Tag: procedures

  • How to Harden a Home Telstra Modem Router

    How to Harden a Home Telstra Modem Router

    Reading Time: 2 minutes“Skinny Betty!” — From the movie Pearl Harbour. “Skinny Betty” is a fun social way to say that you want to apply a “principle of least privilege”, by keeping things minimal. In terms of a telstra router configuration, if you don’t need it, disable it. Connect to your modem via ethernet or…

  • How to Securely Browse and Harden Firefox

    How to Securely Browse and Harden Firefox

    Reading Time: 3 minutesFirefox inherits security features from the famous TOR browser. By default most of firefox’s settings are secure and stable. Most people browse with just one browser. Here we will show you how to use two firefox profiles; – We use the recon profile to see if we should trust the site via…

  • How to Use a Yubikey with Libre Office for OpenPGP Encryption

    How to Use a Yubikey with Libre Office for OpenPGP Encryption

    Reading Time: 2 minutesIn the above blog, it was seen that libre office reads the ~/.gnupg home directory of GPG in order to encrypt/decrypt. This may be stolen by malware since it is located in a standard place. It possible however, to shift the private sub key to a Yubikey’s OpenPGP card module. By doing…

  • How to Use OpenPGP Symmetric Encryption with Libre Office and Linux

    How to Use OpenPGP Symmetric Encryption with Libre Office and Linux

    Reading Time: 3 minutesBenefits The benefits for using public/private symmetric encryption with libre office are; – Steps Generate a public/private GPG key pair; – If you use windows you will have to figure this out on your own, since i am on linux mint. You could use a graphical user interface like Sea Horse to…

  • How to Harden Debian/Ubuntu/Rocky Desktop

    How to Harden Debian/Ubuntu/Rocky Desktop

    Reading Time: 5 minutesLinux desktops have more moving parts and require less hardening than a server. These listed tweaks can be adapted for either debian/ubuntu/rocky linux type distributions. Tuning SystemD Journal We should limit the size of the journal in memory and on disk. This prevents the disk from being full. The logs would just…

  • How to Backup Work Files in Linux Desktops

    How to Backup Work Files in Linux Desktops

    Reading Time: 3 minutesWhen backing up, our work files should be in dvd sized folders. This allows us to create an image and burn to dvd. We should use the linux disk dump tool, to duplicate entire sdcards. We get the benefits of optical backups where data can last a lifetime. We also get the…

  • How to Multifactor Your Laptop with Google Authenticator and Linux Mint

    How to Multifactor Your Laptop with Google Authenticator and Linux Mint

    Reading Time: 2 minutesOn Rocky Linux; – On Debian/Ubuntu/Linux Mint; – Configure a Unix User Each unix user must be configured within their own session. Below generates a ~/.google_authenticator file which has all the user settings for the PAM module. Configure root; – Add the above serial code to your google auth app which should…

  • How to Add a Javascript Background Animation in Your Word Press Theme

    How to Add a Javascript Background Animation in Your Word Press Theme

    Reading Time: 2 minutesIn your plugins folder, add your custom javascript effect to ./assets/javascript/firefly.js In the example we will use the fire fly effect from https://codepen.io/Mertl/pen/GexapP For this to work in word press, we need to wrap it in jquery so that it only runs when the DOM is ready. The firefly code from Mertl…

  • How to Add Phishing Blacklists to Your Linux DNS Resolver Firewall

    How to Add Phishing Blacklists to Your Linux DNS Resolver Firewall

    Reading Time: 2 minutesWhy manage your own dns resolver? Australia is in the top ten of targeted countries according to this cybercx article https://cybercx.com.au/news/australia-one-of-the-top-ten-countries-targeted/ By managing your own resolver, you decide what gets blocked. There are free phishing lists openphish.com, and phishtank.com, you would want these as part of your dns block list. Throughout this…

  • How to Add Custom Fonts to a WordPress Theme

    How to Add Custom Fonts to a WordPress Theme

    Reading Time: < 1 minuteWhen building your first word press site, the first thing you want to do is apply your branding style guide, with all your custom fonts. There are many blogs on this topic. The below site demonstrates 3 different ways; – Methods; – In practice, with word press 6.5+ not all methods…