Cybersecurity 101

Uncategorized
No, not a lesson in CyberSecurity.  Just a tale. I was working on setting secure shell (SSH) access to a remote computer from mine.  I've installed Linux on it and have enabled SSH access via RSA keys only.  That's the only real way of doing it properly.  Only allow users to come in (disallowing the root user) via SSH as long as they have the 4096bit RSA key locally on their computer that's registered with the remote computer. I'm using a few years old Watchguard firewall one that I've not had muhc experience with.  I managed to log into it as the administrator and to look at what it would take to get SSH port forwarded to the Linux computer in question. With that Watchguard I was able to set…
Read More

Last post to date (5-16-2017)

Asterisk, computers, Linux, Raspberry Pi
I've neglected posting for numerous reasons.  I've wanted to come back and post on several occasions.  Things just keep popping up or I feel lazy.  Since there are a lot of things that have happened during that time I thought I'd update some. Going way back I've been working with getting the pihole working.  This is an amazing tool.  Integrating it with my network is a bit tricky.  Each time I do something like adding stuff to my network I learn what doesn't work and hence I learn new things.  That's really why I am in this field and stay at this level.   The pihole provides a LAN wide blocking of ad and tracking sites.  How it works is pretty simple.  It's based on the concept of DNS. That's domain…
Read More