teknowledgy.blogspot.com
Teknowledgy: 02/01/2010 - 03/01/2010
http://teknowledgy.blogspot.com/2010_02_01_archive.html
Blending knowledge with technology. StrongSwan : A complete IPsec and IKEv1 implementation for Linux 2.4 and 2.6 kernels. Operating Systems : POSIX, Linux. Sshguard monitors services through their logging activit. BOUML : A UML 2 tool box that allows you to specify and generate code in C , Java, IDL, and PHP. Electronic Design Automation (EDA). Babel Router: A distance-vector routing protocol for IPv6 and IPv4. Operating Systems Mac OS X POSIX Linux. 標籤: Artificial Intelligence. Licenses : BSD Revised GPL.
mlohr.de
Eine kleine Einführung in das Betreiben eines eigenen Servers
http://mlohr.de/blog/computer-co/123-eine-kleine-einfuehrung-in-das-betreiben-eines-eigenen-servers
Eine kleine Einführung in das Betreiben eines eigenen Servers. Veröffentlicht: 30. Januar 2014. Im Zuge der ganzen Enthüllungen von Edward Snowden. Ist die Sensibität diesbezüglich stark gewachsen. Immer weniger Menschen möchten ihre persönlichen und (höchst-)sensiblen Daten " Clouds. Mit unbekannten Zugriffsmöglichkeiten Dritter überlassen. Konsequenterweise müssen diese Dienste durch einen eigenen Server. Account, sondern das " sudo. System besitzen, muss der Befehl "sudo" vorangestellt werden. Bei Lin...
elarraydejota.com
Seguridad | El array de Jota
http://www.elarraydejota.com/category/seguridad
El array de Jota. Bits, Linux, Debian, scripting, middleware, administración de sistemas. Política de cookies y privacidad. Artículos sobre seguridad informática: securización de sistemas operativos, servidores de aplicaciones/web, firewalls, IDS…. Comienza el lento declive del algoritmo SHA-1. Hace tiempo que se trató. En el blog el tema de los algoritmos MD5, SHA-1, SHA-2… Tras conocerse. Recientemente la primera colisión de hash del algoritmo SHA-1. Continue reading →. February 28, 2017. Vamos a repro...
fabienduchene.blogspot.com
Fabien's IT security diary: December 2009
http://fabienduchene.blogspot.com/2009_12_01_archive.html
Fabien's IT security diary. Monday, December 21, 2009. VHD to WIM: from virtual machine to WIM deployment. A lot of topics discuss about the process of converting VIM files to VHD, but very few about VHD to WIM. Virtual Hard Disk (.vhd) is the file format of virtual machines hard disk drives. Connectix and Microsoft are currently using this technology. You can check the Virtual Hard Disk Image Format Specification. 1/ prepare the virtual machine master. Install the OS, the program you want to use. Click ...
teknowledgy.blogspot.com
Teknowledgy: 09/01/2009 - 10/01/2009
http://teknowledgy.blogspot.com/2009_09_01_archive.html
Blending knowledge with technology. BOUML : A UML 2 tool box that allows you to specify and generate code in C , Java, IDL, and PHP. 標籤: Code Generators. Electronic Design Automation (EDA). The Drizzle project : Building a database optimized for Cloud and Net applications. Project is building a database optimized for Cloud and Net applications. It is being designed for massive concurrency on modern multi-CPU/core architectures. The code is originally derived from MySQL. 標籤: Database Engines/Servers.
irrexpr.com
Irregular Expressions: September 2012
http://www.irrexpr.com/2012_09_01_archive.html
S/ w a i/ t e/. Friday, September 28, 2012. Login Attempts from the Wild 'Net. So, I've had a box with an ssh port exposed to the Internet for a month or two, now. In that time, I've logged 15947 failed connection attempts to the server. Some of them are legitimate, me just mistyping a password (2 to my user, probably a couple oopses from me on root). Using lastb, I can see the last failed attempts to the host. Looking at the list of users (and number of attempts) that people tried to log in as. I was lo...
liquidstate.net
Stop Brute-force attacks using IPTables
https://www.liquidstate.net/stop-brute-force-attacks-using-iptables
Stop Brute-force attacks using IPTables. There's quite a few dedicates bits of software like SSHGuard. That will monitor your server logs looking for suspicious activity and then block the source IP - usually though a host-based firewall. They're all fine bits of software, but basic throttling of connections is usually enough to stop a brute-force attack and it can be acheived with five commands and the firewall that is built into the kernel. Meaning there's no log files for these programs to read! If we...
howtoforge.com
Preventing Brute Force Attacks With Fail2ban On Debian Etch
https://www.howtoforge.com/fail2ban_debian_etch
Log in or Sign up. Preventing Brute Force Attacks With Fail2ban On Debian Etch. Have an app idea and want to see if it'll fly? Preventing Brute Force Attacks With Fail2ban On Debian Etch. Preventing Brute Force Attacks With Fail2ban On Debian Etch. In this article I will show how to install and configure fail2ban. This document comes without warranty of any kind! Fail2ban is similar to DenyHosts. To block IP addresses/hosts, fail2ban uses iptables. Fail2ban can be installed as follows on Debian Etch:.
freebsdnews.com
FreeBSD: Block Brute-Force Attacks Using Sshguard and IPFW Firewall - FreeBSDNews.com
https://www.freebsdnews.com/2015/08/07/freebsd-block-brute-force-attacks-sshguard-ipfw-firewall
FreeBSD: Block Brute-Force Attacks Using Sshguard and IPFW Firewall. August 7, 2015. This tutorial by user Babaei shows us how to block brute-force attacks with Sshguard and IPFW firewall on FreeBSD. Original: http:/ www.babaei.net/blog/2015/07/30/freebsd-block-brute-force-attacks-using-sshguard-and-ipfw-firewall/. There is an old saying that the only safe computer is one that’s disconnected from the network, turned off, and locked in an underground bunker and even then you can’t be sure! 8216;s fork ...
dargers.com
Torstens Lesezeichen - The Dargers Family
http://www.dargers.com/index.php/Torstens_Lesezeichen
User X-Session als root. Samsung 315W Farbkorrektur beim Farblaser. Hier sind nur einige sehr spezielle Lesezeichen. Das ist sicherlich nicht der durchschnittliche Geschmack des einfachen Benutzers, aber vielleicht ist ja was Interessantes für Euch dabei. Tails (Live USB OS). Ssh with google authenticator. Small to Medium Business. Ja, liebe Rechtsprecher, so ein Quark kommt heraus, wenn man einige interessante Urteile zu Internet Links liest. User X-Session als root. Dann ist diese Seite verschlüsselt.