
linuxsecured.net
ITSecAndrea Fabrizi's security blog
http://www.linuxsecured.net/
Andrea Fabrizi's security blog
http://www.linuxsecured.net/
TODAY'S RATING
>1,000,000
Date Range
HIGHEST TRAFFIC ON
Friday
LOAD TIME
0.3 seconds
16x16
32x32
64x64
128x128
Hotars Inc
Marco Nanni
R●a
R●a , Agrigento, 03012
Italy
View this contact
Hotars Inc
Andrea Fabrizi
R●a
R●a , IT, 03012
Italy
View this contact
Hotars Inc
Andrea Fabrizi
R●a
R●a , IT, 03012
Italy
View this contact
20
YEARS
9
MONTHS
7
DAYS
GODADDY.COM, LLC
WHOIS : whois.godaddy.com
REFERRED : http://registrar.godaddy.com
PAGES IN
THIS WEBSITE
0
SSL
EXTERNAL LINKS
0
SITE IP
104.27.131.40
LOAD TIME
0.342 sec
SCORE
6.2
ITSec | linuxsecured.net Reviews
https://linuxsecured.net
Andrea Fabrizi's security blog
Regan's fabulous honeypot website
Contact our Honeypot department. If you are desperate. To get blacklisted. Catch Me Honepot.
Linuxsecrets.com linux debian redhat ubuntu freebsd - Linuxsecrets
Forum Discussions - -. Linux Reviews - -. 2 Commands to Check Linux Application Ulimit. Sunday, 02 April 2017. Ulimit Command. The shell contains a built in command called "Ulimit" which allows you to display and set resource limits for users. The systems resources are defined in a file called "/etc/security/limits.conf". Ulimit can then be used to view these settings. Getting details for nginx. How to Configure Kernel for NVMe over Fabrics. Friday, 31 March 2017. Installing Caffe Deep Learning Framework.
Linux Security Guide
Sunday, December 7, 2008. Looking for the missing data in partition. Grep -a -B10 -A100 -i fibonacci /dev/hda2 fabonacci.out. A searching string fibonacci in partition /dev/hda2, it was in a deleted file. B you need a few Mbytes free on the partition while running this command. A treat device as a series of ASCII characters. BN before N line. AN after N line. Posted by Jephe Wu. Use Sleuth kit to recover deleted files. 1 install Sleuth , just make will do. Sleuth is great for recoving text files. Posted ...
LINUXSECURE
Issues on Linux and Security. Found some scripts on my workstation that have not been published and may be interesting for some people. Actually, I will not prepare them for publishing, but you can contact me, if you are interested in one or more of them. A logscanner and a scanner for the checkpoint objects file. A tool, that parses the registry of the genugate firewall and produces a more human readable output in html. A ftp-script for the honeynet. Various backupscripts in Perl and Bash. One of the tr...
linuxsecure.net | Registered at
Welcome to linuxsecure.net parking page. This domain has been registered at MrDomain. For more information, you can check the Whois for this domain. If you registered this domain, log in to your MrDomain account to start creating your website or customize this parking page. The displayed prices do not include the 21% VAT. Whois Privacy only available for specific domain extensions. Consult supported extensions at mrdomain.com/products/whoisprivacy/.
ITSec
IT security stuff and projects. Intercepting Android apps with burp suite. Bypassing the certificate pinning! Posted by Andrea Fabrizi on March 16, 2017. Luxembourg weather statistics and graphs using the Bresser sensors data. Posted by Andrea Fabrizi on September 28, 2016. Reverse engineer the radio protocol of the Bresser Weather Center sensor. Posted by Andrea Fabrizi on September 9, 2016. BASH script command line interface for Dropbox. Posted by Andrea Fabrizi on January 1, 2016. Older Posts →.
This Server is Working Fine
Your IP address is : 66.160.134.62. This Server is Working Fine.
امنیت سیستم های linux
امنیت سیستم های linux. منبع و جزوه دوره پیشرفته امنیت سیستم های لینوکس. مواردی مربوط به بهینه سازی و بالا رفتن کیفیت کار Squid با انتخاب سخت افزار مناسب. چهار عامل به طور کلی در انتخاب سخت افزارها مهم هستند :. نوشته شده در ۸۹/۰۳/۱۲ساعت 14:40 توسط مهیار تاج دینی. دانلود دیسک زنده فدورا 12. برای دانلود دیسک زنده لینوکس فدورا ۱۲ از لینک زیر استفاده کنید ضمن اینکه دقیقا ۷ روز آینده نسخه ۱۳ آن منتشر خواهد شد. Get Fedora 12 Desktop Edition Now. نوشته شده در ۸۹/۰۲/۲۹ساعت 11:21 توسط مهیار تاج دینی. DNS , Hostname.
Home - The Community's Center for Security
The central voice for Linux and Open Source security news. What is the most important Linux security technology? SUSE: 2018:0866-1: important: coreutils. Ubuntu 3617-2: Linux (HWE) vulnerabilities. Ubuntu 3617-1: Linux kernel vulnerabilities. Debian LTS: DLA-1339-1: openjdk-7 security update. SUSE: 2018:0863-1: important: clamav. SUSE: 2018:0861-1: important: libvirt. RedHat: RHSA-2018-0627:01 Important: Red Hat JBoss Enterprise Application. Linux Security Week: April 2nd, 2018. InfoSecurity - Posted by.
Default Web Site Page
If you are the owner of this website, please contact your hosting provider: webmaster@linuxsecurity.com.pe. It is possible you have reached this page because:. The IP address has changed. The IP address for this domain may have changed recently. Check your DNS settings to verify that the domain is set up correctly. It may take 8-24 hours for DNS changes to propagate. It may be possible to restore access to this site by following these instructions. For clearing your dns cache.
Securing and Hardening Linux | Tips and Howto Linux Security
Securing and Hardening Linux. BIOS Security, Password Protection, and Limiting Reboots. January 2, 2008. Most modern computer BIOSes allow the restriction of bootable devices and password protection for BIOS settings. Different systems use different keystrokes to enter into the BIOS setup but the common ones are the Del key for AMI BIOS, Ctrl Esc for Phoenix BIOS, and the F10 key for Compaq BIOS. (more…). Recently on Securing and Hardening Linux…. Disable Internet Daemon Services. December 22, 2007.
SOCIAL ENGAGEMENT