Categories
Tech

How StolenCameraFinder and EXIF Work

I found a unique website the other day called StolenCameraFinder – I lost my Sony A200 DSLR a while ago so I decided to give StolenCameraFinder a go to see what it could do for me.

In a nutshell, you upload a photo taken by the stolen/lost camera to the website. It then cross references a unique serial number which is found in the picture against a large database of serial numbers. If the serial number is found in the database, it could potentially mean that a photo was taken from your camera and uploaded online after it was lost/stolen.

Categories
Tech

Installing TCPDump on DD-WRT WRT54GL

This article will serve as a quick tutorial on installing TCPDump on a LinkSys WRT54GL box running the custom DD-WRT firmware.

TCPDump is a command line packet analyser. It’s a bit like Wireshark except it is command line based and in this tutorial, we will be installing it on a router and not on a PC.

Categories
Tech

Quick and Easy Tutorial on Installing and Configuring fail2ban on an Amazon EC2 Instance

This article will serve as a quick tutorial on installing and configuring fail2ban on an Amazon EC2 instance.

I like to think of fail2ban as a ‘second line’ of defence against systematic attempts to break through and access SSH on a server.
First line of defence should always be disabling the root log-in, using strong passwords/using private keys for log-on, etc.
It can do a lot more than protecting against brute-force SSH attacks using regex’s but that is not in the scope of this tutorial.