Search:

Type: Posts; User: CandidMan; Keyword(s):

Page 1 of 5 1 2 3 4

Search: Search took 0.01 seconds.

  1. Replies
    26
    Views
    1,212

    [ubuntu] Re: Best SSH Login Strategy

    That's a good point, I assumed that like the originating IP address, the MAC address would remain intact. There was some trouble logging in and it could be attributable to that.
    I can think of a...
  2. Replies
    26
    Views
    1,212

    [ubuntu] Re: Best SSH Login Strategy

    At one point I had iptables set up to only accept ssh traffic to a server from a specific MAC address, that combined with ssh key authentication I felt was a pretty sensible set up.

    Only, just...
  3. Replies
    67
    Views
    4,018

    [ubuntu] Re: Trojan redirects me

    I would add to the already good advice that it's meaningless to continually re-format your drive; software isn't like a stain or chemical. You can't 'scrub' it out, it's either recognized by your...
  4. Replies
    3
    Views
    1,094

    [ubuntu] Re: Decent IP blocker for Linux?

    My first thought would be to use iptables, but how many IP addresses are you hoping to block?
  5. Replies
    111
    Views
    15,598

    [all variants] Re: TuxGuardian - application based firewall

    I'm not sure this follows. Unless your rogue apps and legit apps are one and the same. You could try using wireshark to see what's being sent and netstat to see what's sending the data.
    Some...
  6. Replies
    7
    Views
    1,097

    [ubuntu] Re: Way to scan for Rootkits on linux?

    Not sure where you got the figures aying there are more rootkits for Linux. I'm guessing they seem more prominent because they're more effective and commonly used against Linux boxes. Considering the...
  7. [ubuntu] Re: New to Ubuntu ISO guidance for creating a "basic" IDS.

    Surely the Windows 7 OS has ultimately handles all of the computer's traffic. Therefore, running Ubuntu in a VM won't protect you from server vulnerabilities, only client ones. Attackers will be...
  8. [ubuntu] Re: How to learn networking from the complete beginning

    Have you tried obtaining a file from torrenting before?
    It may seem like a stupid question, but I learnt some basics in an ad-hoc way about clients, servers, tcp, and udp just from trying to get my...
  9. Re: Why is the I.T. Schools curriculum all microsoft

    I don't see a problem with learning how to use proprietary or open source apps as a matter of course.
    GNU-Linux is about choice, and that ought to include the choice not to use it :lolflag: ,...
  10. Replies
    141
    Views
    6,115

    Poll: Re: Who is more anti-Linux, Windows or Apple?

    I think all of this "evil" talk is pointless. At worst these companies are amoral i.e. profit-driven. Economic incentives can bring innovation and products that make our lives "easier".

    Or...
  11. Replies
    4
    Views
    368

    [gnome] Re: lulsec message, should i be worried?

    ^This.
    That's the window that appears if someone sitting at your box leaves you a message after you've locked the screen.
  12. Replies
    38
    Views
    5,458

    [ubuntu] Re: rootkit found system compromised

    I don't have a citation for this to hand at the moment but I think it's generally advised to have either Apparmor OR Selinux running on your system.
    Maybe it's tenable to have both running but I...
  13. Replies
    10
    Views
    500

    [ubuntu] Re: noob wants security advise

    So long as you don't install stuff from outside trusted sources and follow the advice int hose stickies you'll probably be alright
    IMHO the bigger concerns have little to do with your box like MITM...
  14. Replies
    10
    Views
    826

    [ubuntu] Re: security, passwords & encryption keys?

    Assuming you mean the private key is on your netbook away from home.
    Um, it all depends on what you want. The key model if usually for encryption between two people whereas something like Truecrypt...
  15. Replies
    10
    Views
    826

    [ubuntu] Re: security, passwords & encryption keys?

    Basically, the asymmetric key model is like a key and vault. It's extremely difficult to 'guess' correctly a file that's 4096 bytes large.
    When you generate an encryption key, you're actually making...
  16. [SOLVED] Re: Require password to install anything onto system?

    If you have a typical 'buntu setup, then unless you came across a tailored exploit nothing will have been 'installed' any higher than /home/username/
    That's not to say you didn't actually came...
  17. [SOLVED] Re: Desktop is just blank after I accidentaly deleted login.keyring !

    Not sure why you would need sudo for this command:

    sudo rm ~/.gnome2/keyrings/login.keyring
    If it's your own home directory. That "~" might have directed the command towards...
  18. Re: teaching linux to 13-15-years-old kids. what to teach?

    At that age I would have been interested to learn about Linux or even Windows a bit more.
    In the UK, during my GCSEs IT lessons consisted of nothing more than learning the interface and how to use...
  19. Replies
    111
    Views
    15,598

    [all variants] Re: TuxGuardian - application based firewall

    Yeah, I know what you're saying. And reading my own posts I think I sound dangerously close to being a geek elitist at times. You don't have to be a pilot, but it does help if you have an interest in...
  20. Replies
    111
    Views
    15,598

    [all variants] Re: TuxGuardian - application based firewall

    I quite agree with this sentiment. And while I was using it COMODO firewall was actually really user-friendly and intuitive.
    I actually learnt more about networking from those help pages than I did...
  21. Replies
    25
    Views
    935

    Poll: Re: The future of internet...?

    *breaks out in cold sweat* *shudder*
  22. Re: do you use REVO Uninstaller on Windows--is it safe?

    This is only anecdotal of course, but I had no problems(that I could see) with Revo uninstaller on Windows XP. It always did a thorough job. If I remember rightly it deletes more than registry...
  23. Replies
    6
    Views
    339

    [SOLVED] Re: IP address allocations

    Hi,
    What makes you think someone else has your IP address? As far as I know two devices can't have the same IP on the same network(internet in this case). It becomes meaningless to have an address...
  24. Replies
    20
    Views
    1,337

    Re: Linux Smear Campaign on YouTube

    I would just ignore it. I recognise this person's posting and video style.
    They had a channel a few a months and their favourite moniker was "linux lies 'n suck" hence "lienucks".

    All of the...
  25. Replies
    9
    Views
    648

    [SOLVED] Re: ubunnut.com !!!!!!!! - be carefull

    Am able to reach this site here http://packages.ubunut.com/
Results 1 to 25 of 120
Page 1 of 5 1 2 3 4