SELinux with omarine policy: Gnome terminal: Fixing the security context
Gnome terminal is GNOME terminal emulator. It works based on Gnome terminal server using dbus. By default, the bus is the system bus, so if you are currently using seuser user_u with the complete context as user_u:user_r:user_t:SystemLow(s0), you will see the Gnome terminal server running in init_t domain with complete context as follows: And the […]
SELinux with omarine policy: Secure login into a security context using ssh
When you run Omarine 5.0 for the first time, the autorelabel service will start. It takes a few minutes (usually 2-3 minutes) to relabel the entire file system. During this initial launch the system will operate in permissive mode. From next time on, the system will run in enforcing mode, which means that the security […]
Cyber security: Unpredictable Random Number Generator
Random Number Generator is an important factor of security activity to create cryptographic keys and passwords. We already know that the rand() function is a simple pseudo-random number generator. It returns a pseudo-random integer in the range 0 to RAND_MAX, ie, the mathematical range [0, RAND_MAX]. You can use rand() to define your own function […]
Cyber security: Monitor file integrity
In addition to ClamAV antivirus, Omarine 4.0 provides Tripwire package to monitor the integrity of the files in the system. The monitoring policy is derived from /etc/tripwire/twpol.txt, a plain text file that you can edit. To use tripwire you first create the site key and local key: sudo twadmin -m G -L /etc/tripwire/$(uname -n)-local.key \ […]
Bitcoin Bubble? Why the Burst Might Be Good for Bitcoin & Blockchain
Bennett Garner Media outlets that once ran glorifying stories of Bitcoin ascendance are now describing a Bitcoin bubble that has popped. Economists who were at first curious in a new type of monetary system are now foretelling panic. In this strange climate after a fall from great heights, it’s worth considering how we got here […]
Cyber security: How to turn a non-TLS aware server into communicable with clients over secure TLS channels without server configuration?
Although we can easily configure the web server to listen to port 443 for https, this article uses the default configuration of the web server in Omarine 4.0, ie, not listening to port 443, to illustrate the case. No need to configure the server. We use stunnel to do that. We experiment on a local […]
Football Predictions 2.0: Why use id3 to create checking samples?
Football Predictions uses neural network so a checking sample set is needed to evaluate the network configuration. The checking samples can be part of the problem’s sample set and the network will learn the rest. But this way is not good because the network will not be fully learned and may have big errors. The […]
Football Predictions 2.0: Watch a video on Machine learning
There are 4 hidden nodes used. The process goes through 20 rounds with 20 neural network populations. If necessary, the next 20 rounds will be processed with a doubled number of hidden nodes, which is 8. However, in this example there are no rounds with 4 hidden nodes failing, so using 4 hidden nodes is […]
Ethereum Classic | Beginner’s Guide
Paul Andrew What is Ethereum Classic? Ethereum Classic is the original Ethereum blockchain and allows for the implementation of decentralized applications and smart contracts. The project was born out of an unwavering belief in core principles. It symbolizes the importance of a cryptocurrency being fungible and its blockchain immutable. The Ethereum and Ethereum Classic blockchains […]
Football Predictions 2.0 released!
This is a great version. The program uses ID3 algorithm to generate some checking samples. Many neural network populations are processed with different number of hidden nodes, and through a number of different weight initialization. The populations evolve to their fixed point, when all neural networks have converged, the errors on the checking sample set […]