I used the site https://html5test.com.
In reverse order:
| Browser | Version | HTML5 Rating |
|---|---|---|
| Internet Explorer | 11.0.24 | 343/555 |
| Edge | 13.10586 | 453/555 |
| Maxthon | 4.4.8.1000 | 467/555 |
| Firefox | 42.0 | 468/555 |
| Chrome | 47.0.2526.58 | 501/555 |
| Vivaldi | 1.0.303.52 | 521/555 |
I'm just a simple techie who sometimes forgets things. I use this as a notepad to remember things by. I hope it helps you too. I post as myself, not as any organisation.
| Browser | Version | HTML5 Rating |
|---|---|---|
| Internet Explorer | 11.0.24 | 343/555 |
| Edge | 13.10586 | 453/555 |
| Maxthon | 4.4.8.1000 | 467/555 |
| Firefox | 42.0 | 468/555 |
| Chrome | 47.0.2526.58 | 501/555 |
| Vivaldi | 1.0.303.52 | 521/555 |
The following schema is missing
org.gnome.settings-daemon.peripherals.touchpad
Thanks to the guys at Ask Ubuntu for the answer:http://askubuntu.com/questions/616267/cannot-use-the-unity-tweak-tool
Replace occurrences of 'org.gnome.system-daemon.peripherals.touchpad' with
'org.gnome.desktop.peripherals.touchpad'.
This was in the following files:
/usr/lib/python3/dist-packages/UnityTweakTool/section/system.py
/usr/lib/python3/dist-packages/UnityTweakTool/section/spaghetti/gsettings.py
user@host:~$ mkdir speedtest-cli
user@host:~$ cd speedtest-cli/
admin@host:~/speedtest-cli$ wget -O speedtest-cli https://raw.github.com/sivel/speedtest-cli/master/speedtest_cli.py --2015-01-09 08:57:52-- https://raw.github.com/sivel/speedtest-cli/master/speedtest_cli.py
Resolving raw.github.com (raw.github.com)... 23.235.43.133
Connecting to raw.github.com (raw.github.com)|23.235.43.133|:443... connected.
HTTP request sent, awaiting response... 301 Moved Permanently Location: https://raw.githubusercontent.com/sivel/speedtest-cli/master/speedtest_cli.py [following]
--2015-01-09 08:57:53-- https://raw.githubusercontent.com/sivel/speedtest-cli/master/speedtest_cli.py
Resolving raw.githubusercontent.com (raw.githubusercontent.com)... 23.235.43.133
Connecting to raw.githubusercontent.com (raw.githubusercontent.com)|23.235.43.133|:443... connected.
HTTP request sent, awaiting response... 200 OK
Length: 21791 (21K) [text/plain]
Saving to: `speedtest-cli'
100%[===========================================================================================================================================================>] 21,791 --.-K/s in 0.02s
2015-01-09 08:57:53 (935 KB/s) - `speedtest-cli' saved [21791/21791]
user@host:~/speedtest-cli$ chmod +x speedtest-cli
user@site1:~/speedtest-cli$ ./speedtest-cli
Retrieving speedtest.net server list...
Testing from Virgin Media (x.x.x.x)...
Selecting best server based on latency...
Hosted by Virgin Media (Luton) [53.67 km]: 19.772 ms
Testing download speed........................................
Download: 48.70 Mbits/s
Testing upload speed..................................................
Upload: 11.08 Mbits/s
user@site2:~/speedtest-cli$ ./speedtest-cli
Retrieving speedtest.net configuration...
Retrieving speedtest.net server list...
Testing from Virgin Media (x.x.x.x)...
Selecting best server based on latency...
Hosted by Virgin Media (Luton) [52.13 km]: 21.677 ms
Testing download speed........................................
Download: 34.93 Mbits/s
Testing upload speed..................................................
Upload: 10.11 Mbits/s
me@home:~/speedtest-cli$ ./speedtest-cli
Retrieving speedtest.net configuration...
Retrieving speedtest.net server list...
Testing from Virgin Media (x.x.x.x)...
Selecting best server based on latency...
Hosted by Fluidata (Hemel Hempstead) [86.39 km]: 22.999 ms
Testing download speed........................................
Download: 152.29 Mbits/s
Testing upload speed..................................................
Upload: 11.65 Mbits/s
karl@littlechef:~/speedtest_cli$ ./speedtest-cli --server 3697
Retrieving speedtest.net server list...
Testing from Virgin Media (x.x.x.x)...
Hosted by Virgin Media (Luton) [109.86 km]: 24.878 ms
Testing download speed........................................
Download: 145.03 Mbits/s
Testing upload speed..................................................
Upload: 11.88 Mbits/s
gpg --keyserver keys.gnupg.net --recv 886DDD89 gpg --export A3C4F0F979CAA22CDBA8F512EE8CBC9E886DDD89 | sudo apt-key add -
$ sudo apt-get install synapticOnce installed, run synaptic using:
$ sudo synapticSearch for the package virtualbox-guest-utils and select it for installation. It will a few other packages for installation, and after a reboot it will be fine.
http://virtualboxes.org/doc/installing-guest-additions-on-ubuntu/I haven't tested this for a while, but you need the following pre-requisite packages:
$ sudo m-a prepareYou can also avoid rebuilding modules manually by installing dkms.
https://stackoverflow.com/questions/18055593/fast-tsc-calibration-failed
I edited /etc/default/grub using:
$ cat /sys/devices/system/clocksource/clocksource0/available_clocksource
acpi_pm
$ sudo vi /etc/default/grubI changed:
GRUB_CMDLINE_LINUX=""To:
GRUB_CMDLINE_LINUX="clocksource=acpi_pm"I then regenerated the grub.cfg using:
$ sudo grub-mkconfig -o /boot/grub/grub.cfgAfter a reboot all was good.
