Security Articles 
How To Protect SSH With Two-Factor Authentication
To protect your SSH server with an two-factor authentication, you can use the Google Authenticator PAM module.
Every time you connect you have to enter the code from your smartphone.
Attention: If you activate the google-authenticator for a normal user but not for root you can't login... continue reading
Basics of Intrusion Detection Systems
Intrusion detection encompasses a range of security techniques designed to detect (and report) malicious system and network activity or to record evidence of intrusion. To understand intrusion detection one must fully understand what intrusion is. Webster's dictionary defines an intrusi... continue reading
Heartbleed, the door to secret communications
What is Heartbleed?
Heartbleed is the name that was given to a bug in OpenSSL. Do you remember Abhi's article? This is one of the many implementations for securing Internet communications. The name Heartbleed comes from the OpenSSL functionality that causes the bug, Heartbeat. What this does, basica... continue reading
What is SSL and how does it protect you online?
What is SSL?
SSL (Secure Sockets Layer) is a protocol that operates directly on top of TCP. Due to this higher layer protocols, such as HTTP, can continue to work unchanged while providing enhanced security.
What protection is offered?
When implemented correctly SSL disguises the contents of packet... continue reading
Password Generation and Safe Offline Storage
1. Password generating
How to generate the ultimate password and store it offline as safely as possible.
* charset: a-zA-Z0-9!@#$%...
* alphabets: cyrillic, latin, hebrew, greek, syllabic etc.
!NB Do not use alt symbols. They are often misread unsupported by most boards a... continue reading