SSH

Attacks on server on ssh-daemon

I detected in the log files of my server, that hundrets of failed login-attempts for the user root are made every day. This attempts should be reduced and the likelihood of an successfull attempt minimized.

Share files in a Linux Network

Sometimes you want to share files in linux via network. Windows has the file sharing mechanism since Windows 98 or so. Whats there on Linux.

Setting up a Linux Server to use LDAP for Samba, SSH

The main issue is that Samba and SSH do not use LDAP directly, instead you have to use the technologies NSS and PAM which will then access the LDAP system. So in order to set up two systems, about 5 systems have to be set up, which seems difficult and I was not able to find proper documentation about the whole process yet.

Reading SMS from the iPhone on your computer

I want to read all the saved SMS on my iPhone on my computer. The reasons are archiving, encryption (delete them afterwards on your phone), analysis, and so on. There are no high accessability-requirements, standard knowledge of SQL are enough.

Taggings:

Access your computer over internet in a secure way

Accessing you own data is getting more and more important. Part of it is already accessible from "everywhere", when stored with your emails. But "the cloud" is not that advanced yet and so there are documents you only have on your computer. Imagine you switch place for a couple of days, and still want to be able to look something up. One possibility was to create a backup and store all documents you might need on an external drive - a tedious process, and will forget the <em>one important</em> document. You could also open a port for Windows' Remote Desktop connection, but for security reasons this is not a choice. There should be a secure way to access the data.

Easy access to MySQL data on shared hosting service

<p>MySQL databases are often the main data-source of web applications when it comes to shared hosting services with very limited possibilites (no system service support, no scheduling, no in-memory database, ...). Often, management or visualization of such databases is not easily done, since no admin utility is installed, no remote connections to the database are allowed, and access by the sql binary (via SSH) is not user-friendly. A better way to manage databases visually in such cases is the challenge.</p>

Securing an iPhone / iPod touch with installed SSH Server

<p>&nbsp;</p><p style="margin: 0.0px 0.0px 0.0px 0.0px; font: 12.0px Helvetica;">Many iPhone owners have installed an application for the iPhone that provides SSH - Secure Shell - server functionality. This implies the accessability from external hardware such as PCs or Macs. However, this access is not suffieciently secured as it does use standard credentials.</p> <p style="margin: 0.0px 0.0px 0.0px 0.0px; font: 12.0px Helvetica; min-height: 14.0px;">&nbsp;</p> <p style="margin: 0.0px 0.0px 0.0px 0.0px; font: 12.0px Helvetica;">Many incident have already ocurred in which an unauthorized access has happened. This can cost a lot of money by losing important data, abuse of sensitive credentials or system destruction. However, the usage of SSH is very comfortable for loading files to an external machine.</p><p style="margin: 0.0px 0.0px 0.0px 0.0px; font: 12.0px Helvetica;">The most recent incident was a Worm that requested some money from the iPhone users to secure the iPhone.&nbsp;</p><p style="margin: 0.0px 0.0px 0.0px 0.0px; font: 12.0px Helvetica;">&nbsp;</p><p style="margin: 0.0px 0.0px 0.0px 0.0px; font: 12.0px Helvetica;">The solution should be usable on Max OS X, Windows and Linux, because I am using all three systems. It is does not matter, if the solution is usable using some tools or the command-line.&nbsp;</p><p>&nbsp;</p>
Subscribe to SSH