That's a good point, I assumed that like the originating IP address, the MAC address would remain intact. There was some trouble logging in and it could be attributable to that.
I can think of a...
Type: Posts; User: CandidMan; Keyword(s):
That's a good point, I assumed that like the originating IP address, the MAC address would remain intact. There was some trouble logging in and it could be attributable to that.
I can think of a...
At one point I had iptables set up to only accept ssh traffic to a server from a specific MAC address, that combined with ssh key authentication I felt was a pretty sensible set up.
Only, just...
I would add to the already good advice that it's meaningless to continually re-format your drive; software isn't like a stain or chemical. You can't 'scrub' it out, it's either recognized by your...
My first thought would be to use iptables, but how many IP addresses are you hoping to block?
I'm not sure this follows. Unless your rogue apps and legit apps are one and the same. You could try using wireshark to see what's being sent and netstat to see what's sending the data.
Some...
Not sure where you got the figures aying there are more rootkits for Linux. I'm guessing they seem more prominent because they're more effective and commonly used against Linux boxes. Considering the...
Surely the Windows 7 OS has ultimately handles all of the computer's traffic. Therefore, running Ubuntu in a VM won't protect you from server vulnerabilities, only client ones. Attackers will be...
Have you tried obtaining a file from torrenting before?
It may seem like a stupid question, but I learnt some basics in an ad-hoc way about clients, servers, tcp, and udp just from trying to get my...
I don't see a problem with learning how to use proprietary or open source apps as a matter of course.
GNU-Linux is about choice, and that ought to include the choice not to use it :lolflag: ,...
I think all of this "evil" talk is pointless. At worst these companies are amoral i.e. profit-driven. Economic incentives can bring innovation and products that make our lives "easier".
Or...
^This.
That's the window that appears if someone sitting at your box leaves you a message after you've locked the screen.
I don't have a citation for this to hand at the moment but I think it's generally advised to have either Apparmor OR Selinux running on your system.
Maybe it's tenable to have both running but I...
So long as you don't install stuff from outside trusted sources and follow the advice int hose stickies you'll probably be alright
IMHO the bigger concerns have little to do with your box like MITM...
Assuming you mean the private key is on your netbook away from home.
Um, it all depends on what you want. The key model if usually for encryption between two people whereas something like Truecrypt...
Basically, the asymmetric key model is like a key and vault. It's extremely difficult to 'guess' correctly a file that's 4096 bytes large.
When you generate an encryption key, you're actually making...
If you have a typical 'buntu setup, then unless you came across a tailored exploit nothing will have been 'installed' any higher than /home/username/
That's not to say you didn't actually came...
Not sure why you would need sudo for this command:
sudo rm ~/.gnome2/keyrings/login.keyring
If it's your own home directory. That "~" might have directed the command towards...
At that age I would have been interested to learn about Linux or even Windows a bit more.
In the UK, during my GCSEs IT lessons consisted of nothing more than learning the interface and how to use...
Yeah, I know what you're saying. And reading my own posts I think I sound dangerously close to being a geek elitist at times. You don't have to be a pilot, but it does help if you have an interest in...
I quite agree with this sentiment. And while I was using it COMODO firewall was actually really user-friendly and intuitive.
I actually learnt more about networking from those help pages than I did...
*breaks out in cold sweat* *shudder*
This is only anecdotal of course, but I had no problems(that I could see) with Revo uninstaller on Windows XP. It always did a thorough job. If I remember rightly it deletes more than registry...
Hi,
What makes you think someone else has your IP address? As far as I know two devices can't have the same IP on the same network(internet in this case). It becomes meaningless to have an address...
I would just ignore it. I recognise this person's posting and video style.
They had a channel a few a months and their favourite moniker was "linux lies 'n suck" hence "lienucks".
All of the...
Am able to reach this site here http://packages.ubunut.com/