Nov 032010
 

Firewall

On the web there are plenty of guides related to iptables, the firewall included in all the latest Linux distributions.

iptables is a user space application program that allows a system administrator to configure the tables provided by the Linux kernel firewall (implemented as different Netfilter modules) and the chains and rules it stores. Different kernel modules and programs are currently used for different protocols; iptables applies to IPv4, ip6tables to IPv6, arptables to ARP, and ebtables as a special for Ethernet frames.

Continue reading »

Flattr this!

Oct 312010
 

halloweenIn several commonly used shell commands can be shortened with convenient alias, a classic example is:
alias ll='ls -al'

Also in this field zsh has some interesting features, which enable you to define traditional aliases but also things a bit more particular.

Continue reading »

Flattr this!

Oct 292010
 

lock2Original article by Maurizio Antonelli

In the previous article we presented some basic concepts of encryption and made some examples of symmetrical and asymmetrical keys, we concluded by saying that a good way to get a certificate with an asymmetric key  is GnuPG.

GnuPG is open-source and multiplatform. It uses native command line in a shell or from MS-DOS prompt.

There are also graphical interface:

Enigmail it’s an extension for Mozilla thunderbird. And contains a graphical tool for keys management.

Continue reading »

Flattr this!

Oct 262010
 

crypto2

Or email safely

Original article by Maurizio Antonelli

As well as documentation for those interested, I sincerely hope that it can raise awareness of the non-security of “electronic mail” and help users to take the appropriate implementation tools.

Let’s start with this basic idea: “Email is not a secure media for transmitting information.”

In fact, almost all e-mail when traveling in the network are in clear text, without any form of encryption. As you know, an e-mail message, from the time he leave the sender PC since it arrive to the destination PC, it’s crossing different networked machines, each of which deals with “forward” it in the right direction. Whoever is at the controls of any of these machines can then view (sniff) this message, at great risk to the privacy of the sender and recipient.

Continue reading »

Flattr this!

Oct 232010
 

zshIn a previous article we saw how to install and configure zsh, today we’ll see in detail the options offered by the zsh for globbing or how the shell use some special characters to auto-complete our commands.

Please note: most command you’ll see here could be accomplished with particular switch of the command, for example ls with -r do a recursive search, but the goal of this article is to just use the shell, so our goal will be to accomplish the same result but just with the power of zsh globbing.

Continue reading »

Flattr this!