Category: Security
-
How to protect your CentOS server from the Shellshock exploit
Shellshock is quite a serious security hole found a couple of days ago in Bash; to check whether your CentOS server is vulnerable run the following in a terminal: env VAR='() { :;}; echo Shellshock vulnerable!’ bash -c “echo Bash Testing” If your system is vulnerable, you will see: Shellshock vulnerable! Bash testing If it…
-
How to protect Debian from the Shellshock exploit
Shellshock is quite a serious security hole found a couple of days ago in Bash; to check whether your Debian server is vulnerable run the following in a terminal: env VAR='() { :;}; echo Shellshock vulnerable!‘ bash -c “echo Bash Testing” If your system is vulnerable, you will see: Shellshock vulnerable! Bash testing If it…
-
How to protect Ubuntu against the Shellshock exploit
Shellshock is quite a serious security hole found a couple of days ago in Bash; to check whether your Ubuntu server is vulnerable run the following in a terminal: env VAR='() { :;}; echo Shellshock vulnerable!‘ bash -c “echo Bash Testing” If your system is vulnerable, you will see: Shellshock vulnerable! Bash…
-
How to hide user account names on OS X Mavericks’ login screen
For those who don’t want the available users to be publically visible to whoever wakes up or powers on your Mac, there is an easy way of hiding the list – or just select members. In a Terminal window run the following: sudo defaults write /Library/Preferences/com.apple.loginwindow HiddenUsersList -array-add [username] You can do…
-
Ubuntu: Securing your remote SSH logins with Denyhosts
Being able to log in to your server remotely via SSH is an incredibly powerful way of remotely managing your system. With so many devices now able to support consoles (just about any current smartphone or current OS, really) you can check on things, update or make changes from just about anywhere. One of…