... I just booted one of our physical server here directly from the German Telekom Cloud Storage Service aka "Mediacenter".
Wednesday, July 18, 2012
Steve Mann, the father and inventor of "wearable computers" got physical assault by McDonald's for wearing Digital Eye Glass.
Mhmmm ... I used to got to MC like this
Mhmmm ... I used to got to MC like this
Should I worry ?
Please find a full description of my wearable computer at http://www.openmosixview.com/wearable/
Friday, July 6, 2012
We have just bought a new TV set. Happy that it has WLAN and Network so I connected it to our home-network. A quick "nmap" run on the IP address of the TV shows "x86_64-unknown-linux-gnu" as its OS (please see the log output below)
Great, our TV is running Linux. Smoooth ....
.... and since it has an IP address it is now already automatically documented by I-doit in my personal openQRM.
mhmmmm :) ... so, it is actually an open-source GPL firmware/operating system on this TV ... and were I can download it to enable the sshd daemon for login in ?
I could have also titled this blog entry as
"Why Linux on the Desktop will not happen".
The reason for why Linux on the Desktop will not happen is because it is already there. Linux has already arrived for the average Users on Smartphones, Tablets, DSL Routers, even TVs and many more other gadgets.
Here the nmap log output:
root@cloud:/var/log# nmap -vvv -O --osscan-guess 192.168.88.133 Starting Nmap 5.00 ( http://nmap.org ) at 2012-07-05 20:57 CEST NSE: Loaded 0 scripts for scanning. Initiating ARP Ping Scan at 20:57 Scanning 192.168.88.133 [1 port] Completed ARP Ping Scan at 20:57, 0.08s elapsed (1 total hosts) Initiating Parallel DNS resolution of 1 host. at 20:57 Completed Parallel DNS resolution of 1 host. at 20:57, 0.00s elapsed DNS resolution of 1 IPs took 0.00s. Mode: Async [#: 1, OK: 0, NX: 1, DR: 0, SF: 0, TR: 1, CN: 0] Initiating SYN Stealth Scan at 20:57 Scanning 192.168.88.133 [1000 ports] Discovered open port 443/tcp on 192.168.88.133 Discovered open port 4443/tcp on 192.168.88.133 Discovered open port 80/tcp on 192.168.88.133 Discovered open port 6000/tcp on 192.168.88.133 Discovered open port 9090/tcp on 192.168.88.133 Discovered open port 7676/tcp on 192.168.88.133 Completed SYN Stealth Scan at 20:57, 2.69s elapsed (1000 total ports) Initiating OS detection (try #1) against 192.168.88.133 Host 192.168.88.133 is up (0.0057s latency). Scanned at 2012-07-05 20:57:33 CEST for 4s Interesting ports on 192.168.88.133: Not shown: 994 closed ports PORT STATE SERVICE 80/tcp open http 443/tcp open https 4443/tcp open pharos 6000/tcp open X11 7676/tcp open unknown 9090/tcp open zeus-admin MAC Address: 48:44:F7:BB:F6:89 (Unknown) Device type: general purpose Running: Linux 2.6.X OS details: Linux 2.6.17 - 2.6.28 TCP/IP fingerprint: OS:SCAN(V=5.00%D=7/5%OT=80%CT=1%CU=41499%PV=Y%DS=1%G=Y%M=4844F7%TM=4FF5E3A1 OS:%P=x86_64-unknown-linux-gnu)SEQ(SP=C6%GCD=1%ISR=D2%TI=Z%CI=Z%II=I%TS=8)O OS:PS(O1=M5B4ST11NW5%O2=M5B4ST11NW5%O3=M5B4NNT11NW5%O4=M5B4ST11NW5%O5=M5B4S OS:T11NW5%O6=M5B4ST11)WIN(W1=16A0%W2=16A0%W3=16A0%W4=16A0%W5=16A0%W6=16A0)E OS:CN(R=Y%DF=Y%T=40%W=16D0%O=M5B4NNSNW5%CC=Y%Q=)T1(R=Y%DF=Y%T=40%S=O%A=S+%F OS:=AS%RD=0%Q=)T2(R=N)T3(R=Y%DF=Y%T=40%W=16A0%S=O%A=S+%F=AS%O=M5B4ST11NW5%R OS:D=0%Q=)T4(R=Y%DF=Y%T=40%W=0%S=A%A=Z%F=R%O=%RD=0%Q=)T5(R=Y%DF=Y%T=40%W=0% OS:S=Z%A=S+%F=AR%O=%RD=0%Q=)T6(R=Y%DF=Y%T=40%W=0%S=A%A=Z%F=R%O=%RD=0%Q=)T7( OS:R=Y%DF=Y%T=40%W=0%S=Z%A=S+%F=AR%O=%RD=0%Q=)U1(R=Y%DF=N%T=40%IPL=164%UN=0 OS:%RIPL=G%RID=G%RIPCK=G%RUCK=G%RUD=G)IE(R=Y%DFI=N%T=40%CD=S) Uptime guess: 0.060 days (since Thu Jul 5 19:31:43 2012) Network Distance: 1 hop TCP Sequence Prediction: Difficulty=198 (Good luck!) IP ID Sequence Generation: All zeros Read data files from: /usr/share/nmap OS detection performed. Please report any incorrect results at http://nmap.org/submit/ . Nmap done: 1 IP address (1 host up) scanned in 4.58 seconds Raw packets sent: 1029 (46.036KB) | Rcvd: 1017 (41.439KB) root@cloud:/var/log#