Google’s new do-it-yourself two-factor authentication (Google Authenticator) enables you to setup stronger logins on your linux system. Nick Wilkens (@nwilkens) has a good/quick tutorial up on his company’s blog for acquiring, compiling and setting up Google Authenticator for ssh sessions. NOTE: On the Ubuntu VPS I was doing testing on, I had to add the… Continue reading
Posts Tagged → Internet protocols
Metricon: Name Server Log Data
Speakers: Fruhwirth, Proschinger, Lendl, Savola “On the use of name server log data as input for security measurements” CERT.at ERT coordinate sec efforts & inc resp for IT sec prblms on a national level in Austria constituted of IT company security teams and local CERTs Why name server data? CERT.at is mandated to… Continue reading