|
You are here |
johnjhacking.com | ||
| | | | |
www.wired.com
|
|
| | | | | Plus: The US Marshals disclose a "major" cybersecurity incident, T-Mobile has gotten pwned so much, and more. | |
| | | | |
www.anvilsecure.com
|
|
| | | | | This blog post is for the ambitious network administrator who has been promoted to head of information security and wants to demonstrably improve the organization's security in the first 90 days or so. I will talk about how to leverage your existing network administration knowledge... | |
| | | | |
materials.rangeforce.com
|
|
| | | | | SSH (secure shell) is a widely-used protocol for remote administration of Unix and Linux servers. The default configuration of many SSH server implementations includes several potentially-insecure settings so as to maintain compatibility with outdated client software. The ssh-audit tool can be used to check the server settings and recommend changes so as to improve security. | |
| | | | |
gabevenberg.com
|
|
| | | I've been using Arch Linux for several years now. Of course, my first installs were... blunderous, as i wanted to do full disk encryption from the get-go, and I didn't know what I was doing. After those first one or two installs, I generally settled on LVM on LUKS with a GRUB bootloader and my swap on an LVM volume, mostly because it makes it much easier to setup hibernation/suspend to disk vs, say, a swap file. | ||