background preloader

Scan IP Addresses for Malicious Activity - IPVoid.com BETA

Scan IP Addresses for Malicious Activity - IPVoid.com BETA

Expat Shield Securing Your Linux Server by Jon Buys - Jun. 10, 2013Comments (3) Mark Kedgley has a succinct overview of recommended steps to take to harden a linux server over at Ezine Articles. The article is not all inclusive, but it does contain a fairly good summary. However, the steps recommended should not be taken lightly, and not without understanding exactly what the impact of the modifications will be. Mark lists nine steps in his recommend process: Account Policies Access Security Secure Boot Only Disable All Unnecessary Processes, Services and Daemons Restrict Permissions on Sensitive Files and Folders to root Only Disable SUID and SGID Binaries Implement Regular/Real-Time FIM on Sensitive Folders and Files Configure Auditing on the Linux Server General Hardening of Kernel Variables Access security recommendations are all sound, although I would further recommend thinking hard about the system architecture and asking yourself if secure shell access is absolutely required in production. Share Your Comments

Anonymous BitTorrent Services Simple download & install No records of usage stored 256-bit AES encryption Unlimited download speeds, 10Gbit servers VPN includes OpenVPN & PPTP Servers in Canada, Europe and Asia command line - Create default home directory for existing user in terminal How to foil the NSA and GCHQ with strong encryption "Ye are many - they are few." - Percy Bysshe Shelley THE MOST INTERESTING DEVICE shown at Mobile World Congress (MWC) in Barcelona this week was the secure Blackphone developed by Silent Circle and Geeksphone. The Blackphone features anonymous search, automatic disabling of non-trusted WiFi hotspots, and private texting, calling and file transfer capabilities. It's available to the general public, and bundles additional security features that apparently go beyond the basic messaging security provided by Blackberry to enterprise customers in its Blackberry Messaging (BBM) service. US-based aerospace and defence firm Boeing also unveiled its own Black phone - not to be confused with the Silent Circle and Geeksphone Blackphone - at MWC this week, but that appears to be restricted for sale only to government security agencies and defence industry customers, and therefore likely won't be available to the public through mobile operators or in retail shops.

The Complete Guide to "useradd" Command in Linux - 15 Practical Examples We all are aware about the most popular command called ‘useradd‘ or ‘adduser‘ in Linux. There are times when a Linux System Administrator asked to create user accounts on Linux with some specific properties, limitations or comments. In Linux, a ‘useradd‘ command is a low-level utility that is used for adding/creating user accounts in Linux and other Unix-like operating systems. The ‘adduser‘ is much similar to useradd command, because it is just a symbolic link to it. In some other Linux distributions, useradd command may comes with lightly difference version. I suggest you to read your documentation, before using our instructions to create new user accounts in Linux. When we run ‘useradd‘ command in Linux terminal, it performs following major things: It edits /etc/passwd, /etc/shadow, /etc/group and /etc/gshadow files for the newly created User account.Creates and populate a home directory for the new user.Sets permissions and ownerships to home directory. Basic syntax of command is: 1. 2.

6 Ways to Keep Your Search Secrets Safe It’s sad to say but many recent events (Google Search Subpoena, AOL’s BIG Mistake, etc) make it very clear that online your privates are not private anymore. I mean, do you really want people to know your secret love of fairies? Or worse? As disturbing, funny, and nutty some of those searches are one thing is pretty clear — people ran them in private. Luckily, you can go a long way to keeping your secret searches safe. Lost In The Crowd This site allows you to search your favorite engines while automatically mixing your searches with a large number of other searches essentially creating “search noise”. Hopefully these tools will help you improve your level of privacy online. Did I miss any good tools?

Set Up a VNC Linux Server in 5 Easy Steps Virtual Network Computing (VNC) allows you to log into a full desktop on a remote server (as opposed to just opening windows on your local machine, as with X11 over SSH). It can be very useful, and it's very fast to set up. Step 1 Tip of the Trade: VNC makes it easy to log into a full desktop on a remote server. Follow these steps, and your Debian Linux server will be up and running in no time. I chose to use vnc4 (there are other options, such as TightVNC), so the first step was the vnc4server Debian/Ubuntu package on my remote server. vncserver :1 This starts a daemon off, rather than vnc4 running in the foreground. Step 2 To kill the server again, use vncserver -kill :1 Step 3 You will probably want to edit the ~/.vnc/xstartup file to control which applications and window manager are kicked off at startup. To specify, comment out the x-window-manager line and add a line for your preferred session: xfce4-session & Step 4 ssh -f -N -L 5901:localhost:5901 user@yourserver.co.uk Step 5

How To Become A Hacker Copyright © 2001 Eric S. Raymond As editor of the Jargon File and author of a few other well-known documents of similar nature, I often get email requests from enthusiastic network newbies asking (in effect) "how can I learn to be a wizardly hacker?". Back in 1996 I noticed that there didn't seem to be any other FAQs or web documents that addressed this vital question, so I started this one. If you are reading a snapshot of this document offline, the current version lives at Note: there is a list of Frequently Asked Questions at the end of this document. Numerous translations of this document are available: ArabicBelorussianBulgarianChinese, Czech. The five-dots-in-nine-squares diagram that decorates this document is called a glider. If you find this document valuable, please support me on Patreon or SubscribeStar. The hacker mind-set is not confined to this software-hacker culture. If you want to be a hacker, keep reading. 1. 2. 3. 5. 2. 3.

Upgrade from Windows 8 Pledge to free a computer today! Here's some of the Windows 8 "features" Microsoft won't tell you about: Download the full infographic. Download as .svg. Translations of the infographic Microsoft wants to keep you locked in to Windows so that it can take your money, your personal data, and your user freedom. It is time to upgrade your computer, but not to Windows 8. Embed this image on your site* Citations: News and Blog Posts: Get Started with Free Software: Looking for a free software GNU/Linux distribution? Read more about switching to free software Did you receive a Trisquel GNU/Linux disk from us? *Estimate from Forbes.

Related: