I’ve always used Fedora, basically since it was RedHat 7.0 … However, from that time until now, it has changed a lot.
Category Archives: System Administration
How to price a pentest
Penetration testing and vulnerability assesment is a practice that every day becomes more important to our businesses. Today we need to make security stress tests in order to discover potential vulnerabilities that may exist in our systems.
Alice and bob are no longer online
In the past few years Diffie-Hellman has become unsupported in the main internet websites, do you know the implications?
But this is not the only thing happening, many reputable websites, including banks, social networks and search engines have chosen to continue to support for TLSv1.0 and SSLv2 “for compatibility reasons”
SSH: A path from linux to linux using blackberry
Suppose that you are away from your home or work, and some issue happens suddenly with your server, or you want to test something on your server right now. You can use your blackberry device to reach your server from anywhere.
Continue reading SSH: A path from linux to linux using blackberry
How to activate automatic updates on Fedora 9-17
Now Fedora comes with “PackageKit”, a graphical tool for automated updates. However, the packagekit updates need the approval from the user and also a graphical interface.
Continue reading How to activate automatic updates on Fedora 9-17
Installing NVIDIA on Fedora 11
This guide will enable you to configure your nvidia card on fedora 11 with 3d acceleration (64bit-version)
Continue reading Installing NVIDIA on Fedora 11
Speeding up or Securing up the Encrypted Root Filesystem on Fedora 10
Fedora, and some others Linux distributions doesn’t provide you any simple way to setup the cypher properties on root filesystem.
Here, we will provide you enough information about the cypher process on fedora and one technique to speed up and/or secure up the cypher using XTS instead CBC-ESSIV
Continue reading Speeding up or Securing up the Encrypted Root Filesystem on Fedora 10
Corporate LDAP Servers Weakness Statistics
Based in my securityfocus topic responce, and also in some information security audits that i’ve done, i think in the idea to statistical prove the attack risk level at some organization.
Number of accounts | Having almost one weak key probability |
10 | 0.401 – 40.1% |
25 | 0.722 – 72.2% |
50 | 0.923 – 92.3% |
100 | 0.994 – 99.4% |
Configuring single click on KDE4 icons
Maybe you are trying to move to KDE4 and you were get used to use single click to select and double click to open…
However, the original configuration of KDE4, uses the single click to open some file, that could be nasty to people who don’t like it.
Continue reading Configuring single click on KDE4 icons