Tag: cyber

  • How to Harden a Home Telstra Modem Router

    How to Harden a Home Telstra Modem Router

    Reading Time: 2 minutes“Skinny Betty!” — From the movie Pearl Harbour. “Skinny Betty” is a fun social way to say that you want to apply a “principle of least privilege”, by keeping things minimal. In terms of a telstra router configuration, if you don’t need it, disable it. Connect to your modem via ethernet or…

  • How to Securely Browse and Harden Firefox

    How to Securely Browse and Harden Firefox

    Reading Time: 3 minutesFirefox inherits security features from the famous TOR browser. By default most of firefox’s settings are secure and stable. Most people browse with just one browser. Here we will show you how to use two firefox profiles; – We use the recon profile to see if we should trust the site via…

  • How to Use a Yubikey with Libre Office for OpenPGP Encryption

    How to Use a Yubikey with Libre Office for OpenPGP Encryption

    Reading Time: 2 minutesIn the above blog, it was seen that libre office reads the ~/.gnupg home directory of GPG in order to encrypt/decrypt. This may be stolen by malware since it is located in a standard place. It possible however, to shift the private sub key to a Yubikey’s OpenPGP card module. By doing…

  • How to Use OpenPGP Symmetric Encryption with Libre Office and Linux

    How to Use OpenPGP Symmetric Encryption with Libre Office and Linux

    Reading Time: 3 minutesBenefits The benefits for using public/private symmetric encryption with libre office are; – Steps Generate a public/private GPG key pair; – If you use windows you will have to figure this out on your own, since i am on linux mint. You could use a graphical user interface like Sea Horse to…

  • How to Harden Debian/Ubuntu/Rocky Desktop

    How to Harden Debian/Ubuntu/Rocky Desktop

    Reading Time: 5 minutesLinux desktops have more moving parts and require less hardening than a server. These listed tweaks can be adapted for either debian/ubuntu/rocky linux type distributions. Tuning SystemD Journal We should limit the size of the journal in memory and on disk. This prevents the disk from being full. The logs would just…

  • How to Backup Work Files in Linux Desktops

    How to Backup Work Files in Linux Desktops

    Reading Time: 3 minutesWhen backing up, our work files should be in dvd sized folders. This allows us to create an image and burn to dvd. We should use the linux disk dump tool, to duplicate entire sdcards. We get the benefits of optical backups where data can last a lifetime. We also get the…

  • How to Multifactor Your Laptop with Google Authenticator and Linux Mint

    How to Multifactor Your Laptop with Google Authenticator and Linux Mint

    Reading Time: 2 minutesOn Rocky Linux; – On Debian/Ubuntu/Linux Mint; – Configure a Unix User Each unix user must be configured within their own session. Below generates a ~/.google_authenticator file which has all the user settings for the PAM module. Configure root; – Add the above serial code to your google auth app which should…

  • Remember Your Passwords by Building a Memory Palace

    Remember Your Passwords by Building a Memory Palace

    Reading Time: < 1 minuteA memory palace is a place where you store information. The location of the palace should be familiar, like your childhood house. But the items inside it, should be imaginary, and resemble a portion of your password. The best way to build your palace is to draw it. There are many…

  • How to Add Phishing Blacklists to Your Linux DNS Resolver Firewall

    How to Add Phishing Blacklists to Your Linux DNS Resolver Firewall

    Reading Time: 2 minutesWhy manage your own dns resolver? Australia is in the top ten of targeted countries according to this cybercx article https://cybercx.com.au/news/australia-one-of-the-top-ten-countries-targeted/ By managing your own resolver, you decide what gets blocked. There are free phishing lists openphish.com, and phishtank.com, you would want these as part of your dns block list. Throughout this…

  • How to Add Country Blocking to Your Linux Firewall

    How to Add Country Blocking to Your Linux Firewall

    Reading Time: 3 minutesWhy have a country blocking firewall? Australia is in the top ten of targeted countries according to this cybercx article https://cybercx.com.au/news/australia-one-of-the-top-ten-countries-targeted/ Sources of hacking come from China, Russia, and North Korea. By blocking these countries, we can disrupt a majority of the simple level attacks that do not try to mask their…