Cum verificam siguranta site-ului web in care dorim sa facem tranzactii?
Vă îngrijorează că un site web sau un link pe care îl vizitați ar putea fi un site nesigur?
[mai mult...]Soluții pentru problemele tale IT
Vă îngrijorează că un site web sau un link pe care îl vizitați ar putea fi un site nesigur?
[mai mult...]Vom detalia masurile de preventie si pentru fiecare tip de frauda masurile ce trebuie luate daca deja sunteti victima.
[mai mult...]Passwords are one of the most important aspects of computing.They keep our bank accounts, user profiles and computers safe (as long as we don’t reuse passwords). Just to log into our computers, most of us need a password and, for Linux, this is even more important.
[mai mult...]One can use a hardware security key such as YubiKey for OTP or FIDO2 for additional security on Linux to protect disks, ssh keys, password manager, web applications and more. The YubiKey Manager is available as both GUI and CLI too. One can use it for finding information about YubiKey, such as:
Be careful with a particular option such as reset, which will delete all FIDO config, and it will lock you down using remote services or ssh keys.
Visit this page to grab the latest AppImage. One can use the wget command or curl command to download both AppImage and verification signature file. For instance:
$ wget https://developers.yubico.com/yubikey-manager-qt/Releases/yubikey-manager-qt-1.2.4b-linux.AppImage \
https://developers.yubico.com/yubikey-manager-qt/Releases/yubikey-manager-qt-1.2.4b-linux.AppImage.sig
Type the following gpg command to verify signature:
$ gpg --verify yubikey-manager-qt-1.2.4b-linux.AppImage.sig
Here is what I saw on my machine:
gpg: assuming signed data in 'yubikey-manager-qt-1.2.4b-linux.AppImage' gpg: Signature made Wed 10 AUG 2022 11:32:21 AM IST gpg: using RSA key E6919ABF48C484E3CB7B71CB870B88256690D8DC gpg: Can't check signature: No public key
Let us grab the RSA key E6919ABF48C484E3CB7B71CB870B88256690D8DC. Edit your gpg.conf, run:
$ vi ~/.gnupg/gpg.conf
Append / edit (at least set Keyserver):
keyserver hkps://keys.openpgp.org
Save and close the file. Then get the key:
$ gpg --recv-keys E6919ABF48C484E3CB7B71CB870B88256690D8DC
OR
$ gpg --keyserver hkps://keys.openpgp.org --recv-keys E6919ABF48C484E3CB7B71CB870B88256690D8DC
Now that you verified the downloaded file, it is time to install it. Simply copy file to /usr/local/bin directory or your ~/bin/ using the cp command. For example:
sudo cp -v yubikey-manager-qt-1.2.4b-linux.AppImage /usr/local/bin/ ## OR ## mkdir -p ~/bin/ && cp -v yubikey-manager-qt-1.2.4b-linux.AppImage ~/bin/
Outputs:
'yubikey-manager-qt-1.2.4b-linux.AppImage' -> '/home/vivek/bin/yubikey-manager-qt-1.2.4b-linux.AppImage'
Next, set up executable permission using the chmod command:
sudo chmod -v +x /usr/local/bin/yubikey-manager-qt-1.2.4b-linux.AppImage ## OR ## chmod -v +x ~/bin/yubikey-manager-qt-1.2.4b-linux.AppImage
Outputs:
mode of ‘/home/vivek/bin/yubikey-manager-qt-1.2.4b-linux.AppImage’ changed from 0664 (rw-rw-r–)
Suntem vulnerabili in fata hackerilor, de fiecare data cand noi sau membrii familiei conectati la aceeasi retea, cautam informatii prin intermediul Internetului.
De ce este nevoie sa protejam routerul la care suntem conectati?
Persoanele rau intentionate se pot conecta la datele retelei si pot avea acces la parole, identitate, fotografii,date personale, etc.
Ce modificari putem face pentru ca routerul sa fie mai protejat:
If you’re dual booting Windows and Linux, you’ll probably want to access files on your Linux system from Windows at some point. Linux has built-in support for Windows NTFS partitions, but Windows can’t read Linux partitions without third-party software.
So we’ve rounded up some third-party software to help. This list is focused on applications that support the Ext4 file system, which most new Linux distributions use by default. These applications all support Ext2 and Ext3, too—and one of them even supports ReiserFS.
[mai mult...]