widget or the other, a cheerful CEO would..
Jan Bergmans's insight:

Furthermore, much of the data these IoT devices collect is unaccounted for yet required for device operation. One TechDirt reader noted that his LG “smart” TV turned dumb when he refused to allow it to listen to him.

of the TV’s network based programs:Iplayer, Skype, 3D etc.As of the 7th May following a software update to our less than two year old LG TV. I was confronted with a message asking me to read and agree with a couple of important new documents. So like a good little citizen I read and agreed with the first doc regarding use of said TV. but having read the Privacy Doc I was not best pleased with the companies assumption that I would simply agree to their sharing all our intimate viewing details (plus what ever else they can see)with all and sundry.Since I agreed not to hack into installed software (as if I Could)We cannot get around the block.

I think the company must be in breach of contract since the smart functions are no longer available. Surely in the uk at least you should not be able to change the goal posts at will. Any one sorted this problem yet??

I do not trust connected devices but I also don’t fear them. Many companies will do the right thing when called out – Samsung backed out of an Orwellian clause in their smart TVs – but the danger of security flaws grows with a system’s complexity. What happens when someone is able to activate my PS4’s camera remotely? What happens when my Wii U starts listening to my kids? What happens when someone is able to hack more complex, higher-quality IP cameras just like they did the cheaper ones? I’m more afraid of error than outright malice.


Maybe it’s time for our devices to be dumber. Until there is an open security standard for health data, for example, maybe it’s not the best idea to strap a device to your child overnight. Until Belkin or Samsung or Withings can show that it can’t be hacked through published source code and an independent audit, maybe I shouldn’t buy their products. I know I won’t follow my own advice and I know I’ll be burned. That’s why CE manufacturers aren’t worried about this. It’s not a problem until it is. Then it’s a huge problem.

I’m fine with smart devices. But I know that as each one of these devices is connected to my Wi-Fi network or my cellphone I add an attack vector to a very private place – my home and my body. By all means lets run headlong into the future but let’s open things up so the future is more Clarke than Orwell.

Featured Image: Bryce Durbin

No comment yet.
Scooped by Jan Bergmans!

Op-Ed: Ross Ulbricht got a fair trial (but not a fair investigation)

Op-Ed: Ross Ulbricht got a fair trial (but not a fair investigation) | Semantic Gnosis Web |
Did Ulbricht’s lawyer believe the defendant, or did he cynically want to keep getting paid?
Jan Bergmans's insight:
Law & Disorder / Civilization & Discontents Op-Ed: Ross Ulbricht got a fair trial (but not a fair investigation)Did Ulbricht’s lawyer believe the defendant, or did he cynically want to keep getting paid?

by Nicholas Weaver Feb 4 2015, 12:03am +0100

72Aurich Lawson / ThinkstockNicholas Weaver is a staff researcher at the International Computer Science Institute. This post originally appeared on Medium.

As I write this, the trial of Ross Ulbricht, the alleged “Dread Pirate Roberts” behind Silk Road, is just winding down. The last minute defense experts, having been blocked from testifying, have already resulted in yet more cries that Ulbricht’s trial is unfair and stacked against the defendant. Having carefully watched the case from the moment of Ulbricht’s arrest (and with the PACER bills to prove it), such cries are unfounded. Ulbricht received a fair trial. The investigation, and the quality of Joshua Dratel, Ulbricht’s well compensated and well regarded lawyer, on the other hand…

The arrest of Ross Ulbricht got its start when the FBI somehow discovered the real location of the Silk Road server in Iceland. They asked their friends in Iceland to look into this, and the Icelandic authorities created a copy of the server. With the server image in hand, everything else fell into place. They were able to identify Ulbricht through a plethora of links from the server, ranging from a bit of code in a question to StackOverflow posted in early 2013 to ssh access to the administration interface. Using this information, the investigators obtained more search warrants and an eventual arrest warrant, leading up to the moment when the FBI tackled Ulbricht in the Library with the Laptop Forensics Toolkit. Once they seized the laptop, they found a gold mine. For Ross Ubricht apparently committed one of the cardinal sins of drug dealing…

He kept notes on a criminal fucking conspiracy.

Yet how the FBI discovered the server in the first place remained a mystery: it was presented as effectively a gift from God. And when the FBI finally had to reveal this mystery, they didn’t. To put it politely, the FBI response was inconsistent with reality. Others have been more blunt, calling it “lying” and “gibberish.” And it is the FBI’s own evidence, provided to the defense, that shows that the FBI effectively lied in the court filing detailing server discovery.

