» Security Xtreme Delusions: A Legend In My Own Mind

SSH is great for secure remote access and if you happen to connect to multiple machines then you will need multiple keys, especially if you are doing a password-less connection. Here is how to keep all your certificates nice and tidy.

More »

You are backing up your personal files, now what about the database. Databases are just as susceptible to hard disk failures, viruses, and accidental deletion as your personal data. Maybe even more so if your database is getting frequent updates. In this post we will cover the back up and recovery of a MySQL database.

More »

Though your personal data is important and can be irreplaceable, few people ever think about protecting it with a backup strategy. Hard disk failures, viruses, and even accidental deletions could destroy you data forever. In order to protect my data, and in the continued belief that overkill is just enough, I do hourly backups and have 3 months of data at my fingertips. In this article I am going to cover the local backups. In a future article I will cover the remote backup strategy using a passwordless SSH

More »

Sometimes you will need to create an account that does not ask for a password, this is usually done for network administration. Creating an account without a password is a severe security violation and opens your sever up to attack. To get around this, create an account with a very strong password and then use public key encryption for logging in. If a user attempts to log in, they will need to know the password. However, you can log in with out a password by using the encrypted keys. You can further increase your security by ONLY allowing a login with the encrypted keys, but that is for another post.

More »

With phishing attacks becoming more prevalent these days it is important always be alert and pay attention to where you are entering your online information. If you are not familiar with phishing, it is when someone attempts to get sensitive information (eg personal, financial) by masquerading as a trusted entity such as a bank website or an email from your ISP.

More »