DGPLUG Summer Training Logs for 2018/06/25

13:29 : kushal #startclass
13:29 : Roll Call
13:29 : GeekyShacklebolt Shiva Saxena
13:29 : newrg Rajat Gupta
13:29 : sehenazparvin Sehenaz Parvin
13:30 : sjha2048 sahil
13:30 : RJ722 Rahul Jha
13:30 : kushal Kushal Das
13:30 : prabhu Prabhu Sharan Singh
13:30 : Sarques_ Gajendra Saraswat
13:30 : ankit774 Ankit Upadhyay
13:30 : devesh_verma Devesh Verma
13:30 : sourabhdeshmukh sourabh deshmukh
13:30 : Ved_Sinha Ved Sinha
13:30 : priyankasaggu119 Priyanka Saggu
13:30 : cypher_ Naman Sharma
13:30 : kvy romeo, One more thing when kushal say roll call type your full name.
13:30 : vshuklajr Vivek Shukla
13:30 : sourabh1031 Sourabh Pruthi
13:30 : RatanShreshtha Ratan Kulshreshtha
13:30 : Saksham_19o9 Saksham Srivastava
13:30 : pr97 Priyanka Sharma
13:30 : AdityaPatil Aditya Patil
13:30 : snandi__ shamiki nandi
13:30 : meanjeet Manjeet Mehta
13:30 : Callowidealist Jitendra Kumar Tripathi
13:30 : kvy kumar vipin yadav
13:30 : bhavin192 Bhavin Gandhi
13:30 : prodyte pawan
13:30 : kps Karan Pratap
13:30 : adityad97 Aditya Deshpande
13:30 : AnantaOne1 Ananta Anil Shahane
13:30 : Rakshit__ Rakshit Airani
13:30 : schubisu Robin Schubert
13:30 : fml Aranya Sinha
13:30 : pdas Priyam Das
13:30 : mzeeqazi Muhammad Zeeshan Qazi
13:30 : dharmateja C Dharmateja
13:30 : romeo Romeo
13:30 : akshayg96 Akshay Gaikwad
13:31 : kushal Okay.
13:31 : We will start with some amount of review, and then we will get into some interesting new things.
13:32 : Any questions from the homework chapters of LYM.
13:32 : gutsytechster Roll Call: gutsytechster
13:32 : kushal ?
13:32 : jasonbraganza Jason Braganza
13:32 : BhaveshSGupta[m] Bhavesh Gupta
13:32 : ankit774 !
13:32 : gutsytechster Roll Call: Prashant Sharma
13:32 : kushal next
13:32 : championshuttler Shivam Singhal
13:32 : singha2 Ashwani singh
13:32 : storymode_7 Mayank Singhal
13:32 : ankit774 what is the use of she-bang?
13:32 : prokbird Roll Call: tabrez khan
13:32 : NityaNidhi Nitya sharma
13:32 : sehenazparvin !
13:32 : ankit774 and what does #! imply?
13:32 : yolossn Santhosh nagaraj
13:32 : kushal ankit774, Have you read https://en.wikipedia.org/wiki/Shebang_(Unix) ?
13:33 : next
13:33 : sehenazparvin kushal, What is a Tar file?
13:33 : ankit774 !
13:33 : kushal sehenazparvin, Have you read this https://en.wikipedia.org/wiki/Tar_(computing) ?
13:33 : romeo kushal, can i ask a question ?
13:34 : vishalIRC Roll call: Vishal Kushwaha
13:34 : kushal romeo, you will have to type ! and then wait for your turn.
13:34 : next
13:34 : ankit774 does the which command kind of gives the pre-processor directive of a command?
13:34 : romeo !
13:34 : mzeeqazi !
13:34 : yesh Roll call:Yesh pareek
13:34 : soniya29_ Roll call:Soniya Vyas
13:34 : bhavin192 sehenazparvin, http://bfy.tw/Il3m
13:35 : vamshisai Roll call: Vamshi Sai Kiran
13:35 : sehenazparvin kushal, Thank you.
13:35 : kushal ankit774, No, it shows the full path of the executable.
13:35 : pooja Roll call:pooja sulakhe
13:35 : ananyo Ananyo Maiti
13:35 : kushal next
13:35 : ankit774 what exactly does executable mean here?
13:35 : sidntrivedi012 Roll Call:Siddhant N Trivedi
13:36 : romeo batul, i am trying to solve a python program of spell checker. how do we compare two strings index by index with different length
13:36 : sidntrivedi012 !
13:36 : kushal romeo, That is off topic for the session, there are many here who can help you with that after the session is over.
13:36 : next
13:36 : ankit774, oh I missed your question.
13:37 : romeo kushal, alright i didn't know the current topic
13:37 : mzeeqazi Kushal, do all linux system follow FHS or there are exceptions
13:37 : ankit774 kushal, what does full path of the executable mean here?
13:37 : kushal ankit774, https://en.wikipedia.org/wiki/Executable
13:37 : ankit774 kushal, thanks
13:37 : kushal ankit774, Full filesystem path, say /usr/bin/bash
13:38 : instead of ./bash
13:38 : mzeeqazi, Mostly yes.