Every shred of evidence except for two “hey, I found this site” posts derives solely from the server seizure. Now apparently an IRS investigator had found these two posts before the server was discovered, but these posts wouldn’t sustain a search warrant of Ulbricht’s gmail account, let alone an arrest warrant for Ulbricht. So if the defense could get the blatantly illegal search of the server tossed, the defendant could walk away.

So why is Ross Ulbricht still on trial and rapidly heading toward an almost certain “guilty” verdict and a few decades' worth of mandatory minimum sentences? Because Ulbricht’s lawyer either believed a transparently bullshit story from the defendant about how Ulbricht was framed, Ulbricht was a recalcitrant defendant, or Dratel cynically wanted to keep getting paid…

One of the foundations of US jurisprudence is “standing”: if you don’t have an interest in something, you have no say in court. In 4th amendment case law, this requires that the defendant declare a legal interest in the item searched. For example, if the police conduct a blatantly illegal search of my car, but the only thing they find is evidence concerning someone else’s criminal activity, that someone else has to declare a privacy interest in my property. So in order for Ross Ulbricht (rather than the “Dread Pirate Roberts”) to contest the server seizure, he’d have to file a declaration stating “The Silk Road server seized in Iceland was mine.” Without such a declaration, the court can’t even consider whether the seizure was legal.

Such a declaration is not an admission of guilt: it can only be used by the prosecution if the defendant testifies. So as long as Ulbricht doesn’t testify, the jury never learns that Ulbricht admits to controlling the server. Mysteriously, the defense never claimed the server, even after a 12th hour, handwritten “Are you sure about this dude” opportunity from the judge. The defense refused, so the judge denied the motion to suppress.

So why these mysterious tactics? The first possibility is that Dratel believed his client. If so, you’d want to preserve his ability to testify. Yet the defense had the server and laptop for months, complete with both the infamous diary and Ulbricht’s admitted stash of Bitcoins. It was a simple matter for me, with just public information and a couple hours of coding, to trace 20% of Ulbricht’s stash as coming directly from Silk Road. It turns out that the wallet.dat files were able to trace many more. To my mind, a defense attorney simply believing a client’s falsifiable statements, without at least checking, seems incompetent.

So the defense should have known that putting Ulbricht on the stand would be absolute suicide: the prosecution would start with “So why were you holding the Dread Pirate’s Bitcoins?” and the day would get worse from there.

The second, and most likely, possibility was that Ulbricht was simply a difficult client. Every lawyer can tell stories of clients who, after receiving sound advice, simply refuse to listen.

The final, and cynical option is that Dratel simply wants to keep getting paid. Ulbricht’s defense is largely funded by donations. Although Roger Ver initially contributed a substantial amount, most subsequent donations have been relatively small. Although a declaration couldn’t be used in court, it would have convicted Ulbricht in the court of public opinion. How many would give money to Ulbricht’s defense if Ulbricht admitted he was the Dread Pirate Roberts?

But in any case, the moment the judge wrote that “Defendant has, however, brought what he must certainly understand is a fatally deficient motion to suppress,” the good ship Revenge was sunk. And this is the point where the defense turned to farce.

The defense, in its opening, presented two theories, that Ulbricht was framed and that the Bitcoins were legitimate. Yet the defense can’t just simply say “my client was framed.” The defense must be able to provide evidence to this effect. Otherwise, this becomes the Chewbacca defense, as any defendant could say “I Wuz Framed” and walk away.

So at that moment, the defense implied that they had some evidence to back these statements and also gave the prosecution a road map for the remainder of the case.

The prosecution responded by dropping so much evidence as to make the rubble bounce, evidence which was already disclosed to the defense. Rather than just introduce a chat with “Variety Jones” where the Dread Pirate mentions heading into the jungle, then introduces Ulbricht’s Facebook post about his Thai vacation. Rather than just introduce the defendant’s laptop, the prosecution introduced a USB backup from the defendant’s apartment, apparently made two weeks earlier. And don’t forget the scrap of paper with both Silk Road’s rating system and the phone number of Ulbricht’s intended date.

The only 11th hour surprise to the defense involved tracking the Bitcoins. Apparently nobody realized that Bitcoins were trivial to trace. After the defense’s opening, the prosecution scrambled to analyze the wallet.dat files, not only discovering a huge amount of Bitcoins directly from Silk Road to Ulbricht (apparently Ulbricht’s wallets were also the Silk Road “cold” storage) but even sourcing the “hitman” payments as coming from Ulbricht’s wallet!

