-
Recent Posts
- Experts devised a technique to bypass web application firewalls (WAF) of several vendorsSecurity Affairs
- Lapsus$ Extortion Group Claims Okta Hack, Microsoft Source Code Leak | WIRED
- 50% reduction in accounts being compromised with MFA
- Open source developer corrupts widely-used libraries, affecting tons of projects – The Verge
- 93% of tested networks are vulnerable to breach…
Categories
- Android (80)
- Android Apps (74)
- Apache (4)
- Arch (10)
- Bill 'em (2)
- CentOS (20)
- Cisco (2)
- Development (12)
- DevOps (3)
- Dominion Companion (15)
- Fedora (20)
- Good Shepherd Knights of Columbus (2)
- Good Shepherd Online App (2)
- GS Chinese Auction (2)
- Guides (52)
- Hacks (10)
- Harptabs.com (68)
- Harptabs.com Mobile App (26)
- Landscaper Tracker (1)
- Linux (80)
- myCookieFortune.com (3)
- Networking (8)
- News (182)
- Our Apps (58)
- Payup (1)
- PHP IP Logger (6)
- Security (20)
- Time Off Tracker (6)
- Website Loader (1)
- Websites (20)
- Windows (4)
Tags
android apps arch beta Bill 'em block bluetooth bug fix Captcha css dc delete development domain controller dominion companion downloader draft email flash FSMO hard disk harptabs Harptabs.com Harptabs.com Android App inode iptables linux Maintenance mobile mobile app mount pacman password photos PHP IP Logger QR security smartctl special character ssh terminal testing time off tracker update upgradeAds by Google
Join us on Facebook
Tag Archives: security
Stopping DOS Attacks with Mod_Evasive
DOS attacks are becoming very common these days. There are many different levels of DOS attack and monitoring your system and trying to prevent them all can be a full-time job. However for the causal user you can easily add some basic … Continue reading
Unlock An Account
To unlock a user in Linux is quite easy you just need to run the following command: passwd -u <account> This will unlock the account which has expired, but if you have turned on the advanced PAM Account Auditing you will also need … Continue reading
Linux File Permissions
When you are first starting out using Linux, file permissions while being an easy concept to understand seem like they are very hard to setup. Most of the time you will see a three digit number which “magically” will determine what the permissions are … Continue reading
Mounting folders through SSH
One of the first rules of security is to not have any ports open which you do not need to have open. That is also pretty common sense. One problem you run into though is you still need to access … Continue reading
Setting a Lock-out Policy
Setting a lock out policy in CentOS or Fedora is very easy. edit /etc/pam.d/system-auth auth required pam_tally.so onerr=fail no_magic_root account required pam_tally.so deny=3 unlock_time=3600 no_magic_root reset onerr=fail if there is a problem opening the file for some reason fail login no_magic_root … Continue reading