13:38 : next
13:38 : sidntrivedi012 kushal, I couldn't understand the difference between soft links and hard links
13:38 : kushal sidntrivedi012, we will try to explain after the session.
13:38 : next
13:38 : Any other questions?
13:39 : ananyo !
13:39 : VirtualRcoder Roll call: Shubham Sharma
13:39 : kushal next
13:40 : sourabh1031 !
13:40 : gozmit Roll call: Mayank
13:40 : ananyo In chmod command what dies the 3rd digit indicate?
13:40 : kushal ananyo, example?
13:40 : kvy !
13:40 : ananyo Like chmod 777 file.txt
13:41 : Sarques_ ananyo rwx, x is for executable permission
13:41 : ananyo First 2 is for user and group
13:41 : jasonbraganza ananyo, third is others/world
13:41 : ananyo What is thr third for ?
13:41 : Sarques_ oops!
13:41 : ananyo Ok what does others/world mean?
13:42 : jasonbraganza ananyo, after session?
13:42 : ananyo Ok sure
13:42 : Rakshit__ those number the octal base system representation of the files attributes (like if it is executable or not)
13:42 : sidntrivedi012 !
13:42 : kushal ananyo, any user who is not the owner nor in the same owner group.
13:42 : next
13:42 : sourabh1031 Is root directory different for different users ?
13:42 : kushal sourabh1031, no, / is the root directory
13:43 : The home directory is different
13:43 : next
13:43 : kvy kushal , why I can't able to make hard link of a directorys ?
13:44 : sourabh1031 Kushal Then guest users can also make changes to root directory
13:44 : kushal kvy, Have you typed the same in duckduckgo.com?
13:44 : kvy kushal, this time i don't do so.
13:44 : kushal sourabh1031, no one other than root can make changes to that? They need to be either root or with root access.
13:45 : next
13:45 : sidntrivedi012 I am extracting a tar.gz file using tar -xzvf but it is showing: error 1: command not found in command substitution called on standard input . but i think that the command is correct.
13:45 : kushal kvy, do that, first answer :)
13:45 : kvy ok , I will be back after searching.
13:45 : kushal sidntrivedi012, can you please paste the full command the error log in paste.debian.net and show us?
13:46 : sidntrivedi012 ok.but the filename is wordpress-4.9.6(1).tar.gz. and I am using fish and 1 is showing red while the else filename is blue
13:46 : sourabh1031 Kushal is root user password == root password
13:46 : kushal sourabh1031, yes
13:46 : sidntrivedi012, I don't know about fish, but the name should be something like this:
13:46 : sourabh1031 Thanks
13:47 : kushal wordpress-4.9.6\(1\).tar.gz
13:47 : sidntrivedi012, use tab completion
13:47 : sidntrivedi012 kushal, ok.thanks
13:47 : j605 sidntrivedi012: or just use quotes 'wordpress-4.9.6(1).tar.gz
13:47 : '
13:48 : sidntrivedi012 j605, okay.
13:48 : kushal next
13:48 : ankit774 !
13:48 : sidntrivedi012 j605, yes,the quotes worked.
13:48 : kushal next
13:49 : sidntrivedi012 j605, but why was it so?are filenames to be mentioned in quotes?
13:49 : ankit774 https://paste.debian.net/plain/1030659; see herein, i used chmod with values 600, then why not executable has been added; instead i had to use +x
13:49 : kushal ankit774, 6 == 4 + 2
13:50 : ankit774, But, you are missing the 1 for executable :)
13:50 : j605 sidntrivedi012: no, some characters are interpreted by the shell. using single quotes makes it literal
13:50 : sidntrivedi012 kushal, the forward slash method worked too.but I am not able to understand why it worked?
13:50 : ankit774 kushal, sorry, thanks
13:50 : jasonbraganza ankit774, try this http://www.zz9.co.za/chmod-permissions-flags-explained-600-0600-700-777-100-etc/
13:50 : kushal next
13:50 : ankit774 and what about the bad interpreter?
13:51 : sidntrivedi012 j605, oh.thanks.
13:51 : j605 sidntrivedi012: read https://www.gnu.org/software/bash/manual/html_node/Quoting.html
13:51 : kushal ankit774, I am guessing you are using Ubuntu.
13:51 : ankit774 kushal, yes
13:51 : kushal Then the interpreter path should be /bin/bash
13:52 : ankit774 kushal, ok, thanks, will do that
13:52 : avik sidntrivedi012, \ is used to mention special characters (which otherwise shell thinks of them differently), like space in names and brackets
13:52 : codejacker !
13:53 : kushal next
13:54 : codejacker su - command giving authentication failure
13:54 : tried searching they asked to use su -i
13:54 : kushal codejacker, means you are not typing correct root password.
13:54 : codejacker but how do i know my root password
13:54 : mzeeqazi codejacker, have you tried sudo su
13:55 : codejacker nope
13:55 : bhavin192 codejacker, Fedora 28?