Now the courts generally frown on 11th hour surprise evidence, having a natural dislike for trial by ambush. Unfortunately for the defense, they invited this ambush in their opening statements.

The materials that underlie the analysis were produced long ago. Based upon the opening statement and based upon one of the theories of the defense, which is that the defendant was a bitcoin trader and that any bitcoins in his possession were from bitcoin trading, it was reasonable to expect that you yourself had done such an analysis and, therefore, that you had some intention of presenting something that would have shown the opposite. In any event, you’ve opened the door to it, and we’re going to proceed. And the fact that the government adjusted and was able to do so is not something that is particularly problematic or unusual. So that’s my ruling on that. -Judge Forrest

So what was the defense to do? Pound the table. And pound it they did.

The defense tried a frankly ridiculous “Karpeles-did it” approach, which was shot down by the judge the next day. Then the defense tried to elicit strange testimony from prosecution witnesses about insanely remote possibilities. The judge was having none of this. If the defense wants to introduce alternate suspects and alternate theories, rather than just triple-hearsay, they would need their own evidence and their own witnesses.

So in a final move, the defense attempted a bit of “trial by ambush,” disclosing two expert witnesses at well beyond the last minute with no details as to the expertise or opinions offered.

Of course, Dratel had to go with the ambush approach: these witnesses could only support the defense’s theories if the prosecution wasn’t prepared. Any Bitcoin expert unwilling to commit perjury would have to acknowledge that direct wallet to wallet transactions are traceable, that Ulbricht’s “legitimate” trading these Bitcoins would require unimaginably good returns, that Ulbricht’s “mining” these Bitcoins is impossible unless he had a room full of nonexistent computers, and that anyone willingly keeping several million in Bitcoin in Silk Road as a “bank” would have been a delusional idiot.

Similarly, if I had to pick a New York-area expert to testify for the prosecution about the ridiculousness of the mysterious hacker who somehow managed to both plant evidence two weeks before, maintain persistent access, and yet leave no trace in the syslog or other logs, I’d select Steve Bellovin. In short, if the defense properly notified the prosecution, these experts would become tools of the prosecution: one last bounce in the rubble.

But of course, trial by ambush is frowned upon. The judge was particularly scathing, including a full page that basically translates to “this is case law saying you need to get your shit done on time” and such quotes as:

Lacking are any expected opinions, lacking are the bases for such opinions. Lacking is any description of analysis or methodology. Lacking also is any indication that Antonopolous has any expertise in the areas in which he seeks to testify. His resume lists that he has worked as a consultant in crypto-currencies and published unnamed “articles” in that area (not a single publication of the alleged group of “200” is listed, let alone information sufficient to assess the seriousness or depth of such articles). Of course, not all consultants are experts.


If defense counsel truly planned his trial strategy around his ability to bend the rules and examine witnesses outside of the scope of their direct, then he should have had a “Plan B” that included complying with the rules. Defense counsel took a calculated risk.

In short, there is only one person responsible for the Defense not having their experts: the defense attorney Joshua Dratel.

And with that scathing order, the case pretty much ended. The defense has offered only a few character witnesses and no concrete evidence of the mysterious elves which planted not only the journal on Ulbricht’s computer, but also the mountains of remaining evidence.

Ulbricht received a fair trial. The judge was hard on the defense, but that is largely due to how the defense acted and their strange tactical decisions. The defense threw away the case in October and then proceeded with farce for the trial.

When all you can do is pound the table, judges sometimes get mad and ask you to stop.

No comment yet.
Rescooped by Jan Bergmans from ❧James & Mary ❧!

13 Inspiring Ways to Bring Out the Best In Yourself

13 Inspiring Ways to Bring Out the Best In Yourself | Semantic Gnosis Web |
Everyone has an awesome side hidden away somewhere. Need help in getting it out? Here are 13 ways you can bring out the best version of yourself!

Via Mary E. Berens-Oney
No comment yet.
Scooped by Jan Bergmans!

The Bridge on the River Kwai - Colonel Bogey March (HD) - YouTube

Hitler has only got one ball, Göring has two but very small, Himmler is somewhat sim'lar, But poor Goebbels has no balls at all.
No comment yet.
Scooped by Jan Bergmans!

