Post tagged: security
This article is about erasing disc drives securely. Specially for SSD drives, writing zeros or random data to discs is not good enough and counterproductive.
One way to do secure erase (for disposal) is to begin with an encrypted disc. However, after the fact the following options are possible:
I made the switch to void linux. Except for compatibility
glibc, it works quite well. Most compatibility
I have worked around with a combination of
The high lights of void linux:
- musl build - which is very lightweigth
- Does not depend on
Keep your data and accounts safe by using a secure open source password manager to store unique, complex passwords.
Maintaining complex, unique passwords for each site and service you use is among the most common pieces of advice that security professionals provide to the public every year.
Yet no matter …
There are plenty of reasons why people would need to encrypt a partition. Whether they're rooted it in privacy, security, or confidentiality, setting up a basic encrypted partition on a Linux system is fairly easy. This is especially true when using LUKS, since its functionality is built directly into the …
Client connects > < server sends version string (Use 3.3 only) Client replies with actual verison string > < server sends security type; NONE Client send ClientInit (shared flag) > < sever sens ServerInit (server details) WxHxD Name === standard stuff ===
- unmodified vncviewer connects to a multiplexer screen
- server (in inetd mode …
Server patching is one of the important task of Linux system administrator to make the system more stable and better performance. All the vendors used to release security/vulnerabilities patches very often, the affected package must be updated in order to limit any potential security risks.
Writing shell scripts leaves a lot of room to make mistakes, in ways that will cause your scripts to break on certain input, or (if some input is untrusted) open up security vulnerabilities. Here are some tips on how to make your shell scripts safer.
The simplest step is …
Windows system administration is very mouse driven and to reach all tools you need to browse through Windows explorer.
If you are like me and prefer to log on a limited privilege account and use Runas to perform admin tasks, you can open these consoles with the .msc file names …
So I have signed up
0ink.net to use the CloudFlare service.
CloudFlare is a reverse proxy service that is supposed to speed up and improve web server security.
This is done by:
- globally distributed reverse proxy cache network
- filters incoming request for attacks
- optimize content (i.e. compressing, removing …
When using virtualisation it is very common to create template VMs that can be cloned from. This makes deployment much easier than having to install a new VM from scratch. Unfortunately, the cloned VMs lack any Active Directory memberships and the VMs have to be manually added to the AD …