Archive for the 'Security' Category

 

 

Sep 24 2016

How to Reuse Exchange SSL Certificate on Apache Web Server

Published by under Apache,Exchange,Mail,Security

While generating a Microsoft Exchange (or IIS web server) certificate, take the opportunity to add extra domain names and reuse it on Apache web servers. This will save you a few bucks and time, unless the CA provides a certificate for multiple platforms. First off, copy the pfx file generated with Exchange on the Apache […]

No responses yet

May 06 2015

How to Deny / Force VLAN Access to a Mac Address on Cisco

Published by under Cisco,Security

Different methods exists to filter out mac addresses on a switch such as:– port security,– mac access lists or even– 802.1x port-based authentication with Radius. Mac access ACL require a higher end switch while 802.1x authentication is a pretty heavy setup and needs to manage a mac address database on a Radius server.Port security allows […]

No responses yet

Dec 31 2009

Linux Console Remote Access from HP iLO Interface

Published by under Linux,SSH

iLO is a management interface supporting SSH, available on HP Proliant servers. It provides interesting features such as remotely powering the server on and off.But it is also possible to access the Linux console and reboot in single mode remotely. How handy is that!?  BIOS While booting up, press F9 to go in the BIOS […]

2 responses so far

Sep 04 2009

Configure WPA on Linux Howto

Published by under Linux,Security

WPA encryption is not much hassle to set up and is way more secure than WEP if you use a strong pre-shared key.   First off, we’ve got a wifi interface that can be displayed with iwconfig (from the wireless tools): [root@db ~]# iwconfig lo no wireless extensions. eth0 no wireless extensions. ath0 IEEE 802.11g […]

No responses yet

Aug 09 2009

How to crack a WEP key and decrypt live traffic

Published by under Linux,Security

Cracking a WEP key is extremely easy and is a matter of a few seconds. Truth? Pretty much… We are going to decrypt traffic in real time as well without even needing to connect to the wireless access point. All steps will be run under root super-user as interfaces state needs to be changed.  Aircrack Installation […]

One response so far

Next »