When we aren’t using GPG/SSH, it’s best to lock it. We can set this to happen after a set time, and/or when the screensaver activates. This helps to keep our credentials secure.
Tired of Multifactor Authentication codes for SSH, even though you just logged in? Here’s how SSH can reuse an existing connection, so you can quickly run single commands, open multiple SSH logins, and still have the same level of security.
How to setup MFA/2FA/Two Factor Authentication to enhance the security of your SSH logins.
Most every cpu made since 1995 is vulnerable to a set of vulnerabilities that could compromise secret data on computers, servers, and containers.
OpenSSH 7.2p2 and before had a vulnerability where it would use Blowfish for users that don’t exist, and SHA256/SHA512 for real users. Here’s how to test for it. (Note that i)
Here’s how to exclude items from chkrootkit’s output, be it due to changing PIDs or network interfaces that change.
Simple way to check for rootkits using chkrootkit
Simple way to check for rootkits
Do you ever have bots or hackers try to log into your dokuwiki login page? Here’s a way to block them with a simple cookie.
Software is a great thing, giving us the able to do some wonderful things. But what about Trust and Integrity?