How to find and remove malware on a hacked WordPress site
It finally happened to me.
It finally happened to me.
I’m shuffling a few 1TB images from a Ubuntu machine to a Windows box. Thinking I’d be slick, I used sha1sum to calculate the SHA1 hash of the first image before sending.
Public Wi-Fi hotspots can sometimes be crippled to the point of unusability. Here’s how to “fix” them and make them more useful.
I’m messing around with Tkinter since I’d like to get back into non-web-based development and the Python/Tkinter combination looks promising.
Microsoft has gotten a lot of grief for not including a functional firewall until XP SP2, but Ubuntu’s is turned off by default! Here are three easy steps that will turn it on and protect your PC on public networks.
Google Analytics is a must-have tool in any webmaster’s toolbox. Using it, you can find out demographic information about who is visiting your site, how long they stay, what pages they tend to view, and (with Webmaster Tools enabled) what… Continue Reading
The following steps make use of the SSH daemon configuration file, /etc/ssh/sshd_config. It is wise to bind SSH to listen only to particular interfaces, otherwise attackers could hammer the SSH port from multiple avenues. To do this, set the ListenAddress… Continue Reading
Be careful with what resources are accessed through an SSH session. While the initial client-server connection is encrypted, if the user accesses an insecure external resource via the server, that connection will not be encrypted (Barrett & Silverman, 2001). It… Continue Reading
Secure configuration for Linux for this exercise will involve the installation of Postfix. It ships by default with CentOS 6 but may not be installed depending on the packages selected. To install Postfix: sudo yum install postfix Next Postfix needs… Continue Reading
RFC 5068 recommends not using regular SMTP over port 52 in favor of authenticated SMTP over port 587 (Sender Policy Framework, 2007). Otherwise the server can be used as a mass relay for spam, tying up resources from rejection notices… Continue Reading