Categories
- Database (7)
- DNS (5)
- Encryption (8)
- Linux Administration (78)
- MacOSX (9)
- Mailserver (11)
- Monitoring (3)
- Multimedia (2)
- Photo (1)
- PHP (7)
- Rescue (4)
- Review (5)
- Security (37)
- Storage (1)
- Uncategorized (1)
- Version control system (16)
- Virtualisation (4)
- Web technologies (8)
- Wordpress (1)
Social Profiles
Facebook
Github
Twitter
Linkedin
Xing
Gravatar
Stackoverflow
Mastodon-
Tag Archives: security
FIDO2 security key management via commandline
FIDO2 Security keys are starting to take off. Many online services support them and the number is growing every day. At this point it seems FIDO Security keys are the way forward. FIDO2 being the second iteration of the FIDO … Continue reading
Posted in Security
Tagged authentication, command line, FIDO, FIDO2, security
Comments Off on FIDO2 security key management via commandline
What’s the fuss about FIDO
So many discussions are everywhere about FIDO, so what is all that fuss about? Lets look into why FIDO is argued to be the next big thing in authentication. Before getting into it, let me say thanks to all the … Continue reading
Posted in Security
Tagged authentication, FIDO, FIDO2, security
Comments Off on What’s the fuss about FIDO
Auditing Linux system security using lynis
Lynis is a security auditing tool for UNIX and Linux based systems. It performs a security scan on the system and provides suggestions for best practices for system hardening. The report from lynis shows a lot of suggestions to harden … Continue reading
Verifying SSH configuration with a scan
Managing a number of Linux servers and keeping them secure can be a challenge. Certain tools can make the life of an admin a lot easier. To ensure an ssh daemon complies with a desired security configuration the admin can use a scanner … Continue reading
Debug SSH Connection issue in key exchange
Securing a server means hardening the SSH server settings, but doing so can also cause issues with ssh clients. Finding the cipher or algorithm causing a failled connection can be tricky. Depending on the client used, the error message might be very … Continue reading
Harden SSH server settings
Many Linux Administrators use ssh on a daily basis. Many of the ssh servers are in their default configuration. Not changing the default configuration puts the security of the server at risk. That is why it is important to follow a few … Continue reading