background preloader

Scan IP Addresses for Malicious Activity - IPVoid.com BETA

Scan IP Addresses for Malicious Activity - IPVoid.com BETA

How to foil the NSA and GCHQ with strong encryption "Ye are many - they are few." - Percy Bysshe Shelley THE MOST INTERESTING DEVICE shown at Mobile World Congress (MWC) in Barcelona this week was the secure Blackphone developed by Silent Circle and Geeksphone. The Blackphone features anonymous search, automatic disabling of non-trusted WiFi hotspots, and private texting, calling and file transfer capabilities. It's available to the general public, and bundles additional security features that apparently go beyond the basic messaging security provided by Blackberry to enterprise customers in its Blackberry Messaging (BBM) service. US-based aerospace and defence firm Boeing also unveiled its own Black phone - not to be confused with the Silent Circle and Geeksphone Blackphone - at MWC this week, but that appears to be restricted for sale only to government security agencies and defence industry customers, and therefore likely won't be available to the public through mobile operators or in retail shops.

Securing Your Linux Server by Jon Buys - Jun. 10, 2013Comments (3) Mark Kedgley has a succinct overview of recommended steps to take to harden a linux server over at Ezine Articles. The article is not all inclusive, but it does contain a fairly good summary. However, the steps recommended should not be taken lightly, and not without understanding exactly what the impact of the modifications will be. Mark lists nine steps in his recommend process: Account Policies Access Security Secure Boot Only Disable All Unnecessary Processes, Services and Daemons Restrict Permissions on Sensitive Files and Folders to root Only Disable SUID and SGID Binaries Implement Regular/Real-Time FIM on Sensitive Folders and Files Configure Auditing on the Linux Server General Hardening of Kernel Variables Access security recommendations are all sound, although I would further recommend thinking hard about the system architecture and asking yourself if secure shell access is absolutely required in production. Share Your Comments

How To Become A Hacker Copyright © 2001 Eric S. Raymond As editor of the Jargon File and author of a few other well-known documents of similar nature, I often get email requests from enthusiastic network newbies asking (in effect) "how can I learn to be a wizardly hacker?". Back in 1996 I noticed that there didn't seem to be any other FAQs or web documents that addressed this vital question, so I started this one. If you are reading a snapshot of this document offline, the current version lives at Note: there is a list of Frequently Asked Questions at the end of this document. Numerous translations of this document are available: ArabicBelorussianBulgarianChinese, Czech. The five-dots-in-nine-squares diagram that decorates this document is called a glider. If you find this document valuable, please support me on Patreon or SubscribeStar. The hacker mind-set is not confined to this software-hacker culture. If you want to be a hacker, keep reading. 1. 2. 3. 5. 2. 3.

command line - Create default home directory for existing user in terminal The Complete Guide to "useradd" Command in Linux - 15 Practical Examples We all are aware about the most popular command called ‘useradd‘ or ‘adduser‘ in Linux. There are times when a Linux System Administrator asked to create user accounts on Linux with some specific properties, limitations or comments. In Linux, a ‘useradd‘ command is a low-level utility that is used for adding/creating user accounts in Linux and other Unix-like operating systems. The ‘adduser‘ is much similar to useradd command, because it is just a symbolic link to it. In some other Linux distributions, useradd command may comes with lightly difference version. I suggest you to read your documentation, before using our instructions to create new user accounts in Linux. When we run ‘useradd‘ command in Linux terminal, it performs following major things: It edits /etc/passwd, /etc/shadow, /etc/group and /etc/gshadow files for the newly created User account.Creates and populate a home directory for the new user.Sets permissions and ownerships to home directory. Basic syntax of command is: 1. 2.

Set Up a VNC Linux Server in 5 Easy Steps Virtual Network Computing (VNC) allows you to log into a full desktop on a remote server (as opposed to just opening windows on your local machine, as with X11 over SSH). It can be very useful, and it's very fast to set up. Step 1 Tip of the Trade: VNC makes it easy to log into a full desktop on a remote server. Follow these steps, and your Debian Linux server will be up and running in no time. I chose to use vnc4 (there are other options, such as TightVNC), so the first step was the vnc4server Debian/Ubuntu package on my remote server. vncserver :1 This starts a daemon off, rather than vnc4 running in the foreground. Step 2 To kill the server again, use vncserver -kill :1 Step 3 You will probably want to edit the ~/.vnc/xstartup file to control which applications and window manager are kicked off at startup. To specify, comment out the x-window-manager line and add a line for your preferred session: xfce4-session & Step 4 ssh -f -N -L 5901:localhost:5901 user@yourserver.co.uk Step 5

Upgrade from Windows 8 Pledge to free a computer today! Here's some of the Windows 8 "features" Microsoft won't tell you about: Download the full infographic. Download as .svg. Translations of the infographic Microsoft wants to keep you locked in to Windows so that it can take your money, your personal data, and your user freedom. It is time to upgrade your computer, but not to Windows 8. Embed this image on your site* Citations: News and Blog Posts: Get Started with Free Software: Looking for a free software GNU/Linux distribution? Read more about switching to free software Did you receive a Trisquel GNU/Linux disk from us? *Estimate from Forbes. Linux Now Has "Double" the Market Share of Windows Statistics are a matter of your viewpoint. If you consider NetApplications' data set, then Linux owns only about 1 percent of the desktop OS market and Windows has almost 92 percent. But if you consider all computing platforms, including mobile, than Windows has only 20 percent and Linux has 42 percent - and that would be in the form of Google's Android alone. Goldman Sachs recently published a chart which shows the shift from Microsoft's 95 percents hare of the computing platform market in 2004, when PCs dominated the computing landscape, to just 20 percent in 2012. Much of those projections are based on crystal ball evaluations and depend especially on Microsoft's ability to establish Windows Phone and Windows RT against Android an iOS. Contact Us for News Tips, Corrections and Feedback

I Ditched Windows...and, So Can You I've suffered slow computer performance, system crashes, and inexplicable Internet outages for 10 long years. I officially ditched Windows two weeks ago...and, so can you. Long story short, I decided to find another operating system and my first attempt was Linux, the free, open-source operative system (for those of you unfamiliar with Open Source operating systems: show me). Linux: The Good, the Bad, and The Verdict The Good – The transfer to and installation of Ubuntu Linux was shockingly easy and refreshingly seamless. The Bad – I still need Windows for a few programs. The Verdict – Linux serves 90% of my computer needs. Why Didn't I go Mac? 1). 2). 3). So, if you’re using Windows and want to ditch it, click here to begin a less stressful life Gregory Ferenstein

Related: