Tag: ssh

  • Netcubicle, you’re personalized network based linux desktop..

    As they say on their site “Experience Linux without the hassles of installation and adminstration.” Inqub has a new product out called Netcubicle which basically is this…. for $4.50 a month, you can have a Gigabyte of storage and a linux desktop accessible from most any computer in the world. (Or command line SSH access too.) Apparently it’s based on Ubuntu/Kubuntu (They say gnome/kde are both available). The KDE Dot calls it a KDE Desktop Hosting Service.

    (more…)

  • Internet based filesystem with no transfer fees

    I thought this was a great idea…. rsync.net Okay for 2$ per GB of storage per month (or $24 per year for 1GB of storage) you can have your very own secure online storage drive. For you windows users think of a G: drive or a Z: drive that you could SECURELY connect to from a home machine and a work machine…. If you’re concerned about a catastrophic failure of one of their datacenters, then pay $3.50/GB/month for a more geographically dispersed plan (uses redundant data centers..) The best parts (I think) are this…. ssh encrypted connection to your drive and no transfer fees.

    (more…)

  • Network Security – so https and ssh are immune to arp spoofing right?

    When a machine has been arp spoofed, ALL network traffic from it is likely passing through a “hostile” machine. So, NO, https and ssh traffic is not immune, it is travelling through a hostile machine. However, it should be encrypted. There are a few exceptions though. SSH version 1 is a broken encryption scheme and should be avoided like the plague. As far as I know SSH 2 should be safe. Pay attention to complaints about the host identification not being able to be verified….

    (more…)

  • Using ssh to protect web browsing over wireless or other hostile networks

    This really could be used to encyrpt web traffic over any “hostile” network. Here’s what I’m talking about. Laptop using wireless. Within our internal network we would LIKE all our web traffic to be encrypted at least from the laptop to a wired host. (From there to the outside world it will be open.) At the minimum we would like to have the traffic encrypted over the wireless leg of the journey. Here’s the most straightforward approaches uing ssh.

    (more…)

  • Common Networking Ports

    Along the lines of “knowing your network” with the network security guide. Here are some of the most commonly used network ports. There are 65535 ports that can listen for a connection, so this is not a thorough listing. (These are tcp unless noted otherwise.)

    (more…)

  • Building RPM’s – building for several different releases on one machine

    I support a few linux systems outside my own group. Those systems are not as quick to get upgraded to the latest and greatest version of Mandrake – now Mandriva as my home systems. But, I occasionally need to build rpms for them. I don’t want to have a build environment on each one and have to make sure they each have all the devel libraries installed. So what to do?

    (more…)