I’m really starting to appreciate the benifits of dual factor authentication across the board, so this Howtoforge article is of interest to anyone who wants to secure SSH access on thier Linux systems. I previously posted about using your mobile phone as the something you have bit, well this is another method.
While you may have your Ubuntu install locked down with Full disk encryption incase you loose the laptop, UFW locking down the network with a firewall, there is no point if you have a poor password. Dual factor authentication using One Time Passwords may be an option for you, if they are this great howtoforge article might point you in the right direction.
I've been playing Half-Life recently, something to which I've looked forward for quite some time. I did get it playing under Wine years ago, but I thought I only got a little ways. I'm stuck In the Rails right now, but I remember this level.
I’ve had a need to get a local squid proxy to perform local filtering based on AD Security groups because it’s not something websense can do. I found this wonderful howtofoge guide online and Used it to setup the base system. This howto is a work in progress as the next stage is to get it working with DansGuardian or SquidGuard.
Client Internet Explorer Browsers need to have “Enable Integrated Windows Authentication” ticked in Internet Options :: Advanced settings as well as Proxy Auto detection enabled – google these if not sure. All modern web browsers will support proxy auto detection. Firefox and Chrome also support Windows Authentication.
A couple of weeks ago I wrote a post on using a Chromebook to develop on a cloud platform. Its based on a Digital Ocean remote server and like most people who wish to attach to the command line interface on a remote server I use SSH. It’s an encrypted connection over the network/internet from end to end. However being a cloud server I was wondering if it was possible to secure this a little bit more?
A chat with a friend on the way into work provided me with a solution.
The solution is Two Factor authentication a system beased on a simple premise, something you know (the SSH password in this case) and something you have (your mobile phone in this case, but it could be a secure token) which will deliver a random number.
Most of the guides you will see using this utility mine included cover how to get Ubuntu 12.04 the LTS version working, however there is also scope within the command line to get the latest and greatest up and running. specifically the -r switch. Issuing the following command will provide you with a bare bones Ubuntu 13.04 install
Being a few months in with my Acer C7 Chromebook as my only laptop i’ve very pleased with what it does, I do have the Crouton Ubuntu chroot installed and upgraded the device to 16Gb of Ram, however there is one core thing I miss with this setup. VMWare/Virtualbox. I find i’m often building virtual machines, usually Ubuntu to test bsh scripts or build LAMP Environments to test some PHP out with. That isn’t something i’m able to do even on the CHROOT Ubuntu environment.
All however is not lost, and i’ve found a way to get round this..
Will the believers in the desktops ever stop making this year is the year of Linux on the desktop...
They say a week in politics is a long time, well a year in the mobile phone industry is an eternity and what huge changes the industry is going through. A year ago the roost was ruled by Apple and Google, 3G was the fastest we can go and handsets were finding a stock size at 4.5″.. The world however of the mobile device is now a very different place and very much in a positive state of change..
After being retired (for four years) from teaching high school Computer Science, I decided to get back into programming again. I once taught a beginning programming class using the Ruby language, and I thought that would be a good way to get back into programming. So, I decided I needed a “Ruby refresher”, and I wanted to learn more about that language than I taught in the classroom.