Useful Bash Commands

Useful Bash Commands | Semantic Gnosis Web |
Useful Bash Commands

9 minutes to read (914 words) (10 Comments)

Clear Terminal
Run Previous Command With Root/Sudo Privilege
Run Previous Command With Search/Replace For First Instance
Run Previous Command With Search/Replace For All The Instance
Execute Command Without Saving in History
Paste Last Argument of Most Recent Command
Paste Selected Argument
Reset Terminal
Display Mount Filesystem in Nice Layout
Compare Remote File with Local File
Decide Which Command Run On Success and Fail
Execute Command After Every 2 Seconds
Check Last Command Status

NOTE!: If you feel some commands are missing in this post,
Feel free to add those commands in below comments box.

| !! Repeat last command |
| !char Repeat last command That started with char |
| !num Repeat a command by its number in history output |
| |
| !-n Repeat a command entered n command back |
| !?abc Repeat last command that contains (as opposed to ?started with?) abc |

| UP DOWN Keys Scroll through previous commands |
| Ctrl+r Reverse-i-search |

Clear Terminal

# Linux/Unix OS
# The following keys not just clear screen but also clear Terminal buffer
# After you can't able to view previous buffer

Run Previous Command With Root/Sudo Privilege

$ sudo !!

Run Previous Command With Search/Replace For First Instance

$ echo "Hello Mitesh, Hello Shah, Hello Visitor"
Hello Mitesh, Hello Shah, Hello Visitor
$ ^Hello^Hi
$ echo "Hi Mitesh, Hello Shah, Hello Visitor"
Hi Mitesh, Hello Shah, Hello Visitor

Run Previous Command With Search/Replace For All The Instance

$ echo "Hello Mitesh, Hello Shah, Hello Visitor"
Hello Mitesh, Hello Shah, Hello Visitor
$ !!:gs/Hello/Hi
$ echo "Hi Mitesh, Hi Shah, Hi Visitor"
Hi Mitesh, Hi Shah, Hi Visitor

Execute Command Without Saving in History

Prepending one or more spaces to your command won’t be saved in history.


NOTE!: HISTCONTROL=ignorespace will ignore just the commands that begin with a space.
Use HISTCONTROL=ignoreboth if you also want to ignore duplicates.
Paste Last Argument of Most Recent Command

| Esc . The escape key followed by a period. |
| Alt+. Hold down alt key while pressing the period. |
| !$ Only valid for last argument |

$ cp -v index.html /home/mitesh/shah/
# Using ALT Dot
$ cd
$ cd /home/mitesh/shah/
# Using Esc Dot
$ cd
$ cd /home/mitesh/shah/
# Using !$
$ cd !$
$ cd /home/mitesh/shah/

Paste Selected Argument

This comes in handy when you’ve written a long command with multiple arguments and you want to reuse one of them.

# Use Only 3rd Argument
$ echo a b c d e
a b c d e
$ echo !:3
echo c

# Used 1-3 Argument Only
$ echo a b c d e
a b c d e
$ echo !:1-3
echo a b c
a b c

# If you leave off the first digit and just start with `!:-`
# then you'll include argument 0, which is the previous command.
$ echo a b c d e
a b c d e
$ echo !:-3
echo echo a b c
echo a b c

Reset Terminal

Sometime we send binary output to the terminal, Which make terminal not useable.
The reset command reset your terminal, Note that when you type reset its won’t properly echo back on terminal.

$ reset

Display Mount Filesystem in Nice Layout

$ mount | column -t
/dev/root on / type ext4 (rw,relatime,errors=remount-ro,data=ordered)
devtmpfs on /dev type devtmpfs (rw,relatime,size=4037132k,nr_inodes=1009283,mode=755)
none on /dev/pts type devpts (rw,nosuid,noexec,relatime,mode=600)
none on /proc type proc (rw,nosuid,nodev,noexec,relatime)
none on /sys type sysfs (rw,nosuid,nodev,noexec,relatime)
none on /proc/sys/fs/binfmt_misc type binfmt_misc (rw,nosuid,nodev,noexec,relatime)
none on /sys/fs/fuse/connections type fusectl (rw,relatime)
none on /sys/kernel/security type securityfs (rw,relatime)
none on /run type tmpfs (rw,nosuid,noexec,relatime,size=807520k,mode=755)
none on /run/lock type tmpfs (rw,nosuid,nodev,noexec,relatime,size=5120k)
none on /run/shm type tmpfs (rw,nosuid,nodev,relatime)


