Archive

What to do when you’ve been hacked

Initial handling

First of all, don’t panic – it won’t help anything. Personally I want to try and track down the pile of slime that did this. That means trying to preserve all data, logs and possibly sniffing network traffic. However you also need to weigh up the risk of further damage to (or from) your compromised system.

Change all your passwords and any other data that might have been grabbed from the compromised system – e.g. credit card details etc. You should also check any other systems that you use from that machine or that are on the [continued…]

Debian Release Process

Debian’s release process is frequently misunderstood, and the large number of overlapping and shifting code-names can be confusing. This page attempts to explain how the development of Debian works.

First of all, Debian has three development “distributions”:

  • unstable: Rapidly-changing development distribution. Expect things to break
  • testing: Packages that have undergone a (minimal) QA process
  • stable: The current stable release

Any one of these can be installed and used with apt (aptitude, synaptic, …) to perform automated package updates. Updates to stable will only be security fixes, and will not change the version [continued…]

Knoppix Union FS

Introduction

Knoppix is a live-CD distribution of Linux based on Debian. Once you’ve made a CD, you simply put it in your CD/DVD drive and boot from the drive, the system detects all your hardware, and within about a minute you have a fully-functioning KDE Desktop.

Previously, Knoppix’s primary uses have been as a demo of Linux, or as an environment for fixing a broken system. However, since the recent release of version 3.8, Knoppix has incorporated a system called UNIONFS.

What UNIONFS does, and why it’s important

Until Recently…

Knoppix <=3.7 had a [continued…]

Blocking Adverts

Blocking Adverts

Suggestions on Blocking Adverts and Malware While Browsing

The following tips may prove useful in preventing adverts, and other forms of malware from degrading your browsing experience. These tips while useful to everyone, are I feel especially useful to users on slow connections, or when the person surfing needs more protection.

Blocking via hosts/DNS Filtering

One simple idea is to configure a computer’s DNS name to IP resolution so that many well know advertising and “undesirable” servers return an IP address that goes no where, e.g. 127.0.0.1. An easy way to do this is to [continued…]

Apt Proxy

Apt-proxy is a simple program that caches downloaded Debian packages. By setting up multiple client computers to use the same apt-proxy, requested packages are only downloaded from the remote server once and cached. This decreases the load on the remote server and improves the speed with which the apt-proxy clients can get hold of the latest Debian packages! Like most network programs, apt-proxy uses the client and server model. In this case, the computer running apt-proxy is the server and the computers using the server as their source for updates and upgrades are clients.

Note that the current [continued…]

Apache SSL

Introduction

This article will show you how to generate a Certificate Authority (CA), a server certificate and then how to sign this certificate yourself. Finally it will describe how to configure Apache and have a working SSL web server.

I recommend you read the whole article before going straight in to it too.

Software needed

I was using a base distribution of Debian stable, Apache 1.3.26, mod_ssl 2.8.7 and openssl 0.9.6c.

This should be generic enough to use with any distribution but the configuration may vary if you’re using Apache2 for example.

So obviously you need Apache, mod_ssl and openssl [continued…]