Sep 082014
 

Guest post by Sophie Davidson

Modern day criminals are no longer entering banks with ski masks and pistols. Today’s felons are moving into cyberspace to accomplish their nefarious goals.

Remember the old adage, “a criminal always returns to the scene of the crime”? It turns out this maxim holds a lot of weight with regards to DDoS cybercrime.

Double DDoS

Recent research from BT revealed that about 41% of online businesses surveyed were victims of DDoS in the last 12 months. The more notable findings of the research showed that, of those attacked, over 78 percent were subsequently hit a second time shortly thereafter.

Distributed Denial of Service attacks or DDoS encompass a large variety of cyber threats designed to overwhelm a target’s server, or jam up their network. By disrupting a target’s resources, the hackers succeed in preventing normal traffic (such as users or customers) from passing through.

The effects of these attacks are potentially devastating. After being hit by a strong attack, it takes on average at least 12 hours to offer full service back to users.

What can happen in 12 hours? This sort of disruption could mean losing hundreds of thousands of dollars in revenue. Or, perhaps worse, the trust between the user and the online business, built up over months or years, could be lost in a matter of minutes.
Continue reading »

flattr this!

Aug 312014
 

Some time ago I posted an article about shelr.tv a website and a service that was made to allow you to share your terminal records directly from the website.

Now the website of shelr.tv seems dead and so I’ve took a look around to see if there are similar websites and I’ve found commands.com.

For what I can see from their homepage it’s a service similar to the other, so let’s test it.
Continue reading »

flattr this!

Aug 292014
 

If you manage a server with many different users or just your family computer you will probably have many different accounts to manage, and one important aspect of any account it’s its password.

In this small article I’ll show you how to use the basic passwd command but also how to do some small bash script or use a web application, if you have a more complex environment, such as a central ldap server that keep all your accounts information.
Continue reading »

flattr this!

Aug 282014
 

Article by Himanshu Arora first posted on http://mylinuxbook.com/

Sometimes a computer system is connected to so many file-systems (in parallel) that managing these connections becomes a complex task. If a user’s work involves interacting with local, external and remote file-systems then he/she would definitely feel a need for a connection management software to manage all the connections centrally.

Looking for a simple connection manager? Try out Gigolo.

gigolo-main

Continue reading »

flattr this!

Aug 262014
 

LinuxAIOSometimes you want to test or show different GNU/Linux distributions, or just different desktop environment, and in these cases you usually have to put different ISO on CD/DVD or better on USB Sticks and this usually take some time. Luckily now there is a new and nice project that makes the work of testing different distributions much more easy: the Linux AIO (All In One) project.

From the Linux AIO website:

Our plan is to bring some of the major Linux distributions (Ubuntu and flavors, Linux Mint (“Debian”), Debian Live) with different desktop environments on one ISO file that can be burnt on one DVD or USB flash drive. Every one of them can be used as Live system, with no need of installation on hard drive or can be eventually installed on computer for full experience.

Continue reading »

flattr this!