32 private links
Several organizations maintain and publish free blocklists of IP addresses and URLs of systems and networks suspected in malicious activities on-line. Some of these lists have usage restrictions
Do you want to block visitors by country?
Select the countries you want to block, IP address version (IPv4 or IPv6), output format and press the "Download" button.
The output formats supported are Apache .htaccess, Linux iptables, CIDR, Netmask, Inverse Netmask, IIS web.config, Cisco ACL, PeerGuardian2, network-object, Cisco bit bucket, Juniper Junos and MicroTik. Please find the details below:
The BFG is a simpler, faster alternative to git-filter-branch for cleansing bad data out of your Git repository history:
Removing Crazy Big Files
Removing Passwords, Credentials & other Private data
The git-filter-branch command is enormously powerful and can do things that the BFG can't - but the BFG is much better for the tasks above, because:
Faster : 10 - 720x faster
Simpler : The BFG isn't particularily clever, but is focused on making the above tasks easy
Beautiful : If you need to, you can use the beautiful Scala language to customise the BFG. Which has got to be better than Bash scripting at least some of the time.
Like many people, you store sensitive information in your database. And like some, your database server is on a different host from one or more of your webservers. How do you secure the necessary network connections?
The obvious answer is SSL/TLS. But that requires you to a) use a custom MySQL binary, and b) manage yet another set of certificates. And it requires setting extra parameters when connecting to the database in your code.
A less obvious answer is to use the ssh's built-in port forwarding to tunnel the connection. Here's how.
Note that the commands and scripts in this document assume that you are connecting to a MySQL database named "db" on remotehost.com, port 3306, using username "dbuser" and password "PASS". You will need to change these values to match your own setup.
Have you ever wanted to get your hands on the latest game, only to find that the Google Play thought it wasn't compatible with your phone?
Maybe you don't have a snapdragon device, but youre're pretty sure an old device could handle it still. Have a Kindle Fire and want access to more than just the Amazon AppStore?
Until now you've been stuck, but a new online service also come with Chrome extension called APK Downloader will allow you to download an apk file from the Google Play directly to your desktop rather than to your device.
The three main reasons for surveillance are security, safety and nosiness. Whether you need a visual check on a sleeping baby, or a video of a stranger putting your cat in a wheelie bin, Zoneminder fits the bill. Zoneminder is a sophisticated camera manager, including support for multiple image sources, motion detection, email alerts, and X10 automation. It supports most V4L (Video for Linux) devices, and can control network IP cameras. The web interface makes it ideal for use on our headless server.
In the following tutorial, we will take you through the process required to build a headless surveillance server which can manage image feeds, upload images to another PC, and is accessible from the internet, even using a mobile phone.
Check if you have an account that has been compromised in a data breach
Silent but deadly
Basically you install a tiny agent in your PC or phone, which silently waits for a remote signal to wake up and work its magic.
This signal is sent either from the Internet or through an SMS message, and allows you to gather information regarding the device's location, hardware and network status, and optionally trigger specific actions on it
Kon-Boot is an prototype piece of software which allows to change contents of a linux kernel (and now Windows kernel also!!!) on the fly (while booting). In the current compilation state it allows to log into a linux system as 'root' user without typing the correct password or to elevate privileges from current user to root. For Windows systems it allows to enter any password protected profile without any knowledge of the password. It was acctually started as silly project of mine, which was born from my never-ending memory problems :) Secondly it was mainly created for Ubuntu, later i have made few add-ons to cover some other linux distributions. Finally, please consider this is my first linux project so far :) Entire Kon-Boot was written in pure x86 assembly, using old grandpa-geezer TASM 4.0.
Tworzenie zapasowych kopii danych jest bardzo ważne. Są nawet przypadki, w których jest to wręcz obowiązek – na przykład w firmach, czy na serwerach. Niestety prawie żaden użytkownik komputera nie myśli o robieniu kopii zapasowych swoich równie ważnych (dla niego samego) danych, prac, czy chociażby zdjęć z wakacji. A złośliwość rzeczy martwych jest bezwzględna, awaria dysku, a później płacz i lament, ;) z powodu utraty danych. Oczywiste jest to, że nie ma sensu tworzyć kopii zapasowych na tym samym dysku, ale w czasach tanich dysków, również dysków na USB prawie każdy może sobie pozwolić na to. A po za tym kopie możemy tworzyć na zdalnym komputerze/serwerze.
The whole idea of naked password is to encourage your users to enter stronger passwords.
Our beautiful model Sally tastefully removes items of clothing as the password grows stronger.
Sadly, most of the "attacks" on my home network appear to originate from China. I say "appear to originate" because there's really way for me to be sure; it is possible that a hacker in Europe, or elsewhere, has a network of compromised computers in China all pounding away on American systems. To American system administrators, it looks like the attacks originate in China but anyone could be behind the mischief. Heck, even my next door neighbor could be behind the attacks.
TinyCA is a simple graphical userinterface written in Perl/Gtk to manage a small CA (Certification Authority).
TinyCA works as a frontend for openssl
Features:
Currently TinyCA supports the following features:
* Unlimited CAs possible
* Support for creating and managing SubCAs
* Creation and Revocation of x509 - S/MIME certificates
* PKCS#10 Requests can be imported and signed
* RSA and DSA keys can be generated and used
* ServerCertificates
o Certificates can be exported as: PEM, DER, TXT and PKCS#12
o Certificates may be used with e.g. Apache, Postfix, OpenLDAP, Cyrus, FreeS/WAN, OpenVPN, OpenSWAN, FreeRadius
* ClientCertificates
o Certificates can be exported as: PEM, DER, TXT and PKCS#12
o Certificates may be used with e.g. Netscape, Konqueror, Opera, Internet Explorer, Outlook (Express) and FreeS/WAN
* Certificate Revocation List
o CRLs can be exported as: PEM, DER and TXT
* Language Support:
o English
o German
o Czech (Thanks to Robert Wolf <gentoo at slave dot umbr dot cas dot cz>)
o Swedish (Thanks to Daniel Nylander <yeager at lidkoping dot net>)
o Spanish (Thanks to Ramon Pons Vivanco <rpons at rinu dot org>)
o French (Thanks to Thibault Le Meur <Thibault dot Lemeur at supelec dot fr>)
This Howto explains how you can create your own SSL Certification
In order to block an IP on your Linux server you need to use iptables tools (administration tool for IPv4 packet filtering and NAT) and netfilter firewall. First you need to log into shell as root user. To block an IP address you need to type the iptables command as follows: