Quantcast
Channel: Unix Other – PrivacyDusk
Browsing all 7 articles
Browse latest View live

Making strong passwords in Unix with mkpasswd

If you need to generate a secure customized password in Unix (Linux,BSD,Solaris) there is a command line utility created by Don Libes from the National Institute of Standards and Technology called...

View Article



Learn computer security and privacy with these mailing lists

There is no need to spend on expensive college fees and teachers that might turn up to be unhelpful or low qualified, the best free way to learn about computer security and privacy is by yourself,...

View Article

List of Linux live CDs for hard disk cloning

The easiest way to recover your operating system in case of disaster is by cloning it once a week to an external disk. You will save lots of time tweaking the settings once again if you need to...

View Article

How to use Linux command line to clone a hard drive

If you are a Unix command line geek you can clone your hard disk with various Linux programs. This can be quicker if you feel comfortable using the Linux shell. Computer forensics need to use a Unix...

View Article

How to set up an OpenVPN server easily with GAdmin

The easiest way in Linux to set up your own VPN to protect your Internet connection from eavesdropping is using GAdmin OpenVPN Server, a GTK+ client with GUI that works as a OpenVPN bridge server, you...

View Article


Chapcrack decrypts VPN PPTP and WPA2 traffic

A new tool called Chapcrack can recover the encryption keys used by the widely used WPA2 (Wireless Protected Access) protocol, used to secure wireless networks, and the PPTP (Point-to-Point Tunneling...

View Article

Using mobile shell Mosh for SSH sessions

The mobile shell Mosh is a command line remote terminal utility that works wrapped around SSH, it can be used inside xterm or Emacs, you will still need SSH running in the server, the main difference...

View Article
Browsing all 7 articles
Browse latest View live




Latest Images