-
Recent Posts
- Experts devised a technique to bypass web application firewalls (WAF) of several vendorsSecurity Affairs
- Lapsus$ Extortion Group Claims Okta Hack, Microsoft Source Code Leak | WIRED
- 50% reduction in accounts being compromised with MFA
- Open source developer corrupts widely-used libraries, affecting tons of projects – The Verge
- 93% of tested networks are vulnerable to breach…
Categories
- Android (80)
- Android Apps (74)
- Apache (4)
- Arch (10)
- Bill 'em (2)
- CentOS (20)
- Cisco (2)
- Development (12)
- DevOps (3)
- Dominion Companion (15)
- Fedora (20)
- Good Shepherd Knights of Columbus (2)
- Good Shepherd Online App (2)
- GS Chinese Auction (2)
- Guides (52)
- Hacks (10)
- Harptabs.com (68)
- Harptabs.com Mobile App (26)
- Landscaper Tracker (1)
- Linux (80)
- myCookieFortune.com (3)
- Networking (8)
- News (182)
- Our Apps (58)
- Payup (1)
- PHP IP Logger (6)
- Security (20)
- Time Off Tracker (6)
- Website Loader (1)
- Websites (20)
- Windows (4)
Tags
android apps arch beta Bill 'em block bluetooth bug fix Captcha css dc delete development domain controller dominion companion downloader draft email flash FSMO hard disk harptabs Harptabs.com Harptabs.com Android App inode iptables linux Maintenance mobile mobile app mount pacman password photos PHP IP Logger QR security smartctl special character ssh terminal testing time off tracker update upgradeAds by Google
Join us on Facebook
Category Archives: CentOS
Tuning tmpfs filesystem /dev/shm for CentOS — centoshacker
I didn’t know that this was allocating ram like this… Tuning tmpfs filesystem /dev/shm for CentOS — centoshacker.
Posted in CentOS, News
Leave a comment
Limit Number of Connections from an IP
One of the problems you can sometimes face with a website is people mirroring your site or search bots excessively connecting to you. This is very easy to fix by limiting the number of connections an IP address is allowed … Continue reading
Posted in Apache, CentOS, Fedora
Tagged load balance, security, stop bots, wget block
Leave a comment
Stopping DOS Attacks with Mod_Evasive
DOS attacks are becoming very common these days. There are many different levels of DOS attack and monitoring your system and trying to prevent them all can be a full-time job. However for the causal user you can easily add some basic … Continue reading
Working with ISO from the Linux Command Line
If you have wondered how to create an iso from the command line, it is very simple. You just need to use the following commands: mkisofs -o <name of iso>.iso <directory to be iso> To burn an ISO from the … Continue reading
Unlock An Account
To unlock a user in Linux is quite easy you just need to run the following command: passwd -u <account> This will unlock the account which has expired, but if you have turned on the advanced PAM Account Auditing you will also need … Continue reading