Open Linux Forums
Like Ubuntu forums, except with beer.
Member
offline
361 posts
Oct 04 2017
21 April 2018 - 00:50

Well that is interesting.

Don't really see how it is used but there does seem to be some sense to it.

But even if used in a cluster or in servers you still have to have the buggers connected and that means they all have to have an address which would identify them as well as this file does.

Obviously I am missing the point.

21 April 2018 - 04:07

It seems to have something to do with individual applications and possibly where they are allowed to run.

Or something.

Oh well. Doesn't seem to be anything that has much to do with my operations or any that are likely to come up that I need to know about it.

21 April 2018 - 19:49

Leppie wrote:

I'm just guessing, but I think it holds the (current) UUID for the machine the system is installed on.

Interesting idea but I don't think it holds up.

Just checked with blkid for my partition uuids, both uuid and partuuid, here on my external drive and there is no similarity between them (even checked the /home partition ones as well as / partitions) and the machine-ids for these 2 installs.

Baffling.

23 April 2018 - 03:45

Leppie wrote:

ranchhand wrote:

Just checked with blkid for my partition uuids, both uuid and partuuid, here on my external drive and there is no similarity between them (even checked the /home partition ones as well as / partitions) and the machine-ids for these 2 installs.

The machine's UUID is different from any individual piece of hardware or partition.

Thank you.

Actually you are a real pain in the ass. I now have a whole lot more stuff to study.

But I have discovered the
dmidecode

command that does give that information. At least it gives that information on the actual hardware running.

I would hope that there would be some different machine-id for VM installations.

There is, by the way, a possibility of multiple MAC addresses apparently. I am not sure how that works but would definitely indicate some need for specific identification other than that.

One interesting thing I ran into while playing with the dmidecode command is

root@openbox:/home/tom# dmidecode -s system-serial-number
To be filled by O.E.M.

This is something that is amusing in that I am the OEM. Probably very important for me to learn how to do that. Don't think I am going to put that very high on my priorities list. I could also, apparently in some manner, create a discoverable
system-product-name
and probably some other things too. What fun.

Need to try this command on something like the wife's laptop.

For the system uuid you need

# dmidecode -s system-uuid

Checking with
aptitude why

I find that dmidecode is a depends for
libparted2

Which I think most people would have installed but maybe not.

Thanks again. Starting to make some sense. Machine-id may be derived from that somehow but I haven't seen that explicitly stated. It is the source, however, for any VM apparently so logically this could be inferred for non VM systems too.

Will have to study on this more sometime. Problem is my list is getting a bit long and I am getting pretty sure that I will not live long enough to clear it.

26 April 2018 - 22:59

I have that link bookmarked. Was one I found but need to do some studying to find out what the hell they are talking about.

Which file are you wanting the contents of?

28 April 2018 - 18:25

Leppie wrote:

ranchhand wrote:

Which file are you wanting the contents of?

The one you want to know what it is for? lol

Sorry, short on sleep.
23a6abd2b316423a95064d58718c87e1

That is the entire contents of that file. I did take the liberty of changing a couple of characters seeing how some of the articles about this seem to think it is dangerous info to be public.

30 April 2018 - 22:01

Leppie wrote:

Lol, changing characters in such a string could potentially make it appear to be something completely different.
I am unsure what others would do with your machine's UUID... posting stuff on forums pretending to be you?

Anyway, it does look like a UUID.

I thought the warning was rather vague and amusing myself.

It is created with the same standards as to size and so forth as uuid.

I don't really see how it can be used for something that couldn't be done some other way and probably some easier way. At least it is not a large file.

01 May 2018 - 01:13

Just trying to catch up in online behavior and bullying.

Picking on files is just so much fun!!!

22 October 2018 - 17:03

A bit hard for me to describe the problem as I don't have a Google account and this is not happening on my old S3.

Is absolutely eating the battery, however, on my wife's phone which is much newer (not sure which it is but I think an S7) phone and she does have a google account.

She is of the opinion that this pain was foisted on her phone by Facebook but looks to me like it was done by our wonderful provider Verison.

Hoping someone here can give me some information on what looks to me to be nothing but malware. Need to do something about this as she really needs her phone to keep track of my Dreaded Mother in Law. Is not helpful when her phone is fully charged in the evening and then goes dead while she is at work the next day without even having to use the phone at all.