13:55 : kushal codejacker, eh, who installed linux on your computer?
13:55 : codejacker kushal,ubuntu
13:55 : j605 mzeeqazi: that is “useless use of cat”
13:55 : caffeinatednerd nickserv prabhu
13:56 : avik unbuntu disables root a/c by default, isn't it?
13:56 : sk56 what is today's topic
13:56 : ?
13:56 : avik *Ubuntu
13:56 : codejacker, try sudo -i
13:57 : rishibit !
13:57 : sjha2048 i had to create new password for root account
13:57 : caffeinatednerd nick prabhu
13:57 : codejacker avik, i tried it says invalid option
13:57 : sourabh1031 avik sorry to interrupt but what do you mean by disable
13:57 : codejacker 'i'
13:57 : kushal avik, no.
13:57 : kvy codejacker, In ubuntu use sudo only.
13:58 : romeo what is today's topic?
13:58 : avik sourabh1031, they dont give an option to create one while installation
13:58 : kushal romeo, we are right now discussion about hometasks
13:58 : avik much like F28
13:58 : brute4s99 i'm sorry i'm late... did i miss anything important ?
13:58 : romeo ok nick
13:58 : codejacker kvy, but i want to try root
13:58 : sk56 roll call - sunny khandare
13:59 : kushal codejacker, use sudo to become root
13:59 : avik kushal, last time I installed ubuntu on a friends pc, it had no root a/c option! The user I created was in sudoers list by default!
13:59 : kushal codejacker, we can discuss this after the session.
13:59 : jaydeep_borkar roll call - Jaydeep Borkar
13:59 : sd30 Roll call- Shruti Dash
13:59 : prabhu !
14:00 : jasonbraganza codejacker, https://linuxconfig.org/how-to-set-a-root-password-on-ubuntu-18-04-bionic-beaver-linux
14:00 : kushal next
14:00 : brute4s99 are w having QA today too ?
14:00 : we*
14:00 : rishibit Pass
14:00 : kushal after prabhu's question, we will move to new topic.
14:00 : next
14:00 : sjha2048 codejacker, try sudo passwd root, set a new password then try logging in
14:01 : prabhu In the virtual box, I am unable to install the Fedora OS in Dynamic memory but it is installing in static memory. Why?
14:01 : codejacker kushal tried it alone but it gave me options for different command options like whch i can use eg- sudo -h. Which i cn use rather than using sudo alone.
14:01 : kushal prabhu, I don't know the difference, I am guessing you are talking about the static allocation of the storage
14:01 : prabhu Its showing 1023kIb free out of 30 GB I allocated to it
14:01 : kushal I still don't know why.
14:01 : prabhu, you will have to ask in #fedora
14:02 : prabhu okay
14:02 : kushal Okay moving to new topic.
14:02 : sk56 thanqss sir
14:02 : thanks*
14:03 : kushal sk56, what sir?
14:03 : kvy sk56, no sir use nick to call anyone
14:03 : sk56 ohk @kushal
14:03 : dharmateja sk56, no need of `@`
14:04 : kushal From EFF website: Security isn’t about the tools you use or the software you download. It begins with understanding the unique threats you face and how you can counter those threats.
14:04 : Today we will try to learn a few bits about it.
14:04 : I want to ask you 5 questions.
14:05 : Write down the answers in a plain text file (say: threatmodel.txt ) DO NOT SHARE THIS FILE.
14:05 : With anyone.
14:05 : But, this file is for yourself.
14:06 : If I ask you to think about everything you do in your life, and all the important things in you life, and then:
14:06 : What do you want to protect?
14:06 : Who do I want to protect it from?
14:06 : How bad are the consequences if I fail?
14:06 : How likely is it that I will need to protect it?
14:06 : How much trouble am I willing to go through to try to prevent potential consequences?
14:07 : These are the 5 questions you all will try to answer.
14:07 : sk56 personal info
14:07 : kushal Not right now, but later.
14:07 : sk56, you have to write in details for yourself.
14:07 : sk56 ohk kushal
14:08 : kushal If I am asking the same questions to myself, then they will sound like:
14:08 : What do I want to protect?
14:08 : Who do I want to protect it from?
14:08 : How bad are the consequences if I fail?
14:08 : How likely is it that I will need to protect it?
14:08 : How much trouble am I willing to go through to try to prevent potential consequences?
14:08 : To answer 1. An asset is something you value and want to protect.
14:08 : Say username/passwords.
14:09 : emails, phone numbers, contact list
14:09 : photos
14:09 : can be many things
14:09 : Who do I want to protect it from?: To answer this question, it’s important to identify who might want to target you or your information. A person or entity that poses a threat to your assets is an adversary.
14:09 : This also varies person to person.
14:11 : The adversaries for a CEO are different from a college student.
14:11 : In my case: If you have a 3 years old child at home, that is a strong adversary against your home infrastructure.
14:12 : brute4s99 !
