How to foil the NSA and GCHQ with strong encryption "Ye are many - they are few." - Percy Bysshe Shelley THE MOST INTERESTING DEVICE shown at Mobile World Congress (MWC) in Barcelona this week was the secure Blackphone developed by Silent Circle and Geeksphone. The Blackphone features anonymous search, automatic disabling of non-trusted WiFi hotspots, and private texting, calling and file transfer capabilities. It's available to the general public, and bundles additional security features that apparently go beyond the basic messaging security provided by Blackberry to enterprise customers in its Blackberry Messaging (BBM) service. US-based aerospace and defence firm Boeing also unveiled its own Black phone - not to be confused with the Silent Circle and Geeksphone Blackphone - at MWC this week, but that appears to be restricted for sale only to government security agencies and defence industry customers, and therefore likely won't be available to the public through mobile operators or in retail shops.
DNSBL Information - Spam Database and Blacklist Check Securing Your Linux Server by Jon Buys - Jun. 10, 2013Comments (3) Mark Kedgley has a succinct overview of recommended steps to take to harden a linux server over at Ezine Articles. The article is not all inclusive, but it does contain a fairly good summary. However, the steps recommended should not be taken lightly, and not without understanding exactly what the impact of the modifications will be. Mark lists nine steps in his recommend process: Account Policies Access Security Secure Boot Only Disable All Unnecessary Processes, Services and Daemons Restrict Permissions on Sensitive Files and Folders to root Only Disable SUID and SGID Binaries Implement Regular/Real-Time FIM on Sensitive Folders and Files Configure Auditing on the Linux Server General Hardening of Kernel Variables Access security recommendations are all sound, although I would further recommend thinking hard about the system architecture and asking yourself if secure shell access is absolutely required in production. Share Your Comments
How To Become A Hacker Copyright © 2001 Eric S. Raymond As editor of the Jargon File and author of a few other well-known documents of similar nature, I often get email requests from enthusiastic network newbies asking (in effect) "how can I learn to be a wizardly hacker?". Back in 1996 I noticed that there didn't seem to be any other FAQs or web documents that addressed this vital question, so I started this one. If you are reading a snapshot of this document offline, the current version lives at Note: there is a list of Frequently Asked Questions at the end of this document. Numerous translations of this document are available: ArabicBelorussianBulgarianChinese, Czech. The five-dots-in-nine-squares diagram that decorates this document is called a glider. If you find this document valuable, please support me on Patreon or SubscribeStar. The hacker mind-set is not confined to this software-hacker culture. If you want to be a hacker, keep reading. 1. 2. 3. 5. 2. 3.
tools:ipv4_route_servers [BGP4.net] IPv4 Route Servers, listed by ASN. (An IPv6 Route Servers page is also available.) If you know of a working IPv4 route server that isn't listed below, feel free to add it. (Don't have a wiki account yet? Please correct any errors you find on this list. Use the URL if you wish to link to this page. Now that you've finished looking at this page, you may find the rest of the wiki interesting. command line - Create default home directory for existing user in terminal DNS Propagation Checker The Complete Guide to "useradd" Command in Linux - 15 Practical Examples We all are aware about the most popular command called ‘useradd‘ or ‘adduser‘ in Linux. There are times when a Linux System Administrator asked to create user accounts on Linux with some specific properties, limitations or comments. In Linux, a ‘useradd‘ command is a low-level utility that is used for adding/creating user accounts in Linux and other Unix-like operating systems. The ‘adduser‘ is much similar to useradd command, because it is just a symbolic link to it. In some other Linux distributions, useradd command may comes with lightly difference version. I suggest you to read your documentation, before using our instructions to create new user accounts in Linux. When we run ‘useradd‘ command in Linux terminal, it performs following major things: It edits /etc/passwd, /etc/shadow, /etc/group and /etc/gshadow files for the newly created User account.Creates and populate a home directory for the new user.Sets permissions and ownerships to home directory. Basic syntax of command is: 1. 2.
NTRadPing 1.5 RADIUS Test Utility - Micro Focus Community - 1777768 Arndt Stajta wrote: I found this tool mentioned in TID-10078616. published with permission of mastersoft-group Copy NTRADPING.EXE and RADDICT.DAT files to a folder, then run NTRADPING.EXE. NTRadPing is a useful tool for testing installations of your RADIUS servers. Through NTRadPing you can simulate authentication and accounting requests and send them to the RADIUS server making NTRadPing act as a NAS client. Before you send the request to the server, you need to configure the server IP address, the RADIUS secret key stored in the server clients file, and a username. All the other parameters are optional. On accounting requests, the "Acct-Session-Id" attribute is also added automatically if you do not explicitly enter it in the request attribute list. If you issue an accounting request, then the RADIUS attribute "Acct-Status-Type" is added automatically by NTRadPing depending on the type of accounting request you have chosen (start, stop or update).
Set Up a VNC Linux Server in 5 Easy Steps Virtual Network Computing (VNC) allows you to log into a full desktop on a remote server (as opposed to just opening windows on your local machine, as with X11 over SSH). It can be very useful, and it's very fast to set up. Step 1 Tip of the Trade: VNC makes it easy to log into a full desktop on a remote server. Follow these steps, and your Debian Linux server will be up and running in no time. I chose to use vnc4 (there are other options, such as TightVNC), so the first step was the vnc4server Debian/Ubuntu package on my remote server. vncserver :1 This starts a daemon off, rather than vnc4 running in the foreground. Step 2 To kill the server again, use vncserver -kill :1 Step 3 You will probably want to edit the ~/.vnc/xstartup file to control which applications and window manager are kicked off at startup. To specify, comment out the x-window-manager line and add a line for your preferred session: xfce4-session & Step 4 ssh -f -N -L 5901:localhost:5901 user@yourserver.co.uk Step 5