Folding@home Alessandro Stesi

Help [email protected] project with Secure Online Desktop

[email protected] is a distributed computing project for simulating protein dynamics – the process of protein folding and the movements of proteins implicated in a variety of cancers and diseases, including Alzheimer’s, Ebola and COVID-19.

By enabling people across the world to run these simulations on their personal computers, the [email protected] project aims to help scientists better understand these processes and identify new opportunities for treatments.

Of course, you can run [email protected] as a virtual machine in an Secure Online Desktop cloud too. The [email protected] client is available in the Secure Online Desktop template library, so every Cloud Server users can use it to build their Virtual Machine. Here’s a quick guide to setting it up.

 

1. Build a virtual server using the [email protected] template

To get started, deploy a Virtual Server using this template. Modify CPU/RAM to your liking and build the VS.

Once the VS is up and running, ssh/console to VS and confirm that the fah service is running:

      [[email protected] ~]# /etc/init.d/FAHClient status

      fahclient is running with PID 1268

Edit config.xml  in /etc/fahclient directory and modify it to add the  <!– Remote Command Server –>  section, in which we can tell the client our remote IP address. Or do as I have done in this case, and allow access from all (0.0.0.0/0) but with a password:

[[email protected] ~]# cat /etc/fahclient/config.xml

























With above config added, restart the fah service:

      [[email protected] ~]# /etc/init.d/FAHClient restart

      Stopping fahclient ... OK

      Starting fahclient ... OK

 

2. Install FAHControl

Next we are going to install FAHControl to your local desktop or laptop PC. It’s a GUI for controlling one or more [email protected] clients. You can learn more and get the installer from https://foldingathome.org/support/faq/installation-guides/

Once it’s installed, launch the application and you should see something similar to this:

folding-at-home-control

 

Now we can add our client running on the VS we deployed in Secure Online Desktop. You will need the public IP address of the VS, and ensure that you can reach port 36330.

Click the small Add button towards the bottom of the FAHControl client, and provide the Display Name, Hostname/IP address and the password you set earlier.

In the Configure section, under Identity tab specify your Name and our Team Number that is 259355 as reported below:

FAH-set Team Name

You should now see that FAHControl has connected and is working.

folding-at-home-control-2

To find more details about how it works, and other information about the [email protected] project, visit https://foldingathome.org/.

You can check our Team stats here: https://stats.foldingathome.org/team/259355 including your contribute.

Protein_Viewer_678x452

Please note that for help [email protected] project it is not mandatory to create a VPS on our Cloud, you can use your own PC to do that. The advantage to support [email protected] project  via our VPS is that, despite your PC, you can leave the process running all time and for instance you can allocate free resources (like CPU and RAM) you have free in your Cloud Server or SuperCloud subscription.

[btnsx id=”2931″]

Useful links:

Cloud servers

Datacenter in Italy

ownCloud free for Corona Virus (COVID-19) emergency

Virtual server

Windows Demo Server | Remote desktop access

Share


RSS

More Articles…

Categories …

Tags

RSS Dark Reading:

