I.T. Security and Linux Administration:


March 25, 2012  2:42 PM

IP Banlist with Automagic Updating

Posted by: Eric Hansen
Apache, Auto-update, Banlist, HTTP, IP, SSH, tcp_wrappers, Web

First let me start off by saying that this can be used for iptables with some minor tweaking, but I chose to implement this using...

March 15, 2012  3:18 PM

Two-Factor Authentication in PHP Using SSH

Posted by: Eric Hansen
authentication, PHP, SSH, Two-Factor

For a good couple of years now I've wondered if there was a way to write an authentication system in PHP that utilized SSH instead of the widely-breakable database and flatfile methods. After doing some research I found its possible after installing a PHP extension. This guide will detail the...

October 23, 2011  1:57 PM

Mounting TrueCrypt Volumes Remotely

Posted by: Eric Hansen
Remote Mounting, SSH, truecrypt

While testing new security possibilities...

October 12, 2011  1:00 PM

Bash Script for SSH Key Generation

Posted by: Eric Hansen
Bash, Key Generation, linux, Scripts, SSH

I've mentioned a good couple of times here on how to set up SSH key authentication, as well as some benefits to it.  But, I was always wondering how (and if) I could make it more automated.  Then it hit me, there's always ssh-keygen's wonderful man pages!  A good hour or two later, I've come up...

August 12, 2011  9:18 PM

SSH Proxy

Posted by: Eric Hansen
Proxy, security, SSH, Tutorial

When I was working at Ford, you were put behind a proxy. The idea intrigued me, as it was able to handle so many connections at once. Since then, I've been thinking of different ways to...

May 27, 2011  9:40 AM

SHA-512 Authentication

Posted by: Eric Hansen
authentication, SHA-512, SSH

I've been trying to figure out for a little bit now how to do use the previously written Two Factor Authentication via SSH article for logging into my system directly. While it's probably the...

May 10, 2011  9:21 AM

Two-Factor Authentication via SSH

Posted by: Eric Hansen
authentication, SSH, Two-Factor

Security and smart phones, a great combination when used in the right situations.  A while ago, Google released their two-factor authentication mechanism, as well as released software to run on iPhones, Blackberries, and of course Android.  Since they released this, I was wondering how long it'd...

February 25, 2011  1:04 PM

Software VPN vs. SSH: Which is better?

Posted by: Eric Hansen
configuration, debate, ease of use, security, speed, SSH, VPN

In the IT world lately there's been a lot of buzz about VPN, and how to effectively use it for remote administration.  During this time, it seems a lot of people are forgetting the roots of remote administration (at least within the last few years), when VPN was just starting to get recognized...

November 6, 2010  10:23 AM

SSH Security (Part 2)

Posted by: Eric Hansen
authentication, certificate, security, SSH

In the last part, there was a lot of planning, and preparation, for setting up SSH to use certificates instead of passwords to authenticate a user. Now comes the configuration and trial-and-error portion. First thing I'm going to cover is the sshd_config file (config file for the SSH daemon),...

October 26, 2010  11:26 PM

SSH Security (Part 1 [perhaps a out of b])

Posted by: Eric Hansen
dummy account, SSH

To kick start a new life into this blog, I have decided to venture into the realm of SSH security. Going through the troubles I've experienced so...

Forgot Password

No problem! Submit your e-mail address below. We'll send you an e-mail containing your password.

Your password has been sent to: