Cookie

GNU/Linux

Configure Apache after installation

A golden rule: You should never have to manage a website from your home directory. MAY. You should not give the web server the opportunity to go through the /home/ to see the directory structure, as well as all other subfolders. A poorly configured Web server, or not configured, or without patch can cause a huge loss of data, or loss of credentials, likely to put personal data and access of different users at risk. (more…)

GNU/Linux

VeraCrypt: the successor of TrueCrypt

In 2009 I wrote an article on security. The best that I could find online to encrypt their files was TrueCrypt, at the time was a safe & software. I can not say the same thing seven years later. The development has been arrested in 2014, but good news there. I could recommend a list of software that do the same thing, but I would not do is leave open questions and invite people to spend time (time that I have already spent). For this reason I will not go further and recommend a project fork that has been followed to the present day. It's called VeraCrypt (the latest release to date is dated October 2016). (more…)

Security

Google Webfont: dentro la talpa WordPress

Today (after more than five months) I get to write on the blog. And back at breakneck speed with an article to 007 that will make your hair stand on end users WordPress.

I discovered today that the version in WordPress 3.8 (Today we are 4.0) has been enabled by default in the backend the Open Sans font. In fact I had already noticed little slow in loading the backend, but I thought it was due to the new “engine” ie WordPress, instead is due to direct inclusion of a branded Google webfont. (more…)

GNU/Linux

Terminal: clear the command history

Cencellare the history of commands from the terminal history is a simple operation. Default, the last 500 commands type in termilane are stored in the hidden file “.bash_history“. The previously typed commands can be read quickly by using the arrow keys (“freccia its” and “down arrow“). This makes it easy to invoke a command recently typed, but it could be a security issue if that session was used by more people. So how does one delete the command history? (more…)

GNU/Linux

Terminal: delete the login information

After being absent from the blog for the whole month of August, and half of September back at breakneck speed with the usual weekly article. Today we talk about privacy.

The terminal Linux è fantastico, with just a few commands we can have full control over the computer. Vediamo ora nel dettaglio come delete the login information per il computer sul quale siamo loggati. (more…)

GNU/Linux

OpenKiosk: un browser “nato” for internet point

Years ago I became interested in creation of an internet point using an older pc and a any linux distribution. On that occasion I used Opera, a free browser (the open source) that integrated and integrates still one of the best ways “kiosk“.

Since then it's been almost three years, Opera has evolved and continues to integrate the kiosk mode, but steadily growing new projects open source they make their way.

I'm talking about OpenKiosk. (more…)

GNU/Linux

The digital steganography to hide the information

Literally the term “Steganography” from etymological dictionary means “the art of writing in figures, because the script is still secret and unknown to those who do not have the key”. Typically quansiasi type of encrypted message may be referred steganographic. The oldest steganographic technique dates back a few thousand years ago (the term itself is derived from the ancient greek), was to use common lemon juice instead of ink. Those who received the letter secret was to bring the paper to a source of heat or an open flame. The parties spent with the lemon juice would not be blackened, while the paper is. (more…)

oranges
Photography

Tutorial: guard against unauthorized use of our photos with Gimp

In the previous article we mentioned the technique of quickly '”invisible watermark“, a technique that would allow us to prove paternity of a digital photograph. The operation (as already described) is simple. The underlying principle of all is to have a picturex” (my original photo I just have to keep) and create a pictureand” (the photo that contains the watermark invisible to circulate in internet). To prove to be the author of the photo just to compare a particular procedure by superimposing the two graphics immagni. Magically comparirà il watermark with our name and copyright information. (more…)

GNU/Linux

Sterilize a hard drive with “dd”

Nell’articolo di oggi ci occupiamo della deletion of data. Sometimes you get to have a huge amount of discs, accumulated over the years, which were once (not anymore) that now have no reason to exist in our drawer. Okay that storage space is never too, but drives off in a drawer I have never served very. This guide will be useful to all those who are going to sell a record, ma che non si fidano fino in fondo perché l’utente a cui lo vendi potrebbe ricavare i tuoi dati personali.

At this point we must make a necessary clarification. (more…)

Security

Change DNS to a different navigation

Today we talk about internet browsing, precisely di più server DNS. For the uninitiated DNS servers are responsible of’addressing of our request as a string (example “http://www.sito.com/“) to the server where the site exists physically. In practice dealing with “translate” an understandable address man in plain IP address from your computer. (more…)