$ man ascii

Compare Remote File with Local File

$ ssh USERNAME@HOSTNAME cat /path/to/remotefile | diff /path/to/localfile -

Decide Which Command Run On Success and Fail

$ cal && echo "Right Command" || echo "Wrong Command"
July 2015
Su Mo Tu We Th Fr Sa
1 2 3 4
5 6 7 8 9 10 11
12 13 14 15 16 17 18
19 20 21 22 23 24 25
26 27 28 29 30 31

Right Command

$ call && echo "Right Command" || echo "Wrong Command"
No command 'call' found, did you mean:
Command 'wall' from package 'bsdutils' (main)
Command 'calc' from package 'apcalc' (universe)
Command 'cal' from package 'bsdmainutils' (main)
call: command not found

Wrong Command

Execute Command After Every 2 Seconds

$ watch -d df -h
Every 2.0s: df -h Tue Jul 7 13:52:39 2015

Filesystem Size Used Avail Use% Mounted on
rootfs 500G 250G 250G 50% /
/dev/root 500G 250G 250G 50% /
devtmpfs 3.9G 4.0K 3.9G 1% /dev
none 789M 165M 625M 21% /run
none 5.0M 0 5.0M 0% /run/lock
none 3.9G 0 3.9G 0% /run/shm

Check Last Command Status

If command run Successfully then exit status is zero
If command doesn’t run Successfully then exit status is non-zero

$ cal ; echo $?
$ call ; echo $?

Email Address
Post Navigation
« How to Upgrade Multiple WordPress With Single Command
DuckDuckGo - Awesome Search Engine »
Share on


Useful Bash Commands was published on July 07, 2015 .
No comment yet.
Scooped by Jan Bergmans!

All commands |

All commands | | Semantic Gnosis Web |
A repository for the most elegant and useful UNIX commands. Great commands can be shared, discussed and voted on to provide a comprehensive resource for working from the command-line
Jan Bergmans's insight:

Read and write to TCP or UDP sockets with common bash tools

Ever needed to test firewalls but didn't have netcat, telnet or FTP?

Enter /dev/tcp, your new best friend. /dev/tcp/(hostname)/(port) is a virtual device that bash can use to talk to TCP ports

First, exec sets up a redirect for /dev/tcp/$server/$host to file descriptor 5.

Then, as per some excellent feedback from @flatcap, we launch a redirect from file descriptor 5 to STDOUT (implied by

Finally, when the second cat dies (the connection is closed), we clean up the file descriptor with 'exec 5>&-'.

This one-liner opens a connection on a port to a server and lets you read and write to it from the terminal.

Example test

replace with

replace 13 with 22

You should see a response from your SSH server:

SSH-2.0-OpenSSH_6.6.1p1 Ubuntu-2ubuntu2

Typing TEST should net you a Protocol Mismatch:


Protocol mismatch.

It can be used for FTP, HTTP, NTP, or netcat listening on a port (makes for a simple chat client!)

Replace /tcp/ with /udp/ to use UDP instead.

Comments (6) | Add to favourites | Report as malicious | Submit alternative | Report as a duplicate
No comment yet.
Scooped by Jan Bergmans!

Apple CORED: Boffins reveal password-killer 0days for iOS and OS X

Apple CORED: Boffins reveal password-killer 0days for iOS and OS X | Semantic Gnosis Web |
Keychains raided, sandboxes busted, passwords p0wned, but Apple silent for six months
No comment yet.
Scooped by Jan Bergmans!

Ad Taks

Ad Taks | Semantic Gnosis Web |
Ad Taks is Held van ZTRDG. Heeft de Chaamse Pel weer op de kaart gezet. Letterlijk en figuurlijk. Hobbypluimveehouder Taks las zo’n tien jaar geleden dat dit Brabantse kippenras bijna was uitgestorven en kwam in actie. Lees meer op
No comment yet.
Scooped by Jan Bergmans!

I Remember You - Short Film

I Remember You - Short Film | Semantic Gnosis Web |
Thank you so very much for taking a few minutes from your day to review this offering. I have been developing this project for almost 3 years and have reached a point where it is time to take this ne…
No comment yet.
Scooped by Jan Bergmans!

Internet of Things devices lack fundamental security, study finds - ZDNet

Internet of Things devices lack fundamental security, study finds - ZDNet | Semantic Gnosis Web |
UPDATED. What do you find when you test the security of today's IoT devices? Vulnerabilities which could allow for robbery, theft or even stalking.
No comment yet.
Rescooped by Jan Bergmans from ☊ ☊ Harmony60 Music ☊ ☊!

