Find the answer to your Linux question:

Search:

Type: Posts; User: bigtomrodney; Keyword(s):

Page 1 of 20 1 2 3 4

Search: Search took 0.08 seconds.

  1. Sure, why not. I have mine running Kodi/XBMC with...

    Sure, why not. I have mine running Kodi/XBMC with a load of plugins and I still use it for SFTP and a few web interfaces. The Pi2 has 1GB of RAM and a lot more CPU capacity. I've thrashed my original...
  2. Replies
    53
    Views
    13,002

    Upstart was created by Ubuntu. This is a local...

    Upstart was created by Ubuntu. This is a local interprocess connection.
  3. Replies
    53
    Views
    13,002

    Yes....

    Yes.

    Finally confirm that there are no SSH listening ports other than those specified in your sshd_config:
    netstat -l
  4. Replies
    53
    Views
    13,002

    That sounds a lot like your connection. Ephemeral...

    That sounds a lot like your connection. Ephemeral ports for your inbound connection - what do the IP addresses look like? Are they your IPs or perhaps non-routable IPs relating to your VPN?

    If...
  5. Replies
    53
    Views
    13,002

    Here's where you found it listening on an odd...

    Here's where you found it listening on an odd port. It's possible to fire up an individual sshd instance manually, typical instances would be during an OS upgrade and of course during a compromise...
  6. Replies
    53
    Views
    13,002

    And is your server otherwise isolated from all...

    And is your server otherwise isolated from all networks?
  7. Replies
    53
    Views
    13,002

    And where does the VPN connect to? Is it between...

    And where does the VPN connect to? Is it between two trusted points or is one end exposed to the internet?

    As I said before VPNs are a secure transport but if you are connecting to an untrusted...
  8. IPSec requires a few ports, port 500 for IKE and...

    IPSec requires a few ports, port 500 for IKE and then 50/51 for the tunnel.

    With regards to your SSH connection - I presume you initiae the connection? Then you are the "from". Reversing that...
  9. Replies
    53
    Views
    13,002

    I would be looking at running processes on the...

    I would be looking at running processes on the machine, sshd can be called independently of the init service. As an immediate action I would disable login over ssh and disable password login for root...
  10. Replies
    53
    Views
    13,002

    A VPN is a secure transport. It does not...

    A VPN is a secure transport. It does not guarantee security of the network you are connecting to. Of your using a VPN to connect to the internet you have the same security risks, your only benefit is...
  11. Replies
    7
    Views
    3,334

    I'm a bit behind with Amarok, I must check it out...

    I'm a bit behind with Amarok, I must check it out again. What I will say is that the Amarok 1.4 series that shipped with KDE 3.x was one of the best pieces of software from a user perspective this...
  12. Replies
    10
    Views
    4,244

    By default the first user on any Windows system...

    By default the first user on any Windows system is an Administrator unless it's a domain system.
  13. The problem you will have here is that any...

    The problem you will have here is that any sysadmin placement worth following will have Non-disclosure Agreements (NDAs) and contractual conditions to prevent this happening. Really the most likely...
  14. Replies
    10
    Views
    4,244

    It's the same accessing a Linux filesystem...

    It's the same accessing a Linux filesystem offline. The ACLs on the filesystem have to be respected by the system accessing the files. If you mount a filesystem with a mask that allows access to...
  15. Cinnamon is a fork of Gnome Shell. I've been...

    Cinnamon is a fork of Gnome Shell. I've been happily working away in Ubuntu/Unity for the past few years and not experimenting too much, so in using Gnome Shell 3.14 now it's the first time since the...
  16. Unfortunately Skype is proprietary software and I...

    Unfortunately Skype is proprietary software and I am unaware of any functional open source alternative unless you want to switch to a VoIP alternative. The trick with that is of course you won't be...
  17. If you're using Gnome 3 by default it does not...

    If you're using Gnome 3 by default it does not allow the filemanage to handle the desktop, so possibly a bit different than you are used to. You can enable this behaviour using Gnome Tweak Tool.

    I...
  18. Replies
    1
    Views
    8,186

    It's just a fork of Gnome 2.0, which many felt...

    It's just a fork of Gnome 2.0, which many felt was the most complete and refined desktop. The focus wasn't on adding features or a perpetually beta-feeling desktop. The "Applications/Places/System"...
  19. Security is a world where it's all about keeping...

    Security is a world where it's all about keeping your hands clean. Even when you do nothing wrong, you need to be forensic in your approach - running as much as an nmap against a server can be...
  20. It's a messy and rather outdated way of doing...

    It's a messy and rather outdated way of doing things to be honest. You'd be better off considering some of the following:

    Install fail2ban which will actively manage unauthorised access attempts...
  21. Replies
    29
    Views
    3,687

    This is the stuff I've been enjoying recently. I...

    This is the stuff I've been enjoying recently. I have some at home and my favourite coffee shop uses it as their coffee of choice.

    Badger & Dodo
  22. Replies
    43
    Views
    5,622

    It's all unsubstantiated threat from an...

    It's all unsubstantiated threat from an unspecified antagonist against a person of no consequence.

    Nothing here fits. We can't help you with nonexistent Linux problems. You don't know whom if...
  23. Replies
    43
    Views
    5,622

    I don't think anyone I'd asking the general...

    I don't think anyone I'd asking the general question here, we're asking what you think your value is to a hacker. Would you consider your work to be valuable? Do you think what you're doing on your...
  24. Load balance! That part is right. I'm not sure...

    Load balance! That part is right.

    I'm not sure if it's just not the right choice of words here. The web application should remain static on each web server between software releases. Any dynamic...
  25. Why does the code change that much? Shouldn't...

    Why does the code change that much? Shouldn't data that is changing be held separate to the site code? I would have a thought a single database behind the web application servers should handle the...
Results 1 to 25 of 500
Page 1 of 20 1 2 3 4