Taskwarrior for Android released

Taskwarrior for Android is new front end for Taskwarrior, excellent command line task manager and a very good replacement for Mirakel which has big problems with crashing on sync with task server.

Download it from Google Play.

Happy hacking….

Quick ebook conversion with Calibre in console


I mostly use fbless ebook reader, because it works on console and don’t need to switch to X server for reading. Downside is that it recognize only .fb2 or .fb2.zip format, which is not so common. For quick conversion I use Calibre command line tool:

ebook-convert How.to.Convert.Ebooks.epub How.to.Convert.Ebooks.fb2

…quick and efficient.
Happy hacking….

Editing files over ssh in vim


Need a quick file edit on remote server. With vim it’s easy, use:

vim scp://username@host:port//path/to/file

…or within vim:

:e scp://username@host:port//path/to/file

…or if you are not sure about name of the file, browse remote directory with:

:e vim scp://username@host:port//path/to/directory/

Directory path must end with /.Remote home directory is invoked with:

:e scp://username@host:port/~/

Use rcp instead of scp for ftp access.
Happy hacking….

gpg not working without X server


If you are trying to use gpg command for encrypt or decrypt data on tty without X server (I use that in combination with yadm, you will probably get this error:

gpg: public key decryption failed: Inappropriate ioctl for device

If you don’t want to switch to X every time, there is a simple solution.Put this line in your ~/.bashrc:

export GPG_TTY=$(tty)

Happy hacking…

Mirakel crash


If you are using taskwarrior and you are trying to use Mirakel from Google Play Store, there is a 99% chance, that Mirakel crashes every time you want to sync Mirakel with taskwarrior server (By the way, easy way to set up server, is at freecinc, which is web based server and just follow the instructions). There is a workaround for that. Go to Mirakel, download the 2.8.1 version and the Mirakel will sync with server without problem.
You should then disable auto update for Mirakel on Google Play Store.
Happy hacking…

The Shell Shock Vulnerability

The Shell Shock exploit or bash vulnerability is a serious bug in most versions of Bash dating back to at least 1994. It allows remote attackers to execute arbitrary code because it processes trailing strings after function definitions in the values of environment variables.
Simple check is executing command:
x="() { :; }; echo x" bash -c :
and if “x” is printed then your bash is vulnerable. Taken from commandlinefu by user malathion
More about vulnerability can be found at shellshockexploit.com where are also described more checking methods and more info about that.