Paul McCartney, John Mayer headline Rock Hall induction show

Paul McCartney, John Mayer headline Rock Hall induction show | Semantic Gnosis Web |
Ringo Star will be inducted into the Rock and Roll Hall of Fame next month with a little help from a key friend: Paul McCartney.

Via Mary E. Berens-Oney
Jan Bergmans's insight:

TY Mary ;-)

No comment yet.
Scooped by Jan Bergmans! Put the fun back into computing. Use Linux, BSD. Put the fun back into computing. Use Linux, BSD. | Semantic Gnosis Web |
News and feature lists of Linux and BSD distributions.
Jan Bergmans's insight:

Daisuke Suzuki has announced the release of Vine Linux 6.3, an updated version of the project's general-purpose Japanese Linux distribution (and one of the world's oldest one, with beginnings dating back to 1999) featuring GNOME 2.32 as the default desktop environment: "Vine Linux 6.3 (Malartic-Lagraviere). Vine Linux 6.3 has following features (highlights): update the software collection; update Linux kernel to 3.4.106 (latest LTS kernel 3.4.y); bundle newer software - Firefox 33.0, Thunderbird 24.0, Sylpheed 3.4.2, LibreOffice 4.3.5, OpenSSL 1.0.1; stability improvement; improvements of look and feel; newer hardware support; new user-friendly tools. Since this is not a commercial version (Vine Linux CR), non-free applications and fonts are not included on the CD/DVD. Instead of proprietary ATOX X/Wnn7/Wnn8/VJE Japanese inputs and Ricoh/Dynacomware fonts, this FTP edition contains Anthy and free TrueType fonts." Here is the brief release announcement (in Japanese), with further information provided in the release notes (in English). Download the installation DVD image from here: Vine63-DVD-x86_64.iso (2,027MB, SHA1, pkglist).2015-02-25NEW • Distribution Release: KaOS 2015.02

Anke Boersma has announced the release of KaOS 2015.02, a brand-new version of the project's rolling-release Linux distribution featuring the Plasma 5 desktop: "KaOS is very proud to announce the availability of the February release of a new stable ISO image. This release brings the end of KDE 4 as the default Desktop Environment for KaOS. Almost ten months ago work started to fully migrate to Frameworks 5, Plasma 5-based distribution and with the release of Plasma 5.2.1 this migration is now deemed ready to bring a better user experience then KDE 4. From the unset of this migration there was never a plan to mix the two environments. What you will see on this ISO is a pure Plasma 5-based environment. As many might have noted KDE Applications 14.12 did not contain more then a handful of Plasma 5 applications. Just about all applications that users have become used to seeing in a KDE 4 version are available as a Plasma 5 port. A few are not ready yet, and those will be missing from the KaOS repositories until their ports are ready for daily use." Here is the full release announcement with screenshots. Download: KaOS-2015.02-x86_64.iso (1,398MB, MD5, pkglist).2015-02-24NEW • Distribution Release: Tails 1.3

Tails 1.3, a new version of the live distribution designed for anonymous Internet browsing via the Tor network, is out. Among the new features is the inclusion of Electrum, a lightweight Bitcoin client: "Tails, The Amnesic Incognito Live System, version 1.3, is out. This release fixes numerous security issues and all users must upgrade as soon as possible. New features: Electrum is an easy-to-use Bitcoin wallet, you can use the Bitcoin client persistence feature to store your Electrum configuration and wallet; the Tor Browser has additional operating system and data security, this security restricts reads and writes to a limited number of folders; the obfs4 pluggable transport is now available to connect to Tor bridges, pluggable transports transform the Tor traffic between the client and the bridge to help disguise Tor traffic from censors; Keyringer lets you manage and share secrets using OpenPGP and Git from the command line." Read the rest of the release announcement for further details. Download: tails-i386-1.3.iso (910MB, torrent, pkglist).2015-02-24NEW • Development Release: RISC OS Open RC14

Steve Revill has announced the availability of a new version of RISC OS Open, a special edition of RISC OS designed for the Raspberry Pi single-board computer. RISC OS is an operating system designed specifically to run on the ARM chipset; it is not based on UNIX, Linux or any other existing system. From the release announcement: "Today marks the availability of the very latest beta release candidate for the popular Raspberry Pi educational platform. This ROM now includes support for the Mark 2 Model B Raspberry Pi hardware, using the newer BCM2836 system on chip and a total of 1 GB of RAM. The model A, B, and B+ are still supported too. This follow-up to the earlier RC12 is in fact RC14 and includes the following headline changes in addition to the Mark 2 Model B support: the kernel now understands and can render sprites with alpha levels of transparency, and hence the desktop can use these facilities too; the kernel now supports a much wider array of pixel buffer formats for the screen including 4k and 64k...." See also the brief release notes. Download (MD5) the compressed SD card image from here: (99.9MB).
No comment yet.
Scooped by Jan Bergmans!

