Category: Security

Link: How to look up the geographic location of an IP address from the command line

If you want to find out where a given IP address is physically located on earth, there are quite a few online GeoIP lookup services you can try (e.g. geoiptool.com). These online services are mostly powered by freely available GeoIP databases such as those from MaxMind. Besides using such web-based services, there are different ways to query the GeoIP databases, notably via the Linux command line.

In this tutorial, I am going to describe how to geolocate an IP address from the command line in Linux.

Full article here:
How to look up the geographic location of an IP address from the command line (Xmodulo)
Related:
Geo IP Lookup API (ProgrammableWeb)

Link: 10 URLs That Every Google User Should Know

Where can you get a list of every ad that you have clicked on Google? Where should you go if you don’t remember your administrator password? What are your interests as determined by Google?

Here are 10 important links that every Google user should know about. They are tucked away, somewhere deep inside your Google dashboard.

Full article here:
10 URLs That Every Google User Should Know (Digital Inspiration)

Link: How to spoof the MAC address of a network interface on Linux

A 48-bit MAC address (e.g., 08:4f:b5:05:56:a0) is a globally unique identifier associated with a physical network interface, which is assigned by a manufacturer of the corresponding network interface card. Higher 24 bits in a MAC address (also known as OUI or “Organizationally Unique Identifier”) uniquely identify the organization which has issued the MAC address, so that there is no conflict among all existing MAC addresses.

While a MAC address is a manufacturer-assigned hardware address, it can actually be modified by a user. This practice is often called “MAC address spoofing.” In this tutorial, I am going to show how to spoof the MAC address of a network interface on Linux.

Full article here:
How to spoof the MAC address of a network interface on Linux (Xmodulo)

Link: Browse Internet as Nobody knows what you are doing, Simple SOCKS Proxy setup under Linux

As you may know ISPs can see those links you visit from your devices while using their service, this thing bother me and many users who knows about this stuff. Simply we can use SOCKS proxy using SSH. This approach is useful to surf web because things will be encrypted and your local administrator or ISP won’t be able to see what you are doing, they just can see encrypted packets are floating. 🙂

Also this method won’t eat much of your bandwidth but a little difference you may notice while testing your bandwidth using speedtest tools.

Full article here:
Browse Internet as Nobody knows what you are doing, Simple SOCKS Proxy setup under Linux (NoobsLab)

Link: OpenVPN on DD-WRT: A Secure Connection To Home Networks

Since the demise of the free LogMeIn service, you might have lost access to your home PC. Fortunately, with the right router, and a little bit of time, you can gain free access to your home machines very easily with OpenVPN. This guide I’ve written for the DSLReports.com community will focus primarily on OpenVPN running on DD-WRT, but should apply almost equally to “TomatoVPN” firmware, or newer Asus routers which include it (I would also recommend checking out “Tomato by Shibby” — as this looks to be some great firmware for those with supported hardware).

Full article here:
OpenVPN on DD-WRT: A Secure Connection To Home Networks | DSLReports, ISP Information (DSLReports.com)

Link: Features, Installation, Usage of Network Security Toolkit (NST) in Linux

There are so many Linux distribution in the world now. From general Linux category until specific purpose of Linux. Today we will see a sneak peak of Network Security Toolkit Linux.

What is Network Security Toolkit (NST) Linux

NST is a Linux distribution based on Fedora Linux. NST provides security toolkit for professionals and network administrator with a comprehensive set of Open Source Network Security Tools. All of the tools in Top 125 Network Security Tools are included inside NST Linux. NST also comes with an advanced Web User Interface (WUI). We can say that NST Control Panel is in a web form. Another important thing is that NST can be used as a network security analysis validation.

Full article here:
Features, Installation, Usage of Network Security Toolkit (NST) in Linux (LinOxide)

Link: How to use sshfs (Secure Shell FileSystem) to Mount Remote Directories Locally

Sshfs is a file system for operating systems that have FUSE (Filesystem in Userspace) implementation. Examples of such operating systems are Linux, Mac OS X and FreeBSD but not limited to these. SSHFS is a great tool as it enable a user to mount remote directories on the local machine securely. The SSH protocol encrypts the connection between the local and remote machine. This makes it difficult for a third party to see the files being exchanged between the two machines on the network.

Full article here:
How to use sshfs (Secure Shell FileSystem) to Mount Remote Directories Locally (LinOxide)
Related:
SSHFS (Secure SHell FileSystem) for Mounting Remote Linux Filesystems (Tecmint)
Mount Remote Filesystems Over SSH Using SSHFS (Unixmen)
SSHFS in Linux (Linux/Vmware Solutions)
Linux Terminal: sshfs, Remote directory over ssh (Linuxaria)

Link: How to Reset the Password on Any Windows Version, Including 8.1, From Linux

If you have a Windows operating system and you find yourself locked out, Linux is there for the rescue with a very handy tool, ntpasswd.

ntpasswd can be described as an “Offline NT Password & Registry Editor” and it’s a tool that can be used to reset the password of any user that has a valid account on a Windows system.

Full article here:
How to Reset the Password on Any Windows Version, Including 8.1, From Linux (Softpedia)
Related:
Resetting Windows administrator password using Linux (Techie News)

Link: How To Set Up Unlocator DNS Under Linux To Access Netflix, Hulu, CBS, ABC, Pandora and More Outside The US

Tunlr, a free DNS service that allowed its users to access US-based on-demand Internet streaming providers from outside the US, was shut down recently.

For those who are looking for a reliable alternative, there’s Unlocator, a similar service that you can use to watch Netflix, Hulu, CBS, MTV, PBS, ABC, Pandora and more no matter where you live.

The service is free to use while in beta (I’m not sure when it will be out of beta) and once it leaves the beta, it will cost $4.95 / month.

At the time I’m writing this article, Unlocator supports 78 services, including: Netflix, Hulu, Pandora, ABC, AMC, BBC, CBS, Channel4, Discovery Channel, ESPN, Fox, HBO Go, MTV, NBC, PBS, Showtime, TV.com, VEVO, USA Network, VH1 and others. A complete list can be found HERE.

While Unlocator works as advertised, there is one issue: using the Unlocator DNS permanently is not a good idea for privacy/security reasons, speed and so on. For this reason, I’ve adapted the instructions for Tunlr I wrote a while back on WebUpd8, for Unlocator.

Full article here:
How To Set Up Unlocator DNS Under Linux To Access Netflix, Hulu, CBS, ABC, Pandora and More Outside The US (Web Upd8)

Link: The Beginner’s Guide to iptables, the Linux Firewall

Iptables is an extremely flexible firewall utility built for Linux operating systems. Whether you’re a novice Linux geek or a system administrator, there’s probably some way that iptables can be a great use to you. Read on as we show you how to configure the most versatile Linux firewall.

Full article here:
The Beginner’s Guide to iptables, the Linux Firewall (How-To Geek)

Recent Posts

Recent Comments

Archives

Categories

Meta

GiottoPress by Enrique Chavez