14:12 : kushal How bad are the consequences if I fail?
14:12 : These are potential threats.
14:12 : There are many ways that an adversary can threaten your data. For example, an adversary can read your private communications as they pass through the network, or they can delete or corrupt your data.
14:12 : How likely is it that I will need to protect it?
14:13 : This is called Risk.
14:13 : Risk is the likelihood that a particular threat against a particular asset will actually occur. It goes hand-in-hand with capability. While your mobile phone provider has the capability to access all of your data, the risk of them posting your private data online to harm your reputation is low.
14:13 : At the end: How much trouble am I willing to go through to try to prevent potential consequences?
14:13 : Answering this question requires conducting the risk analysis. Not everyone has the same priorities or views threats in the same way.
14:13 : For example, an attorney representing a client in a national security case would probably be willing to go to greater lengths to protect communications about that case, such as using encrypted email, than a mother who regularly emails her daughter funny cat videos.
14:13 : next
14:14 : brute4s99 "While your mobile phone provider has the capability to access all of your data, the risk of them posting your private data online to harm your reputation is low"
14:14 : how is it hand in hand with capability ? I didn't get it
14:15 : kushal Means your mobile phone provider a lot more about you because the capability to handle/see all of your communication.
14:15 : sourabh1031 !
14:15 : kushal They can record your phonecalls.
14:15 : next
14:15 : sourabh1031 What is funny cat and email
14:16 : kushal sourabh1031, if you search Internet about funny cat photos, you will find many such examples.
14:16 : random example in this case.
14:16 : sourabh1031 *can you please rephrase what do you mean by that
14:17 : brute4s99 !
14:17 : avik sourabh1031, https://en.wikipedia.org/wiki/Cats_and_the_Internet
14:17 : kushal avik, Thanks
14:18 : sk56 kushal can you please make me understand what we learnt ?
14:18 : avik kushal, :)
14:18 : sourabh1031 What has encrypted emails has to do with funny cats ?
14:18 : kushal sourabh1031, two separate points.
14:18 : avik sourabh1031, exactly the point!
14:18 : vshuklajr sourabh1031: nothing
14:18 : kushal sourabh1031, A lawyer may try to do a lot of extra steps to send encrypted emails.
14:19 : sourabh1031, A normal person sending funny cat photos or videos will not do that.
14:19 : meanjeet sourabh1031, that was just an example . That some mails are worthless.
14:19 : avik encrypted emails need to be protected while cat vedios are not!
14:19 : sourabh1031 Okay thanks all
14:19 : kushal avik, Other way, important information needs to be protected.
14:19 : That is why encryption.
14:19 : next
14:19 : avik here, cat videos is just an example of everyday random emails
14:20 : kushal avik, correct.
14:20 : avik kushal, yes thanks for rephrasing! meant that only!
14:20 : brute4s99 Phone provider has HIGH capability, but we possess LOW risk of data leak ... right ? but hand-in-hand would mean direct proportionality, right ? what did I miss ?
14:21 : jeet__ sourabh1031, Here kushal referred to the importance of your data that you are generating or holding. It was just an example.
14:21 : sourabh1031 jeet_ thanks i got it know
14:22 : kushal brute4s99, Yes, unless you are someone important enough that phone company will target you.
14:22 : brute4s99, if you are politician, then people in power may target you.
14:22 : brute4s99 okay, now i got it !
14:22 : sk56 kushal when are we going to learn about git
14:22 : brute4s99 same as with funny cats and encryption... lol
14:22 : kushal sk56, Later.
14:23 : brute4s99 thanks kushal
14:23 : kushal Now, you will have to make list for yourself, and keep doing the same exercise regularly.
14:24 : So that you can improve your own security/privacy.
14:24 : jeet__ kushal Can phone voice calls be encrypted?
14:24 : kushal jeet__, not the normal phone call, but, we can use applications to do so over Internet.
14:24 : https://summertraining.readthedocs.io/en/latest/threatmodel.html is the chapter for this part of the sesion.
14:24 : * Session.
14:24 : avik jeet__, yes if its VoIP
14:24 : sourabh1031 Sorry to interrupt in between but what is the use of this in free software world where everything is open
14:25 : kushal sourabh1031, means you are now reading the home tasks given.
14:25 : sourabh1031, read this later https://kushaldas.in/pages/hacker-ethic-and-free-software-movement.html
14:25 : sourabh1031 No security that you just explained
14:26 : Kushal thanks
14:26 : kushal Going to next thing.
14:27 : https://summertraining.readthedocs.io/en/latest/opsec.html In this chapter we have many things.
14:27 : We will slowly go through a few of those now.
14:27 : 1. Passwords
14:27 : Type in a good example of password here please.