The BNLYFilm Daily

The BNLYFilm Daily | Semantic Gnosis Web |
The BNLYFilm Daily, by BNLYFilm: updated automatically with a curated selection of articles, blog posts, videos and photos.
Jan Bergmans's insight: - Supreme Court Justice Ruth Bader Ginsburg doubled down Wednesday on her belief that Citizens United was the worst decision made by the current U.S. Supreme Court, saying it is the the first decisio...

No comment yet.
Scooped by Jan Bergmans!

Is data privacy just a dream? - CNET

Is data privacy just a dream? - CNET | Semantic Gnosis Web |
Data Privacy Day brings reflection on our security sins, but it's hard to find a perfect protector of data. Even Blackphone's extra-encrypted Slient Text app was found with a security flaw.
Jan Bergmans's insight:

Data Privacy Day brings reflection on our security sins, but it's hard to find a perfect protector of data. Even Blackphone's extra-encrypted Slient Text app was found with a security flaw.

No comment yet.
Scooped by Jan Bergmans!

Wednesday, Jan. 21, 2015 - The BNLYFilm Daily

Wednesday, Jan. 21, 2015 - The BNLYFilm Daily | Semantic Gnosis Web |
The BNLYFilm Daily, by BNLYFilm - Wednesday, Jan. 21, 2015: updated automatically with a curated selection of articles, blog posts, videos and photos.
Jan Bergmans's insight:
Subscribe to updates Subscribe BNLYFilm Videos Crazy Plastic Ball PRANK!! Shared by
YouTube   Leadership: Do You Have What It Takes? | THE RABBIT HOLE with Deepak Chopra Shared by
Deepak Chopra   Lowering the Spirit of St. Louis Shared by
Smithsonian   Mike Huckabee -- I Love Beyonce, But ... Shared by
Dailymotion   LITTLE ACCIDENTS - Trailer Shared by
Vimeo   'Selma' Star Tim Roth -- My Black Co-Stars Deserved Oscar Nominations! Shared by
Dailymotion   A Terrible, Horrible, Very Bad Hair Day! - Twaggies Shared by
Dailymotion   Gigapixels of Andromeda [4K] Shared by
Vala Afshar   All Videos → TechnologyIn A Strategic Shift, Egnyte Treads Closer To IPO Territory Shared by
TechCrunch - Egnyte, a provider of enterprise file management products, is shifting its strategy to place itself between a company’s datacenter and its cloud storage provider. Previously, the company tried to b...

This List Of 2014’s Worst Passwords, Including ‘123456,’ Is Embarrassing Shared by
TechCrunch - The year of 2014, in many respects, was all about digital security. It wasn’t just tech pundits or early adopters who were victimized – Snapchat, Target, and Sony Entertainment all showed us that n...

Apple's latest acquisition will tell it what the world is listening to Shared by
Engadget  DIY PC: How To Source Cheap And Compatible Parts For Your Next Build - Forbes Shared by
Forbes Tech News  Bloomberg: Samsung Is Dropping Qualcomm Chips for the Galaxy S6 Shared by
Gizmodo  Why you should stop relying on your phone, and buy a nice camera Shared by
The Verge   All Technology → SciencePhysicists Conjure Curves From Flat Surfaces Using Japanese Folding Art Shared by
WIRED - Kirigami artists cut and fold a single sheet of paper into elaborate 3-D structures. Now, scientists at the University of Pennsylvania have discovered a set of four rules that govern a restricted v...

Deepak Chopra - Destiny and Divine Favors Shared by
Deepak Chopra - Rupert Sheldrake Ph.D Rupert Sheldrake is a biologist and author of more than 80 scientific papers and ten books. A former Research Fellow of the Royal Society, he studied natural sciences at Cambr...

