Posted inComputer Security Miscellaneous Privacy – Carrier IQ fallout You are being watched! According to its website, Carrier IQ claims that its software is deployed in more… Posted by daniel December 7, 2011
Posted inComputer Security Most prevalent automated web app attacks Imperva (http://www.imperva.com ) isolated the four most prevalent Web application attacks: 1. Directory traversal = 37% 2. cross… Posted by daniel July 26, 2011
Posted inComputer Security How tos Linux Unblocking a host Is your firewall blocking connection from a host and still you want to unblock the IP address of… Posted by daniel November 24, 2010
Posted inComputer Security Linux Block a host Normally if you want to block all requests to and from an IP address, iptables is an ideal… Posted by daniel August 18, 2010
Posted inComputer Security Linux Handy commands -List files opened by a program listening on a certain port (lsof -i:port) -Benchmark the performance of a… Posted by daniel August 6, 2010
Posted inComputer Security Linux Configuring proftpd behind NAT If your ftp server is behind a NAT router, the regular ftps configuration steps you find in most… Posted by daniel May 9, 2010
Posted inComputer Security Linux Changing passphrase of a private key It is not advisable to use password based login for ssh any more. One of the most secure… Posted by daniel May 5, 2010
Posted inComputer Security West African country Cameroon has the riskiest domain Who would have thought, a country like Cameroon with barely 6 computers per 500 people (1.2 per 100… Posted by daniel May 1, 2010