Strika
Zen and the Art of Technology
Menu Close
  • Home
  • Portfolio
  • Articles
  • Github
  • Wiki

Security

0

How to find and remove malware on a hacked WordPress site

Posted on August 3, 2016
Black Hat SEO

It finally happened to me.

Articles, PHP, Security Malware, Wordpress
0

(Ubuntu) sha1sum and (Windows) fciv are returning different SHA1 hashes

Posted on June 12, 2015
Microsoft

I’m shuffling a few 1TB images from a Ubuntu machine to a Windows box. Thinking I’d be slick, I used sha1sum to calculate the SHA1 hash of the first image before sending.

Linux, Security, Windows Cryptography, Encryption, Hashing, Linux, SHA1, Ubuntu, Windows
0

Use SOCKS to bypass restrictive firewalls – Ubuntu Linux

Posted on June 10, 2015
http://www.flickr.com/people/21442511@N08

Public Wi-Fi hotspots can sometimes be crippled to the point of unusability. Here’s how to “fix” them and make them more useful.

Articles, Linux, Networking, Security Hotspots, SOCKS, Tunneling, Ubuntu
0

Python 3.4, Tkinter – Double clicking reveals the length of masked phrases

Posted on May 28, 2015
Python

I’m messing around with Tkinter since I’d like to get back into non-web-based development and the Python/Tkinter combination looks promising.

Python, Security Python, Tkinter
0

Beware: Ubuntu’s firewall is disabled by default!

Posted on March 27, 2015
Ubuntu

Microsoft has gotten a lot of grief for not including a functional firewall until XP SP2, but Ubuntu’s is turned off by default! Here are three easy steps that will turn it on and protect your PC on public networks.

Linux, Networking, Security Firewall, Ubuntu
0

Google Analytics, Black Hat SEO, Semalt and You

Posted on March 9, 2015
Black Hat SEO

Google Analytics is a must-have tool in any webmaster’s toolbox. Using it, you can find out demographic information about who is visiting your site, how long they stay, what pages they tend to view, and (with Webmaster Tools enabled) what… Continue Reading →

Articles, HTML/CSS, PHP, Security Apache, Google Analytics
0

SSH: How to secure it?

Posted on October 13, 2011
Linux

The following steps make use of the SSH daemon configuration file, /etc/ssh/sshd_config. It is wise to bind SSH to listen only to particular interfaces, otherwise attackers could hammer the SSH port from multiple avenues. To do this, set the ListenAddress… Continue Reading →

Articles, Linux, Security
0

SSH: Best practices

Posted on October 13, 2011
Linux

Be careful with what resources are accessed through an SSH session. While the initial client-server connection is encrypted, if the user accesses an insecure external resource via the server, that connection will not be encrypted (Barrett & Silverman, 2001). It… Continue Reading →

Articles, Linux, Security
0

SMTP: How to install and secure it on Linux (CentOS 6)

Posted on October 2, 2011
CentOS

Secure configuration for Linux for this exercise will involve the installation of Postfix. It ships by default with CentOS 6 but may not be installed depending on the packages selected. To install Postfix: sudo yum install postfix Next Postfix needs… Continue Reading →

Articles, Linux, Security
0

SMTP: Best practices

Posted on October 2, 2011

RFC 5068 recommends not using regular SMTP over port 52 in favor of authenticated SMTP over port 587 (Sender Policy Framework, 2007). Otherwise the server can be used as a mass relay for spam, tying up resources from rejection notices… Continue Reading →

Articles, Linux, Security, Windows

About

In a past life, I was a data entry clerk who quickly got tired of lost productivity due to cumbersome user interfaces and set out to do something about it.

I have a passion for increasing business efficiency at both the user and systems levels, while also being mindful of the need for information security.

Having a B.S. in Information Security and Assurance, I've found my niche in web/relational database development, which I have been doing for several years now.

  • Popular
  • Latest
  • Tags
  • Ubuntu

    Ubuntu 9.04, NVIDIA – Failed to parse xorg.conf

    69 Comments
  • Nissan

    2003 Nissan Sentra – How to replace the brake light switch

    10 Comments
  • Ubuntu

    Ubuntu 9.04 – Installing the BCM4309 using NDISwrapper

    8 Comments
  • Ubuntu

    Ubuntu 9.04, Dell Vostro 1520

    6 Comments
  • XBox

    XBOX Softmod – Can’t copy the installer to the hard drive

    4 Comments
  • Ubuntu

    Ubuntu 14.04 – How to properly mount a CIFS share as a normal user

    4 Comments
  • Ubuntu

    mount.cifs: permission denied: no match for /media/cifs found in /etc/fstab

    4 Comments
  • XenServer Logo

    How to export a FreeNAS NFS share as a XenServer NFS VHD SR

    4 Comments
  • Scion

    2008 Scion xD – How to find and clear a clog in the evaporator drain hose

    3 Comments
  • Asus RT-N12 Repeater Mode

    3 Comments
  • Microsoft Modern Logo

    Windows Server 2012 – DHCP error 20079: The specified servers are already present in the Directory Service

    3 Comments
  • Success

    Deploying a Django app (to Dreamhost)

    3 Comments
  • Python

    Django: ‘WSGIRequest’ object has no attribute ‘user’

    April 21, 2017
  • Python

    Python – Alternate standard-library implementation of NLTK concordance() that allows saving output

    January 21, 2017
  • Python

    Python – Are Threads or Processes more appropriate for disk I/O-bound operations?

    January 16, 2017
  • Django pretty JSON

    Django – Format JSON strings to be human-readable in Admin pages

    December 22, 2016
  • Android

    Android – Google Hangouts messages received late, no notification, long delay

    October 03, 2016
  • Success

    Deploying a Django app (to Dreamhost)

    October 01, 2016
  • Black Hat SEO

    How to find and remove malware on a hacked WordPress site

    August 03, 2016
  • Linux

    CentOS 7 Deployment Notes

    May 21, 2016
  • Python/Twisted – Various import errors

    November 29, 2015
  • Ubuntu 15.04 MaaS – iscsistart connection refused

    July 02, 2015
  • XenServer Logo

    How to export a FreeNAS NFS share as a XenServer NFS VHD SR

    June 15, 2015
  • Ubuntu

    mount.cifs: permission denied: no match for /media/cifs found in /etc/fstab

    June 15, 2015
Ubuntu Python Linux Magento Django Android Windows Server 2012 CakePHP CIFS Samba NAS XenServer Ubuntu MaaS MaaS CentOS SSH NFS Malware Twisted nltk Hashing Laptops Drivers Dreamhost Cryptography Windows SHA1 FreeNAS Migration Unix Samsung Encryption Deployment threading Wordpress Tkinter OpenPhoto Trovebox Nikon D5100 Nikon Broadcom NetBalancer Resource Monitor Windows Server 2008 Windows 8 Hotspots DHCP Tunneling JSON Firewall Apache Windows 7 Aptana EC2 Ultimo Bash Outlook T-Mobile Nexus Family Mobile SOCKS io multiprocessing Google Analytics Active Directory

Categories

  • Articles
  • Automotive
  • Cloud
  • Ecommerce
  • Hardware
  • HTML/CSS
  • Language
  • Linux
  • MS Office
  • Networking
  • Photography
  • PHP
  • Portfolio
  • Programming
  • Projects
  • Python
  • Scripting
  • Security
  • SQL
  • Storage
  • Uncategorized
  • Virtualization
  • Windows
© 2022 Strika. All rights reserved.
Hiero by aThemes