OK, there’s no such thing as Ondoy spyware (or virus for that matter). But while Ondoy was lashing the Philippines and killing hundreds in the process, some “malicious” folks were taking advantage of the google search term. According to some blog posts, when you type Ondoy (or its varieties), the first few top searches are actually links to virus.
I never knew anyone actually fell victim to this trap, until this weekend. A cousin asked me to help her re-install her antivirus, which according to her is not showing up after their IT department “cleaned” her PC. Then she went on detailing how she got the virus in the first place. It was Ondoy’s fault, tsk tsk. Although I have very little interest in Windows-related posts (with the exception of Windows7) and all its virus issues, i decided otherwise to to post this how-to. Who knows, someone else may have fallen victim.. (and they may not even know it).
Moving on, this is what i did.
I learned this trick when I misplaced the Leopard DVD that comes with the Macbook Pro. This time, I tried (with assurance from other blog/forum posts that it actually works – there are probably tons of more detailed tutorials than this.) doing the same for Snow Leopard.
What you need:
- External Hard Drive (USB or Firewire) –
WARNING: should not contain important files, since we will format this.
- Snow Leopard installer DVD or DMG file
Application to Use:
0. Create DMG file
Select the DVD drive from the Left Pane of Disk Utility. Then click “New Image” icon from the Top Menu. Type the filename of your choice (or retain as Mac OS X Server Install Disc) and the select destination folder and SAVE.
Disclaimer: This is not secure and is intended only for basic usage, because it sucks when you can’t implement something so simple in a short time. (example: for file backup to a remote server)
Scenario: You want to access the remote server from the localhost. Or, you want to backup files from localhost to a remote server. All without the trouble of entering password (also removes the human factor and allows automation).
L$> ssh-keygen -t dsa
Do not type in any passkey. Just press enter.
L$> ls ~/.ssh/
L$> cat ~/.ssh/id_dsa.pub
Copy the entire line, from ssh-dss to user@localhost
Since i began using ipv6, I have never set a routable static ipv6 address yet. I have a Linksys (w/ dd-wrt firmware) router serving as DHCP server, so i reckon there’s no use for that.
UPDATE: On second thought, there must be that ONE time. I must have configured statically when testing the tunnelbroker via wired connection. I’m not too sure.
Anyway, today – as we are testing our network for native ipv6 – i had to configure my machine and assign manual ip address. It’s only now that I discovered the problem (a bug?) in the GUI. Luckily, I am not alone, and a few searches yield helpful infos.
Using the GUI, the basic step is typically same as v4 (we all know this):
SystemPreferences -> Network->Advanced
Under Configure IPv6, select Manually and input your static ipv6 address.
However, it is likely that although settings are saved in the gui, the network config does not update at the same time.
I sometimes wonder how come I’ve never done any DNS-related How-To. I write them mainly to remind myself anyway, not for other people (but it’s a plus if someone gets something from it)… Maybe that’s it, I don’t need reminder for something I do so often.
At least DNSSEC is something that’s
not-so new – I haven’t implemented them in authoritative nameservers before, just for resolvers and caching nameservers. So here’s a guide, mostly taken from ISC DLV with some sidenote I inserted while working on my implementation.
1. Enable DNSSEC on authoritative/recursive servers
2. Generate ZSK and KSK
3. Include keys into zonefile
4. Sign the zone
5. Point named.conf at the signed zone.
6. Reload zone.
7. Provide parent zone with DS records -OR-
8. Provide DLV registry with DLV record