As we know Linux is a multiuser system, users can be logged in at the same time on the same machine or a remote machine and user sessions can be theoretically infinite. Today we see some control necessary for user management in Linux, commands that remain unchanged for years, while the GUI change constantly making often waste time. (more…)
Keeping your data safe is important, and on the web the only obstacle that separates us from an attacker is a strong password. Normally we consider a password of medium strength when a certain requirements which will then go to list. It is noted that following this step by step guide there is a possibility that the password is stolen, however,. Aside from reasons such as the installation of malware, could happen because the thief uses a network of supercomputer with a speed of calculation beyond expectation, but fortunately happens mainly in the field of industrial espionage.
Today's article will not give instructions to the professionals, but try to be a guide for the average user who does not want to see each other stolen personal information. (more…)
Today I asked myself: “And if I forget, or if someone changed the login password to your blog?”. It may happen that, after a dictionary attack the Brute force un hacker POSSA penetrate my account, change address mail account so that you have the notifications addressed to himself and change the password. In this way I would have no way to reset the password either by clicking on “You Lost your password“, because the notification would be received by the hacker. So how is? Start by saying that for ways to reset the password there are several, all equally effective and reliable. Obviously, we have full control of the database on which we are going to operate. At different levels of “freedom” on the database there are different ways to interact with it. (more…)