I despise restrictions on content. I believe that information shouldn't be restricted to location. I will walk you step by step so you can achieve the same, the instructions will be done on an Ubuntu system.
Step 1:
If you don't know which codename of Ubuntu that you are using type:
lsb_release -c
Then add this line to your...
How to watch the BBC outside of the UK (Updated version)
This is an update to an older post. The main difference is the UK exit nodes have been updated to ones that are currently working and are faster. This is a step by step instructions done on Ubuntu so any Debian flavor system shall work as well.
Step 1:
If you don't know which codename of Ubuntu that you are using type:
lsb_release -c
Then add this line to your /etc/apt/sources.list file:
deb http://deb.torproject.org/torproject.org distribution...
Saturday, February 19, 2011
How To Restore Grub2 In Debian Based Systems
Sometimes we get curious or need curtain features and install other systems on our computers. The problem that we run into is that it will trash the way we boot them. It is ever easy to get Grub2 to back to the state it was.
You will need a LIVE cd if you are going to recover Grub2. I will be using an Ubuntu disk for this step...
Wednesday, November 3, 2010
Stuxnet Virus Worm - Cyber Attack False Flag by Iran
I got this from Study4cyberwar. This site is dedicated to cyberwar information. They have some good information to keep you updat...
Sunday, June 20, 2010
Using ClamAV to Protect Your Windows Clients
ClamAV can scan incoming emails and you also can configure Squid web proxy to use ClamAV as well. One of the coolest options is that Samba can be configured to use ClamAv to scan files when they are accessed. Note: Using ClamAV on your Linux servers to sanitize oncoming data to filter email and HTTP traffic won't make you completely...
Wednesday, May 12, 2010
Controlling login attempts with PAM (Pluggable Authentication Module)
It is generally a good and sensible practice to lock out a user after a number of failed login attempts, with some exceptions. You don't want to give an intruder unlimited attempts, but you don't want clumsy users pestering you all the time for login resets. And users who wish to play practical jokes locking out other users by trying...
Working with User and Group Management
Group Commands
Group definitions reside in the /etc/group file. A standard Linux /etc/group file contains the following information: groupname:x:groupid:user list.
The “x” in the group definition file is a deprecated placeholder for a group password.
To find out which groups you belong to, type groups at a command prompt.
$...
Subscribe to:
Posts (Atom)