14:28 : romeo @@@ahskru#123@$$$
14:28 : cypher_ PasswordName#321
14:28 : snandi__ jp@123
14:28 : ankit774 @akn!t774
14:28 : dharmateja alksfd#(*#232
14:28 : jaydeep_borkar #Alexa@20202#
14:28 : RatanShreshtha thisissurvivaofthefittest
14:28 : sjha2048 *IlFoVeMh*
14:28 : mzeeqazi Q@1A#ZiZeEsHa#N
14:28 : kvy hello 3699 @vip
14:28 : Callowidealist !jk,***
14:28 : inkaps 1nk@ps^^/
14:28 : Rakshit__ Pink_Fl0yd1965
14:28 : vshuklajr v!v#k.$
14:29 : pooja Pooja@1997
14:29 : shaikhfarhan hii kushal sir im new here & new to programming i have no idea about linux i want to learn from basic like which one is better for me fedora of ubuntu
14:29 : AdityaPatil #jtExrTf983F!EF
14:29 : man-jain laji@$14928
14:29 : newrg gregory!1d5
14:29 : sourabh1031 *##778abc123ABC##**
14:29 : brute4s99 We@Re1
14:29 : inquiridortechie Strong_p@SsWoRD#
14:29 : man-jain Lanau@$12938
14:29 : pr97 P@!3good197abCd..
14:29 : prokbird con_2956#ALWR$@11
14:29 : pdas asd@12$345
14:29 : codejacker hackit**
14:29 : jasonbraganza ipXsPLgKEicJihwC{Wdj)RCGkVbAv3vJRWFdUF=saVyQiw7C*PM2KYbfLPTmstZj
14:29 : mzeeqazi shaikhfarhan, avoid sir in open source world
14:29 : avik jasonbraganza, :)
14:29 : kushal shaikhfarhan, After the session
14:30 : kvy jasonbraganza, how could you remember it
14:30 : rohanvivek v5d9#9SA
14:30 : jasonbraganza kvy, use an app
14:30 : avik kvy, u dont! use a good password maneger!
14:30 : ankit774 jasonbraganza, i guess its just random?
14:30 : jaydeep_borkar kvy, exactly the point :P
14:30 : kushal avik, u?
14:30 : avik *manager
14:30 : jasonbraganza ankit774, yes
14:31 : kushal Trying to remember a good password is difficult.
14:31 : ananyo_ q2w3e4r5t6y7
14:31 : kushal Also having those extra special characters will not help against powerful modern computers.
14:31 : ankit774 jasonbraganza, even if i remember it correctly; i won't be in a mood to type that just to login :)
14:32 : romeo a good password is something which u always remember with some special characters at the start and also and the end including some numbers u can remember
14:32 : kushal https://en.wikipedia.org/wiki/Diceware is a technique which can help us this case.
14:32 : jasonbraganza ankit774, like kushal said. use a password manager
14:32 : kushal Everyone please be silent
14:33 : I personally prefer a tool written in Python for the same, called diceware.
14:33 : bhavin192, already has a patch in the project :)
14:33 : codejacker jsonbragnanza, which application should we use? i think its better to remember instead of sharing it with an unknown app.
14:33 : jasonbraganza codejacker ^
14:33 : kushal you can simply install it using pip or dnf.
14:33 : For Fedora users: use: sudo dnf install diceware
14:34 : codejacker okk got it thanjs
14:34 : kushal I don't think it is packaged for debian, that case you can use the pip command
14:34 : pip install diceware --user
14:34 : bhavin192 kushal, it is packaged for debian as well ;)
14:34 : kushal Use passwords at least 6-7 words long.
14:35 : brute4s99 kushal, someone did make a random word generator for pip, so you can also use that for word generation
14:35 : kushal ah good to know.
14:35 : example command:
14:35 : diceware -n 7
14:35 : This will give you a good strong passphrase
14:35 : But. remembering these will be difficult.
14:36 : So we all have to use a good password manager: https://summertraining.readthedocs.io/en/latest/opsec.html#use-password-managers
14:37 : Use KeePassXC as a good local option
14:37 : https://medium.com/@mshelton/keypass-for-beginners-dc8adfcdad54
14:37 : Then you will have to remember only one big master passphrase, not everything.
14:38 : Who all here has a webcam in their laptop? say me if you have one.
14:38 : jasonbraganza me
14:38 : romeo but what if the password manager gets compromised ?
14:38 : ankit774 me
14:38 : ashwani me
14:38 : Saksham_19o9 me
14:38 : GeekyShacklebolt me
14:38 : kvy me
14:38 : sjha2048 me
14:38 : AdityaPatil me
14:38 : priyankasaggu119 me
14:38 : pr97 me
14:38 : sd30 me
14:38 : jaydeep_borkar me
14:38 : newrg me
14:38 : romeo me
14:38 : codejacker me
14:38 : inkaps me
14:38 : cypher_ me
14:38 : meanjeet me
14:38 : snandi__ me
14:38 : prokbird me
14:38 : vshuklajr me
14:38 : schubisu me
14:38 : mzeeqazi_ Me
14:38 : adityad97 me
14:38 : storymode_7 me
14:38 : sourabh1031 me
14:38 : dharmateja me
14:38 : inquiridortechie me
14:38 : shaikhfarhan me
14:39 : avik me
14:39 : brute4s99 kushal i read it. you want us to tape it, right ?
