Skip to content
IT Nursery
  • Home
  • Programming
    • Mac / IOS
    • Android
    • Web Applications
    • PHP
    • Java
    • C
    • C++
  • DataBase
    • MySQL
  • CMS
    • WordPress
  • System and Network
    • Serverfault

security

Authenticated users changing personal details

by IT Nursery

From a UX perspective – not a security perspective – you want the customer to feel comfortable with your site. Having them “feel” … Read more

Tags edit, security

How do I stop KWallet from asking my password to let the system connect to WiFi?

by IT Nursery

On KDE 5, in the System Settings app KDE Wallet, enable the option Different wallet for local passwords. Then: create a new wallet … Read more

Tags kwallet, security, wifi

Security of bash script involving gpg symmetric encryption

by IT Nursery

Security of bash script involving gpg symmetric encryption

Tags bash, encryption, gpg, security, vulnerability

Is it possible to use pendrive as key for Linux system

by IT Nursery

If you mean to use a pendrive to decrypt and encrypt your harddrive, yes that is possible and actually not that complex. You … Read more

Tags linux, security, usb

How to clear terminal after logging out?

by IT Nursery

If you don’t have bash or zsh (e.g. you just have ksh), or you want a way that works in all modern shells, … Read more

Tags console, security, tty

What is hvc0? (appearing in “who” list)

by IT Nursery

What is hvc0? (appearing in “who” list)

Tags security, ubuntu, users, xen

SSH Public key comment separator

by IT Nursery

SSH Public key comment separator

Tags key-authentication, security, ssh

Is it possible (and a good idea) to do `pw lock root` on FreeBSD?

by IT Nursery

It’s possible, yes. But it’s not a very good idea. Locking out the account is equivalent to setting an absolutely unguessable password. You … Read more

Tags freebsd, password, root, security

Why did SDF switch from NetBSD to Linux?

by IT Nursery

Generally speaking NetBSD is less popular than Linux, so it has less installations and hence, less attention for malicious attacks. Linux itself is … Read more

Tags linux, netbsd, security

Chroot Risks w/ /dev and /proc

by IT Nursery

This is quite a big subject, and quite a lot has been written about it on the web, so I’d encourage you to … Read more

Tags chroot, devices, linux, proc, security
Post navigation
Older posts
Page1 Page2 … Page357 Next →

Recent Posts

  • Advice for improving internal dashboard [closed]
  • grep : ‘+’ special character
  • File location for Syslogs in Centos machine
  • How to collect users’ task completion times?
  • “service {FOO} start” vs. “/etc/init.d/{FOO} start”? [closed]
IT Nursery
Creative Commons License
This work is licensed under a Creative Commons Attribution-ShareAlike 4.0 International License.

Important Link

  • About
  • Privacy Policy
  • Contact

IT Nursery

The Goal of ITNursery Engaging the world to foster innovation through aggregate information. Our Question Answer post, blog information, products and tools help developers and technologists in life and at work.

copyright © 2023 All Right Reserved | IT NurSery