Home Search

crack - search results

If you're not happy with the results, please do another search

Trivial Transfers with TFTP, Part 3: Usage

In previous articles, we introduced TFTP and discussed why you might want to use it, and we looked at various configuration options. Now let’s...

Trivial Transfers with TFTP, Part 2: Configuration

In the first article of this series, we looked at some of the, admittedly limited, features of TFTP along with some reasons why you...

Trivial Transfers with TFTP, Part 1: Why Use It?

Sometimes we find ourselves using technologies that -- although we may not realize it -- stem from way back in the history of the...

Vim Shortcuts and Text Searches

In our previous Vim how-to, An Introduction to Vim for Sysadmins, we learned enough about using Vim to bang around in short text files...

Linus Torvalds on SHA-1 and Git: ‘The Sky Isn’t Falling’

Yes, SHA-1 has been cracked, but that doesn't mean your code in Git repositories is in any real danger of being hacked. The real worry...

Arrive On Time With NTP — Part 3: Secure Setup

Earlier in this series, I provided a brief overview of NTP and then looked at important NTP options to lock down your servers. In...

Arrive On Time With NTP — Part 2: Security Options

In the first article in this series, I provided a brief overview of NTP and explained why NTP services are critical to a healthy...

How to Keep Hackers out of Your Linux Machine Part 3: Your Questions Answered

Articles one and two in this series covered the five easiest ways to keep hackers out of your Linux machine, and know if they...

Arrive On Time With NTP — Part 1: Usage Overview

Few services on the Internet can claim to be so critical in nature as time. Subtle issues which affect the timekeeping of your systems...

How to Secure MongoDB on Ubuntu or Debian or CentOS Linux Production server

MongoDB Ransomware attacks over 28000 databases server in last two days. MongoDB ransom attacks are in Wild. MongoDB is a free and open-source NoSQL...