Articles
Over the years I have written a number of articles, here are some of them.
So How Do I Secure SSH?
- Security
Some time ago I wrote an article entitled “I Opened My Connection To SSH Attacks, And These Were The Requests I Saw”, although I knew that there would be a significant number of attempts at gaining access too my SSH server, I really did not appreciate the sheer numbers that would be involved (over 100,000 attempts in 7 days).
SSH is a significant risk to your network security if not secured properly, that being the case what can you really do to secure it.
In this article we will look at methods you can use to help secure the SSH service on your device. Any instructions that are given focus on Red Hat based systems, however, these should easily be transferable to other flavors of Linux.
I Opened My Connection To SSH Attacks, And These Were The Requests I Saw
- Security
Recently I decided to investigate the type of requests that I would receive if I had opened up SSH to the world. The following are the results of that investigation.
How I Setup My SSH Honeypot
- Linux
- Programming
- Security
A few weeks ago I became curious as to what types of credentials were being attempted on SSH. I came up with the idea of creating a honeypot and capturing what credentials were attempted, when they were attempted and where the attempts originated from.
The Dangerous World Of Single Sign-On.
- Security
Over the years many of us have succumbed to a very serious condition, sign-on fatigue. Being required to continually supply a username and a password whenever you wish to start using a site or to log back into it. We all knew the passwords should differ between sites however when so many are needed this becomes tiresome at best or even impracticable. When we hit this wall, we tend to find shortcuts, in this case reusing passwords.
Unexpected Benefits of Password Managers
- Security
For some time now, I have been a loyal LastPass customer. Passwords can be tricky and a serious issue to keep track of. However recently I came across an unexpected advantage of using such a password manager.
Installing Raspbian on a Raspberry Pi
- Linux
You have likely heard the hype regarding the Raspberry Pi over the years, as usual the hardest part of getting started is where to start. You can certainly buy an SD Card that already contains the Raspbian operating system, however, what does buying such an SD card teach you? In this article I will show you how to install the Raspbian operating system on an SD card bypassing the need for Noobs.