Users. What the hell you mean by “root”? Are you a Windows user? I bet you have the user account badly configured. By default Windows is installed under the Administrator account. And nobody bothers to change this and add a second account. That second account should be an underprivileged one. If you own the computer […]

The root account

How to install Nagios on FreeBSD
As explained in an introduction article, Nagios is a monitoring software very well established and used in production on many environments. Results are displayed in a web page so it uses a web server to publish them to the user and needs some php code to do so. It is configured through files which happen […]

List of Speculative Execution Vulnerabilities
Vulnerability CVE Exploit name Public vulnerability name Firmware changes Spectre 2017-5753 Variant 1 Bounds Check Bypass (BCB) No Spectre 2017-5715 Variant 2 Branch Target Injection (BTI) Yes Meltdown 2017-5754 Variant 3 Rogue Data Cache Load (RDCL) No Spectre-NG 2018-3640 Variant 3a Rogue System Register Read (RSRE) Yes Spectre-NG 2018-3639 Variant 4 Speculative Store Bypass (SSB) […]

How to configure FreeBSD to use a webcam (version 12 and 13)
Introduction. Unlike many Linux distributions the FreeBSD operating system comes quite crude out of the box. What others will interpret as a disadvantage, with some knowledge on the system, others see the power to serve. Anyone willing to have a nice FreeBSD desktop experience with little effort, there are a couple of BSD-based distributions, like […]

How to install Fail2ban on FreeBSD
Fail2ban is a complementary tool to your firewall. It works by scanning log files and bans IPs which present suspicious activity such as failed logins. It is compatible with many UNIX-like systems and is a security tool to have in your arsenal. It can filter not only ssh logins, but other services too, for example […]

Nessus vulnerability scanner
Nessus is a very well known vulnerability scanner used by many large and small companies to assess their systems and correct the issues found in them. Cybersecurity teams and specially auditors, make heavy use of tools like this in order to follow up the state of infrastructure and environments. Having a tool like this saves […]

Live monitoring with Netdata
Netdata is a real time monitoring software that allows administrators, developers and architects have a visual representation of a system’s performance live. In short, porn for system’s tuners and other masochists but also a great tool to check system’s behaviour under load giving all members of a team to look at their part while the […]

Linux VS open source UNIX
Linux is the mainstream UNIX-like platform of choice in the modern world. There are valid open source code base alternatives from which many businesses have benefited from. This is a different approach on both.

WordPress administration over SSL
If you are a WordPress user or prettend to become one and you have some IT administration knowledge this guide is of your interest. Many hostings already provide easy point and click solutions to administer WordPress over SSL. However you may be self hosting WordPress or you’re just a curious person. What is TLS? TLS […]

ARP spoofing attacks
ARP spoofing attacks are quite harming and they can easily constitute a man-in-the-middle (MITM) attack. They consist on the attacker sending ARP packets into the network the victim is located, typically redirecting traffic to the attacker’s machine. Once this is achieved the attacker can sniff all the traffic sent by the victim’s device and obtain […]