14:39 : Callowidealist Me
14:39 : pdas me
14:39 : ananyo_ me
14:39 : pooja me
14:39 : akshayg96 me
14:39 : RatanShreshtha me
14:39 : bhavin192 me
14:39 : rohanvivek me
14:39 : kushal romeo, I will answer after this.
14:40 : romeo kushal, ok
14:40 : kushal How many of you have taped the webcam?
14:40 : kvy me
14:40 : prokbird me
14:40 : sjha2048 me
14:40 : avik me
14:40 : ashwani me
14:40 : rishibit me
14:40 : brute4s99 nope
14:40 : kushal So that no one can see even if they break into your computer and try to see/record?
14:40 : jasonbraganza me
14:40 : Callowidealist Me
14:40 : inkaps nope
14:40 : shaikhfarhan no
14:40 : adityad97 No
14:40 : pooja me
14:40 : pdas nope
14:41 : brute4s99 !
14:41 : sourabh1031 Always worried about but not taped
14:41 : ananyo_ not me
14:41 : pr97 no
14:41 : jaydeep_borkar nope
14:41 : snandi__ no
14:41 : priyankasaggu119 no
14:41 : brute4s99 kushal I believe uninstalling the driver for the webcam would work the same?
14:41 : kushal https://summertraining.readthedocs.io/en/latest/opsec.html#cover-up-your-webcam
14:41 : brute4s99, then using the webcam when required is difficult.
14:42 : jeet__ Why do you want to harm the driver brute4s99. You have an easier solution.
14:42 : brute4s99 taping leaves adhesive... not hygienic
14:42 : sourabh1031 cracker can also install the driver remotely :P
14:43 : Saksham_19o9 kushal but won't our wwebcam cue light glow when someone is using it?
14:43 : kushal Saksham_19o9, It most cases no.
14:43 : Saksham_19o9, if you search, you will find many examples where attacker can access it without the light turned on.
14:43 : avik brute4s99, print yourself a slider or buy one from amazon! thats a better option!
14:43 : Saksham_19o9 it is supposed to. How can it be otherway around?
14:44 : kushal, ok.
14:44 : kushal Saksham_19o9, we will discuss more ideas :)
14:44 : I have hardware (plastic) cover.
14:44 : We also have reusable sticker covers.
14:45 : Next topic: Keep your machine updated https://summertraining.readthedocs.io/en/latest/opsec.html#keep-your-machine-updated
14:45 : Can anyone tell me why?
14:46 : brute4s99 we get hotpatches !
14:46 : sjha2048 latest security patches
14:46 : mzeeqazi security patch
14:46 : dharmateja For security patches
14:46 : shaikhfarhan update have new security patches
14:46 : ankit774 so that efficient performance is maintained and security
14:46 : Rakshit__ kushal, so new bugs and expliots are patched
14:47 : priyankasaggu119 updates are there to resolve the flaws in older versions. Hackers can use them as loop holes.
14:47 : shaikhfarhan updated security patches are less vulnarable
14:47 : kvy kushal, for security purposes and to got new updates
14:47 : kushal Correct, and most of that time, this simple step helps us more than anything else.
14:47 : Saksham_19o9 security updates, in one of ankit fadia's lecture he told about how one can do os fingerprinting and later on check for loopholes online but it wont work for updated systems.
14:47 : kushal Saksham_19o9, that is someone you really don't want to learn from.
14:47 : romeo kushal, if the existing machine has some bugs which are vulnerable, they might be fixed in the next update. so always keep machine updated
14:48 : kushal The story is different for mobile phones, because the story in the android land.
14:48 : Saksham_19o9 i never really did. that is why i am here. :)
14:48 : kushal How many of you have latest Android?
14:48 : sjha2048 me
14:48 : kushal Tell me if you don't.
14:48 : Saksham_19o9, :)
14:48 : romeo saksham_19o9 He is a self claimed hacker
14:48 : shaikhfarhan me
14:48 : ankit774 me
14:48 : Saksham_19o9 me
14:48 : Rakshit__ me , i run a custom rom
14:48 : codejacker me
14:48 : sd30 Me
14:48 : Callowidealist Me
14:48 : pradhvan_ not me
14:48 : kvy me
14:48 : ananyo_ not me
14:48 : man-jain Me
14:48 : jaydeep_borkar me
14:48 : cypher_ me
14:48 : brute4s99 me ! with June security patch !
14:48 : mzeeqazi_ Me
14:48 : rishibit me
14:48 : prokbird me
14:48 : jeet__ me :(
14:48 : romeo not me
14:48 : pooja me
14:48 : snandi__ me
14:48 : sehenazparvin me
14:48 : AdityaPatil I don't. Custom ROM but not updated.
