Suppose that you are away from your home or work, and some issue happens suddenly with your server, or you want to test something on your server right now. You can use your blackberry device to reach your server from anywhere.
Continue reading SSH: A path from linux to linux using blackberry
Yearly Archives: 2009
How to activate automatic updates on Fedora 9-17
Now Fedora comes with “PackageKit”, a graphical tool for automated updates. However, the packagekit updates need the approval from the user and also a graphical interface.
Continue reading How to activate automatic updates on Fedora 9-17
Fedora 11 Review
Fedora 11 was released on date June 9, 2009 after a lot of delays caused by bugs in the installer. This new version of fedora is one of the best releases from fedora 1.
The main features are:
- 20 seconds boot
- EXT4 used by default
- Finger print reader capacity enabled on gdm and screen savers
- Fixes on QEMU and KVM integration
- Kernel 2.6.29 with 2.6.30 backport
- Realtime kernel feature, less battery consumption!
- AES-256 use with XTS-256 by default for whole hard drive cypher
- Yum presto (Delta RPMS)
- Per application independent volume control
- DNS Security
- Less memory consumption
- KDE 4.2 (Available from fedora 9 in updates)
- Firefox 3.5
Next… a review of these features…
Continue reading Fedora 11 Review
Installing NVIDIA on Fedora 11
This guide will enable you to configure your nvidia card on fedora 11 with 3d acceleration (64bit-version)
Continue reading Installing NVIDIA on Fedora 11
Speeding up or Securing up the Encrypted Root Filesystem on Fedora 10
Fedora, and some others Linux distributions doesn’t provide you any simple way to setup the cypher properties on root filesystem.
Here, we will provide you enough information about the cypher process on fedora and one technique to speed up and/or secure up the cypher using XTS instead CBC-ESSIV
Continue reading Speeding up or Securing up the Encrypted Root Filesystem on Fedora 10
Corporate LDAP Servers Weakness Statistics
Based in my securityfocus topic responce, and also in some information security audits that i’ve done, i think in the idea to statistical prove the attack risk level at some organization.
Number of accounts | Having almost one weak key probability |
10 | 0.401 – 40.1% |
25 | 0.722 – 72.2% |
50 | 0.923 – 92.3% |
100 | 0.994 – 99.4% |