I found a unique website the other day called StolenCameraFinder – I lost my Sony A200 DSLR a while ago so I decided to give StolenCameraFinder a go to see what it could do for me.
In a nutshell, you upload a photo taken by the stolen/lost camera to the website. It then cross references a unique serial number which is found in the picture against a large database of serial numbers. If the serial number is found in the database, it could potentially mean that a photo was taken from your camera and uploaded online after it was lost/stolen.
Continue reading How StolenCameraFinder and EXIF Work
This article will serve as a quick tutorial on installing TCPDump on a LinkSys WRT54GL box running the custom DD-WRT firmware.
TCPDump is a command line packet analyser. It’s a bit like Wireshark except it is command line based and in this tutorial, we will be installing it on a router and not on a PC.
Continue reading Installing TCPDump on DD-WRT WRT54GL
This article will serve as a quick tutorial on installing and configuring fail2ban on an Amazon EC2 instance.
I like to think of fail2ban as a ‘second line’ of defence against systematic attempts to break through and access SSH on a server.
First line of defence should always be disabling the root log-in, using strong passwords/using private keys for log-on, etc.
It can do a lot more than protecting against brute-force SSH attacks using regex’s but that is not in the scope of this tutorial.
Continue reading Quick and Easy Tutorial on Installing and Configuring fail2ban on an Amazon EC2 Instance