Explore >> Select a destination


You are here

johnjhacking.com
| | www.wired.com
4.7 parsecs away

Travel
| | Plus: The US Marshals disclose a "major" cybersecurity incident, T-Mobile has gotten pwned so much, and more.
| | www.anvilsecure.com
4.2 parsecs away

Travel
| | This blog post is for the ambitious network administrator who has been promoted to head of information security and wants to demonstrably improve the organization's security in the first 90 days or so. I will talk about how to leverage your existing network administration knowledge...
| | materials.rangeforce.com
12.2 parsecs away

Travel
| | SSH (secure shell) is a widely-used protocol for remote administration of Unix and Linux servers. The default configuration of many SSH server implementations includes several potentially-insecure settings so as to maintain compatibility with outdated client software. The ssh-audit tool can be used to check the server settings and recommend changes so as to improve security.
| | gabevenberg.com
24.9 parsecs away

Travel
| I've been using Arch Linux for several years now. Of course, my first installs were... blunderous, as i wanted to do full disk encryption from the get-go, and I didn't know what I was doing. After those first one or two installs, I generally settled on LVM on LUKS with a GRUB bootloader and my swap on an LVM volume, mostly because it makes it much easier to setup hibernation/suspend to disk vs, say, a swap file.