Get Up Offa That Thing: Intense Exercise Doesn't Eliminate The Hazard Of Intense Sitting - Forbes Shared by
Forbes Tech News  The Hidden Psychology Of Why Customers Come Back Shared by
TechCrunch  Why It's Taking The U.S. So Long To Make Fusion Energy Work Shared by
HuffPost Tech  Robots learn to cook by watching YouTube - CNET Shared by
CNET   All Science → Photos Shared by
YouTube   Shared by
Huffington Post   Shared by
WIRED   Shared by
Fascinating Pictures   Shared by
Engadget   Shared by
CNET   Shared by
Huffington Post   Shared by
Gizmodo   Shared by
Engadget   Shared by
The Verge   Shared by
Globe Pics   Shared by
Gizmodo   All Photos → LeisureThe "Perfect" GTD Desk Shared by
Lifehacker - RestartGTD's Bill Meade obviously thinks a lot about GTD (or Getting Things Done), and so his workspace has been adjusted and updated over the years for the most productive workflow. This is the la...

Exploding Kittens game blows up on Kickstarter - CNET Shared by
CNET - The Web comic The Oatmeal launched its creator Matthew Inman into the limelight, leading to multiple books and aiding in the creation of a Nikola Tesla museum. Now all that Internet love is rubbing...

Lyft Is Finally Ditching the Furry Pink Mustache Shared by
WIRED  How I Traced 20% Of Ross Ulbricht's Biticoin To The Silk Road - Forbes Shared by
Forbes Tech News  Use a Padded Jump Rope to Prevent Callouses At the Gym Shared by
Lifehacker  Interviews with Influential Women - Sandy Gallagher - Amy Beilharz Shared by
Bob Proctor   All Leisure → Art & EntertainmentBletchley Park ‘girls’ break code of secrecy for book launch | UK news Shared by
Guardian Tech - For years Betty Webb and Mary Every worked a few yards apart, often through the night, in Block F among the codebreakers of Bletchley Park. Now, both aged 92, they have met for the first time. Alth...

Watch the best of The Hobbit trilogy in this 4-hour recut Shared by
The Verge  The Bright Light Social Hour's 'Space Is Still The Place' Lays Out The Foundation For The 'Future South' Shared by
Huffington Post  Budapest Festival Orchestra Plays Avery Fisher Hall - Shared by
Lincoln Center  2015 State of the Union Shared by
Vala Afshar  Dark Knight Fanatic Gets Awesome Batmobile Baby Stroller For His Son Shared by
Huffington Post   All Art & Entertainment → BusinessIn Search of a New Order  Shared by
Huffington Post - A loss of order -- To Frank-Walter Steinmeier, the Foreign Minister of Germany, the geopolitical tensions troubling the world boil down to this simple yet powerful trend. Our world is neither uni-p...

Asset Forfeiture and the Cycle of Electronic Surveillance Funding Shared by
EFF  Reports: Google to Invest $1B in SpaceX | News & Opinion Shared by
PCMag  How The Cryptoconomy Will Be Created - Forbes Shared by
Forbes Tech News  Coinbase raises $75M in largest bitcoin funding round to date — Tech News and Analysis Shared by
Gigaom  Australian SMEs missing out on cloud opportunities: Ovum Shared by
ZDNet   All Business → Sports'Gamergate was inevitable': Rami Ismail on the state of the games industry | Technology Shared by
Guardian Tech - Rami Ismail is something of a whirlwind. Co-founder of the dutch games studio Vlambeer, he is a constant traveller, darting between industry conferences all over the world. Ostensibly, his home is ...

Revealed: How 'Game of Thrones' kills so many people in a single day - CNET Shared by
CNET  What's on your HDTV: State of the Union, 'The Fall', 'Justified' Shared by
Engadget  Turning PacMan Into A Street-Based Chase Game Using Smartphones Shared by
MIT Tech Review  Football for nerds Shared by
reddit  PS4 Game Releases In February 2015 Shared by
Marc Charles   All Sports → #strangemagiceventDisney•Pixar’s “Inside Out” Spot the Difference Activity! #PixarInsideOut - On the Scene with Mrs Kathy King Shared by
A Sparkle of Genius - Can you Spot the six difference between both pictures? P.S Please share this fun activity with your friends by clicking on the share button to the left.  INSIDE OUT opens in theaters everywhere on ...

Thats It Mommy | George Lucas Talks Strange Magic And Finding His Princess #StrangeMagicEvent - Thats It Mommy Shared by
A Sparkle of Genius  EXCLUSIVE Strange Magic Q&A with George Lucas #StrangeMagicEvent - Merlot Mommy Shared by
A Sparkle of Genius  George Lucas On Parenthood, Love and Making Strange Magic #StrangeMagicEvent Shared by
A Sparkle of Genius  George Lucas – “Strange Magic Was 15 Years In the Making” (Interview) #StrangeMagicEvent Shared by
A Sparkle of Genius   All #strangemagicevent →
No comment yet.