How to watch the BBC outside of the UK (Updated version)

This is an update to an older post. The main difference is the UK exit nodes have been updated to ones that are currently working and are faster. This is a step by step instructions done on Ubuntu so any Debian flavor system shall work as well. Step 1: If you don't know which codename of Ubuntu that you are using type: lsb_release -c Then add this line to your /etc/apt/sources.list file: deb http://deb.torproject.org/torproject.org distribution...
Read More

Friday, March 18, 2011

How to watch the BBC outside of the UK (Old see updated version)

I despise restrictions on content. I believe that information shouldn't be restricted to location. I will walk you step by step so you can achieve the same, the instructions will be done on an Ubuntu system. Step 1: If you don't know which codename of Ubuntu that you are using type: lsb_release -c Then add this line to your...
Read more

Saturday, February 19, 2011

How To Restore Grub2 In Debian Based Systems

Sometimes we get curious or need curtain features and install other systems on our computers. The problem that we run into is that it will trash the way we boot them. It is ever easy to get Grub2 to back to the state it was. You will need a LIVE cd if you are going to recover Grub2. I will be using an Ubuntu disk for this step...
Read more

Wednesday, November 3, 2010

Stuxnet Virus Worm - Cyber Attack False Flag by Iran

I got this from Study4cyberwar. This site is dedicated to cyberwar information. They have some good information to keep you updat...
Read more

Sunday, June 20, 2010

Using ClamAV to Protect Your Windows Clients

ClamAV can scan incoming emails and you also can configure Squid web proxy to use ClamAV as well. One of the coolest options is that Samba can be configured to use ClamAv to scan files when they are accessed. Note: Using ClamAV on your Linux servers to sanitize oncoming data to filter email and HTTP traffic won't make you completely...
Read more

Wednesday, May 12, 2010

Controlling login attempts with PAM (Pluggable Authentication Module)

It is generally a good and sensible practice to lock out a user after a number of failed login attempts, with some exceptions. You don't want to give an intruder unlimited attempts, but you don't want clumsy users pestering you all the time for login resets. And users who wish to play practical jokes locking out other users by trying...
Read more

Working with User and Group Management

Group Commands Group definitions reside in the /etc/group file. A standard Linux /etc/group file contains the following information: groupname:x:groupid:user list. The “x” in the group definition file is a deprecated placeholder for a group password. To find out which groups you belong to, type groups at a command prompt. $...
Read more
 

Shaun Mallette's Blog Design by Insight © 2009