I think I have gotten a handle on how to disable the thing from;
https://fossbytes.com/peel-remote-use-remove-smart-remote/

But don't want to recommend this to her without some sort of better information on this thing. I have little use for remote control devices personally. I really don't watch TV unless someone else has it running and I am in the room and that is the only remotely controlled thing we own.

Her phone is not used as a remote by the way so it really isn't something she has any interest in either.

09 May 2019 - 06:07

nubimax wrote:

The problem as I see it is that devuan will not let you upgrade from firefox esr. the only work around that I have found calls for you to change your sources list, add a key ring, then find a deb pkg to allow a newer version of firefox. my trouble with that is the fonts in the root terminal are so small I can see them even with my magnifying glass. maybe after the eye surgery I will be able to see things that small. Thinking now of putting debian on the main computer and going with that till after the surgery.
@GB ublock will not download to firefox esr. but thanks for the info

dinga

I have been using
http://winhelp2002.mvps.org/hosts.txt

Actually using the same address but with .html instead of .txt since Win98. I have never used an addblocker.

They are a scam. They make money by NOT BLOCKING sites that pay them. This guy looks for where the adds come from and doesn't "block" at all like an addblocker.

Add blockers block the domain name in your browser. This is not the ip address.

This text file goes in your /etc/hosts file and just adds a few thousand lines to it. Each line is like the ones in this sample
0.0.0.0 banners.adnetmedia.lt
0.0.0.0 delivery.adnetwork.vn
0.0.0.0 img.adnet.com.tr
0.0.0.0 www.ad-net.co.uk
0.0.0.0 adnext.fr
0.0.0.0 srv.adngin.com
0.0.0.0 ad.adnow.com
0.0.0.0 acdn.adnxs.com
0.0.0.0 speednetwork14.adk2.co
0.0.0.0 cdn.oas-c17.adnxs.com
0.0.0.0 tt11.adobe.com

When you try to connect to any domain, most people know that the domain name needs to be translated to an actual ip address and the request is therefore sent to a dns (domain name server) and there is a list, pretty much like these lines and it goes through until it finds the right domain name and then sends it to the assigned correct Ipv4 address.

What people don't know generally is that isn't the first place that the request goes. The DEFAULT FIRST place to look up a domain name, no matter what OS you are using, is the /*/hosts file (I don't remember where that is in Windows and don't, frankly care).

As you can see in the first column is a very simple Ipv4 address. 0.0.0.0 which is another way of expressing 127.0.0.1 which is the address of your current OS. If you have 45 installs on your drives they all have that same address and use it when you are booted into them.

So when you open a site and it sends, through your browser, a request for
refer.ccbill.com

your system goes to work and checks the hosts file and finds
0.0.0.0 refer.ccbill.com #[Tracking.Cookie][Google.Diagnostic]

and connects it to
0.0.0.0

And you get all the stuff that "site" has that belongs to that domain name. Not a damned thing. And neither do they.

Blocklist is updated about every 2 months.

You may find that some sites don't work. I have run into maybe a dozen or so in the last 21 years of using this. They aren't worth accessing generally but if you really want to all you need do is use the search function in your favorite text editor and plug in the domain name of the failed site. Hit enter. Will take you to it if, indeed it actually exists, and all you need to do is (as root or editing with sudo) comment out that line. Save file. Go try the site again. It will now work because it is no longer being directed to a safe and empty address. Will still check the hosts file, will not find the domain name, will send the request on to your ISP which probably has a dns server. If it can't find it the request goes on to a bigger dns.

Don't block adds. Block toxic servers. Most of the servers on that list are used to serve up malware, scams and watering hole attacks. That is a major business for them and they know it. And their well meaning attempts at blocking it are just as well meaning and effective as those of FB and Guggle.

Just gets worse by the year.

There are sites that still sell adds themselves. Click on those adds. Those sites don't use the more lucrative malware add providers. They put their personal name on the line but offering you adds. Adds they have approved. They can't go to court and say well we get adds from Guggle and that is their responsibility. Click on them and give them a few pennies for that hit without a large chunk of it going to Guggle or the other sleazy companies in that racket.

If you use Windows use that same address above with the .html instead of .txt. Will get the main page and there is a link for the actual .exe file you need for Win JerryLewis Pro or whatever version of Win you use and just download it and execute it to have it put itself in your hosts file.

In Linux you need to add it to your /etc/hosts manually. Which is faster. Just put it below the current stuff in that file. Some will be duplicated - this is not a problem.