Don’t Enter Your Password Into That Website: A Rant You Need to Hear
Don’t Enter Your Password Into That Website: A Rant You Need to Hear
Let me set the stage.
I came across a YouTube video the other day where the creator casually suggested that you can “check if your password has been leaked” by typing it directly into a website or tool. It was not a very popular content creator, none the less, I think we need to talk about this.
Continue readingUnderstanding Login Types in Windows
Introduction
Windows operating systems offer various login types that define how users authenticate themselves and gain access to the system. Understanding these login types is crucial for both users and system administrators, as they impact security, access levels, and overall user experience in a Windows environment. In this blog post, we’ll explore the different types of logins in Windows, how to check which login type you are using, and how these types influence your permissions and capabilities within the operating system.
Continue readingHTTPSorHTTP
The Illusion of Web Security: A Cautionary Tale
Alex was a bright developer. Fresh out of college and eager to make a mark, he landed a job at a promising tech startup. His first major project: build a new web application for the company’s clients. As Alex dove into the world of code, he kept hearing the same advice from his peers and mentors: “Make sure the site uses HTTPS. It’s the gold standard for web security.”
Continue readingssh trick – ssh to remote host with bastion host
Lot of times, you have to ssh to a server with bastion host. If you dont know what is bastion host then see this:
Now, in such cases, either you add an entry in “~/.ssh/config” to route the ssh through the bastion host or do ssh to bastion host and then ssh from there to the actual host. But wait, there is always a better way:
Continue readinghttps site available now with cert from cacert.org
More about cacert.org :
CAcert.org is a community-driven Certificate Authority that issues certificates to the public at large for free.
CAcert’s goal is to promote awareness and education on computer security through the use of encryption, specifically by providing cryptographic certificates. These certificates can be used to digitally sign and encrypt email, authenticate and authorize users connecting to websites and secure data transmission over the internet. Any application that supports the Secure Socket Layer Protocol (SSL or TLS) can make use of certificates signed by CAcert, as can any application that uses X.509 certificates, e.g. for encryption or code signing and document signatures.
Continue reading
ssh authorized keys – limit ssh session to custom command
If you want a ssh key to be able to run a custom command only and nothing beyond that, then you can use the “command” option in the authorized_keys file of ssh.
For example, to limit user to run only top command with a key, you can add the key like this:
echo 'command="/usr/bin/top" ssh-rsa ' >>~/.ssh/authorized_keys