How to split a wallpaper for multiple monitors on GNU/Linux

So I wanted to split a 3840×1080 wallpaper in two halves for my dual monitor based KDE 4.10.5 setup. Obviously there are several applications that would do the job, but why bother when ImageMagick can do it with a one-liner. The “magick” is achieved by using a geometry argument:

What is the latest Skype for Business User-Agent string?

When using a client other than Skype for Business (formerly known as Lync) to connect with your Office 365 account, you’ll need to provide the Microsoft Lync servers with a user-agent string they recognize as an “acceptable” client. The reasoning behind this is surely to give you the best possible experience and not at all to lock out other messaging clients.

How to add failed logins from Logwatch as firewall rules using Iptables

Just for the record: collecting failed logins from Logwatch and feeding them to the firewall is by no means a viable strategy against brute force attacks or other intrusion attempts. There are better means to mitigate these kind of security concerns in real time.

BlueOnyx 5107R - make_sock: could not bind to address 0.0.0.0:80

Recently, I became aware that Apache’s access and error_log on a BlueOnyx 5107R server were both zero byte files. Restarting Apache to correct the issue resulted in the following error message:

(98) Address already in use: make_sock: could not bind to address 0.0.0.0:80
no listening sockets available, shutting down
Unable to open logs

Arch Linux - Failed to start Verify integrity of password and group files

The shadow.service unit reported that it had failed and threw the following error message: “user ‘colord’: directory ‘/var/lib/colord’ does not exist”. I had no recollection of housing such a user, but by issuing the command below there was hard proof (image to the right) that colord was indeed a homeless user on my system, and her home was supposed to have been /var/lib/colord.

How to reverse a shortened URL with a single command on GNU/Linux

Remember that old saying: if you don’t know the source, don’t click it? With all these new URL shortening services, that advice seems to have been thrown out the window. As a result, evildoers are embracing the technology to disguise their malware sites behind shortened URLs.

This is obviously effective as an URL like hxxps://goo.gl/3BSi65 would have a much easier time getting past your spamfilter than say something like hxxp://h4x0r.tld/inject.aspx

Slackware ARM on the Raspberry Pi 2- 38 days later

Excited by the prospect of hosting my blog on the new Raspberry Pi 2, I decided lately to wave goodbye to the local datacenter and unleash a Slackware Linux box into the wild (full story here).

Everything went (mostly) without a hitch until I wanted to get back in sync with the Slackware-current tree. After applying the available updates and issuing a reboot, the system seemed operational and nothing from the logs gave any indication of imminent failure.

VMware Player - Taking ownership of this virtual machine failed

After Windows 8.1 had performed an unscheduled reboot, I was greeted with the following error message when trying to start up a virtual machine in VMware Player:

This virtual machine appears to be in use.
If this virtual machine is not in use, press the “Take Ownership” button to obtain ownership of it. Otherwise, press the “Cancel” button to avoid damaging it.

The OTRS Group axes the Windows installer

With the release of OTRS Help Desk 4, it seems that running OTRS on a native Windows environment for all intents and purposes is no longer viable. By killing off the Windows installer and recommending migration into the OTRS appliance, the OTRS Group seems to be subtly hinting that OTRS on Windows is dead in the water.

Outlook.com is silently discarding email messages

A while back I did some consulting work for a small ISP who had received complaints from a few customers that believed they could not use the ISP’s SMTP server to send email to outlook.com or hotmail.com accounts. These customers claimed they never got any bounce message (Non-Delivery Report)  in return, so they firmly believed the problem resided with the ISP.

BlueOnyx 5106R - Unresponsive Login Manager

BlueOnyx uses the PAM ABL module to mitigate brute force attacks. Though it’s not a good idea to rely solely on this module to protect your services, it’s definitely better than nothing. However, for some reason the database storing the failed hosts and users tends to corrupt easily on BlueOnyx systems.

How to install Dig on a Windows 8.1 64-bit system

This installation procedure will extract only  relevant libraries and executables from the BIND 9 package, and not install a full-blown DNS server. The installation method is also applicable on Windows 7 64-bit systems.