Home Search
crack - search results
If you're not happy with the results, please do another search
Trivial Transfers with TFTP, Part 3: Usage
In previous articles, we introduced TFTP and discussed why you might want to use it, and we looked at various configuration options. Now let’s...
Trivial Transfers with TFTP, Part 2: Configuration
In the first article of this series, we looked at some of the, admittedly limited, features of TFTP along with some reasons why you...
Trivial Transfers with TFTP, Part 1: Why Use It?
Sometimes we find ourselves using technologies that -- although we may not realize it -- stem from way back in the history of the...
Vim Shortcuts and Text Searches
In our previous Vim how-to, An Introduction to Vim for Sysadmins, we learned enough about using Vim to bang around in short text files...
Linus Torvalds on SHA-1 and Git: ‘The Sky Isn’t Falling’
Yes, SHA-1 has been cracked, but that doesn't mean your code in Git repositories is in any real danger of being hacked.
The real worry...
Arrive On Time With NTP — Part 3: Secure Setup
Earlier in this series, I provided a brief overview of NTP and then looked at important NTP options to lock down your servers. In...
Arrive On Time With NTP — Part 2: Security Options
In the first article in this series, I provided a brief overview of NTP and explained why NTP services are critical to a healthy...
How to Keep Hackers out of Your Linux Machine Part 3: Your Questions Answered
Articles one and two in this series covered the five easiest ways to keep hackers out of your Linux machine, and know if they...
Arrive On Time With NTP — Part 1: Usage Overview
Few services on the Internet can claim to be so critical in nature as time. Subtle issues which affect the timekeeping of your systems...
How to Secure MongoDB on Ubuntu or Debian or CentOS Linux Production server
MongoDB Ransomware attacks over 28000 databases server in last two days. MongoDB ransom attacks are in Wild. MongoDB is a free and open-source NoSQL...