Search:

Type: Posts; User: ant2ne; Keyword(s):

Page 1 of 10 1 2 3 4

Search: Search took 0.02 seconds.

  1. Replies
    2
    Views
    113

    [SOLVED] Re: iptables router, drop internal sources

    IDK it just randomly started working like it is supposed to. How do I delete this thread?
  2. Replies
    2
    Views
    113

    [SOLVED] iptables router, drop internal sources

    I'm trying to block some internal IPs from accessing the outside world. My iptables says they are getting dropped but tshark shows that data flows.

    Here are the relevant lines in my iptables...
  3. Replies
    4
    Views
    137

    Re: sudo su as a limtied user, and no other.

    deadflower: I do not want the first user to know the second users password. Not only that, with security lockdowns su is only executable by sudo.

    lars: I will try what you suggest on Monday.
  4. Replies
    4
    Views
    137

    sudo su as a limtied user, and no other.

    I need to allow a limited user to sudo su to another limited user, but just the other user and no other users. Especially not root. How can I accomplish this?

    Thanks!!
  5. Replies
    3
    Views
    312

    [ubuntu] Re: PoP authentication

    I don't see that attachment, but is it a company proxy portal?
  6. Replies
    11
    Views
    1,420

    [all variants] Re: Continuation of DenyHosts

    Sorry, I meant pubic IP.
  7. Replies
    11
    Views
    1,420

    [all variants] Re: Continuation of DenyHosts

    How so? I doubt your server is internet facing with its own private IP. Probably, it resides behind and firewall/router and then certain ports are forwarded to the server. possibly using iptables,...
  8. Replies
    11
    Views
    1,420

    [all variants] Re: Continuation of DenyHosts

    i fail to see the value of denyhosts or fail2ban when iptables can do it all. And it gives you one place to troubleshoot when something doesn't work as it should.

    If your iptables are set up...
  9. Replies
    13
    Views
    909

    Re: Technical data theft

    I know what it means. But the average user doesn't. Why so eager to confuse them?
  10. Replies
    13
    Views
    909

    Re: Technical data theft

    http://www.piriform.com/recuva
  11. Replies
    13
    Views
    909

    Re: Technical data theft

    I'd avoid using the phrase 'air gapped' in the wireless age.
  12. Replies
    13
    Views
    909

    Re: Technical data theft

    I agree with most of your post but I've seen hard drives do something similar. Not delete the data but corrupt just a few files as to make them unreadable. It is a sign the thing is about to go south...
  13. [ubuntu] Re: How much information can be leak out through a browser ?

    What makes you think the ISP will require a subpoena? "Your" IP actually blongs to the ISP and the records associated with it as well. They can cooperate with Law enforcement (or anyone) at will.
  14. Re: RKHunter Warnings - Warning: The following processes are using deleted files:

    That is odd. I'm not using cups so I don't know if it is normal behavior. Try disabling cups and re-running rkhunter. Also do an ls -l /etc/passwd and see when the last time the file was changed.
  15. [ubuntu] Re: Does it make sense to configure an ubuntu box as a gateway friewall?

    I'm thinking I paid $75 or so for a walmart router. I just bought 2 pi a few months back for my xbmc's. I think with the case, card, power cable and wifi dongle it was right at $80. I did get kind of...
  16. [ubuntu] Re: Does it make sense to configure an ubuntu box as a gateway friewall?

    I've got a small dual nic box setup running iptables for a gateway/firewall. Mainly, I wanted to do something that could do better logging than your off the shelf home router. But I have to admit, I...
  17. Thread: 12.04 64 bit

    by ant2ne
    Replies
    6
    Views
    312

    [ubuntu] Re: 12.04 64 bit

    Tell her to get over her ignorance and learn Libre. jeesh
  18. Replies
    21
    Views
    995

    Re: Linux Malware article

    Yeah that line just proves the one saying that has no idea what they are talking about.
  19. Replies
    21
    Views
    995

    Re: Linux Malware article

    Here is a quick $0.02. Linux, when using mostly repos, is always going to be more secure than Windows because I can apt-get update && apt-get upgrade daily which patches ALL of my apps. Not just OS...
  20. Replies
    5
    Views
    474

    [ubuntu] Re: Who is my DNS server?

    I meant resolv.conf. Not sure why that other file came out.
  21. Replies
    5
    Views
    474

    [ubuntu] Re: Who is my DNS server?

    So if you have a GUI installed, but choose to use a CLI only run level (ie a server that occasionally needs an X, but not normally) then you don't get to control your DNS? If the gui network manager...
  22. Replies
    5
    Views
    336

    Re: File Accessed property

    I always set noatime and I've not had it break anything, yet.
  23. [ubuntu] Re: Does using virtualbox cause security threat?

    Your Win7 VM, if compromised could be used to attack other systems. So keep it as secure as you would a physical machine. I've heard of theoretical attacks where a compromised VM could attack the...
  24. [ubuntu] Re: What Tools to Secure Linux Usage - Coming from Windows XP/7

    An encrypted drive only protects the data at rest. If you have poor OS security your mounted encrypted drive is still vulnerable.
  25. Replies
    5
    Views
    474

    [ubuntu] Who is my DNS server?

    this annoys me to no end.

    ant2ne@ant2ne-desktop ~ $ nslookup google.com
    Server: 127.0.1.1
    Address: 127.0.1.1#53

    Non-authoritative answer:
    Name: google.com
    Address: 173.194.46.98...
Results 1 to 25 of 250
Page 1 of 10 1 2 3 4