|
chris.d, 4 November 2005 Initial handling
First of all, don’t panic – it won’t help anything. Personally I want to try and track down the pile of slime that did this. That means trying to preserve all data, logs and possibly sniffing network traffic. However you also need to weigh up the risk of further damage to (or from) your compromised system.
Change all your passwords and any other data that might have been grabbed from the compromised system – e.g. credit card details etc. You should also check any other systems that you use from that machine or that are on the [continued…]
imported from wiki, 11 October 2005
Debian’s release process is frequently misunderstood, and the large number of overlapping and shifting code-names can be confusing. This page attempts to explain how the development of Debian works.
First of all, Debian has three development “distributions”:
- unstable: Rapidly-changing development distribution. Expect things to break
- testing: Packages that have undergone a (minimal) QA process
- stable: The current stable release
Any one of these can be installed and used with apt (aptitude, synaptic, …) to perform automated package updates. Updates to stable will only be security fixes, and will not change the version [continued…]
imported from wiki, 7 September 2005 Introduction
Knoppix is a live-CD distribution of Linux based on Debian. Once you’ve made a CD, you simply put it in your CD/DVD drive and boot from the drive, the system detects all your hardware, and within about a minute you have a fully-functioning KDE Desktop.
Previously, Knoppix’s primary uses have been as a demo of Linux, or as an environment for fixing a broken system. However, since the recent release of version 3.8, Knoppix has incorporated a system called UNIONFS.
What UNIONFS does, and why it’s important
Until Recently…
Knoppix <=3.7 had a [continued…]
imported from wiki, 18 May 2005 Blocking Adverts
Suggestions on Blocking Adverts and Malware While Browsing
The following tips may prove useful in preventing adverts, and other forms of malware from degrading your browsing experience. These tips while useful to everyone, are I feel especially useful to users on slow connections, or when the person surfing needs more protection.
Blocking via hosts/DNS Filtering
One simple idea is to configure a computer’s DNS name to IP resolution so that many well know advertising and “undesirable” servers return an IP address that goes no where, e.g. 127.0.0.1. An easy way to do this is to [continued…]
imported from wiki, 17 February 2005
Apt-proxy is a simple program that caches downloaded Debian packages. By setting up multiple client computers to use the same apt-proxy, requested packages are only downloaded from the remote server once and cached. This decreases the load on the remote server and improves the speed with which the apt-proxy clients can get hold of the latest Debian packages! Like most network programs, apt-proxy uses the client and server model. In this case, the computer running apt-proxy is the server and the computers using the server as their source for updates and upgrades are clients.
Note that the current [continued…]
imported from wiki, 16 February 2005 Introduction
This article will show you how to generate a Certificate Authority (CA), a server certificate and then how to sign this certificate yourself. Finally it will describe how to configure Apache and have a working SSL web server.
I recommend you read the whole article before going straight in to it too.
Software needed
I was using a base distribution of Debian stable, Apache 1.3.26, mod_ssl 2.8.7 and openssl 0.9.6c.
This should be generic enough to use with any distribution but the configuration may vary if you’re using Apache2 for example.
So obviously you need Apache, mod_ssl and openssl [continued…]
|
|