I recently installed Fail2Ban on my personal mail/web host as the number of "bad
actors" has climbed a lot in recent years and I no longer felt comfortable just
allowing
I recently decided to run Kali Linux on my MacBook. I originally thought I'd
just build it into a Virtual Machine (using Parallels), but was concerned that I
might not have
Keeping your system up to date is the single most important way to prevent
security and malware issues. Ubuntu provides nice tools for maintaining your
system, but if you manage it via a
In managing Unix systems, you will often have occasion to have a process or
action performed at boot time.
There are several ways of accomplishing this goal, but the right way is to
SSH Tunnel Setup
Create an SSH key (Version 2) to allow passwordless replication:
$ ssh-keygen -t rsa
Copy the SSH key to the Master (assumes same user account on Master and Slave):
$ ssh-copy-id master.
In my original Blog Post entitled Beware the Pogoplug
[https://robpickering.com/beware-the-pogoplug/] I pointed out a rather serious security
hole in the Cloud Engines [http://www.cloudengines.com/]‘ Pogoplug device. That
security