RSS Full Disclosure

  • Trojan-Dropper.Win32.Googite.b / Unauthenticated Remote Command Execution June 18, 2021
    Posted by malvuln on Jun 18Discovery / credits: Malvuln - malvuln.com (c) 2021 Original source: https://malvuln.com/advisory/4a8d6bc838c09c6701abfa8b283fd0de.txt Contact: malvuln13 () gmail com Media: twitter.com/malvuln Threat: Trojan-Dropper.Win32.Googite.b Vulnerability: Unauthenticated Remote Command Execution Description: The malware listens on TCP ports 3388, 4488 and 10002 and drops executables under both Windows and SysWOW64 dirs. Third-party attackers who can...
  • Trojan.Win32.Alien.erf / Directory Traversal June 18, 2021
    Posted by malvuln on Jun 18Discovery / credits: Malvuln - malvuln.com (c) 2021 Original source: https://malvuln.com/advisory/57ab194d8c60ee97914eda22e4d71b68_C.txt Contact: malvuln13 () gmail com Media: twitter.com/malvuln Threat: Trojan.Win32.Alien.erf Vulnerability: Directory Traversal Description: The malware deploys a Web server AM6WebMgr.exe (JAO build 809) listening on TCP port 1789. Third-party attackers who can reach an infected host can read any […]
  • Trovent Security Advisory 2105-01 / CVE-2021-32612: VeryFitPro unencrypted cleartext transmission of sensitive information June 18, 2021
    Posted by Stefan Pietsch on Jun 18# Trovent Security Advisory 2105-01 # ##################################### Unencrypted cleartext transmission of sensitive information ########################################################### Overview ######## Advisory ID: TRSA-2105-01 Advisory version: 1.0 Advisory status: Public Advisory URL: https://trovent.io/security-advisory-2105-01 Affected product: VeryFitPro Android mobile application (com.veryfit2hr.second) Tested versions:...
  • Trojan.Win32.Alien.erf / Remote Stack Buffer Overflow June 18, 2021
    Posted by malvuln on Jun 18Discovery / credits: Malvuln - malvuln.com (c) 2021 Original source: https://malvuln.com/advisory/57ab194d8c60ee97914eda22e4d71b68_B.txt Contact: malvuln13 () gmail com Media: twitter.com/malvuln Threat: Trojan.Win32.Alien.erf Vulnerability: Remote Stack Buffer Overflow Description: The malware deploys a Web server AM6WebMgr.exe (JAO build 809) listening on TCP port 1789. Third-party attackers who can reach an infected host can […]
  • Trojan.Win32.Alien.erf / Remote Denial of Service June 18, 2021
    Posted by malvuln on Jun 18Discovery / credits: Malvuln - malvuln.com (c) 2021 Original source: https://malvuln.com/advisory/57ab194d8c60ee97914eda22e4d71b68.txt Contact: malvuln13 () gmail com Media: twitter.com/malvuln Threat: Trojan.Win32.Alien.erf Vulnerability: Remote Denial of Service Description: The malware deploys a SMTP server JAOSrv821.exe listening on TCP port 25. Third-party attackers who can reach an infected host can trigger a denial […]
  • Email-Worm.Win32.Kipis.a / Unauthenticated Remote Code Execution June 18, 2021
    Posted by malvuln on Jun 18Discovery / credits: Malvuln - malvuln.com (c) 2021 Original source: https://malvuln.com/advisory/aa703bc17e3177d3b24a57c5d2a91a0c.txt Contact: malvuln13 () gmail com Media: twitter.com/malvuln Threat: Email-Worm.Win32.Kipis.a Vulnerability: Unauthenticated Remote Code Execution Description: The malware listens on TCP port 1029 and writes incoming packets to an executable file that is renamed as "winlogins.exe". Third-party attackers...
  • Re: popo2, kernel/tun driver bufferoverflow. June 18, 2021
    Posted by Robert Święcki on Jun 18Hi, wt., 15 cze 2021 o 09:56 KJ Jung napisał(a): While I agree that it might be not the best of programming patterns to accept length of a local stack buffer from the parent function (this can easily be misused over time), there&apos;s probably no bug here, as all […]
  • Re: popo/popo2 linux kernel vulns June 18, 2021
    Posted by RaziREKT via Fulldisclosure on Jun 18Hello KJ Jung, neither of the mails you sent contain bugs. The kernel code is sound and the vulnerabilities you reported don&apos;t seem to exist. In your first mail (popo:: linux kernel vulns of it), you point out a flaw in bond_do_ioctl() and bond_set_dev_addr(). It is impossible to […]
  • [SYSS-2021-007]: Protectimus SLIM NFC - External Control of System or Configuration Setting (CWE-15) (CVE-2021-32033) June 18, 2021
    Posted by Matthias Deeg on Jun 18Advisory ID: SYSS-2021-007 Product: Protectimus SLIM NFC Manufacturer: Protectimus Affected Version(s): Hardware Scheme 70 / Software Version 10.01 Tested Version(s): Hardware Scheme 70 / Software Version 10.01 Vulnerability Type: External Control of System or Configuration Setting (CWE-15) "Time Traveler Attack" Risk Level: Medium Solution Status: Open Manufacturer Notification: 2021-02-04 […]
  • Backdoor.Win32.Zombam.gen / Information Disclosure June 15, 2021
    Posted by malvuln on Jun 15Discovery / credits: Malvuln - malvuln.com (c) 2021 Original source: https://malvuln.com/advisory/ff6516c881dee555b0cd253408b64404_D.txt Contact: malvuln13 () gmail com Media: twitter.com/malvuln Threat: Backdoor.Win32.Zombam.gen Vulnerability: Information Disclosure Description: Zombam malware listens on TCP port 80 and deploys an unsecured HTML Web UI for basic remote administration capability. Third-party attackers who can reach an infected...

Customers

Newsletter