security Archives - Experiencing Technology https://blog.tinned-software.net/tag/security/ Tinned-Software Blog Tue, 20 Feb 2024 21:38:58 +0000 en-US hourly 1 https://wordpress.org/?v=6.4.3 FIDO2 security key management via commandline https://blog.tinned-software.net/fido2-security-key-management-via-commandline/ Tue, 20 Feb 2024 21:38:58 +0000 https://blog.tinned-software.net/?p=2969 FIDO2 Security keys are starting to take off. Many online services use support them ad the number is growing every day. At this point it seems FIDO Security keys are the way forward. FIDO2 being the second iteration of the … Continue reading

The post FIDO2 security key management via commandline appeared first on Experiencing Technology.

]]>
What’s the fuss about FIDO https://blog.tinned-software.net/whats-the-fuss-about-fido/ Sat, 28 Oct 2023 20:58:14 +0000 https://blog.tinned-software.net/?p=2958 So many discussions are everywhere about FIDO, so what is all that fuss about? Lets look into why FIDO is argued to be the next big thing in authentication. Before getting into it, let me say thanks to all the … Continue reading

The post What’s the fuss about FIDO appeared first on Experiencing Technology.

]]>
Auditing Linux system security using lynis https://blog.tinned-software.net/auditing-linux-system-security-using-lynis/ Mon, 08 Jan 2018 06:29:31 +0000 https://blog.tinned-software.net/?p=2511 Lynis is a security auditing tool for UNIX and Linux based systems. It performs a security scan on the system and provides suggestions for best practices for system hardening. The report from lynis shows a lot of suggestions to harden … Continue reading

The post Auditing Linux system security using lynis appeared first on Experiencing Technology.

]]>
Verifying SSH configuration with a scan https://blog.tinned-software.net/verifying-ssh-configuration-with-a-scan/ Mon, 23 Jan 2017 10:20:04 +0000 https://blog.tinned-software.net/?p=2281 Managing a number of Linux servers and keeping them secure can be a challenge. Certain tools can make the life of an admin a lot easier. To ensure an ssh daemon complies with a desired security configuration the admin can use a scanner … Continue reading

The post Verifying SSH configuration with a scan appeared first on Experiencing Technology.

]]>
Debug SSH Connection issue in key exchange https://blog.tinned-software.net/debug-ssh-connection-issue-in-key-exchange/ Mon, 02 Jan 2017 09:41:21 +0000 https://blog.tinned-software.net/?p=2284 Securing a server means hardening the SSH server settings, but doing so can also cause issues with ssh clients. Finding the cipher or algorithm causing a failled connection can be tricky. Depending on the client used, the error message might be very … Continue reading

The post Debug SSH Connection issue in key exchange appeared first on Experiencing Technology.

]]>
Harden SSH server settings https://blog.tinned-software.net/harden-ssh-server-settings/ Mon, 31 Oct 2016 08:17:09 +0000 https://blog.tinned-software.net/?p=2279 Many Linux Administrators use ssh on a daily basis. Many of the ssh servers are in their default configuration. Not changing the default configuration puts the security of the server at risk. That is why it is important to follow a few … Continue reading

The post Harden SSH server settings appeared first on Experiencing Technology.

]]>