Privacy

DNS over HTTPS

How does DNS work? Protecting your privacy online is a hot topic for many. Though many websites have transitioned from HTTP to HTTPS, allowing web traffic to be secured, this does not protect your overall privacy. The internet still relies on older protocols to ensure you are accessing the right Read more…

By jason, ago
Hacks

US targets 9 Iranians over university hacks

It was just announced today that 9 Iranians were involved in hacking 144 universities. They targeted professors and research departments in order to gain access to vital intel. In today’s realm of cybersecurity this does not surprise me. Many small to even larger institutions do not adequately protect they’re network, Read more…

By jason, ago
Privacy

Today is “World Password Day.”

In case you hadn’t heard, today is “World Password Day.” This would be a good time to go out and change your passwords. Need help on picking a new password? Head out to https://passwordday.org/ where Betty White provides best practices for cybersecurity. If you do not think Betty provided everything Read more…

By jason, ago
Security

Protecting Your Online Identity

Have you had your online identity stolen? Had your Twitter or Facebook account compromised? Do you use the same username and password across multiple sites on the Internet? Every day, hackers are exposing weak security practices of not only company websites but also attacking online identities putting you at risk. Read more…

By jason, ago
Linux How To's

Creating a Blackhole DNS with Bind 9

​Malware can be delivered many different ways from either advertisements (remember the NY Times malicous ads?) to hacked websites that contain malicious code.  One technique designed to help curb these infections is through the use of DNS blackhole.  This technique will redirect your internal users to an internal website to block Read more…

By jason, ago
Linux How To's

Part 2: Adding the firewall rules

In part two of this series we’re going to discuss adding firewall rules to the router.  Everyone knows that adding ingress (or incoming) firewall rules is important to securing your network.  However, the same can be said for adding egress rules for traffic leaving your network.  For instance, aside from Read more…

By jason, ago
Linux How To's

RHEL/CentOS Server Security

As a part of the sys admin’s job, it is important to take a few extra minutes to go through and properly secure a newly installed Linux server. These steps include enabling SELinux on the machine, configuring the firewall, and setting user permissions. There are however additional steps one should Read more…

By jason, ago
Linux How To's

GPG Keys

​GnuPG is used to encrypt and sign email messages and files. First you need to create the GPG key: Generating Keys ———————————————————– $ gpg –gen-key ———————————————————– Select option 5 for RSA and then type the encryption level. ———————————————————– Please select what kind of key you want: (1) DSA and Elgamal (default) (2) Read more…

By jason, ago