Monthly Archives: April 2011
I found a unique website the other day called StolenCameraFinder – I lost my Sony A200 DSLR a while ago so I decided to give StolenCameraFinder a go to see what it could do for me.
In a nutshell, you upload one of your pictures to the website. It then cross references a unique serial number which is found in the picture against a large database of serial numbers. If the serial number is found in the database, it could potentially mean that a photo was taken from your camera and upload online after it was lost/stolen.
This article will serve as a quick tutorial on installing TCPDump on a LinkSys WRT54GL box running the custom DD-WRT firmware.
TCPDump is a command line packet analyser. It’s a bit like Wireshark except it is command line based and in this tutorial, we will be installing it on a router and not on a PC.
This article will serve as a quick tutorial on installing and configuring fail2ban on an Amazon EC2 instance.
I like to think of fail2ban as a ‘second line’ of defence against systematic attempts to break through and access SSH on a server.
First line of defence should always be disabling the root log-in, using strong passwords/using private keys for log-on, etc.
It can do a lot more than protecting against brute-force SSH attacks using regex’s but that is not in the scope of this tutorial.