14:48 : vshuklajr not me
14:49 : priyankasaggu119 don't have
14:49 : gutsytechster not me
14:49 : pdas nope
14:49 : adityad97 don't have
14:49 : pr97 don't have
14:49 : brute4s99 AdityaPatil some custom ROMs do support OTA updates ! :)
14:49 : sourabh1031 don't have
14:49 : brute4s99 checkout AOSP and PixelExperience
14:49 : inkaps no
14:49 : jeet__ Is it true that enabling root access in Android increases the vulnerability to be attacked? kushal
14:49 : newrg no
14:50 : sourabh1031 Yes custom rom do but they are not as stable as stock one
14:50 : kushal jeet__, I don't know the details, but, it sounds so.
14:50 : bhavin192 sourabh1031, the stability depends on the maintainer of the ROM for your device as well
14:51 : Rakshit__ jeet__, not exactly , root access provides you with absolute control over your phone and so with great power comes great responsibility
14:51 : kushal Also this brings in a new topic https://summertraining.readthedocs.io/en/latest/opsec.html#do-not-download-and-install-random-software-from-internet
14:51 : brute4s99 jeet__ if you've unlocked the bootloader, anyone can do anything with your phone if she gets her hands on it
14:51 : kushal Do not install software from random places in the Internet.
14:51 : sourabh1031 bhavin192 right
14:51 : kushal Means, do not run any random docker container
14:51 : or copy paste shell scripts to install software
14:52 : brute4s99 kushal, (offtopic) will we get to know more about docker/kubernetes in future here ?
14:52 : kushal brute4s99, maybe
14:52 : https://summertraining.readthedocs.io/en/latest/opsec.html#take-regular-backups
14:52 : Backups are important.
14:52 : Remember to take regular backup
14:53 : avik !
14:53 : ananyo_ !
14:53 : kushal But, that also brings in the discussion about encrypted drives https://summertraining.readthedocs.io/en/latest/opsec.html#take-regular-backups
14:53 : brute4s99 kushal, honestly one would love to maintain backup, but they are just too large. Cloud storage capacities are so minute compared to that, what to do ?
14:53 : kushal Wrong link: https://summertraining.readthedocs.io/en/latest/opsec.html#encrypt-all-usb-drives
14:54 : brute4s99, you backup the most important parts.
14:54 : Buy small usb drives, encrypt them and then use that.
14:54 : AnantaOne1 I no longer use android I am on iOS 12 Developer Beta 2
14:54 : brute4s99 okay, most important parts, got it kushal
14:55 : kushal If you all open the disks application on your gnome system, that can also help to encrypt your new usb drives in a GUI.
14:56 : https://summertraining.readthedocs.io/en/latest/opsec.html#do-not-click-on-random-links-in-emails-or-from-anywhere-else
14:56 : Saksham_19o9 kushal are we not supposed to install shell extensions to terminals so that we can run different languages?
14:57 : kushal Saksham_19o9, What do you mean by different languages?
14:57 : https://ssd.eff.org/en/module/animated-overview-protecting-your-device-hackers
14:57 : and also https://ssd.eff.org/en/module/how-avoid-phishing-attacks
14:57 : are two links you should read tonight
14:57 : Saksham_19o9 like c++ or python, kushal.
14:57 : jeet__ Saksham_19o9 Most languages have official websites from which you can download the softwares.
14:57 : shaikhfarhan ok
14:58 : kushal Saksham_19o9, NO, a big NO.
14:58 : Saksham_19o9, you should install the official packages from your linux distribution.
14:58 : brute4s99_ kushal i believe the fundamental access point for any machine is a PORT. if we close all ports except crucial ones (for eg:RDP,TCP ports) that would completely safeguard me against threats won't it ?
14:58 : kushal brute4s99_, no, if you get malware on your system, they will bypass your firewall.
14:59 : https://summertraining.readthedocs.io/en/latest/opsec.html#use-the-following-browser-plugins-for-better-privacy here are 3 plugin suggestions for your daily browser.
15:00 : man-jain !
15:00 : kushal next
15:00 : next
15:01 : next
15:01 : next
15:01 : Callowidealist !
15:01 : avik kushal, name a software by which we can backup the system and restore stuffs seamlessly!
15:01 : ananyo_ Is using cloud storage like google drive/dropbox suggested for backup?
15:01 : man-jain Running the latest softwares and os needs the latest hardware to run smoothly but in our country many of us still use old hardware. What should be done in this case?
15:01 : kushal avik, rsync
15:01 : Saksham_19o9 !
15:01 : ankit774 !
15:01 : brute4s99_ !
15:01 : kushal man-jain, my desktop is almost 8 years old
15:01 : or more than that.
15:01 : avik kushal, okay! I mean the whole system can be backed up in a eHDD?
15:02 : kushal man-jain, it just works.
15:02 : avik, yes, use an encrypted hard drive.
15:02 : avik kushal, okay! thanks
15:02 : man-jain But you must be having a good configuration desktop
15:03 : kushal man-jain, normal desktop, I bought extra ram later though.
15:03 : next
15:03 : Callowidealist But Disconnect.me is a premium service. And how only these 3 plugins are usable.
15:03 : ananyo_ Is using cloud storage like google drive/dropbox suggested for backup?
