A quick blog post about an issue I faced this morning. While drinking my morning coffee and reviewing what happened during the last night in my logs, I detected that one of my website (leakedin.com) was entirely mirrored by a guy from Brazil. I’m not against sharing information but in this case,
Category: Linux
Checking Reverse Dependencies in Linux
All modern Unix operating systems provide softwares as packages. I remember the good old times in the ’90s when you had to compile all the applications from their source code. Compiling source code has advantages: you enable only the features you need and perform configuration tweaks as you want. But
Iptables Logs Mapping on GoogleMaps
My Linux servers are all protected by a local iptables firewall. This is an excellent firewall which implements all the core features that we are expecting from a decent firewall system. Except… logging and reporting! By default, iptables send its logs using the kernel logging facilities. Those can be intercepted
Hello Karmic Koala!
Finally, I did it! I just upgraded my corporate laptop with the latest release of Ubuntu (9.10) aka “Karmic Koala”. Available for a few weeks, I preferred to wait for some holidays before the upgrade. First, because without laptop, I can’t work! In case of big issue, my off-days would
Strong Authentication with Linux
Next step in my investigations to implement a strong authentication process on my Linux laptop using the Yubikey. In a previous post, I explained how to use a Yubikey to authenticate on Linux with a PAM module. It works very well but, like I said in the previous article conclusion,
Yubikey Authentication on Linux
In a previous article, I presented the Yubikey product. I also explained why, for security reasons, the usage of two separate Yubikeys could be a plus. One converted to provide a static password and the second left as is (to provide one-time passwords). I received my 2nd Yubikey a few
New Corporate Laptop Setup
I got my new corporate laptop today, a Dell Latitude E6500, very nice computer. Working as a security consultant, I’m always on the road, connecting my laptop on customers or evil (free Wi-Fi access point or conference) networks . Fortunately, my company allows consultants, if they want, to manage their
Use your GFX Memory as Swap
Modern graphics cards are now today with plenty of RAM. This memory has a very high throughput. If you don’t run a big X11 environment, why not dedicate this memory to another purpose? Swap space by example! Check out: http://gentoo-wiki.com/TIP_Use_memory_on_video_card_as_swap.
ext3cow
How do you manage your files versions? Let’s imagine a source file ‘foo.c’. You work on it and would like to revert to a previous version. You have several choices: Use a CVS system: CVS, subversion, … Use naming convention: ‘foo.c-YYYYMMDD-VERSION-user’ Now, you can use ext3cow, a versioning file system
Fedora Core 6 Test 1 (5.90) Now Available
Why “5.90” as release name? No idea.. Here is the official schedule.