OpenSSL Security Advisory [05 Jun 2014] ======================================== SSL/TLS MITM vulnerability (CVE-2014-0224) =========================================== An attacker using a carefully crafted handshake can force the use of weak keying material in OpenSSL SSL/TLS clients and servers. This can be exploited by a Man-in-the-middle (MITM) attack where the attacker can decrypt and modify traffic from the attacked client and server. The attack can only be performed between a vulnerable client *and* server. OpenSSL clients are vulnerable in all versions of OpenSSL. Servers are only known to be vulnerable in OpenSSL 1.0.1 and 1.0.2-beta1. Users of OpenSSL servers earlier than 1.0.1 are advised to upgrade as a precaution. OpenSSL 0.9.8 SSL/TLS users (client and/or server) should upgrade to 0.9.8za. OpenSSL 1.0.0 SSL/TLS users (client and/or server) should upgrade to 1.0.0m. OpenSSL 1.0.1 SSL/TLS users (client and/or server) should upgrade to 1.0.1h. Thanks to KIKUCHI Masashi (Lepidum Co. Ltd.) for discovering and researching this issue. This issue was reported to OpenSSL on 1st May 2014 via JPCERT/CC. The fix was developed by Stephen Henson of the OpenSSL core team partly based on an original patch from KIKUCHI Masashi. DTLS recursion flaw (CVE-2014-0221) ==================================== By sending an invalid DTLS handshake to an OpenSSL DTLS client the code can be made to recurse eventually crashing in a DoS attack. Only applications using OpenSSL as a DTLS client are affected. OpenSSL 0.9.8 DTLS users should upgrade to 0.9.8za OpenSSL 1.0.0 DTLS users should upgrade to 1.0.0m. OpenSSL 1.0.1 DTLS users should upgrade to 1.0.1h. Thanks to Imre Rad (Search-Lab Ltd.) for discovering this issue. This issue was reported to OpenSSL on 9th May 2014. The fix was developed by Stephen Henson of the OpenSSL core team. DTLS invalid fragment vulnerability (CVE-2014-0195) ==================================================== A buffer overrun attack can be triggered by sending invalid DTLS fragments to an OpenSSL DTLS client or server. This is potentially exploitable to run arbitrary code on a vulnerable client or server. Only applications using OpenSSL as a DTLS client or server affected. OpenSSL 0.9.8 DTLS users should upgrade to 0.9.8za OpenSSL 1.0.0 DTLS users should upgrade to 1.0.0m. OpenSSL 1.0.1 DTLS users should upgrade to 1.0.1h. Thanks to Jüri Aedla for reporting this issue. This issue was reported to OpenSSL on 23rd April 2014 via HP ZDI. The fix was developed by Stephen Henson of the OpenSSL core team. SSL_MODE_RELEASE_BUFFERS NULL pointer dereference (CVE-2014-0198) ================================================================= A flaw in the do_ssl3_write function can allow remote attackers to cause a denial of service via a NULL pointer dereference. This flaw only affects OpenSSL 1.0.0 and 1.0.1 where SSL_MODE_RELEASE_BUFFERS is enabled, which is not the default and not common. OpenSSL 1.0.0 users should upgrade to 1.0.0m. OpenSSL 1.0.1 users should upgrade to 1.0.1h. This issue was reported in public. The fix was developed by Matt Caswell of the OpenSSL development team. SSL_MODE_RELEASE_BUFFERS session injection or denial of service (CVE-2010-5298) =============================================================================== A race condition in the ssl3_read_bytes function can allow remote attackers to inject data across sessions or cause a denial of service. This flaw only affects multithreaded applications using OpenSSL 1.0.0 and 1.0.1, where SSL_MODE_RELEASE_BUFFERS is enabled, which is not the default and not common. OpenSSL 1.0.0 users should upgrade to 1.0.0m. OpenSSL 1.0.1 users should upgrade to 1.0.1h. This issue was reported in public. Anonymous ECDH denial of service (CVE-2014-3470) ================================================ OpenSSL TLS clients enabling anonymous ECDH ciphersuites are subject to a denial of service attack. OpenSSL 0.9.8 users should upgrade to 0.9.8za OpenSSL 1.0.0 users should upgrade to 1.0.0m. OpenSSL 1.0.1 users should upgrade to 1.0.1h. Thanks to Felix Gröbert and Ivan Fratrić at Google for discovering this issue. This issue was reported to OpenSSL on 28th May 2014. The fix was developed by Stephen Henson of the OpenSSL core team. Other issues ============ OpenSSL 1.0.0m and OpenSSL 0.9.8za also contain a fix for CVE-2014-0076: Fix for the attack described in the paper "Recovering OpenSSL ECDSA Nonces Using the FLUSH+RELOAD Cache Side-channel Attack" Reported by Yuval Yarom and Naomi Benger. This issue was previously fixed in OpenSSL 1.0.1g. References ========== URL for this Security Advisory: http://www.openssl.org/news/secadv_20140605.txt Note: the online version of the advisory may be updated with additional details over time.'via Blog this'
#!/bin/bash
E_BADARGS=65
logs=~/heartbleed/scans
today=`date +%F`
if [ -z "$1" ]; then
echo " Usage: `basename $0` list"
exit $E_BADARGS
fi
if [ ! -d $logs/$today ]; then
echo "[*] Creating $logs/$today"
mkdir $logs/$today
fi
hosts=$1
touch $logs/$today/$hosts
while read -r host
do
echo "[*] Scanning $host..."
~/heartbleed/Heartbleed $host 2>> $logs/$today/$hosts
done < $hosts
echo "[*] Scans completed."