15:04 : avik man-jain, no matter how modern softwares get, they still have a starting point for hardware requirement! If a pc even lacks that, then its time to move on I guess!
15:04 : codejacker !
15:04 : kushal Callowidealist, use the basic version if you want,
15:05 : ananyo_, yes, but depends on the data.
15:05 : brute4s99_ can I use github private repository as backup destination ? it would also help to compare previous and new backup !
15:05 : kushal ananyo_, for example: you should not backup your private keys or private copy of your password manager to the could.
15:06 : brute4s99_, git is not good for binary files.
15:06 : next
15:06 : Saksham_19o9 kushal, what are your views about show Mr. Robot? it is also about saving our privacy and other stuff like that?
15:06 : kushal Saksham_19o9, it is off topic.
15:06 : sd30 !
15:06 : Saksham_19o9 ok
15:07 : kvy Saksham_19o9, you can discus all off topic problems when session ends. :)
15:08 : shaikhfarhan sir any suggestion for a completly new user for linux
15:08 : kvy shaikhfarhan, do not use sir call everyone by using there nicks.
15:08 : Saksham_19o9 kushal i have an important errand to run. i need to leave. I will read logs afterward. Can you please tell me today's homework?
15:09 : shaikhfarhan ok
15:09 : meanjeet Saksham_19o9, i think homework is already given.
15:10 : ankit774 i guess kushal is afk
15:10 : kushal I primary network just now went down
15:10 : kvy shaikhfarhan, start learning Linux. :)
15:10 : kushal Hometasks: watch a few documentaries
15:10 : vshuklajr ankit774: afk?
15:11 : j605 brute4s99_: duplicity, borg et. al have incremental backups which will help you version your backups.
15:11 : kvy vshuklajr, away from keyboard
15:11 : kushal i have given link to one on Friday, here is the next https://www.youtube.com/watch?v=M3mQu9YQesk
15:11 : ankit774 vshuklajr, away from keyboard ;)
15:11 : shaikhfarhan kushal which one is better fedora or ubuntu
15:12 : Rakshit__ rollcall: Rakshit Airani leaving, have some work .
15:12 : j605 shaikhfarhan: again, ask after typing "!" to get in the queue and when called upon
15:12 : newrg kushal: thanks for the documentaries,really informative and enjoyable at the same time
15:12 : brute4s99_ j605 on it ! thanks !
15:13 : shaikhfarhan ok
15:13 : !
15:13 : Saksham_19o9 Thanks kushal.
15:15 : ankit774 i guess kushal's primary network went down again ;(
15:15 : mzeeqazi_ Is this session over??
15:15 : GeekyShacklebolt mzeeqazi_, not yet.
15:15 : brute4s99_ nope
15:15 : jasonbraganza ok folks
15:16 : kushal has network issues
15:16 : so here is the secoond hometask
15:16 : watch nothing to hide here, https://www.youtube.com/watch?v=M3mQu9YQesk
15:16 : ananyo Yup Watched The Internet's Own Boy documentary
15:16 : jasonbraganza let’s close the session here
15:16 : ananyo Really good and informative
15:16 : jasonbraganza roll call
15:16 : GeekyShacklebolt Shiva Saxena
15:16 : j605 shaikhfarhan: I will take your question. No distro is faster than the other. It depends on what you want and what you prefer
15:17 : bhavin192 Bhavin Gandhi
15:17 : sourabh1031 Sourabh Pruthi
15:17 : newrg Rajat Gupta
15:17 : sehenazparvin Sehenaz Parvin
15:17 : vshuklajr jasonbraganza: kushal gave the same link
15:17 : mzeeqazi_ Muhammad Zeeshan Qazi
15:17 : sd30 Shruti Dash
15:17 : kvy kumar vipin yadav
15:17 : priyankasaggu119 Priyanka Saggu
15:17 : RatanShreshtha Ratan Kulshreshtha
15:17 : j605 Jagannathan Tiruvallur Eachambadi
15:17 : olajayi__ olajayi__
15:17 : rishibit Rishikesh Bamdale
15:17 : brute4s99_ Piyush Aggarwal
15:17 : ankit774 Ankit Upadhyay
15:17 : inquiridortechie Neeraj kumar Arya
15:17 : gutsytechster Prashant Sharma
15:17 : schubisu Robin Schubert
15:17 : vshuklajr Vivek Shukla
15:17 : man-jain Manank Patni
15:17 : AdityaPatil Aditya Patil
15:17 : shaikhfarhan shaikh farhan
15:17 : jaydeep_borkar Jaydeep Borkar
15:17 : Call Jitendra kumar Tripathi
15:17 : cypher_ Naman Sharma
15:17 : j605 vshuklajr: first is writing out your threat assesment
15:17 : ananyo Ananyo Maiti
15:17 : inkaps Nupur Kapur
15:17 : ashwani ashwani singh
15:17 : prokbird tabrez khan
15:17 : akshayg96 Akshay Gaikwad
15:17 : BhaveshSGupta[m] Bhavesh Gupta