Privacy & Cookies

This website uses cookies. By continuing to use this site you are agreeing to our use of cookies.

Security Articles [5]

  • How To Protect SSH With Two-Factor Authentication

    Introduction To protect your SSH server with an two-factor authentication, you can use the Google Authenticator PAM module. Every time you connect you have to enter the code from your smartphone. Attention: If you activate the google-authenticator for a normal user but not for root you can't login... continue reading
  • Basics of Intrusion Detection Systems

    Introduction Intrusion detection encompasses a range of security techniques designed to detect (and report) malicious system and network activity or to record evidence of intrusion. To understand intrusion detection one must fully understand what intrusion is. Webster's dictionary defines an intrusi... continue reading
  • Heartbleed, the door to secret communications

    What is Heartbleed? Heartbleed is the name that was given to a bug in OpenSSL. Do you remember Abhi's article? This is one of the many implementations for securing Internet communications. The name Heartbleed comes from the OpenSSL functionality that causes the bug, Heartbeat. What this does, basica... continue reading
  • What is SSL and how does it protect you online?

    What is SSL? SSL (Secure Sockets Layer) is a protocol that operates directly on top of TCP. Due to this higher layer protocols, such as HTTP, can continue to work unchanged while providing enhanced security. What protection is offered? When implemented correctly SSL disguises the contents of packet... continue reading
  • Password Generation and Safe Offline Storage

    1. Password generating How to generate the ultimate password and store it offline as safely as possible. ✔ Factors: ➲ values * charset: a-zA-Z0-9!@#$%... * alphabets: cyrillic, latin, hebrew, greek, syllabic etc. !NB Do not use alt symbols. They are often misread unsupported by most boards a... continue reading