Viewing: Security

Touch ID Support for sudo in MacOS Terminal for MacBook Pro

Well, that was fast. Touch ID is a fingerprint recognition security feature, designed and released by Apple. It is currently available on the iPhone 5s/6/7 and Macbook pro-2016 editions. Many consider it as a huge security win for the MacBook Pro's. This sounds amazing feature for command line users. sudo-touchid is a fork of sudo […] Read More

Computer Security 101: Pray for it and hope for the best

Please do give your best thoughts and prayers for the servers. Thank you ;) (via twitter) […] Read More

Forcefully mark down pfSense wan gateway as down

From the article: I have two internet connections (fiber and 4G LTE) configured in load balanced mode using pfSense FreeBSD based firewall. One of my wan connection is running out of bandwidth quota. How can I force and turn off this interface to save bandwidth until month end and enable it again from next billing […] Read More

Dyn a cloud-based DNS service under DDoS attack and took down major sites such as Twitter/Reddit/Spotify/Paypal and others

A massive DDoS (distributed denial-of-service) attack against a popular cloud-based DNS provider Dyn.COM took down major websites. The DYN.COM confirmed it on twitter: We are aware of the ongoing service interruption of our Managed DNS network. For more information visit our status page. — Dyn (@Dyn) October 21, 2016 Following sites are having issues due […] Read More

Dirty COW (CVE-2016-5195) is a local privilege escalation vulnerability. Do not ignore this bug.

A race condition was found in the way the Linux kernel’s memory subsystem handled the copy-on-write (COW) breakage of private read-only memory mappings. A local unprivileged user could use this flaw to gain write access to otherwise read-only memory mappings and thus increase their privileges on the system. In other words, the normal user can […] Read More

How To Set Up SSH Keys

SSH keys provide a better and secure way of logging into a server with SSH than using a password. If you are a sysadmin or programmer, you may need to use SSH to fix server or update code. This guide explains how to setup SSH keys securely between your server and client computer. Read more […] Read More