Tag: procedures
-
How to Harden a Home Telstra Modem Router
Reading Time: 2 minutes“Skinny Betty!” — From the movie Pearl Harbour. “Skinny Betty” is a fun social way to say that you want to apply a “principle of least privilege”, by keeping things minimal. In terms of a telstra router configuration, if you don’t need it, disable it. Connect to your modem via ethernet or…
-
How to Securely Browse and Harden Firefox
Reading Time: 3 minutesFirefox inherits security features from the famous TOR browser. By default most of firefox’s settings are secure and stable. Most people browse with just one browser. Here we will show you how to use two firefox profiles; – We use the recon profile to see if we should trust the site via…
-
How to Use a Yubikey with Libre Office for OpenPGP Encryption
Reading Time: 2 minutesIn the above blog, it was seen that libre office reads the ~/.gnupg home directory of GPG in order to encrypt/decrypt. This may be stolen by malware since it is located in a standard place. It possible however, to shift the private sub key to a Yubikey’s OpenPGP card module. By doing…
-
How to Use OpenPGP Symmetric Encryption with Libre Office and Linux
Reading Time: 3 minutesBenefits The benefits for using public/private symmetric encryption with libre office are; – Steps Generate a public/private GPG key pair; – If you use windows you will have to figure this out on your own, since i am on linux mint. You could use a graphical user interface like Sea Horse to…
-
How to Harden Debian/Ubuntu/Rocky Desktop
Reading Time: 5 minutesLinux desktops have more moving parts and require less hardening than a server. These listed tweaks can be adapted for either debian/ubuntu/rocky linux type distributions. Tuning SystemD Journal We should limit the size of the journal in memory and on disk. This prevents the disk from being full. The logs would just…
-
How to Backup Work Files in Linux Desktops
Reading Time: 3 minutesWhen backing up, our work files should be in dvd sized folders. This allows us to create an image and burn to dvd. We should use the linux disk dump tool, to duplicate entire sdcards. We get the benefits of optical backups where data can last a lifetime. We also get the…
-
How to Multifactor Your Laptop with Google Authenticator and Linux Mint
Reading Time: 2 minutesOn Rocky Linux; – On Debian/Ubuntu/Linux Mint; – Configure a Unix User Each unix user must be configured within their own session. Below generates a ~/.google_authenticator file which has all the user settings for the PAM module. Configure root; – Add the above serial code to your google auth app which should…
-
How to Add a Javascript Background Animation in Your Word Press Theme
Reading Time: 2 minutesIn your plugins folder, add your custom javascript effect to ./assets/javascript/firefly.js In the example we will use the fire fly effect from https://codepen.io/Mertl/pen/GexapP For this to work in word press, we need to wrap it in jquery so that it only runs when the DOM is ready. The firefly code from Mertl…
-
How to Add Phishing Blacklists to Your Linux DNS Resolver Firewall
Reading Time: 2 minutesWhy manage your own dns resolver? Australia is in the top ten of targeted countries according to this cybercx article https://cybercx.com.au/news/australia-one-of-the-top-ten-countries-targeted/ By managing your own resolver, you decide what gets blocked. There are free phishing lists openphish.com, and phishtank.com, you would want these as part of your dns block list. Throughout this…
-
How to Add Custom Fonts to a WordPress Theme
Reading Time: < 1 minuteWhen building your first word press site, the first thing you want to do is apply your branding style guide, with all your custom fonts. There are many blogs on this topic. The below site demonstrates 3 different ways; – Methods; – In practice, with word press 6.5+ not all methods…